<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-agtp-log-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP-LOG">AGTP Transparency Log Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="May" day="14"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>transparency log</keyword>
    <keyword>SCITT</keyword>
    <keyword>agent identity</keyword>
    <keyword>governance</keyword>
    <abstract>
      <?line 61?>

<t>This document specifies the AGTP Transparency Log (AGTP-LOG): the
append-only log protocol that underpins the <tt>log-anchored</tt> Trust Tier 1
verification path defined in <xref target="AGTP"/>. AGTP-LOG aligns with <xref target="RFC9162"/>
(Certificate Transparency 2.0) as the verifiable data structure and
issues COSE_Sign1 receipts per <xref target="RFC9943"/> (SCITT) for cross-ecosystem
interoperability. This document also establishes the AGTP Agent
Identity Taxonomy (Agent Genesis, Canonical Agent-ID, Agent Certificate)
that <xref target="AGTP"/> v07 normatively adopts. The log protocol defined here
covers entry submission, receipt retrieval, inclusion-proof retrieval,
consistency-proof retrieval, and discovery via the <tt>log_uri</tt> field of
the Agent Genesis. Per-platform logs are the v00 default; the
federation model follows the SCITT cross-witnessing pattern. Witness
and monitor role definitions, full federation procedures, and the
formal entry-acceptance threat model are deferred to v01.</t>
    </abstract>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>AGTP v07 recognizes <tt>log-anchored</tt> as one of three equivalent Trust
Tier 1 verification paths defined in <xref target="AGTP-TRUST"/>. This document
specifies the log protocol that path depends on. Earlier draft
material that referred to an inline AGTP Certificate Transparency Log
(AGTP-CTL) in <xref target="AGTP-CERT"/> is superseded by this document. The next
revision of <xref target="AGTP-CERT"/> will reference AGTP-LOG normatively rather
than define its own log.</t>
      <t>AGTP-LOG inherits the verifiable data structure of <xref target="RFC9162"/> and
the receipt format of <xref target="RFC9943"/>. This document does not redefine
the cryptographic primitives or the underlying append-only log
construction; it specifies how an AGTP governance platform operates
a log over those primitives, what kinds of statements the log
accepts, how verifiers discover the log, and how AGTP-LOG receipts
are bound to the Agent Identity Document.</t>
      <t>The key requirements language follows <xref target="RFC2119"/> and <xref target="RFC8174"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="identity-taxonomy">
        <name>AGTP Agent Identity Taxonomy</name>
        <t>AGTP identity is composed of three distinct elements. This taxonomy
was formalized concurrent with the v07 revision of <xref target="AGTP"/> and is
normatively adopted throughout the AGTP draft family.</t>
        <dl>
          <dt>Agent Genesis:</dt>
          <dd>
            <t>The permanent, signed governance-layer document produced at ACTIVATE
time that establishes an agent's identity. The Agent Genesis is the
origin record from which all other identity artifacts derive. It is
issued by the governance platform, signed with the governance
platform's key, and archived on revocation. An Agent Genesis is
never reissued; the identity it establishes is permanent for the
life of the agent.</t>
          </dd>
          <dt>Canonical Agent-ID:</dt>
          <dd>
            <t>A 256-bit cryptographic hash of the Agent Genesis, used as the
agent's identifier in all AGTP protocol operations. The Canonical
Agent-ID is the value carried in the <tt>Agent-ID</tt> header on every
request, the key in the registry, and the subject of transparency
log entries. The Canonical Agent-ID is derived from the Agent
Genesis; it is not an independent value.</t>
          </dd>
          <dt>Agent Certificate:</dt>
          <dd>
            <t>An optional X.509 v3 credential defined in <xref target="AGTP-CERT"/> that binds
the Canonical Agent-ID to TLS mutual authentication for transport-
layer verification and O(1) scope enforcement at Scope-Enforcement
Points. Agent Certificates are renewable and revocable, with a
recommended 90-day validity period. The Agent Certificate is a
derived credential, not an identity substrate; it references the
Agent Genesis via the <tt>activation-certificate-id</tt> extension.</t>
          </dd>
        </dl>
        <t>The relationship among these three elements:</t>
        <artwork><![CDATA[
ACTIVATE (method call)
   │
   ├──produces──►  Agent Genesis (signed JSON document)
   │                    │
   │                    └──hashed to produce──►  Canonical Agent-ID
   │
   └──optionally, for Level 3 deployments──►  Agent Certificate (X.509)
                                                  │
                                                  └──references──►  Agent Genesis
]]></artwork>
      </section>
      <section anchor="log-specific-terminology">
        <name>Log-Specific Terminology</name>
        <dl>
          <dt>Log:</dt>
          <dd>
            <t>An append-only, tamper-evident record of AGTP-LOG statements
operated by a governance platform. The log implements the
verifiable data structure of <xref target="RFC9162"/> and issues SCITT
receipts per <xref target="RFC9943"/>.</t>
          </dd>
          <dt>Log Operator:</dt>
          <dd>
            <t>The party that operates a log. For AGTP-LOG v00 the log operator
is normatively the governance platform that issued the Agent
Genesis statements committed to the log. Future revisions <strong>MAY</strong>
permit log operation to be delegated to a separate entity.</t>
          </dd>
          <dt>Statement:</dt>
          <dd>
            <t>A single AGTP-LOG entry: a signed assertion by a log operator
about an agent identity event. Each statement has an event type,
subject, payload, issuer, and signature. See <xref target="entry-format"/>.</t>
          </dd>
          <dt>Receipt:</dt>
          <dd>
            <t>A COSE_Sign1 envelope per <xref target="RFC9943"/> issued by a log against a
statement, attesting that the statement has been committed to the
log. The receipt is the consumable proof for verifiers. See
<xref target="receipt-format"/>.</t>
          </dd>
          <dt>Inclusion Proof:</dt>
          <dd>
            <t>A cryptographic proof per <xref target="RFC9162"/> demonstrating that a given
statement is present at a specific position in the log's tree
structure. Embedded within a receipt or retrievable independently
via the log protocol.</t>
          </dd>
          <dt>Consistency Proof:</dt>
          <dd>
            <t>A cryptographic proof per <xref target="RFC9162"/> demonstrating that two
signed tree heads at different sizes are consistent (the smaller
tree is a prefix of the larger). Used by monitors to detect
split-view attacks.</t>
          </dd>
          <dt>Signed Tree Head (STH):</dt>
          <dd>
            <t>The log operator's signed assertion of the current tree size and
root hash per <xref target="RFC9162"/> Section 4.10.</t>
          </dd>
          <dt>Witness:</dt>
          <dd>
            <t>A third party that countersigns the log's signed tree heads to
attest that it has observed the log in a consistent state. The
witness role is defined informally here and normatively specified
in a future revision; see <xref target="open-items"/>.</t>
          </dd>
          <dt>Monitor:</dt>
          <dd>
            <t>A party that polls the log's STHs and consistency proofs to detect
split-view attacks or operator misbehavior. The monitor role is
defined informally here and normatively specified in a future
revision; see <xref target="open-items"/>.</t>
          </dd>
          <dt>Verifier:</dt>
          <dd>
            <t>A consumer of an AGTP-LOG receipt that confirms a given Agent
Genesis is committed to a log. Any party holding a Canonical
Agent-ID and a <tt>log_uri</tt> can act as a verifier.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="log-scope">
      <name>Log Scope</name>
      <t>A log <strong>MUST</strong> accept statements for at least the following five
AGTP-LOG event types. The event type is recorded in the statement
envelope (see <xref target="entry-format"/>).</t>
      <table>
        <name>AGTP-LOG v00 Event Types</name>
        <thead>
          <tr>
            <th align="left">Event Type</th>
            <th align="left">Triggered By</th>
            <th align="left">Subject</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>agent-genesis-issued</tt></td>
            <td align="left">ACTIVATE method completion</td>
            <td align="left">Canonical Agent-ID derived from the new Agent Genesis</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agent-genesis-revoked</tt></td>
            <td align="left">REVOKE method completion</td>
            <td align="left">Canonical Agent-ID being retired</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agent-lifecycle-suspended</tt></td>
            <td align="left">SUSPEND method completion</td>
            <td align="left">Canonical Agent-ID entering Suspended state</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agent-lifecycle-reinstated</tt></td>
            <td align="left">REINSTATE method completion</td>
            <td align="left">Canonical Agent-ID returning to Active state</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agent-lifecycle-deprecated</tt></td>
            <td align="left">DEPRECATE method completion</td>
            <td align="left">Canonical Agent-ID entering Deprecated state</td>
          </tr>
        </tbody>
      </table>
      <t>The above five event types form the initial AGTP-LOG event-type
registry (see <xref target="future-registries"/>). Future event types <strong>MAY</strong>
be registered as new operational categories arise without requiring
revision of this document.</t>
      <t>Implementations <strong>MAY</strong> log additional event types beyond the above
five. Agent Certificate issuance and revocation events, defined in
<xref target="AGTP-CERT"/>, are explicit candidates: a deployment that operates
both AGTP-LOG and an Agent Certificate authority <strong>MAY</strong> log
certificate-lifecycle events to the same log. Whether a deployment
logs certificate events is a deployment decision; logging them is
<strong>NOT</strong> required by this document. When logged, the event types
<strong>MUST</strong> be registered in the AGTP-LOG event-type registry; ad-hoc
event-type strings <strong>MUST NOT</strong> be admitted.</t>
      <t>Statements <strong>MUST NOT</strong> carry secret material. The Agent Genesis is
public by design; the Canonical Agent-ID is derived from a public
hash; lifecycle states are operational facts. A log operator that
finds itself wanting to commit a secret to the log is misusing the
protocol.</t>
    </section>
    <section anchor="log-architecture">
      <name>Log Architecture</name>
      <section anchor="per-platform-logs-v00-default">
        <name>Per-Platform Logs (v00 Default)</name>
        <t>Each AGTP governance platform <strong>MUST</strong> operate a log if it issues
Agent Genesis statements with <tt>verification_path: log-anchored</tt>.
The governance platform is the log operator. Statements committed
to the log are signed by the governance platform's key as recorded
in the Agent Genesis <tt>issuer</tt> field.</t>
        <t>A governance platform operating a log advertises the log's URI in
the <tt>log_uri</tt> field of every Agent Genesis it produces under the
log-anchored path. See <xref target="discovery"/>.</t>
        <t>Per-platform logs follow the SCITT issuer-local convention: each
issuer commits its own statements to its own log, signed with its
own key, with receipts referencing that issuer's identity. This
matches typical deployment patterns and minimizes operational
coupling between governance platforms.</t>
      </section>
      <section anchor="federation-via-cross-witnessing">
        <name>Federation via Cross-Witnessing</name>
        <t>When a deployment requires that statements from one governance
platform be verifiable by participants who do not implicitly trust
that platform's log operator, the platform <strong>MAY</strong> invite a witness
to countersign its signed tree heads. The witness adds a second
signature over the STH, attesting that the witness has observed the
log in a consistent state at that tree size.</t>
        <t>The cross-witnessing model preserves per-platform log operation
while introducing third-party attestation. A verifier presented
with an Agent Genesis from platform A and the corresponding receipt
<strong>MAY</strong> require the STH to be countersigned by a witness whose key
the verifier trusts before accepting the inclusion proof.</t>
        <t>The witness protocol, witness selection, witness key publication,
and the schema of countersigned STHs are deferred to v01 per
<xref target="open-items"/>.</t>
      </section>
    </section>
    <section anchor="entry-format">
      <name>Entry Format</name>
      <t>Every statement is a SCITT-aligned signed envelope per <xref target="RFC9943"/>.
The envelope is a COSE_Sign1 structure per <xref target="RFC9052"/> containing
the following protected and unprotected header parameters and
payload.</t>
      <t>The protected header <strong>MUST</strong> carry:</t>
      <table>
        <name>AGTP-LOG Statement Protected Header</name>
        <thead>
          <tr>
            <th align="left">Parameter</th>
            <th align="left">CBOR Label</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>alg</tt></td>
            <td align="left">1</td>
            <td align="left">Signing algorithm. <strong>MUST</strong> be <tt>ES256</tt> (-7), <tt>ES384</tt> (-35), <tt>ES512</tt> (-36), or <tt>EdDSA</tt> (-8).</td>
          </tr>
          <tr>
            <td align="left">
              <tt>kid</tt></td>
            <td align="left">4</td>
            <td align="left">Key identifier of the log operator's signing key (governance platform key).</td>
          </tr>
          <tr>
            <td align="left">
              <tt>cty</tt></td>
            <td align="left">3</td>
            <td align="left">Content type. <strong>MUST</strong> be <tt>application/agtp-log-statement+cbor</tt>.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-event-type</tt></td>
            <td align="left">TBD</td>
            <td align="left">One of the event-type strings registered in the AGTP-LOG event-type registry.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-subject</tt></td>
            <td align="left">TBD</td>
            <td align="left">Canonical Agent-ID, encoded as a 32-byte CBOR byte string.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-issuer</tt></td>
            <td align="left">TBD</td>
            <td align="left">URI of the governance platform issuing this statement.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-issued-at</tt></td>
            <td align="left">TBD</td>
            <td align="left">Statement issuance time as an RFC 3339 timestamp.</td>
          </tr>
        </tbody>
      </table>
      <t>The unprotected header <strong>MAY</strong> carry implementation-specific
parameters; verifiers <strong>MUST</strong> ignore unprotected parameters not
recognized.</t>
      <t>The payload <strong>MUST</strong> be a CBOR-encoded map whose contents depend on
the event type:</t>
      <t>For <tt>agent-genesis-issued</tt>:</t>
      <artwork><![CDATA[
{
  "agent-genesis": <bytes>,             ; the canonical CBOR-encoded
                                         ; Agent Genesis document
  "log-position": <uint>,                ; assigned by log operator
                                         ; on entry commit
  "previous-tree-size": <uint>           ; tree size before this entry
}
]]></artwork>
      <t>For <tt>agent-genesis-revoked</tt>, <tt>agent-lifecycle-suspended</tt>,
<tt>agent-lifecycle-reinstated</tt>, and <tt>agent-lifecycle-deprecated</tt>:</t>
      <artwork><![CDATA[
{
  "lifecycle-event": <text>,             ; matches event-type
  "reason": <text>,                      ; operator-supplied reason
  "previous-state": <text>,              ; lifecycle state prior to event
  "new-state": <text>,                   ; lifecycle state after event
  "log-position": <uint>,
  "previous-tree-size": <uint>
}
]]></artwork>
      <t>The CBOR encoding <strong>MUST</strong> be deterministic per <xref target="RFC8949"/>
Section 4.2 (Canonical CBOR). The signature is computed over the
COSE_Sign1 <tt>Sig_structure</tt> per <xref target="RFC9052"/> Section 4.4.</t>
      <t>A statement is accepted into the log only after the log operator
has verified:</t>
      <ol spacing="normal" type="1"><li>
          <t>The signature is valid against the log operator's published key.</t>
        </li>
        <li>
          <t>The <tt>agtp-issuer</tt> URI matches the log operator's identity.</t>
        </li>
        <li>
          <t>The <tt>agtp-subject</tt> is a well-formed 32-byte Canonical Agent-ID.</t>
        </li>
        <li>
          <t>The <tt>agtp-event-type</tt> is registered in the AGTP-LOG event-type
registry.</t>
        </li>
        <li>
          <t>The payload structure conforms to the schema for the declared
event type.</t>
        </li>
        <li>
          <t>For <tt>agent-genesis-issued</tt>, the hash of the embedded Agent
Genesis matches the <tt>agtp-subject</tt> byte for byte.</t>
        </li>
      </ol>
      <t>Statements failing any of these checks <strong>MUST NOT</strong> be appended to
the log. The log operator <strong>MUST</strong> record the rejection in its
operational logs but <strong>MUST NOT</strong> commit the rejected statement to
the verifiable tree.</t>
    </section>
    <section anchor="receipt-format">
      <name>Receipt Format</name>
      <t>A receipt is a COSE_Sign1 envelope per <xref target="RFC9943"/> attesting that
a statement has been committed to the log. Receipts are the
consumable proof for AGTP verifiers.</t>
      <t>The receipt's content type is <tt>application/scitt-receipt+cose</tt> per
<xref target="RFC9943"/>. The receipt's payload references the statement's
position in the log and embeds an inclusion proof against a signed
tree head.</t>
      <t>The protected header <strong>MUST</strong> carry:</t>
      <table>
        <name>AGTP-LOG Receipt Protected Header</name>
        <thead>
          <tr>
            <th align="left">Parameter</th>
            <th align="left">CBOR Label</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>alg</tt></td>
            <td align="left">1</td>
            <td align="left">Signing algorithm; same constraint as statement signing.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>kid</tt></td>
            <td align="left">4</td>
            <td align="left">Key identifier of the log operator's signing key.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>cty</tt></td>
            <td align="left">3</td>
            <td align="left">Content type. <strong>MUST</strong> be <tt>application/scitt-receipt+cose</tt>.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>verifiable-data-structure</tt></td>
            <td align="left">TBD</td>
            <td align="left">
              <strong>MUST</strong> be <tt>RFC9162_SHA256</tt> per <xref target="RFC9162"/>.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-statement-position</tt></td>
            <td align="left">TBD</td>
            <td align="left">The log position (zero-indexed) of the committed statement.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-statement-hash</tt></td>
            <td align="left">TBD</td>
            <td align="left">SHA-256 hash of the canonical CBOR-encoded statement.</td>
          </tr>
          <tr>
            <td align="left">
              <tt>agtp-signed-tree-head</tt></td>
            <td align="left">TBD</td>
            <td align="left">The STH the inclusion proof attests against.</td>
          </tr>
        </tbody>
      </table>
      <t>The payload <strong>MUST</strong> be a CBOR-encoded map carrying the inclusion
proof:</t>
      <artwork><![CDATA[
{
  "tree-size": <uint>,                   ; STH tree size
  "leaf-index": <uint>,                  ; position of statement
  "audit-path": [<bytes>, <bytes>, ...]  ; Merkle audit path per RFC 9162
}
]]></artwork>
      <t>Receipts <strong>MUST</strong> be retrievable by any party that holds the
Canonical Agent-ID and the <tt>log_uri</tt>. The receipt <strong>MUST NOT</strong>
contain the statement itself; verifiers requiring the statement
<strong>MUST</strong> retrieve it separately. This separation keeps receipts
small enough to embed in the Agent Genesis (<tt>log_inclusion_proof</tt>
field) without bloating the Agent Identity Document.</t>
      <t>The receipt for an <tt>agent-genesis-issued</tt> event <strong>MUST</strong> be embedded
in the Agent Genesis's <tt>log_inclusion_proof</tt> field at the moment the
Agent Genesis is finalized. The governance platform commits the
statement to the log, retrieves the resulting receipt, embeds the
receipt in the Agent Genesis, and only then signs the Agent Genesis
and computes the Canonical Agent-ID. This ordering ensures the
Canonical Agent-ID hashes a document containing its own inclusion
proof.</t>
    </section>
    <section anchor="log-protocol">
      <name>Log Protocol</name>
      <t>The log operator exposes four operations to clients. All operations
<strong>MUST</strong> be available over HTTPS at paths relative to the log's
base URI (the <tt>log_uri</tt> value advertised in the Agent Genesis).
Implementations <strong>SHOULD</strong> also expose these operations over AGTP
at the same logical paths once AGTP transport bindings are stable.</t>
      <section anchor="submit-statement">
        <name>Submit Statement</name>
        <t><tt>POST {log_uri}/statements</tt></t>
        <t>Request body: a single COSE_Sign1 statement per <xref target="entry-format"/>.
Content-Type <tt>application/agtp-log-statement+cose</tt>.</t>
        <t>Response on success: HTTP 201 with the resulting receipt per
<xref target="receipt-format"/>. Content-Type <tt>application/scitt-receipt+cose</tt>.</t>
        <t>Response on signature failure: HTTP 400 with body indicating
which validation step failed (signature, issuer match, subject
format, event type, payload schema, or genesis hash mismatch).</t>
        <t>Submission is normatively restricted to the log operator itself:
external parties <strong>MUST NOT</strong> be able to submit statements directly.
The log operator validates and signs internally, then commits. This
preserves the log's role as an attestation of the operator's own
governance decisions.</t>
      </section>
      <section anchor="retrieve-receipt">
        <name>Retrieve Receipt</name>
        <t><tt>GET {log_uri}/receipts/{statement-hash}</tt></t>
        <t>Path parameter: hex-encoded SHA-256 hash of the canonical CBOR
statement.</t>
        <t>Response on success: HTTP 200 with the receipt per
<xref target="receipt-format"/>.</t>
        <t>Response on miss: HTTP 404 with body indicating whether the hash is
unknown to this log or refers to a statement that has not yet been
committed.</t>
      </section>
      <section anchor="retrieve-inclusion-proof">
        <name>Retrieve Inclusion Proof</name>
        <t><tt>GET {log_uri}/proofs/inclusion?leaf-index={index}&amp;tree-size={size}</tt></t>
        <t>Query parameters:</t>
        <ul spacing="normal">
          <li>
            <t><tt>leaf-index</tt>: the position of the statement (zero-indexed)</t>
          </li>
          <li>
            <t><tt>tree-size</tt>: the STH tree size against which the proof is computed</t>
          </li>
        </ul>
        <t>Response on success: HTTP 200 with a CBOR-encoded inclusion proof
per <xref target="RFC9162"/> Section 4.11. The proof is the audit path; the
caller is responsible for verifying it against the STH at the
requested tree size.</t>
        <t>This operation duplicates information already in receipts; it
exists for clients that hold a position and need a fresh proof
against a different STH than the one originally bound in the
receipt.</t>
      </section>
      <section anchor="retrieve-consistency-proof">
        <name>Retrieve Consistency Proof</name>
        <t><tt>GET {log_uri}/proofs/consistency?first-tree-size={n}&amp;second-tree-size={m}</tt></t>
        <t>Query parameters:</t>
        <ul spacing="normal">
          <li>
            <t><tt>first-tree-size</tt>: the smaller tree size</t>
          </li>
          <li>
            <t><tt>second-tree-size</tt>: the larger tree size</t>
          </li>
        </ul>
        <t>Response on success: HTTP 200 with a CBOR-encoded consistency proof
per <xref target="RFC9162"/> Section 4.12. The proof attests that the tree at
size <tt>n</tt> is a prefix of the tree at size <tt>m</tt>.</t>
        <t>Used by monitors to detect split-view attacks. A monitor that
observes two different signed tree heads from the same log
operator at the same tree size <strong>MUST</strong> treat that as evidence of
operator misbehavior.</t>
      </section>
      <section anchor="retrieve-signed-tree-head">
        <name>Retrieve Signed Tree Head</name>
        <t><tt>GET {log_uri}/sth</tt></t>
        <t>Response on success: HTTP 200 with the current STH per <xref target="RFC9162"/>
Section 4.10. The response is a CBOR-encoded structure carrying
tree size, root hash, timestamp, and the log operator's signature
over those fields.</t>
        <t>The STH is the anchor for all inclusion and consistency proofs
issued by the log. Verifiers <strong>MUST</strong> retrieve and cache the STH
before validating any proof.</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Discovery</name>
      <t>A verifier holding a Canonical Agent-ID locates the log containing
the relevant inclusion proof via the <tt>log_uri</tt> field of the Agent
Genesis. This document proposes <tt>log_uri</tt> as a new field to be
added to the Agent Identity Document schema defined in <xref target="AGTP"/>;
adoption of the field is anticipated in a future revision of
<xref target="AGTP"/>, coordinated with the publication of this document.</t>
      <t>The <tt>log_uri</tt> field, once adopted, carries an absolute HTTPS URI
pointing to the base of the log's protocol surface. All log
protocol operations defined in this document are exposed at paths
relative to this URI.</t>
      <t>A verifier that has retrieved an Agent Genesis (whether via
canonical Agent-ID resolution per <xref target="AGTP"/>, via the AGTP DISCOVER
method, or via any other means) <strong>MUST</strong>:</t>
      <ol spacing="normal" type="1"><li>
          <t>Read the <tt>log_uri</tt> field.</t>
        </li>
        <li>
          <t>Validate that the URI uses the <tt>https://</tt> scheme.</t>
        </li>
        <li>
          <t>Open a TLS connection to the log endpoint.</t>
        </li>
        <li>
          <t>Retrieve the STH, verify its signature against the governance
platform's published key.</t>
        </li>
        <li>
          <t>Retrieve the inclusion proof for the Agent Genesis (either by
parsing the embedded <tt>log_inclusion_proof</tt> receipt or by
requesting a fresh proof from the log).</t>
        </li>
        <li>
          <t>Verify the inclusion proof against the STH.</t>
        </li>
      </ol>
      <t>If the <tt>log_uri</tt> field is absent from an Agent Genesis whose
<tt>verification_path</tt> is <tt>log-anchored</tt>, the Agent Genesis is
<strong>malformed</strong> and the verifier <strong>MUST</strong> reject the agent identity.</t>
      <t>If the <tt>log_uri</tt> is present but the log is unreachable at
verification time, the verifier <strong>MAY</strong> fall back to the cached
inclusion proof embedded in the Agent Genesis's
<tt>log_inclusion_proof</tt> field if such a cached proof exists and
remains valid against the verifier's last-known good STH.</t>
      <t>Until the <tt>log_uri</tt> field is adopted into <xref target="AGTP"/>, implementations
<strong>MAY</strong> convey the log URI through other means: as an out-of-band
configuration value keyed on the governance platform's <tt>issuer</tt>
URL, or as a well-known location relative to <tt>issuer</tt> (e.g.,
<tt>{issuer}/log</tt>). These mechanisms are deployment-specific and
<strong>MUST NOT</strong> be relied on for cross-platform interoperability. The
normative discovery mechanism is the <tt>log_uri</tt> field once adopted.</t>
      <t>A well-known URI discovery mechanism (e.g.,
<tt>/.well-known/agtp-log</tt>) is not specified in this revision. AGTP
v07 does not currently define any well-known URI conventions, and
introducing one solely for AGTP-LOG discovery is premature. Future
revisions of AGTP-LOG <strong>MAY</strong> define a well-known discovery path
if the broader AGTP family adopts well-known URI conventions.</t>
    </section>
    <section anchor="integration-with-agtp">
      <name>Integration with AGTP</name>
      <t>The <tt>log_inclusion_proof</tt> field defined in the Agent Identity
Document of <xref target="AGTP"/> v07 references the inclusion proof produced by
this log. A verifier retrieves the proof, validates it against the
log's signed tree head, and confirms the Agent Genesis is committed
to the log.</t>
      <t>The <tt>verification_path: log-anchored</tt> value defined in <xref target="AGTP-TRUST"/>
indicates that the agent's Trust Tier 1 verification depends on a
log-committed Agent Genesis. Verifiers consuming such an agent
<strong>MUST</strong> perform the inclusion-proof verification described in
<xref target="discovery"/> before granting Authority-Scope decisions on the
agent's behalf.</t>
      <t>The <tt>log_uri</tt> field is proposed by this document as an addition to
the Agent Identity Document defined in <xref target="AGTP"/>. Its adoption is
anticipated in a future revision of <xref target="AGTP"/>, coordinated with the
publication of this document. Until adoption, deployments <strong>MAY</strong>
convey log location through the alternative mechanisms described
in <xref target="discovery"/>.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="log-operator-compromise">
        <name>Log Operator Compromise</name>
        <t>The log operator is also the issuer of statements in the AGTP-LOG
v00 model. A compromised log operator could:</t>
        <ul spacing="normal">
          <li>
            <t>Sign a fraudulent Agent Genesis for an Agent-ID it does not
control, commit it to the log, and present the resulting receipt
as proof of a non-existent agent's existence.</t>
          </li>
          <li>
            <t>Refuse to commit valid statements, denying agents legitimate
Trust Tier 1 standing.</t>
          </li>
          <li>
            <t>Backdate statements by manipulating its internal clock prior to
signing.</t>
          </li>
          <li>
            <t>Operate two parallel logs presenting different signed tree heads
to different verifiers (a split-view attack).</t>
          </li>
        </ul>
        <t>The first three threats are inherent to any single-issuer log model
and are partially mitigated by the witness mechanism (deferred to
v01) and by external monitors that detect inconsistency. The
split-view attack is specifically detectable via the consistency
proof operation: a monitor that observes a second STH at the same
tree size as a previously-observed STH from the same operator
<strong>MUST</strong> treat the divergence as evidence of compromise.</t>
        <t>Deployments that require defense against log operator compromise
<strong>SHOULD</strong> require witness countersignatures on STHs (when v01
specifies the witness protocol) and <strong>SHOULD</strong> subscribe to
independent monitors that surface inconsistency evidence.</t>
      </section>
      <section anchor="witness-collusion">
        <name>Witness Collusion</name>
        <t>In a future revision incorporating witnesses, two or more witnesses
colluding with a malicious log operator could countersign
inconsistent STHs. This threat is structurally identical to log
operator compromise from the verifier's perspective: the verifier
trusts the witness set, and a colluding witness set is no better
than a colluding operator. Mitigations are deferred to v01 along
with the witness protocol itself.</t>
      </section>
      <section anchor="private-key-handling">
        <name>Private Key Handling</name>
        <t>The log operator's signing key is the root of all trust in
AGTP-LOG. Operators <strong>MUST</strong> protect this key with controls
appropriate to a long-lived signing identity: hardware security
modules, key ceremonies for key generation and rotation, and
documented operational procedures for key recovery.</t>
        <t>Key rotation procedures and the binding of historical STHs to
retired keys are not specified in this revision; see
<xref target="open-items"/>.</t>
      </section>
      <section anchor="statement-privacy">
        <name>Statement Privacy</name>
        <t>Statements in AGTP-LOG are public by design. The Agent Genesis
itself is published as the canonical identity record of an agent;
the lifecycle events that follow it are operational facts. AGTP-LOG
is not a confidential audit log.</t>
        <t>Operators <strong>MUST NOT</strong> commit statements containing secrets,
operational credentials, or other sensitive material. The validation
gates in <xref target="entry-format"/> are insufficient to filter privacy
violations; preventing privacy leaks in statement payloads is the
operator's responsibility.</t>
      </section>
      <section anchor="replay-and-statement-substitution">
        <name>Replay and Statement Substitution</name>
        <t>A statement signed by a valid log operator and committed to a log
is durable: the log operator cannot retroactively replace it
without breaking the consistency property of the tree. However,
duplicate submissions of the same logical statement at different
positions are not prevented by the protocol; the log operator
<strong>SHOULD</strong> deduplicate statements before commit, using the
canonical CBOR encoding as the deduplication key.</t>
      </section>
      <section anchor="threat-model-reference">
        <name>Threat Model Reference</name>
        <t>The full Trust Tier 1 threat model is specified in <xref target="AGTP"/>
Section 7 and <xref target="AGTP-TRUST"/>. AGTP-LOG is one of three equivalent
verification paths; the threat model considers attacks against the
log-anchored path within the broader context of <tt>dns-anchored</tt> and
<tt>hybrid</tt> alternatives.</t>
      </section>
    </section>
    <section anchor="future-registries">
      <name>Future Registry Considerations</name>
      <t>The AGTP family includes several constructs (status codes, header
fields, identity document fields, method names, media types) whose
long-term stewardship will require coordinated management once the
ecosystem matures. Several of these constructs are AGTP-specific
and have no current home in existing standards-body registries. The
appropriate venue for AGTP registry stewardship — IANA, an AGTP
governance forum, a foundation, or some combination — is an open
question for the broader AGTP family and is not decided in this
document.</t>
      <t>This section enumerates the registry-shaped artifacts AGTP-LOG
defines, so that whichever stewardship model the AGTP family
eventually adopts has a clear inventory of what AGTP-LOG
contributes. No commitment to any specific registry venue is made
by this document.</t>
      <section anchor="agtp-log-event-types">
        <name>AGTP-LOG Event Types</name>
        <t>The five v00 event types form an extensible event-type set:</t>
        <table>
          <name>AGTP-LOG v00 Event Types</name>
          <thead>
            <tr>
              <th align="left">Event Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>agent-genesis-issued</tt></td>
              <td align="left">This document, <xref target="log-scope"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>agent-genesis-revoked</tt></td>
              <td align="left">This document, <xref target="log-scope"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>agent-lifecycle-suspended</tt></td>
              <td align="left">This document, <xref target="log-scope"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>agent-lifecycle-reinstated</tt></td>
              <td align="left">This document, <xref target="log-scope"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>agent-lifecycle-deprecated</tt></td>
              <td align="left">This document, <xref target="log-scope"/></td>
            </tr>
          </tbody>
        </table>
        <t>New event types <strong>MUST</strong> be defined in a published specification
that describes the triggering condition, subject, payload schema,
and the validation rules a log operator applies before commit.
Implementers introducing event types prior to a formal registry
process <strong>SHOULD</strong> prefix experimental types with <tt>x-</tt> to avoid
namespace collisions with future registered types.</t>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>This document defines two media types for AGTP-LOG message
serialization:</t>
        <dl>
          <dt><tt>application/agtp-log-statement+cose</tt></dt>
          <dd>
            <t>AGTP-LOG statement envelope (COSE_Sign1 per <xref target="RFC9052"/>).</t>
          </dd>
          <dt><tt>application/agtp-log-statement+cbor</tt></dt>
          <dd>
            <t>AGTP-LOG statement payload (CBOR, deterministic encoding per
<xref target="RFC8949"/> Section 4.2). Used as the payload of the COSE_Sign1
envelope.</t>
          </dd>
        </dl>
        <t>The SCITT receipt media type <tt>application/scitt-receipt+cose</tt> is
defined in <xref target="RFC9943"/> and reused without redefinition.</t>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>The following protected-header parameter names are introduced by
this document. CBOR label assignments are not made by this
document; implementations prior to a formal registry process
<strong>SHOULD</strong> use string-form labels in the protected header rather
than numeric labels, and <strong>MUST</strong> document their string-to-numeric
mapping for downstream tooling.</t>
        <table>
          <name>AGTP-LOG Protected Header Parameter Names</name>
          <thead>
            <tr>
              <th align="left">Parameter Name</th>
              <th align="left">Use</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>agtp-event-type</tt></td>
              <td align="left">Event type string for the AGTP-LOG statement.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>agtp-subject</tt></td>
              <td align="left">Canonical Agent-ID (32 bytes) the statement concerns.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>agtp-issuer</tt></td>
              <td align="left">Governance platform URI signing the statement.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>agtp-issued-at</tt></td>
              <td align="left">Issuance timestamp per RFC 3339.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>verifiable-data-structure</tt></td>
              <td align="left">Receipt parameter; <strong>MUST</strong> be <tt>RFC9162_SHA256</tt>.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>agtp-statement-position</tt></td>
              <td align="left">Log position of the statement the receipt covers.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>agtp-statement-hash</tt></td>
              <td align="left">SHA-256 of the canonical statement encoding.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>agtp-signed-tree-head</tt></td>
              <td align="left">The STH the receipt attests against.</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="identity-document-field">
        <name>Identity Document Field</name>
        <t>The <tt>log_uri</tt> field defined in <xref target="discovery"/> is proposed as an
addition to the Agent Identity Document defined in <xref target="AGTP"/>. Its
adoption is anticipated in a future revision of <xref target="AGTP"/> and will
be reflected in whichever field-management mechanism the AGTP
family adopts for the Agent Identity Document schema.</t>
      </section>
    </section>
    <section anchor="open-items">
      <name>Open Items</name>
      <t>The following items are explicitly out of scope for this revision
and are anticipated in future revisions:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Witness protocol.</strong> Witness selection, key publication,
countersigned STH schema, witness inclusion in receipts, and the
failure modes when witness signatures are inconsistent.</t>
        </li>
        <li>
          <t><strong>Monitor role.</strong> Formal monitor specification: polling cadence,
consistency-proof retention, split-view reporting protocol, and
monitor discoverability.</t>
        </li>
        <li>
          <t><strong>Federation across governance platforms.</strong> Cross-platform agent
identity resolution when multiple governance platforms operate
independent logs and an agent originates from one but is invoked
via another. The v00 model assumes per-platform isolation.</t>
        </li>
        <li>
          <t><strong>Key rotation.</strong> Procedures for rotating the log operator's
signing key, binding historical STHs to retired keys, and
ensuring older inclusion proofs remain verifiable across key
rotations.</t>
        </li>
        <li>
          <t><strong>Log operator delegation.</strong> Whether and how a governance
platform may delegate log operation to a separate entity while
preserving the issuer-equals-operator property.</t>
        </li>
        <li>
          <t><strong>Statement deduplication.</strong> A normative deduplication algorithm
that is robust to byte-level variations in CBOR encoding (the
protocol currently relies on deterministic encoding to make this
tractable).</t>
        </li>
        <li>
          <t><strong>Discovery via well-known URI.</strong> Specification of a well-known
discovery endpoint per <xref target="RFC8615"/> once the broader AGTP family
adopts well-known URI conventions.</t>
        </li>
        <li>
          <t><strong>CBOR label assignments for AGTP-LOG header parameters.</strong> The
table in <xref target="future-registries"/> marks these as TBD pending the
outcome of AGTP family registry stewardship decisions. Until
numeric labels are assigned, implementations <strong>SHOULD</strong> use the
string-form parameter names and document their string-to-numeric
mapping for downstream tooling.</t>
        </li>
        <li>
          <t><strong>Registry stewardship venue.</strong> Whether AGTP-LOG registries
(event types, media types, header parameters, identity document
fields) are stewarded through IANA, an AGTP governance forum, or
another mechanism is an open question for the AGTP family. This
document enumerates the registry-shaped artifacts it contributes
without committing to a venue.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Feedback from Scott Courtney (GoDaddy / ANS) on SCITT alignment and
production deployment considerations informed this draft. The
event-type registry structure follows the SCITT philosophy of
deterministic CBOR statement envelopes with externally-managed
event-type names, allowing the AGTP ecosystem to add new event
categories without spec revisions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="AGTP">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-TRUST">
          <front>
            <title>AGTP Trust and Verification Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8V963Ib13bm//0Uu6SqmFQAiLrZx9ScyfBItMWJLGlEWp5U
aspsoDeAjhpopLtBCqE5lcoznMqvPEke5zzJrG+tfe1uUHRmUqM6xxKJ7n1Z
9zvG47Fqi7Y0x/rByY8XH/RFna2bTVab9Wyn31YL/aGu2mpWlQ9UNp3W5so+
OH77/scHKq9m62xFL+d1Nm/Hy6rKx9mi3YzLajE+OlKzrDWLqt4d62I9r1Sz
na6KpimqdbvbGPwyNxtD/1m3qtjUx7qtt0379Ojo+6Onis6QYbPNpixoHXqp
0dk61x9NVo4vipV5oK6r+vOirrYbeu4srKXP/T4P1Gezo8fyY6X1WJ+c6WxB
TzT8UxvflU7Mvzx/dXZxwf/iJ3WBFYt2x79aVFemXmfrmVGqaek0v2Zltaab
7EyjNgU2IWDJj1o3Vd3WZt74n3er8KPKtu2yquVc821ZCiBfLeui0W8IkPSB
1lW9yNbFP/H1j/W7alW1xWykz9azCX9uVllRHusZ3vpva/l4khX82bYujvWy
bTfN8ePH0WdqXdUrWvHKYPOPP7x6+uTJ9/aff3jy3XP3z++fu99+f/Tiqfvn
k2/9P79//gz/BDkc846ekhhyTEpzU3sS0gd49PABPxuujz97AdCYujANqMc9
erZuCQemHb8GzSWkF9GTkOHRd/xSTmR4rJ8ePf1WKSyVXv8P3z554e4xfnX6
8aJzGbCF3OiVqdtiDmo0+vRLa9ZCYv9Z1+ErMBWOZ7QzGKpzG3voi48/nw+d
+gLsxEzzifadWzbS5xsz8z/9Jx+fOXrg5Go8Jg6bNsSDs1apiyVtQ9JkuwKc
GzmgaXS7NHpYLh04KXR4jKdUtgHmx9W6ZF7WG0d07TJr9ZaIot4Ua1nxEuKJ
uJiubPJLC6aLgkj1ibqKIbXJ2qXOzbxYm5yklb65wa63txPtdtdZWSxo2euC
nry5sRxye6sOYmJJTv90cnSoMzmJ7JZNSwPgZJrgsZ2129oAa4pk2JaA8Or9
+emv57TNE12bmSk2baM3dFjZjrjw9lYfsNw61ETcelZXTTM2s6rZNa1ZEckT
jip6I5sWJYmyiU7BnZVNpQ3Js2lZNMsY6kz26syKQH2RfalIkOwI+MwPP5o1
UUMz0q+ydbWmq5byxvjs9ajPMoeKUeFgqK+OvtNeFBHWsryim+FwJsWgQ8DS
1EbNIIIbTWvXOx0UysiBhv5uiUivsnJEGJuVW3w6prWqefQRLUPMS9AhhPQ+
ZI7Ji4a32umrIvNU8ysJ1UtNpFnmuporBlQMion+YOrxpsxaSBlcg5QWYZNx
fXSEq2Tbsn3JJDs3RJRCaKsqNyUhryyra4E/49OikoiLVie+W4AiwXAT/Yv8
TuGsKwJ+S4ivK9ARoFWwvhwxJ+toH7rqzOREX43cko8BHJQC0XE2m5lNCw1H
n5EGbu3RcAla2dTEMaTj6DJPJsLEqyLPS9KHDyEL6ion+qWdlGICAo4JMdWC
lBgRVofxiAlIexIgeS+jzT9uC0KAKA/iSSU8qXs82fSZUoQgWDMhbpXKkr5k
sCwO4YHTTPRpVpfYliWZIuqkzTP7cB1BIFvT5iUdQlhlL7uTsFIirF5dvD2M
DgxVQ2xAh222xJwNYSnX0x3tFJ1f2GFtvrSKjK8CxAx4pUtcF4RlPpsB4rxs
irmLCID4Byy4tsDTBcmR6noNoEwEX/xWsaYH8dndAopP4eUdyyu84NhQtGx4
isVUV/LkFeFlXQGwciZeYlbvNm21qLPNspgRuopVgUvQYWs+Ewvzcgd26Eh9
Zms+IcHpJV0wUiXL6ho4Y2QFO057XmUB2ZJlljGV4AnarWpMdIKRvgYZfC6Y
WOYEDXoDN/HUpYSB6EnsJ9CDvHLixD0n7IdnPNydbIflq6fVds1kFkSMF8Ov
HW1AbxpNFi69S6xT26OU2XqxJbvByxPGAKw8wZP8DFOPMALGvTD1qlhXdKwd
/fgwkv26L/tvHjqTeNza391abncfgKZn1WpDwMsDdxMIWpLIrTalHNRSg1tF
XZM8EGFEwiKnFdazLXEbnYK1q8hQyJMuH9hrFY3q6RPw6pJchMWy2rZBsTFz
63m2KsodaD+W4cfqmJmO6GGVremDkW5I+dJKgWzGZbaDjHCEvGHBR48QdZy8
ujj7dHJxCmeA3BSRHLF6JSpkq+6bxkNM2Dw5BoAI8QwnoFiQ2IAcrXM9r6sV
kWExW5LiLnUFtg6QzyCFyKSChKwJDhN91gIwWrMxYQWMGeIAf00P7cjd0f4x
OjVRnNBvVs+WtAkhGce7qkREk3W07t2FVlgbMEBt5CSsAyOSSWFUNAH+bNQI
KMpibvWFERgS8vrGBzB4op+++HY8pWVTcbLMmqVboWPFbEGumYN6iiJwMWQ3
QM4U5LWIyA2oW0GiPw6sc3sgi0tNym1L8i2rydJg3cV2hXvqkiycjNAGaAJU
8DnB2ASXET8JTrcv1WZB7FTvvBqHLfQPZsYSN3ZsATQSZ9DuJAU7R0wOKARj
CcyDh963AGJ5Woi8ZuUXHG6+l+ejSBUyJohTNwAQ7fc/Jy+OvtdXzwgphuGa
lQOq3Ko1ZpwpZC1YafjcJCEv3p7r1bbd0q/hxmBVayow3TAsyBMfAxLMtYk5
AfC9P3hyqEk+b8gEgXs4M2IXt/ocvxyfhl/SIh+qgoVX77Ji6hHUzTUrTCwt
XEE/jYStMsYpCccVQJfr74/GebYDAIscbEDEVFR5LA5iw4KgjwUcpgIQRx4r
jp+IHOBctYbR5o0DR90pe3oTlyQHWWAADLucdt9xQcaacQ6vVTu1KYXsl8VG
Z2SCLrBEY5wtZ4X8sVL/m/4oJxX1wcqQWqXDEysdwi38y5//Rf76t7/8+Z/p
f1aWNvLTX/7137unPbBy6r+fv3/nRbBbSg/88Tvs+fTPshVEg9h29gjRCfqk
lxzdruDovCS+BPG9JTYu9TPYl2W1Y3j0bhXj94D541ANHfPuP/Ykv/ste/BA
H/ugLliEdUAG7diFEFLTgT6xDB/ZZSS6shWR9ZjUNgsLq8dITnnTJ9hRUHdi
iLGqyoYUVXARi9WmDPYXvft7zFVt3WsX8dvnW0/4Yvo9HwtBEmsekKrdiYxy
pqNm03GifyDU+7vB7XOuR2XXYHWcmOd7dLKsb1X3gEyOLVAIlaJtjTcb5Sxb
vr4zmhr96NFPJ3/36BE0OnDXRgeDPKR3p3D1SrPI7FoERkO3BYFaa0Wpc7ev
6Fr4pmXkebAzeYw3hVWzpgGZ0/qM1A4ssimMM2cWBRlG3AMP6DQjW8dfFBoc
z/KHGoHkEWKrov1GhJZdWWX5SIBWi37EKTLAYaLPSTbd3IizKz4KY/ijIF9u
EwVczJrQA8XQDbgEc0quky2yYo1oGw7jzkq7E0Jg9i4Ek6yok5tMjVn3UCdK
W+jcOVTWhICHs10xhUvcAnLG+xl8P3r75sa+Ft/xzIVDEJGt5nLXrrOFJcNd
hVlys2K/KgsXIcYkwl3Hl2WbrSYNIKozc74XrVo1HJBwxgvdjQyrtuajehYl
RK+mJs+tBQpjy18ewQ0bn8HNI9ujhIXj9Ffs3sMyDEGe/wdXbq8rHFcIGodn
c63BXfNizvKT/E2Oc8AO8BGmVh8w2smvKQ3Ind+FKge45sUXZ46WWb0w9eFE
/9wIZdm4TgOqyE1L9I0DbMqiHV8V5hrElc0+N2BHOdUFVn5Dp9IH5xdvDp2o
itmNAN/jSbu/87b4fLgIO/UkGKuqFbu5C6Vzw562fj55ckSnsDEpgTJhkKR8
JCVn5NK2RKMcLw1k0AdoCzgL41j5J6xSTenAV1YQsvgHiURwZlJkrqEFbNBM
gmJFHDESH5OELgKKLB9iSewiBrg5bzBPJehLkoYQIQTQ9bgg0m+YuX4SXMnd
o1tvyAePr0t4kTxWFIEUGvwamsEEDot6VTRTs8yuiqoWMZHEANnd+t0Xjq/L
+vDOC3+yMsfyFIsl+C5zF2WJgxqOAtbzol41Tnr0tFnR0WJWn56sdxaky6rM
Oe4z7GaxTxoFamfQKeQTQWN4IckhD2h0Nu71zUMEJdn6RxyDCYt05M/nF48e
aYnmxFoW4pauUpqsEXEuQRYcak53CmG0oJ+s1xV+gXuKFRS8QL+F8irnoBnQ
VYd0/N/0Ka91gbV+I64vFiQ4aK0/7ejHc+sI/qZ+G4/H/v/01qUkkxYC7bGo
sEt6xRvnzjavYFgxa/825HX1XEVyeTpG+sB+8IU+y4YfTz+9/9t7bzc1AC8p
gAKXjFZGOGC2m5Vm3GwbVgi8+vnP5x9O372+7/IGYgk7nLtFBBvDO9UGeh62
kVzk7N35xe8AHd1iW69ZqVT6BO6WuWs30nNEKW6316cfPp6++h27+au99uv4
3W6OJVv4xweJrRpIq3lwK64e2Wd0SpB3TNXaGqhQxwV78intj/GUcoEKR80i
Xsb214VpQNLOSo1Xd3bq1AU7mMKJk0Fr3l6lXW2RQcF6tyAHFNYDDEoJitLt
k9B5Gl4nq8j5ELbGwO4rRl2eF3aX+GhTs6ts1IVBo+YcaRvy15st2/MhFMC4
4sWaUSSiVRL6GLEFYb6g9AERLHq9QPK0gUkdnMnU+1DTql1GiUnIwvXAoSTX
C/s6uqqK3X1PfvagzqFospX1Kn5ZGo47xqdRnO2K1nFvs6kTnTonfSOKhd5Y
iH1lVlBajx69ew+xa8PZQ+kQ2pkzFguTS1AsQozycjslGitiB8jTx9FeEq7H
y2qmos9An+tFY7WBlqPRylkuGip2gzpPIcRHmtXMiN21yyENB3nVZjslNOOq
uYEx9HJfrKsboyP7kV9VsM1e6oA15nCxQmNG4bgwkWliDzINEQEjo1G0jSnn
+jpbt1ZAiTZmD5CvEjxLnIaMkG1j8aciu1vU6wmCw7BmYE4gcIDU6Afn2L4F
sRxA4LyWnOihUuzo7U3QeORagreOVzGXuCR8+TSQH6ttDr5dxpG/X5H5O9ZJ
RnLC4m5o8yLkDx3kyNcacL5VBCIgwJq3+8PuEk+HYHMmgXL0mlzmUhxam31G
sPWONJbYSCLCrsCRjYmN0J8/nkHmDGe1JfbcpVOf42gk/8Y4j4HHmVTnX/vs
OZuK/Zy4GE1RolsuNy4rUDzZieBCrnkyRBNSCFFbIDc+cRmn36o4nZmmMugD
hQ84bcG/8aEeF/fyTp7s1MnMEJMSD8+4NGK3YaaMxJlNyYtVvyJduGIfMOI8
Ra4PiXLaY2raazj8A5iDG0dM8kNI1sOrfcUFAL/4AgBysiAAE3lqpWUjN4ht
VUgJZNijRI7HwzRJ7k7FwiZ1s8mYX5bki1QcVUaQDWoIUSrOyotfE8g3ZgqR
yTHPsoYp1lcFc6z1yhTLFu8PMu56jqDIS+fHkS5uRBCR7lU+oqN9VpU8q8F4
i1ug60KqvS6kzqxq9Z6wjXn3yjGkOIKjHjUy1JsOpQcqUNfLgiMXUiMhJyQP
eSyOjZzbpc+8r+ICKiQUJH3QTawxiv2OJz4bRJKE3twQqMR0ZnpXDh2WYhzY
bNAvQoiLbDnYXXMinBhIhaIAgB30AHuIdjfWWbL6IBTfiHdrIegWdNpi5H9D
qkeiCeFXkIui4hgwI+VzXcSLqwyyKj2zONf9UhXgRfU82If6lKuIfpBShZuH
iadF6ojlYBLfykRcjbnqy+SOZvdFCUWf+E95gSi4GKLT4b2jFwisEEW2WQE3
QaU+JuBGYIIlTLDYrsPPNneIQC05B6g5QPTGhkMt9HtPe53KBssxXMsPbgF4
FH96/1G/zaZE47/pT5y8HPIqywWckyfwvOherHtKWOTtcjXRsU12eXr+9MW3
l/pg/N3hCD89+8Nz/PTshfz44slT/vFb+pFMk8vT/PX5CX7zB/IReK/PBTtC
z+n/f4tsaEjOuiBaP9aFA4GUDob0JX3g1p61O6z9DBcn+DuzsnOFLBQkP/a1
zp5I/no2rerLiXPm6ONgUGLxiz+9pv++X/ss9oC9+fss13gvGwUPGw0V5pG6
q3JxpTL97Ol4uiOJx5jmf8kp4lWd4eEWhfVgTz9sKjVbK94iE6y3YD7OooOe
R1xmfSYunpBYPzGGfvbs2ff8uwb5pMmwAxuW+eBJ/Q2TuvNlB1jGSUUx2ovE
Hxy7ILYKjPUyquvxpEF0BhkYLx+xIulR5evgPDcKbybklTEmxg5Hq2xjZe9M
KLKxtWqk1lXq/RDzIu80HOORLKy6UVo/SB54cKz/C9De/NdRkhkUJ2TmySc+
1f0TjS872spX5dExwDYuMYBTEM20nUPwClkTFFInb3TvU8DlZlEvFiS23yAm
UG2bMXT8GDreHyIFgw+GWy3HZM2rqVsG6hDYXahrdFekaqTuCi5J5uqugFCM
1PAAUwTu0povXYC+1M6OjSI09HZtskawMPBSDEcLe7oEpKBBUANvJgDl8+9b
q+emoroOXmglR8JKa3N99yJ7Vsrm0Fp+mWEC+wruHU65TAYykWke4izmUkTp
kfdGRdssKG+0TNzeqpAVeaoPXiUsdCg2bbBebaXcFvLCWbIqMhEu6a9fvZ1w
2TMUwl7P2SVMrRU2yFiNRF4pF0sKrHp5adjIVrjlRF5PBo7LpSo+3Tmgctli
40oK0q0T9VTWSFUJVIh3qfpLeOdLPYvf9uqNDalrU5ZsrNFOXo319N1EPY+X
iLVxcU9VC0njta16MdGx8A42HLIb8ON8tEyMVFu8hqhXSaYpS88gtSfqW6kX
GJbb4k7FNWvG5Uhd7sQL1xieHXgxbHAQ/CMNW82zgj3TbL2zW0DZLA0STr3A
18aGx9tK+QKDboIxMIot9JBytX+whFqsxR+P4lIcEZhu204ITUJP4W0XupbI
ZxV5IuzBgpfZqLep/GDWd1LhYJMoqZ7dK92f+pUqu08WX+Dz0cUabB+AGszg
S7W8T+O7Eit+9ZvGaX+fPUqs0Iac83ZsH/7rGVkLl9bhSQqv4/Uc9aZ1YeFS
3zRqIGnPGokJsJEKwMTDCyUQ1i1S3pX//+Z+vJSYtZSF0+k4FRhQZ72D/3vf
4j/sQQzgzq4VSHuMUqZxpASc0ZysarPyv56/OWEfq5OrT9wEBwCvH8Oajp09
+g/+ydQVt9Z9MfmhrxXwtD5o4YcdILsiM//NyZhOl0i0YSNzz7pMWKK3QUPp
uTmU0Q89WOZtHIHu8R2c3NjnOdzTXGdS7gVB1EbqT4LF1rc9hq0cvpQzQtmu
Mdlc8HHXmy8DBuNGBXYAtnlBqM/aJS3w99789/+YTCb/Cwv8ZOrPKGPF49In
A5qCLwaScpaSl29p8iUU6yCQ5BP4HFZDFl8q9gayHC7G4wPTaRlUrCOUDZN0
yqokjRF7aT4T2Em1R6qKz2u4ZcQWu5WuUc7+AqD8bMymCZ0aXNNDSgP9BWzC
QjbqwfD9Ad/H08OvTA+XioPuhz5lOSUK8xG0u9s+okYbCOM9uX2xNGLUOANi
MMvwjfRo9c5pkwM2orqqbPbRqG42ix5cS/+GoG0oQODC+Hg/1uhOxo48Ohqr
/ptt2UZxzJFTQljBq/KB64gPxQZvi7B5qD1Ka1ulHofN8GZP9s3SAhI0TEiG
lHht9lIx1xJz3tO1iISQns9UdKSDz5y5hmlBdGJcmS/oqkECZVtHrQecqyOH
TArTy7grIUmKZldk7jFXsrPx5uLiw7m2XXCNLekmLgi4IENgmpFFCIP9IM0X
STODzy8N0/3hZCDBfv7m/c9vX6O8hjtP+UrW8oyuxCeEdFaucNKmnxnScuLK
9buFOn/uGOA4Gqff0FJiJLXCYwHaECNS6vLDe5IlN/ZKt49D7uQSgo1bL/S0
ym0pK9e4JvFbR7yibE2nqtTaAGOu0/lq4JB1P7ZF2B6gIHrdkgfXNMeMKP30
6EnozekxhTX5enWfev8phoyPzgG85wc/gf62R3l+dCRHAXBQjslLrhdKGpPY
RxSJSd7Vhl8mAjnwy7nyXHFaRq58V3pRwd+huDd4WuxPcWDYSjkxI1ZFw6ug
MipMfugWWBO8SKbMUus88JXojGOFLod6zfRFVG0GfCD2NSppPU6ybXlBkGzR
T9bjWgsP0/hq5EZzV7btFWDhZMWiTTiGnFJI23Jtn0REo3yRs6Miy5SEi4ok
ryu4sCnGj07ZWdVNfPDjacwGTr89vkntuFviig9sBzgj/Zgs+S/e/Pm6dRfk
/Vco/Sim9DvpO10H2Pc0+nyQRvW1LV7xrjWBe7v+vIZIZtoobE6zFv+osUXw
QVWxEZNJK9TOtOz+KW8Sd6DcKbvuQVuKPx97ZfA3wcD74w3/dftX3lj84w3+
C0T8jy2yUyHGTLblmKSzf/fyWFKxkRWYmkmpYY+X/S723cT09O6dsHi7dO5r
FMK6F047NnPHWFd31BjbcJTflguwvHUqTfUzrrKW2A4fpQDD+iL5nejfJH6F
a4qKUbbdzqWhfeq3iPL5Ot+KCEWbopsmgk6ysiZ/gTv0HAOh94pEStHYwlGr
ooMVjBoehyCuyzVIzOg5nX1p4RG86lBlLo5OJvqWW+i5RZRrfKVzWHSxM446
FNmri99Hk1GN8t/Mi7ppxxEhrm//SpLx8S9X+0mzs4ClMVsWH7k49Gh3Xfus
FMhHj/4HyK1Xdn0XwT2NCc55kb6wgM+RtYq543J9OVTTb58RDrpcQb/ur+4f
qu3XJ760myNPtoKhQTtC0nfQraL3tbnObFJeHcX2VOBvbye2PPdB2jyQKUAg
ZIaEZVghLj9PaavbidAjraZdXt5b9ruWBBB8B08qaT6wPqJdVMJ6aTTBh2mt
f678zUehw2EUMoyhs3Yg7MNGjIpmBLB/5OJ2OK0TT1wdJU4ameVB2A23AKi0
S5sDiJ/6yUbvrvIq2WzpSzmUzVI5C8xGdoN/8drPNbl5GKq0EBP1VR0DRfbB
sUGFVhtF7TuVCuRCkNsPJ7wTg9k/RSU4DcpPUUnHRNAK4vWElzl5jUpgWYUL
WFSW5+ZrQxNcWH5gqs9LxSMDImUpi4Oa1lIa1aZdEvEsAuWWGRFMyE0kcdzG
zfRRIctQGfJFHzYjcW/sHIOR7RsX82/aVCVpXOvBkXemNmhLtmWb2I/dthC4
/CbU3BDD1fNsZsRThGQYaGaPAdSm44KkNJmHOzjXUaWuY8ElhpOEqrzR5Ig3
71czHTjTjKhFzYaK5/naTFUsDRzEHXWxK/j67PzV+0+nH5UUybPHgAc4xcHL
rww5i4eenyTT9RF9UwMkyimsT9aCD9IfHvHWlVVeujlrl0JfhjNX7zdcqocG
dWKTtZVXkfth1jmjjZNUXoS2rphNLBZfHCeOWGy5JAMa4pK8Tg7uRWf1LnO6
HFUHG6ZgaE13vHpWu1rfkIQaDhZFXXvyrjWrRKhExk1QUrTOIefCPsmdB8O4
qc2G2v35oEwBw065D1HqpLtkxhUVql8NzBo8nVE0GoALF6qT2SK5R4QxrKLw
tB4Jam7FYU2Q9LYOHT7qn5xuQ2q1QMVtjTpYmSrQpjPKoLBGve25oGUOlTMl
M8LRHKsKRP5SwHp0DocE1V0hwWIO/Q0zSxZ3S4rRixK0GkMK10OJY3dg1JBm
ZBuKC7aoqtzi92eCVbkXxXa+Cye3gyhI63caX/PIRcVerTL72skwsVA4tv51
tW3H1Xw8xQW4bW2xdVW5HPYitpKxJykbxjzoCrbVzx/fsgzKfNZaLlq6dpBY
ePoy7wMzWUxG6vJGfnH7mE59KfUDJNhXhshhXTQrV+/oqoF9wRLDvhu9oJ0K
OXcYFBcKtwbmxJkwUicaieZ3d2ZOT6tHiovVQHRtQH5oKXfhx5PwsA+UXR66
0SNJuyKrGqeEZSqfwowgP1jKGpDlzg29ghLoHCaUm0vAWMVFuvCuSOkghOTy
tJwtCjcQtl3Z/nLpZFKh3z6ec+Bo0Z0lPklYEKJIFSIdpnXFmVJWbDKvyA7K
u+MWEzuNzSwszbIRwsAJdsYefk7UfteKUt6KimcvyVCmJJHclTB+PtIUFcQS
X0nqnNOIP780isJmqceuhjuHR86olibTIcE92KfhrK+vdYdY1t87ek7ZGJOJ
fEQ3RSieMZkOoAmz53TGDRUhtdoZLRgcASkhAHmK7LWTE0Kon5g46s5LpyB2
dm9mdTF1PWhR34ardyMaErvyxPWNjaVx1kcVrRhU7q7wDMv5sE0r3FKJ9djt
7nKxTdt154o89lnyg4M5z1qrGSQGrO5hueu7LXd1p+WuRUe5LUfxrBffw2h1
D/SOF/pO+TCVlBwLZikbSXaPHMVXTJtqHiJQseU+Po7n5N5yv3nY2E9u3cAW
P72Enl0R/Ml/NwPZJWhVpGSYbCRAn0656xRJKfRvcQ/EhHvA3dJ5uuys2pY5
B4EQHWATMNvmWx702GlnkGRmaHkLMwLJjoSvWaNnwNYGFWnWENzvDKjBFAnG
CjRWIsGepGXXY7ZUmPgs+dpfkH9EB/5o5tvGRK1wYsUEkADha5lFuGAQlWZB
1IueP9ouYXueGI1yE1r3T2SVsT8RARcxIcL8ZluK486tTjZLoGdEOJ99saQd
RGEXe28b4hASQtStJHUlVVUWHFjtjlgRj62OHgiJ84OsH5M6tJzN8Twt055k
VqjYIjw/0mZ0oW0lb2ZL/5gwmGKUDJCTQToFhy4xZXHhRv8Ag64RJDISos4O
or4nh4x1etwnbkJYDTLYBtZIBoZYi9g1vXvxJE43GrlkiwHvstHt/MtoFWXp
yHnMSBHGkTrtI3WuaSkKNHPsTUWxdRs55LLUcjf2fUp4JY3k+VrNXrwOFhqh
bsHRujRyF/EmYe91JKLsXFPpBwJwET9zurbDxV5yRClc96pDVdSQwxYRawfu
y4Fzv0Y3Tmcma7clSFAabYFRZiwHgfN47FyKahvVSHHtgSBhSttIR1KwtJl3
dTakFLBGvalsJ6U9IeZ/gsUQ/6zClU1D8p2Wy+2j8IUww3IGXA4IwhhEKjos
Rzn9UEwZvssdFBK5ZJIU9xExEWKuJKYbsBPoJfKvMGB2Y3jcwHHymbI9XDEm
GtPa+Y46uZn7UExxNDO2bqRs/GRokP1JGJq10lBbFqbnL5QPkXUpwWZlBXUf
akymM1ya94YOV3I3ZFeFdVp+rHvC8V1IfPKH+b6wdpwSm3jlGEVYbamiKHus
xIe0CqjBtHEyYuqCpa7MKVkvxiX3Zrv9nat/rJdZnV9zNYLVy4okIKk/oics
PSNxCVKWkQr8KyS46zCgkA4jHXDsnjjbA45cVEYbZjv7ZVCBC4OBIAiwuWXi
R13swlZNAEp0ZQIGUxkzLnGdm71Biwom7/bEeGTMQMPdw6RBh/BJYjQuRi6i
yTGsGjqt8QMd9Mo2rRdx0MtOVw8RRD9SLAyfc0bzSyll7o08gEixbcpFu7eX
3hlCbi6muB9utKUkJ8XF6BJZWuaczHHzhULSdd+MknLpMPWx4bCCRC8aDGcU
AzIZNxBKMdTCpix7lSpWbTfbOam+wqrueQGjFBYHo4k0k533+JIVlbUq7MeY
h/OZ145qYqRuww+yjVjUp2YlzmAzSJsy2zE9BiI5xxTLot3akeKd0l3XpSo2
WSJpbUVXZ5QQ0ERkD5V+3K8BIXKRWdTE4zwIU+pG6FjQKq3yRXokmj+7UGgn
h0Nrtbs4+TfRb6prdNSPlM8bR3PrG5+Xj4ubwjXj4WK+JDuwoMVEsJic6HzZ
u16stHMTnSUyQMXjE7hhHq6b7ZAWcYSeGMtnYTmpkbQYvRAd9hP3SH90AQJr
PGIwfWIdJ+PmgymW+nc+6fedHWSdjn4PM8z3Tpbvf8FDI7BK9p9Zj6rxw7c6
4Yd07IEbWBdHbLhk/wurnct83cRj70mGXy530xr15pHrJ3EbOwrno5ub03Pu
+hN0BKRxiIh9fpKZJBbovjJSQQwJjE8ljG8hZ3JoICnFl0JU+tFLSu+Uu0/s
yCF8MQj/lMMmxtiVQxtQZx2IxigUfZG+y3k0rB1OL1Zi7F+Tr0MCWKJJ8n0D
RvkvrdAST+OBhnKD0JwSrgI2YJz7Lk2eqp5dgTt88nhZrSDexLFjsQpHDOcb
c2lQgKR4BrFyJ+7amtCh4acZxTf8yz//WZ+dvDsZuclnce0VvbpdjWBioi7D
anFarqm4L2E1BTRAililkNgzaU0lCRM3xHhfJJCnmLIkQDQmD6pYJalFLmIW
xqH7rOy0UvGR5ULjZpltoDn9/HCv2iTMQijnwEBmC4B4lncMBWGcNiVEGaez
ZdvVhi15fCe5sybDQG18XNUsMXm0vt+VTa1iiorciX7n3G9XKcx+pQt0e6QI
srgVKjeqNzvIz7ZnERHNuXL+7JV8SUdvxhWmjcr042mZdmyb9rg3js1LurhZ
5a7pa0mye0RCLQyku/3KHLX7vrpnUNrvfz2dfvb730/nmX3l/ftNKHtHHnxn
cFjUqOlDhFlkHzbxNyApGygQH7OxmptH6kFYwHMvhG27Q2ZdSaqfSxHVvdaw
7zujbjUX35qOoo0qpKFw4uRDfC3fJ5vZL0nwdK/YnG+SympbhWS+YKA4Z8NK
u45MQvoyvuS1rqoiVyzSN7By4MTZoC4/5/1i3yYpAw2ZlX5iFeA5KPliD5EZ
7C5HmiJNodCmDdGHathcdd9yptS9KqUxdbI3Pjr07x1EZdqdnlnEr+41xWF4
C4f7A5hCo04rsLeMNjzpNeoKjsrKnroRr9Z8citaSzCcnFZwF3KVRTwsyeXX
A2S/3hAIlRDHy6PWRp5Nx19+ECbnhW8RElzjULYfKrToOcHZn04y7k4jEbPB
OhptNxsUoulsX5bc8ieN/2KZOnsXgt2lDbyKe9nN+d7BK9rySmwNI8ArUy/G
MrcH2/tYd69pMf4mHVamhHd5ZWQjV1b+eG6g54vabdFWY/uWWhHSeHBoha8S
uYZZY7IVnbsqObKbtEO+g4PwGwinr1d6Y0ZOw6xR2TaUePQoes8AkYHar4Nn
T7mDmCy+Niklxle1YATW8NSQHwd6gJCxdIGSZK29c0LO4rkgXKHn29EwGuQ+
XZOuw89T5cs7Wyi/3jL5Nm6U7BVYt1Hxunxt2d0tkq58vlc5H8s3kS9f7Ylc
hm5Id4T7dUF2ux87FMgal+RBPxv3A9yE4ZxfInjiFGOcDOTcn4pyf3dW8e3L
/ako93efqr30G4Tgq8jA0XkpQKDXgrnLtxlHfkvISzjWUmmOPi2s2leMyH4f
F4udIVZGPl4UOOvKWP5tMh+UtoPQRqaOE7OyaRSO86mWDkA64JA67UePfumE
YSfEHr/0p3T1pnPp/jQu37TjQruhMCAqkw/fRaddnxG7E6jUMusQeQ45BdEj
IXQ+kZP/FA3Bxql/EOHv0jKJ2XfMo7nZwss4QyAXGPhaQKmqGMWZsNqg1cyp
PBlkJsPS3V6OzDMf48IBo+l+GVffDE8CpKO/SmtzMjvtIQpk+lJIBtIKqU7S
goMLupGZPNI85E84RWjnxEp5mu0jgHfohweiFg3FE2v2Ouy0fZJN0II2xuiy
wNDZ21V3Dl7R2NChBUIcisZVP6SBa/nI6oU0th/SnjLM0QWt+xFrHUesHW64
Z5OD3GXOX+eUFKmAX1CpFg+VsEjC4Dvtz9zYe7yNTXv7jRn2Sn4+rv2St2z4
u7TIntn579rofxFH74s3NA8RxALSHebbzGV6pvlH8rSbsT+Ti0fa84awahKw
w3lPdFTmlUTz/CgF/g4mSUnV1RSBOxRd7zAumL/l5ipDxITNL4JhGic8EN72
eZ1QlcUFaZwj3GNI0yar7LOMXeLvTsgkJXtoL/U6+Z7OtCYKN0u+7Fay/uEh
TMn377ti3Giez7dPXpBmcNGpoRAMSgruUY6Fk+4xbROXqDfED1e4YOC19psv
hmdoE5Dqz42NkJEqxVAEsLmL4GqoiBliTrYezYWQBiNaoWFQylvw5W2JpSva
xE7m6tVc6o5xLQeITeyeX4BvXP2auaz1Vw1mwPnj0I04NBRzZvQNBQ6KtMFB
5HEnMc5RHzUDsVLoL46WHtrmYz6A8d9BmIYJdT9MKF+Hs3YFqVGVpY0L6l5c
MEKmbR3VAZT3jvYV0qBuI27y9RnsCtokimXFzAISBssr93wFR/AHY3IuNWa9
cT6r2pae2Nakunf64MfqNVl2O/1Yn7w7P+SSAPZkeY6mJDowrNJ/fWw83naW
BsCl5Y5hCs8RX+QoYduB2YhR20//u3U3JEurptosEX1UqfhhXu2HFWxUxNWa
lDtrDObx5jZAnjmDzSMpBLcByTzn/hUZVxbNsHeAh7ESTLOJ+j+1LMzBq38A
AA==

-->

</rfc>
