<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-bgp-savnet-04" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="BGP Extensions for SAVNET">BGP Extensions for Source Address Validation Networks (BGP SAVNET)</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-bgp-savnet-04"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Tan" fullname="Zhen Tan">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tanzhen6@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="F." surname="Gao" fullname="Fang Gao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gaofang@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="11"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 84?>

<t>Many source address validation (SAV) mechanisms have been proposed for preventing source address spoofing. However, existing SAV mechanisms are faced with the problems of inaccurate validation or high operational overhead in some scenarios. This document proposes BGP SAVNET by extending BGP protocol for SAV. This protocol can propagate SAV-related information through BGP messages. The propagated information will help edge/border routers automatically generate accurate SAV rules. These rules construct a validation boundary for the network and help check the validity of source addresses of arrival data packets.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) is essential for preventing source address spoofing attacks (<xref target="RFC6959"/>) and helps trace back network attackers. For a network, SAV mechanisms can be deployed on edge routers or border routers for validating the packets from the connected subnets or neighboring ASes <xref target="manrs-antispoofing"/>.</t>
      <t>ACL-based ingress filtering (<xref target="RFC2827"/>, <xref target="RFC3704"/>) and Source-based RTBH ([RFC5635]) can be used for source address filtering. However, the two mechanisms are not specific for SAV. High operational overhead may be induced if they are managed mostly by manual configurations <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. Many SAV mechanisms, such as strict uRPF, loose uRPF, FP-uRPF, VRF-uRPF, and EFP-uRPF (<xref target="RFC3704"/>, <xref target="RFC8704"/>), leverage local routing information (FIB/RIB) to automatically generate SAV rules. The rules indicate the wanted incoming interfaces of source addresses and deny source addresses coming from unwanted interfaces <xref target="I-D.huang-savnet-sav-table"/>. The uRPF mechanisms can achieve good automation but may have inaccurate validation problems under asymmetric routing <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. This is because these uRPF mechanisms are "single-point" designs. They leverage the local FIB or local RIB table to determine the valid incoming interfaces for source addresses, which may not match the real incoming interfaces. That is, purely relying on local routing information for SAV is not enough for achieving both good automation and high accuracy</t>
      <t>This document proposes extensions of BGP protocol for SAV networks, named as BGP SAVNET. Unlike existing "single-point" mechanisms, BGP SAVNET allows coordination between the routers within a network or in different ASes by propagating SAV-specific information through extended BGP messages <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>. SAV-specific information supplements the missing part of the local route information and assists routers to generate accurate SAV rules. The following figure shows a comparison of existing uRPF mechanisms and BGP SAVNET.</t>
      <artwork><![CDATA[
+-------------+  Normal BGP  +------------+ (Good automation
| Routing     |--------------> uRPF       | but inaccurate
| Information |\             | Mechanisms | under asymmetric
+-------------+ \            +------------+ routing)
                 \ Normal BGP
                  +-------------+
                                |
+-------------+              +--\/--------+ (Accurate SAV
| SAV-specific| Extended BGP | BGP        | rules and adaptive to
| Information |--------------> SAVNET     | various scenarios)
+-------------+              +------------+
]]></artwork>
      <t>The BGP SAVNET protocol is suitable to generating SAV rules for both IPv4 and IPv6 addresses. The SAV rules can be used for validating any native IP packets or IP-encapsulated packets.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation, an approach to preventing source address spoofing.</t>
        <t>SAV Rule: The rule that indicates the valid incoming interfaces for a specific source prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Internal (or Local) Source Address: The source addresses owned by the subnets of local AS. The source addresses of the connection link between subnets and local AS can also be considered as internal source addresses.</t>
        <t>External (or Remote) Source Address: The source addresses owned by other ASes. Some source addresses like anycast addresses can be both internal and external source addresses.</t>
        <t>Local Routing Information: The information in a router's local RIB or FIB that can be used to infer SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among routers.</t>
        <t>Edge Router: An intra-domain router for an AS that is directly connected to a subnet of the AS.</t>
        <t>Border Router: An intra-domain router for an AS that is connected to other ASes. A router in an AS can be both an edge router and a border router, if it is connected to both the AS's subnets and other ASes.</t>
        <t>Source AS: The AS whose source prefixes need to be validated at Validation AS.</t>
        <t>Validation AS: The AS that conducts SAV for the source prefixes of Source AS.</t>
        <t>SPA: Source prefix advertisement, i.e., the process for advertising the origin source addresses/prefixes of a router or an AS.</t>
        <t>SPD: Source path discovery, i.e., the process for discovering the real incoming directions of particular source addresses/prefixes.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-relat">
      <name>BGP Protocol Relationship</name>
      <t>The BGP extensions for BGP SAVNET follow a backward compatible manner without impacting existing BGP functions. New BGP SAVNET subsequent address families will be introduced under the IPv4 address family and the IPv6 address family, respectively. The BGP UPDATE message (specifically the MP_REACH_NLRI and the MP_UNREACH_NLRI attributes) and the BGP Refresh message will be extended. AFI and SAFI will be used for distinguishing the BGP SAVNET messages from other messages.</t>
      <t>A few existing path attributes such as Originator_ID and Clister_list or newly defined path attributes <bcp14>MAY</bcp14> be used for BGP SAVNET. Actually, most existing path attributes are not necessarily required for BGP SAVNET. However, if the unnecessary path attributes are carried in BGP updates, they will be accepted, validated, and propagated consistent with the BGP protocol.</t>
    </section>
    <section anchor="sec-solution">
      <name>BGP SAVNET Solution</name>
      <section anchor="goals">
        <name>Goals</name>
        <t>For an AS, the goal of BGP SAVNET is to construct a validation boundary for the AS. SAV-specific information propagated by extended BGP messages can assist edge and border routers on the network boundary to generate SAV rules. Edge routers connected to subnets generate rules for validating packets from users, while border routers connected to other ASes generate rules for validating packets from other ASes. <xref target="fig-goal"/> shows the example of validation boundary for an AS</t>
        <figure anchor="fig-goal">
          <name>An example of validation boundary for an AS</name>
          <artwork><![CDATA[
        +-----+           +-----+
        | AS3 |           | AS4 |
        +-----+           +-----+
             \             /
+-------------\-----------/-------------+
| AS2        +-#--+   +--#-+            |
|            | R7 |---| R8 |            |
|            +----+   +----+            |
|              |         |              |
|            +----+   +----+            |
|      ------| R5 |---| R6 |------      |
|      |     +----+   +----+     |      |
|      |       |         |       |      |
|   +----+   +----+   +----+   +----+   |
|   | R1 |   | R2 |---| R3 |   | R4 |   |
|   +--*-+   +-*--+   +--#-+   +-#--+   |
+-------\-----/-----------\-----/-------+
       +-------+          +-----+
       |Subnet1|          | AS1 |
       +-------+          +-----+
]]></artwork>
        </figure>
        <t>From a perspective of an AS, source addresses can be largely classified into two categories: internal (or local) source address and external (or remote) source address. The BGP SAVNET solution consists two parts: intra-domain BGP SAVNET and inter-domain BGP SAVNET. The parts of solution focus on the validation of internal and external source address, respectively.</t>
        <ul spacing="normal">
          <li>
            <t>Intra-domain BGP SAVNET: SAV for protecting internal source addresses. In <xref target="fig-goal"/>, it can be deployed at '*' or '#' to restrict a subnet to use only its own internal source addresses and to block external packets from other ASes with any internal source addresses. SAV rules are generated without any cooperation or interactions (such as prefix advertisements) between the local AS and subnets/other ASes.</t>
          </li>
          <li>
            <t>Inter-domain BGP SAVNET: SAV for protecting external source addresses. In <xref target="fig-goal"/>, it can be deployed at '#' for blocking the source addresses of packets coming from unwanted directions (i.e., coming from unwanted neighbor ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
          </li>
        </ul>
      </section>
      <section anchor="intra-domain-bgp-savnet">
        <name>Intra-domain BGP SAVNET</name>
        <t><xref target="fig-intra-savnet"/> shows an example of intra-domain BGP SAVNET. Router 1 and Router 2 are edge routers that enable SAV at the interfaces connected to subnets. Router 3 is a border router that conducts SAV at the interfaces connected to other ASes.</t>
        <t>In general, there are four types of interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>Single-homing interface. When a subnet has only one uplink connected to the upper-layer network, the connected interface at the edge router of upper-layer network can be defined as a "Sigle-homing interface", e.g., Intf.1 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Complete multi-homing interface. When a subnet has dual or multiple uplinks that connect to a single upper-layer network with BGP SAVNET deployed, the connected interfaces at the edge routers of upper-layer network are called "Complete multi-homing interfaces", which corresponds to Intf.2 and Intf.3 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Incomplete multi-homing interface. When a subnet has dual or multiple uplinks that are connected to multiple upper-layer networks, the interfaces at the edge routers of upper-layer network are called the "Incomplete multi-homing interfaces", which corresponds to Intf.4 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Internet interface. It's the external interfaces that are connected to the Internet on border routers. Typically, a network usually has multiple Internet interfaces for load balancing or backup, which corresponds to Intf.5 and Intf.6 in <xref target="fig-intra-savnet"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-intra-savnet">
          <name>An example of intra-domain BGP SAVNET</name>
          <artwork><![CDATA[
+-----------------------------------------+
|               Other ASes                |
+-----------------------------------------+
              |      |                |
              |      |                |
+-------------|------|----------------|---+
| AS          |      |                |   |
|       Intf.5|      |Intf.6          |   |
|           +-*------*-+              |   |
|           | Router 3 |              |   |
|           +----------+              |   |
|              /     \                |   |
|             /       \               |   |
|            /         \              |   |
|   +----------+     +----------+     |   |
|   | Router 1 |     | Router 2 |     |   |
|   +--#-----#-+     +-#-----*--+     |   |
|Intf.1|Intf.2\ Intf.3/       \Intf.4 |   |
|      |       \     /         \      |   |
|      |        \   /           \     |   |
|   Subnet1    Subnet2           Subnet3  |
|                                         |
+-----------------------------------------+

Intf '#' enables prefix allowlist
Intf '*' enables prefix blocklist

]]></artwork>
        </figure>
        <t>The goal of intra-domain BGP SAVNET is to generate source prefix allowlist or blocklist for the interfaces on edge or border routers. For the "Single-homing interface" and "Complete multi-homing interface", prefix allowlist is applied (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>). The prefix allowlist of an interface should only include all the source prefixes of the connected subnet and denys any source addresses not covered by the prefixes in the list. In <xref target="fig-intra-savnet"/>, the prefix allowlist of Intf. 1 should only include all the source prefixes of Subnet1, and the prefix allowlists of Intf. 2 and Intf. 3 should only include all the source prefixes of Subnet2.</t>
        <t>For "Incomplete multi-homing interface" and "Internet interface", prefix blocklist is enabled (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>). For a specific interface, its prefix blocklist should include the internal prefixes that are owned by the subnets connected to "Single-homing interfaces" and "Complete multi-homing interfaces". In <xref target="fig-intra-savnet"/>, the prefix blocklist of Intf. 4, Intf. 5, and Intf. 6 should include all the source prefixes of Subnet1 and Subnet2. The reason why "Incomplete multi-homing interface" like Intf. 4 not using prefix allowlist is that the local AS itself can hardly learn the complete set of source prefixes of Subnet3 if the subnet advertises asymmetric prefixes to the multi-homed up-layer networks (i.e., the local AS is one of the up-layer networks).</t>
        <t>The above goal should be achieved while meeting two requirements of high accuracy (even under asymmetric routing) and good automation. To this end, Source Prefix Advertisement (SPA) process is designed in intra-domain BGP SAVNET solution. During the SPA process, edge routers will proactively announce all the source prefixes learned by local "Single-homing interfaces" and local "Complete multi-homing interfaces" from the connected subnets via SPA messages. Some related information of each announced source prefix will also be propagated together with the source prefix. The related information of each announced source prefix can be:</t>
        <ul spacing="normal">
          <li>
            <t>Multi-homing Interface Group Type (MIIG-Type): It indicates the type of the interface that learns the prefix. MIIG-Type <bcp14>MUST</bcp14> be one of the four types mentioned above.</t>
          </li>
          <li>
            <t>Multi-homing Interface Group Tag (MIIG-Tag): It is to identify the subnet of the prefix. The prefixes belonging to the same subnet <bcp14>MUST</bcp14> have the identical MIIG-Tag value. Different subnets <bcp14>MUST</bcp14> have different MIIG-tag values.</t>
          </li>
          <li>
            <t>(Only) Source Flag: It indicates whether the prefix is owned by one subnet. By default, the flag is set because most of the prefixes are owned by one network. For anycast addresses/prefixes or direct server return (DSR) addresses/prefixes <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, the flag should be unset (possibly manually).</t>
          </li>
        </ul>
        <t>It can be seen that the SPA message of a source prefix includes four parts: source prefix, MIIG-Type, MIIG-Tag, and Source Flag. Next, how to use the SPA messages to generate SAV rules will be introduced.</t>
        <ul spacing="normal">
          <li>
            <t>In the case of "Single-homing interface", the prefix allowlist can be generated only through local routing information (i.e., local RIB), without the engagement of SPA messages. The method building the allowlist is, each Dest Prefix in RIB that records this interface as an outgoing interface will be added to the prefix allowlist.</t>
          </li>
          <li>
            <t>In the case of "Complete multi-homing interface", in addition to collecting prefixes of the target interface itself in local RIB, routers also need merge prefixes from the received SPA messages and other local interfaces into the allowlist to construct a complete list. First, the prefixes in received SPA, which take the same "MIIG-Type" and "MIIG-Tag" values as the target interface, are added to the allowlist. Second, if there are local interfaces having the same "MIIG-Type" and "MIIG-Tag" values, they will share prefixes collected from local RIB into each other's allowlist.</t>
          </li>
          <li>
            <t>Routers with "Incomplete multi-homing interface" or "Internet interface" will generate prefix blocklist for the target interface. First, the prefixes of local "Single-homing interfaces" or "Complete Multi-homing interfaces" on the local router will be put into the blocklist. Second, the prefixes in the received SPA messages which have the MIIG-Types of either "Single-homing interface" or "Complete Multi-homing interface" but with Source Flag being set, will also be added into the blocklist. The prefix with Source Flag being unset will not be included into the blocklist because the prefix is multi-source and the "Incomplete multi-homing interface" or "Internet interface" may be the legitimate incoming interface of the multi-source prefix.</t>
          </li>
        </ul>
        <t>Note that, intra-domain BGP SAVNET solution can also work if the subnet is a stub AS (e.g., the subnets are replaced with stub ASes in <xref target="fig-intra-savnet"/>). The source prefixes of the stub AS can be considered as the internal prefixes of the local AS when conducting the solution.</t>
      </section>
      <section anchor="inter-domain-bgp-savnet">
        <name>Inter-domain BGP SAVNET</name>
        <t>As described previously, inter-domain BGP SAVNET is for protecting external source addresses that are owned by other ASes (usually remote ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
        <t>The local AS that deploys inter-domain BGP SAVNET and conducts validation on the external source addresses is defined as Validation AS. Source AS is defined as the AS whose source prefixes need to be validated at Validation AS. For any AS, it can be configured as Source AS or Validation AS, or it can also act as both Source AS and Validation AS.</t>
        <t>The goal of inter-domain BGP SAVNET is to help Validation AS generate prefix blocklist for the source prefixes of Source AS at the proper external interfaces of Validation AS. Which source prefixes that need to be validated and which external interfaces should block these prefixes depend on the indication of Source AS. Inter-domain BGP SAVNET provides the communication channel for Source AS and Validation AS.</t>
        <t><xref target="fig-inter-savnet"/> shows an example of inter-domain BGP SAVNET. AS 1 and AS 4 have deployed SAVNET on the border routers (i.e., ASBRs) connected to other ASes. 
Suppose AS 1 is configured as Source AS and AS 4 acts as Validation AS. In the example, AS 4 can help block P1 of AS 1 at the interfaces connected to specific neighbor ASes.</t>
        <figure anchor="fig-inter-savnet">
          <name>An example of inter-domain BGP SAVNET</name>
          <artwork><![CDATA[
       +----------------+    +----------------+
       |   AS 5 (P5)    |    |   AS 6 (P6)    |
       +-----------+/\+-+    +-+/\+-------+/\++
                     \          /          |
                      \        /           |
                       \      /            |
                        \    /             |
                   +----------------+      |
                   |   AS 4 (P4)    |      |
                   | SAVNET deployed|      |
                   ++/\+---+----+/\++      |
                     /     ^      \        |
                    /      ^       \       |
                   /       ^        \      |
                  /        ^         \     |
  +----------------+       ^       +----------------+
  |   AS 2 (P2)    |       ^       |   AS 3 (P3)    |
  +----------+/\+--+       ^       +--+/\+----------+
               \           ^           /
                \          ^          /
                 \         ^         /
                  \        ^        /
                  +--------+-------+
                  |    AS 1 (P1)   |
                  | SAVNET deployed|
                  +----------------+
RIB in AS 1:
To P2, preferred AS_PATH = [AS 2]
To P3, preferred AS_PATH = [AS 3]
To P4, preferred AS_PATH = [AS 2, AS 4]
To P5, preferred AS_PATH = [AS 3, AS 4, AS 5]
To P6, preferred AS_PATH = [AS 3, AS 4, AS 6]
]]></artwork>
        </figure>
        <t>When Source AS and Validation AS enable BGP SAVNET, a BGP SAVNET session between the two ASes will be established. <xref target="fig-inter-savnet"/> shows the session between AS 1 and AS 4 by "&gt;&gt;&gt;&gt;&gt;". 
The solution of inter-domain BGP SAVNET consists of two processes: SPA and Source Path Discovery (SPD).</t>
        <ul spacing="normal">
          <li>
            <t>SPA process: Source AS advertises its own AS number and its own source prefixes to Validation AS through SPA messages. SPA messages contain the complete set of source prefixes of Source AS or only the source prefixes that want to be protected. Some hidden source prefixes that do not appear can also be advertised to Validation AS through SPA messages. The advertised source prefixes <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages and only stores the target source prefixes with the "valid" ROV state. The "Unknown" and "Invalid" target source prefixes will be ignored. In <xref target="fig-inter-savnet"/>, P1 <bcp14>MUST</bcp14> be authorized to AS 1, and then AS 1 advertises its own AS number and P1 to AS 4 through an SPA message.
            </t>
            <ul spacing="normal">
              <li>
                <t>Validation AS can also obtain the target source prefixes directly from RPKI ROAs or other RPKI data.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>SPD process: After SPA process, Source AS can send SPD messages to Validation AS for notifying the wanted incoming directions of target source prefixes. 
That is, Source AS can specify from which neighbor ASes of Validation AS the target source prefixes will arrive. Validation AS will learn the specified incoming directions of target source prefixes and will use prefix blocklist for denying the target source prefixes coming from unwanted directions (neighbor ASes). The wanted incoming directions of target source prefixes can be obtained via the following methods for different purposes:  </t>
            <ul spacing="normal">
              <li>
                <t>Automatically obtained from the RIB of Source AS. In <xref target="fig-inter-savnet"/>, AS 1 can specify that AS 2 and AS 3 are the wanted incoming directions of P1. AS 4 will block the packets with source addresses of P1 coming from neighbor ASes of AS 5 and AS 6. The use cases can be 1) proactive SAV for customer's prefixes or 2) key source address's forwarding path protection (i.e., keeping control plane path and data plane path consistent).</t>
              </li>
              <li>
                <t>Obtained from security center of Source AS or Validation AS. Security center can detect source address-spoofed DDoS attacks and disseminates rules through BGP SAVNET to reactively filter source address at specific interfaces for mitigating DDoS suffered by customers.</t>
              </li>
              <li>
                <t>Obtained from RPKI ASPA records or other RPKI data.</t>
              </li>
            </ul>
          </li>
        </ul>
        <!-- Note that, the backup paths should be considered by Source AS when it advertises SPD messages. Otherwise, the backup paths may break due to the SAV rules on Validation AS.  -->

</section>
    </section>
    <section anchor="sec-peering">
      <name>BGP SAVNET Peering Models</name>
      <section anchor="full-mesh-ibgp-peering">
        <name>Full-mesh IBGP Peering</name>
        <t>This peering model is for both intra- and inter-domain BGP SAVNET. In this model, Edge or border routers enabling BGP SAVNET <bcp14>MUST</bcp14> establish full-mesh iBGP sessions either through direct iBGP sessions or route-reflectors. SAVNET messages within an AS can be advertised through the full-mesh BGP SAVNET sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
      <section anchor="ebgp-peering-between-ases">
        <name>EBGP Peering between ASes</name>
        <t>Inter-domain BGP SAVNET requires eBGP sessions which can be single-hop or multi-hop. In this peering model, for the AS enabling BGP SAVNET, at least one border router in Source AS <bcp14>MUST</bcp14> establish the BGP SAVNET sessions with the border routers in Validation AS. SAVNET messages between ASes will be advertised through these sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
    </section>
    <section anchor="sec-extension">
      <name>BGP SAVNET Protocol Extension</name>
      <section anchor="bgp-savnet-safi">
        <name>BGP SAVNET SAFI</name>
        <t>To make good isolation with existing BGP services, this section defines BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family, respectively.  The values require IANA registration as specified in <xref target="sec-iana"/>. Two BGP SAVNET speakers <bcp14>MUST</bcp14> establish a BGP SAVNET peer and <bcp14>MUST</bcp14> exchange the Multiprotocol Extensions Capability <xref target="RFC5492"/> to ensure that they are both capable of processing BGP SAVNET messages properly.</t>
      </section>
      <section anchor="bgp-savnet-nlri">
        <name>BGP SAVNET NLRI</name>
        <t>The BGP SAVNET NLRI is used to transmit SPA messages (either IPv4 or IPv6). The BGP SAVNET NLRI TLVs are carried in BGP UPDATE messages as (1) route advertisement carried within Multiprotocol Reachable NLRI (MP_REACH_NLRI) <xref target="RFC4760"/>, and (2) route withdraw carried within Multiprotocol Unreachable NLRI (MP_UNREACH_NLRI).</t>
        <t>While encoding an MP_REACH_NLRI attribute containing BGP SAVNET NLRI TLVs, the "Length of Next Hop Network Address" field <bcp14>SHOULD</bcp14> be set to 0 upon the sender. The "Network Address of Next Hop" field <bcp14>SHOULD</bcp14> not be encoded upon the sender, because it has a 0 length and <bcp14>MUST</bcp14> be ignored upon the receiver.</t>
        <section anchor="spa-tlvs-for-intra-domain-bgp-savnet">
          <name>SPA TLVs for Intra-domain BGP SAVNET</name>
          <t>The BGP SAVNET NLRI TLV each carries a SPA message including a source prefix and related information. Therefore, the NLRI TLV is called SPA TLV. This type of TLVs are used in SPA process within an AS. The format is shown below:</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MIIG-Type (1) | Flags (1)   |S|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         MIIG-Tag (4)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 1 for SPA TLV within an AS.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Origin router-id (key): The router ID of the originating node of the source prefix in the deployment domain.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>MIIG-Type (non-key): Multi-homing Ingress Interface Group Type.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Type value 0: Unknown. Indicates that this prefix does not come from any subnets. It can be a local prefix or a local domain prefix.</t>
                </li>
                <li>
                  <t>Type value 1: Single-homing interface. Indicates that this prefix comes from a subnet that is single-homed to the local domain.</t>
                </li>
                <li>
                  <t>Type value 2: Complete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain, and is connected only to the local domain.</t>
                </li>
                <li>
                  <t>Type value 3: Incomplete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain and other domains.</t>
                </li>
                <li>
                  <t>Type value 4: Internet interface. Indicates that this prefix comes from a interface that is connected to the Internet.</t>
                </li>
                <li>
                  <t>Type value 5~255: Reserved for future use.</t>
                </li>
                <li>
                  <t>Notes: The type values of 3 and 4 are pre-defined for future use, and they should not appear in SPA TLVs (i.e., no need to advertise the prefixes from the interfaces of Type 3 and Type 4).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Flags (non-key): Bitmap, indicating the attribute flag of the SPA prefix, currently taken:
              </t>
              <ul spacing="normal">
                <li>
                  <t>bit 0 (S bit) : Source Flag. The value of 1 indicates that the SPA prefix is owned by one subnet. The value of 0 indicates that the SPA prefix is not owned by only one subnet.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>MIIG-Tag (non-key): Multi-homing Ingress Interface Group Tag. The value ranges from 1 to 0xFFFFFFFE. The value 0 is invalid and the value 0xFFFFFFFF is reserved.</t>
            </li>
          </ul>
        </section>
        <section anchor="spa-tlvs-for-inter-domain-bgp-savnet">
          <name>SPA TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPA process between ASes.</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Flags (1)    |
+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 2 for SPA TLV between ASes.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the originating AS of this advertised source prefix.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>Flags (non-key): Reserved for future use.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="bgp-savnet-refresh">
        <name>BGP SAVNET Refresh</name>
        <t>Two BGP SAVNET speakers <bcp14>MUST</bcp14> exchange Route Refresh Capability <xref target="RFC2918"/> to ensure that they are both capable of processing the SPD message carried in the BGP Refresh message.</t>
        <t>The SPD TLV is carried in a BGP Refresh message after the BGP Refresh message body, as follows:</t>
        <figure>
          <name>BGP-REFRESH with SPD TLV format</name>
          <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              AFI (2)          |  Subtype (1)  |     SAFI (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       SPD TLV (variable)                      |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The AFI field is either 1 (IPv4) or 2 (IPv6). The SAFI field is the newly defined SAVNET SAFI. The Subtype field should be a new value assigned to SAVNET <xref target="RFC7313"/>. 
By carrying an SPD TLV, a BGP SAVNET Refresh message <bcp14>MUST NOT</bcp14> be processed as a Route-Refresh (as a re-advertisement request) and <bcp14>SHOULD</bcp14> only be used in the SPD process. A BGP SAVNET Refresh message without an SPD TLV <bcp14>SHOULD</bcp14> be processed as a Route-Refresh as defined in Route Refresh Capability <xref target="RFC2918"/>.</t>
        <section anchor="the-spd-tlvs-for-inter-domain-bgp-savnet">
          <name>The SPD TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPD process between ASes.</t>
          <figure>
            <name>SPD TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type (1)   |   SubType (1)  |            Length (2)         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Sequence Number (4)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Validation AS Number (4)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Optional Data Length (2)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Optional Data (variable)               |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Neighbor AS Number List (variable)        |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Type: TLV Type, the value is 2 for SPD TLV.</t>
            </li>
            <li>
              <t>SubType: TLV Sub-Type, value is 2 for SPD TLV between an AS.</t>
            </li>
            <li>
              <t>Length: The length of the SPD TLV value, the Type, SubType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Sequence Number: Indicates the sequence of Source Path Discovery process. The initial value is 0 and the value increases monotonically.</t>
            </li>
            <li>
              <t>Origin router-id: The router ID of the originating node of the Source Path Discovery process.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the source AS whose source prefixes need to be validated in the validation AS.</t>
            </li>
            <li>
              <t>Validation AS Number (key): The AS number of the validation AS who conducts validation for the source prefixes of source AS.</t>
            </li>
            <li>
              <t>Optional Data Length: The length of the optional data field in bytes. The value can be 0 when there is no optional data.</t>
            </li>
            <li>
              <t>Optional Data: Reserved for future use.</t>
            </li>
            <li>
              <t>Neighbor AS Number List: List of neighbor AS, from which the validation AS will receive the data packets with the source prefixes of the source AS.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-dp">
      <name>Decision Process with BGP SAVNET</name>
      <t>The Decision Process described in <xref target="RFC4271"/> works to determines a degree of preference among routes with the same prefix. The Decision Process involves many BGP Path attributes, which are not necessary for BGP SAVNET SPA and SPD process, such as next-hop attributes and IGP-metric attributes. Therefore, this document introduces a simplified Decision Process for SAVNET SAFI.</t>
      <t>The purpose of SPA is to maintain a uniform Source Prefix list, which is the mapping from original router-id to IP addresses, across all routers in the deploy domain. To ensure this, it is <bcp14>RECOMMENDED</bcp14> that all routers deploy no ingress or egress route-policies for BGP SAVNET.</t>
      <section anchor="bgp-savnet-nlri-selection">
        <name>BGP SAVNET NLRI Selection</name>
        <t>The Decision Process described in <xref target="RFC4271"/> no longer apply, and the Decision Process for BGP SAVNET NLRI are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The locally imported route is preferred over the route received from a peer.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger originator is preferred.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger Peer IP Address is preferred.</t>
          </li>
        </ol>
        <section anchor="self-originated-nlri">
          <name>Self-Originated NLRI</name>
          <t>BGP SAVNET NLRI with origin router-id matching the local router-id is considered self-originated. All locally imported routes should be considered self-originated by default.</t>
          <t>Since the origin router-id is part of the NLRI key, it is very unlikely that a self-originated NLRI would be received from a peer. Unless a router-id conflict occurs due to incorrect configuration. In this case, the self-originated NLRI <bcp14>MUST</bcp14> be discarded upon the receiver, and appropriate error logging is <bcp14>RECOMMENDED</bcp14>.</t>
          <t>On the other hand, besides the route learn from peers, a BGP SAVNET speaker <bcp14>MUST NOT</bcp14> advertise NLRI which is not self-originated.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-error">
      <name>Error Handling</name>
      <section anchor="process-of-bgp-savnet-nlris">
        <name>Process of BGP SAVNET NLRIs</name>
        <t>When a BGP SAVNET speaker receives a BGP Update containing a malformed MP_REACH_NLRI or MP_UNREACH_NLRI, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>If duplicate NLRIs exist in a MP_REACH_NLRI or MP_UNREACH_NLRI attribute, only the last one <bcp14>SHOULD</bcp14> be used.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spa-tlvs">
        <name>Process of BGP SAVNET SPA TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an undefined type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an invalid MaskLen field, which is out of the range 1~32 for IPv4 and 1~128 for IPv6, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an address field, whose length in bytes do not match with the remaining data, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an unsupported MIIG-Type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a MIIG-Type 0 (Unkonwn), its MIIG-Tag <bcp14>MUST</bcp14> also be 0, vice versa. Otherwise this SPA TLV <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a malformed SPA TLV, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker processes Flags in an SPA TLV, the defined bits <bcp14>MUST</bcp14> be processed and the undefined bits <bcp14>MUST</bcp14> be ignored.</t>
      </section>
      <section anchor="process-of-bgp-savnet-refresh">
        <name>Process of BGP SAVNET Refresh</name>
        <t>Each BGP Refresh message <bcp14>MUST</bcp14> contain at most one SPD TLV. When a BGP SAVNET speaker receives a BGP Refresh packet with multiple SPD TLVs, only the first one <bcp14>SHOULD</bcp14> be processed.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spd-tlvs">
        <name>Process of BGP SAVNET SPD TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an undefined type or subtype, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a validation AS number, 0 source AS number, AS_TRANS number (23456), or the source AS number equals the validation AS number, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an optional data sub-TLV that is an undefined type, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a DestList field that is not a multiple of 4 in length, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a Refresh message with a malformed SPD TLV, it <bcp14>MUST</bcp14> ignore the received message. When discarding a malformed message, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a sequence number that does not match the local recorded sequence number:</t>
        <ul spacing="normal">
          <li>
            <t>If the newly received sequence number is numerically larger, the local recorded sequence number <bcp14>SHOULD</bcp14> be updated to the newly received sequence number.</t>
          </li>
          <li>
            <t>If the newly received sequence number is numerically smaller, the local recorded sequence number <bcp14>SHOULD NOT</bcp14> be updated, and the BGP SAVNET speaker <bcp14>SHOULD</bcp14> log a specific error.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-converge">
      <name>Convergence Considerations</name>
      <t>The convergence process of BGP SAVNET is relatively simple. First, the convergence process is mainly the message propagation process. BGP SAVNET messages should have similar propagation speed to normal routes. Second, BGP SAVNET supports independent and incremental update. Routers enable SAVNET can update local SAV rules immediately and there is no need to wait for complete information updates.</t>
    </section>
    <section anchor="sec-deploy">
      <name>Deployment Considerations</name>
      <t>Both intra- and inter-domain BGP SAVNET have good deployability. For intra-domain BGP SAVNET, upgrading part of routers can also work well. For example, only upgrade the routers (two or more) multi-homed by the same subnet, or upgrade one edge router and one border router. With more routers getting deployed, the network can get more protection. For inter-domain BGP SAVNET, any pair of ASes can upgrade and work well. There is no dependence on other ASes.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Security problems are mainly in inter-domain scenarios.</t>
      <ul spacing="normal">
        <li>
          <t>For communication security, inter-domain BGP SAVNET takes a point-to-point communication model and thus has a simple trust model. The communication between source AS and validation AS can be protected by TLS.</t>
        </li>
        <li>
          <t>For content security, the advertised source prefixes of Source AS <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>The BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family need to be allocated by IANA.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from Jeff Haas, Antoin Verschuren, Zhibin Dai, Keyur Patel, Shunwan Zhuang, David Lamparter, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2918" target="https://www.rfc-editor.org/info/rfc2918" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2918.xml">
          <front>
            <title>Route Refresh Capability for BGP-4</title>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This document defines a new Border Gateway Protocol (BGP) capability termed 'Route Refresh Capability', which would allow the dynamic exchange of route refresh request between BGP speakers and subsequent re-advertisement of the respective Adj-RIB-Out. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2918"/>
          <seriesInfo name="DOI" value="10.17487/RFC2918"/>
        </reference>
        <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4760.xml">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC5492" target="https://www.rfc-editor.org/info/rfc5492" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5492.xml">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="6" month="August" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-11"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6959" target="https://www.rfc-editor.org/info/rfc6959" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6959.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Threat Scope</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="J. Halpern" initials="J." surname="Halpern"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granularity) anti-spoofing work.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6959"/>
          <seriesInfo name="DOI" value="10.17487/RFC6959"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7313" target="https://www.rfc-editor.org/info/rfc7313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7313.xml">
          <front>
            <title>Enhanced Route Refresh Capability for BGP-4</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <author fullname="B. Venkatachalapathy" initials="B." surname="Venkatachalapathy"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>In this document, we enhance the existing BGP route refresh mechanisms to provide for the demarcation of the beginning and the ending of a route refresh. The enhancement can be used to facilitate correction of BGP Routing Information Base (RIB) inconsistencies in a non-disruptive manner. This document updates RFC 2918.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7313"/>
          <seriesInfo name="DOI" value="10.17487/RFC7313"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="12" month="September" year="2024"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-06"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="8" month="September" year="2024"/>
            <abstract>
              <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-05"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="25" month="August" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-07"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 577?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+09WXYbSXL/OEWa+hApAaC4iFLzzUaJYou2Fpqket5MS9Ov
CCSAsgpVcC2kOE31WXwWn8yx5VYLCKql9oyfaU8LKOQSGRkZe0YNBoNeGZeJ
3lfPvj9RLz6VOi3iLC3UJMvVWVblI60OxuNcF4X6IUricVTCz+qNLq+y/GOh
1rHb2cEPb16cb/Sii4tcX7YPRU1642yURnOYbZxHk3Iw1el0EI/zwcV0MSii
y1SXg0e7veyiyBJd6mK/Vy1gRvyA/+z3RvDfaZZf76uiHPeK6mIeFzjJ+fUC
Bj1+cX7U68WLfF+VeVWU248effdouxflOtpXp1lVxum0h3BP86xaQPvD095H
fQ1PxvAlLXWOABwiaL1eVJWzLN/vqUFPqTgt9tWbofoeAIavvIY3UWoeZPk0
SuO/E3L21csqutKxOtejWZol2TTWBbTR8yhO9hWuOY3SP82o0XCUzeG3UVzC
mp7p+D9iGm+UVWmJy3w+i9PIg+GvQ/UqthD8dabTizjlR3eAIYn/zj2/HIrz
KA3AkAd3AKKMUoRi7wtheI2YqCwMr6H5J/ifPLwTMqq5dH7yhbAcBrtyGLXu
yHkBo8D46l0aX+q8gME9ZGR4ttI/ldJoqMfVcJTeBYgjIM8os1AcRYAMfhDC
8ddZlk6nVZSOKoAzusjyqIQj5VFolE2g85/+Ph0l0cXKkPTSLJ/DHJdwTpU6
PXq+/d3WU/m4+2TvkXx8vPvdNn48HhwOk9ic+hhGigbjDCBIB1E+msWlHpVV
rk3Tq8prqvP2pnE6qcGwu/1kSz7ufff4O/m48+TRrnx86j4+2dnaMaA/3X5i
Zo51OWkFc5FnF4meD4oSuNJcp2VHDwdtZw/YceCE0gX+GZQRNMRf51GaF4Mo
LeNikWUTwDw+VUq49uuDN6dn6ni+SGg85s7fV/FYUythYoq+ABlIB/pKHFVt
P9reGTza4jGjfKrLfTUry0Wxv7l5dXU1pPmH0HUTQMsWxeYUB9/0AeoNh8Ne
bzAYqOiiAPyMgHu+jtJrVbD8iER+XDr5sQ7yYEPN4TwCYRbzQs2iS60uNPAR
wNEiK/SYxMYC5AksC891bTAz+VC9zK6gUd5X+lNcUFMY3B8b+L+aRCMY8iou
Z6qcaSUbUahsAocnGo0qOATahxAmn8XTmcoWOqcnUaIymGamozF0AXDmWhUj
nUZ5nBXAD2dxoUC8VbgNZhGFcuJRXVwDhCAUxwgiPodGZTbKEiMgZRD7eBQx
NqIpwgYNBrlO4CPOL3QOgJYzEGYAKI44B8xEU03gaNc37HAVJ4ma6WSh9Hiq
N+H8j3WuYBAg1AIpJsOGoyhJrlFYacKMRRHiNq8SmaPQ/AV4QQpbX41KFflY
vAAWMY7ya1oiIj5lxUFF6ZhhGM306CP9RN2AxeCehJutaZ+iPI+hDdJtpBbR
6KMuAQgmvHk8Hie617uHYjzPxgAITv/zvUKP6NBmn3u9s1vIEXCPkwG5RcmK
1KeisgRIQA/6UTjMhw27tkLhYQCyhhZu4dQBMD1URzBFZH7o16kWd/9Cq7Fe
JNk1bCGAiftlNwo617YOQTaLAtCIzhlNapJnc3oA+5QCt4TxQHlK8SfolGqg
dBgMex2cAbZ//rnJdj5/RmQfPH81uIgKIqkpoWISJzA7diUcIOf80Fc/CpcV
dDDqpefp+bOX3Pjx3s5jaCFLrcypryHbzuCddVwL4K1+zNOshL3Ro3gSj9yx
etl5kOfRNc4cp0AxuKYJDnxNQwEG4ChBk6wo4STA6YUnFXQGFE7iacWDIa7+
eDcp8flze5clYgJxTxw1pJE+bOJopiKgxzKP4exVpydHfZVkwHrk89HJgD/8
cHokn3A/Xshz3gbaKN6zp7RnMAaiGdYPgwEnIBLDLfb5yPrR8bPN0+NnG6C8
dLGNkFsIrwBsx6jI0yZeAY0RNYHKxTMAIpBbF618AIEf64ZsIQ5E/YnSq9QO
a0cTpLdLWkQwAkg4qR3CCDQMwIaaZtnYrhN5W1US/ZDoahciVswAF4SDGhXX
87nGrbII/a2ohyQL/P+FHkVwzhD1RXO5SPdrqIEmerDIYNQ1QHYRT1Pev2tH
Frh1TBpABchD+AuQgyKEIk2MwYTLYVO0Y++t+9w88hpI+2oWA20jgvFQA85H
LLrBmEvahkEIoxLW2FcLUAaBCvE/2AY2opuKhUkgbnAenZIwxae879j+IgO1
ob79xOWRsfDGj657vQ4dQDtTGEi6TfIbIQCwo/I+xiPtNIchWAxJ/FE7Bae2
Rz5H8BQOOIrZFR4MEBNAn0y0MBFqWYRJkRuoFYFGY0URbid8H8eTic5xJSQT
gAEahUJ0rIHltG36COs6sBZfMQF6X1HvRzpfUe9H+u4Ep6gWohsXtGhyGAD8
iygvcTscIRM6gr64xRE0L6CvQRbQ9W1KEewqYp64EQoK0BNnuBER8iiYNy5Q
v5y47Wwcw3QcbH+v98svv/QeDvy/h0q9QUATaqkehr+tfx9Sa+/G+D9Qz1c3
wVCDPzAE/HdDjM3xM+h67OHk5r3y/27Uawf3TYPPNYAOeteAluO50VP1v/fe
Wpu/qtokLS3Cv5smLmvDvd/0cHngbTNgwye1G/ZzGTK/4c0wqGFxR1Q0jhZo
lQL51PFZ3wo5vDzCJVoXVeEMjY1bQfcRgWTTQ4r0uILlPcCriiq23Fqo2thP
DPuEtEzgfscnl7u0Eviw59g007trX9fkPHUU1ZeUTHMYwyqm0Ob4ZKDTUbQo
KjZuPNX+3j11TiIEnTbAYGGifdWpxqNqo6IFLDBCWZGtZD3SoOq0QmPaqCjA
FFCSiJpSrCC+Iqd1ykww9yT+ZMY/J3OeJmCEQx+yY9hoQh7Bc84DZuUQi6iH
DetSkT2dI2bmzlZSEqUaYWDnJhygdej7CtndRs27y8A17a6rFGYE3o9jWpNh
Iizz4GzY0W3iWxsIVhKnH630MQPhqsxIrGslRYYEhOZkDKyERWFsoK/Pg0vD
A2iXdqrnWanvujYgcOBaKOVAkJBdX29K4hcoeBQVpa9zMrnTCbFA4qL0pyUQ
v2JVSfixxwwYTl8CkVhm0XO/8HQsWCrqXUQz/pkDoofuOvckEhGgk41Lp6NW
QEp/Fyozo1jmgIeMFTM0lj8h50cbKZpnsBIRkTDjCzRUT+nrvjrAZTgpL834
2KS48Uz5oDnFORALKG7OSEXLQqjF0BTQXK/3jC3fO08RjOxv+4HpgxhPDTma
vY0C25s5emh999F2jJtzUHcG+34R0L03u3VNHJzxnsD0VzM04gJmAgSXahnW
mhmI/dIPzeCZ7PWCB3ZQppcMrV2AAnfX+GXqEwGyLUzExE4OLOflRkDTYAuU
cUH8CtY/1MO+ca6NyG5H9Esj45DI8nhK3rPwWGz6ExuKV2b7GIBDB0AESB3H
xQjt+OuuqU0DM3VoODCxGaUctcF4BAKoaYlY0EQgner/rKAvM+lXQP8VKLYs
ZT+ChYTBpEKtvX53dr7W53/Vm7f0+fTFv787Pn1xiJ/PXh68emU/9KTF2cu3
714duk+u5/O3r1+/eHPIneGpCh711l4f/GWNTfu1tyfnx2/fHLxaY1HgmyRo
3zH1ELeClRH9FD2w8kZ5fEEWs3r2/OS//2trF3T1f0GHztbWd58/y5enW092
4cvVTKc8W5bCeeWv6DnpgfjVEZ+iBD2YC1AwEjBL0EcBSnCqgOg1EPyDHxEz
H/bV7y5Gi63dP8gDXHDw0OAseEg4az5pdGYktjxqmcZiM3hew3QI78Ffgu8G
797D3/0xQfN3sPX0j3/ooXcS9bATo4CdojcXKXAWL8RVSQ7ez1Zl02EQ1dPi
2MRALgTa0lWUj9m2KGNULuYRcKCc7LqsIqUiGpGssRYHjjSpUj4AQ/VGX/mD
A5sqgMqJYowPLprHSawL9h4zAZGfFUiGlX48Yqwl+l2uiUrkt73ab304kyhy
UClMrlmVQDDenRwenL8wRqNaN8KLfEs41uuTn05fHDx/+dObV6fHdgZ4+u6N
/7wEEwSMGV1s2DY4/KmewLwzO75ZkrFYQRoc8ahn+MH8bHWvMSOximHjhLd4
yLOmLnmimMs7v3yvd6AmgG27E8TLHKTWo/eWGCVG5n46PiRgnifQRec/4T/s
tb0CdIyBOaWkNYfjAHUGQPv25AFonIjLPjk3u2ExHlUQZ7iAPCanCrG/5qDW
NctOVKAK0+26deAR+vOF4cAwEuhnNmJxDkaoXgCP6jtxx3zHi22QrgiYAWq1
8R3fyUJ829+hsyypvPBAIV8/E3v/PgN+1TsyoofFyjRDp/HEHyQmV8CqYQ+U
YZ0uCm8tNkZU95uQckyuCNZEEAc193+WBhEWC4PvsfAcFS/8YEKgsxgtxfZy
tqBnzwWhBSCznH12ia7D1aFz3WV4X1P7+edJPB3gjoAgYscKLlt/itB2wl3q
2gjaUPalhPbyw4YF7XwIN9BnB/7reQ/gya66ucMY9Bf6TTZrdvx77/Nm8MvD
Hk647ca+x5NB/3uh+X/Tuwm+qtMn5F6AD0/VzZKWD80C7Ieulsobp/7D3cfk
BQJ4jw2ce8YfUmt50znmTWvLNjiDls2hmh+4JUC1peTDtoFzxzzZ5Q9mzAcy
woPaHtldc66n9429Dp9Y8jEdPBzWCOzmjE7slrcBSDNbjkiXjIHH4ed9dc+c
Ks4s+P0a2FSrnqk1YJ1HeE4jtYATLxKdVHnmoc1gDRtXCSYcoMGXIG+bsDgA
LoGRPUn1Ap1j39nW6ybSsFH3gARWNzbLxRUQtnNKhtF1jDAQMVLQ5GgP8LzO
qPQ966mElpq/Segd+3MAS4afgA5uebSfZzBZyXNQV5V6vQGFulug27eGHUpA
PSqtv6rdIXGcBjy1j2ZsPfgMZuP9B/dR67h/7z7ycejMIUdrnsNDDCyRQRCX
5F3pnpX1MbBEYDM/ujV3MH2W6+hAXLIMz1eWW4eF5HygFozdR5mNAnOQA0aL
xApcN5pXm3kLGqQfObE+K1yGiMvNwKAfcD7hiruzxF206u7AtpCzFhFqtNI2
t5xBcWu41DOK19mobm1m8gVosRtD9XwJWjvR5m0vbpjRK5G0UQ/rIO5ej7HB
J5MjQ1YPiAKW1XF4h+I1UlsEhnzZJiCCBAtyluiU3LW4Z/CtnGnf89umNdnh
d1BFrHmJWhwwt4zqaz7oxhXCTkgvBYgptwm2WZXXC11YbkIj7SNfB7x+7j1Q
ZxwwnNW810P1Z8zdtId4FhV8gjMwW6sFOW0DeEizBxs/HyTRtc5d9kqYXGIn
MOvz3WcAZMsQjqrZoIkQe2tncRvYa32lh1MgT6CSyXALbYg2skA/AxAnEgSo
mfMqKeOVMDDGNA8gZOqB1MSYKOz24SrFN0l4bV0PMS1PaJjj2omrogVZRRe2
2IRKEhhg7ZYlFmvGaTvKchQjQH9kvRD2tjmsgx93liLyGF1nXxeVtAifvLxm
jSWzbfjr0YVd1m5dzHKk7XZiSjGqOJfcx81xed9YKsLsvZW0Y4PcJmYo0rx8
wwo0jesFO0X6XvC+Ksi2J+xbdDYBYoMrySKwI6MkSkeUKZGTP6laLFv7Y0cw
e8vQ0IxZL/t7WDc01FsnIGp/9fjt8nFrfevmgR1z1Xbh3DfBP+FzNt1WGFP5
5hMj2bQVPHe0xT+yNvDvQT0a3Gx746RTi11XH9ch8ba28LdJ/w2t3I62m/Jv
vXFL20376X1X2wacjQeu7Y0T/jfyk1UAbprj3qNB7tlx7wmew3FZCPE/2++F
ldo1Cr8I1maW+L59ja1t6UfX1DR2bcUIVPbjtteYn+y07NuSv7udMwwyT0gR
ZaXJadLoqkavpbR40GhBWiu1CMxRn6e0m6UdOh4apOREN467LkMuDhN6ijDA
ZeBWRrGmL8an52cqSnywkZPLSb4kcTo0sDUO2twiwkEYNYBC9XIB0hRkhSjr
a8emvWTa1vusqXk21sy0l2ZDbpgM8joiyKR32h3o3VUiUaA4HSUVjI6Bn46Q
YlsGsk3pLFTzzoDmrDyK47k8BDuk5DogaJ6lFIqivtclXAmdTOAEd1yEnLO+
jSnUxy7c4J5yBSz3iybaRlmKVHS7ziK01BT2jnwcGWMAn07hreRj+9yFfI7C
rBgLSp+cAw1oBDUGK/Z8kVfA4MRqSa1ZKYHq1HXcitXOW7G2Gj25Bdgt3xWr
RD3ue5u/V1/h7QTGEShDA+ccwcbUwavZ9UrEQEkrAhQdo4ozH1sYCWE2MNFh
l3QyIaNsFuXjBHN/ozyVIywzF5yW0bmGHRMMMkfd+FQKPxfa7S+rvHY9GFtc
1IwAQ6whsAUZrMJhGn028AghAqOL7FKEgmwHxZgov3ss0Yu51nx94iozTgmO
9cPoQb6vWsfsss7Ubo451rKGYR8zjsnrFAxByWc44R058D1Oav3s5GDDJjRg
FJ8ysTli1iXPjLtxqA4rm/gAA5lx+qGxRGE2ypdjvyKAnGZVOuomTyICPnuM
/VsOmjS69bgtu6FyGUe0BhdFpSSttstQmFWLyX9mHeOaSKcFmyQzL+5WZlNN
5oaNINbS+Pj43X1CdmrsA/05X8xrHweW56rv8VIy2nRarb8+Pv5+gB839sFw
rKUioqvH0LoTxXSEaXsKj0MNlR1KUYLFhfaPiuc6QqKDFaHnBU8JG7LLQY2m
BtJoKoDSIY7HONbEZ89mQh+flqgudJKlUyJX5gBFNLcdCWq6Y0HrpaGRpszE
6EyvANxDm65u6Mb1dKns1Ks0vQpe5fpbkMg2afAoiaY1rF/NmDo8zh/7+YOp
gXaonlFIPgK8MY+awGiUagtLMZcvKOoeIEScoMGIwr1ElNZzD72MqVz8tjBH
fom6py4r4NTrh2enG20dvuACibcWxzirFBe1vsiKIr5IzP0owCS5Kq2bumD3
rwgY7yBzrld4XkQ8FkyZEoYJmvQdRfctEfS9W2a0gZjT8gm2YJZdmchEbfai
PTDekuAyDE7vscjAqKAFdOr1HXqnIMXFJ0gbNJcmlty2YrFnU0A3+jayQU6l
dAprIsGB0jfglnjWQDbNQBJdVHEyNnLB1wD6zMYONXw7MVvB13lw54C8KK+N
RJfn3CWfO8AwzYLFu/yN8di5suq4EK9iiM7bDSHMLRuPY75sgikYSSJhlLqp
wfeZPbBEqYlTh8e+u/mKYoESLOca+rnRrGgCLOgYNYWAjFwwgwf17EIOZgao
riWNWFWKbZijOC/KfsgYMJ/Vm9i45sroo3bMcs0eClFwzclYE06He9WGkz4x
nmCf3AapM43BCpPTI/GGxjKBx9qQ00rA+Fk+xQzHtKuV7cQEI0S7S3kmXBKR
ErLvFz6cSEmn3nWmlfRjtqkathKDZTlDQ9M39n8dk+27Z3PllyhKCIil+9dd
GlLmB9EklGLO2YKu7Mj+WVDd/rVZze3UzMRl5a3dSVqJjonOu30ZK6xkje4X
0SZ5/BoWQdc0dNkPlTSmzLa1eQ6KjtFYQNFwaP4QUyfx0jagfzXSE/JMPMYr
ka4aPuimLrlyTFupp8DG5hFdO6tfLDFMLADA3Sp5k5Ws8/VvNQbczQoKEIQm
GQUpi7K6QDtqnaNqvlXNsdlF4uonSGMmpDYLeSO4FFJnymYuEYThTY92uz+4
pke58To1UVQX6zaWj40ft4XfewdkSEmyM14QwvtVGEHpyOdABK0arW9xUHhR
7nUTmeHMlG8VPD/32xJAHHgsOleIA9qYtJ+akobxqsZyySi10draHQR7faDW
rPwK9xtEI6bcIpcPYS7m8zxufmgc9O8Tnkt3LCIUxQXf1XDdEC2NexU1p3IX
xcASqLpF0H8FmbLsGoYJd6LZCpvfFkaE5jWI/0zsvD4skUU7rtOxiIC28Y3u
T1k7JV0ht2MClWm6ECCHmGwnMZG9qyQd5xJXdRmPxcIFXjivUjMA3jJKdRKU
JOvYHsuOYI7bkkPas7dgZPa8wYddsR5Nno2AKkuspbmKgn5w9uy02FiSxHFW
LfBaOE/E14VaqdbCEOGxbJ6vY3M6aU19bkvuOiQ83qKTLVwrL+mW7BXjqA1y
e0wYV+JBjWjQw/anNi8R/geTP1brJ483bCxLnu7B0z1+2jb+w833D8349Nk9
7rjg6wUIvTBZPa7baO2H1Loam9Z+2+7G3Dpo2964HZ8djQVtu4C2XYfMzsa1
pJNljR8Kfh9aBC9dIC/sb95SuxsLEqSxbd3a2CDMNLbR0JbGFrm2sQmH9rrR
ahu3Uqzgdxvwu+3j1/aSBjvQYGejZS7GYstcHvkOmgkJQWD7b97nzca637c2
bLbzGv5tWTPX7m/LWlngH3YtQQm2iNOsn2whetq2rUmWt97mp+nY/qPh93vn
mTrZ5oCWzpFtHpz9dHJw/lL9Xv2IG/iBWux0t9jhFrtLxmB2yu0eLxmJ29F/
H3PrvdVa732oR7qtxOqMdLcJLIx0U9bVEsFokhhdL8wX8g0FTUU0A3UTwx+S
eyu3owoM7sXFDNXMJXKW1JjagKFQBbV47Q/4twby5dzT3ZcpVTY9G40BzNDm
gAZmh6P96rn/TvCy0aG5HYpxlMMN9hB4gZB9H2EuKmUSl+FpWs0v5K6vedpQ
o7Iaoo0brxat8O1rWEcZxavH0XwtVlyFTTWR9DlMzhV9TowV3CkKlcxisKJb
4CfrICPjWC5u+pfwLV7Gq66UYmyuV30+E4DgqoR0yxwGdksEwjg9+bdjdfr2
oJBkwnBWcVlIJReZlkwAGlqMGOj/g1HSQi8d4q8os1wHvrA6mDYGtEZ68RqN
R85wXuHau/RjCvRgw+3SrHM4cShP04xsND+w7J2fPqpr7SjC82PzDcxxuo1q
YTTuumt3CzbX27AhloV8UEOxJYDswtJpx8LsfX3y1NmdI0oljZceYSEKc/wO
3fE7mKD/KghNOkJAIAq0JrCL768PYUWDAGg3nlwbL0C9mlh4y7t9HcSEpHJU
DQRSimV9bBUF6nHD3lpOVejVwhqGgPiwF/3kwuuii991HWy74VBV0WFiYpqN
QVXHILfeC6gn/59/IdqN1c50Br0xzMsxSVM9iYMW5ja/CeEtqpzqamFQFen3
ICg9Z4ezXnuql1GzQTsOIB0sf+eJQ5JWKNJrh+/Q37rmk60hHz0+/cZgttcv
2JPWcj8DTq2/BQ16I3tKgNmTonUFx08sSrc2XFDfXjcZVcD55uQ490OHoOti
2YIQlPuEc7xWbq8FG/+XC0V91HqBP6NEy7OEi83IVV9M6bIFaPiZu6ZL0hh3
7m2wV4UeVTnW/xzpVK4JdPtwyLUdNMe1Y8W5UVlbzICK/cAsh4fZmS3YSSDG
gPU53rIGXHD0z6+mKpoH3XayGRJcjLJx+6xsSXViwp3HZSw10wiAoiJCJu+g
2ZOiHSPEPw+QR5r4Wztr/d2/DAbKcwiTd4LyuAn1hRez9dytML/DL7lU4yBD
x+e9Q87GvoIfWoYnlzbg6KMaV9pEkVxENUvre6cGA1cPQdB8orlUx+tsrJNC
7mYv+CFfzT6qkmQwx5v7x1RHgX/jqnvSkBLUEuOzNXV58miw/MresRTKoN59
vhrdrK9KarSpniBQk7y2qrGaWBBjbCR6cGECJ4a6JF4ftslkpgGcTgyBZTnf
aguKCphafX6JGl9PkwmIj1pYmqq+6GrNyoSuegGyDBBX11IQrAZFowgExQJw
y+yYfAsA9u2Ft1ueSaCLXpczUPzZgLcAQ3InQdIKTAxqYe+X4Be3mQFJ9L2r
+G0b2VecPYOJGWnNt4drcyeltuM4ZAt+nRJZI6K4cRjqyPUx5AXS2/a40L/9
htZOrSlmYt/3ICfX9SIa8MsvHBwdo6k8xwA25cfFYACa2tTlLKxSgjkt8YhD
xpRGwzKIAwpFfdzi6xUjIXxK7FzoUR0fvEFePI2xzDmXiCwCdU1QFkdpRFVX
wVD1iQNMLCz9XKehwBhHsiU4uZHU2OJgLF3naWC8UM+jRXQRJygNf5QS+x+Q
D8PvtrRcaQobE1ccYQ/2LIj+XWNsljQ43MB3jsONxCIr9eqCVHjFFKpDSZBH
aQEiMDSC14Uf0hZRCcDLvY3G1Wwa6/zVD631QsIaMeQgXwe9h4t4Bnd3bU/h
nSEWTzGlgFBB060HpWU2CJ348oIPbH6tb5spcLBxHl0tH/1dmjfH94vUkC70
Z0o81aBJjrlSYr3AjamcYrwHtb2yiGLZvPZKp1PYY9hbTIJSL4FFygtbTEW8
NdBjNGgEUg7pgl0QsF+PVLUQ0xkNMJ2LyVvr749dG0si7bQaSuANhuvbMHvM
FwQjmDJheC3RO2PZdRfTPx8iFd4jciLSQLbWdVe4g544i4T3DQHwU9I4QYB2
oX4bBKBryQAl/EALgJaxb2fB2A7fOBRgpQqzSd+0lF1xOXXfGA7kvCkqizNS
KiEV0sKkyat9ic88arpR1VbLs+2WZztK4QBb8OMOGCyP1Z56op6q7+7yrPdw
cMv/SQVazfmtcFLRYSyEil/pstGv/L/uq01cTUmE8CCGg8wxlLp/+uvA8Doq
PsLSZF1m8OMTk1m3jmVdkSd8Oxhc1i/jGrNimENiuZBvimuXmduO5K+4TnGh
i8NcjpmcFPSMc+ZjRPySk0iA8RC34pMXFeJtCO7Ke3QKpvHGPudkSxJKCz/h
c0+qAh7PLQ5UCzDBQYbBmeS5ImNi+XTbyDQgj+0gQi4kp8ZbB2gJlNaEEzRJ
XRYxsxfwjw/NnJlUGUMEpXi3xyTp1JJy6SEHbUikMq/F6Sytu1nm8MisDbpe
xKUt506exbbCuhdxafN83EGhJeIs3tnheeBBUNFFpstRV5KMTXJ/YrShFO3X
1jButNraC5vtUYrJ3NYMDeqL4T7hUJukRFKagkvMJpS4s5dm6YABrmXS87sz
2pL/h+QIoO5MUo/2lTic0bZxqCOdLrZ3qcaZvSw317w2uk9nylK4hOxI8oOk
I13U4iciQiXLrA7I1n53GYklgCE8gmxXLEbqsVojbu7ST31QGjBs799e0OEL
YfGvHbWA0jc1mF3eBMdjVoB6Z3+V6gnfBm4vX4wfFA3wdt3b774EntodlHoJ
XDrSMnxj6se/bD9+vA9aON1d4KqCk4oKYoNaxM3RsyU1nEvbk7jFDi1uV0kG
8cCkmYWj2MjJtXGEeQEv0btIGRPHZprZ3ChrSIQZtNa3HOZe0boYJvq4i9r9
AyN7HS94FpfzaNG3SVImH9+q+XTRQrgha4V882FU5egCR6oDQzLdJ/QA6wQV
bP0MP2yo/fAWhDVicbitgPV6FzJuudMSDPLo9kEQvd5ASTCaZZCoINyVP4ZL
avDxR5+O+O+F3+yRoksLLGiMB0B+Mh2OsE0uVNhhY7Tmk66u0vt+neH/6+0r
6ZLO7faGA5v/1/X2QFFvG/MfU+fdDnTekNJ/A523SSZOG3VB8RadFyNLE5Zs
XXkL/6/ktiq5DaHWJcIbbkMpv9xb7hw1fk8iA1uyueboxDeMfpGjk2WWjW/5
zkVDlrUq0UM+WdjJOndsn6i1rnQ0KcUV3fbrRTa+7gen8Z9FJNyVnWMR7fVt
j2feUD2a0kgUYbVUbPubixSzgUt5ObHeXzpGWPXvl6/u4AAyGpy+ODp9cfZS
rjzJYkLuj3hkl2xsI49bah2P8waF/OmzcbifBc2RWsPC4l50RTrI1nEfr44C
dhSRgOVcqVYB5nfxAD/KG3Y/AEd4du1CUZSTdMgyJWrhE/bAmPcDSIIbZf9J
mUBiEgPTYZ2egTkQhgEwiKOLUl5Iyc5qUk4vnL5m+IKMj+8FWQKRKy1qd8I5
1JeCGLkrMXjN9lYeN+yxSuqxoF+nlh7+k6ulK51/q7MyiwHCPa/xHPkz+qzH
pL6tWktvVwAVY6lW+3/JJd6Bh99UvW/7CxPxlkDx9WB4u5C30B5ihpRPet92
v4NpO8XfP4bca1/FG5cMZ7bqFaY2Nhfzj7GKuqnWJqzvbqohD9unkbgGRqsh
RlORacRMjzvAFymc0d7BCoMVwhWmi2ey8dCGza5gtoVscD/wOGLEWH52mYC1
3H4rps/JFxfTm7vt0h7VnD1xOsIKWljrJkuzMks5ZbQtaHLHcMly6O5qoBZe
Vt7Kl2TjRmV53sB2Brdk9sswNXmWtd4NXnJh1YJPiG1hdm3UlJl2lDYq6mjK
Bqvvy5MQxiNOWCypJgV5HMMRGlMvcTE/6OIr+8xdAEIvC7fvZ4O34AsTqSRX
gYNm3tvqO6pLeXfj/Veu3VOHehRTStWJlxXgK6ScajVe8BujGs2Dt3pRJsv2
k60Piuuo+S9oRgV1rKe5FjtZU6o15re6F/v50GORD7+SU2PmOL3MEryoMccY
FOX/ha8Asr6S2iuGrusvurKXe5zK6l57nupPJWUA+u8Wwpp7YChJNTb3Sy1T
w38vmk17o2II+BJOTuhqrEteimgNIubhkpFuKu/w/W/UyOkGRYTuE2T6tXJv
mJXvvU2xJKfSYmFTv4XZJJ6KhiWYT1y+OBhMozwrqBKKn2DogrUmIIVl56yP
JOYrMzCn92oz9p34A8kIKfqy2B0Pi9f8iRNVF1kSj2JdfznZsC1RDJh9wrl7
d6JVmB1rg2FK3GJBha6FpbduTX3OLiG6Jf60jO8MwIZnOTJReQV04V3hQ1bO
CUj0my2aMjHvO8GUJFOfsbOJOzvAbHUudxXo9Se5lSpYlcCbetjb+VXDYsYt
kotJ2QrH5giHTiYD86YxGJoy+upIpDmyurVAL2Q3rjS/Jg3+aByKnGiONZcG
mZ0FjGq87tKK+45U9doIGFaSImv47sw4HWlPPIdw+O/5puWA6DPkT1K6oner
J3LXI2rMxTgwQLXuP76fnW4BeFPjtf4EX5CSYbnIwmTG43WRnJK/zb1/ySIz
Wct4kUMqsLQBYvLj8OWWUR4k2JkMOT4j9B7kBajFQDqw5VTrfUo19sJzDwh8
y/05RjyLsF7QhS5sMQYmP76eRKvGNRf1K6TsvXVOGhc5ZQQaNofMvk4QKOte
EIwvYXbKzJYkYnzICcTmmIdvYcOxi568dqAFHHthkH99Ry+Z87MoIyDkBJkz
YDJMugRoarma7qIhZyf6WB+TLmwzGBEDiwgPXekKQNBL6TTd9iCIZQ/rYDQ9
YRa5B3/BXfTr6hKGAIHHE6AwEFuoPTNWOI2avdO3rcxJyb67ZJqYZHjn00L/
0XDJdpiI6Uo7kgY5Uvgdc7fZKVaSJYFpw3ZukxGKL78u6ZNxv8ERR6f+sPdF
04IuWecbVCCmi6FYBUhq2dR4nyOSkIXZ/f1CMFMbwTbBKFKSPQUCUSGMjmI/
auuXne0wJrT1y9b2Uxv/+Xag2sx6AyJqR16wjMJQcvGYBIkTZLmey9FEzfnb
gViBNrQQ0eMVlPxtSM5liD1S6+/Sj1l6lW5wZWybG0GrNlexH4HFHoOUA55a
RN5lLJYZZvSvgCiPD8mo/8hcr3tFtjyABCo5BdMuiTVk5jUUlTWo87z2omg6
phQ0NLe5l3BDE+h8genmbSFAc2mdzYRS6sKm1rdiX6hzu2QzQ7OlyXRm3/5i
IgYec59gqcIad7drX87iD+/G4g+XsHg6WRxOaj96dzhgh/8cPD0AM/QdsB+m
D8A7D5B5dnD20/npwRvrrFnf3tl9vLdhV1XvofR/VsA8WjwUZsRvs6S05skp
0OMIv5rMwBWl/JciFOvXktOGPUhmVsr3c+cBKJpe4MQS6WuhojU8WOOoh7dz
VFucYRm3lEZfk2Muwap1xAptSd0QyTdmAe4dG7qrTFZb0M33YR9PvEizXXp9
Hty5hl3bX2EqX2VdjCMvEXX5jMMvBa2Y402fO8EmkWyBzzk2WrZGenRsKRhP
z7P0EmsW4yzPhYL51fJiSI2kgQQdRl77RSubp2xIvJRJl97JJRYWuG0bApOR
QZSJiDHHwJTZl1dds8O+7aahmP5Ucw9mjGG/g86wct7IFCMowp8LV+Q2eIM9
6XYo97kuIb3Lnq6Aj/h9DtCfUT+0hYPdux6p4BCyKrYXeUPdhfZ4DmcQLWt3
o9S6oY1z/iqKueaGTfv2q3nL286Nm9feq2jdPHbEwdY9W+0+O2OQbtZyV0kn
4LqZHdVi+wDTNI+k4AP7TOwbvIP6sVc6SXgoW3uQ1Arur53PAIsiYqkmvJ4N
bG4jyFQ3L29xlf5JlplBUDPx3xnJ5Xtqt6mBR5KegzzUzDjVJYVnwrct+u+Y
xFok1MWVtLCYaUNnn+5RLKI45/obUmfDQEpVVxxezj1aMKSHIay09irPe66A
Reumm2oYsO22oRTm50CanLQ4DeEuRkDGeZzJqw2OmAK9appm4O6Kt5hbjvJs
kUGLQZkN6ENtGC60wNRfFXKVk/mEKvOqKLkFezDDribI6HQWHOayUYbIL2SF
9HL+6sxfVErZim45lELfXXwqKCfyv1iJijefbpK3bjzdHe/V767+ysvtfswQ
y6aPjBsV4WCIDkZ4xyjBQ0fvuwFpzQJLj3+/NoHjrzFk/RrPAsj/9KN9XQ9u
Lr0gh5yD/6onE/UyigAZB2mZYbkDOJajWZXrtK/+Oosv4NFhFPfVv+nrKse4
EFZnOJtRsSFogK+U6kOLS1DNXwF/AV6EglWXI3yt8mBApUdA6v0Pt97HGbui
AAA=

-->

</rfc>
