<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-coap-pubsub-profile-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACE CoAP Pub-Sub Profile">CoAP Publish-Subscribe Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-coap-pubsub-profile-04"/>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Sengul" fullname="Cigdem Sengul">
      <organization>Brunel University</organization>
      <address>
        <email>csengul@acm.org</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2026" month="March" day="19"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 121?>

<t>This document defines an application profile of the Authentication and Authorization for Constrained Environments (ACE) framework, to enable secure group communication in the Publish-Subscribe (Pub-Sub) architecture for the Constrained Application Protocol (CoAP) [draft-ietf-core-coap-pubsub], where Publishers and Subscribers communicate through a Broker. This profile relies on protocol-specific transport profiles of ACE to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token. This document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers, as well as the provisioning of keying material and security parameters that Clients use for protecting their communications end-to-end through the Broker.</t>
      <t>Note to RFC Editor: Please replace "[draft-ietf-core-coap-pubsub]" with the RFC number of that document and delete this paragraph.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/pubsub-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 126?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In a publish-subscribe (Pub-Sub) scenario, devices acting as Publishers and/or Subscribers <!--with limited reachability--> communicate via a Broker that enforces store-and-forward messaging between those. This effectively enables a form of group communication, where all the Publishers and Subscribers participating in the same Pub-Sub topic are considered members of the same application group associated with that topic.</t>
      <t>The specification at <xref target="I-D.ietf-core-coap-pubsub"/> defines a Pub-Sub architecture for the Constrained Application Protocol (CoAP) <xref target="RFC7252"/>.</t>
      <t>Building on the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>, the document <xref target="RFC9594"/> defines how to request, distribute, and renew keying material and configuration parameters to protect message exchanges in a group communication environment. That is, candidate group members that act as ACE Clients and are authorized to join a group can interact with a Key Distribution Center (KDC) that acts as ACE Resource Server and is responsible for the group. The KDC provides the necessary keying material and parameters to communicate with other group members.</t>
      <t>While <xref target="RFC9594"/> defines the operations and interface available at the KDC, as well as general message formats for the interactions between Clients and the KDC, it delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of <xref target="RFC9594"/> that target a particular group communication approach and define how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members.</t>
      <t>This document specifies an application profile of <xref target="RFC9594"/>. Message exchanges among the participants as well as message formats and processing follow what is specified in <xref target="RFC9594"/>, and enable secure Pub-Sub communication where a group of Publishers and Subscribers securely communicate through a Broker using CoAP as per <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
      <t>In particular, this document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers at the Broker, as well as the provisioning of keying material and security parameters that Clients use for protecting end-to-end their communications via the Broker.</t>
      <t>In order to protect the Pub-Sub operations at the Broker as well as the provisioning of keying material and security parameters, this profile leverages protocol-specific transport profiles of ACE (e.g., <xref target="RFC9202"/><xref target="RFC9203"/>), in order to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token.</t>
      <t>The content of published messages that are circulated by the Broker is protected end-to-end between the corresponding Publisher and the intended Subscribers. To this end, this profile relies on COSE <xref target="RFC9052"/><xref target="RFC9053"/> and on keying material provided to the Publishers and Subscribers participating in the same Pub-Sub topic. In particular, source authentication of published topic data is achieved by means of the corresponding Publisher signing such content with its own private key.</t>
      <t><xref target="fig-document-relationships"/> overviews the relationships between this document and other related documents mentioned above.</t>
      <figure anchor="fig-document-relationships">
        <name>Overview of Document Relationships</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="576" viewBox="0 0 576 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
              <path d="M 8,128 L 8,176" fill="none" stroke="black"/>
              <path d="M 8,304 L 8,368" fill="none" stroke="black"/>
              <path d="M 8,464 L 8,576" fill="none" stroke="black"/>
              <path d="M 24,184 L 24,296" fill="none" stroke="black"/>
              <path d="M 24,376 L 24,456" fill="none" stroke="black"/>
              <path d="M 176,304 L 176,368" fill="none" stroke="black"/>
              <path d="M 192,32 L 192,80" fill="none" stroke="black"/>
              <path d="M 192,128 L 192,176" fill="none" stroke="black"/>
              <path d="M 264,240 L 264,368" fill="none" stroke="black"/>
              <path d="M 280,464 L 280,576" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,224" fill="none" stroke="black"/>
              <path d="M 304,384 L 304,544" fill="none" stroke="black"/>
              <path d="M 352,528 L 352,576" fill="none" stroke="black"/>
              <path d="M 424,528 L 424,576" fill="none" stroke="black"/>
              <path d="M 464,240 L 464,368" fill="none" stroke="black"/>
              <path d="M 568,304 L 568,560" fill="none" stroke="black"/>
              <path d="M 8,32 L 192,32" fill="none" stroke="black"/>
              <path d="M 200,64 L 304,64" fill="none" stroke="black"/>
              <path d="M 8,80 L 192,80" fill="none" stroke="black"/>
              <path d="M 8,128 L 192,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 192,176" fill="none" stroke="black"/>
              <path d="M 272,238 L 456,238" fill="none" stroke="black"/>
              <path d="M 272,242 L 456,242" fill="none" stroke="black"/>
              <path d="M 8,304 L 176,304" fill="none" stroke="black"/>
              <path d="M 472,304 L 568,304" fill="none" stroke="black"/>
              <path d="M 8,368 L 176,368" fill="none" stroke="black"/>
              <path d="M 272,366 L 456,366" fill="none" stroke="black"/>
              <path d="M 272,370 L 456,370" fill="none" stroke="black"/>
              <path d="M 8,464 L 280,464" fill="none" stroke="black"/>
              <path d="M 352,528 L 424,528" fill="none" stroke="black"/>
              <path d="M 288,544 L 304,544" fill="none" stroke="black"/>
              <path d="M 432,560 L 568,560" fill="none" stroke="black"/>
              <path d="M 8,576 L 280,576" fill="none" stroke="black"/>
              <path d="M 352,576 L 424,576" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="480,304 468,298.4 468,309.6" fill="black" transform="rotate(180,472,304)"/>
              <polygon class="arrowhead" points="312,384 300,378.4 300,389.6" fill="black" transform="rotate(270,304,384)"/>
              <polygon class="arrowhead" points="312,224 300,218.4 300,229.6" fill="black" transform="rotate(90,304,224)"/>
              <polygon class="arrowhead" points="32,456 20,450.4 20,461.6" fill="black" transform="rotate(90,24,456)"/>
              <polygon class="arrowhead" points="32,184 20,178.4 20,189.6" fill="black" transform="rotate(270,24,184)"/>
              <circle cx="264" cy="240" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="264" cy="368" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="464" cy="240" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="464" cy="368" r="6" class="opendot" fill="white" stroke="black"/>
              <g class="text">
                <text x="48" y="52">Pub-Sub</text>
                <text x="132" y="52">architecture</text>
                <text x="32" y="68">for</text>
                <text x="68" y="68">CoAP</text>
                <text x="104" y="68">(a)</text>
                <text x="372" y="100">Authorization,</text>
                <text x="484" y="100">provisioning</text>
                <text x="548" y="100">of</text>
                <text x="340" y="116">keying</text>
                <text x="404" y="116">material</text>
                <text x="456" y="116">and</text>
                <text x="508" y="116">security</text>
                <text x="360" y="132">parameters,</text>
                <text x="424" y="132">and</text>
                <text x="484" y="132">end-to-end</text>
                <text x="56" y="148">Transport</text>
                <text x="132" y="148">profiles</text>
                <text x="356" y="148">protection</text>
                <text x="412" y="148">of</text>
                <text x="464" y="148">published</text>
                <text x="528" y="148">topic</text>
                <text x="28" y="164">of</text>
                <text x="60" y="164">ACE,</text>
                <text x="104" y="164">e.g.,</text>
                <text x="156" y="164">(c)(d)</text>
                <text x="332" y="164">data</text>
                <text x="368" y="164">can</text>
                <text x="396" y="164">be</text>
                <text x="432" y="164">based</text>
                <text x="468" y="164">on</text>
                <text x="496" y="164">...</text>
                <text x="64" y="228">Details</text>
                <text x="120" y="228">about</text>
                <text x="180" y="228">security</text>
                <text x="48" y="244">and</text>
                <text x="92" y="244">secure</text>
                <text x="176" y="244">communication</text>
                <text x="56" y="260">among</text>
                <text x="96" y="260">ACE</text>
                <text x="164" y="260">participants</text>
                <text x="48" y="276">are</text>
                <text x="104" y="276">specified</text>
                <text x="156" y="276">in</text>
                <text x="184" y="276">...</text>
                <text x="288" y="276">&gt;&gt;&gt;</text>
                <text x="324" y="276">This</text>
                <text x="380" y="276">document</text>
                <text x="432" y="276">&lt;&lt;&lt;</text>
                <text x="32" y="324">ACE</text>
                <text x="88" y="324">framework</text>
                <text x="144" y="324">for</text>
                <text x="292" y="324">CoAP</text>
                <text x="384" y="324">publish-subscribe</text>
                <text x="76" y="340">authentication</text>
                <text x="152" y="340">and</text>
                <text x="304" y="340">profile</text>
                <text x="352" y="340">for</text>
                <text x="384" y="340">ACE</text>
                <text x="72" y="356">authorization</text>
                <text x="144" y="356">(b)</text>
                <text x="52" y="404">Used</text>
                <text x="84" y="404">to</text>
                <text x="120" y="404">build</text>
                <text x="160" y="404">...</text>
                <text x="352" y="404">Instanced</text>
                <text x="404" y="404">by</text>
                <text x="432" y="404">the</text>
                <text x="360" y="420">application</text>
                <text x="440" y="420">profile</text>
                <text x="344" y="436">defined</text>
                <text x="388" y="436">in</text>
                <text x="416" y="436">...</text>
                <text x="32" y="484">Key</text>
                <text x="100" y="484">provisioning</text>
                <text x="168" y="484">for</text>
                <text x="208" y="484">group</text>
                <text x="452" y="484">Used</text>
                <text x="484" y="484">to</text>
                <text x="528" y="484">protect</text>
                <text x="72" y="500">communication</text>
                <text x="152" y="500">using</text>
                <text x="192" y="500">ACE</text>
                <text x="224" y="500">(e)</text>
                <text x="472" y="500">published</text>
                <text x="536" y="500">topic</text>
                <text x="452" y="516">data</text>
                <text x="516" y="516">end-to-end</text>
                <text x="24" y="532">-</text>
                <text x="64" y="532">General</text>
                <text x="128" y="532">message</text>
                <text x="192" y="532">formats</text>
                <text x="444" y="532">in</text>
                <text x="472" y="532">...</text>
                <text x="24" y="548">-</text>
                <text x="76" y="548">Operations</text>
                <text x="136" y="548">and</text>
                <text x="192" y="548">interface</text>
                <text x="244" y="548">at</text>
                <text x="264" y="548">a</text>
                <text x="380" y="548">COSE</text>
                <text x="48" y="564">Key</text>
                <text x="116" y="564">Distribution</text>
                <text x="196" y="564">Center</text>
                <text x="248" y="564">(KDC)</text>
                <text x="388" y="564">(f)(g)</text>
                <text x="16" y="612">(a)</text>
                <text x="40" y="612">:</text>
                <text x="160" y="612">[I-D.ietf-core-coap-pubsub]</text>
                <text x="16" y="628">(b)</text>
                <text x="40" y="628">:</text>
                <text x="88" y="628">[RFC9200]</text>
                <text x="16" y="644">(c)</text>
                <text x="40" y="644">:</text>
                <text x="88" y="644">[RFC9202]</text>
                <text x="16" y="660">(d)</text>
                <text x="40" y="660">:</text>
                <text x="88" y="660">[RFC9203]</text>
                <text x="16" y="676">(e)</text>
                <text x="40" y="676">:</text>
                <text x="88" y="676">[RFC9594]</text>
                <text x="16" y="692">(f)</text>
                <text x="40" y="692">:</text>
                <text x="88" y="692">[RFC9052]</text>
                <text x="16" y="708">(g)</text>
                <text x="40" y="708">:</text>
                <text x="88" y="708">[RFC9053]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+----------------------+
| Pub-Sub architecture |
| for CoAP (a)         |-------------+
+----------------------+             |
                                     | Authorization, provisioning of
                                     | keying material and security
+----------------------+             | parameters, and end-to-end
| Transport profiles   |             | protection of published topic
| of ACE, e.g., (c)(d) |             | data can be based on ...
+----------------------+             |
  ^                                  |
  |                                  |
  | Details about security           v
  | and secure communication    o========================o
  | among ACE participants      |                        |
  | are specified in ...        | >>> This document <<<  |
  |                             |                        |
+--------------------+          |                        |<-----------+
| ACE framework for  |          | CoAP publish-subscribe |            |
| authentication and |          | profile for ACE        |            |
| authorization (b)  |          |                        |            |
+--------------------+          o========================o            |
  |                                  ^                                |
  | Used to build ...                | Instanced by the               |
  |                                  | application profile            |
  |                                  | defined in ...                 |
  v                                  |                                |
+---------------------------------+  |                                |
| Key provisioning for group      |  |                Used to protect |
| communication using ACE (e)     |  |                published topic |
|                                 |  |                data end-to-end |
| - General message formats       |  |     +--------+ in ...          |
| - Operations and interface at a |--+     | COSE   |                 |
|   Key Distribution Center (KDC) |        | (f)(g) |-----------------+
+---------------------------------+        +--------+

(a) : [I-D.ietf-core-coap-pubsub]
(b) : [RFC9200]
(c) : [RFC9202]
(d) : [RFC9203]
(e) : [RFC9594]
(f) : [RFC9052]
(g) : [RFC9053]
]]></artwork>
        </artset>
      </figure>
      <t>Note to RFC Editor: At the bottom of <xref target="fig-document-relationships"/>, "[I-D.ietf-core-coap-pubsub]" is the reference label that the present document is currently using for that referred document. Before publishing as an RFC, please replace that reference label with the one eventually used for the (RFC resulting from) the referred document. Then, please delete this note.</t>
      <!--While this profile focuses on the Pub-Sub architecture for CoAP, {{mqtt-pubsub}} of this document describes how this profile can be applicable to MQTT {{MQTT-OASIS-Standard-v5}}. Similar adaptations can also extend to further transport protocols and Pub-Sub architectures.-->

<section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>
            <t>The terms and concepts described in the ACE framework for Authentication and Authorization <xref target="RFC9200"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client, Resource Server (RS), and Authorization Server (AS).</t>
          </li>
          <li>
            <t>The Authorization Information Format (AIF) <xref target="RFC9237"/> used to express authorization information.</t>
          </li>
          <li>
            <t>The terms and concept related to the message formats and processing specified in <xref target="RFC9594"/>, for provisioning and renewing keying material in group communication scenarios. These include the abbreviations REQx and OPTx denoting the numbered mandatory-to-address and optional-to-address requirements, respectively.</t>
          </li>
          <li>
            <t>The terms and concepts described in CDDL <xref target="RFC8610"/>, CBOR <xref target="RFC8949"/>, and COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>The terms and concepts described in CoAP <xref target="RFC7252"/>. Note that the term "endpoint" is used here following its OAuth definition <xref target="RFC6749"/>, aimed at denoting resources such as <tt>/token</tt> and <tt>/introspect</tt> at the AS, and <tt>/authz-info</tt> at the RS. The CoAP definition, which is "[a]n entity participating in the CoAP protocol" <xref target="RFC7252"/>, is not used in this document.</t>
          </li>
          <li>
            <t>The terms and concepts of Pub-Sub group communication with CoAP, as described in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
        </ul>
        <t>A party interested in participating in group communication as well as already participating as a group member is interchangeably denoted as "Client", "Pub-Sub client", or "node".</t>
        <ul spacing="normal">
          <li>
            <t>Group: a set of nodes that share common keying material and security parameters to protect their communications with one another. That is, the term refers to a "security group".  </t>
            <t>
This is not to be confused with an "application group", which has relevance at the application level and whose members are in this case the Clients acting as Publishers and/or Subscribers for a topic.</t>
          </li>
        </ul>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>. Diagnostic notation comments are often used to provide a textual representation of the parameters' keys and values.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Application Profile Overview</name>
      <t>This document describes how to use <xref target="RFC9200"/> and <xref target="RFC9594"/> to perform authentication, authorization, and key distribution operations as overviewed in <xref section="2" sectionFormat="of" target="RFC9594"/>, where the considered group is the security group composed of the Pub-Sub clients that exchange end-to-end protected content through the Broker.</t>
      <t>Pub-Sub clients communicate within their application groups, each of which is mapped to a topic. Depending on the application, a topic may consist of one or more sub-topics, which in turn may have their own sub-topics and so on, thus forming a hierarchy. A security group <bcp14>SHOULD</bcp14> be associated with a single application group. However, the same application group <bcp14>MAY</bcp14> be associated with multiple security groups. Further details and considerations on the mapping between the two types of groups are out of the scope of this document.</t>
      <t>This profile considers the architecture shown in <xref target="archi"/>. A Client can act as a Publisher, or a Subscriber, or both, e.g., by publishing to some topics and subscribing to others. However, for the simplicity of presentation, this profile describes Publisher and Subscriber Clients separately.</t>
      <t>Both Publishers and Subscribers act as ACE Clients. The Broker acts as an ACE RS and corresponds to the Dispatcher in <xref target="RFC9594"/>. The Key Distribution Center (KDC) also acts as an ACE RS and builds on what is defined for the KDC in <xref target="RFC9594"/>. From a high-level point of view, the Clients interact with the KDC in order to join security groups, thereby obtaining the group keying material to protect end-to-end and verify the content published in the associated topics.</t>
      <figure anchor="archi">
        <name>Architecture for Pub-Sub with Authorization Server and Key Distribution Center</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="400" viewBox="0 0 400 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,240 L 8,320" fill="none" stroke="black"/>
              <path d="M 48,160 L 48,232" fill="none" stroke="black"/>
              <path d="M 80,192 L 80,232" fill="none" stroke="black"/>
              <path d="M 112,32 L 112,112" fill="none" stroke="black"/>
              <path d="M 112,240 L 112,320" fill="none" stroke="black"/>
              <path d="M 192,120 L 192,160" fill="none" stroke="black"/>
              <path d="M 240,32 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,32 L 272,112" fill="none" stroke="black"/>
              <path d="M 288,240 L 288,320" fill="none" stroke="black"/>
              <path d="M 336,120 L 336,192" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,112" fill="none" stroke="black"/>
              <path d="M 392,240 L 392,320" fill="none" stroke="black"/>
              <path d="M 112,32 L 240,32" fill="none" stroke="black"/>
              <path d="M 272,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 112,112 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 48,160 L 96,160" fill="none" stroke="black"/>
              <path d="M 144,160 L 192,160" fill="none" stroke="black"/>
              <path d="M 80,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 272,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 8,240 L 112,240" fill="none" stroke="black"/>
              <path d="M 288,240 L 392,240" fill="none" stroke="black"/>
              <path d="M 120,256 L 176,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 280,256" fill="none" stroke="black"/>
              <path d="M 120,288 L 176,288" fill="none" stroke="black"/>
              <path d="M 224,288 L 280,288" fill="none" stroke="black"/>
              <path d="M 8,320 L 112,320" fill="none" stroke="black"/>
              <path d="M 288,320 L 392,320" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="344,120 332,114.4 332,125.6" fill="black" transform="rotate(270,336,120)"/>
              <polygon class="arrowhead" points="288,288 276,282.4 276,293.6" fill="black" transform="rotate(0,280,288)"/>
              <polygon class="arrowhead" points="288,256 276,250.4 276,261.6" fill="black" transform="rotate(0,280,256)"/>
              <polygon class="arrowhead" points="200,120 188,114.4 188,125.6" fill="black" transform="rotate(270,192,120)"/>
              <polygon class="arrowhead" points="128,288 116,282.4 116,293.6" fill="black" transform="rotate(180,120,288)"/>
              <polygon class="arrowhead" points="128,256 116,250.4 116,261.6" fill="black" transform="rotate(180,120,256)"/>
              <polygon class="arrowhead" points="88,232 76,226.4 76,237.6" fill="black" transform="rotate(90,80,232)"/>
              <polygon class="arrowhead" points="56,232 44,226.4 44,237.6" fill="black" transform="rotate(90,48,232)"/>
              <g class="text">
                <text x="176" y="52">Authorization</text>
                <text x="328" y="52">Key</text>
                <text x="172" y="68">Server</text>
                <text x="332" y="68">Distribution</text>
                <text x="172" y="84">(AS)</text>
                <text x="332" y="84">Center</text>
                <text x="328" y="100">(KDC)</text>
                <text x="120" y="164">(A)</text>
                <text x="248" y="196">(B)</text>
                <text x="200" y="260">(O)</text>
                <text x="56" y="276">Pub-Sub</text>
                <text x="340" y="276">Broker</text>
                <text x="52" y="292">Client</text>
                <text x="200" y="292">(C)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
             +---------------+   +--------------+
             | Authorization |   |     Key      |
             |    Server     |   | Distribution |
             |     (AS)      |   |    Center    |
             |               |   |    (KDC)     |
             +---------------+   +--------------+
                       ^                 ^
                       |                 |
     +------ (A) ------+                 |
     |                                   |
     |   +------------------ (B) --------+
     |   |
     v   v
+------------+                     +------------+
|            |<------- (O) ------->|            |
|  Pub-Sub   |                     |   Broker   |
|  Client    |<------- (C) ------->|            |
|            |                     |            |
+------------+                     +------------+
]]></artwork>
        </artset>
      </figure>
      <t>Both Publishers and Subscribers <bcp14>MUST</bcp14> use the same protocol for interacting with the Broker and participating in Pub-Sub communications. When using the profile defined in this document, such a protocol <bcp14>MUST</bcp14> be CoAP <xref target="RFC7252"/>, which is used as described in <xref target="I-D.ietf-core-coap-pubsub"/> (REQ22). In particular, when using this application profile, the topic-data resource corresponding to a given topic is hosted precisely at the Broker associated with that topic. Setups where a topic-data resource is possibly hosted at different servers than the Broker are out of the scope of this application profile.<!--What is specified in this document can apply to other protocols for Pub-Sub communications such as MQTT {{MQTT-OASIS-Standard-v5}}, or to further transport protocols.-->
      </t>
      <t>All Publishers and Subscribers <bcp14>MUST</bcp14> use CoAP when communicating with the KDC.</t>
      <t>Furthermore, both Publishers and Subscribers <bcp14>MUST</bcp14> use the same transport profile of ACE (e.g., <xref target="RFC9202"/> for DTLS, or <xref target="RFC9203"/> for OSCORE) in their interaction with the Broker. In order to reduce the number of libraries that Clients have to support, it is <bcp14>RECOMMENDED</bcp14> that the same transport profile of ACE is used also for the interaction between the Clients and the KDC (REQ24).</t>
      <t>Except for the end-to-end protection of published topic data (see <xref target="oscon"/>), all communications between the involved entities (Clients, Broker, KDC, Authorization Server) <bcp14>MUST</bcp14> occur and be secured in accordance with the protocol-specific transport profile of ACE used.</t>
      <t>For each Client, the Client and the Broker <bcp14>MUST</bcp14> have a secure communication association, which they establish with the help of the AS and using a transport profile of ACE. This is shown by the interactions A and C in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the Broker, thus providing an evidence of the topics that it is authorised to participate in, and with which permissions.</t>
      <t>For each Client, the Client and the KDC <bcp14>MUST</bcp14> have a secure communication association, which they also establish with the help of the AS and using a transport profile of ACE (REQ24). This is shown by the interactions A and B in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the KDC, thus providing an evidence of the security groups that it can join, as associated with the topics of interest at the Broker. Based on the permissions specified in the access token, the Client can request the KDC to join a security group, after which the Client obtains from the KDC the keying material to use for communicating with the other group members. This builds on the process for joining security groups with ACE, as defined in <xref target="RFC9594"/> and further specified in this document.</t>
      <t>In addition, this profile allows an anonymous Client to perform some of the discovery operations defined in <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/> through the Broker, as shown by the interaction O in <xref target="archi"/>. That is, an anonymous Client can discover:</t>
      <ul spacing="normal">
        <li>
          <t>the Broker itself, by relying on the resource type "core.ps" (see <xref section="2.3.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>); and</t>
        </li>
        <li>
          <t>topics of interest at the Broker (i.e., the corresponding topic resources hosted at the Broker), by relying on the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        </li>
      </ul>
      <t>However, an anonymous Client is not allowed to access topic resources at the Broker and obtain from those any additional information or metadata about the corresponding topic (e.g., the topic status, the URI of the topic-data resource where to publish or subscribe for that topic, or the URI to the KDC).</t>
      <t>As highlighted in <xref target="associations"/>, each Client maintains two different security associations pertaining to the Pub-Sub group communication. On the one hand, the Client has a pairwise security association with the Broker, which, as an ACE RS, verifies that the Client is authorised to perform data operations (i.e., publish, subscribe, read, delete) on a certain set of topics (Security Association 1). As discussed above, this security association is set up with the help of the AS and using a transport profile of ACE, when the Client obtains the access token to upload to the Broker.</t>
      <t>On the other hand, separately for each topic, all the Publishers and Subscribers for that topic have a common, group security association, through which the published topic data sent through the Broker is protected end-to-end (Security Association 2). As discussed above, this security association is set up and maintained as the different Clients request the KDC to join the security group, upon which they obtain from the KDC the corresponding group keying material to use for protecting end-to-end and verifying the content of their Pub-Sub group communication.</t>
      <figure anchor="associations">
        <name>Security Associations between Publisher, Broker, and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="544" viewBox="0 0 544 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 40,120 L 40,208" fill="none" stroke="black"/>
              <path d="M 72,120 L 72,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,112" fill="none" stroke="black"/>
              <path d="M 248,120 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,120 L 288,160" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,32 L 432,112" fill="none" stroke="black"/>
              <path d="M 464,120 L 464,160" fill="none" stroke="black"/>
              <path d="M 504,120 L 504,208" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 432,32 L 536,32" fill="none" stroke="black"/>
              <path d="M 8,112 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,112 L 536,112" fill="none" stroke="black"/>
              <path d="M 72,160 L 112,160" fill="none" stroke="black"/>
              <path d="M 200,160 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 424,160 L 464,160" fill="none" stroke="black"/>
              <path d="M 40,208 L 224,208" fill="none" stroke="black"/>
              <path d="M 312,208 L 504,208" fill="none" stroke="black"/>
              <g class="text">
                <text x="56" y="68">Publisher</text>
                <text x="268" y="68">Broker</text>
                <text x="484" y="68">Subscriber</text>
                <text x="156" y="164">Security</text>
                <text x="380" y="164">Security</text>
                <text x="152" y="180">Association</text>
                <text x="208" y="180">1</text>
                <text x="376" y="180">Association</text>
                <text x="432" y="180">1</text>
                <text x="268" y="212">Security</text>
                <text x="264" y="228">Association</text>
                <text x="320" y="228">2</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +------------+             +------------+
|           |             |            |             |            |
| Publisher |             |   Broker   |             | Subscriber |
|           |             |            |             |            |
|           |             |            |             |            |
+-----------+             +------------+             +------------+
    |   |                     |    |                     |    |
    |   |                     |    |                     |    |
    |   '----- Security ------'    '------ Security -----'    |
    |        Association 1               Association 1        |
    |                                                         |
    '----------------------- Security ------------------------'
                           Association 2
]]></artwork>
        </artset>
      </figure>
      <t>In summary, this profile specifies the following functionalities.</t>
      <ol spacing="normal" type="1"><li>
          <t>A Client obtains the authorization to participate in a Pub-Sub topic at the Broker with certain permissions. This pertains to operations defined in <xref target="I-D.ietf-core-coap-pubsub"/> for taking part in Pub-Sub communication with CoAP.</t>
        </li>
        <li>
          <t>A Client obtains the authorization to join a security group with certain permissions. This allows the Client to obtain from the KDC the group keying material for communicating with other group members, i.e., to protect end-to-end and verify the content published at the Broker on topics associated with the security group.</t>
        </li>
        <li>
          <t>A Client obtains from the KDC the authentication credentials of other group members, and provides or updates the KDC with its own authentication credential.</t>
        </li>
        <li>
          <t>A Client leaves the group or is removed from the group by the KDC.</t>
        </li>
        <li>
          <t>The KDC renews and redistributes the group keying material (rekeying), e.g., due to a membership change in the group.</t>
        </li>
      </ol>
      <t><xref target="groupcomm_requirements"/> compiles the list of requirements for this application profile of ACE and how they are fulfilled, consistently with the list of requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
    </section>
    <section anchor="authorisation">
      <name>Getting Authorisation to Join a Pub-Sub security group</name>
      <t><xref target="message-flow"/> provides a high level overview of the message flow for a Client getting authorisation to join a group. Square brackets denote optional steps. The message flow is expanded in the subsequent sections.</t>
      <figure anchor="message-flow">
        <name>Authorisation Flow</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="576" width="576" viewBox="0 0 576 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 16,48 L 16,560" fill="none" stroke="black"/>
              <path d="M 456,48 L 456,152" fill="none" stroke="black"/>
              <path d="M 456,184 L 456,328" fill="none" stroke="black"/>
              <path d="M 456,360 L 456,392" fill="none" stroke="black"/>
              <path d="M 456,424 L 456,448" fill="none" stroke="black"/>
              <path d="M 456,488 L 456,560" fill="none" stroke="black"/>
              <path d="M 520,48 L 520,392" fill="none" stroke="black"/>
              <path d="M 520,424 L 520,456" fill="none" stroke="black"/>
              <path d="M 520,488 L 520,560" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,560" fill="none" stroke="black"/>
              <path d="M 32,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 440,64" fill="none" stroke="black"/>
              <path d="M 32,96 L 160,96" fill="none" stroke="black"/>
              <path d="M 312,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 32,112 L 168,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 440,112" fill="none" stroke="black"/>
              <path d="M 16,160 L 72,160" fill="none" stroke="black"/>
              <path d="M 416,160 L 512,160" fill="none" stroke="black"/>
              <path d="M 24,176 L 72,176" fill="none" stroke="black"/>
              <path d="M 424,176 L 520,176" fill="none" stroke="black"/>
              <path d="M 16,224 L 80,224" fill="none" stroke="black"/>
              <path d="M 384,224 L 448,224" fill="none" stroke="black"/>
              <path d="M 24,240 L 80,240" fill="none" stroke="black"/>
              <path d="M 384,240 L 448,240" fill="none" stroke="black"/>
              <path d="M 32,288 L 48,288" fill="none" stroke="black"/>
              <path d="M 416,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 16,336 L 88,336" fill="none" stroke="black"/>
              <path d="M 408,336 L 512,336" fill="none" stroke="black"/>
              <path d="M 24,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 520,352" fill="none" stroke="black"/>
              <path d="M 16,400 L 104,400" fill="none" stroke="black"/>
              <path d="M 408,400 L 552,400" fill="none" stroke="black"/>
              <path d="M 24,416 L 104,416" fill="none" stroke="black"/>
              <path d="M 408,416 L 552,416" fill="none" stroke="black"/>
              <path d="M 16,464 L 72,464" fill="none" stroke="black"/>
              <path d="M 480,464 L 552,464" fill="none" stroke="black"/>
              <path d="M 24,480 L 104,480" fill="none" stroke="black"/>
              <path d="M 432,480 L 560,480" fill="none" stroke="black"/>
              <path d="M 16,528 L 152,528" fill="none" stroke="black"/>
              <path d="M 304,528 L 448,528" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,464 548,458.4 548,469.6" fill="black" transform="rotate(0,552,464)"/>
              <polygon class="arrowhead" points="560,416 548,410.4 548,421.6" fill="black" transform="rotate(0,552,416)"/>
              <polygon class="arrowhead" points="560,400 548,394.4 548,405.6" fill="black" transform="rotate(0,552,400)"/>
              <polygon class="arrowhead" points="520,336 508,330.4 508,341.6" fill="black" transform="rotate(0,512,336)"/>
              <polygon class="arrowhead" points="520,160 508,154.4 508,165.6" fill="black" transform="rotate(0,512,160)"/>
              <polygon class="arrowhead" points="456,528 444,522.4 444,533.6" fill="black" transform="rotate(0,448,528)"/>
              <polygon class="arrowhead" points="456,240 444,234.4 444,245.6" fill="black" transform="rotate(0,448,240)"/>
              <polygon class="arrowhead" points="456,224 444,218.4 444,229.6" fill="black" transform="rotate(0,448,224)"/>
              <polygon class="arrowhead" points="448,288 436,282.4 436,293.6" fill="black" transform="rotate(0,440,288)"/>
              <polygon class="arrowhead" points="448,96 436,90.4 436,101.6" fill="black" transform="rotate(0,440,96)"/>
              <polygon class="arrowhead" points="448,64 436,58.4 436,69.6" fill="black" transform="rotate(0,440,64)"/>
              <polygon class="arrowhead" points="40,288 28,282.4 28,293.6" fill="black" transform="rotate(180,32,288)"/>
              <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
              <polygon class="arrowhead" points="40,64 28,58.4 28,69.6" fill="black" transform="rotate(180,32,64)"/>
              <polygon class="arrowhead" points="32,480 20,474.4 20,485.6" fill="black" transform="rotate(180,24,480)"/>
              <polygon class="arrowhead" points="32,416 20,410.4 20,421.6" fill="black" transform="rotate(180,24,416)"/>
              <polygon class="arrowhead" points="32,352 20,346.4 20,357.6" fill="black" transform="rotate(180,24,352)"/>
              <polygon class="arrowhead" points="32,240 20,234.4 20,245.6" fill="black" transform="rotate(180,24,240)"/>
              <polygon class="arrowhead" points="32,176 20,170.4 20,181.6" fill="black" transform="rotate(180,24,176)"/>
              <g class="text">
                <text x="28" y="36">Client</text>
                <text x="460" y="36">Broker</text>
                <text x="524" y="36">AS</text>
                <text x="560" y="36">KDC</text>
                <text x="24" y="68">[</text>
                <text x="160" y="68">Discovery</text>
                <text x="212" y="68">of</text>
                <text x="248" y="68">Topic</text>
                <text x="308" y="68">Resource</text>
                <text x="448" y="68">]</text>
                <text x="24" y="100">[</text>
                <text x="204" y="100">Resource</text>
                <text x="272" y="100">Request</text>
                <text x="448" y="100">]</text>
                <text x="24" y="116">[</text>
                <text x="188" y="116">AS</text>
                <text x="248" y="116">Information</text>
                <text x="448" y="116">]</text>
                <text x="136" y="164">Authorisation</text>
                <text x="224" y="164">Request</text>
                <text x="300" y="164">(Audience:</text>
                <text x="376" y="164">Broker)</text>
                <text x="136" y="180">Authorisation</text>
                <text x="228" y="180">Response</text>
                <text x="308" y="180">(Audience:</text>
                <text x="384" y="180">Broker)</text>
                <text x="116" y="228">Upload</text>
                <text x="156" y="228">of</text>
                <text x="224" y="228">authorisation</text>
                <text x="328" y="228">information</text>
                <text x="144" y="244">Establishment</text>
                <text x="212" y="244">of</text>
                <text x="252" y="244">secure</text>
                <text x="328" y="244">association</text>
                <text x="24" y="292">[</text>
                <text x="96" y="292">Discovery</text>
                <text x="148" y="292">of</text>
                <text x="176" y="292">KDC</text>
                <text x="208" y="292">and</text>
                <text x="244" y="292">name</text>
                <text x="276" y="292">of</text>
                <text x="324" y="292">security</text>
                <text x="384" y="292">group</text>
                <text x="448" y="292">]</text>
                <text x="152" y="340">Authorisation</text>
                <text x="240" y="340">Request</text>
                <text x="316" y="340">(Audience:</text>
                <text x="380" y="340">KDC)</text>
                <text x="152" y="356">Authorisation</text>
                <text x="244" y="356">Response</text>
                <text x="324" y="356">(Audience:</text>
                <text x="388" y="356">KDC)</text>
                <text x="140" y="404">Upload</text>
                <text x="180" y="404">of</text>
                <text x="248" y="404">authorisation</text>
                <text x="352" y="404">information</text>
                <text x="168" y="420">Establishment</text>
                <text x="236" y="420">of</text>
                <text x="276" y="420">secure</text>
                <text x="352" y="420">association</text>
                <text x="112" y="468">Request</text>
                <text x="156" y="468">to</text>
                <text x="188" y="468">join</text>
                <text x="224" y="468">the</text>
                <text x="276" y="468">security</text>
                <text x="336" y="468">group</text>
                <text x="376" y="468">for</text>
                <text x="408" y="468">the</text>
                <text x="448" y="468">topic</text>
                <text x="140" y="484">Keying</text>
                <text x="204" y="484">material</text>
                <text x="256" y="484">for</text>
                <text x="288" y="484">the</text>
                <text x="340" y="484">security</text>
                <text x="400" y="484">group</text>
                <text x="196" y="532">Resource</text>
                <text x="264" y="532">Request</text>
                <text x="176" y="548">(Publication/Subscription</text>
                <text x="292" y="548">to</text>
                <text x="320" y="548">the</text>
                <text x="364" y="548">topic)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Client                                                Broker    AS  KDC
 |                                                      |       |    |
 |[<---------- Discovery of Topic Resource ----------->]|       |    |
 |                                                      |       |    |
 |[----------------- Resource Request ---------------->]|       |    |
 |[<----------------- AS Information ------------------]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Authorisation Request (Audience: Broker) ------------>|    |
 |<------ Authorisation Response (Audience: Broker) ------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +-------- Upload of authorisation information -------->|       |    |
 |<------- Establishment of secure association -------->|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 |[<-- Discovery of KDC and name of security group --->]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +--------- Authorisation Request (Audience: KDC) ------------->|    |
 |<-------- Authorisation Response (Audience: KDC) -------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +----------- Upload of authorisation information ------------------>|
 |<---------- Establishment of secure association ------------------>|
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Request to join the security group for the topic --------->|
 |<---------- Keying material for the security group ----------------+
 |                                                      |       |    |
 |                                                      |       |    |
 +----------------- Resource Request ------------------>|       |    |
 |       (Publication/Subscription to the topic)        |       |    |
 |                                                      |       |    |
]]></artwork>
        </artset>
      </figure>
      <t>As shown in <xref target="message-flow"/>, after a Client obtains authorisation information for participating in a Pub-Sub topic with name TOPICNAME (see <xref target="auth-request"/> and <xref target="as-response"/>), the Client uploads that information to the Broker as per the specific transport profile of ACE used, e.g., <xref target="RFC9202"/> or <xref target="RFC9203"/>.</t>
      <t>Following that, the Client can perform the optional discovery of the KDC and security group name at the Broker, by accessing the topic resource corresponding to the topic in question (see <xref target="kdc-discovery"/>).</t>
      <t>In order to ensure that the Client can seamlessly access the right topic resource at the Broker, it is <bcp14>RECOMMENDED</bcp14> that a Broker implementing this application profile uses the path /ps/TOPICNAME to host the topic resource for the topic with name TOPICNAME. Alternatively, the Client might not know the right topic resource to target and thus would attempt to access different ones (e.g., based on the result of an early discovery of topic resources, see <xref target="topic-discovery"/>), until it finds the right one specifying TOPICNAME as value of the 'topic-name' parameter in the resource representation.</t>
      <t>Separately, after the Client obtains authorisation information for joining the security group at the KDC (see <xref target="auth-request"/> and <xref target="as-response"/>), the Client uploads that information to the KDC (see <xref target="token-post"/>). Following that, the Client can join the security group at the KDC and thus obtain the corresponding keying material (see <xref target="join"/>).</t>
      <t>Once the steps above have been completed, the Client can take part in the secure group communication for the topic TOPICNAME, e.g., by publishing data to the topic through a request targeting the topic-data resource at the Broker.</t>
      <t>Note that the overview in <xref target="message-flow"/> shows the specific sequence of steps where the Client: first associates with the Broker for participating in a topic; then discovers the KDC and the name of the security group through the Broker; and finally associates with the KDC, through which it joins the security group. However, if the Client is early aware about how to reach the KDC and about the name of the security group, the Client can instead: first associate with the KDC and join the security group, and then associate with the Broker for participating in the topic.</t>
      <t>Since <xref target="RFC9200"/> recommends the use of CoAP and CBOR, this document describes the exchanges assuming that CoAP and CBOR are used. However, using HTTP instead of CoAP is possible, by leveraging the corresponding parameters and methods. Analogously, JSON <xref target="RFC8259"/> can be used instead of CBOR, by relying on the conversion method specified in Sections <xref target="RFC8949" section="6.1" sectionFormat="bare"/> and <xref target="RFC8949" section="6.2" sectionFormat="bare"/> of <xref target="RFC8949"/>. In case JSON is used, the Content-Format of the message has to be specified accordingly. Exact definitions of these exchanges are out of scope for this document.</t>
      <section anchor="topic-discovery">
        <name>Topic Discovery at the Broker (Optional)</name>
        <t>The discovery of a topic at the Broker can be performed by discovering the corresponding topic resource hosted at the Broker. For example, the Client can send a lookup request to /.well-known/core at the Broker, specifying as lookup criterion the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        <t>Although the links to the topic resources are also specified in the representation of the collection resource at the Broker (see <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>), the Client is not supposed to access such a resource, as intended for administrative operations that are out of the scope of this document.</t>
      </section>
      <section anchor="AS-discovery">
        <name>AS Discovery at the Broker (Optional)</name>
        <t>Complementary to what is defined in <xref section="5.1" sectionFormat="of" target="RFC9200"/> for AS discovery, the Broker <bcp14>MAY</bcp14> send the address of the AS to the Client in the 'AS' parameter of the AS Request Creation Hints, as a response to an Unauthorised Resource Request (see <xref section="5.2" sectionFormat="of" target="RFC9200"/>). An example using the CBOR diagnostic notation and CoAP is given below.</t>
        <figure anchor="AS-info-ex">
          <name>AS Request Creation Hints Example</name>
          <artwork align="left"><![CDATA[
    4.01 Unauthorized
    Content-Format: 19 (application/ace+cbor)
    Payload:
    {
     / AS / 1 : "coaps://as.example.com/token"
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="kdc-discovery">
        <name>KDC Discovery at the Broker (Optional)</name>
        <t>Once a Client has obtained an access token from the AS and accordingly established a secure association with the Broker, the Client has the permission to access the topic resources at the Broker that pertain to the topics on which the Client is authorised to operate.</t>
        <t>In particular the Client is authorised to retrieve the representation of a topic resource, from which the Client can retrieve information related to the topic in question, as specified in <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>.</t>
        <t>This profile extends the set of CoAP Pub-Sub Parameters that is possible to specify within the representation of a topic resource, as originally defined in <xref section="3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>. In particular, this profile defines the following two parameters that the Broker can specify in a response to a request that targets a topic resource (see <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Note that, when these parameters are transported in their respective fields of the message payload, the Content-Format "application/core-pubsub+cbor" defined in <xref target="I-D.ietf-core-coap-pubsub"/> <bcp14>MUST</bcp14> be used.</t>
        <ul spacing="normal">
          <li>
            <t>'kdc_uri', with value the URI of the group-membership resource at the KDC, where Clients can send a request to join the security group associated with the topic in question. The URI is encoded as a CBOR text string. Clients will have to obtain an access token from the AS to upload to the KDC, before starting the process to join the security group at the KDC.</t>
          </li>
          <li>
            <t>'sec_gp', specifying the name of the security group associated with the topic in question, as a stable and invariant identifier. The name of the security group is encoded as a CBOR text string.</t>
          </li>
        </ul>
        <t>Furthermore, the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/> (REQ10), and can be used to describe group-membership resources at the KDC, e.g., by using a CoRE link-format document <xref target="RFC6690"/>. As an alternative to the discovery approach defined above and provided by the Broker, applications can use this common resource type to discover links to group-membership resources at the KDC for joining security groups associated with Pub-Sub topics.</t>
      </section>
      <section anchor="auth-request">
        <name>Authorisation Request/Response for the KDC and the Broker</name>
        <t>A Client sends two Authorisation Requests to the AS, targeting two different audiences, i.e., the Broker and the KDC.</t>
        <t>As to the former, the AS handles Authorisation Requests related to a topic for which the Client is allowed to perform topic data operations at the Broker, as corresponding to an application group.</t>
        <t>As to the latter, the AS handles Authorization Requests for security groups that the Client is allowed to join, in order to obtain the group keying material for protecting end-to-end and verifying the content of exchanged messages on the associated Pub-Sub topics.</t>
        <t>This section builds on <xref section="3" sectionFormat="of" target="RFC9594"/> and defines only additions or modifications to that specification.</t>
        <t>Both Authorisation Requests include the following fields (see <xref section="3.1" sectionFormat="of" target="RFC9594"/>):</t>
        <ul spacing="normal">
          <li>
            <t>'scope': Optional. If present, it specifies the following information, depending on the specifically targeted audience.  </t>
            <t>
If the audience is the Broker, the scope specifies the names of the topics that the Client wishes to access, together with the corresponding requested permissions.  </t>
            <t>
If the audience is the KDC, the scope specifies the names of the security groups that the Client wishes to join, together with the corresponding requested permissions.  </t>
            <t>
This parameter is encoded as a CBOR byte string, whose value is the binary encoding of a CBOR array. The format of the encoded scope <bcp14>MUST</bcp14> follow the data model AIF-PUBSUB-GROUPCOMM defined in <xref target="scope"/>.  </t>
            <t>
The textual format specified in <xref section="3.1" sectionFormat="of" target="RFC9594"/> is not used in this application profile (OPT1).</t>
          </li>
          <li>
            <t>'audience': Required identifier corresponding to either the Broker or the KDC.</t>
          </li>
        </ul>
        <t>Other additional parameters can be included if necessary, as defined in <xref target="RFC9200"/>.</t>
        <t>When using this profile, it is expected that a one-to-one mapping is enforced between the application group and the security group (see <xref target="overview"/>). If this is not the case, the correct access policies for both sets of scopes have to be available to the AS.</t>
        <section anchor="scope">
          <name>Format of Scope</name>
          <t>Building on <xref section="3.1" sectionFormat="of" target="RFC9594"/>, this section defines the exact format and encoding of scope used in this profile.</t>
          <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="RFC9237"/> (REQ1). With reference to the generic AIF model</t>
          <sourcecode type="cddl"><![CDATA[
      AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></sourcecode>
          <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
          <t>Furthermore, this document defines the new AIF data model AIF-PUBSUB-GROUPCOMM that this profile <bcp14>MUST</bcp14> use to format and encode scope entries.</t>
          <t>In particular, the following holds for each scope entry.</t>
          <t>The object identifier ("Toid") is specialized as a CBOR data item specifying the name of the group pertaining to the scope entry.</t>
          <t>The permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the permissions that the Client wishes to have in the group indicated by "Toid".</t>
          <t>More specifically, the following applies when, as defined in this document, a scope entry includes a set of permissions for user-related operations performed by a Pub-Sub Client.</t>
          <ul spacing="normal">
            <li>
              <t>The object identifier ("Toid") is a CBOR text string, specifying the name of one application group (topic) or of the corresponding security group to which the scope entry pertains.</t>
            </li>
            <li>
              <t>The permission set ("Tperm") is a CBOR unsigned integer, whose value R specifies the operations that the Client wishes to or has been authorised to perform on the resources at the Broker associated with the application group (topic) indicated by "Toid", or on the resources at the KDC associated with the security group indicated by "Toid" (REQ1). The value R is computed as follows.  </t>
              <ul spacing="normal">
                <li>
                  <t>Each operation (i.e., permission detail) in the permission set is converted into the corresponding numeric identifier X taken from the following set.      </t>
                  <ul spacing="normal">
                    <li>
                      <t>Admin (0): This operation is reserved for scope entries that express permissions for Administrators of Pub-Sub groups, which are not specified in this document.</t>
                    </li>
                    <li>
                      <t>AppGroup (1): This operation is indicated as wished/authorised when "Toid" specifies the name of an application group (topic), while it is indicated as not wished/authorised when Toid specifies the name of a security group.</t>
                    </li>
                    <li>
                      <t>Publish (2): This operation concerns the publication of data to the topic in question, performed by means of a PUT request sent by a Publisher Client to the corresponding topic-data resource at the Broker.</t>
                    </li>
                    <li>
                      <t>Read (3): This operation concerns both: i) the subscription at the topic-data resource for the topic in question at the Broker, performed by means of a GET request with the CoAP Observe Option set to 0 and sent by a Subscriber Client; and ii) the simple reading of the latest data published to the topic in question, performed by means of a simple GET request sent to the same topic-data resource.</t>
                    </li>
                    <li>
                      <t>Delete (4): This operation concerns the deletion of the topic-data resource for the topic in question at the Broker, performed by means of a DELETE request sent to that resource.          </t>
                      <t>
If a Client wishes to have authorised only the Delete operation on an application group, then the Client does not need to join the corresponding security group, hence it does not need to request an access token for interacting with the KDC.          </t>
                      <t>
If a Client wishes to have authorised the Delete operation on a security group, then the AS and the KDC ignore the wish for that operation when processing the scope entry in question.</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>The set of N numeric identifiers is converted into the single value R, by taking two to the power of each numeric identifier X_1, X_2, ..., X_N, and then computing the inclusive OR of the binary representations of all the power values.</t>
                </li>
              </ul>
              <t>
Since this application profile considers user-related operations, the "Admin" operation is indicated as not wished/authorised. That is, the scope entries <bcp14>MUST</bcp14> have the least significant bit of "Tperm" set to 0.</t>
            </li>
          </ul>
          <t>If the "Toid" of a scope entry in an access token specifies the name of an application group (i.e., the "AppGroup" operation is indicated as authorised), the Client has also the permission to retrieve the configuration of the application group (topic) whose name is indicated by "Toid", by sending a GET or FETCH request to the corresponding topic resource at the Broker.</t>
          <t>The specific interactions between the Client and the Broker are defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          <t>The following CDDL <xref target="RFC8610"/> notation defines a scope entry that uses the AIF-PUBSUB-GROUPCOMM data model and expresses a set of permissions.</t>
          <figure anchor="scope-aif">
            <name>Pub-Sub scope using the AIF format</name>
            <artwork type="cddl" align="center"><![CDATA[
   ;# include rfc9237

   AIF-PUBSUB-GROUPCOMM = AIF-Generic<pubsub-group, pubsub-perm>

   pubsub-group = tstr ; name of Pub-Sub topic or of
                       ; the associated security group

   pubsub-perm = uint .bits pubsub-perm-details

   pubsub-perm-details = &(
    Admin: 0,
    AppGroup: 1,
    Publish: 2,
    Read: 3,
    Delete: 4
   )

   scope_entry = [pubsub-group, pubsub-perm]
]]></artwork>
          </figure>
          <t>As per the guidelines in <xref target="RFC9237"/>, <xref target="aif"/> and <xref target="content_formats"/> register the specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format (REQ2).</t>
        </section>
      </section>
      <section anchor="as-response">
        <name>Authorization response</name>
        <t>The AS responds with an Authorization Response as defined in <xref section="5.8.2" sectionFormat="of" target="RFC9200"/> and <xref section="3.2" sectionFormat="of" target="RFC9594"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'expires_in' parameter.</t>
          </li>
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'scope' parameter, when the value included in the access token differs from the one specified by the Client in the Authorization Request.  In such a case, the second element of each scope entry specifies the set of operations that the Client is authorised for that scope entry, encoded as specified in <xref target="auth-request"/>.</t>
          </li>
        </ul>
        <t>Furthermore, the AS <bcp14>MAY</bcp14> use the extended format of scope defined in <xref section="7" sectionFormat="of" target="RFC9594"/> for the 'scope' claim of the access token. In such a case, the AS <bcp14>MUST</bcp14> use the CBOR tag with tag number TAG_NUMBER, associated with the CoAP Content-Format CF_ID for the media type "application/aif+cbor" registered in <xref target="content_formats"/> of this document (REQ28).</t>
        <t>Note to RFC Editor: In the previous paragraph, please replace "TAG_NUMBER" with the CBOR tag number computed as TN(ct) in <xref section="4.3" sectionFormat="of" target="RFC9277"/>, where ct is the ID assigned to the CoAP Content-Format registered in <xref target="content_formats"/> of this document.  Then, please replace "CF_ID" with the ID assigned to that CoAP Content-Format.  Finally, please delete this paragraph.</t>
        <t>This indicates that the binary encoded scope follows the scope semantics defined for this application profile in <xref target="scope"/> of this document.</t>
      </section>
      <section anchor="token-post">
        <name>Token Transfer to the KDC</name>
        <t>The Client transfers its access token to the KDC using one of the methods defined in the <xref section="3.3" sectionFormat="of" target="RFC9594"/>. This typically includes sending a POST request to the /authz-info endpoint. However, if the DTLS transport profile of ACE <xref target="RFC9202"/> is used and the Client uses a symmetric proof-of-possession (PoP) key in the DTLS handshake, the Client <bcp14>MAY</bcp14> provide the access token to the KDC in the "psk_identity" field of the DTLS ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, or in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>. In addition to that, the following applies.</t>
        <t>In the Token Transfer Response to the Publishers, i.e., the Clients whose scope of the access token includes the "Publish" permission for at least one scope entry, the KDC <bcp14>MUST</bcp14> include the parameter 'kdcchallenge' in the CBOR map. 'kdcchallenge' is a challenge N_S generated by the KDC. As to the N_S value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8 bytes long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Later when joining the group, the Publisher can use the 'kdcchallenge' challenge as part of proving possession of its private key (see <xref target="RFC9594"/>). If a Publisher provides the access token to the KDC through an /authz-info endpoint, the Client <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (REQ30).</t>
        <t>If 'sign_info' is included in the Token Transfer Request, the KDC <bcp14>SHOULD</bcp14> include the 'sign_info' parameter in the Token Transfer Response. Note that the joining node may have obtained such information by alternative means, e.g., the 'sign_info' may have been pre-configured (OPT3).</t>
        <t>The following applies for each element 'sign_info_entry'.</t>
        <ul spacing="normal">
          <li>
            <t>'sign_alg' <bcp14>MUST</bcp14> take its value from the "Value" column of one of the recommended algorithms in the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (REQ3).</t>
          </li>
          <li>
            <t>'sign_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg' under the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (REQ4).</t>
          </li>
          <li>
            <t>'sign_key_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (REQ5).</t>
          </li>
          <li>
            <t>'cred_fmt' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Acceptable values denote a format of authentication credential that <bcp14>MUST</bcp14> explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
Acceptable formats of authentication credentials include CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Future formats would be acceptable to use as long as they comply with the criteria defined above.</t>
          </li>
        </ul>
        <t>This application profile does not define additional parameters to be used in the exchange of Token Transfer Request and Response (OPT2).</t>
      </section>
    </section>
    <section anchor="kdc-interface">
      <name>Client Group Communication Interface at the KDC</name>
      <t>In order to enable secure group communication for the Pub-Sub Clients, the KDC provides the resources listed in <xref target="tab-kdc-resources"/>.</t>
      <t>The entry of each resource specifies the CoAP methods by means of which it is permitted to access that resource, for nodes with different roles in the group or as non-members. Except for accessing the /ace-group resource with the FETCH method (to retrieve security group names through their group identifiers) and the /ace-group/GROUPNAME resource with the POST method (to join the security group with name GROUPNAME), all other operations are permitted only to current members of the security group with name GROUPNAME (REQ11).</t>
      <t>The GROUPNAME segment of the URI path <bcp14>MUST</bcp14> match with the group name specified in the scope entry of the scope in the access token (i.e., 'gname' in <xref section="3.1" sectionFormat="of" target="RFC9594"/>) (REQ7). Therefore, a group name has to be consistent with the semantics of URI path segments (see <xref section="3.3" sectionFormat="of" target="RFC3986"/>).</t>
      <t>Each resource is marked as <bcp14>REQUIRED</bcp14> or <bcp14>OPTIONAL</bcp14> to be hosted at the KDC (REQ9).</t>
      <table align="center" anchor="tab-kdc-resources">
        <name>Resources at the KDC</name>
        <thead>
          <tr>
            <th align="left">KDC resource</th>
            <th align="left">Description</th>
            <th align="left">Operations</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">/ace-group</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains a set of group names, each corresponding to one of the specified group identifiers.</td>
            <td align="left">FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains symmetric group keying material associated with GROUPNAME.</td>
            <td align="left">GET, POST (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/creds</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the authentication credentials of all the Publishers of the group with name GROUPNAME.</td>
            <td align="left">GET, FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/num</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the current version number for the symmetric group keying material of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the group keying material for that group member NODENAME in GROUPNAME.</td>
            <td align="left">GET, DELETE (All Clients). POST (Publishers).</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME/cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the authentication credential for NODENAME in the group GROUPNAME.</td>
            <td align="left">POST (Publishers)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/kdc-cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14> if the group rekeying scheme used requires the use of a KDC authentication credential. Contains the authentication credential of the KDC for the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/policies</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Contains the group policies of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
        </tbody>
      </table>
      <t>The use of these resources follows what is defined in <xref target="RFC9594"/>, and only additions or modifications to that specification are defined in this document. With respect to <xref target="RFC9594"/>, this document does not define new operations for Clients interacting with the KDC (REQ12).</t>
      <t>Consistent with what is defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>, some error responses from the KDC can convey error-specific information according to the problem-details format specified in <xref target="RFC9290"/>. This application profile does not define additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error' (OPT5).</t>
      <section anchor="join">
        <name>Joining a Security Group</name>
        <t>This section describes the interactions between a Client and the KDC to join a security group. Source authentication of a message sent within the group is ensured by means of a digital signature embedded in the message. Subscribers must be able to retrieve Publishers' authentication credentials from a trusted repository, to verify source authentication of received messages. Hence, on joining a security group, a Publisher is expected to provide its own authentication credential to the KDC.</t>
        <t>On a successful join, the Clients receive from the KDC the symmetric COSE Key <xref target="RFC9052"/> that is used as the shared group key to protect the payload of a published topic data.</t>
        <t>The message exchange between the joining node and the KDC follows what is defined in <xref section="4.3.1.1" sectionFormat="of" target="RFC9594"/>, and only additions or modifications to that specification are defined in this document.</t>
        <figure anchor="join-flow">
          <name>Join Flow</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="320" viewBox="0 0 320 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,48 L 32,112" fill="none" stroke="black"/>
                <path d="M 304,48 L 304,112" fill="none" stroke="black"/>
                <path d="M 32,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 248,64 L 296,64" fill="none" stroke="black"/>
                <path d="M 40,96 L 72,96" fill="none" stroke="black"/>
                <path d="M 256,96 L 304,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="304,64 292,58.4 292,69.6" fill="black" transform="rotate(0,296,64)"/>
                <polygon class="arrowhead" points="48,96 36,90.4 36,101.6" fill="black" transform="rotate(180,40,96)"/>
                <g class="text">
                  <text x="28" y="36">Client</text>
                  <text x="304" y="36">KDC</text>
                  <text x="100" y="68">Join</text>
                  <text x="152" y="68">Request</text>
                  <text x="212" y="68">(CoAP)</text>
                  <text x="100" y="100">Join</text>
                  <text x="156" y="100">Response</text>
                  <text x="220" y="100">(CoAP)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   Client                              KDC
      |                                 |
      +----- Join Request (CoAP) ------>|
      |                                 |
      |<---- Join Response (CoAP) ------+
      |                                 |
]]></artwork>
          </artset>
        </figure>
        <section anchor="join-request">
          <name>Join Request</name>
          <t>After establishing a secure communication association with the KDC, the Client sends a Join Request to the KDC as described in <xref section="4.3" sectionFormat="of" target="RFC9594"/>. More specifically, the Client sends a POST request to the /ace-group/GROUPNAME endpoint, with Content-Format "application/ace-groupcomm+cbor". The payload contains the following information formatted as a CBOR map, which <bcp14>MUST</bcp14> be encoded as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'scope': It <bcp14>MUST</bcp14> be present and its value <bcp14>MUST</bcp14> indicate the group that the Client is attempting to join, i.e., the group name, and the permissions that the Client wishes to have in the group. This value corresponds to one scope entry, as defined in <xref target="scope"/>.</t>
            </li>
            <li>
              <t>'get_creds': It <bcp14>MAY</bcp14> be present if the Client wishes to join as a Subscriber and wants to retrieve the public keys of all the Publishers upon joining. Otherwise, this parameter <bcp14>MUST NOT</bcp14> be present. If the parameter is present, the parameter <bcp14>MUST</bcp14> encode the CBOR simple value <tt>null</tt> (0xf6). Note that the parameter 'role_filter' is not necessary, as the KDC returns the authentication credentials of Publishers by default.</t>
            </li>
            <li>
              <t>'client_cred': The use of this parameter is detailed in <xref target="client_cred"/>.</t>
            </li>
            <li>
              <t>'cnonce': It specifies a challenge N_C generated by the Client. As to the N_C value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8 bytes long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Join Requests include a new 'cnonce' at each join attempt.</t>
            </li>
            <li>
              <t>'client_cred_verify': The use of this parameter is detailed in <xref target="pop"/>.</t>
            </li>
          </ul>
          <t>As a Publisher Client has its own authentication credential to use in a group, it <bcp14>MUST</bcp14> support the 'client_cred' and 'client_cred_verify' parameters (REQ30).</t>
          <t>For this application profile, the 'creds_repo' parameter is not relevant, since the KDC always acts as repository of the Publishers' authentication credentials. Consequently, no encoding is defined for this parameter (OPT6).</t>
          <t>This application profile does not define the functionalities that are implemented at the resource possibly hosted by the Client at the URI indicated in the 'control_uri' parameter (OPT7), if included in the Join Request.</t>
          <section anchor="client_cred">
            <name>Client Credential in 'client_cred'</name>
            <t>One of the following cases can occur when a new Client attempts to join a security group.</t>
            <ul spacing="normal">
              <li>
                <t>The joining node is not a Publisher, i.e., it is not going to send data to the application group.  In this case, the joining node is not required to provide its own authentication credential to the KDC. In case the joining node still provides an authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>), the KDC silently ignores that parameter, as well as the related parameter 'client_cred_verify' if present.</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC has not previously acquired an authentication credential of the joining node. Then, the joining node <bcp14>MUST</bcp14> provide a compatible authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>).</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC already acquired the authentication credential of the joining node, either during a past group joining process or when establishing a secure communication association using asymmetric proof-of-possession keys.  </t>
                <t>
If the joining node's authentication credential as well as the included public key are compatible with the signature algorithm used in the security group and with possible associated parameters, then the authentication credential can be used in the group. In this case, the joining node <bcp14>MAY</bcp14> choose not to provide again its authentication credential to the KDC, in order to limit the size of the Join Request.  </t>
                <t>
If the joining node chooses to do so, then the following applies when composing the Join Request: the value of the 'client_cred' parameter specifies an empty authentication credential, i.e., its value is set to the empty CBOR byte string (0x40); the 'client_cred_verify' parameter is omitted. In case the 'client_cred' parameter specifies the empty CBOR byte string (0x40), the KDC silently ignores the 'client_cred_verify' parameter if present.</t>
              </li>
            </ul>
            <t>The joining node <bcp14>MUST</bcp14> provide the KDC with its own authentication credential again, if it has previously provided the KDC with multiple authentication credentials intended for different security groups.</t>
            <t>If the joining node provides its authentication credential, the KDC performs the consistency checks above and, in case of success, considers it as the authentication credential associated with the joining node in the group.</t>
          </section>
          <section anchor="pop">
            <name>Proof of Possession through 'client_cred_verify'</name>
            <t>The 'client_cred_verify' parameter contains the proof-of-possession (PoP) evidence and is computed by the joining node to prove the possession of its own private key. The PoP evidence is computed as defined below (REQ14).</t>
            <t>The joining node signs the scope, concatenated with N_S and further concatenated with N_C, by using the private key corresponding to the public key included in the authentication credential that is specified in the 'client_cred' parameter.</t>
            <t>The N_S may be either of the following:</t>
            <ul spacing="normal">
              <li>
                <t>The challenge received from the KDC in the 'kdcchallenge' parameter of the 2.01 (Created) response to the Token Transfer Request (see <xref target="token-post"/>).</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "psk_identity" field of the ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, then N_S is an exporter value computed as defined in <xref section="4" sectionFormat="of" target="RFC5705"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty context value (i.e., a context value of zero-length), 32 as length value in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.2 <xref target="RFC5246"/> was used instead of DTLS 1.2, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>, then N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty 'context_value' (i.e., a 'context_value' of zero length), 32 as 'key_length' in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.3 <xref target="RFC8446"/> was used instead of DTLS 1.3, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the Join Request is a retry in response to an error response from the KDC, which included a new 'kdcchallenge' parameter, then N_S <bcp14>MUST</bcp14> be the new value from this parameter.</t>
              </li>
            </ul>
            <t>It is up to applications or future specifications to define how N_S is computed in further alternative settings.</t>
          </section>
        </section>
        <section anchor="join-response">
          <name>Join Response</name>
          <t>Upon receiving the Join Request, the KDC processes it as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/> and returns a success or error response.</t>
          <t>If the joining node is not requesting to join the group exclusively as a Subscriber and the 'client_cred' parameter does not specify the empty CBOR byte string (0x40), the KDC verifies the signature in the 'client_cred_verify' parameter. As PoP input, the KDC uses the value of the 'scope' parameter from the Join Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string.</t>
          <t>As public key of the joining node, the KDC uses the one included in the authentication credential retrieved from the 'client_cred' parameter of the Join Request. The KDC verifies the signature used as PoP evidence by means of the public key of the joining node, according to the signature algorithm used in the group and possible corresponding parameters.</t>
          <t>Instead, if the joining node is not requesting to join the group exclusively as a Subscriber and the 'client_cred' parameter specifies the empty CBOR byte string (0x40), the KDC verifies that it is storing exactly one eligible authentication credential for the joining node (e.g., of the format accepted in the group).</t>
          <t>In case an error occurs when processing the Join Request, the KDC and the joining node follow what is defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>, complemented by what is defined in <xref target="join-error"/> of the present document.</t>
          <t>In case of success, the KDC responds with a Join Response, whose payload is formatted as a CBOR map and <bcp14>MUST</bcp14> contain the following fields as per <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'gkty': this field specifies the key type "Group_PubSub_Keying_Material" (REQ18) registered in <xref target="iana-ace-groupcomm-key"/> for the 'key' parameter.</t>
            </li>
            <li>
              <t>'key': this field specifies the keying material to use for secure communication in the group (REQ17). This field has as value a CBOR map that includes the following parameters.  </t>
              <ul spacing="normal">
                <li>
                  <t>'group_key': this parameter is identified by the CBOR unsigned integer 0 used as map key. Its value is a COSE_Key object as defined in <xref target="RFC9052"/> and conveying the group key to use in the security group.      </t>
                  <t>
The COSE_Key object <bcp14>MUST</bcp14> contain the following parameters:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'kty', with value 4 (Symmetric).</t>
                    </li>
                    <li>
                      <t>'alg', with value the identifier of the AEAD algorithm used in the security group. The value is taken from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'Base IV', with value the Base Initialization Vector (Base IV) to use in the security group with this group key.</t>
                    </li>
                    <li>
                      <t>'k', with value the symmetric encryption key to use as group key.</t>
                    </li>
                    <li>
                      <t>'kid', with value the identifier of the COSE_Key object, hence of the group key.          </t>
                      <t>
This value is used as Group Identifier (Gid) of the security group, as long as the present key is used as group key in the security group. Consistent with the CBOR type of the 'kid' parameter, the Gid of the security group is encoded as a CBOR byte string (REQ13).</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>'group_SenderId': this parameter is identified by the CBOR unsigned integer 1 used as map key. Its value is the Client's Sender ID encoded as a CBOR byte string. This parameter <bcp14>MUST</bcp14> be included if the Client is joining the security group as a Publisher and <bcp14>MUST NOT</bcp14> be included otherwise. A Publisher Client <bcp14>MUST</bcp14> support the 'group_SenderId' parameter (REQ29).      </t>
                  <t>
The Sender ID <bcp14>MUST</bcp14> be unique within the security group. The KDC <bcp14>MUST</bcp14> only assign an available Sender ID that has not been used in the security group since the last time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>). The KDC <bcp14>MUST NOT</bcp14> assign a Sender ID to the joining node if the node is not joining the group as a Publisher.      </t>
                  <t>
The Sender ID can be short in length. Its maximum length in bytes is the length in bytes of the AEAD nonce for the AEAD algorithm, minus 6. This means that, when using AES-CCM-16-64-128 as AEAD algorithm in the security group, the maximum length of Sender IDs is 7 bytes.</t>
                </li>
                <li>
                  <t>'cred_fmt': this parameter is identified by the CBOR unsigned integer 2 used as map key. Its value specifies the format of authentication credentials used in the group and is taken from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/>.      </t>
                  <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future and would be acceptable to use as long as they comply with the criteria defined above (REQ6).</t>
                </li>
                <li>
                  <t>'sign_alg': this parameter is identified by the CBOR unsigned integer 3 used as map key. Its value specifies the Signature Algorithm used to sign messages in the group and is taken from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</t>
                </li>
                <li>
                  <t>'sign_params': this parameter is identified by the CBOR unsigned integer 4 used as map key. Its value specifies the parameters of the Signature Algorithm and is encoded as a CBOR array including the following two elements:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'sign_alg_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'sign_key_type_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>'num', specifying the version number of the keying material specified in the 'key' field. The initial value of the version number <bcp14>MUST</bcp14> be set to 0 upon creating the group (REQ16).</t>
            </li>
            <li>
              <t>'exi', which <bcp14>MUST</bcp14> be present.</t>
            </li>
            <li>
              <t>'ace_groupcomm_profile', which <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD), which is registered in <xref target="iana-profile"/> (REQ19).</t>
            </li>
            <li>
              <t>'creds', which <bcp14>MUST</bcp14> be present if the 'get_creds' parameter was present in the Join Request and <bcp14>MUST NOT</bcp14> be present otherwise. It specifies the authentication credentials of all the Publishers in the security group.</t>
            </li>
            <li>
              <t>'peer_roles', which <bcp14>MAY</bcp14> be omitted even if 'creds' is present, since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'peer_identifiers', which <bcp14>MUST</bcp14> be present if 'creds' is also present and <bcp14>MUST NOT</bcp14> be present otherwise. The identifiers are the Publisher Sender IDs, whose corresponding authentication credentials are specified in the 'creds' parameter (REQ25).</t>
            </li>
            <li>
              <t>'kdc_cred', which <bcp14>MUST</bcp14> be present if the group rekeying scheme used requires the use of a KDC authentication credential. It is encoded as a CBOR byte string, with value the original binary representation of the KDC's authentication credential (REQ8).</t>
            </li>
            <li>
              <t>'kdc_nonce', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string, with value a nonce N_KDC generated by the KDC. As to the N_KDC value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8 bytes long and it is <bcp14>RECOMMENDED</bcp14> to be a random value.</t>
            </li>
            <li>
              <t>'kdc_cred_verify', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string, with value the PoP evidence that the KDC computes to prove the possession of its own private key. The KDC <bcp14>MUST</bcp14> compute the specified PoP evidence as a signature by using the signature algorithm used in the group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter (REQ21).</t>
            </li>
            <li>
              <t>'group_rekeying', which <bcp14>MAY</bcp14> be omitted if the KDC uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/> as the default rekeying scheme in the group (OPT9). In any other case, the 'group_rekeying' parameter <bcp14>MUST</bcp14> be included.</t>
            </li>
          </ul>
          <t>The 'group_policies' parameter is not expected to be included in the Join Response (REQ20). This application profile does not define the functionalities that are possibly implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter (OPT10), if included in the Join Response.</t>
          <t>After sending a successful Join Response, the KDC adds the Client to the list of current members of the security group, if that Client is not already a group member. Also, the Client is assigned a name NODENAME and a sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC. Furthermore, the KDC associates NODENAME with the Client's access token and with the secure communication association that the KDC has with the Client.</t>
          <t>If the Client is a Publisher, its authentication credential used in the group is either: the one retrieved from the 'client_cred' parameter of the Join Request, if the parameter did not specify the empty CBOR byte string (0x40); or, otherwise, the one that the KDC acquired from previous interactions with the joining node and is currently storing. The KDC associates the Client's authentication credential with the tuple containing NODENAME, GROUPNAME, the current Gid, the newly assigned Publisher's Sender ID, and the Client's access token. The KDC <bcp14>MUST</bcp14> keep this association updated over time.</t>
          <t>Note that, as long as the secure communication association between the Client and the KDC persists, the same Client re-joining the group is recognized by the KDC by virtue of such a secure communication association. As a consequence, the re-joining Client keeps the same NODENAME and the associated subresource /ace-group/GROUPNAME/nodes/NODENAME. Also, if the Client is a Publisher, it receives a new Sender ID according to the same criteria defined above.</t>
          <t>If the application requires backward security, the KDC <bcp14>MUST</bcp14> generate updated security parameters and group keying material, and provide it to the current group members upon the new node's joining (see <xref target="rekeying"/>). In such a case, the joining node is not able to access secure communication in the Pub-Sub group prior to its joining.</t>
          <t>Upon receiving the Join Response, the joining node retrieves the KDC's authentication credential from the 'kdc_cred' parameter (if present). The joining node <bcp14>MUST</bcp14> verify the signature used as PoP evidence, which is specified by the 'kdc_cred_verify' parameter of the Join Response (REQ21).</t>
        </section>
        <section anchor="join-error">
          <name>Join Error Handling</name>
          <t>The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response (OPT4) to the Join Request in the following cases:</t>
          <ul spacing="normal">
            <li>
              <t>The joining node is not requesting to join the group exclusively as a Subscriber and the 'client_cred' parameter is not present in the Join Request.</t>
            </li>
            <li>
              <t>The joining node is not requesting to join the group exclusively as a Subscriber, the 'client_cred' parameter does not specify the empty CBOR byte string (0x40), and any of the following conditions holds:  </t>
              <ul spacing="normal">
                <li>
                  <t>The value of the 'client_cred' parameter is not an eligible authentication credential (e.g., it is not of the format accepted in the group) (OPT8).</t>
                </li>
                <li>
                  <t>The 'client_cred_verify' parameter is not present in the Join Request.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The joining node is not requesting to join the group exclusively as a Subscriber, the 'client_cred' parameter specifies the empty CBOR byte string (0x40), and any of the following conditions holds:  </t>
              <ul spacing="normal">
                <li>
                  <t>The KDC does not store an eligible authentication credential for the joining node (e.g., of the format accepted in the group).</t>
                </li>
                <li>
                  <t>The KDC stores multiple eligible authentication credentials for the joining node (e.g., of the format accepted in the group).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The 'scope' parameter is not present in the Join Request, or it is present and specifies any set of permissions not included in the list defined in <xref target="scope"/>.</t>
            </li>
          </ul>
          <t>A 4.00 (Bad Request) error response from the KDC to the joining node <bcp14>MAY</bcp14> have content format "application/ace-groupcomm+cbor" and contain a CBOR map as payload.</t>
          <t>The CBOR map <bcp14>MAY</bcp14> include the 'kdcchallenge' parameter. If present, this parameter is a CBOR byte string, with value a newly generated 'kdcchallenge' value that the Client can use when preparing a new Join Request. In such a case, the KDC <bcp14>MUST</bcp14> store the newly generated value as the 'kdcchallenge' value associated with the joining node, which replaces the currently stored value (if any).</t>
          <t>Upon receiving the Join Response, if 'kdc_cred' is present but the Client cannot verify the PoP evidence, the Client <bcp14>MUST</bcp14> stop processing the Join Response and <bcp14>MAY</bcp14> send a new Join Request to the KDC.</t>
          <t>The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response to a Client that sends a Join Request to join the security group as Publisher, in case there are currently no Sender IDs available to assign. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
        </section>
      </section>
      <section anchor="other-group-operations-through-the-kdc">
        <name>Other Group Operations through the KDC</name>
        <section anchor="query">
          <name>Obtaining Latest Information on the Group, Group Keying Material, and Sender ID</name>
          <t>A Client can access the following resources at the KDC, in order to retrieve latest information about the group or the group keying material.</t>
          <ul spacing="normal">
            <li>
              <t>'/ace-group': All Clients can send a FETCH request to retrieve a set of group names associated with their group identifiers specified in the request payload. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group (see <xref target="join-response"/>) for which the group name and the URI to the group-membership resource are provided in the returned response.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME':  All group member Clients can send a GET request to retrieve the symmetric group keying material of the group with the name GROUPNAME.  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
                <li>
                  <t>The 'ace_groupcomm_profile' field <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD).</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the requesting group member retrieves the updated security parameters and group keying material. If they differ from the currently stored ones, then the group member uses the received ones thereafter for the security processing of published topic data, i.e., for encryption operations when acting as Publisher and for decryption operations when acting as Subscriber.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/creds': The KDC acts as a repository of authentication credentials for the Publishers that are member of the security group with name GROUPNAME. The members of the group that are Subscribers can send GET/FETCH requests to this resource in order to retrieve the authentication credentials of all or a subset of the group members that are Publishers. The KDC silently ignores the Sender IDs included in the 'get_creds' parameter of the request that are not associated with any current Publisher group member (REQ26).  </t>
              <t>
The response from the KDC <bcp14>MAY</bcp14> omit the parameter 'peer_roles', since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/num': All group member Clients can send a GET request to this resource in order to retrieve the current version number for the symmetric group keying material of the group with name GROUPNAME.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/kdc-cred': All group member Clients can send a GET request to this resource in order to retrieve the current authentication credential of the KDC.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/nodes/NODENAME': A group member can send a Key Distribution Request to the KDC by sending a GET request to this resource to retrieve the latest group keying material as well as its Sender ID that it has in the group (if Publisher).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document. If the requesting group member is not a Publisher Client, then the 'key' field does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material, and Sender ID (if the 'key' field includes the 'group_SenderId' parameter). If they differ from the currently stored ones, then the group member uses the received ones thereafter for the security processing of published topic data, i.e., for encryption operations when acting as Publisher and for decryption operations when acting as Subscriber.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-key-renewal-request">
          <name>Requesting a New Sender ID</name>
          <t>A Publisher group member with node name NODENAME may at some point exhaust its Sender Sequence Numbers used for protecting its published topic data (see <xref target="oscon"/>).</t>
          <t>When this happens, the Publisher <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC, as per <xref section="4.8.2.1" sectionFormat="of" target="RFC9594"/>. That is, it sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the KDC.</t>
          <t>Upon receiving the Key Renewal Request, the KDC processes it as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>, with the addition that the KDC takes one of the following actions.</t>
          <ul spacing="normal">
            <li>
              <t>The KDC rekeys the group. That is, the KDC generates new group keying material for that group (see <xref target="rekeying"/>) and replies to the Publisher with a group rekeying message as defined in <xref target="rekeying"/>, providing the new group keying material. Then, the KDC rekeys the rest of the group, as discussed in <xref target="rekeying"/>.  </t>
              <t>
The KDC <bcp14>SHOULD</bcp14> perform a group rekeying if one is already scheduled to occur within a time frame that is acceptably short, as per application-specific policies at the KDC. For instance, a group rekeying could be already upcoming in accordance with an application-specific rekeying period or scheduling, or as a reaction to a recent change in the group membership. If a group rekeying is not already scheduled to occur within an acceptably short time frame, the KDC <bcp14>SHOULD NOT</bcp14> rekey the group when receiving a Key Renewal Request (OPT12).</t>
            </li>
            <li>
              <t>The KDC determines and assigns a new Sender ID for the Publisher (REQ27), and it replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>. The CBOR Map in the response payload includes only the parameter 'group_SenderId' registered in <xref section="16.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>, which specifies the new Sender ID of the Publisher encoded as a CBOR byte string (REQ27).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> assign a new Sender ID that has not been used in the group since the latest time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response in case there are currently no Sender IDs available to assign in the group. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
            </li>
          </ul>
        </section>
        <section anchor="updating-authentication-credentials">
          <name>Updating Authentication Credentials</name>
          <t>A Publisher group member with node name NODENAME can contact the KDC to upload a new authentication credential to use in the security group with name GROUPNAME, and replace the currently stored one.</t>
          <t>To this end, the Publisher sends a CoAP POST request to its associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME/cred at the KDC (see <xref section="4.9.1" sectionFormat="of" target="RFC9594"/>).</t>
          <t>Following a successful processing of the request, the KDC replaces the stored authentication credential of this Client for the group GROUPNAME with the one specified in the request.</t>
          <t>This application profile does not specify a method for the group member to provide other group members with the identifier of its new authentication credential (OPT13).</t>
        </section>
        <section anchor="sec-group-leaving">
          <name>Leaving a Group</name>
          <t>A group member with node name NODENAME can actively request to leave the security group with name GROUPNAME.</t>
          <t>To this end, the Client sends a CoAP DELETE request to the associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC (see <xref section="4.8.3" sectionFormat="of" target="RFC9594"/>).</t>
          <t>The KDC can also remove a group member due to any of the reasons described in <xref section="5" sectionFormat="of" target="RFC9594"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="rekeying">
      <name>Group Rekeying Process</name>
      <t>Rekeying a group consists in the KDC generating and distributing a new symmetric key, which is used as group key from then on to protect the publication of topic data with COSE (see <xref target="oscon"/>).</t>
      <t>The KDC <bcp14>MUST</bcp14> perform a group rekeying as described in <xref section="6" sectionFormat="of" target="RFC9594"/>. Reasons that can trigger a group rekeying include a change in the group membership, or the current group keying material approaching its expiration time. In addition, the KDC <bcp14>MAY</bcp14> rekey the group for other reasons, e.g., according to an application-specific rekeying period or scheduling.</t>
      <t>Upon generating the new group key and before starting its distribution:</t>
      <ul spacing="normal">
        <li>
          <t>The KDC <bcp14>MUST</bcp14> increment the version number of the group keying material.</t>
        </li>
        <li>
          <t>The KDC <bcp14>MUST</bcp14> generate a new Group Identifier (Gid) for the group. This is used as the identifier of the new group key, when providing it to the current group members through the group rekeying and to Clients (re-)joining the security group thereafter (see <xref target="join-response"/>).  </t>
          <t>
That is, the value of the new Gid is specified by the 'kid' parameter of the COSE_Key Object that is used to encode the new group key.</t>
        </li>
      </ul>
      <t>When rekeying the group, the KDC <bcp14>MUST</bcp14> preserve the current value of the Sender ID of each member in that group.</t>
      <t>The default rekeying scheme is "Point-to-Point" (see <xref section="6.1" sectionFormat="of" target="RFC9594"/>), according to which the KDC individually targets each node to rekey, using the pairwise secure communication association with that node.</t>
      <t>In particular, a group rekeying message <bcp14>MUST</bcp14> have Content-Format set to "application/ace-groupcomm+cbor" and have the same format used for the Join Response message defined in <xref target="join-response"/>, with the following differences:</t>
      <ul spacing="normal">
        <li>
          <t>Within the 'key' field, only the parameter 'group_key' is present.</t>
        </li>
        <li>
          <t>The fields 'kdc_cred' ,'kdc_nonce', 'kdc_cred_verify', and 'group_rekeying' are not present.</t>
        </li>
        <li>
          <t>The fields 'creds' and 'peer_identifiers' <bcp14>SHOULD</bcp14> be present, if the group rekeying is performed due to one or multiple Clients joining the group as Publishers. Following the same semantics used in the Join Response message, the two parameters specify the authentication credentials and Sender IDs of such Clients. Like in the Join Response message, the 'peer_roles' parameter <bcp14>MAY</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>This application profile does not define additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (OPT14).</t>
    </section>
    <section anchor="protected_communication">
      <name>Pub-Sub Protected Communication</name>
      <t>In the diagram shown in <xref target="pubsub-3"/>, (D) corresponds to the publication on a topic at the Broker, by using a CoAP PUT request. The Publisher protects the published topic data end-to-end for the Subscribers by using COSE (<xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>), as detailed in <xref target="oscon"/>.</t>
      <t>In the same diagram, (E) corresponds to the subscription of a Subscriber to the same topic, by means of a CoAP GET request with the Observe option set to 0 (register) <xref target="RFC7641"/>, as per <xref target="I-D.ietf-core-coap-pubsub"/>. Finally, (F) corresponds to the Observe notification response from the Broker to the Subscriber, where the published topic data is conveyed as originally protected end-to-end with COSE by the Publisher.</t>
      <figure anchor="pubsub-3">
        <name>Secure Pub-Sub Communication between Publisher and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="520" viewBox="0 0 520 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,160" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,160" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,160" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 288,32" fill="none" stroke="black"/>
              <path d="M 408,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 120,64 L 136,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
              <path d="M 304,96 L 328,96" fill="none" stroke="black"/>
              <path d="M 376,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,160 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,160 L 512,160" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,128 388,122.4 388,133.6" fill="black" transform="rotate(0,392,128)"/>
              <polygon class="arrowhead" points="312,96 300,90.4 300,101.6" fill="black" transform="rotate(180,304,96)"/>
              <polygon class="arrowhead" points="208,64 196,58.4 196,69.6" fill="black" transform="rotate(0,200,64)"/>
              <g class="text">
                <text x="160" y="68">(D)</text>
                <text x="56" y="100">Publisher</text>
                <text x="252" y="100">Broker</text>
                <text x="352" y="100">(E)</text>
                <text x="460" y="100">Subscriber</text>
                <text x="352" y="132">(F)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +--------+              +------------+
|           |             |        |              |            |
|           | --- (D) --> |        |              |            |
|           |             |        |              |            |
| Publisher |             | Broker | <--- (E) --- | Subscriber |
|           |             |        |              |            |
|           |             |        | ---- (F) --> |            |
|           |             |        |              |            |
+-----------+             +--------+              +------------+
]]></artwork>
        </artset>
      </figure>
      <t><xref target="flow"/> provides a more detailed example of such a secure Pub-Sub communication. All the messages exchanged between a Client and the Broker are protected with the secure communication association between that Client and the Broker. In addition, COSE is used to protect end-to-end the published topic data, which is conveyed in a PUT request from the Publisher to the topic-data resource at the Broker and in a 2.05 (Content) response from that resource to a Subscriber.</t>
      <t>The example also shows a delete operation, where the Publisher deletes the topic-data resource by sending a CoAP DELETE request to the URI of that resource. In case of success, the Broker replies with a 2.02 (Deleted) response. Consequently, the Broker also unsubscribes all the Clients subscribed to that topic-data resource, by removing them from the list of observers and sending them a final 4.04 (Not Found) error response as per <xref section="3.2" sectionFormat="of" target="RFC7641"/>.</t>
      <figure anchor="flow">
        <name>Example of Secure Pub-Sub Communication using CoAP</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="568" viewBox="0 0 568 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,48 L 8,304" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,304" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,304" fill="none" stroke="black"/>
              <path d="M 8,64 L 40,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 288,64" fill="none" stroke="black"/>
              <path d="M 16,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 296,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 320,128" fill="none" stroke="black"/>
              <path d="M 544,128 L 560,128" fill="none" stroke="black"/>
              <path d="M 296,176 L 344,176" fill="none" stroke="black"/>
              <path d="M 464,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 8,224 L 24,224" fill="none" stroke="black"/>
              <path d="M 272,224 L 288,224" fill="none" stroke="black"/>
              <path d="M 16,256 L 48,256" fill="none" stroke="black"/>
              <path d="M 168,256 L 296,256" fill="none" stroke="black"/>
              <path d="M 296,288 L 344,288" fill="none" stroke="black"/>
              <path d="M 480,288 L 552,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,288 548,282.4 548,293.6" fill="black" transform="rotate(0,552,288)"/>
              <polygon class="arrowhead" points="560,176 548,170.4 548,181.6" fill="black" transform="rotate(0,552,176)"/>
              <polygon class="arrowhead" points="312,128 300,122.4 300,133.6" fill="black" transform="rotate(180,304,128)"/>
              <polygon class="arrowhead" points="296,224 284,218.4 284,229.6" fill="black" transform="rotate(0,288,224)"/>
              <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
              <polygon class="arrowhead" points="24,256 12,250.4 12,261.6" fill="black" transform="rotate(180,16,256)"/>
              <polygon class="arrowhead" points="24,96 12,90.4 12,101.6" fill="black" transform="rotate(180,16,96)"/>
              <g class="text">
                <text x="40" y="36">Publisher</text>
                <text x="300" y="36">Broker</text>
                <text x="524" y="36">Subscriber</text>
                <text x="68" y="68">0.03</text>
                <text x="104" y="68">PUT</text>
                <text x="184" y="68">ps/data/1bd0d6d</text>
                <text x="92" y="100">2.01</text>
                <text x="144" y="100">Created</text>
                <text x="348" y="132">0.01</text>
                <text x="384" y="132">GET</text>
                <text x="468" y="132">/ps/data/1bd0d6d</text>
                <text x="368" y="148">Observe:0</text>
                <text x="372" y="180">2.05</text>
                <text x="424" y="180">Content</text>
                <text x="388" y="196">Observe:</text>
                <text x="448" y="196">10001</text>
                <text x="52" y="228">0.04</text>
                <text x="100" y="228">DELETE</text>
                <text x="196" y="228">/ps/data/1bd0d6d</text>
                <text x="76" y="260">2.02</text>
                <text x="128" y="260">Deleted</text>
                <text x="372" y="292">4.04</text>
                <text x="408" y="292">Not</text>
                <text x="448" y="292">Found</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Publisher                         Broker                    Subscriber
|                                   |                                |
+---- 0.03 PUT ps/data/1bd0d6d ---->|                                |
|                                   |                                |
|<------ 2.01 Created --------------+                                |
|                                   |                                |
|                                   |<-- 0.01 GET /ps/data/1bd0d6d --+
|                                   |    Observe:0                   |
|                                   |                                |
|                                   +------ 2.05 Content ----------->|
|                                   |       Observe: 10001           |
|                                   |                                |
+-- 0.04 DELETE /ps/data/1bd0d6d -->|                                |
|                                   |                                |
|<---- 2.02 Deleted ----------------+                                |
|                                   |                                |
|                                   +------ 4.04 Not Found --------->|
|                                   |                                |
]]></artwork>
        </artset>
      </figure>
      <section anchor="oscon">
        <name>Using COSE to Protect the Published Topic Data</name>
        <t>The Publisher uses the symmetric COSE Key received from the KDC to protect the payload of the Publish operation (see <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Specifically, the Publisher creates a COSE_Encrypt0 object <xref target="RFC9052"/><xref target="RFC9053"/> by means of the COSE Key currently used as group key (REQ23). The encryption algorithm and Base IV to use are specified by the 'alg' and 'Base IV' parameters of the COSE Key, together with its key identifier in the 'kid' parameter.</t>
        <t>Also, the Publisher uses its private key corresponding to the public key sent to the KDC, in order to countersign the COSE_Encrypt0 object as specified in <xref target="RFC9338"/> (REQ23). The countersignature is specified in the 'Countersignature version 2' parameter, within the 'unprotected' field of the COSE_Encrypt0 object.</t>
        <t>Finally, the Publisher sends the COSE_Encrypt0 object conveying the countersignature to the Broker, as payload of the PUT request sent to the topic-data of the topic targeted by the Publish operation.</t>
        <t>Upon receiving a response from the topic-data resource at the Broker, the Subscriber uses the 'kid' parameter from the 'Countersignature version 2' parameter within the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the Publisher's public key from the KDC (see <xref target="query"/>) or from its local storage. Then, the Subscriber uses that public key to verify the countersignature.</t>
        <t>In case of successful verification, the Subscriber uses the 'kid' parameter from the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the COSE Key used as current group key from its local storage. Then, the Subscriber uses that group key to verify and decrypt the COSE_Encrypt0 object. In case of successful verification, the Subscriber delivers the received topic data to the application.</t>
        <t>The COSE_Encrypt0 object is constructed as follows.</t>
        <t>The 'protected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'alg' parameter, with value the identifier of the AEAD algorithm specified in the 'alg' parameter of the COSE Key used as current group key.</t>
          </li>
        </ul>
        <t>The 'unprotected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'kid' parameter, with the same value specified in the 'kid' parameter of the COSE Key used as current group key. This value represents the current Group ID (Gid) of the security group associated with the application group (topic).</t>
          </li>
          <li>
            <t>The 'Partial IV' parameter, with value set to the current Sender Sequence Number of the Publisher. All leading bytes of value zero <bcp14>SHALL</bcp14> be removed when encoding the Partial IV, except in the case of Partial IV with value 0, which is encoded to the byte string 0x00.  </t>
            <t>
The Publisher <bcp14>MUST</bcp14> initialize the Sender Sequence Number to 0 upon joining the security group and <bcp14>MUST</bcp14> reset it to 0 upon receiving a new group key as the result of a group rekeying (see <xref target="rekeying"/>). The Publisher <bcp14>MUST</bcp14> increment its Sender Sequence Number value by 1, after having completed an encryption operation by means of the current group key.  </t>
            <t>
When the Publisher exhausts its Sender Sequence Numbers, the Publisher <bcp14>MUST NOT</bcp14> protect further topic data by using the current group key while still retaining its current Sender ID, and it <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC (see <xref target="sec-key-renewal-request"/>). This will result in the KDC rekeying the group and distributing a new group key, or in the KDC providing the Publisher with a new Sender ID. The Publisher <bcp14>MUST</bcp14> reset its Sender Sequence Number to 0 upon receiving a new Sender ID from the KDC.</t>
          </li>
          <li>
            <t>The 'Countersignature version 2' parameter, specifying the countersignature of the COSE_Encrypt0 object. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The 'protected' field includes the 'alg' parameter, with value the identifier of the Signature Algorithm used in the security group.</t>
              </li>
              <li>
                <t>The 'unprotected' field includes the 'kid' parameter, with value the Publisher's Sender ID that the Publisher obtained from the KDC when joining the security group, as the value of the 'group_SenderId' parameter of the Join Response (see <xref target="join-response"/>).</t>
              </li>
              <li>
                <t>The 'signature' field, with value the countersignature.</t>
              </li>
            </ul>
            <t>
The countersignature is computed as defined in <xref target="RFC9338"/>, by using the private key of the Publisher as signing key and by means of the Signature Algorithm used in the group. The fields of the Countersign_structure are populated as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>'context' takes "CounterSignature".</t>
              </li>
              <li>
                <t>'body_protected' takes the serialized parameters from the 'protected' field of the COSE_Encrypt0 object, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'sign_protected' takes the serialized parameters from the 'protected' field of the 'Countersignature version 2' parameter, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'external_aad is not supplied.</t>
              </li>
              <li>
                <t>'payload' is the ciphertext of the COSE_Encrypt0 object (see below).</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The 'ciphertext' field specifies the ciphertext computed over the topic data to publish. The ciphertext is computed as defined in <xref target="RFC9052"/><xref target="RFC9053"/>, by using the current group key as encryption key, the AEAD Nonce computed as defined in <xref target="ssec-aead-nonce"/>, the topic data to publish as plaintext, and the Enc_structure populated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>'context' takes "Encrypt0".</t>
          </li>
          <li>
            <t>'protected' takes the serialization of the protected parameter 'alg' from the 'protected' field of the COSE_Encrypt0 object.</t>
          </li>
          <li>
            <t>'external_aad is not supplied.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-aead-nonce">
        <name>AEAD Nonce</name>
        <t>This section defines how to generate the AEAD nonce used for encrypting and decrypting the COSE_Encrypt0 object protecting the published topic data. This construction is analogous to that used to generate the AEAD nonce in the OSCORE security protocol (see <xref section="5.2" sectionFormat="of" target="RFC8613"/>).</t>
        <t>The AEAD nonce for producing or consuming the COSE_Encrypt0 object is constructed as defined below and also shown in <xref target="fig-aead-nonce"/>.</t>
        <ol spacing="normal" type="1"><li>
            <t>Left-pad the Partial IV (PIV) with zeroes to exactly 5 bytes.</t>
          </li>
          <li>
            <t>Left-pad the Sender ID of the Publisher that generated the Partial IV (ID_PIV) with zeroes to exactly the nonce length of the AEAD algorithm minus 6 bytes.</t>
          </li>
          <li>
            <t>Concatenate the size of the ID_PIV (a single byte S) with the padded ID_PIV and the padded PIV.</t>
          </li>
          <li>
            <t>XOR the result from the previous step with the Base IV.</t>
          </li>
        </ol>
        <figure anchor="fig-aead-nonce">
          <name>AEAD Nonce Construction</name>
          <artwork align="center"><![CDATA[
     <- nonce length minus 6 B -> <-- 5 bytes -->
+---+-------------------+--------+---------+-----+
| S |      padding      | ID_PIV | padding | PIV |-----+
+---+-------------------+--------+---------+-----+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                    Base IV                     |-->(XOR)
+------------------------------------------------+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                     Nonce                      |<----+
+------------------------------------------------+
]]></artwork>
        </figure>
        <t>The construction above only supports AEAD algorithms that use nonces with length equal or greater than 7 bytes. At the same time, it makes it easy to verify that the nonces will be unique when used with the same group key, even though this is shared and used by all the Publishers in the security group. In fact:</t>
        <ul spacing="normal">
          <li>
            <t>Since Publisher's Sender IDs are unique within the security group and they are not reassigned until a group rekeying occurs (see <xref target="join-response"/> and <xref target="rekeying"/>), two Publisher Clients cannot share the same tuple (S, padded ID_PIV) by construction.</t>
          </li>
          <li>
            <t>Since a Publisher increments by 1 its Sender Sequence Number after each use that it makes of the current group key, the Publisher  never reuses the same tuple (S, padded ID_PIV, padded PIV) together with the same group key.</t>
          </li>
          <li>
            <t>Therefore neither the same Publisher reuses the same AEAD nonce with the same group key, nor any two Publishers use the same AEAD nonce with the same group key.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-replay-checks">
        <name>Replay Checks</name>
        <t>In order to protect from replay of published topic data, every Subscriber maintains a Replay Window for each different Publisher in the same group. It is <bcp14>RECOMMENDED</bcp14> that the Replay Window has a default size of 32.</t>
        <t>Upon receiving a topic data published by a given Publisher P, the Subscriber retrieves the Sender ID of P conveyed as 'kid' in the 'Countersignature version 2' parameter of the COSE_Encrypt0 object (see <xref target="oscon"/>) and determines the Replay Window W_P associated with P.</t>
        <t>The Subscriber <bcp14>MUST</bcp14> verify that, according to W_P, the Sender Sequence Number SN_P specified by the 'Partial IV' parameter of the COSE_Encrypt0 object has not been received before from P.</t>
        <t>If the verification above fails, the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object conveying the topic data. If the value of SN_P is strictly smaller than the currently smallest value in W_P, then the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object.</t>
        <t>If the verification above succeeds, the Subscriber proceeds with processing the COSE_Encrypt0 object, by verifying the countersignature from P using P's public key as well as by decrypting and verifying the COSE_Encrypt0 object using the group key. If both operations succeed, the Subscriber updates W_P as follows:</t>
        <ul spacing="normal">
          <li>
            <t>If SN_P is strictly greater than the currently largest value in W_P, then W_P is updated in order to set SN_P as its largest value.</t>
          </li>
          <li>
            <t>SN_P is marked to denote that it has been received.</t>
          </li>
        </ul>
        <t>The operation of validating the 'Partial IV' and updating the Replay Window <bcp14>MUST</bcp14> be atomic.</t>
        <t>Upon installing a new group key (e.g., due to a group rekeying performed by the KDC, see <xref target="rekeying"/>) or upon receiving published topic data from a given Publisher for the first time, the Subscriber initializes the Replay Window corresponding to that Publisher, i.e., the smallest value of the Replay Window is set to 0.</t>
        <!--# Applicability to the MQTT Pub-Sub Profile {#mqtt-pubsub}

This section describes how this profile can be applicable to the MQTT protocol {{MQTT-OASIS-Standard-v5}}.

The MQTT clients would go through steps similar to those performed by the CoAP clients, and the payload of the MQTT PUBLISH messages is protected using COSE. The MQTT clients need to use CoAP for communicating with the KDC, in order to join security groups and be part of the pairwise rekeying initiated by the KDC.

The discovery of the AS is defined in {{Section 2.4.1 of RFC9431}} for MQTT v5 clients, and it is not supported for MQTT v3 clients. $SYS/ has been widely adopted as a prefix to topics that contain server-specific information or control APIs, and may be used for discovering topics and the KDC.

In the Join Response from the KDC to a Client (see {{join-response}}), the 'ace_groupcomm_profile' parameter has value "mqtt_pubsub_app", which is registered in {{iana-profile}}.

Both Publishers and Subscribers MUST authorise to the Broker with their respective tokens, as described in {{RFC9431}}. A Publisher sends PUBLISH messages for a given topic and protects the payload with the corresponding key for the associated security group. A Subscriber may send SUBSCRIBE messages with one or multiple topic filters. A topic filter may correspond to multiple topics. The Broker forwards all PUBLISH messages to all authorised Subscribers, including the retained messages.
-->

</section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This section compiles the operational considerations that hold for this document.</t>
      <section anchor="logging">
        <name>Logging</name>
        <t>When performing its normal operations, the KDC is expected to produce and store timestamped logs about the following:</t>
        <ul spacing="normal">
          <li>
            <t>Any event that has resulted in the KDC sending an error response, as a reply to a request received at any of the resources exported by the interface specified in this document.  </t>
            <t>
The logged information contains a description of the error occurred in the context of the present application profile, together with a description of the event related to the error and relevant metadata about the Client that has sent the request. For instance, possible metadata include: addressing information of the Client; when applicable, the Sender ID that is assigned to the Client in the group; when applicable, (an identifier of) the authentication credential of the Client (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association).  </t>
            <t>
Note that, if the error response uses the format problem-details defined in <xref target="RFC9290"/>, then the optional "detail" entry in the response payload is meant to convey the diagnostic description of the error, which is meant to be part of the log entry for this event. This is consistent with <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>, which states that the diagnostic description of the error should be logged.</t>
          </li>
          <li>
            <t>Any event consisting in a successfully performed operation that is triggered by a request received at any of the resources exported by the interface specified in this document.  </t>
            <t>
Such events include:  </t>
            <ul spacing="normal">
              <li>
                <t>A Client joining or re-joining a group.</t>
              </li>
              <li>
                <t>The upload of a new authentication credential for use within the group.</t>
              </li>
              <li>
                <t>The acquisition of a new Sender ID for use within the group.</t>
              </li>
              <li>
                <t>A Client leaving a group.</t>
              </li>
            </ul>
            <t>
The logged information contains a description of the operation performed in the context of the present application profile, together with relevant metadata about the Client that has sent the request. For instance, possible metadata include: addressing information of the Client; when applicable, the Sender ID that is assigned to the Client in the group; when applicable, (an identifier of) the authentication credential of the Client (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association).</t>
          </li>
          <li>
            <t>The execution and successful/unsuccessful completion of a group rekeying instance.  </t>
            <t>
The logged information includes:  </t>
            <ul spacing="normal">
              <li>
                <t>The reason for the group rekeying (e.g., scheduled/periodic occurrence, group joining of a new member, group leaving of a current member).</t>
              </li>
              <li>
                <t>A description of the group rekeying operations performed (e.g., a list of steps performed throughout the rekeying process).</t>
              </li>
              <li>
                <t>The outcome of the group rekeying instance.</t>
              </li>
              <li>
                <t>In case of success, the version number of the newly established group keying material and the newly established Group Identifier (Gid).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The addition of a group member to the group or the eviction of a group member from the group.  </t>
            <t>
The logged information also contains relevant metadata about the Client that has been added to or removed from the group. For instance, possible metadata include: addressing information of the Client; when applicable, the Sender ID that is currently (was latest) assigned to the Client added to (removed from) the group; when applicable, (an identifier of) the authentication credential of the Client added to or removed from the group (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association).</t>
          </li>
          <li>
            <t>The creation, (re-)configuration, or termination of a group.</t>
          </li>
        </ul>
        <t>In addition to what is compiled above, the KDC could log additional information. Further details about what the KDC logs, with what granularity, and based on what triggering events and conditions are application-specific and left to operators to define.</t>
        <t>The KDC <bcp14>MUST NOT</bcp14> log any secret or confidential information pertaining to a group, such as:</t>
        <ul spacing="normal">
          <li>
            <t>The group key used in the group as symmetric encryption key.</t>
          </li>
          <li>
            <t>The Base Initialization Vector (Base IV) to use in the security group with the group key.</t>
          </li>
          <li>
            <t>The private key associated with the KDC’s authentication credential used in the group, if any.</t>
          </li>
          <li>
            <t>Rekeying messages that are exchanged in the group.</t>
          </li>
          <li>
            <t>If applicable, administrative keying material used to protect the group rekeying process.</t>
          </li>
        </ul>
        <t>It is up to the application to specify for how long a log entry is retained from the time of its creation and until its deletion. Different retention policies could be enforced for different groups. For a given group, the oldest log entries are expected to be those deleted first, and different retention policies could be enforced depending on whether the group currently exists or has been deleted.</t>
        <t>It is out of the scope of this document what specific semantics and data model are used by the KDC for producing and processing the logs. Specific semantics and data models can be defined by applications and future specifications.</t>
        <t>The KDC is expected to make the logs that it produces available for secure access by authorized external management applications and operators.</t>
        <t>In particular, logged information could be retrieved in the following ways.</t>
        <ul spacing="normal">
          <li>
            <t>By accessing logs at the KDC through polling. This can occur in an occasional, regular, or event-driven way.</t>
          </li>
          <li>
            <t>Through notifications sent by the KDC according to an operator-defined frequency.</t>
          </li>
          <li>
            <t>Through notifications asynchronously sent by the KDC, throttling them in order to prevent congestion and duplication and to not create attack vectors.</t>
          </li>
        </ul>
        <t>Some of the logged information can be privacy-sensitive. This especially holds for the metadata about a Client, i.e., addressing information of the Client and, when applicable, (an identifier of) the authentication credential of the Client (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association). If external management applications and operators obtain such metadata, they become able to track a given Client, as to its interactions with one or multiple KDCs and its membership in groups under such KDC(s).</t>
        <t>Therefore, the logged information that is effectively provided to external management applications and operators <bcp14>SHOULD</bcp14> be redacted by the KDC, by omitting any privacy-sensitive information element that could enable or facilitate the impairment of Clients' privacy, e.g., by tracking Clients across different groups and different KDCs. Exceptions could apply, e.g., if the KDC can verify that the management application or operator in question is specifically authorized to obtain such privacy-sensitive information and appropriately entitled to obtain it according to enforced privacy policies.</t>
        <t>It is out of the scope of this document to provide operational considerations about the production, storage, processing, and sharing of logs at the Broker.</t>
      </section>
      <section anchor="administration-of-groups">
        <name>Administration of Groups</name>
        <t>It is out of the scope of this document how groups are created, (re-)configured, and terminated at the KDC. Specific methods, tools, and data models to perform such operations and administer groups at the KDC can be defined by applications and future specifications.</t>
        <t>It is out of the scope of this document to provide operational considerations about how application groups (topics) are created, (re-)configured, and terminated at the Broker, as well as about the store-and-forward of published topic data via the Broker.</t>
      </section>
      <section anchor="access-control">
        <name>Access Control</name>
        <t>Building on the ACE framework <xref target="RFC9200"/> and the foundation provided in <xref target="RFC9594"/>, this application profile enforces access control for Clients that interact with the interface at the KDC specified in this document and with the interface at the Broker specified in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
        <t>In particular, the granularity of such access control takes into account the resource specifically targeted at the KDC or at the Broker, the operation requested by sending a request to that resource, and the specific role(s) that the requesting Client is authorized to have according to its corresponding access token uploaded to the KDC or to the Broker.</t>
        <t>Furthermore, the interactions that a Client has with the KDC and with the Broker are secured as per the specific transport profile of ACE used (e.g., <xref target="RFC9202"/> and <xref target="RFC9203"/>).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="RFC9594"/>, the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, and the specific transport profile of ACE used, such as <xref target="RFC9202"/> and <xref target="RFC9203"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <t>Consistent with the intended group-confidentiality model, each Client in a security group is able to decrypt the data published in the topic(s) associated with that group, by using the symmetric group key that is shared with all the other group members.</t>
      <t>At the same time, source authentication of the published topic data is achieved by means of a digital signature, which the Publisher of the data in question computes with its private key and embeds in the published topic data. This ensures integrity of the published topic data as well as its origin, thus preventing a group member from impersonating another one.</t>
      <t>To this end, both Publishers and Subscribers rely on asymmetric cryptography, while Subscribers must be able to access the public keys of the Publishers to a specific topic in order to verify the signature over the published topic data. This might make the message exchange quite heavy for small constrained devices.</t>
      <t>The Broker is only trusted with verifying that a Publisher is authorised to publish on a certain topic and with distributing that data only to the Subscribers authorised to obtain it. However, the Broker is not trusted with the published topic data in itself, which the Broker cannot read or modify as it does not have access to the group key required for decrypting the data.</t>
      <t>With respect to the reuse of challenges for proof-of-possession input, the same considerations apply as in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>, with the difference that the KDC of the present document is considered instead of the Group Manager defined therein.</t>
      <t>Access tokens might have to be revoked before their expiration time. <xref target="RFC9770"/> provides a list of possible circumstances where this can happen, and it specifies a method that an Authorization Server can use in order to notify the KDC, the Broker, and the Clients about pertaining access tokens that have been revoked but are not expired yet.</t>
      <t>Aligned with <xref target="rekeying"/>, the KDC performs a group rekeying when one or more members leave the group, thus preserving forward security. In particular, Clients can be excluded from future communications related to a topic, by appropriately rekeying the group associated with the topic in question. According to the specific application requirements, the KDC can also rekey the group upon a new node's joining, in case backward security has also to be preserved (see <xref target="join-response"/>). The KDC can also rekey the group for further reasons, e.g., according to an application-specific rekeying period or scheduling.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Note to RFC Editor: Please replace "[RFC-XXXX]" with the RFC number of this document and delete this paragraph.</t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-ace-groupcomm-key">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Key Types" registry <xref target="ACE.Groupcomm.Key.Types"/> within the "Authentication and Authorization for Constrained Environments (ACE)" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Group_PubSub_Keying_Material</t>
          </li>
          <li>
            <t>Key Type Value: GROUPCOMM_KEY_TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Profile: coap_group_pubsub_app (<xref target="iana-profile"/> of [RFC-XXXX]).</t>
          </li>
          <li>
            <t>Description: Encoded as described in <xref target="join-response"/> of [RFC-XXXX].</t>
          </li>
          <li>
            <t>References: <xref target="RFC9052"/>, <xref target="RFC9053"/>, [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-profile">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entries in the "ACE Groupcomm Profiles" registry <xref target="ACE.Groupcomm.Profiles"/>, within the "Authentication and Authorization for Constrained Environments (ACE)" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_group_pubsub_app</t>
          </li>
          <li>
            <t>Description: Application profile to provision keying material for participating in group communication based on the Pub-Sub architecture <xref target="I-D.ietf-core-coap-pubsub"/> for CoAP <xref target="RFC7252"/> and protected with COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>CBOR Value: TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="core_rt">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry <xref target="Resource.Type.Values"/> within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Value: "core.ps.gm"</t>
          </li>
          <li>
            <t>Description: Group-membership resource for Pub-Sub communication.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t>Clients can use this resource type to discover a group membership resource at the KDC.</t>
      </section>
      <section anchor="aif">
        <name>AIF Media-Type Sub-Parameters</name>
        <t>For the media-types "application/aif+cbor" and "application/aif+json" defined in <xref section="5.1" sectionFormat="of" target="RFC9237"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="RFC9237"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Toid</t>
          </li>
          <li>
            <t>Name: pubsub-topic</t>
          </li>
          <li>
            <t>Description/Specification: Name of one application group (topic) or of a corresponding security group.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Tperm</t>
          </li>
          <li>
            <t>Name: pubsub-perm</t>
          </li>
          <li>
            <t>Description/Specification: Permissions pertaining to application groups (topics) or to corresponding security groups.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="content_formats">
        <name>CoAP Content-Formats</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry <xref target="CoAP.Content.Formats"/> within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+cbor;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 294 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+json;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 295 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="tls_exporter">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry in the "TLS Exporter Labels" registry <xref target="TLS.Exporter.Labels"/> within the "Transport Layer Security (TLS) Parameters" registry group, which is defined in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Value: EXPORTER-ACE-Sign-Challenge-coap-pubsub-app</t>
          </li>
          <li>
            <t>DTLS-OK: Y</t>
          </li>
          <li>
            <t>Recommended: N</t>
          </li>
          <li>
            <t>Reference: <xref target="pop"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="COSE.Algorithms" target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Key.Types" target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="ACE.Groupcomm.Key.Types" target="https://www.iana.org/assignments/ace/ace.xhtml#ace-groupcomm-key-types">
          <front>
            <title>ACE Groupcomm Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="ACE.Groupcomm.Profiles" target="https://www.iana.org/assignments/ace/ace.xhtml#ace-groupcomm-profiles">
          <front>
            <title>ACE Groupcomm Profiles</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Resource.Type.Values" target="https://www.iana.org/assignments/core-parameters/core-parameters.xhtml#rt-link-target-att-value">
          <front>
            <title>Resource Type (rt=) Link Target Attribute Values</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CoAP.Content.Formats" target="https://www.iana.org/assignments/core-parameters/core-parameters.xhtml#content-formats">
          <front>
            <title>CoAP Content-Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TLS.Exporter.Labels" target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#exporter-labels">
          <front>
            <title>TLS Exporter Labels</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub">
          <front>
            <title>A publish-subscribe architecture for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>Dogtiger Labs</organization>
            </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document describes a publish-subscribe architecture for the
   Constrained Application Protocol (CoAP), extending the capabilities
   of CoAP communications for supporting endpoints with long breaks in
   connectivity and/or up-time.  CoAP clients publish on and subscribe
   to a topic via a corresponding topic resource at a CoAP server acting
   as broker.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-19"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9237">
          <front>
            <title>An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Information about which entities are authorized to perform what operations on which constituents of other entities is a crucial component of producing an overall system that is secure. Conveying precise authorization information is especially critical in highly automated systems with large numbers of entities, such as the Internet of Things.</t>
              <t>This specification provides a generic information model and format for representing such authorization information, as well as two variants of a specific instantiation of that format for use with Representational State Transfer (REST) resources identified by URI path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9237"/>
          <seriesInfo name="DOI" value="10.17487/RFC9237"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9290">
          <front>
            <title>Concise Problem Details for Constrained Application Protocol (CoAP) APIs</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This document defines a concise "problem detail" as a way to carry machine-readable details of errors in a Representational State Transfer (REST) response to avoid the need to define new error response formats for REST APIs for constrained environments. The format is inspired by, but intended to be more concise than, the problem details for HTTP APIs defined in RFC 7807.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9290"/>
          <seriesInfo name="DOI" value="10.17487/RFC9290"/>
        </reference>
        <reference anchor="RFC9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
        <reference anchor="RFC9430">
          <front>
            <title>Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS)</title>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document updates "Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)" (RFC 9202) by specifying that the profile applies to TLS as well as DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9430"/>
          <seriesInfo name="DOI" value="10.17487/RFC9430"/>
        </reference>
        <reference anchor="RFC9594">
          <front>
            <title>Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members that act as Clients and are authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as the Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9594"/>
          <seriesInfo name="DOI" value="10.17487/RFC9594"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9770">
          <front>
            <title>Notification of Revoked Access Tokens in the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="S. Echeverria" initials="S." surname="Echeverria"/>
            <author fullname="G. Lewis" initials="G." surname="Lewis"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies a method of the Authentication and Authorization for Constrained Environments (ACE) framework, which allows an authorization server to notify clients and resource servers (i.e., registered devices) about revoked access tokens. As specified in this document, the method allows clients and resource servers (RSs) to access a Token Revocation List (TRL) on the authorization server by using the Constrained Application Protocol (CoAP), with the possible additional use of resource observation. Resulting (unsolicited) notifications of revoked access tokens complement alternative approaches such as token introspection, while not requiring additional endpoints on clients and RSs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9770"/>
          <seriesInfo name="DOI" value="10.17487/RFC9770"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER-encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-17"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document defines an application profile of the Authentication
   and Authorization for Constrained Environments (ACE) framework, to
   request and provision keying material in group communication
   scenarios that are based on the Constrained Application Protocol
   (CoAP) and are secured with Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  This application profile
   delegates the authentication and authorization of Clients, which join
   an OSCORE group through a Resource Server acting as Group Manager for
   that group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication, and proof of possession of a key owned by the Client
   and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-21"/>
        </reference>
      </references>
    </references>
    <?line 1267?>

<section anchor="groupcomm_requirements">
      <name>Requirements on Application Profiles</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
      <section anchor="mandatory-to-address-requirements">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>REQ1: Specify the format and encoding of scope. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="scope"/>.</t>
          </li>
          <li>
            <t>REQ2: If scope uses AIF, register its specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format, as per the guidelines in <xref target="RFC9237"/>: see <xref target="aif"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ3: If used, specify the acceptable values for the 'sign_alg' parameter: values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>REQ4: If used, specify the acceptable values and structure for the 'sign_parameters' parameter: values and structure from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>REQ5: If used, specify the acceptable values and structure for the 'sign_key_parameters' parameter: values and structure from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</t>
          </li>
          <li>
            <t>REQ6: Specify the acceptable formats for authentication credentials and, if applicable, the acceptable values for the 'cred_fmt' parameter: acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="token-post"/> and <xref target="join-response"/>). Consistent acceptable values for 'cred_fmt' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/>.</t>
          </li>
          <li>
            <t>REQ7: If the value of the GROUPNAME URI path and the group name in the access token scope ('gname') are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</t>
          </li>
          <li>
            <t>REQ8: Define whether the KDC has an authentication credential as required for the correct group operation and if this has to be provided through the 'kdc_cred' parameter: optional, see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ9: Specify if any part of the KDC interface as defined in <xref target="RFC9594"/> is not supported by the KDC: part of the KDC interface is optional to support, see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ10: Register a Resource Type for the group-membership resources, which is used to discover the correct URL for sending a Join Request to the KDC: the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/>.</t>
          </li>
          <li>
            <t>REQ11: Define what specific actions (e.g., CoAP methods) are allowed on each resource accessible through the KDC interface, depending on: whether the Client is a current group member; the roles that a Client is authorised to take as per the obtained access token; and the roles that the Client has as a current group member: see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ12: Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations: no new operations are defined.</t>
          </li>
          <li>
            <t>REQ13: Specify the encoding of group identifiers: CBOR byte string, with value used also to identify the current group key used in the security group (see <xref target="join-response"/> and <xref target="query"/>).</t>
          </li>
          <li>
            <t>REQ14: Specify the approaches used to compute and verify the PoP evidence to include in the 'client_cred_verify' parameter and which of those approaches is used in which case: see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ15: Specify how N_S is generated, if the access token is not provided to the KDC through the Token Transfer Request sent to the /authz-info endpoint (e.g., the access token is instead transferred during the establishment of a secure communication association): see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ16: Define the initial value of the version number for the group keying material: the initial value <bcp14>MUST</bcp14> be set to 0 (see <xref target="join-response"/>).</t>
          </li>
          <li>
            <t>REQ17: Specify the format of the group keying material that is conveyed in the 'key' parameter: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ18: Specify the acceptable values of the 'gkty' parameter. For each of them, register a corresponding entry in the "ACE Groupcomm Key Types" IANA registry if such an entry does not exist already: Group_PubSub_Keying_Material, see <xref target="join-response"/> and <xref target="iana-ace-groupcomm-key"/>.</t>
          </li>
          <li>
            <t>REQ19: Specify and register the application profile identifier: coap_group_pubsub_app (see <xref target="join-response"/> and <xref target="iana-profile"/>).</t>
          </li>
          <li>
            <t>REQ20: If used, specify the format and default values of the entries of the CBOR map to include in the 'group_policies' parameter: not applicable.</t>
          </li>
          <li>
            <t>REQ21: Specify the approaches used to compute and verify the PoP evidence to include in the 'kdc_cred_verify' parameter and which of those approaches is used in which case. If external signature verifiers are supported, specify how those provide a nonce to the KDC to be used for computing the PoP evidence: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ22: Specify the communication protocol that members of the group use to communicate with each other (e.g., CoAP for group communication): CoAP <xref target="RFC7252"/>, used for Pub-Sub communications as defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
          <li>
            <t>REQ23: Specify the security protocol that members of the group use to protect the group communication (e.g., Group OSCORE). This must provide encryption, integrity, and replay protection: Publishers in a group use a symmetric group key to protect published topic data as a COSE_Encrypt0 object, per the AEAD algorithm specified by the KDC. A Publisher also produces a COSE countersignature of the COSE_Encrypt0 object by using its private key, per the signature algorithm specified by the KDC.</t>
          </li>
          <li>
            <t>REQ24: Specify how the communication is secured between the Client and the KDC. Optionally, specify a transport profile of ACE <xref target="RFC9200"/> to use between the Client and the KDC: ACE transport profile such as for DTLS <xref target="RFC9202"/> or OSCORE <xref target="RFC9203"/>.</t>
          </li>
          <li>
            <t>REQ25: Specify the format of the node identifiers of group members: the Sender ID defined in <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ26: Specify policies at the KDC to handle node identifiers that are included in the 'get_creds' parameter but are not associated with any current group member: see <xref target="query"/>.</t>
          </li>
          <li>
            <t>REQ27: Specify the format of (newly generated) individual keying material for group members or of the information to derive such keying material, as well as the corresponding CBOR map key that has to be registered in the "ACE Groupcomm Parameters" registry: see <xref target="sec-key-renewal-request"/>.</t>
          </li>
          <li>
            <t>REQ28: Specify which CBOR tag is used for identifying the semantics of binary scopes, or register a new CBOR tag if a suitable one does not exist already: see <xref target="as-response"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ29: Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="RFC9594"/>: a Publisher Client <bcp14>MUST</bcp14> support 'group_SenderId' in 'key'; see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ30: Define whether Clients must, should, or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="RFC9594"/> and under which circumstances: a Publisher Client <bcp14>MUST</bcp14> support the client_cred' and 'client_cred_verify' parameters (see <xref target="join-request"/>). A Publisher Client that provides the access token to the KDC through the /authz-info endpoint <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (see <xref target="token-post"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>OPT1: Optionally, if the textual format of scope is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</t>
          </li>
          <li>
            <t>OPT2: Optionally, specify the additional parameters used in the exchange of Token Transfer Request and Response: none are defined.</t>
          </li>
          <li>
            <t>OPT3: Optionally, specify the negotiation of parameter values for signature algorithm and signature keys, if the 'sign_info' parameter is not used: see <xref target="token-post"/>.</t>
          </li>
          <li>
            <t>OPT4: Optionally, specify possible or required payload formats for specific error cases: see <xref target="join-error"/>.</t>
          </li>
          <li>
            <t>OPT5: Optionally, specify additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error': none are defined.</t>
          </li>
          <li>
            <t>OPT6: Optionally, specify the encoding of the 'creds_repo' parameter if the default one is not used: no encoding is defined.</t>
          </li>
          <li>
            <t>OPT7: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT8: Optionally, specify the behavior of the POST handler of group-membership resources, for the case when it fails to retrieve an authentication credential for the specific Client: The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response to the Join Request (see <xref target="join-error"/>).</t>
          </li>
          <li>
            <t>OPT9: Optionally, define a default group rekeying scheme to refer to in case the 'rekeying_scheme' parameter is not included in the Join Response: the "Point-to-Point" rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
          <li>
            <t>OPT10: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT11: Optionally, specify policies that instruct Clients to retain messages and for how long, if those are unsuccessfully decrypted: no such policies are specified.</t>
          </li>
          <li>
            <t>OPT12: Optionally, specify for the KDC to perform a group rekeying when receiving a Key Renewal Request, together with or instead of renewing individual keying material: the KDC <bcp14>SHOULD</bcp14> perform a group rekeying if one is already scheduled to occur within an acceptably short time frame, otherwise it <bcp14>SHOULD NOT</bcp14> (see <xref target="sec-key-renewal-request"/>).</t>
          </li>
          <li>
            <t>OPT13: Optionally, specify how the identifier of a group member's authentication credential is included in requests sent to other group members: no such method is defined.</t>
          </li>
          <li>
            <t>OPT14: Optionally, specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6" sectionFormat="of" target="RFC9594"/>): no additional information is defined.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>
            <t>Minor fixes in the CDDL grammar of the scope entry.</t>
          </li>
          <li>
            <t>Explicitly mentioned that topic-data resources are hosted at the Broker.</t>
          </li>
          <li>
            <t>More consistent use of the terms "nonce" and "challenge".</t>
          </li>
          <li>
            <t>Moved up the statement of compliance with REQ7.</t>
          </li>
          <li>
            <t>Clarified that group names are consistent with the semantics of URI path segments.</t>
          </li>
          <li>
            <t>Added references to IANA registries.</t>
          </li>
          <li>
            <t>Editorial fixes.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Updated introduction: clarified relationships between this document and related documents.</t>
          </li>
          <li>
            <t>Ensured consistency with RFC 9594 when using an optimized Join Request for re-joining a group (presence of the 'client_cred' parameter).</t>
          </li>
          <li>
            <t>Added the "Operational Considerations" section.</t>
          </li>
          <li>
            <t>Clarifications:  </t>
            <ul spacing="normal">
              <li>
                <t>Secure communications required as per the transport profile of ACE used.</t>
              </li>
              <li>
                <t>Explicitly mentioned the rationale for computing a proof-of-possession (PoP) evidence.</t>
              </li>
              <li>
                <t>Reasons for and flexibility of group rekeying.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Clarified high-level description of the authorisation flow.</t>
          </li>
          <li>
            <t>Clarified relation between a group rekeying and a Key Renewal Request.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified recommendations about randomness and size of nonces.</t>
          </li>
          <li>
            <t>Clarified generation of N_S if TLS is used with the KDC instead of DTLS.</t>
          </li>
          <li>
            <t>Added missing references to REQ and OPT requirements.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested values for IANA registrations.</t>
              </li>
              <li>
                <t>Renamed TLS Exporter Label.</t>
              </li>
              <li>
                <t>Fixed content types in the CoAP Content-Formats registrations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00">
        <name>Version -00</name>
        <ul spacing="normal">
          <li>
            <t>Imported content from draft-ietf-ace-pubsub-profile-11.</t>
          </li>
          <li>
            <t>Removed content about MQTT.</t>
          </li>
          <li>
            <t>New document title.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank <contact fullname="Rikard Höglund"/>, <contact fullname="Ari Keränen"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Jim Schaad"/>, <contact fullname="Ludwig Seitz"/>, and <contact fullname="Göran Selander"/> for the useful discussion and reviews that helped shape this document.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+292XIbSZYo+C6z/IdoauySKAEQN23M5TZFUZnskkQWSVVW
WWVdVhAIktECEOgIgBRLUtv9jXmaeZhvuB8w/SfzJeNncz/u4REAJWVV9bWm
5UICEb4cP372pdfrfXPveifZ+ubeN/dm+WyU7SR7xe5RcjQ/H+XVVe9kfl4N
yvw8S47K4iIfZclFUSa789lVNpnlg3SWF5MknQzxo6LM/0qfwEN7xaSalWk+
yYbJ/uQ6L4vJ2LxUJWu7e/udb+6l5+dlZuY2f9k5YT6Z6Zt7w2IwScdmScMy
vZj18mx20UsHWW9QpNPe1KzMvDClh3ujdJZVM9hGPi13klk5r2ab6+vP1jfN
TGWW7iQn2WBe5rPbb+7dXNKsPxflu3xymfxYFvPpN/fe3ewkB5NZVk6yWe8F
TPnNPbPDnaSaDb+5ZyYb51Vldje7nZo1HeyfvoTpBsXQjLGTzM3insIHKUJi
55t7BrSJ+ckn1U7ysp8cpaNifJ5PcvqYdvayTCeDrBqk4ddFacbcL/NBVRUT
+igbp/loJ7mQV/pTeeWfM36wPyjG/sR7fbPxyeV8pGfdyy+H2dj7Aud7Xs4n
2Sh5O8mvs7JCWKmJBxU+/8/pYNw3j/vzvO4np/moGKR6ntdpOSi8z3Ga44OT
/WT3uTf4GB7tz/DRfy7zfpUBLCdFOTYYdZ3twMN7hyf7/d3RpcGz2dW42qEB
LLyTxM5wsPtmlz4YGrwwMEtHMCB8IFh+CGuwY/F3aXmZmQO/ms2m1c7Dhzc3
N/08naSw3YepOfxLQuGHg6LK8D/991ez8eh+6g2E6/xtdts/NZjyFZZphkpw
qC9c5bvstgfIa9f4U5YOs7J/lJbmuAzif4W10pCJG/IL13yF4/Wm3njm8vbx
0hp0H38lSANBsGN+NsgNeYJ/BS0MsbqUMXsC/sgWmOR9zR3IkF9xA1M15HFW
FfPSPAhQ6v8+Hc2/cPUyIII9WStn33eSV/nkXXKKS092ZzPDh+azLKHJ7oxX
ZaawKPyb91vOeiMzZ4+G7aWzWe8aZsMbY3hU3zC1mRmv/xIJ0xfeF2B6PGCP
B/xVdjXgOS7cHKevTvr776dFaR7rv0rPs9GX7cWMl8h4CY13x63MRpXeif8n
byTjGQy3lxkOei/6KBjg1pVkgDs4frm39ezpY/n90ea2+/3J+iP5/fHW9hP7
++Nn6/b3J9vP5Pcnm4827e+Ptzfs78827ThPt57ZZ55uu7nM73b8p4837PhP
n7nxn6278c3vW/b3DffuMyPRuN+31OdP1O9u/c+2tp7a37e33OePnm3voKw0
ufA4LK3Pzv1089EzNfem+t2t78kTGledRGVO4rwoe9nESEfZsDfIypn/DBAW
oIeOuBQVnCCuCkTL2S2+cLL/6uVOsvInM1HvD+bnzyvwQK/XS9JzkC4HKPKd
XuVVYqTFOaBSMswujNBZGbE0SafTkUipTL2S4iIx0uvXkGFBFBtnN0aK7Caz
Iskm6bkZvwI5M0twZwlsbT6RSfIJTl0XrtdY9u0kRgy6ymfZYAZjwBLgBb2M
XbUlQ+NnxaAYJWtASzrJL39SknJ4IX75cze5ucpKO7+5V7htuwzzt1tvZmY2
W7i8SlIjFxbvDJ1IEM4CxzIb5QbKBFlcRq+aZoP8Ih8Y8TudVHBX5ekKwA4M
ysApNTvMrrMANhWL513zW2nETyRE7oC6uFQzmhnH/DMtqipDaRz+ShODS0lx
A/A5vyWQmcUZXICXzou5+S9MPEkO4YyTzf66WYURoivz8btswjuzGMT7MKuG
ocyk1zlMBboCDJjBrRlk+CjM7qGNvVKCQriQijZuFlQF4H9onlEn0IUnbrLR
CP5fm93MZnYKv5kZjNCfjnBBArvEUUzzbjqzk88rQiY4KYNbMIAZOy/9M6jM
zoa9WWHu7dCePqyBzx+u2psCMKOAm5/sD/OZYRXJ0ShLK0CI6cjc62RlARqu
JDdGVMaBYZTJfGw2TtfSLNkeAmxsmI0yxETAO7O3yzKdXvWJAIzz4XCEWsJ9
UNvKYjgfwC7gkwNzoZMpX7Mqcs2qgbmtZV50zRTX+QCoBYFl0fkk3/1Tr4fr
H+Vjc1GHZtsGodPzfGQOoNf7wbtC13lqrw9tj3GnMkolAMZMAGz5Ji2Hydjg
Y3oJizjPZjdZBsQCBGFCzuziAk7uOhvdMqUxy4NDHQPoItRGbntqcElRndit
N6A19yyfpggCplKVwSSrk8+KqbnWRpE2c0yq3IjkGSx4jK8zRcUXNMWlRRkm
XwzyFEDF527AgOP1iXZnct+EFM+SDx8a+fqnT47A2+V9EdX88IHZ+6dPuKLn
83w0xNs2+fqcgmYDRv7pUxeHtwhP3xjWrLZ4VdzAbSuzfzMi78xga16xGEwE
scwm2U2UJphzusgv5yUzP0UYCiEDjHFZkr03GDy5NPPlcHFirCtzewKENGeU
G1o1MDPlIBPyO4IReMZM7tC+w3QIFgZIJCQzQ7r8r4WeNgUaalYKryPCpKiN
vZCdw2r2MngiWfvti72OnayS2awqccKcxMxqblCZGZZkkPd85HAE54QNZYkZ
i4jtkOn+JAMOkZa3Ufj6ENWXHhddmBFKHyqIXD9fAe+MHTVMWUyzkkkxLhp2
eQE0Nb1O8xGKF3B5aLUeq7g0iFCapcmRsqxvNyogxbGFvuhjsYPmMyS7l2BQ
M7/NzMSVXAUfJzzWYy5+WRhKmCG3GWpMMvCpMoDXLItJZBXC3zAQwAwkBekI
USM3VwptXUBhNMiIhJBemDL1mo/SMoq5sjBmKABsvFYB62OqxzSrzOSSZMMa
S7Zizp3uHeMWYnwdL5oEkGYhVgGkn7yu3eR0XBCXd9R9QldEthKiCgtYgPSw
q4tiNDJguqG7bpeEJ6vm7rJIpGVfIcv+QTA74s2bHbRwJBrIsLo2gdQgGiwU
9WizH3N32hlHn0UDhzBdEi3+EQQ/udi0tb+ZGOhJfBGJECSYQAQ0ECxKMPIp
TsICBp66JmJ6T19pS3xmchNGRpUwgmFW3UkNWcv6l/2uZcaG9cuvW58+dbqA
43aP/4D6ighObNnBGRi5RI7MhAuDzJaXgO4zNx2fCMGRyJxGBSeAwhwlcU6U
iSwOW6YBnGUCdE0hs6HoBR2T+So4MKc3osGY4L7+yB7B+iNzBDi6eSTECU1E
v45Q208CisCyg3+cPoRJGjZyTwoQZPxA2I4zg3EiEDdBDoxe8Ek1N1xJjhCl
htxcUoMWZpv5NVA8s3086w8fDE/pCZnqGRDSBbvKp5UBVmHw7zrPbuheed+q
o9SEDsGLIgo+bRYvXwFfmMDr5rP03IyMC/h395OkaXV9+c29B73oz4Nv7n2M
y+Uf4RuSlQ3BXks7ifx8DEdoGjvRPx/FRrng56MvrndDwrP0MG0Eatk1e4SM
eIrcOgDPaZ1iwUvBEEy+o2gJoxCR6yZE5NYGnbVhpzYKoi9I20YxPk9BZDPj
9fv9u0D/fywBNnju49LPvWCB06DefObIv/u5pucs7EO6bH6K7xt+Cn4XRSNg
A55oxHBpX5+VUUUUMhBzMP3hhx8CU9J33323FAza5o2ex4Nl3v0uvJiwaaeL
wmXUb3+kq1k3nHgz4D1O60qxN9BUhwuYSWNLtQM5IWrtvBOsaBl4LQGjZpwI
BloKWRfiPQ/0tiJWdQ4mBY0qbhsHrORY1hwdaOHPx6ia8FkDkY4UIrc/0PUy
Ay16oJHS+Ee4zEAf0UbgEXbAPFI1ZDm1geR4RIrFgXxyQioGiYydxoFC0QAH
WgJAtYeQKCtBDAfqJT82aPfBQA8c1MLD44EOGw0MoEl/lCvzkWSzGOx5a+0m
Gfvax2TtorN22QlYPNOjpY4/CbYG4ggIDzvJnxp1vT+bR87xETa2wQcD9cEm
fDBUH2zBB5n9wKi28MGF/cAIqPDBpfoAXlFykZHSdpL7zXIauUq/XzlkYQ24
9AthE8f6yRXDZWZAoHvpyIiK368MELYrn5oM8LukZp0Xs1kxJttAm7zYBRN9
I+zAQJ+LJHlhVHZDnBJ0uLLdBVW3rEJXm6zfvGB4sXl2ZnT2eSX3D1/AUUol
YvaT55n5NpNrw3Z3I4qYTRnxzHcnuDHUSqwHwcipiRG+J7N5OsKpzTxi81oD
GJmVzkeoAlyUxbjj9uWvyGhTEzu1djtMDLxRBAbDP1nvPHXmwgxRZdZC1miR
Bs4KCuf432YzZ8pGTcF3XhLLZdOvnollNabzYG4xaPD6d6enZlT4X+9w9+Tg
pHdi2MkwLYe960dgGTrJxzmYxtJhOp3x1YeR0lFVJNn7WUa65sW8RHXAU5lR
nSZKEdtX1e/1fkAHzP3kNCvH+aQYFZe3opyCjmuweFglK6/fnpyudOn/yZtD
/P14/3dvD473X8DvJz/tvnplf7nHT5z8dPj21Qv3m3tz7/D16/03L+hl82ni
fXRv5fXuH1dIvF45PDo9OHyz+2qFVEBPCSoRhOdsHTVIDYpQWt2TQ0Ae+Hzv
6P/9vze2DZD/yeDT5sbGM3Nu9MfTjSdgjrxB3CGN1eAg/WmgeXvPnFVmYA+2
0NHIgH2azwzc0bhTXYGiByax/r17v/kTQObPO8l354PpxvYP/AFs2PtQYOZ9
iDCrf1J7mYAY+SgyjYWm93kAaX+9u3/0/ha4qw+/++8jML72Np7+9x/uAZYc
Y3BXhQeRvZ+SGYJO5CI1aJsb2MFNx6iA36CV3pzTuBJD6yCbzqrEOy102NSE
3IUuHOWV6dt5GJ9xBIxJyDNrJ1ZuMO+qA345+cmZb3ACiCeBCWI2yHwyGM3B
9UCWoG7Ni7F2fNLpRpYuX++edPoOTv4zB8o2SZFG5vmDlx3Z99YTg8ZzlobM
SZRgamo0b/ZbjsPaE9hAs8DI3GxVZjulb4BFdxf8Eari+SRq+xc3r3UxMJRx
aRSAnDNNNFfrPc5hEPe9OUND99lNzh5qsKwBZTUc9xbEs3Q4JDDBvZ/CIOlI
fw4+u7xEY7G58WAIEv9tG/wCdN578eIVwQXihgAue88Pj/mTZ4BNhBItpjT6
dWvrKRvAl5wYFEHtGU1I8BAJAN5PVgzzmBaGeKLEgPiDNn5yHaDZzYxLlwBv
Re4uG90Fs/p8DHdo5kBeMuJXZCAztPIvD9Hs+Rdc718e5uDtR3D+RSzMuydd
/hKw9q89wFb75fEJ3Wnck1sHOMhzM4FZupGH0l/+PKFbfhs3HZJqzExxRcOm
m5CcYB1fHptpBzq5QZC1xhAY5RwSHdLghBa7OnZxI7fE3bJqRu/VNhd1mjlT
fToqDZkOgQJfeG6sBGmYmYgcUEY+uaUjRZaarBBZA35tvUPyibnpK5NimK0w
qDCIdceMX2Vo2obv2JpdXaVs8YkYhxt9IJ6fou7jIIet4UzpBG2iysFtUR1F
RnLmJCt2EgQALTshww9jAjEx8AUiTpAfe5Ks1MIjVgQLr1IgGaPsGowBgrn6
cXB00B5vICzE+toBIIJzA5BenTth+agWoLapisrYf5+OpyOEOvrcwBhXF56Y
UzDFAMI0zNPLSVEZRAEwWFxSLPHDhxO2XT6Fs7V0DHfmvvxRvkSy1ze6Zn1g
OEbaZQkeUSPKWh7GfgLYk5FxjW4A6gQpLdaez75RxpJVQCe6nBjyS27Z+2Hk
CEriVoX7cF9M759icYieKF+g+00JGrxj5dYuwIeJIT01Z5JvwYY3Qbweag1c
+90q6xMIob7JgBU+S17ZQKShi81aoI/tAPVpgebiC0/jGYi/E8Oc2A+tbRnO
0yQ+j4YYs3DEMLiCCLK5x7XbZG4sRGPB0ixtH4MQTv408fi8yKbZRIf4qIG6
8ph58ZZgUiEVAgJhbskYFFfIPMKHKstEzEDzcoIvXaXXGa8QZHz3MFGoIilQ
P5jjtRvj/UyucnN4hnbe9pPdEOIspYPuF8RSGRJpXh9Fwq76yU/FDbhGu22x
WUZojw07Bo15OgqP3khRL1lNlLgQ5mWIN4x7DFIAux/LZmByY4RCyICwIWt8
d+czG0Q2MGhcU4tdiIRVhnlSQlFPBCfNCpEePwfysSsOVlR9yR2fOpqIPChV
FBE/ODfcQJwo57faWgERLcU4S/Sx8rv8NTKSSp2CGCWqfAynAEAF542iSYGf
1JEP3+fqFmmpvETXsGj53Eze5hmtB2aRfCRueg6lMpDCaKoTPmVxZlYi27/I
KyMNDGBhvvTOAVWtJkK0P8SnQms5IpIEnwj/ECBCrFY45cuyGONFurzqEa9E
0RSgDHSw6/FFP8JMDWm9/hiUFuA/jlFmBheKc4P/E1EQ6DKF4ogSOxQVRAZj
Hri4FaKLpNBZkFncVHeSsCz0w1pHrGeeDU2qD+qfPQheCfyjaLwlAy6coBh9
Q9N1Ioqn/P3RP+zoK6ilJuoV88NY0TRL8Dd+RhgUe+Uztu9+6l6d/9H4bNQw
rpdgttpJAiN27dkl/DHesxGDebL2XOZxe/uo3gNXzXVga6+vKAlHfxC4MKwv
MVk7tBP+UPfnWXmgaXfwKVMaeYVpsz/LXuss/njxWfQrn7F9fdfYuo/8RAz5
u6GJV3aONCVqpIHL30AWwbpvpmix/C8i62gxnLMCgAxftFVcnY0ANTTKUj0h
+RTQ6uuF0Sg+wyp+vsrEL8ZhXMyvrIzv8e4uq/FuNbjQ86xmY1AKOcrxd9J4
k7Xj/d9tbnZq1rUbvVwI16n7SVnPAzLbQw+cmCCCEB6UIS/zaxBnUETMQbZH
xdow8kFeQcRiGPPWGP1ukGIGEpDERcbmB3mgqCBm+VZmAlNJfoHukBnHnqHQ
PfGmbZOqIhDok3cjEurpa30Djke9tTKO8hPoOxCo2GLJWeCuQLGr3RshPofd
0Wipy4BIhjiglqSvgOElyFpZtAX5voui393uWi3WsDnUEAH14vTVCW5XBR7i
F4cne4fH+53EajkqdDu8uIjsVmQxmtt8kCmTJSxhlJ8bxSLPglBQ0lGMGDuf
wqIx7DuvtHXf2fra92dvKwh0kXBzTwOIRJzTxd3usN0BjcgyTF17bIvFW6sy
ULAhk3CCUZzodPERUS8mn1wXo2uMfGTj/hqvr2vDcDEkPkbLO4QDxcBIiCS1
Svgzxb4PDOkYoi3HntkSAaoCVIAoYSX4HkClFbdAECyq7jyuB881jYdGCS1S
tk/wUiVZNUsRnG6pV9loajMlSSonEpo2rrlvDWCkgHE4i5d4sEvG6kA5e2Fk
bKHO7Bvw9knCNsXCqyhYdOh6K5yOitQoDvlMNBQ5RVS2ySZEroQkA/MQnA5v
kjU5xHm6CmxyEYOS5Y6wJbLAILQIjlNwF2F8b7X0sQHuf/aZkfv2qxycvYBL
H+Dzv9kB4vVbfHqBnmaPEdgVKHJoPa+zYnvsZhgxkvv8u588l9BIvMHumEMu
mXlb87YPq+AMLnvwLu3JX7tZ6QWoQ/aoQxhamOEo5GYP1U6J82/geLHcJDp7
p3kzvcIdwVCwWHTYBZAmWReCTUMzr7NrwtEKR2+WLSS3IB0O84g5JAWXEqHQ
pJjcjou5uEq13RStMowUw9wwAkOpb7VlNGqJ3uxvwUtt0mXdVKm8+PWbkhwG
V8R6FGIbAASR1bKvW9H1fGbkygs0QUFKjDJbWjERjGrJCiy7D+FDzAjV9vob
CzbY+RaOiedecCmStbyf9btJPcadmLFz4DmR1b3dWX4nfXCgRLez6LxImrDG
txjQ2VODeMX2YbnA/iYCgR7cvXgX5SqCMyad3FrERXe087eDzTibpSihUFRz
E9xYUrR0KTHkfTZnUvr2+MDjVYGiwGb8QiQjmNbF79pYLHyVpGwe0xFagtlu
hSY0o35ezeSeKCaE4WOKsxm6Y5AEKRNYd7VmIomB6mW4p9ZwZjM4mryf/eSQ
sANM70bBGXpU9QpNuNM0L28Mk47OF4rLzEG7nsmxS+Y4KyGrKepSAJMZhL2i
KnwhGPZdB3lw/KfDLkeUdQDd02RAQBD3Jl+3NSlQluyqHWwYtmyOBKjDHD1t
mJPBtDG6Z/x8ZnjpFwkFrDdHGFDI6pDhIOP2pS7EJjlApP10hM5YTYE1gEuM
lkukqvuYLKITOYS7jEQxsHQtBXecNapEVHHHVGOqVPzYNr/g2GDLcqvICkLc
TG6W6FBNIkVdIOqaYdGabsVHn4I5YcInS4127fZEQmfiFhuRylMjnbbt1i+R
b/SgxXDXatPTZsEwIWbJrzi/iT0y9SedbTP4SjluPn61lXyFQb4KYGXgFmts
21dfcYBVsh/ba0lLXE3sV+F3q8EA+OPR4GDG6HfhAHf+4QFWe/GfcEP1n9XW
RDaPOsWN25pRs407RtycEUX5T61M7NHrxUbtA/CPj8dpeRvI+34qtosou5hP
BiRlockGqcWGcvB6bMqz29S0eFVAhOubeJIesk/h1VrB5zpI9A16Q5sUjDaN
AjlZigVIYVmNFncXA4Z73Vx2r1H1ctGmWMtSbB9218As4uyhQfGMKJ3dhPWI
z3OU+qdVTKw3PqLn+1BAQG5FAFnbYpDmNiizIfyZjlA9iu6JI1ypjoiBxXw6
xFIaMqyX6Ns4Pi5xWy1xlBlRp1JwL0oqajIuwIRpV05fskYqtu1HrsQJhtBW
HE3ryslULSe6Vmb0UUeiIYbzjJwhvOur3DBxCvjRdTQ4d9kWeTvTMbHmCkAo
UT7iuUccZ6OfYXEv7rMQ8xVshZIlwC4Gvrj5yHw/gsodHL9DeSkWG6JTRS0D
u160FO4HgsJ+zGaI2WwYruyl+5fCIyvB5ftwP9UvfCLwcIh078JcPQMUizsU
y8Bxf4XKGoIt2LhqqNFB0XuMKJe8tjRcmy6z009O/m0OsDov08G7DLcPsZo2
ktnontmU40K8uSCn//00xYx/ETYNSQNZlLS+mTWCRoQ45+m9y48VqUB7ASw2
nO4zGe1H/X9guR//pJJkwTErNqOL5BSZgo3DV6z2hz/Xx/lq66mzfruEYxb5
wydi69H7koEM+HQqQF2G+BX39ZXGeWD34uG3QGZtdz7MwTS8I+Ymb5c/uPV8
1zAOFonKFg304B8dPr3kLSnlrlBNVS9U48PFW4+NxNgXL4PUvWFHhdZeW8b5
Svv6qvfdv+fAFoGJQNFyuz9HtX/l+/6VxnEK2eKbgeFTPgGpn/syN6M+0D/+
vbjr1dBA8uBzx6sRjvMPCh+LL83mJOueJ62pBT6/jegGkfFCAD34B4aP2t1C
ttxGD9dQeSaJ9iFrzFMR1SxwO43r+Ur7qlkBtDRqI928S/LSfNOaor5b6Rhs
X7wV/2Za8w03XkQ0NIbBaaHqjrI9EvDTw6ODvTe7r/fFbwQj99hYarMu0qrH
9SAzDBVRGq94ocmJrBbimbel4hyi81LxHKI86UggP/6HQwfE1AELqDmSxQWB
ZnUR1oeanYmi6aVD0UVDAAWF5oyqSOZ8Mdb6/q96CJx7xpwDQhUrtxCw3w0H
Pbsa8cPpIKVsUs1LlUiotlZl6dhog9Xo1joYwDUInqhwUcEeGoKXbKFAiLlH
Na8tCjDBPH50DKQGmR5Oq4cOl8zKwZkZA5BPDSOIaLT4EbSVSSn90zvSMe4O
HJHvJqTDxjcMcOeClxg+Mq+Sm2I+AivILBtPZ8p/6TwFBdQVZa/iuY5joKII
yP8mSZaWo9sAhXwXKDht4HDZ8aiOt5vMDVBHcABGex7qEwOnHV0M5AEOlObi
YIaV4OoqDQswW3UJWaJcWgj4CVyIVyfWlSRkJRZ00kpYJK4hwpVcpdVfi5Ko
odGV1psWMHCnnywgAk2MWS3Zoglb7+renZqZh1YCY8vFPZxwPCFaA8iJRT63
84wiKqfg1xzWFjhL32XWrGkXGq+K798fiyfxzBv00XlEyFUFtQ4xvCgeOQu8
5X6MjyurIkTJWlsiHAx5W1AIlswfFI9EoHJpdQSVHXM/SgikEONkVQvCbuBz
uP5v4UEXJFIFx5xZ3SWCFHVn5rcUkpNPsGZKbEkcd6U9puaKA2rEcgJVmlN+
ETjQibqkN1j2GcMfbE3rdHDl7cNFRzTvpoZpUCQ4S4c1+PqZPTB8o3OUYTiJ
vdx2Nha7iBjlgAA6v7PMKEOVySI4Tc2eqFwthEE+PzwOC9C6pC94Q1Xzrar5
WMiBPwSaPDFe1J0Cefd/Oj09EvjYmV1EeYZ3i+unOk+tJhEqiRq90pkhpcPK
8DODOcVlMa+A8v7LyeEbrkiw+QgyeblQDWfDu+lxv/XYn0ExwXZj5k+aIKwK
wcbYKnnc38B1PO5LFivlDmMYNOY+41o4IplRxWuwE5pPIYiEcrXdnBS6C3mV
t/1k/z1kibmiAVLcs/JOx0XbU6S9NVt7wW1QJgdJlrM+BHFVhyzQdZIP90Nm
K2V1PEYtuar+OHwALCpSaTl5LX7QgbQRi9sCplSaTWNieO0aVuiySUZF8c6Q
nNLpkA/7UEigB9LNBPsThbKbkhHMYfAA5hIAV/pVo8OMUHZlCSO0fap8xqIi
wLCNQlXUYz7jWeUDw715OXGWU1/09qIldwO6CiIjBu9XXvAa59rItBjqZCv0
op9gaOgIuH1QGtWeS1sueLl0XIPNuyfLofLuSYDHe4UI5FBe36w+TPT0nDCP
KHrREVYs6XPibkJXzww5zRXXs06kGIsLfuIjFkDSMa7unmjR0z0tmv2e4Va4
lp9yTA/A2DMR+7hW89uJChar2QaCE39kSRjtCeKFJnK7VHZVc1UFIP9M0Ckl
6Twz8knoeKGYgO3++oZb31+zIX3s08adZONZsqYUI2gE9wAaOXXo8aP0FuRZ
7g32gcMNHgKcHiYbyQ7czBS7fKVVn7cCHSmpessKPf8pYnMw+AHScS97by0O
TaBPuDJFzQAxyi5mZH4wiAksfynM9NVVK/KmOsiQBGgghwvC1xXjcKH58F7M
LFgLTVRYeSUV0q1/XoenxgiUt0O8yBye4JE0zqkOIstrUY5EE7J6ufzWt8ps
VmKd9DhdTINFdwl8tdVQsDwPpXWmoLBUzQJB8dhRycHQ10cL6Gu9wgDVxhNx
d2YFKNumNiiyrwQrTKwitqYKViwFFMA3oz+zaB4lh4u4W7y+mJ+mGUbVQOxu
2DUgEChkQ6iUeKRPRSLavhxVbW91nrfoTDqq6JSLR60yTywtVWqa5ct5qQpu
Gc0gw6wGX/SbEjWLSom6Tg83VcQ1ITVcWT7GRzJdbTrXb5JVQ3LOjPqx2iUS
QKYQWIOK8EbFpKeCK0IxAvUz0jElHFRJYeViE35jMoy+UuT+h3VhJX9s5kes
D9kSlNZJIIBkctm3y7jJRyObXci2hzbCWYsexq2dU4FQQ0RLq8hLOkrbrix0
BNrmgbPL6aonZi7Ql5cCDYsASOUzrqV7nZZ5CqQRY3gM1pUEwJa5FsK1lpkK
gyzfK5Wwy0rMl+MVChq6hKCYUlAYvj4rZ5xEvbHOdQa1HmeALrppM3ZWHnpa
843Emu8Vx/soaHMn0qD1FXTexFotlOXjTKaCGU7zsT195CaSZUqFXgWdLrra
4Et3hbJ380qqiflKBuyXp3O6wVIbb02XCnHLc2JUVq6OOXAfWgesroIS5IBS
hJG1UVIVOOasFbEzQ+mj41vtB2rpKROal9WRsuvXxe5deZkx+vbt2hFRC2UR
x1x5yAOAqK+GZShGLzwEdhyVW1zyjvWLuFD+pkY0eHfrmf2TSBUlfx8jMLY3
7uOvwT5g0dHExMY9UKqirkKjjLfN0ZafEYUvtgvVLUZKYTkMjSDnKecvUGK3
zRYMhBM/9U8kDiyOK0lSFdXSGtq2fwzkdOZ3A3QFjRqwRVf0VFHCxPIDkWPL
KZK4vM6OcAlQc1d3ElENjAhlazOhd6kpGlkJqJDkE5QVszsBWY6uFNAqvkNc
NhCmQsDzx1J2TesFpIb7iwCuYoUanb6s0OsGFJDKKQ8Qa2sWcSXRzXVDEFMO
qGgRpDQ3r5SNxUssc9F1cOulq/BFqz2VrqHsT4qx2vPbWcastst1FYll8tbO
jSBe3tKL3KYqFatrmd4Sf7/wTIsyCQEDJUBupYY8DAiTwftslOwevOwdvX1+
8vZ578fjw7dH4Lz0RUscgnUT3FBmyxnynA36Tojo0QKlMRfo2uHR6YbUEV6V
g17dwfuWo8BghZs6Cc1yPCzFExynIn8Sfq8SJZUkz9IG3+cheBJsB8Z4djGV
a6auin6NF1vXhRzDrrY0eYWLSQZUEjyUUqYOsQO7u/ndryL9TJnNBZKcFJ+Q
epCgvRyw3UyKggL+plWmMmehEhtJxtMCqsJlxDaw/EiVUX1YxAJXseNcd4O0
LJtFh/uJs3OfIAJ+uE9YFHY2bUYWl6WGX2uFMUNrOOMedS9yF4MQ3kMxqS6D
rKOxI5j1u39G0WoUWA2ofwYC4boEMFywK6YRB8xrdOnCsOTBcDiStBm4jz/S
C9+dFrlZ5SlQlR+S75M//Sb5k/roz2Hnh2/uwWyeVzskL7akEYGJqETlHkV6
kvxiZvpFT/XLn13fbnSYBd8mGdlRw/p86H3nmWblbUyPiPVMR4qd3SDAFpEq
Jt7qIF1VnKKGJHo5krdTs1No1npVAAe3KaLhZoAYFuf/CjdIkaS1FYDOSseW
MeJWoo7iU9e2WTZu0wjpSteTlWOLUEY6MBOZFcAnbUuYT6ADXEbtVy6FuxH2
HNc0VV1zoplfInXwJMXckOWB9PwjsOCaXxelL5mEgEeSl1XS1qBqqeyVaoi4
Eva2crNeO5ykwY2yJ/K9Es89T5UL7aJdqgLa7QdeV58b1X6s9lwj7Wscc1dY
F4DP4kLHeqGUEg0ISQ1TK2/Dkga08AWS40CuCh03UawoSrQlY7BGPJM98LDV
W3bWbSHNcIugHNYaaJoEFdiF2VqxYS3dP71yACJdfjrnkuOE0VYc/E2yj6WB
BW42ad+dDFW1ldJb4Znh8OCqJjsjkwQfQybmYgDDURj6BwyGUUYvd9PMqLI6
89NLdsE3l6ytd3ZIeHVrpfbVUHiKvHgeLU245DK1bQjv3K5z+BVlveC8rWAM
llR0KrZXaLFrnU5/pMPfiC7XHRrUkkdHyEOFgmjN5bOsKwwcmdaIabhmw3BI
vPOmgi00TAezNU0WyxCUrXKaa7K2Wd8pFvIvOSpm6kJ6YdB6rJJnQPSInm0c
aqjf21NrwcVqBEITOeXcJWbW8W+5YCfZGPRfSda2WnYFguhOklPbpEpHKUsf
iMiEfkCXDhINzDBNEPhx30HAEgV0vhye4yVgRR2vpYHDOse6CqxqJZIp4CmX
fWA4KFbmYNGVjTswH25FV4a46/Hx6HoPlTovKqZXh5p3MC+oAdXa9gKEw7Ii
KvDgVzmNF/uv9k/3I5vBvly11aOZIG2QUNSVRHMQzM+bdVssJtHLj3KKV5Jk
WGR04SeZM6At5Nvd5IqsF5EBZJM1j0VTAVXRbO+298Ztx6LdJmJv1IXjjKRQ
cIAhTOPqorjxkOapXjuhlKIdPZZHnl5Zb+ebCDerGrggl6G3MiwY3ym3HWu+
00PT4oaCK1Cgj7HKs42u+c9mF3oXwm9vVHAesXbZCMqaFTgHjOTE2M/GGt/N
SkjMhWVoBaq/g9kzxe01WkRcofkG4ZXE5xVksystPDDKmIJWIz5bd8UBkT5l
Kdw+6B0NgjvQuhzPiUVJSwxJtSKQMIclwuSffYjid+HCzva/InJA29bdfju1
OAeMqwqkrTCaAAK98st5mWpa1yyGktiMO/BWooRS82vFtlpiN+b6vNw/3ftJ
+04b2GsbZz1VVl+/cmK9CmrouwEBbFnPsp3MCZNhqygXKiTKvY8CSC2c6SVq
jHQWANTjud1LXMGrpXxb28q3962VvrwYgOGGr1500u89QwxtuMfUkP9CswyP
oR8w786MoJt8a9HXTxJCva6xSsq3SeD/8GmxPx8swUw3hw4D/XMo56C+6HF7
jPor8o159b+t0UqQcOwk613+k+/TTrLBn7Dkt5Ns8gfHGO+8xX8RH9lJtvHP
Ds+JJ31GJ/198qdGMMZ6mOK7vRRCuSkay5YzYAufEGGwEpGdZ1E+mGRKXc4N
LR0hNjozLhjyIC3KzGizKthXdcZ94zCampzWycy/Y9Q+mQghEjts+8g0MYV2
9sM8JaduEM6cBrc7CALBsqidwCf7VwlGYl/sh/s6/0NupWHW1hgnvZ9CLyEP
0NQd6VH/aRAiGHRI2urXWvmIUKJsOeJuY0/XwSRiaJW1WMcmMh7tWFs1Vz83
OzrLJypOsv9lY5LTzQ2nSs6xD8a6AuoFVtknrUq2uHyj3Hn//TDPqKO2nyRY
hAjjZp153lz+Amgem1dFatEU1OeYTBFb7DJ+yJyV2NSQXe2iCnw7fvJRPDAE
4Lz7R1uYnELYaC52CtBkUYx74ruMRG+QcxqM0nxsma86in4UfnLkshYyzaUi
OqeXUqP8dPfHszdvXz/fP+5GjUGo9wVXc+/l2cELu0J1w73ALUNPOGCrHvAS
UpcwxJlu/9OOSg7yey4fSI3c7DqHqqKAxpdlOr2qNTBecTtcUdsSeDAYtOXq
9M3aYNbxT2e7b13rm0+euM5dg5n4Kg1EDPzIhChRzhHY3R0W/cRvj2w3hseg
9lRbgeSq+Esw472kAMdox2ULSRdxIDKculPaM2u9rWzyU7J0lY1TqK8U9hBq
kPa127Ux7P0UCdApRB1eUJiGaGWQtWHz+IQZiL2Gn6+w+FNYQVNGIOaKvcYk
XBFzbnwjvB/U4MdccCUvcx048MCa5Z3Ee3R4chpKuqpzZiJ9PeuJXdC2oDnN
Wac2274ALOVKTiTLj7fjMYj4AxiiuOiZfyB6NiMFYO2oOOpghzveLk4L8TbV
VfrOzz4Bgift/mpcQkGWR1qZVu/OSOec3a5QoIjAGmehYX+b3e5LDzuJGFWd
RPDJDcOBKXJta/sJN6+QWSIzGLBX7w74cx0XfFRmJ9DXcoiTmotSKTWHlvNT
ZhC7ZSFbDPoNWAgSZOH8chEbvDzih4MvA7w+VjG+uExblVUHf9m4T1S6VL5I
cBIWCxE8PNaK1vowO2XGem7gv+zaY6zJES7CA0JrzZGNRpk5tVU5CiS043Ta
r30PeGj/Tt6cnZC/WHRFMe8kLgAMnkHZJJpyTr552cFT9P5CRhM3L258IzEQ
HxopBkfuJ69SKgCfTbzsZJX+6GzBLpAxC7fndpZWlIoL+hpcFEjsc3cNynyD
+lLm15D5CJeOYxlcnFSf7FpuXlukrO3G2czcSZS4+LcYjpWbkbQfKzDmrfWO
WDlWgd+cwcCriWujbelkDaeR5jl04t6KvmDqRqylozfckbA9shwctK51PSFt
JglKSzq5AczWKuAVra8SQRuuyQ6Hbr0pmgbIPmJGhgCerU7EPCBeXetQF8nW
DU3q4qoNnYbP09HlKh0OpnQDppBwbuXuld/D3yuQ9DYfT8S5yiTApsACIxhd
GtF3djW2TdRXsG31rv1cBDXD1z98gO/67juO9djqeMvT/VudJ5Vjs5IDisKU
OARaeFqqrj1CZGEdg3SanudUVpTDMUTCtEtX1iSzBwWi+WTIqunKnhpHg+Uz
d7zt79jcz7/VrvF7oAcoWvNL2CXXNTVeCjpBao7VfOzYFh8Wgg66p0HUewRy
5qs+fsWAe2QBB2U1zy7Gs1VE4joGv0rPs1F8vp+yFA7WJfvU56VH+u4Rnv8x
5PQNoJ8RhmqR1VnqLKZKJ2ssAkpQwttnFHDsGmrkOS3skMcRAaladpPhcmxI
wxUIE9dWOW3Jp9IjyXl2mS5iJIUjRnj6ZirwBA6SwRwccmvIr1ikNtvtsHld
AYAVjNYdu3heROmfs3OiuNCa6efTqkNpjz+fGrZhtNEKWqjBV3snFYeFPd16
hp3k/tB/tP4MC91SKLGBPHWae7aJfcZwnMgjyuZaGcJqtMceqxg9eBIbjc6l
4x9uh8qwnBMb5K1yifRUuD8eyS3Vy1B1SDnLOfXTGJzaE9NQrMuK3mkIpiTJ
wsXiuWx1KmwZY4oIE1flzTASsX4JkyaH/55XveMA7HwXqZeaxImVuXwllZ5V
ESAE0xJFQfxQoMoxbk8CcZElUNpVNFtzFj1Yh/1W2c3JgiNWHWvR9006qLuK
AqadorYiRs7xFjNJWJAcTeUbpd6/1MQej96lU5TFKLPc0Jb1RWfRpGdb86im
aH6lJkjQZcu3awQiyEXuDK6osKZdKpGiULbRO7yaS01j5ffrWD3OTfoQjfZY
06c+PaqYavamlC1XL8mOxp3bqLqyTuIoMwVt8h8XQH8QlgyuhkSryDQUQ7Th
hCX3TZVditUPxoIMOKwJhaR4DD2P3UZVZa1aeQBtLfQy6mMWTfaqrV5SJaTW
gO4OLv4JBUCVmCzXldq+tBZX2cLVQNYRVmIWMaPa7fG2I3kTYmLYevb0sdRP
2PduDnZaL9+RAcus7e3BsdFwoJ/h0enB4ZvdV7wav7SE9P97RkN+5BLVPObH
5EXmIk4+JocOF6j7gVeOz/vT/6uHT6vrYr6WNfbROkWlooRPqovB3W5qse5K
yHXHXrs2fTMRXcQ1aFjJVKyTBOtRNym6MGctiWcBhXZTOxzM/+P+aZeu45Jr
eAj8uIqvBLG2tSh6pImLF1UbuYl2lXcC1cPJfNy8SCELUlqGzay2AuUCiC65
5OXXCuT/4ZvDF/vNp+wmjGV5IU/RteYTO5ohFXVYctiOt8A+44E7G/PRsotG
tPgMrMDV67W6fXqrrq+tZWnA14P1iIlSGCIDsRpcGUWXZCEu+O7VY0opDLWx
EP+yu1SVFwXJvhr22OSQj5acRvHGPvfZ6Av+35rcJH7g40gA70oS8fieOvDO
MGPfDSUm+mjFF+XMxD5rn5MxGMZRBK4MThTB4gAwgDdpkBQRiNqQGKHEEThl
sX42xYaRjMFy9F7AiFuL3mz3N2oOXuxumJVlUVoHdNCzAuyBGJ51S8/1lKPc
qX62UIlV/srCyOMuOiGeXYa2fcrR/hz1REeRgeCN+wD1v7IlIS3irtLq8+Eq
28+VuXxvXs3Mlo9ozUZEgDWzkLVqbw+oEz0cZRV1mUfWk/8vbJtLXUudH7k9
A9Y+rOW5+kXZolE9aRjT09bjs5+ccPyQT0yQGImNvxI08ZM6Ki6gGgZpDvPL
fAZtG8xdTFE/BR4xVJZQHrjvtVMbG1ii7spaq9URHBVebeP3iHzQRW6OUl2Z
TYsK/KO32NWF27dUTbsts0GWX6sk5H7yE4RmdiEW8l/tMdXq9SlDtJfdV1jb
yML+KspOLY3qUjDLgjx+MR9J/qlycPBi6z1inChhLVR0V9ahqX0ixWEk/wtf
QXePY/aJaoFDxu9bW6A82qbO6iyCLla913FmnhVaY2YrEVYeZ0ODwtzAX4ku
N/QLgSJVS7QMoZYg+LO4LvZHeZRKelPPFlumC3R+qWn/w8fPGJUKoMuoYk3R
wz6406i18Cw4Va88N061sCr3fSZ9dqtE7vxaEVhE19auUtevpS91rWqodepQ
xYnUn1Y5iDD2iWhRHfcCp3ZD2lowU9yxHVGznBOK22s11//xWAoFlFDekdzS
gRbEorUBmKFKOKz1SUrujdQJUtE/zVfSA0xYweBgZgfjKGj2PYrVm/2nZKdX
nCUWrESlpVlO4OIU1vHrdGQbpP25uYosT9AC2xNZ65ngOkneAOIym52h/srA
2P2jhoVfntYvN0BHo3JHsMd7OqHKKF5AsjOWN6m82HCT6W8/wbx3aFMrmc/W
rYjH8eZQH1hf6ix4tQtsNQr/G3IOUILtTLzdnIJC8PzLZD4a/SVZW39/8bgT
+imVlxVskWdGhjN/rErGup+AL9fWgGJeLmULUAA5x2pm6Xw0s14ZPIRf8LRW
dxJPZwgrN5BgakOW8E180R38YFJQqYIDXa7D8/D/crZXd/Fzkqnn5d/79b38
miY6r0eKSobsBaZB6xOhJ13HGPh+OSNR625gnBZTBt9uFcswAxPiUoIUzOd6
iyHUav78VXVoqwgp/YmsX/swtKP/ZUvQFnvI8dKfgQS66m8aELnMRtl1Cten
yqWmOXKg0U16C9FYM1RCnPwqishycjAq49wDDTjTpHCVEfJI6JlbH6gmjzt3
c/kgm/HbYCa2eKttdeCMrNaeyvUJb8UI6wfJ8tNY7k37cQm6hscZCoGV64Ll
P+lgdFgYeaERXKpTWE/SnsMf8BR7uPHhvr7fJJxbW6tjrxBqSlVDioERUChg
hu6P3RBemKpZEXP52Z6oLK3hdYNTYny5rb17WTBfxJp7OtWzXkUqoWhRSJ2y
8bGxCUspsvK5moytg12boZpBXT7XW7BtQHvm+lRq1XF9sdn1DnAxyh3nrasM
HmMPRspbY3xVod+B91qc04o/xahFbqs0NR1ljMU7Qqd1oivO0ZKIXuxCwufR
Ci6Gh562zwGztWNAsihHi33LoZw8lhD89Y/jy2GUjiBpVgFmKZOonqwrRYKG
85LUiymwURIm5UGp9Fjwrb6rQsIFB9tjTEF44yCFg/o6V6uWfQXIaimfjqGg
BcrpOsebtc+4qBntpg9rUU7Yo2NLyypXj+OVKk+0edV+WX4tfS+gTiBDD64K
TKorZpo4pZdQnQ7jmZcgT35pu1E+zmcMk79mMTRuPh1eDuLs0JDgQgEgXsgE
D6OwnnM9zQ5+4rekabhrSq40WGl4y23zxh3LqFxNMc7RhDno9VqZICOnb693
vq0toy4hwXgFOcN9wr949Qvnb6Xcixfmk+UawfGooEy0XF9kQjkSOEhCVfTa
1v70xhwbnSOftpHYoES+i88I6tXpzFpvQ5avtl4FFbxCqfYSqcVugcGtwets
8K5y5UzxyuDBQu7OnIv4uZzkfCZEqI1a1ZNqfOkjbNmMktoR0ExU4hzNlCCR
6Pl/uA8KhRx4XD9RSOJZTZqTADIALNZkB+VKVXhh4dXbCZMmVtJrMc6AWSrO
maw4ZhY3SVBCRgR3LK1PvpztThyngbCrxBM8JBChJw7wRv+kJP4LytuKP7Kn
auYSaFxgdrQXm+I6tYy59sjCvKqHrDQQD7tp3ASEIIO5ilh5KJrvODnDKd/W
1u/Zz2VSP8S7JtxsQv+CNewEkA07XvVx+Lohni3aWotzFi8E7a5zwBBVB6Qp
mv0K9cNRntkuaph70ZIBI5KTN+JNmNkHT7QlpXxBPgryRDywnDjWe6ySXlpL
Wx3TfXMjmxofPVl/JLX2Hklk54lni5VZeAp1zLg0uYjLeCekfZFlsZih9n7G
q+YwqTT42Kz0r1lZ9ACFZleGgW1tYvwl/mkTSsla4wyWFiIjCAFOVvb/cHR4
fLp/3DNn2TsxV7q3J2ipE/B7RrQIysDPRtWZjNaUO0YlPDEEO7Xd1LDMnWFn
3gk+2tx+bEYBZAnbKMlRd6UDJaHc9ta6tYX9o2H33zMZ6stvwRNqVADBxdt4
Kn+ve7DKGH+GC191NyH8gu9CEtyFVcgdoM9W/zPcBT5HhnrLXdhafBc89Tin
7j1cCCVo4+PHV3jsStw1ls2yubaBewnqnZ1YnwwMBK94GQjaIEgiJjmMscKg
V7feLOyCos891yrpQWQchO56bwgHLWabTYrIobOMjDICzh0pO38/8Fla/6Aq
bvB2ipkDwMpjqpQXnj2gWiEkoi7pzkJkFP+CdcjDvv1jaZTElSUNShs515UT
ccFXTrWDsPlh3efTpkNZW6y0Q7mDKoUysC0XYA0BEcGrLi6jfwJE1XxiztSN
aQu4+PprWFvBobF3ERoKYUfkUoNRC6pnx17aa39JfA9Kgo2ajGqbBafg8rKu
uO4UMfadT+3WNFITWg5QIjs8TUKH5wRSenSPtZisRZYiZyCytqGm5o2c5Itk
02Zy/02vzWeZHhS4QVkhfWVW4LNYidosBDDBiC2XC2yoEpHpbZo7I1v1hVLm
MIsnALNtY42quGUS6HioooXW4lRRwOQtg6vDL47FCSJxBoVy9Rh0iw6AJBxX
K4zYOcM9fnwQsTPIsoNaNj6fkDK1Eg2RV03RDrh95ISs+wf2Om7aYFn5gqiH
XrJ6+W4GPk9koSRa+ohmEwxXMMLv7Gh+bpD27LcYGXz2msOruZrs006tNkae
TtKeH1JohtTFUcyfoZbco0/bl+WFd7ML1TYMCW3b3jXEtVLmhx0eC6mJmVEB
nBtPq8x7B+2APCRQ/W8VpzhTy/esjTaC07kOo/Ws1y1JhEWgpeVAW0FTjJT7
Bc5BSjrH6vtT/Bx2IsKQVi8TXsLm2Pc8q9nOXVlGIN+1CVvw0EFmx44Bh2pw
zWvatZ2snYiLodPXj1LSa9DfSxU65Iu4u7/7Yik/gK5zDLU9/ILC9Qxs/PRO
qcbe8p8DITj4fX0L9AV0woWi5oScvzfQNIi7xi91Wg9FLJBmE/YUvanf1Sd1
bhzDWMtbSgZSp582jpUPlzmFEDWkPqgXQ++Nneh4JRXaSWHEB6o6+Y/5sBPP
SOsG2aGWKqMdz43pkL0BM8KocnstddY2wiLQTBKzuIZsuUW9UogIbXVqlOME
rOjlwfCLyMfGAvLhLAGrkAGMmfcHLxaImmE7GNHIdL8RNzBMo4tv1FrE1Vyk
OpDLjokpjBD3ZcT3enxNPUYGR//FQVFHWkA9qmeKzCBJcLu3rQYnuRE6tEUl
RkpsJRUK5cWiTejltp1F3MjIRMQ7jjUnWhyWLrxmBH7dWT7OXFk3yckCxKPT
vEHG5Ret8mqM6vGwPrOf3WMeQBuv/I21SrwNwpHI/vSmiogQTBigBeJaAZbg
6BuPg52t1RWcrQEVmV0Ikcfp+3w8H4ttUiwxgtrhx5pZYFyYlT58/tFNxvlk
Dl3SCddJ/VDNM8mctLt/0tvbe93beNx7vN3b2HwKWwo4UfRsiWgEizeLs5vG
HTyhVSvKYKsvfAlN2GyjCWF3roWFFaoGTSrCW796bQiHMrtcQj2nkhw3BtS2
g5Fn3+nq2gLLlVGA+IN/5BIKZI2SvbA/yVEfkcnI2IVREF+7zILU6HCIauuV
fAmibi2PqCdWw9/1ZUCIKgOCZXvzLYOoX1EI9KrrVF8Eju3lwaFCP3n1MQDx
7uvMnmrX2IIlgUwPZci54pGS6kFKlFM/w0o4tYI6qqwqGqtrlXWWLKYT28sd
y+XU6PNXLDXUr8MEvAUgQ/7KgFm2ytBXAOCvVm9I9P7JfFxvNRxkoLsdejaA
uiMeTQuo35NIk5Pe5UM3GFykQNsYA/MQBuA498UYFOCZ+vWgvi82pPaSUXQI
Tw8zK8+sGeSMHYNNLyEaXFmTxAr4i+jtM/IanaHXaO3o+PDlwav9s9PnLzrW
u1JvUIx2GJ5SHHDP7OIp3aNpJSzVQWLIL5wZokjZTVq5J+uByzXRXp5Vkv1B
2B70zvURmu0XZnfTLCt/OcNKMW6PlNXC0V9Jdg0FFi8EEl66CArQ2MIFMwla
wgPRxqIDQUJY5fX+xS7v1esuda5rFGrm5RqxcOueUiLzQURFmYArCesGuVVR
H18Zn4NgRg8OHNFLsPBgGU298WCuEpbbsEvNhkvVV2AB6px6BonKVmlzwHPC
tdhZfSP/AhEwEt4Tnioqlo/sZXo3HLBXZMGF+tplFsjpuahFq2/MMRhxCZWE
460/VEmG1nBegMBTHwCUf9N26A5O6rrdfRcpq3RvfjkD+CwuQIqOkV85OclB
wvNG/g3Agciv3Wg2Uw2rG5BDu/qsOD9rEeBRiOTa++HNigt1DjgvHm8pv5yX
0BBZUryxXiOGRoQDB+/gKm9YTCZ+Kze0iXnkrm6J9a+uHEFuLPTIxV9WGi57
yKbFYbOx0d8IG4FLwypMAayN5Hs4Do9On3WoivHkluuAudj0cF8tRj0btcjv
SH2USIaYriJwXvcuB+ncAOj1zh3qYJA225CzZfOy2pK3Pj9ni/YeydzaWG9N
3VKhFpQY7gqIq0oJgTNQcCkdDrWlVggY1OcDzFiqahv7qqGKvJUGMDFL0lC8
ekiGTo44E0BLD2JdTKkEji1ERB1AIIDJgniZyk2OHFkzhuu/4DW0rNxczjAv
Zmsvas5meVgQtGW3eCTxKq3C0XVsjIKDl8zWmrFRt40BDcdYX8qVAKd7c1DF
MjEVNgpBRdbkw7sF1nxr2H/XSVNduzQPQDZVCZdp2zV4VVziYfEScE6Yam4n
xx44dqKO2j/cRtDamWbzKTUXkw7DgitdV6SpGxrN6YNJdmNt9sC45Fi1M8RF
9UUxLuCI77JsSjYeL4tqOqRWZ9eQsJOPM9ULA43KgQNrIeK2tMDipAhwZEkr
NLis/FSZ9eqGeFQTB8XlBLsrO3EJfr3Oy9lcYhmulkgZQxkLQ4opi3fA6KRm
5rUArCq3Qo+cIBNX/aPm53chLUK/ao6o4OpKKH3F4YfO6VCPIYIltlSZPai3
UrOy+3k6eHeTlq4NVlCDX0RViyeWdgdtlqIl7QhBXZKr7bfG2K4JO1dTYNyX
9Dw5l7WIB+gg0pAmmuHLVmS+G23BF17TXBDlCsxiA0oqZR7aAyQ1g/TWIpTU
FlhopSCO2op47nF1l3rFjrB64hVXZfJl2VgMmzLI1Bor1ZSDRnqvRaYNKcLF
sab7GEb1k0GFEayRI04pXElEN4tw0HbmVswO2/31dYg5GApH6YSBuyDgbHcE
r/z43zDiA3PJVdrK3zQ2zrdSNKbPf/2VdVuX9TmRrihTTWyEowIwmCuI2WKQ
N5vgeyquZUHqpdzYyTLhfhzZ57L1l4nxQ4x5Kg4hWtriDMx/xKO7U7Tl3c/M
Cg8ORWZFmS15Nl8lFNNbBs5euTzPxYuovs4q6FzrwdaL0YJ6Bc2UrYRaWKv8
4ttIj00cNtTWUKVqLIm0uwSp9EvaRSIjwGSAVZu4WZjAZlGdLAnewyA7HQha
Sbio1dDtdzCX146lIbsCLb2qKlLooVxseEM52lncgonEIOVXsZKGOxzzm5kp
SSMGycSPGo8JIZaZ0Y1x4rxbBi+vim1evmtP6BW+zX3avHrIrMbYeUBgMLjW
WVJ4YVNfzdKXnM9DMAGqKlHDFyzUowKOaUMItfTJBGu6QQ0st1IHd1jPMZAc
IKHEvPWov76VrJ1k5XVuZPK3ExtwULsSIBRa0wXWMmyoZddU1x5kKSW1u/T8
kpqxuPOYFDqExsVAwBJQySNBzi7NtYUOqtax08+7lJCVYZTjXlDhVV3PMF57
yWq0VEk3/8ySrIQBPuMPS74GvsztZG3lTeHFiAwNng7nhqcEysWKrfWKhdc4
LvNQd+a0zQ6odiTJpIfnoo2/omCzA1XCjzWQH8kwRUNSIHny2lNqnD724b5B
k/KWSitqCmLbRGh+W0aqK/slM2wNOo6F82r6nhd8BW0fCfdHAB8pIeZI9upO
oipB4xr5otW6YttFxKrlx2hTrJ1E3aItMwhfSPZ1kyqJJXCBHquX+XA1Tucl
OlXoILkfCNwq5pWNzV6pHE51+9RBAYFed8+iAVHEebC56ohF6ddxlatuHGjd
laoUdqdAjdBNpiys3nE4G4E5GDwZr/B75JigmHfskJAy3bnWPfIlv2C4y9n0
0/sQUbPb5AXERuSGDeSF8p5rg4Sf0BFSk9P4OEzzliRSd+uJzHtiKc6FW7TP
FmBKLbtVzSmFRMSPlaua4p6IEwRPBwkldokQpREQR+24ts/FQzXib35OpAbP
FhEXGk+wqy85PO0htG8C+SyDklTNvGWoO6G2JvkUk0xXTPJWYl1gtl4FPE18
O0UniO0gYVfnxBaQ1iPVmqUUEPbeczkMqpY8Fa+j+vFacqByIVCTJlviNacf
2uu6yD0lyr3tHMApQ+YI54PQDEeEBWR5G5ko64O0YzAGs/kSAhXcM2BfmjiX
0ehWtpNRw0JpwtNAAx9KPVehPlKuMQ0KNi6h76moG+t+46NfunEQEavAc6Wq
6MKYusi6JdOGSD/0+Cn79dGULX10YvwejbQLo4qgPxQYnZkth7itduyg4DwB
0UJPOrY7UDtVpd267c+yIpkRbTdh8JDRccXe6zDeu45oNbRBup4Y7CmtoBkU
Uk9MFQ30g6f+KxbqrrFQTTcSAh13PkcwWRLZf+3uPW17k9Yyf5MNLtNPpv0k
PB8SrNlfsVppo5im6sCc3yovf+vWwh15+Tn1BlVeNEyQXMSV3PwgkFyVj+58
ZfHzaZBP/JXEz3DYv4f4aauHN8la9eK2jNVKJNKr+XUl1rvLkJ8nOHbb3JAO
HdckWlgfh86fbt54578k0P/8EihYgY7dxUmTN56D3Xz74b4BO1QBMJdwkt2k
I7+BRpMgQ0wIbOl+FBJkPoHpDjo7YUOKJHt/lUJXHkUnTzgmIXkzZ394xWkN
3DQG1opN3CNHLxaOojJSjVTA+5lQz5zNlTmcbFKFjeXJKuv4xjFt1pJWqb6l
q7tGCjc87W9GSC3WqUD3nFhVsdNqrHmH9Om4a2xWgzk7spU71yx62mxkENqe
eCFI1HS6iBUx5wgk5U2iehuY/6IEOQszGVP8BRVawuNMN+gaWA+U4GpLVCWX
Ae5QgIXaIPRTDj6Ejxu2yxYvgXnjAnWV7GDbZVb5Ogz1/cirwbyq6lMG4sHJ
T4dvX72QKqv1PeTUox7laYokhDDU4XxEEjXXkyfzdkr5mRdA5ROpmmlzEG8p
w9fivqJ0rvWapWxe7CA4AA2RS9EfUlviwKY78grRmIOLl/5t8KYoUvGJ7Whm
aXkxBAWRN4reMGo1DEo0oSE5PeDCgJmaak3mdQ4FFk7kdXW4+uGZLUCd1ECo
wOwwgg8SFBOcREv1QMHc5Y5TKSTtm53geg2BXRtYMvMgJ0s9mqpmMiBt9An7
zDEQiwtM003xVyBq6lJyY8waimbt1+nU2Y15SFtpRwQTaoXsa76hnNIYq/2Y
Wi3ZrF2gs8DenMsGOEeZIaFDg7gfXuADLWybsUQdCQPR4P4i87FJ+/4E7dUI
6kUIUCn5e5QhiGzpM/yQX+Q4DKwBnvnkv7yIS3sR7xstZUgJlLu+uu7amFSf
Jf1xu85ZOlDSQmFoPd5vQv1lOu8sZ7fsWn6fDjwrhKeYkPuctf1sMgwlw1aR
DQPLvQjYO0XXU4th3Rvcb0S+3X8WNkLn9kBWoNKpCb5epJRiLXOoGAkGwgKb
jAELG+T8Pr+uuZyVB7F5WYOnc8meP6IeQWdQo9UMg0kZwVRPBkqX8dUmuyC/
+hGcVjuKIQPdchfhVZYyuyUHuFWIyAU6oq9ZFVr6CoD4gVFuCpNgqGxZg3wU
ZYPWgIiv3BQ7UDK+AGNbkfVp0MXQlY6XXr1ozy2zMZb79wE2nHNF2luHvGkF
OndDz8RHPmXFI+NjOhYJ7Yg7q3y4b1kVPGe/lzVwTwJrk1MqR865hENrorHx
T84sa4ZT0cP1WlZiGqGwiqD5KVbKdBmcTpOlVo2Qlh/TaT1W2yj7N/ecfBxw
pmMGN0occFhmZ5dQ06Iu99rube1Sc1eiMvwo95qxdGrAkQ6uRKvP3k/zknN/
IA0DE+NY01RhZbt/rAnJQCuIHjDudBMKcfQso5+lPjgNW+FFTd1DTDnPLrB5
5ywtraViqAx8O754zh0qDRUaU/RVUwmFttgWbzCbqkBoSneiVqbNI6yc2pf7
fXvrxeO83XZtKVBWfxflNeg4pBBPJyiJisNhrcx6nZaKZMo82BDRYgVSZUnw
RCcETT5sCPfPYyldrnTeIVVV9JodzwrdmdKDlDNC2Q0rVX/m3WSwF5ehX0gv
3NM+0LMnpu6Jsn9YGtGYg1rV814Dkv44lD6Cm+QChqi5hYiWoJ6l5SVUWsL1
SbMSXEJXJRdP0xyT2ZZuumt2hw3HuITrFK7YYD5Ky4hNQUw3dxL9m6J6ryx7
VsVfrF0SvvDjN2XyNmdG1F/igmgkQ0OpDMpO321Rg/EplZfuaATXnFVBrV38
XQoARJLgsXdlmIMsPu7mGdgPi2+D79UrLyGWDucf6TbUWcgr4W0GiCwjoGmx
dAHwQjSi1eu079/JzfYkq2ycgijol0iLniVdVKispAJ0dLZIW3EK7XapbKYe
r7yfvMrfZUtMTpBkJ7bKA/dS3O/WXVM4K3bec/GVoNwwm88ntTvlAkyWTJ1H
wZp7Cd23yWVHJAYZuO95F//D/al8c+aRhE9872HmYZ5eGgCAOe1mQveLOzRs
wdVae9EJeyvXpC00d6K8xWLt87J4B/HLtgKC6H1vrdrHXZSsfsgrrdzooUPC
HDvAJ5s4WqHDZexcJOmpWsDy65b8urX1lIhw2NqWBcO+Ag9iN8PIQGM/Co2K
1jEV4dNL5NJJlbidrlflnUGjneaWnB2eEw8raGRbnmlNzHJce+/J4+0NrK0n
rhRVTK/02m5gGT2ofQJdR9ZeRncjsxrstrUEIwE0dMjykk4yukGrU+NBYo8J
jpRJK1uNhTqxMSKrw3biO0sVfhlN1ej+35M0ra4vv7n3oOd+HiT650H840S/
0Xvwzb2P6ruP3pMf4x/7f34MRzCj4lXq9X74zBE+bw3ugoUj8PF9TL7Dte13
cI0fNeZ+pTUsMUIP1/AygM9dRmhdw5fjg8ayf//m3oed5L5QSaNdzUbZ9ysn
JHsJUfZJsSSx+w5yB2sjHZWGJZbveukov5x8vwLeFPMxUuoPHy4Mv/30STXi
TaB6hKNe2fsUe7fXUtdlNR7572OEElwly4cy7hI2tCtNw2R7RhiOTed7unz9
CZfG7wpz+EMHGipeeaUUiLKvSEMTiVFGBB2Tl2oG5AiZOxOmZThQD2mVC8mf
eUCY8ICb/fVHyRoLxJ0alUxnXuRTGkY6AA+Us0OjDnBhON5hNjIiiQuZ0ETV
rZeeqhoX7YVltViyICmhuPDX65qDhr0dGAaBG8tAYtOQOFyRarYX9jjXQIQN
Q3wFg6SyRe5EErVfsXsFDqG+TeSnaA1jkXTszlYKxxTE0zgUXICCz6ZG1gax
bbu/vp2svTEi3ctiPhnWfCq1OAWXNkD8N2RHwo3ceTX9MEAiPw5ffDrY9LPw
GaGGyTo4k+A+TKuHAM6HG+fD9eHjIdLiH5YZ52ut5+N3RGapXyO3a0x63s+D
Zcb5WutZZpzvCIQbKLg9rMPwwR3WwwLXzvoXrGfhA8uN88AdxSPR8/VR/HDH
9cjWko31dQOsO69nSXyGo9gW4hY5jb8DPhNBZHoYYPM/Hj7LuSMRtDQw+exz
b1tPTZIC6UakqH0nybQKVKzrGZ7WKjqBF9ZphYaJHCmXwZEVHU5RdHgBXOXD
fdIChT076m1DLJ3Dwhb7jfepDV0UHIHhRzs4Jh/aDbckDK5Fnev0g1aSvoSA
NXwz1ztnn6I416WfTVxNrrUhs/t0rt+6dwajMra4gIwKF029Ktzc8MVWYffK
jYrdGMoxk81LmspE6nzLosyei0vKfLDdwLHziTO7W7tfXgs6dtXfgpPGyMg7
dFGuVL26Wg7uwFwnWDuEVzgTeHgaYRtUZa7woauG426AsZ7Me+FT4hDZ9Jq6
qKYfq/OJle1Xg4bCsRWTG13sCTGPf/Nm/e5MtR0xJMWU5Go/2OujZHkNeyUh
8pOkGJAp3SFZ7frFoj/TiOFjoXrQDSwijnKEDhFXlmmps/qSo2rICffObNVr
quiRMiZNlJn+qYM9ReF7uCWjYgDVRmdFaXRJHZ5ZB4GBk5rBLETVeghRoKHB
HIRoUI8/aXNxd2h/PdhZyij0sOak/Vw4uQEcmNCDTiHoLZcyorktBJpRJfNr
ci6qHAJltZOgB2cLd0VYoveblG+KxyfQkHemcuVVa4cgTlwwmCv/LvGDgGTd
pUdanTb6I9b4XONpusVHcKhp+WEbLb8Fgt/VYtjArO6wRN1nzNa29uq5iDP7
RVuvsXi1YeUL4VhHRBKvtNER+BMNqnt82zs1NmXrJcWzFmqhoWS8GmUpsmHb
64iGxf7VJz/tvnoFjhyKkBmSex19ysJt3AK7YPrKprbcktwb94Re9rqyLEmI
Km9Dx6euv19fl9YYvgzJGMKt8DLtiA437hoxtLUUk2rxcMgzjhzg1zQXC8Ir
bLg8eLSLSEx2rDxidCcSb9Gcd8KgM1x3w7BxjDW4onAwakWKxGESzS+qyaHx
62ig/LNE6aoQYsqIqdpSYqL5KxA3LmK7NMBWhNAr612n9gY/RoAI+WjESUcS
vBIgupRbzWefkTYjB9SUVfRJqkzf0DrwoFVUVj1+oik6S4WpFKUewk/XqCWA
ePHXUeQRlG1EnGZUVuH2SkjRJGhJ2TdoulKTQluF38QLnZD+QFwCsMYc/ITA
O3O0xrZPzW1A3GIivMpfTpRDqeL6sWrBiU1XcgdbYC2kUA9GAtxMxbpCkPyY
7MacyYZSoa0BTAIJe7Q2/iPYalQKZToeU7u4L0A9fN2qbl2fZGidspb3ABqg
GR2etXFwAQ1chAgqbJ+DSASJ3erPSCybc3LAtJjOR6kvpTl0xorw2fvZKqek
rfBAdiErfXnyvBjenilUoxfoxEtieUOtyTuJ/K7yOOZXRG6SXQq1IvuaS1mW
pixemwFmVhql+SylztcYsT0HyQrDTughVndXpcHjIJ8aDIGDaIUN3YPzzJyh
C3BddS+vRntLq8EtQlMFb6s/ixbADjc2RLj3Ft2F0MjUXcRJ0ypo3dt1ov0b
bH/SOF8FfDE1MmIPI7JgssaNoGlhlOaI464CugGruiV3vCFyJu5mtGKi13fG
OVdVQBoi0mfelmXRDq2lCroYpB8A0sZEVWyjJLBXmEdtYGpjZu1JUaMaG+In
Jyrh4Jn9sxmjVbqytbkFHl+WdqzCiSW4wdmXjopLqNwv/kPxJjctlIno4cne
4fG+lys/KwbFKDTRPrI+wKePN7Z0THnQeNUMMJwPMKekxGXOx+2brqvPguF4
tykHUVzGHLh1kV96WI+L2egnr7KLWW+aDgPdJ1k7gs7byABBc6J03ux9OgAD
7yPVknUzGKMlc49sF7YuaTjjwYuztknhcQKa6xQb0ee5Za1a4RY6mqGTyURO
tQIFi9+naZM16M8zuRyxunbScYqt2Rpoc/ygUAH+1HyEs2z3kz9Aj2ynPNk7
aXtEVLNM1cNj+3XoG+auid/1/N3Kvp4nvR8gMEcOAVxY5Lh9EHqS9GcPgo/Q
CXkiThnYC+AcO2p4px/t5x8T/FvevPts4uBZwk/U4BpKvgtn8+ETfvuDfTO2
0tYfu9qoy0q8FNF1mnnXDBp0vmTW/w1gxGwivk5c5IPPmTPmIPTomrgKFava
U3S/1R9IUrxiEtTUF2PAuad62Na6soyD4MwRLwxto7KmWEPtEj1tSP8mtp21
NGum4M98TO3XxigAmF+ytPKN4KxP2XmM7q6as19J2rJvP1QaOrZ0nF1xdghl
olRXKaYnGoqGLxupa+lmkqDhXhjKzMbME8xnjiqDUi2lvY280NVbG/kOGUac
QW2E63xUN0VhCYCqQb3DAT07VRdDy8MqRZXUlkZoqDPBhjprJ12f/ncAShpP
+hoAugiStYBhBPJGmzmDbF+YyTGvXG1PwoYmA1dooUom2TUGXzlvdMs+uoqB
dQI3aR1/nP2kpNyrCbVvco+6dYQLUOJOI3ZOoHTE5NY/oIqBsfQ4IqkeQw7u
bbJ3lQ3eVU5YxdTc294AP5ZAd+u7sXY9YNv0aHPxI4D0rXaSjEFLMP+CP52n
/zmfDI00hqItnKzkncw8HAm2IR0OvZaKcvn9ga9SCgek5CMRabY2485KpeC4
LZ1jy7P82gs/Pap5gPyiWJ6Ed+QFbJOx6E5OZq2fxBVWl5XJeoEttlGHyc9n
RzXfxJEVvNWW/MY12HxK512ZcbptFviTN2aienBC1LvRukOv8IR1rnGCI6Li
kW6spB11zKAuoHBC7cgai+BHV+E73LXuJPOK+Q03DqwDglwwz38MzQSYuSk6
Zb+qJLnOoIWAdfJFy10AEPRrZsM6THBo8wWhxRIToR2CkKTRDExnxNaKI99N
rooUnt9qhRZ7mnvjRo/FmUCUB89s/LyYXemaabzjuscYy9dVfCs848RvYJza
YXqSin+YI4iRiJ/lzzSKFMvTDnEw4+MsXKfRG0U4J69inJbvSAMfZhNpCiel
HL37YS+0cweRny8furRh7zKiiDNV3/pkQ2p6pLNinA8cAcV6SqNRzFHGrV0k
qT4UTVxKnWskFynqAuJh4MaIJsYgltVJtWQ7XeQlF6Wp4YDzKMboZSRyKVX8
SVssg9vMRM0fDq0/5GhEIH73T73e/WSXHMPn+QikPfZUvf7d6alOU8PUuQ/3
x/82m0kEW8SiJOHgaFPCDi38JqTTn1sfNBetsfNYG82HD/B373D35OCkdzIz
aJGWw971IzaInMoLAxYNb7Bq1iUMRYnVoMKDIX6cG1SmOaAwYO24MaSeR+kq
m4EXp0QwePv81cHJTy7hgnbFhj6XuEZWVW91k4zuC4hJOOEFWpBsMKR500pK
tbgz7DPiy+AVZ9ej68oaHSWDWFUnAJQKekrbZOjcMGuUjsQ+cwI7ipbv2exv
u/zn7a0NI7TDDnCP14988LnWW6yMsdWQHt6Sh/vJ/3Hyx5OHjmbc5ENsdzUs
pjOpGjU1Qmz+Hk8PrphUZOC2QpQO4KoW6KRNstBBE9xk9+iAlwYlF8+VIVNA
QFcKJ1BtKXUKoe+mCgNEbZ5Ng/9KPAnx4vxO/lDF+OF66TL8KmghrOeVp5O0
x6Px9XgOfEeJ536iUsVltqSYtB+np7t3wB4yLNGSYPfQqhupomFxwqjKtdjB
2qW5wFrlRB854ZTaQarUUb589kr4xA/jsZie6votgdq760v9lEaTnLx9frJ3
fPB8360IpwkTqWlpBqQzTJfe9T7A4dyiAH7+i1xcnQFqFgvtNCk3pgYQwB8Q
PVxpb3VSXfbxCjekaATzjLxujhvtipBLbNvcGF4K1hRzoVjwqBFo8LoYdCF4
F+q9gfce3TfoAccQ1+WGWYd7VVxemuXZsg5MYSViYgJXcqSEIFfkIa+83ttk
Xqc2K9wky/BJw9fHU/PAqLisVKsbWyWAhaRdo5OC5YQLUcBNIuuuc6piqXtJ
pZoEqUFd21VgdCvVEClww8r6UM9el+SRnj1mD0TlmMhig+ELKLQVxIOFwCOH
tNnYJT7hiBcTONIavaxkGJ8WjiaV0u2O3VfOA8U9Pup572GsdXwShGWZkcNM
SrLizFRKjOvVG8KVouDjjkb3zoJzqKSWi00b9ytgcg/0zI0l4XeQSViy6O8R
d90n91uuRGwFCk8ftIXG62X+pLa+V5i/NtaaQRUvkqNDhGdR9XbhCCKX+c3k
KDpd1woqiPyLb0uND01yq2x0oUOHKByugiqahtoydcjLhSmcEkqhejnnGqts
pLS1DHF9j6D+X901vPlsnV20EyYqTFFW6JUVLufXWNKywhCJGUXag5aLz0Ha
/qSoZiBfN1wFxRrtCIFoZO4YT2/JGCK4q/XDZa/gbPBStJUutNUwZ9wAnM92
ibWCp4/Lu9K974fkixci9V4Tr3S1k16dQiXozTWqxFj0tyBfJ5CnjMu2TUJs
q1Db9UxihhC7bE/t1MY4SVgPlz7ESMb20nRwhtiJ0Zmow8Gw93uVu2IO9QKv
LSPYtY9s0TsdkfVZVNsdmDvELybd/0WG/zOTYQpzzN6bh+kBEHzsdX+oy9ZL
nK3F51odOjrGdgyVeEGvBzPVhwuKS7ogYrKe2ILOD6kinCFxLIAg7tBL9qbL
haNiXPK1XCb8Wpwk9EjHXrzIzQl9Sc6c5m4SLzO1yeKk/rsH2Cwgl8OZf8i4
2FG0wzwzgKL88ekVpOGFpgT7eN066vhqESZr6GhmtdD68/EKdgqdbCF6hSau
VKiH6CTn5YOGx62WuwTtwygWSwDvQpZQ9ycHF9SzKm3EfzD934laObvqGpSK
phrQnSYiZvexpnfR+TUp22LQ/SMTP8xtxVwmLHNoMOgiv5xLvQzAUXQhpQGK
imnGdV2ACnypDWDEgiroZHDaJtXVB0kwXufLYBgnCoiMS0h7oxs6gBbK4cY3
lOCVTiBwPJ/dkonpPAXgQZU+fI1kMoANi0ncFlvaq4MjO1qBE54bZRcozBLF
K6gJCgne9bKnkPGAm8P24QauM7aBXeSCOPo2mCElr8FZxbtceaZSiU/OkF6v
tg5Shc2j9uM81RlTHI5Yt2n63xvh2ixvjWN0OktUtJ5dRd3cXix2LNvJQOj/
+5//Z9VyoWobQ6XIAJJnOa6VfLPN7VzNnUCMZMeNvujp0GAyJGekaFALaX5Y
IyfCe5hZEfZTtc1pJKkP/TlcjE/3xwH2aBUhNCSGgf5YLZ/LQ8vVJJcMxnVg
+daMxJB+8sK6yc1AAEpAK2l4YbtYZIB0A2twlVfIjE1UXcyBqgZoMRqC8iLL
zbmTjzYXnWds0h9yfQb0rXQ5B+ZOSxtmU7YL4cUlAdvB3/GA7D2WRmY6iayL
Z1dnAkRDkvEG5u7WGnURbbBX3dVdxKUDLxsXZliKxqk8630Qh8qmU+0eBQrl
6gk0Dl6JI8ZGpN5qFOLmSnP0nMpKU9exRkhPYMKDOBi7ikTcgmzY040KYBvM
J7gjNsxPJlAI6pcwZzPixNy4caAP0fIsXYzVQI0qaHzwEiZhb62rOXqT3kpP
nue3vDb4nMyPqlY/u5kMVmFNZI5dNjCldifU6sT8nlbIabpgtqeVQZgJMIPe
sES0N1NackaD6qp9rLgpFAgrOAsYenKUFyUFQbQPm1a3k4H5ZlLMq9FtOEsX
dzibjWyNpdwLwbHGCvASC5UYzh0N4irG4AeiAhYGerN08M5IxgN7ZidKzo4d
GKEoUvjBbc8sEVT664yhjc6JHKsOgonaVeIMxM7UtrkjQWgZARHW3/3fXw0F
HnW3u8bpYSQpCKCRaINvDRUn69Ut4byFussZpCjG5GgyMhNzH6y4F8ZsrmKn
YqWqqQOs2A86R4EdF2MeXqts8D6Fv3WbUEvk+8wwCulBYNu1YzD7nYDiivia
o08HvssVo1OwIi3R7Ns6RntrMxxlbHUkIlrZBIEKFRvSAbjnJUA+H4PbFx83
qMaBkqsygRR9h7XAYaCLmn3S6aA0OlSNJQf8E06gn+xjfjXum9YDoLCj57Zf
Kd7YMBI2DkHYi8APzpM671HKR6Wq4WiuALKwwr52KGJyBdTTN48ZaAH3nmDU
sR4nD1qFWpGAx7ZSw534u+7J0exbczoxMUjSebi0RFfxdZJpIOqVzSeaGXHd
RUn9UTImkTQ0GFR3WT2Ii4ILJatoELPkaWjwAZJ41s+yodfjzMof1LoEjCJF
MWI3vJZCAFTcsAHPVFl38AB5P1lplzTzkO2zJZhf4ywBcrXiChVXV6g6nwVO
VTxHQtQc4qCbtGde7LGPuSkQNrnO0xi6kOy1R5ESGDkwz0ciCcPzu3v71JoN
ovHF1bO+zlHbJDsZGmyt1ERArVeI/SWzphLcfN8qkQIlZgM4uRAq7gpKvEI1
tLF+CoUSzS4LXG/zy+yqD0o3tdVgjsicxL+tRcCVcvU3R8mDZgkFEp+5tctz
ISKP/NmSR2qXoDPVixU5DwNb+OlOuOqhXsVQVSbUhT25BiDFKDPM1BFx1VNY
9ST3SDP2BfCoKaqRXuwGQwKDSdjj44xovDUvGoWqU5FhZmwZuic5kDIuywKx
Sev+/rmrArgkHA2lJqi3fUM/JxW4xSyimqOEq4ACGRub5TJs2hQG+tumEN6n
8neACfVwDPtVQEmsg1JmhrXmE7P9fCaqenC3wlsKQwTtymB9u3xaXFjeXeXI
+bcCwJqJ2kBg1USnW1UNW6bW9iBR1HaPo+wFvlnBgMlQDOg9beeCGZC7dCmc
3zmY0tCwBDjMwqouyRQE37NkjtQULkXdyiSlnoJ86Eizeit4ckoPRWBwLk+k
gRfVt6tlIEnJMv+UxYHYULEdGguh1uvXrh/ml0aeHCU2VLqrupmoshAXDjZa
XuME7soV7vMscgYrYCdDq+C0pP4aOc5MT4rBpVDQxh0FneWpBj3ch3klCqry
3XpeDSM1G9gWE+lpRYCPtsA7XxBKV4JkiWqVPWxEpMIwgukV9cIa+W0OxtDk
+dzpSUIUr3QtQptOpOZGS627owgKrZarQmyq/ImUAGgB/Di/vJo5643UqhHr
pjlsQ3ySqyy9piuKIcacXEUmxCE4kjJnHGJCm0uL0nJe2fuiA+pTvx+9Yypi
DZUKf3B7B2S0VnGDOJ5X8QaHpMqBk5ENYtbg9yewikA/+am4gXQhr8A1h7J6
62++YxNWzvUN4oE4dw3646KKWwyxGBzmENpGJMJCiUf6Jm9kwXmZ+T3ZmdLg
WWIIHoUFYNimDIF5XoBO5jRHkPPIYZiGxhYXPfMPONNA1UAXsbnMXUduQlKN
VDqtAvGotXOsgMy183FiBbJ8P+zBCmwSlTPkUFdzAC4im/ygr1G1LK0KANc4
yynTb1eJGoLh1LqoID39unjnMnjIYFLrt0YM7cmTdb9yv3iZrRdykJdm1eSc
rGydd7YIUqN1Gx3tqnbYzo50DyYBiz7B+GYcgn0j9qajKc8z1ilNgZm5VfRR
XVAOn9SDDHtirzNJ3WC4zGc2wRPBYj67zWZcb5WcnxwppRuAy6GyUlfVQxVu
qPcfGXoA9NISzfV9tI6AeSVNwOBN0XGEiQfFm7o6TxTt++/RI8xCE6uCnjGs
0hGOnHrXZUVSGQ5ilbYiniZLkIU39kHBcuKwJ2FpbYhv9piC6LV6y10i/d5+
mIdCERbQAWzVtnvCvAEMRzhPB+88WFESIozG0XHcW23YWHPJNtJrXAfQECmu
9ut0GbyfHOy+2Y1IzxS/WEBMXrI/zI0avJMcGQTC7Afqcrvy4cN/O9l/9fLT
pxV3RPC8DskIFUTu2UAiaFqmyMRdFylnI0klOtK2nx04+R0WbVVsIzT/KGQR
K8Od3k4z6MOJcft+c2MDD0p3hV1jrBQnWknMfzCpF1K50jDVCr9tnvzwwTzT
t8/0zTN9fMaQNxULt7JQe0D9XLH//cl1XhYTSqJeM5N01KzaJ/rGMJUdWuWZ
YfuGL0MTQbOXs9fsCKXnZPXJ7yEfYoc6vkKm7dlv9/94dvr8hcHb+eUlabnX
9Mxmh97lJKWdBBR2yrhQqRTQV8pPmQBUsMgi0QkvXCDSDhQSklbmQfJDmMuu
h7LuY9vFTpdR6iZeISX7VhRveEsWbWTtd0WW3DkaVuIztGCLPCJc/W+FLdFj
jJzSbsTAJOa7iuMSPJc7CkHIP/JpKiG37PP1W/9IVAcL5JgLl5ZGnwJXPbCV
VlsRA2D3iFt9bT4ShTnowoOFYRe2PWPg7D0/PJbr0X4hLAbu+GiGiLZXHO9D
ahNplHjnPtyHPZyVsy8gRv6Ia+Xs+07yKp+8S07RoJXszkhm5xvu4528jMSp
Tw8EJErjk3l8BkGSPl7BxjpQuIjLwzXgmIBwBfbcn1b9y/EKf+NhF96DnnJC
WXsdnG68SROP0wR/La9QBQWMypBmQwA4sExwllqgyfprUMZ3ISAHL5PX2TBP
e3gCZnE9BwtzxGl+gYt4aZ2m8OwMmZPfBzS/UN0/a1/9awX1WqJpg49c0uDm
1hMgG4JLzkK5mF6JVxdKTrhF6rp/p0VOxVFOjSQx7uocA85eo+befPoNa930
1uoh2+uD1/sEzKQOzAa8st/v4Po0QeO2Yygv1ujYwxPtrNjBV7D90aSlcjN6
0zCu1jO3RgqKNlOD787LH+pLB4hG1u4+bln6EXgzUK+swoCzFi9Jwd0WmjdS
LdgJUjVDbf0mtxXSNfzkjNyE1WfxT5bkV2JTeFQMHujzA31+oI2K7Z+cfjYV
kz4/gJ47Sez6fjszWPi9Rr1vZ3CK39dOVMbaw2LbO0mPw9leGI7ybFvxmQXs
xSFU++qAgnyl1T1afnUGSU5fnST7lP5SJq/Sc3BIfrg/G1VnnBRTfgEDjAzu
YYf5vi/f9+n7ADlOrRH+VXqLtU34EqyZd9twQmVERWmd9Lt/9GT9EQsiqiaE
e27DFkbc3n5i5Q7ml/t/ODo8Pt0/7hn5rQd1ZHt7Yl7S0k/PyWpm1b3D3+4k
f5SDAWaJVnxD5SKHNS2mgUQND0GxNFBvST88VqozCGhaBlRCs0u71rp2vXDB
COP7bNGCmMuSHSEcRJRJGXa1jCjMd70UMmHSr6GwgdFeb6Ed4i4N6e2JwbL/
u40ddqrfMtZhWh6a16UqPrgbwYktWW1SHRrX48o2+5Yr7KAsNqO8VNFNled0
hnd9muyq8fuxu+hHt1GboQEEPWj0DO1hh4tt4GdOadr/3eYORCfRoxghZSSa
rrt7YPNXqf9ke4OtrQC7ZWEF2dcKrB8lhySUHDDGINiXT9K72kF4OYciBVjS
yCU+grQgmwChSlxhIa9RW9vCrbEvTbfNHkCcDfoFUIR3wg/VQvZrEe/YhyR+
dwXv5orZ0Gg+tv6gFVQrbKXpgElBxQr3nV7l9tKrpJRtKbTrr9lBO7b04E3Z
CK7Y1QodpFOqSoIoFemT9LlbfPRVtmj0yi/YJhrVAC+X3GXcsIObVPYct8fH
PuVQW2PMpJoMrR3bKSI+yJZpwVZ4/exiPPNgEZnZ8FmIr5q56LvADVYnQeNp
mV1BxNe1JWY67CtIWdcjWXRikycawMH5MbN3tm4FVc7n+H7VXrEsYQqhDe5G
ImeP38ifshTM+VE+zgdKj/TdI/pgn+zUqn6hawRMZW92jcYCPWGnKTiY2SVA
OsMENApGKS8gg2jt2uolPLHaUQUe2fOEcrnhK+ac/PsyzsBTmFdjigKfBgux
tajgY1iV59yaoGIBE2kMq7hOI3gSwJllzneAsa2sPsKCHCye7hhFBNiuF78P
5ms0fE9aQnRTN55FYOQIA6nh6CJr0IXDhuMrimRFY7oEjnKkNd6Bd8PBGUzj
3QFJi5cSUwHCuQ09c7eWklG8hHaMvXcxTJF8fBQz6pV4XFTqTsuA4LaV/H1I
JqHXZc1mYz37rF7zxvqOEV6YP6eBUclLMI3ZUSoltkrgs7V96EN5e/yKEwgk
sonL83gNkXGLaPNf2hLFtXeUIShWb0dsY3rjGwr9dG6HeAU4ZAhVRg6JpOuV
gvJAtkUMVnEGHUo9wBABhVXeOXW9zJUdD/VVlFZQkZRA/y3JrcUoCyOoaj54
IGlaCrINQjTx+NYSGTWmWghew6bF7CzELCMM7hm6fonhZk56pQRZQX4VPKoD
CDHSblrm4xSKXblngmwiiDQdY8yduy7UaRoS9vx3u2K9RZYFQu54au5ojh2R
tLMK6Bp66nRga2mDVtUOt3w2raV6DlZykvkOGX9VvyqvBwq1FWNnH7/G/flq
HRqa+8+0l+uVLoJqB9uBoAE+VIPTmbvOHCukyiqSRb04gkTkIcUGFKK52Pqk
VDIMiekZvaarZmEcCBIOpGWQEqamFmKST/gh8I8KvqGGqXbwyO0AdMA3Z1gS
zVbCt6HuHtdkGquzB+Sm6pt7ig+jTm90XEutdNvLh3Dv/toDcQaCj6YG8DMh
HbFpJSZixoMCiRrOS1H1bEaIpAekizNCmiDz2BK4GUbfYTanL3cEKe9+QYHA
9bITGUZqO0phwtZuQLSqJ1Gl2EvcD30+NrFbquHaVn3ZrcepF/DnjaeNYjUL
h7YH0ruZHplyHpHY0xNjpdSGuuiSDl60UFnZMZew4wm/b+OLMH/RUAaIQrpt
d8M2CCh8+xt81xo+SoChilHKZhazqzjy1ui4Xbgi69JVSLK53qDjKROK1Gb2
T05sGJLDBSQXZds6heK1crKIh0e+XKvWtfFrkUsRPL8OrfRzxLwa0cSMKJpa
WKaDMVnRsOim8EmuCq4pZOFVZKQdCwHTG114ITc3fXj6NM4WFsX7LyFHHqWY
UyVE9x6XL6erioKVFuMuijLmKzYUNPT0dt3+om7CqibAL8o7oA0HEkO90c3C
vdZzzX2o8X4p2I766UhTQgxilYN1uf9dF7zb5XuPdWel/w+6hbyWBalaUhoP
mXYLbQoEbuiN3rUya2MzWVUZ1StfieKTy1wmU82degu6WPAgKNqtyg20YGnu
0Ld9EaWO6WTNxtSG82x2k3E9NpfW6vZ7yDoepPLJrU2bY/919g/bfNtn2MHX
6uNJ+gDcCPAKeHkE5jPu3BRmExAAHrXxfIiH04Kyk575GpDg4eq8eNeumbYo
G5qtI6CzwSH7ZTIcRRZgS0UwlXYCh9E9kUxrduGFXYYxhmAEaNOeWCRXy26U
j9ZIcbKSbcesapibuwydUGJhMh4Q2dtMIpzKqYUsipLc7eaAg2EWeBMsd7VJ
Es6+4mvgEVEoZkKzfoWm9qoKTkqWI8aHq5mll5YlAgxEk3KuFKmtYIBxnk9A
RUQTWtWlajxWqAMF0A2Jgvg8J2ER3PpN8hn7FKq6tNPiW9h85qnKvoasXR+1
0FSM94Y0I3Nc5HYT59VTz3m144Xs87WnxgAkBbA89Itq/GnODSXsbxex8a31
miVP9HhgOV2uoIgQxqq+PCVh1MRW9lE7jfrj/C1xkRMgCiz56IDuxRvG2Z2W
SnXs2/XWsB2Oa/q7W58ML4QNQK/pgg0qZ1SfrK1btSg0kqPNEViNmck74rgU
1tHutzw8OjVSrmYzrEBDvcM5kRamSGR75uvm2BHeGhbLmeegt+L8HHq1uTYB
YHTy6K4up9AghJvVbe5EmSACeBjDJW0usekxZvkN2j2ggZQNh1VMsoj1x6xj
q3kdE3OTZ7lN8HKnpXwQMTkCTVf2c8gostAnrxWghWY9bMeAHQrp0UfvFrsd
X6w1yiHtY4O6lHfVriZrHaWSqKBkVJ54j5/rGR/FZ9SFvHyeTyNTMJsUVXca
OX7by23nTRV0sWdoTIHRsFDu1lAiKAXGavSqr/DiKKttp/q4+VS1ec96zKoz
Iy37Z8JJd6yfwkzeMU0KN5KL9nAreNK8gov5ZEDfkMMxhwKTcHddrrE1Rhst
TjkPRNCbWXcOCA8DiR+h7VCu85nRSPzGul45cw0FV0rLltnCGhszVZINNxwu
PAr6p80bP8+gd70TYY4ODUEk8a208mKDg8L6hyDTADNZ8hk19qG4IKor1O5v
kjHsNSB47tiEC+6sDplWXKB7u7++DsXShkJYOmG9ZuYAniNkrX6lOg5Cz3wI
EQRVn6ogbQcyM8YZ7fKCkpAk2QQPXB48owcjhCUUgL2eCiSXrxwBiwKegr+s
1KYPfTE2Ummjv7FVj7AhDrT+974EZB36e12FjY0mes2KDBdYoPgEV3ah4AJx
/iJ0QTlmKGhFws6BXrFqTlFkMkUVW6zu5IpyeEtt4MdyZVjXkooh8dwy3UwN
bKTHJPjLtQhrKHNZUc4tRC2BMgGa9KEduxSu+tO4nPxCKDaL9K6OLqaeYqUw
Zj5AMsSEfAtCbkl9giivv0uHj+1dDMXhiaHm49oCLUfd+I0GKUPsCF5hqyDa
fLWtgKILNkPc57kr69uI5LU7nOAUyBj32miQNOIFPANTaFmr2ihYVKMycVIX
tIl+7JGXDm6gYSHBXu4nLyRv7C03+sJWh+bIJKGsxx3APkGzVCrjmk/Ki4FE
qv6efSu99S3YZm99O7kvY6xvmT8/EdBe59Cg8SJ/7/J89l68eAVVScbj1LI8
F6MnNeL2XSAOrMfMlXFaKhraemhoc0Xj4f4yPazXITLLKMpMl9Tn/GOS/CEr
dAUNwRykZ1WOFfs6JCbOKYoEq+yLBwvLYOepbS0JUTASAQ1FV9Bu5uoxYGgJ
lzGKFJHwFHgbLFNll6jCSGl+LLBb2iQugL/2t0hxqN9wIiKyeDiAfu3sNuns
ttTZbZo/+eze2hDcma0HtWO0StkWRjaBudjIJJWyvIU5jBIBJR/a5WF1haGD
xIDlC0iKBKyW7rTcIAUiQMZY3MWTKi6ihfyTNcrfHmROotX6sOV7HQ+seB2b
+9asSGCuf8ZsNrdlzE8iXk0V1KNCF1rrmvRlvIbLYGQBXmYWOCvSaC792lFx
1LEODDv6MaXKkh4LHHWUvc+555o1VwoxiqMWxSGNwSCQuSP2cG2DcG1T4dqG
+fNTeFmu8sur3sgIraNY7XUJBOE8vlFxU7ttgpYWI2tskIJsI6z4sze3Tpvb
UJtbN3/WNldKiLlXpsvgwLAYT8BkQUoyNWSljs21/bGNlIGCIQEXmDkgpkGv
2pASJcCy7SE75sIYePi0xJAwXIbhd14Yed+nCkhygtgSi/9+4p9LQhYapeqe
EQYCXRxG8h/sIy/NSQwTNjOyIi0MJZZaU5/ILd3t9wsOXJ00H/PBmIN0ZJUY
dDks04tZz1alkPQRuu09oydIogGVSpd3CTOgR52knmY3qggc1A1kXr47eDcp
bowId8mGrg87FPGQDb9fuUhHVebalNP1gdI41RWX3ZpAFbUPx/k7yM7/6T/+
1+VoPhl+ogzgD7tlbu5J+R//zySbyGf/UlxBKkM2/4//K3mdzmZVVbjv8nFy
Ythnakd4NR/e5JeGIuazv36S0k7m8x//438ZtDefj1Kwcn7ipFQ4T4PEkHYE
oXZzIlzERa7z7EbKQ2Qj6MFVXaXTzOc4LjceS09BjfxasOHJDUiKRoI8mEyK
a7pKu5fIf35/8ObN4e93tQVm/+3x/m93k739V6cHe703+3/ArpD/it3h9o4P
Tg9O9qmo194fj473T04o8Iyn+mlzfXNdnk9ODl4enPR+gpqkaz+W0JAgvSwz
EiaePdp8/GiTuBGklFyM5hcX39z7/wHmHjlAGOUBAA==

-->

</rfc>
