<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc docName="draft-birk-pep-trustwords-03" category="std">

  <front>
    <title abbrev="IANA Registration of Trustword Lists">IANA Registration of Trustword Lists: Guide, Template and IANA Considerations</title>

    <author initials="V." surname="Birk" fullname="Volker Birk">
      <organization>pEp Foundation</organization>
      <address>
        <postal>
          <street>Oberer Graben 4</street>
          <city>CH-8400 Winterthur</city>
          <country>Switzerland</country>
        </postal>
        <email>volker.birk@pep.foundation</email>
        <uri>https://pep.foundation/</uri>
      </address>
    </author>
    <author initials="H." surname="Marques" fullname="Hernani Marques">
      <organization>pEp Foundation</organization>
      <address>
        <postal>
          <street>Oberer Graben 4</street>
          <city>CH-8400 Winterthur</city>
          <country>Switzerland</country>
        </postal>
        <email>hernani.marques@pep.foundation</email>
        <uri>https://pep.foundation/</uri>
      </address>
    </author>
    <author initials="B." surname="Hoeneisen" fullname="Bernie Hoeneisen">
      <organization abbrev="Ucom.ch">Ucom Standards Track Solutions GmbH</organization>
      <address>
        <postal>
          <street></street>
          <city>CH-8046 Zuerich</city>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 500 52 44</phone>
        <email>bernie@ietf.hoeneisen.ch (bernhard.hoeneisen AT ucom.ch)</email>
        <uri>https://ucom.ch/</uri>
      </address>
    </author>

    <date year="2019" month="March" day="11"/>

    
    
    

    <abstract>


<t>This document specifies the IANA Registration Guidelines for
Trustwords, describes corresponding registration procedures, and
provides a guideline for creating Trustword list specifications.</t>

<t>Trustwords are common words in a natural language (e.g., English) to
which the hexadecimal strings are mapped to. This makes verification
processes (e.g., comparison of fingerprints), more practical and less
prone to misunderstandings.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>In public-key cryptography comparing the public keys’ fingerprints of
the communication partners involved is vital to ensure that there is
no man-in-the-middle (MITM) attack on the communication
channel. Fingerprints normally consist of a chain of hexadecimal
chars. However, comparing hexadecimal strings is often impractical for
regular human users and prone to misunderstandings.</t>

<t>To mitigate these challenges, several systems offer the comparison of
Trustwords as an alternative to hexadecimal strings. Trustwords are
common words in a natural language (e.g., English) to which the
hexadecimal strings are mapped to. This makes the verification process
more natural for human users.</t>

<t>For example, in pEp’s proposition of Privacy by Default
<xref target="I-D.birk-pep"/> Trustwords are used to achieve easy contact
verification for end-to-end encryption. Trustword comparison is
offered after the peers have exchanged public keys opportunistically.
Examples for Trustword lists used by current pEp implementations can
be found in CSV format, here:
https://pep.foundation/dev/repos/pEpEngine/file/tip/db.</t>

<t>In addition to contact verification, Trustwords are also used for
other purposes, such as Human-Readable 128-bit Keys <xref target="RFC1751"/>, One
Time Passwords (OTP) <xref target="RFC1760"/> <xref target="RFC2289"/>, SSH host-key
verification, VPN Server certificate verification, and to import or
synchronize secret key across different devices of the same user
<xref target="E-D.birk-pep-keysync"/>.  Further ideas include to use Trustwords for
contact verification in Extensible Messaging and Presence Protocol
(XMPP) <xref target="RFC6120"/>, for X.509 <xref target="RFC3647"/> certificate verification in
browsers or in block chain applications for crypto currencies.</t>

</section>
<section anchor="terms" title="Terms">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<t><list style="symbols">
  <t>pEp Handshake: The process when Alice – e.g., in-person or via phone –
contacts Bob to verify Trustwords (or by fallback: fingerprints) is
called pEp Handshake. <xref target="I-D.marques-pep-handshake"/></t>
</list></t>

<!-- {::include ../shared/text-blocks/trustwords.mkd} -->
<!-- {::include ../shared/text-blocks/tofu.mkd} -->
<t><list style="symbols">
  <t>Man-in-the-middle attack (MITM): cf. <xref target="RFC4949"/></t>
</list></t>

</section>
<section anchor="the-concept-of-trustword-mapping" title="The Concept of Trustword Mapping">

<section anchor="example" title="Example">

<t>A fingerprint typically looks like:</t>

<t><list style='empty'>
  <t>F482 E952 2F48 618B 01BC 31DC 5428 D7FA ACDC 3F13</t>
</list></t>

<t>Its mapping to English Trustwords could look like:</t>

<t><list style='empty'>
  <t>dog house brother town fat bath school banana kite task</t>
</list></t>

<t>Or its mapping to German Trustwords could like like:</t>

<t><list style='empty'>
  <t>klima gelb lappen weg trinken alles kaputt rasen rucksack durch</t>
</list></t>

<t>Instead of the former hexadecimal string, users can compare ten common
words of their language.</t>

<t>Note: This examples are for illustration purposes only and do not
make use any any published Trustword list.</t>

</section>
<section anchor="previous-work" title="Previous work">

<t>The basic concept of Trustwords mapping has been already documented in
the past, e.g. for use in One-Time Passwords (OTP) <xref target="RFC1751"/>
<xref target="RFC1760"/> <xref target="RFC2289"/> or the PGP Word List (“Pretty Good Privacy
word list” <xref target="PGP.wl"/>, also called a biometric word list, to compare
fingerprints.</t>

<t>Regarding today’s needs, previous proposals have the following
shortcomings:</t>

<t><list style="symbols">
  <t>Limited number of Trustwords (small Trustword dictionaries), which
generally results in more Trustwords to be compared</t>
  <t>Usually only available in English language, which does not normally
allow its usage by non-English speakers in a secure manner</t>
</list></t>

<t>Furthermore, there are differences in the basic concept:</t>

<t><list style="symbols">
  <t>This work allows for better tailoring the target audience to
ordinary human users, i.e. not technical stuff (or IT geeks) only.</t>
  <t>As in many usage scenarios the Trustwords are only read (and
compared), but not written down nor typed in by humans, there is a
less strong need to keep the Trustwords themselves short. One such
scenario is to use a side channel (e.g. phone) to compare the
Trustwords. In fact longer Trustwords increases increase the
entropy, as the dictionary is larger and the likelihood for phonetic
collision can be decreased.</t>
</list></t>

</section>
<section anchor="number-of-trustwords-for-a-language" title="Number of Trustwords for a language">

<t>If the number of Trustwords is low, a lot of Trustwords need to be
compared, which make a comparison somewhat cumbersome for users. This
may lead to degraded usability.</t>

<t>To reduce the number of Trustwords to compare, in pEp’s proposition of
Privacy by Default <xref target="I-D.birk-pep"/> 16-bit scalars are mapped to
natural language words. Therefore, the size (by number of key – value
pairs) of any key – value pair structure is 65536. However, the
number of unique values to be used in a language may be less than
65536. This can be addressed e.g. by using the same value (Trustword)
for more than one key. In these cases, the entropy of the
representation is slightly reduced. (Example: A Trustwords list of
just 42000 words still allows for an entropy of log_2(42000) ~= 15.36
bits in 16-bit mappings.)</t>

<t>On the other hand, small sized Trustword lists allow for Trustwords
with shorter strings, which are easier to use in scenarios where
Trustwords have to be typed in e.g. OTP applications.</t>

<t>The specification allows for different dictionary sizes.</t>

</section>
<section anchor="language" title="Language">

<t>Although English is rather widespread around the world, the vast
majority of the worlds’ population does not speak English. For an
application to be useful for ordinary people, localization is a
must. Thus, Trustword lists in different languages can be registered.</t>

<t>For applications where two human establish communication it is very
likely that they share a common language. So far no real use case for
translations between Trustword lists in different languages has been
identified. As translations also drastically increases the complexity
for IANA registrations, translations of Trustwords beyond the scope of
this document.</t>

</section>
<section anchor="the-nature-of-the-words" title="The nature of the words">

<t>Every Trustwords list SHOULD be cleared from swearwords in order to
not offense users. This is a task to be carried out by speakers of the
respective natural language (i.e., by native language speakers).</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>Each natural language requires a different set of Trustwords. To allow
implementers for identical Trustword lists, a IANA registry is to be
established. The IANA registration policy according to <xref target="RFC8126"/> is
“Expert Review” and “Specification Required”.</t>

<t>[[ Note: Further details of the IANA registry and requirements for
the expert to assess the specification are for further study. A
similar approach as used in <xref target="RFC6117"/> is likely followed. ]]</t>

<section anchor="registration-template-xml-chunk" title="Registration Template (XML chunk)">

<figure><artwork><![CDATA[
  <record>
    <languagecode>
      <!--  ISO 639-3 (e.g. eng, deu, ...) -->
    </languagecode>
    <bitsize>
      <!-- How many bits can be mapped with this list
           (e.g. 8, 16, ...) -->
    </bitsize>
    <numberofuniquewords>
      <!-- number of unique words registered
           (e.g. 256, 65536, ...) -->
    </numberofuniquewords>
    <bijective>
      <!-- whether or not the list allows for a two-way-mapping
           (e.g. yes, no) -->
    </bijective>
    <version>
      <!-- version number within language
           (e.g. b.1.2, n.0.1, ...)  -->
    </version>
    <registrationdocs>
      <!-- Change accordingly -->
      <xref type="rfc" data="rfc2551"/>
    </registrationdocs>
    <requesters>
      <!-- Change accordingly -->
      <xref type="person" data="John_Doe"/>
      <xref type="person" data="Jane_Dale"/>
    </requesters>
    <additionalinfo>
      <paragraph>
        <!-- Text with additional information about
             the Wordlist to be registered -->
      </paragraph>
      <artwork>
        <!-- There can be artwork sections, too -->
      </artwork>
    </additionalinfo>
    <wordlist>
      <!-- Change accordingly -->
      <w0>first</w0>
      <w1>second</w1>
      [...]
      <w65535>last<w65535>
    </wordlist>
  </record>
 
  <people>
    <person id="John_Doe">
      <name> <!-- Firstname Lastname --> </name>
      <org> <!-- Organization Name --> </org>
      <uri> <!-- mailto: or http: URI --> </uri>
      <updated> <!-- date format YYYY-MM-DD --> </updated>
    </person>
    <!-- repeat person section for each person -->
  </people>
]]></artwork></figure>

<t>Authors of a Wordlist are encouraged to use these
XML chunks as a template to create the IANA Registration Template.</t>

</section>
<section anchor="iana-registration" title="IANA Registration">

<t>An IANA registration will contain the fallowing elements:</t>

<section anchor="language-code-languagecode" title="Language Code (&lt;languagecode&gt;)">

<t>The language code follows the ISO 639-3 specification <xref target="ISO693"/>,
e.g., eng, deu.</t>

<t>[[ Note: It is for further study, which of the ISO 639
Specifications is most suitable to address the Trustwords’
challenge. ]]</t>

<t>Example usage for German:</t>

<figure><artwork><![CDATA[
e.g.  <languagecode>deu</languagecode>
]]></artwork></figure>

</section>
<section anchor="bit-size-bitsize" title="Bit Size (&lt;bitsize&gt;)">

<t>The bit size is the number of bits that can be mapped with the
Wordlist. The number of registered words in a word list MUST be
2 ^ <spanx style="verb">(&lt;bitsize&gt;)</spanx>.</t>

<t>Example usage for 16-bit Wordlist:</t>

<figure><artwork><![CDATA[
e.g.  <bitsize>16</bitsize>
]]></artwork></figure>

</section>
<section anchor="number-of-unique-words-numberofuniquewords" title="Number Of Unique Words (&lt;numberofuniquewords&gt;)">

<t>The number of unique words that are registered.</t>

<figure><artwork><![CDATA[
e.g.  <numberofuniquewords>65536</numberofuniquewords>
]]></artwork></figure>

</section>
<section anchor="bijectivity-bijective" title="Bijectivity (&lt;bijective&gt;)">

<t>Whether the registered Wordlist has a one-to-one mapping, meaning the
number of unique words registered equals 2 ^ <spanx style="verb">(&lt;bitsize&gt;)</spanx>.</t>

<t>Valid content: ( yes | no )</t>

<figure><artwork><![CDATA[
e.g.  <bijective>yes</bijective>
]]></artwork></figure>

</section>
<section anchor="version-version" title="Version (&lt;version&gt;)">

<t>The version of the Wordlist MUST be unique within a language code.</t>

<t>[[ Note: Requirements to a “smart” composition of the version number
are for further study ]]</t>

<figure><artwork><![CDATA[
e.g.  <version>b.1.2</version>
]]></artwork></figure>

</section>
<section anchor="registration-documents-registrationdocs" title="Registration Document(s) (&lt;registrationdocs&gt;)">

<t>Reference(s) to the Document(s) containing the Wordlist</t>

<figure><artwork><![CDATA[
e.g.  <registrationdocs>
        <xref type="rfc" data="rfc4979"/>
      </registrationdocs>

e.g.  <registrationdocs>
        <xref type="rfc" data="rfc8888"/> (obsoleted by RFC 9999)
        <xref type="rfc" data="rfc9999"/>
      </registrationdocs>

e.g.  <registrationdocs>
        [International Telecommunications Union,
        "Wordlist for Foobar application",
        ITU-F Recommendation B.193, Release 73, Mar 2009.]
      </registrationdocs>
]]></artwork></figure>

</section>
<section anchor="requesters-requesters" title="Requesters (&lt;requesters&gt;)">

<t>The persons requesting the registration of the Wordlist. Usually
these are the authors of the Wordlist.</t>

<figure><artwork><![CDATA[
e.g.  <requesters>
        <xref type="person" data="John_Doe"/>
      </requesters>

      <people>
        <person id="John_Doe">
          <name>John Doe</name>
          <org>Example Inc.</org>
          <uri>mailto:john.doe@example.com</uri>
          <updated>2018-06-20</updated>
        </person>
      </people>
]]></artwork></figure>

<t>Note: If there is more than one requester, there must be one &lt;xref&gt;
element per requester in the &lt;requesters&gt; element, and one
&lt;person&gt; chunk per requester in the &lt;people&gt; element.</t>

</section>
<section anchor="further-information-additionalinfo" title="Further Information (&lt;additionalinfo&gt;)">

<t>Any other information the authors deem interesting.</t>

<figure><artwork><![CDATA[
e.g.  <additionalinfo>
        <paragraph>more info goes here</paragraph>
      </additionalinfo>
]]></artwork></figure>

<t>Note: If there is no such additional information, then the
&lt;additionalinfo&gt; element is omitted.</t>

</section>
<section anchor="wordlist-wordlist" title="Wordlist (&lt;wordlist&gt;)">

<t>The full Wordlist to be registered. The number of words MUST be a
power of 2 as specified above. The element names serve as key used for
enumeration of the Trustwords (starting at 0) and the elements
contains the values being individual natural language words in the
respective language.</t>

<figure><artwork><![CDATA[
e.g.  <wordlist>
        <w0>first</w0>
        <w1>second</w1>
        [...]
        <w65535>last<w65535>
      </wordlist>

] ]>
]]></artwork></figure>

<t>[[ Note: The exact representation of the Wordlist is for further study.
]]</t>

</section>
</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>There are no special security considerations.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The authors would like to thank the following people who have provided
feedback or significant contributions to the development of this
document: Andrew Sullivan, Claudio Luck, Daniel Kahn Gilmore, Michael
Richardson, Rich Salz, and Yoav Nir.</t>

<t>This work was initially created by pEp Foundation, and then reviewed
and extended with funding by the Internet Society’s Beyond the Net
Programme on standardizing pEp. <xref target="ISOC.bnet"/></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor="RFC8126" target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author initials='M.' surname='Cotton' fullname='M. Cotton'><organization /></author>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<author initials='T.' surname='Narten' fullname='T. Narten'><organization /></author>
<date year='2017' month='June' />
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.birk-pep">
<front>
<title>pretty Easy privacy (pEp): Privacy by Default</title>

<author initials='H' surname='Marques' fullname='Hernani Marques'>
    <organization />
</author>

<author initials='B' surname='Hoeneisen' fullname='Bernie Hoeneisen'>
    <organization />
</author>

<date month='March' day='7' year='2019' />

<abstract><t>The pretty Easy privacy (pEp) protocols describe a set of conventions for the automation of operations traditionally seen as barriers to the use and deployment of secure end-to-end interpersonal messaging. These include, but are not limited to, key management, key discovery, and private key handling (including peer-to-peer synchronization of private keys and other user data across devices). pEp also introduces means to verify communication peers and proposes a trust-rating system to denote secure types of communications and signal the privacy level available on a per-user and per-message level. Significantly, the pEp protocols build on already available security formats and message transports (e.g., PGP/MIME), and are written with the intent to be interoperable with already widely-deployed systems in order to facilitate and ease adoption and implementation.  This document outlines the general design choices and principles of pEp.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birk-pep-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birk-pep-03.txt' />
</reference>



<reference  anchor="RFC1751" target='https://www.rfc-editor.org/info/rfc1751'>
<front>
<title>A Convention for Human-Readable 128-bit Keys</title>
<author initials='D.' surname='McDonald' fullname='D. McDonald'><organization /></author>
<date year='1994' month='December' />
<abstract><t>This memo proposes a convention for use with Internet applications &amp; protocols using 128-bit cryptographic keys. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1751'/>
<seriesInfo name='DOI' value='10.17487/RFC1751'/>
</reference>



<reference  anchor="RFC1760" target='https://www.rfc-editor.org/info/rfc1760'>
<front>
<title>The S/KEY One-Time Password System</title>
<author initials='N.' surname='Haller' fullname='N. Haller'><organization /></author>
<date year='1995' month='February' />
<abstract><t>This document describes the S/KEY* One-Time Password system as released for public use by Bellcore. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1760'/>
<seriesInfo name='DOI' value='10.17487/RFC1760'/>
</reference>



<reference  anchor="RFC2289" target='https://www.rfc-editor.org/info/rfc2289'>
<front>
<title>A One-Time Password System</title>
<author initials='N.' surname='Haller' fullname='N. Haller'><organization /></author>
<author initials='C.' surname='Metz' fullname='C. Metz'><organization /></author>
<author initials='P.' surname='Nesser' fullname='P. Nesser'><organization /></author>
<author initials='M.' surname='Straw' fullname='M. Straw'><organization /></author>
<date year='1998' month='February' />
<abstract><t>This document describes a one-time password authentication system (OTP). The system provides authentication for system access (login) and other applications requiring authentication that is secure against passive attacks based on replaying captured reusable passwords.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='61'/>
<seriesInfo name='RFC' value='2289'/>
<seriesInfo name='DOI' value='10.17487/RFC2289'/>
</reference>



<reference  anchor="RFC3647" target='https://www.rfc-editor.org/info/rfc3647'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
<author initials='S.' surname='Chokhani' fullname='S. Chokhani'><organization /></author>
<author initials='W.' surname='Ford' fullname='W. Ford'><organization /></author>
<author initials='R.' surname='Sabett' fullname='R. Sabett'><organization /></author>
<author initials='C.' surname='Merrill' fullname='C. Merrill'><organization /></author>
<author initials='S.' surname='Wu' fullname='S. Wu'><organization /></author>
<date year='2003' month='November' />
<abstract><t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates.  In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement.  This document supersedes RFC 2527.</t></abstract>
</front>
<seriesInfo name='RFC' value='3647'/>
<seriesInfo name='DOI' value='10.17487/RFC3647'/>
</reference>



<reference  anchor="RFC6117" target='https://www.rfc-editor.org/info/rfc6117'>
<front>
<title>IANA Registration of Enumservices: Guide, Template, and IANA Considerations</title>
<author initials='B.' surname='Hoeneisen' fullname='B. Hoeneisen'><organization /></author>
<author initials='A.' surname='Mayrhofer' fullname='A. Mayrhofer'><organization /></author>
<author initials='J.' surname='Livingood' fullname='J. Livingood'><organization /></author>
<date year='2011' month='March' />
<abstract><t>This document specifies a revision of the IANA Registration Guidelines for Enumservices, describes corresponding registration procedures, and provides a guideline for creating Enumservice Specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6117'/>
<seriesInfo name='DOI' value='10.17487/RFC6117'/>
</reference>



<reference  anchor="RFC6120" target='https://www.rfc-editor.org/info/rfc6120'>
<front>
<title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2011' month='March' />
<abstract><t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability (&quot;presence&quot;), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6120'/>
<seriesInfo name='DOI' value='10.17487/RFC6120'/>
</reference>



<reference anchor="I-D.marques-pep-handshake">
<front>
<title>pretty Easy privacy (pEp): Contact and Channel Authentication through Handshake</title>

<author initials='H' surname='Marques' fullname='Hernani Marques'>
    <organization />
</author>

<author initials='B' surname='Hoeneisen' fullname='Bernie Hoeneisen'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>In interpersonal messaging end-to-end encryption means for public key distribution and verification of its authenticity are needed; the latter to prevent man-in-the-middle (MITM) attacks.  This document proposes a new method to easily verify a public key is authentic by a Handshake process that allows users to easily authenticate their communication channel.  The new method is targeted to Opportunistic Security scenarios and is already implemented in several applications of pretty Easy privacy (pEp).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-marques-pep-handshake-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-marques-pep-handshake-01.txt' />
</reference>


<reference anchor="PGP.wl" target="https://en.wikipedia.org/w/index.php?title=PGP_word_list&amp;oldid=749481933">
  <front>
    <title>PGP word list</title>
    <author >
      <organization></organization>
    </author>
    <date year="2017" month="November"/>
  </front>
</reference>
<reference anchor="ISO693" target="https://www.iso.org/iso-639-language-codes.html">
  <front>
    <title>Language codes - ISO 639</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="E-D.birk-pep-keysync" target="https://pep.foundation/dev/repos/internet-drafts/file/tip/pep-keysync/draft-birk-pep-keysync-NN.txt">
  <front>
    <title>pretty Easy privacy (pEp): Key Synchronization Protocol</title>
    <author initials="V." surname="Birk" fullname="Volker Birk">
      <organization></organization>
    </author>
    <author initials="H." surname="Marques" fullname="Hernani Marques">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
<annotation>Early draft</annotation></reference>
<reference anchor="ISOC.bnet" target="https://www.internetsociety.org/blog/2017/06/12-innovative-projects-selected-for-beyond-the-net-funding/">
  <front>
    <title>Beyond the Net. 12 Innovative Projects Selected for Beyond the Net Funding. Implementing Privacy via Mass Encryption: Standardizing pretty Easy privacy’s protocols</title>
    <author initials="I." surname="Simao" fullname="Ilda Simao">
      <organization></organization>
    </author>
    <date year="2017" month="June"/>
  </front>
</reference>


    </references>


<section anchor="iana-xml-template-example" title="IANA XML Template Example">

<t>This section contains a non-normative example of the IANA Registration
Template XML chunk.</t>

<figure><artwork><![CDATA[
  <record>
    <languagecode>lat</languagecode>
    <bitsize>16</bitsize>
    <numberofuniquewords>57337</numberofuniquewords>
    <bijective>no</bijective>
    <version>n.0.1</version>
    <registrationdocs>
      <xref type="rfc" data="rfc2551"/>
    </registrationdocs>
    <requesters>
      <xref type="person" data="Julius_Caesar"/>
    </requesters>
    <additionalinfo>
      <paragraph>
        This Wordlist has been optimized for
        the Roman Standards Process.
      </paragraph>
    </additionalinfo>
    <wordlist>
      <w0>errare</w0>
      <w1>humanum</w1>
      [...]
      <w65535>est<w65535>
    </wordlist>
  </record>

  <people>
    <person id="Julius_Caesar">
      <name>Julius Caesar</name>
      <org>Curia Romana</org>
      <uri>mailto:julius.cesar@example.com</uri>
      <updated>1999-12-31</updated>
    </person>
  </people> 
]]></artwork></figure>

</section>
<section anchor="document-changelog" title="Document Changelog">

<t>[[ RFC Editor: This section is to be removed before publication ]]</t>

<t><list style="symbols">
  <t>draft-birk-pep-trustwords-02:
  <list style="symbols">
      <t>Minor editorial changes and bug fixes</t>
      <t>Added more items to Open Issues</t>
      <t>Add usage example</t>
    </list></t>
  <t>draft-birk-pep-trustwords-01:
  <list style="symbols">
      <t>Included feedback from mailing list and IETF-101 SECDISPATCH WG,
e.g.
      <list style="symbols">
          <t>Added more explanatory text / less focused on the main use case</t>
          <t>Bit size as parameter</t>
        </list></t>
      <t>Explicitly stated translations are out-of-scope for this document</t>
      <t>Added draft IANA XML Registration template,
considerations, explanation and examples</t>
      <t>Added Changelog to Appendix</t>
      <t>Added Open Issue section to Appendix</t>
    </list></t>
</list></t>

</section>
<section anchor="open-issues" title="Open Issues">

<t>[[ RFC Editor: This section should be empty and is to be removed
     before publication ]]</t>

<t><list style="symbols">
  <t>More explanatory text for Trustword use cases, properties and
requirements</t>
  <t>Further details of the IANA registry and requirements for the expert
to assess the specification</t>
  <t>Decide which ISO language code either 639-1 or 639-3 to use, i.e.,
ISO-639-1 (e.g., ca, de, en, …) as currently used in pEp
implementations (running code) or ISO-693-3 (eng, deu, ita, …)</t>
  <t>Adjust exact representation of wordlists
  <list style="symbols">
      <t>e.g. XML, CSV, …</t>
      <t>Syntax for non-ASCII letters or language symbols (UTF-8) in
Wordlists</t>
    </list></t>
  <t>Need for optional entropy value assigned to words, to account for
similar phonetics among words in the same wordlist?</t>
  <t>Need for an additional field, to define what a wordlist is optimized
for, e.g., “entropy”, “minimize word lengths”, …?</t>
  <t>Work out (requirements for) “smart” composition of the version
number</t>
  <t>Decide whether in non-bijective Wordlists the redundant words need
to be repeated in the IANA Registration</t>
  <t>Register only a hash over the wordlist with IANA?</t>
  <t>Does it make sense to open registrations for other patterns than
just words, e.g., images?</t>
  <t>Create terms section by file inclusion - cf. other drafts</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source:
H4sIACjmhlwAA71c/XLbRpL/H08xx1RdJB8JidSHJZ7jjawPW7eW5LNkO7k4
5x0SQxIRiMFiAFGMz1v3Gvd69yT3654ZECApxZtsnapSBoHBTE9//rqnkU6n
Ewx1FKfjviiLUecgCIq4SFRftM6PLo/EWzWOTZHLItap0CNxk5emmOk8Eq9x
3/QD4f5elnGk2uJGTbNEFkrINBI8w7FODR7ZKUwrkINBru764mumDyI9TOUU
1ES5HBWdQZzfdjKVdQo/znS2d4IhFhzrfN4XpoiCwBRY/JNMdIoX58oEWdwX
PxV62BZG50WuRgZX86m9GOrpVKWF+TkIZFlMdN4PsKkObyxOTV+8D8ULrMs3
LDHvdXKr8sVdnYN72WkmznSZRrwZvo+dKVX0xdVA5Rj/MpcDlYpdfjaMC9B7
/KpzsLu9LT7EaaHyYlLm9iHmKWg/17O4+FXlCTbED9RUxklf3DEBIbHje7Aj
HDXXLXNseFIUmelvbTWfby1t7lUoLmT+1xJcWuzvlcpTmcaNJ//ve5xYIsKp
JeIP7vNFKF5plarYqLS20xdYJFZLj3ir76AX4po0SULLoJhyeCuudVKyGouX
08ErHuzVmcaHw0mDJ63WEhu2d/fFf5Qqj93AB3mQTVh5W/+y2xW7u2IP7Nvr
4apV59CAif8+VsUonPgdgAaxQU8moHtxWxzdiNKSuLnKO/cETEt1PgUD7xRZ
9tuz4163e+gudw93cfmN4B9Pd3f23P2Dbm8fNhOno/q7552T0JurG9h9utet
Lve3/Qq9A7/Czv7uU3e53+0uLnvb1bq7BweLH097eweLH4e7PfuDlnZaw87C
sqt6tMaJrH+P3BL8YrD6ZAI5mYm85Z2+efkmnCXWExYyH5PkPWMhj1l8G2cq
imUIvdqabcVppO7DbJL9iR3td3j9ExHxKYHH+2c5zf5VJ1EcffcU/D7oHu7s
2ImtU8Zgwe6RBvMDqDvu97a7TzvdLpF6fbV/uLOemtlsFsZGMyH4t7O/c9iB
yo1LOVYdRAFlwkkxTeoLtl6754Kfiw4tIPBiiwzstM7OWzU383S4fukl64zU
3VauMm222CmkquiwhzdbozhRW0WcbdWm3Fry/u525/IyLO6LBrlZropiLk6l
mYssj+/kcC424LY2++LPai6u8dok12n8qw05b3KNuKATa1fe/9uI1qli23qv
vzZArL62zpk+5H4rYR50tvctSWnax27yZG5DoJXwcTgAyx4RsmOq0UN4hzkL
fJDo8Rbpydb2/la314nTVN+xuXayXP+ihoXpGJXgXxV1YMqdgZrrNOoUE9Uh
+YwgPJjDVoPdL3iMwBhxqYpQdHvivJqXuMvzims3r8C8ovmOOLPzhuIcyEFR
KMYvvGpldxdLcMgYcZoO83lGQutXbjn+lYauEfn//vf/GFxb2Zp1wrWyOU8i
Ka7jqdRBTSjnYe1ezb4gkm/E534/TodJGSkRhltwArmKoMojRL90qKDPfhes
YB1gkaI04fQ2+hIEnU4H8YLwzrAIgptJbAQATkmjhcnUMB7FMDFizCo4YnyV
xCkGgIlBBZSAYGCXwzwe4MlQ57kymWaOirz+PrgxVFGJx23CZgF+38Vk0VKM
/dQsnmGu2O/VsBg5G0/g0OK4MKiRIMAExlFYx96IU8ybYuu5TIR3MWJDheOw
DVGOMeNkUxQ6mE0QC3nLE3UvIywxxRugGhTYeacyg/vE2FAwx6Zwu0bcIYh6
YgLemzG47VYALZnM4eIYVI4wl8qhGkB5m20x1Zg1Ixng/YSBaoK3aRawoNBi
GhvopMoZRxIdoRXdNI6iRAVQgnNEbR2VQ149OAd3y0ESD8kxCVZTPc5lNpl7
QsBN2qIdJch9fdugClQGNIB4WKZuWwJvFinIADcB+O7ABGz/Li5ANKhUqYE0
Ma8saHJcxgbhG/xJYdtstpZgsXFxfnOxKWRREIbBxCtLBUNEtFQloTirU8Vg
IEloG8Dw0AEwUwqMjZmvNYnRBLkhjDVTEE27tvF1co1pxwVQCaylEgSpNVS2
TGQuJiW2IUpDuycBPSqbG7pdxGNKO7A1o4jEJFHYCQF9IojWnptCTWlh2Kpn
wUJLGupMiwqZkBO1ngwrr9lHKJo2EPwuGxCVDQR/nw3QHup2IJwdBKzhfmWy
6Ro7wa8z3MFC5KjaRCXC47fsLhGPY5+JeQc8mIsTNZJlUgSfP9fh05cvS7un
+YlGIYeTGEwXijwyVKcgd9cglGhSFFt0B//g0vv2Gkfr4oFms9gwP2KgE1+m
SDsmkla6JwUe43HNxITOMqR7UHLDCpbMw+DUbpt96JKDM5Z+7HdYwovCJVO2
03Tn8LAyDQbkKKGFxLvj6/fC4t42ZSwAhL+JeDAtpA93u8A60SBkNyKjyAoA
XHSMa0i4vcxymRht6Sbr0eQHwIIcy7Dql9ArKPMrEn/nrZKRHMAfdHsHwFIF
ASIjPn92yPzLl7a4SlVwE08RuRFy7SobVzdvNv2o/W1Ina8JtdMb19evxESb
glxf0CT1/ZtLBP4cN8UQeZ99opb2Q8aNzYLNEBUyr8BUCE3BdBGMChImdCrX
QAFRzGoA4YCfMZSdVJWUwSCes4JDS9eh0i9fQgGokTOHEO4k2acN4wVzsM5Z
4uU69pPAT+/ht0xMfLyArckx+TjaxRuEVoIAFaYMNn64eON5R0kM8Yv07odw
b/vQ3qaMByx9iD9YMBjkesZ+EG9ifcA4OHHrg+EVEh+QXeym2OMUGNCPrP0b
caPyqSG8oZiVdo+ti3fXN622/VdcXvH129N/f3f+9vSErq9fHb1+XV3YEQF+
XL177Z7T1eLN46uLi9PLE/vyxdGPLSvc1tWbm/Ory6PXLaK+gPcKKsxDGgxy
YU8MWAnIkYWbCtGwiVl9Qx4KGQbBEzbLV1UCJmhbzvHBk1KmC54ogXhtPS1i
YQb2kVfLGU5ybo3ngfA2ZsQLPSBKmPfzuips4CW4hBHcxwDRs98EE+SYMAsF
m6hJVyist1ybNX4BFnz2T6BwLZgs1D1yHRKz2VqkqAwhQfXzr31Tj8rFO08A
opdhgcMDFh30xXAUWlZTnk8UsuqAuccaWp0VzfLcBXQPnMCYb4RzqkFwVOeO
KOaZdbsi0frWwMlSvhw8hx3uHvTE6eFeT/RwKfa7By/EdvfFsdjpnhyLvd3e
gTh5enYkjo7xc+esuwPnWBiOggyltA+fdUkNdZlEvFRtpUgDgGgyb5gR236h
Z4g/wEwDWUyEGU60TnCNFE2K25gQhDS3QXAFY2su+RJWhCC6uiIWq614myB6
i7FKBoj5iNpAAwrvgyO3ijAFBZ9bmZVFIXJJhZm8hLhIEADnwwmFAeAUGXnH
RsEFZK8ig7aDR4hILlSCdpU6HB5YEu0kcV7hD1jQpS7YbIAjlA+H9DI5kDhJ
ykXK4AIJICOESMYcaWDCIiD4wT5TpnP+j6OumcAImjE1ZP2AZ7yLIQTyPLfW
Dw2kQZQertGsBc8ncAQDxUxDShLNq1yJ3QLj5UwaxF2yc6aeSILDQBTrPBbF
KNYFD0Q0chI0MxVaPvg6tNhovbFJ5kutIw+NgmqbLcxgq0Dk4jkmO58gxSDW
UwWBDRd1m7YN7yyyoO5PwC7kfJTYsspFcg5clipFSV7mmWhxGhax0MfqSJLo
GZmjQYpbYGpCjn1ylq9jQGMQkpbTAdSoyekNQ/C+JrMo5pQGqEtRpsTAFA5u
rFKC0FACxDggQca2DDJrk1lH7rYV0drvTMkvWfW5k3HC8IOCqDNfr5VuKUhY
UdZRVJkHFpe0NzbG0hCAhjdOkVj7KZCWQhtzB7eBGErGy8hmciBdG/CJ1LZL
kkjTPYog/BDbdKihkMw5NhDSWEuBDbADaAE5EexFV2mdrcAIWUYxA4CCKgea
pCjzeR17IxiFiAy0wUINJymnPaYoRyOOM+c34LS6RVghjnGsO7KsJhuzuzdD
ReLRFv0voUFmNNmK2LCFZC8NyHJQFrzwLI8LchMR+cGUtH2e2Tg7cLSadpVP
ColJKDkmn6OxXVJGkvStUtkyBfg5NQp5KkaTGoZkiIxBMYmnmyZ1gAvSAhAT
LvW0iZENzps1A+G8SNTWCZF9w4EDmiWaTKdOAkIitm/U4sq9rihhz+ZtAhdE
dqXocyIoIQHmFotOrDNP4gmZOsmcSUIGwfxMoHTkG8nrQt0jZZeJrKe7XGdl
NIesVB0O3jr2tRZJxOhZm8brZb/oeT/gPJPl6u2GHbKsZ0wGXmdGpYEhL0M/
vYukPJ2UG24coZm0BZNGapwjwESkZoM4iYu5TayxSDlUDxO8ENSDqWSwmkqK
lVSyu88piYFFyHwp6Q1WkminCDekpiNv3FAn5Awb5B8qSgnvAi3dyaRUQSbj
nIxrxDGr/kjQI9LxcliUVvP39/Z29msFDdKjxbxIKgHr7Mve9XEaxl6oopM4
jCdsQQX0PHCzsm9xKoScL6fiVWTj2IAs3XsWzmoshRsV0zcDEiS7X5pTEJrF
ZtguXPlDcvpHMzjFd0AgQAbKaUrh0guYahKPJwX7DZJ0FIoNh+f64qgu6cQW
gIJfcEfs9ra3t10mgewaQaTmJEFTbdlEjz/1NviFTfG370R3L9zZDwaxjSJO
7i7mm3AT0Mt6ZAvXCDMjkeU4RfJdRhjGxYdGPm+CWUzgjryQyn0lxRsL6RZs
NmYw6DHDwq/OSKnq1SAbZlnEla9kUQFTNFKw0GKbRqG0zpda8rpwP7QpY73H
68pFHCUFUOt4UgVKCAqgjBgyo6Jtxk5e5lyFIGaB0iSyEr8DJoJp/4L4VHi5
2+fmW5HprEwsYVWs5QjqVwrFGUswqG1sod+j0taTquCWKc1VJOQcMvGHKhw3
puAfKXpp2isiAwMXvPDGUhmELVtTscfVqhppLotHYDYXWJUpJIPPpeIplCrm
MvE8YH8+ryql4PmEaye+ZF1hY3GtEVlycIWiaMK6QbbEBQGg4tQkjgrggBlB
06/cmYeyAYSXUqZPdobY3piTcWOEpMBVq2rRzFcrE3UPobL98wlBvcJPBl+f
rumnB4tDFzPUmbIV59oBhFVB0l/2tqqmObCn4JQ4ueIOXA2AcB8CCZXnRrme
CjPDj6oIin/Z1IKUQ9pIpUbV4xDrC6ddHkPKHAAUGRAgC9xhhfAqH0YWxmXZ
1eoqAaw2Y0RbuK2e+Fk2uSSypjMFe5TwDitT5uqvZZzzQclCtEYtRWdsRVtb
D6qSIdHMSRULnbDekrpQnK/Lce7QESJ8pdakKTf+RKh5oqNhFVQZG2qfMdhM
hg7kEVIR4Vun95nKC/EWuYOatWxB5rrhn97a7UUt8OXjTx9/EjY99KWySBHW
rcpsTWppOscebqGxdkJRxy5LtWA6lrEKvOQXXcY5cgsBBkeIYUeBQcZCRwCw
+lxLW8D0odWV0rpPeXvCGbZNf4hRH3/++DPrcePorOpJ2vjh4jXwZpneIsz8
rfoDsHuWK+Licz7ye+ZlT0fez93JIFdd/OF3Z8fBVUV5eKTKtgjDcJNLLTx4
a3WKZxTy4OwbEwJeWHTP8dA5QAd8OIaxjVaH/e7Prn3QRvRcWbixyjOLWPTI
4hXW1Mb6K4jGWu3CBa8u29vDooxjVtZ+cDXs/Rdrso3V4ctZ9jq3ORFjb7iV
OpYgV9+ZyXnHQYRVguaEdVLdZEJjuWdwXoTaG4u7e54FxO14EQtWlxmE3bCH
hcLtsOt2XluxscKzup3CwTZ5fsxHFQu7TebVPBhxD0TLOOO7Vj4atuj8WfJl
b2+v29ry661f4RlZoyLJ/c4lbaXUr/pvepJ+OtHKL/voWJmqTycyUXUam8Q8
88cbgArpSFdzInuQfF76vOI6U32j7gtrBYsXRdVmRD5kgBBRl5RgHaK6DeuR
DScLZa5vemtl1WcyJ998u0wFAw4P1u0QqjP4mKt1Y9rGJPi5ZsvPZo7Av0NG
s+3nI2QvxbMtXFU3u89BCBQAd7v+7k9QzZ+rEWSoe88TgAp/7Qir00Cicu6P
fllQ5wa62nkc1dShIoC6KJ5b8s+IOvoNGOsuQD45BRrjX9D52I2/yseyasO5
XAynEX50mcduNHVwFbpPnoLO1/ri3dtz9wINql7IqF0jci/RtTucEz/ir3Nx
0Tk58a+5oY4ddpvuF72MTEnhPbd9J297cElByd23EqLXLctqQSU44oYTYw/N
K53k7CMdaoCMsc3nS+OOrYMqPNkjaFH4wEVZNrVlqAeaQ3yEsyBu5TloSdcA
iBnlbXwE4opgI+nqiEJZBEM1xG9qmQkgU4Qw+rERIT8+37SJT1JvFXNR2bWz
VGGzCQI+f7btal++tAN7WuMDahONnDOYX4ELPqPz4MSuEjQADsPLqaYGljIu
uABJsMQm3UslrG+DqnHAYwmXC7vqG1FgzwH6DQDBAWIJN2ATyzCgrh3E1hdI
Uq65aPHRo4OKmVwNoWexWaq+MFTgZGYtXlCB1zULHBcv1hxhrUNh0eHDJ4HA
nj3xn+IvGxVe2fxLuI4PLnP3i61liJ+iu18DJstccEWzq5F4ZzHIBybu48Y6
9FLx5wHkwnwhG2tkkauUrYMqDGoeQDGrorMIg3Jslp4DHEzfB4drSG41plc+
YMLWrVNFDRBUvnHYpi2mCk7RFn9Wq03L2EwgvtI5wDp5vUfAidi4YcZ9sUEo
SXz8L0ptN9dLyiMmDGwAqOWdv3e4Cbt2oKeSiYdUzh6r/TrFqvZhoZZsOoym
xb+tpxVksKJlpoitLc6Da30qRW1dy7FgbWrh7Hl15x65Mb6rAbnlfTcc7onL
mjfMJjFiGY0xR976pkAahC0QpfX3nOf1tT7PrXU0PoQnH8OLu4dPD2vAbQ1i
/COzH+APs4sNPTA64XN7JN3IzsQh/ja/YgYa90fp++k8dT1ajA1vqM20XgUy
5FJ02q5eaFU6SQpypvVANupLrcXQ85t3nTNI3X4fYrt4xIuwe7jTxt2EDxee
4voCM/S2tw8XoGvNVlaVyUNjqz7+V2VKFl8Y4R55JcmXvpepK07oD9wCWwV2
hyeu8dWsDF+vaMv5w9+ZHzRAfwXwa4DyN0HlAljSI1iMamLICkf6kHSeDsMG
bqywo0ONv2CeMNLqe3fcHUKkDdzYwI6u+7rT214CiatA8SHk50DLaHGO1qzW
VzzyJ21ULCUHSQ8/Mr8/Pg8cBiNVWLzhzyubSuPxmm25wSzBR8djPGNE+dAs
lvzFDKHVT1/+Oa9lW1DUZjbDynqUzl2pvp6Z1fUuUmpqG3ysIq9VvPWpYSM5
ZB7SUzGm0jUxbl0Wt5JyPS4ZBETbJrc2xWQB8XaC1d17nnE765SOVSPHvsrL
gGc+0apMe1QCdj+Yoy6DNhv0fQSVQaZn9kGPcgTfNR5RLnyn7MueLLIaDKEW
PBpLB15Vq6DCCqrpRxqNAQViLXe2FWJ7szoZ9WlB4GKX60G1p2ADRS/EaQRU
FMERrZZSK9S5VMatNaesasZysvxAMvxQOtxMiB9JiZtJcfCz+LmpOjVwwky+
pyPopfO0ZeCzLmkJA1elFNfUrEAAcrkQfVN1KpB2koipT8CPHjZGczn7aHib
6lmiorGTDyuaN8DZok+JYYiEO2i0jbhjHGRT2p52uY8DomCkVDTgrnFQH49T
TqugWiT/PB64j+EcuInUnUp0xrrHnKj1+vXFUYqUayauof3xnYRlHSfUMaHF
63J42xYnAL4qEX+W8Pkv48S2bFwgu5MqCd7Sv9AdMki6Ftcy+dU6ux+1vBOX
cR66Dyq4PDPj9k4Yq+1e59SZAUrzA8a2V+xU5Fwhx47pjqIez8inVO7DF3qd
s0z3bY24th/XfGuWvmgJ3uTU/g/UQL32pvmtymkW2qzXfsLDfXb0bQExuTqY
oDpAVbSuuut4e74QURmg5G6Y6rM939LVKNg3agHVxFW1Ifz6YjhefLS23Uj0
bCRfk03tPd3Zefp15eJUP1zN5VLsV5de/+GF1YdhUZnEpfl0LJWR+T+kHMqi
b6SP3BinsyKe8qE4uXQ/mMT+VtPZ6OLz1Te2QTZ8qPr5tYVK+FuV55Iib7MO
yYex5fS3CpHqK+uQj5YhG+xt1iLtM2Gfrak9HsOFSssduVpr9HiRJwmHNMeD
mLHCi13kMZ1ur7PTfaSoWOFE0UwFqoTQlX8TPXaRhlKpU4hE565X01u+PyKE
y5pq+ihowC0w7ssHG4dshHny2FfzPfoS7gk8LPWAKV6Iooz9jsJ+dDMox2IU
3/O3iU/EUUQe0YIw/pAGVFxRf+u5MeVijKsQKe+1HiWia4k4t53MUGMfbvgY
mcRBTtPWTen/J3B6c9bpbnfF9enxyfn1m6Ob41fiw0ubsxFc4IsGqeoezg5A
ROfw3nSesGW7cUbgO2Ehh1WnVAL1x/1ulhe+AgdzI3OZIsvNmd7Te0oYY+qa
oe/7qIzbOMin0/Oy6OhRx561j7iptHbYXmMoc2fh9htVBl//tRtsxv12tTU+
CeGoZZt5a5NXSkXCOqJu5Ci+rz1fyK9Sr/pA6Gddwr+hmGbCOAOaCbILezq8
rKzWeB7R2Iu1Qmt+rVMuWpyo04y+nbAai9nrx9E03+8+xxaLc2xM+8hJNq1y
gt+RctVoKkM3S+EqZhqoAt4lJGVL4bb0b3tCScJ4r2OH+K8YJZXCqSbuzhuh
iO7bpGRenYkDUuDl5e+UNvIy5dISEbBJi/L0hzt8dF2dWseFtHNjCmo3jbi7
6yFs6321VTHG59DZNn0ExbPw7es53rhnFhIyObo+Pj+HzRWF+4Zl0ZExnw40
RLLxDlZ9sEk93aQcH6pFQNClch8N68wlZ76zzHbFQShApfYcxX0Nyx+g8f9Y
wUVF31Dg+zihKlPqZa1nI7bTzu/vT42lZVpPDpFscacVtUyO6JtZ7rKU1buc
DPq4jNUxQ9t9idJytNMHMlPAUxriyu+QSDExLeYir/6BYCw1wGwsK+bmV1RC
sa6rhdaVU7k0neVSgaoFw12FKSJ4DO4tuk6tAbAVZxZKO66tOWl64n5Tksp9
3wRXJkLfuXp4xSfG1jQB7/eEUnpuBLwlX0QtQlhSZwzNa01OVhnsd26SdCp1
nZVCsOo6JXCf/kyp+4rnP3bHZ/QpVOWx6MOemDvSEX+4gtzhz2Ds/PZ/SBD8
H79JH1oiRwAA

-->

</rfc>

