Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash

"Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com> Fri, 18 June 2021 08:52 UTC

Return-Path: <hendrik.brockhaus@siemens.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E20B23A00C4 for <spasm@ietfa.amsl.com>; Fri, 18 Jun 2021 01:52:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.697
X-Spam-Level:
X-Spam-Status: No, score=-1.697 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, TRACKER_ID=0.1, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=siemens.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sfRxyTlnenq5 for <spasm@ietfa.amsl.com>; Fri, 18 Jun 2021 01:52:09 -0700 (PDT)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20065.outbound.protection.outlook.com [40.107.2.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A81933A00C0 for <spasm@ietf.org>; Fri, 18 Jun 2021 01:52:08 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=K76p/tDGYVl5A5wcLjucY2BJBm2q8vVAEQTl5f2+u7UilfXSTky2igOUY771/pPJL9Wd4q0I4EegbyuG+jgXvHJNx/+U8GbGOVxYVRIeqe68GsuZsX6CwZpccs0EZPFRSpE07aWSJHTXnaOOlXEhSRMyS0uA4EAhegHqu1D+4NJU8MhqiRR4snoZGzrsjDI2OLfT2WMlZpjA5QcEfUCbi4Uo+LL++Ek7bOPbcKFMSrz2KXw9BplOLdBiM/+tQt1be9rL8xLBdQMKlz82dMX/OHSmfmMjGxbtNGL3/8/nt0W//md8szmvNmaUW7B7Y+MflijLTxRX4UxhPpUay4DKEw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ljxo1ZrM1el7z02YIGV40LOixtoHYyAvgVWIy6QqH8Q=; b=g7Yy5yH8FWBafy23ZOvj0G2xgdFsmoFeEGCIxfJ0BcIGHeXWs1TBhPP7RCsolPYkMOVIQC/S75h+SCa1M+yLvwpUhAFsu4yHJErr3pevj5e0IKDWniCZQlPCa1lnh62zXhL6UmPyLUgJe9CQny3oxTmf/3gwXD7SCGUZ2u3bjFsHrrf7aQkCT87u6xRRNPiKK5aUS07+Y8aogpMJKuGWrRo3jjU8/PHpdvauVFGfo43Kpu9oh0FDjWzjAxqf/hVd8OOvOq5kr/J3yhY0pPWi/S5CIwirZAykPJ/uV8r78h23ul9wFV503TXh/iR68pCT6loT9dU3qI3VS8QjRPm6pA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ljxo1ZrM1el7z02YIGV40LOixtoHYyAvgVWIy6QqH8Q=; b=jbPjy8Jb88qpHoOM4XprIWbQYqelA+td0uWmrc2HvLnz4y0sCh8/YLy3BrXGC6LUkJsb/15Z6bmAnCXz1IH/Y0kD6dvndCC7V8ZhfTL5FHOWcMlw8LGDyX58wbUn6GKCqEVyv3lVISMXk/LxLWoznrecREjBdrzXUmi/RmTELk0=
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:dd::17) by AM4PR1001MB1236.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:200:98::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.18; Fri, 18 Jun 2021 08:52:05 +0000
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::d10f:2627:bd2d:f3b4]) by AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::d10f:2627:bd2d:f3b4%6]) with mapi id 15.20.4242.021; Fri, 18 Jun 2021 08:52:05 +0000
From: "Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com>
To: Russ Housley <housley@vigilsec.com>, Lijun Liao <lijun.liao@gmail.com>
CC: LAMPS WG <spasm@ietf.org>, "david.von.oheimb@siemens.com" <david.von.oheimb@siemens.com>
Thread-Topic: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash
Thread-Index: AddceUVg9PxwdNejS6OabHeKscwR6QABS1KAADHFalAAX7CF8ADCO3SAAAr3OwAAgrgasAADYq8AAANAJgA=
Date: Fri, 18 Jun 2021 08:52:04 +0000
Message-ID: <AM0PR10MB2418DEA2C636EEB2EE568B68FE0D9@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM>
References: <AM0PR10MB24188C86D787842B2C7D9DD6FE379@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM> <783FEFC2-CE5C-430C-8243-F4B80290C80A@vigilsec.com> <AM0PR10MB2418EB88CECDE3315B7388B1FE369@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM> <AM0PR10MB24180B8830DE52C665D631D9FE349@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM> <ed01a7e0-cad7-55da-9ca8-c41657033cbc@von-Oheimb.de> <DB57BE98-990A-4455-8153-6081A1193400@vigilsec.com> <AM0PR10MB2418FA4AC2D9E56ADBAEFE44FE0D9@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM> <CANNx7D8j4Q_NisViBd93e-fzfS8eOtzE1r8qQZ2TiMNBoDWJJQ@mail.gmail.com>
In-Reply-To: <CANNx7D8j4Q_NisViBd93e-fzfS8eOtzE1r8qQZ2TiMNBoDWJJQ@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Enabled=true; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SetDate=2021-06-18T08:52:03Z; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Method=Standard; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Name=restricted-default; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ActionId=cb86a800-269d-46d7-a4a1-d82db6453b37; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ContentBits=0
document_confidentiality: Restricted
authentication-results: vigilsec.com; dkim=none (message not signed) header.d=none;vigilsec.com; dmarc=none action=none header.from=siemens.com;
x-originating-ip: [147.161.169.32]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ac97987f-e20b-4bca-e47e-08d9323658ec
x-ms-traffictypediagnostic: AM4PR1001MB1236:
x-ld-processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <AM4PR1001MB1236FC7F09BDA7452473C424FE0D9@AM4PR1001MB1236.EURPRD10.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ehPwqRBBKJLv/imfQ6gfap13F63jZv9d4lEI5Vn7By6V/wPhra84xm8vhaQCyMjNKEqhCnCSi8SQ91atKxyp2gxF9H6563keREC4mECFGZu/nn2kx5vBx8yftGDrYm/tmqziFaBfzt2hj1nYoFI6ZKGNNw/FCUm+D+0KSi5AXCbhQLGjXo6ntgxgmlcRIAAFqVMM/2WBbu8BKQoo+PgX2p2eFL9UwHjG4xlB0OMmIIewGEIizEPTF3FUhu+7t5q1vaEJHseTczlDGi3h1GCg9HEyc0Yye40ObGkB2nYuYzoeqv3yXw9BSpeZcm5edrqdmbRVQWbd25HH1cQBdvaI9o7vTwXmiL89mR1hDuepfINOy84DN9y3OARy48fDqgp70JhK68YMZ8Erhfo/VWi0fKGU54lj8il9gYe1dKxNzIZ/mCXqBrQAVB2+pSjW6X3AhGS6Kw3rKOlWp1/KhjxhAChyEwjM7x2a3A4TNz+tsHOZRzHqSAW4nOVTvsZeaHpOQYhw3n03txjBHPrsRsMOH4ZAQBrnm0luW14oXU9r0bvYEnX5OsY+/XZyI+M/q5H2D2qvyxhWZXePSgpKMoVjJ1SQjeB4/Yr5HAqo4D9Cd94ELT8iluznOJiAxlQ0R4OjwY7IMVWFWcRLaS9mloUoST9cHc7rsbh0cx+nogXpcjfdP/aSYfqEUiBeXsN0BoGytekf0zjifhKtrCBnr4iPYsBsWSXxMjqOeI/QCmPgZAWMVtycudHHu69LNTGkovBp
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(376002)(346002)(136003)(39860400002)(366004)(396003)(316002)(122000001)(38100700002)(7696005)(45080400002)(71200400001)(66446008)(8936002)(5660300002)(4326008)(9686003)(33656002)(54906003)(55016002)(86362001)(107886003)(478600001)(53546011)(6506007)(110136005)(52536014)(966005)(26005)(186003)(8676002)(66946007)(66476007)(2906002)(76116006)(166002)(83380400001)(64756008)(66556008)(15650500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_AM0PR10MB2418DEA2C636EEB2EE568B68FE0D9AM0PR10MB2418EURP_"
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: ac97987f-e20b-4bca-e47e-08d9323658ec
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jun 2021 08:52:05.0199 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NDH5iGEI2Km6Y/oCgGc8coALRk2Df9NshHA6bkfRQRD7cPMA+GC7sTwZ+8TA/zTwStIvQu7L4ZBi5WtUkItiR5XT/1S7bcLm3wNuuiKs+M8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR1001MB1236
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/_gqc_mzfqnYZiOkR3M0T-KQCRto>
Subject: Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Jun 2021 08:52:14 -0000

Thanks Lijun for you feedback.
I would also change CMP Algorithms Section 3.3 to make it clear which hash algorithms to use with CMP.

Current text:
Specific conventions to be considered are specified in RFC 8419 [RFC8419].

New text:
Specific conventions to be considered are specified in RFC 8419 [RFC8419]. The hash algorithm used to calculate the certHash in certConf messages MUST be SHA512 if the certificate is signed using Ed25519 and SHAKE256 if signed using Ed448.

Hendrik

Von: Lijun Liao <lijun.liao@gmail.com>
Gesendet: Freitag, 18. Juni 2021 09:14
An: Brockhaus, Hendrik (T RDA CST SEA-DE) <hendrik.brockhaus@siemens.com>
Betreff: Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash

Fine for me.

Brockhaus, Hendrik <hendrik.brockhaus@siemens.com<mailto:hendrik.brockhaus@siemens.com>> schrieb am Fr., 18. Juni 2021, 08:55:

Thanks Russ and Lijun for your feedback.



Trying to address Lijun's concerns and still keeping full crypto agility we could also do the following:



Old Syntax as of RFC 4210:

     CertStatus ::= SEQUENCE {

        certHash    OCTET STRING,

        -- the hash of the certificate, using the same hash algorithm

        -- as is used to create and verify the certificate signature

        certReqId   INTEGER,

        -- to match this confirmation with the corresponding req/rep

        statusInfo  PKIStatusInfo OPTIONAL

     }



Proposed new Syntax:

   CertStatus ::= SEQUENCE {

      hashAlg [0] AlgorithmIdentifier OPTIONAL,

      -- the hash algorithm to use for calculating certHash

      -- MUST be present if the hash algorithm to use is neither implied by the AlgorithmIdentifier of the certificate signature nor by other standards like [CMP Algorithms]

      -- SHOULD be present only if this field is supported on client and server side and MUST be indicated by using cmp2021(3)

       certHash    OCTET STRING,

      -- the hash of the certificate to be confirmed

      -- if hashAlg is present, the given hash algorithm MUST be used

      -- if hashAlg is not present, the hash algorithm implied by the AlgorithmIdentifier of the certificate signature or by other standards like [CMP Algorithms] MUST be used

       certReqId   INTEGER,

       -- to match this confirmation with the corresponding req/rep

       statusInfo  PKIStatusInfo OPTIONAL }



Would this help to be as backward compatible and as crypto agile as possible.



What do you think?



Hendrik


Von: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Gesendet: Dienstag, 15. Juni 2021 17:14
An: David von Oheimb <nl0@von-Oheimb.de<mailto:nl0@von-Oheimb.de>>
Cc: Lijun Liao <lijun.liao@gmail.com<mailto:lijun.liao@gmail.com>>; LAMPS WG <spasm@ietf.org<mailto:spasm@ietf.org>>; Brockhaus, Hendrik (T RDA CST SEA-DE) <hendrik.brockhaus@siemens.com<mailto:hendrik.brockhaus@siemens.com>>; von Oheimb, David (T RDA CST SEA-DE) <david.von.oheimb@siemens.com<mailto:david.von.oheimb@siemens.com>>
Betreff: Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash

David:

I think this means that any new signature mechanisms need to say what the default hash for use with CMP will be.

Russ


On Jun 15, 2021, at 6:00 AM, David von Oheimb <nl0@von-Oheimb.de<mailto:nl0@von-Oheimb.de>> wrote:

Russ, Lijun, et al.,

we have not yet heard back on our latest proposal how to determine the hash alg to use for the certHash field in CMP certConf messages.
Would be good to finalize this topic by the end of this week in order to bring it into the next version of the CMP-related drafts.
To summarize, our proposal is to add a hashAlg field to the CertStatus structure as follows, which is binary backward compatible:

   CertStatus ::= SEQUENCE {

      hashAlg [0] AlgorithmIdentifier OPTIONAL,

      certHash    OCTET STRING,

      certReqId   INTEGER,

      statusInfo  PKIStatusInfo OPTIONAL

   }
In case the signature alg identifier of the cert explicitly contains a hash alg (which so far always was the case until EdDSA came up),
then use that hash alg and the optional hashAlg field MUST be omitted, which means the certConf message can keep version CMPv2.
Otherwise, the hashAlg field MUST be used to specify the hash alg used and the version of the certConf message is CMPv3.
(In addition, we gonna specify in the CMP- Algorithms draft that  SHA-512 SHALL be used for Ed25519 and SHAKE256 for Ed448,
like done for CMS in RFC8419).
Does this sound fine?
    David
On 11.06.21 15:21, Brockhaus, Hendrik wrote:

If there is any further feedback to this from the WG, please let me know.

If not, I would include the section into the draft and submit an updated version.



Hendrik



Von: Spasm <spasm-bounces@ietf.org><mailto:spasm-bounces@ietf.org> Im Auftrag von Brockhaus, Hendrik



Russ



Thank you for this suggestion. In the meantime, David tested the backward

compatibility of this approach. It works fine.



Von: Russ Housley <housley@vigilsec.com><mailto:housley@vigilsec.com>



The 3rd choice seems to be the most future proof.  You can add something

like:

CertStatus ::= SEQUENCE {

   hashFunc [0] AlgorithmIdentifier DEFAULT sha256Identifier,

   ...

This was the solution David and I discussed as well. But we called the field

hashAlg, like in OOBCertHash.

We feel the DEFAULT is in conflict with the CMP V2, that determines the hash

algorithm from the signatureAlgorithm field of the certificate to be confirmed.

We also tried to prevent to specify fixed algorithms in CMP to be crypto agile

and prevent future updates. Therefore, we propose not to use the DEFAULT.

@Liao, using this approach, you would need to specify SHA-512 for certificate

signed with Ed25519 and SHAKE256 for Ed448. I would add a note on this to

CMP Algorithms.



That said, this would introduce another place where the CMP protocol

version comes into play with the ASN.1 parsing.

You are absolutely right.





To introduce the hashAlg field, we propose to add the following section to CMP

Updates:



---------------------------snip---------------------------

2.10.  Update Section 5.3.18. - Certificate Confirmation Content



This section introduces an optional hashAlg field to the CertStatus type used in

certConf messages to explicitly specify the hash algorithm for those certificates

where no hash algorithm is specified in the signatureAlgorithm field.



Replace the ASN.1 Syntax of CertStatus with the following text:



   CertStatus ::= SEQUENCE {

      hashAlg [0] AlgorithmIdentifier OPTIONAL,

      certHash    OCTET STRING,

      certReqId   INTEGER,

      statusInfo  PKIStatusInfo OPTIONAL

   }



The hashAlg field SHOULD be used only in exceptional cases where the

signatureAlgorithm of the certificate to be confirmed does not specify a hash

algorithm, neither in the OID nor in the parameters. In such cases, e.g., for

EdDSA, the hashAlg MUST be used to specify the hash algorithm to be used for

calculating the certHash value. Otherwise, the certHash value SHALL be

computed using the same hash algorithm as used to create and verify the

certificate signature. If hashAlg is used, the CMP version indicated by the

certConf message header must be cmp2021(3).

---------------------------snip---------------------------



Any comments and feedback on this proposal from the WG is welcome!



Hendrik



_______________________________________________

Spasm mailing list

Spasm@ietf.org<mailto:Spasm@ietf.org>

https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf

.org%2Fmailman%2Flistinfo%2Fspasm&amp;data=04%7C01%7Chendrik.brockha

us%40siemens.com<https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2F40siemens.com%2F&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cbcc6e177123949512a8908d93228ac99%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637595972536970561%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=ftxARzek3QgghAeelIjUb6mi91nSim8yXM8%2Bv5xLwn0%3D&reserved=0>%7C8a0703abedbe44504c8d08d92b5fec60%7C38ae3bcd957

94fd4addab42e1495d55a%7C1%7C0%7C637588513262560559%7CUnknown%7

CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJ

XVCI6Mn0%3D%7C1000&amp;sdata=PTvMzW780CJ3gNrZVhPiRZX%2BwzA7LXIo

LQcLQkgJk%2Bk%3D&amp;reserved=0

_______________________________________________

Spasm mailing list

Spasm@ietf.org<mailto:Spasm@ietf.org>

https://www.ietf.org/mailman/listinfo/spasm<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fspasm&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cbcc6e177123949512a8908d93228ac99%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637595972536980556%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=xBz6CR316E%2FYAJcnJ29txSQpDbPL402iqfaOizH0m1A%3D&reserved=0>