<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-16" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-16"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>sriram.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="08"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 106?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is a fundamental mechanism for detecting and mitigating source address spoofing attacks <xref target="RFC2827"/> <xref target="RFC5210"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. 
This document provides a gap analysis of existing inter-domain SAV mechanisms, describes the problem space, and defines the requirements for technical improvements.
The corresponding work related to intra-domain SAV is documented in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>, which also considers filtering hosts at the edges <xref target="SAC-004"/>.</t>
      <t>In this document, inter-domain SAV refers to SAV on AS-to-AS interfaces that carry external BGP (eBGP) sessions. The eBGP sessions include Customer-to-Provider (C2P), Provider-to-Customer (P2C), lateral peering (P2P), and Route Server (RS) to RS-client connections. The terms customer, provider (transit provider), and lateral peer (non-transit peer; peer (for simplicity)) used in this document are consistent with those defined in <xref target="RFC7908"/> <xref target="RFC9234"/>. Further, <xref target="RFC9234"/> mentions RS and RS-client. An RS-to-RS-client interface is akin to the customer interface. For the purposes of SAV, an RS-client-to-RS interface may be treated (1) like a provider interface for simplicity, or (2) like a union of lateral peers considering all the ASes the RS-client chose to peer with at the IXP RS.</t>
      <t>Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) based techniques are currently utilized to some extent for inter-domain SAV. In this document, the inter-domain SAV methods from only the existing IETF RFCs (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>) are considered for the gap analysis; IETF work-in-progress documents are not considered.
This document analyzes the available methods and attempts to answer: (1) what are the technical gaps (<xref target="gap"/>), (2) what are the outstanding problems (problem statement) (<xref target="problem"/>), and (3) what are the practical requirements for the solutions to these problems (<xref target="req"/>).</t>
      <!-- 
(KS:) I took out the statement below from the above para but included SAC-004 reference earlier. SAC-004 is mainly about filtering hosts at the edges.

 Other documents, such as {{SAC-004}}, discuss the underlying anti-spoofing problem space from an operational and security perspective, but are not used as the basis of the method-by-method gap analysis.
-->

<t>The following summarizes the fundamental problems with existing SAV mechanisms, as analyzed in <xref target="gap"/> and <xref target="problem"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: Limited Propagation of a Prefix and Hidden Prefix.</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/> to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead: ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The high operational overhead issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>To address these problems, this document specifies (<xref target="req"/>) the following key technical requirements for any new solution:</t>
      <ul spacing="normal">
        <li>
          <t>Improved SAV accuracy over existing mechanisms: Any new inter-domain SAV mechanism must provide improved SAV accuracy in terms of improper block and improper permit over existing mechanisms. It must seek to achieve zero improper blocking (i.e., avoid false positives) in certain scenarios of interest (<xref target="gap"/>). Further, it must improve the directionality of filtering (i.e., achieve greater rejection of spoofed traffic) over existing mechanisms.</t>
        </li>
        <li>
          <t>Reduced operational overhead: Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. Any such solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
        </li>
        <li>
          <t>Benefit in incremental/partial deployment: Any new solution <bcp14>MUST NOT</bcp14> assume pervasive adoption of the SAV method, the SAV-related information (<xref target="terminology"/>), or the SAV-specific information (<xref target="terminology"/>). It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
        </li>
        <li>
          <t>Automatic updates to the SAV list and efficient convergence: Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the SAV-related information or the SAV-specific information. It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.</t>
        </li>
        <li>
          <t>Providing necessary security guarantee: If any proposed new SAV method requires exchanging SAV-specific information between ASes, security mechanisms must exist to prevent malicious injection or alteration of the SAV-specific information.</t>
        </li>
      </ul>
      <t>Note that this document focuses on inter-domain SAV mechanisms that validate and filter packets without modifying data plane packets. This scope limitation is intentional, since allowing packet modification would introduce additional design, forwarding, interoperability, and deployment considerations beyond the problem space studied in this document. Therefore, SAV mechanisms based on data packet modification are outside the scope of this document.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV List:</dt>
        <dd>
          <t>The table of prefixes that indicates the validity of a specific source IP address or source IP prefix per interface. Sometimes the terms 'RPF (Reverse Path Forwarding) list' or 'SAV rules' are used interchangeably with 'SAV list'.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results in packets with legitimate source addresses being blocked improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results in packets with spoofed source addresses being permitted improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Customer Cone:</dt>
        <dd>
          <t>The Customer Cone (CC) of a given AS, denoted as AS-A, includes: (1) AS-A itself, (2) AS-A's direct customers (ASes), (3) The customers of AS-A's direct customers (indirect customers), (4) And so on, recursively, following all chains of provider-to-customer (P2C) links down the hierarchy.</t>
        </dd>
        <dt>Prefixes in the CC:</dt>
        <dd>
          <t>IP prefixes permitted by their owners to be originated by, or used as source addresses for data traffic originated from, one or more ASes within the CC.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>Routing information (e.g., RIB and FIB) and objects published in the Resource Public Key Infrastructure (RPKI) that were originally proposed for non-SAV purposes but may also be used for SAV. The RPKI objects include existing RPKI object types (e.g., ROAs and ASPAs) as well as any new types that may be proposed.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>Information dedicated to SAV, which may be defined and exchanged between ASes using a potentially new inter-AS communication protocol or an extension of an existing protocol. The information may also take the form of new RPKI object type(s) or management information from operators.</t>
        </dd>
      </dl>
    </section>
    <section anchor="SAV_methods">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. One may think of using ACL as a disallow list on a provider interface to block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes, etc. But it is impractical to store and maintain a very large and dynamically varying set of unallocated IPv6 prefixes. Also, for the customer interfaces, the ACL method is impractical while other techniques (as described below) are more effective. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knowledge of IP address prefixes it has allocated to manage those services. Here ACL can be used in an allow-list form.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/> <xref target="RFC8704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always hold in practice, and to address cases where it does not hold, many enhancements and modes of uRPF have evolved. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We briefly describe these modes as follows:  </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode. It permits a packet only if it has a source address that is covered by a prefix in the FIB, and the next hop for that prefix is the same interface that the packet arrived on. This mode can be deployed at customer interfaces in some scenarios, e.g., a directly connected single-homed stub customer AS <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of a packet is routable on the internet by matching it with one or more prefixes in the FIB, regardless of the interface on which the packet arrives. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses from prefixes that are not routed on the global internet (e.g., IANA-allocated private-use addresses, unallocated IPv4/IPv6 addresses, multicast addresses, etc.).</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: Unlike Strict uRPF, which requires the packet to arrive on the exact best return path, FP-uRPF allows a packet to pass as long as the router could reach that source address through the interface it arrived on (based on the feasible routes in the Adj-RIBs-In <xref target="RFC4271"/>), even if the route isn't the primary route (per best path selection). This makes it more effective in multi-homed environments where asymmetric routing is common, as it prevents legitimate traffic from being dropped simply because it didn't take the "best" path back to the sender.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm A (EFP-uRPF Alg-A) <xref target="RFC8704"/>: EFP-uRPF Alg-A expands the list of valid source addresses for a specific interface by including all prefixes associated with any Origin AS that is reachable through that interface. Instead of only accepting prefixes directly advertised on a link, the router identifies all the origin ASes present in the BGP updates received on that interface and then permits any prefix from those same ASes that it sees elsewhere in its Adj-RIBs-In (associated with all neighbors — customers, providers, peers). This "Origin AS-based" approach provides significantly more flexibility than strict or traditional FP-uRPF, as it accounts for cases where an AS in the CC may send traffic for one of its prefixes over a link where it only advertised a different prefix (multi-homing and asymmetric routing scenarios).</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm B (EFP-uRPF Alg-B) <xref target="RFC8704"/>: EFP-uRPF Alg-B provides even greater flexibility (compared to EFP-uRPF Alg-A) by aggregating all customer interfaces into a single "customer group" for validation purposes. The router first identifies all unique prefixes and origin ASes associated with all directly connected customer interfaces using only the Adj-RIBs-In associated with them. It then constructs a comprehensive RPF list that includes every prefix originated by those ASes, regardless of whether those prefixes were learned via customer, peer, or transit provider links. This list is applied uniformly across all customer-facing interfaces, attempting to ensure that legitimate traffic from a multihomed AS in the CC is never dropped, even if the traffic arrives on a different customer-facing port than the one where the specific prefix was advertised. In comparison to EFP-uRPF Alg-A, this method (Alg-B) reduces the possibility of improper block but at the expense of increased possibility of improper permit, i.e., reduced directionality.</t>
            </li>
            <li>
              <t>Virtual Routing and Forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV list.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential for preventing source address spoofing traffic at all AS interfaces — customers, providers, and lateral peers. An ideal inter-domain SAV mechanism must block all spoofing traffic while permitting legitimate traffic in all scenarios of interest. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms for different types of interfaces under various scenarios to identify their technical limitations.</t>
      <section anchor="sav_at_cust">
        <name>SAV at Customer Interfaces</name>
        <t>To prevent source address spoofing on customer interfaces, operators can enable ACL-based ingress filtering, or uRPF-based mechanisms such as Strict uRPF, FP-uRPF, or EFP-uRPF. However, the ACL method typically has high operational overhead. The uRPF-based mechanisms may cause improper block in two inter-domain scenarios: Limited Propagation of a Prefix and Hidden Prefix. They may also cause improper permit in the scenarios of source address Spoofing within a CC. One example of Limited Propagation of a Prefix scenarios is when an AS attaches NO_EXPORT BGP Community to some prefixes (routes) forwarded to some upstream providers (in multi-homing scenarios) (see <xref target="noexp"/>). Sometimes this scenario occurs by selectively propagating different sets of prefixes to different upstream providers. The Hidden Prefix scenario is typically associated with the Direct Server Return (DSR) scenario; anycast prefix in a Content Delivery Network (CDN) application is not announced by the AS where the DSR (edge server) is located (see <xref target="dsrp"/>). Source address Spoofing within a CC scenario arises when a prefix at one AS in the CC is spoofed from another AS in the same CC (<xref target="spoofing_within_cc"/>). It is recognized that unless there is full adoption of SAV in the CC of the interface in consideration, improper permit is not fully preventable in the Source address Spoofing within a CC scenario.</t>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with the ACL method, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the Limited Propagation of a Prefix, Hidden Prefix, and Source address Spoofing within a CC scenarios mentioned above. Illustrations and analyses of these gaps are provided in <xref target="noexp"/>, <xref target="dsrp"/>, and <xref target="spoofing_within_cc"/>, respectively.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for customer interfaces for the scenarios of interest.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |         possible           |
+----------+---------+Operational-+-------------------+--------+
|          |         |  Overhead  |                   |Improper|
|Spoofed   |  no SCC |            |                   |Permit  |
|Traffic   |         |            |   Functions as    |only for|
|          |         |            |      Expected     |EFP-uRPF|
|          |         |            |                   |Alg-B   |
|+---------+---------+            +-------------------+--------|
|Spoofed   |   SCC   |            |                            |
|Traffic   |         |            |       Improper Permit      |
|          |         |            |    (in partial deployment) |
+----------+---------+------------+----------------------------+

LPP = Limited Propagation of a Prefix
HP = Hidden Prefix 
SCC = Spoofing within a CC
'Functions as Expected' connotes the absence of improper permit. 
It also connotes low operational overhead. 
]]></artwork>
        </figure>
        <section anchor="noexp">
          <name>Limited Propagation of a Prefix Scenario</name>
          <t>In inter-domain networks, some prefixes may not propagate from a customer to all its providers and/or may not propagate transitively from the providers to all their providers due to various factors, such as the use of NO_EXPORT or NO_ADVERTISE Communities, or some other selective-export policies. In these cases, it is possible that a prefix (route) announcement in the CC associated with a customer interface has limited propagation in the CC and is not received on that interface. Then the prefix is invisible in BGP at that interface but the traffic with source address in that prefix may still be received on that interface. This can give rise to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF Alg-A, which is the focus on in the following analysis, while it also applies to Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of a prefix caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \(C2P)   |(C2P)        (C2P)\      (C2P)\
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t>In the scenario of <xref target="no-export"/>, AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. AS 1 advertises prefixes P1 to AS 2 with the NO_EXPORT community attribute attached, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive on the interface with AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 via AS 2, AS 4 improperly blocks these packets. The same improper block problem occurs with the use of Strict uRPF or FP-uRPF. EFP-uRPF with Alg-B can avoid the improper block in this specific scenario, but even this SAV method would have the improper block if the Traffic Engineering (TE) at AS 1 is such that none of the customer interfaces at AS 4 receives a route for P1 (or P6).</t>
        </section>
        <section anchor="dsrp">
          <name>Hidden Prefix Scenario</name>
          <t>CDNs use the concepts of anycast <xref target="RFC4786"/><xref target="RFC7094"/> and DSR to improve the quality of service by placing edge servers with content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest edge server (DSR) location. Usually, only locations with rich connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, from where content is sent directly to users. DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, the ASes serving the edge servers do not announce the anycast prefixes through BGP, so the anycast prefix is hidden (invisible in BGP) on the customer interface side at intermediate ASes which — with existing inter-domain SAV mechanisms — would improperly block the response packets.</t>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P7 is advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5; AS 4 is the provider of AS 1, AS 2, and AS 5; and AS 2 is the provider of AS 1. AS 2 and AS 4 have deployed inter-domain SAV. When a user at AS 2 sends a request to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast server in AS 3 receives the request and tunnels it to the edge servers in AS 1. Finally, the edge server sends the content packets to the user with source addresses in prefix P7. The forwarding path for the content packets is AS 1-&gt;AS 2. Since AS 2 does not receive routing information for prefix P7 from AS 1, EFP-uRPF Alg-A or EFP-uRPF Alg-B (or any other existing uRPF-based mechanism) at the customer interface of AS 2 facing AS 1 will improperly block the response packets from AS 1.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+  AS 3(P3, P7)  |
                                +-+/\----+/\+----+
                                   /       \
                       / P3[AS 3] /         \ P3[AS 3] \
                      / P7[AS 3] /           \ P7[AS 3] \
                     \/         / (C2P)       \         \/
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
                         /     |      \           \
       / P3[AS 4, AS 3] /      |       \           \
      / P7[AS 4, AS 3] /       |        \           \
     \/               / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \(C2P)   |(C2P)      (C2P)\      (C2P)\
                    +---------------+         +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P7 is the anycast prefix and is originated only by AS 3 via BGP.
Note that the prefix route propagations relevant to the DSR
scenario are depicted; not all prefix propagations are depicted.
]]></artwork>
          </figure>
          <t>Further, there are cases of specific prefixes that may be exclusively used as source addresses (legitimately) without being advertised via BGP by any AS. While different from DSR scenarios, these cases similarly result in existing inter-domain SAV mechanisms improperly blocking legitimate traffic originating from such prefixes.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone Scenario</name>
          <t>In general, improper permit of spoofed packets in Source Address Spoofing within a CC scenarios is unavoidable for various uRPF-based methods in partial deployment. For example, consider a topology in which AS 1 and AS 2 are customers of AS 3; and AS 3 is a customer of AS 4. AS 1 and AS 2 originate prefixes P1 and P2, respectively. AS 4 performs SAV on its customer interface with AS 3. P1 and P2 are announced from AS 3 to AS 4 and they would be included in the SAV list (allowlist) of AS 4 with any SAV mechanism. Assume AS 3 doesn't do SAV. Now as an example of Source Address Spoofing within a CC, if AS 2 spoofs AS 1's prefix P1 and sends the spoofed packets to AS 4 (via AS 3), there is no way for AS 4 to detect the spoofed traffic. AS 4's SAV cannot differentiate between the spoofed and the legitimate packets that have source address in P1. In a Source Address Spoofing within a CC scenario of this nature, the only recourse for blocking the spoofed traffic is for AS 3 also to be upgraded to do SAV, i.e., deployment of SAV closer to the source of spoofing.</t>
          <t>Another scenario is highlighted in <xref target="customer-spoofing"/> while using EFP-uRPF Alg-B method on customer interfaces. This scenario is not Source Address Spoofing within a CC from the perspective of an individual customer interface of AS 4, but it is Source Address Spoofing within a CC from the perspective of AS 4 looking across all its customer interfaces. EFP-uRPF Alg-B relaxes directionality to reduce (or eliminate) false positives and that makes it more susceptible to Source Address Spoofing within a CC (per the latter perspective). This is expected because EFP-uRPF Alg-B somewhat conservatively applies the same relaxed SAV list across all customer interfaces.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \(C2P)   |(C2P)      (C2P)\      (C2P)\
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's CC, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, AS 4 will improperly permit the spoofed packets from AS 2, enabling them to propagate further.</t>
          <t>In the scenario of <xref target="customer-spoofing"/>, Strict uRPF, FP-uRPF, and EFP-uRPF Alg-A — applied on the customer interfaces — work effectively to block the spoofed packets from AS 2. This is because these mechanisms have stronger directionality property than EFP-uRPF Alg-B.</t>
        </section>
      </section>
      <section anchor="sav_at_peer">
        <name>SAV at Peer Interfaces</name>
        <t>SAV is used at peer interfaces for validating the traffic entering the validating AS and destined for the AS's customer cone.
The data packets received from a customer or lateral peer AS must have source addresses belonging only to the prefixes in the CC of that AS. 
In both cases, the focus is on discovering all prefixes in the CC of the neighbor AS.
So, in principle, the SAV techniques suitable on customer interfaces may also be used on peer interfaces, especially EFP-uRPF Alg-A or Alg-B, which are more accommodative of asymmetric routing.
Indeed, asymmetric routing is thought to be prevalent for peer interfaces.
If SAV techniques suitable for customer interfaces are considered for peer interfaces, then the gap analysis of <xref target="sav_at_cust"/> would also be applicable to the SAV for the peer interfaces.
However, due to increased concern about asymmetric routing, network operators may conservatively use the same relaxed SAV techniques for peer interfaces as those for provider interfaces, e.g., Loose uRPF (<xref target="sav_at_prov"/>).
In that case, the gap analysis of <xref target="sav_at_prov"/> would also be applicable to the SAV for peer interfaces.</t>
      </section>
      <section anchor="sav_at_prov">
        <name>SAV at Provider Interfaces</name>
        <t>SAV is used at provider interfaces for validating the traffic entering the AS and destined for the AS's customer cone. <xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider interfaces in the scenarios of interest. ACL-based ingress filtering may effectively block spoofing traffic from provider AS, while appropriately allowing legitimate traffic, but it has high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In <xref target="provider_peer_gap"/>, Spoofing from Providers refers to a scenario in which spoofed traffic comes from provider ASes, either because they originated it or because they forwarded the spoofed traffic that propagated from their neighbor ASes. The spoofed prefix may belong to (originated by) any AS in the Internet other than the spoofing AS; it may even belong to an AS in the customer cone of the validating AS (example below).</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering and Loose uRPF at provider interfaces in the scenarios of interest.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|             |            |  Functions    |
|Traffic   |     --      |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofed   |   Spoofing  |  Overhead  |               |
|Traffic   |     from    |   (HOO)    |Improper Permit|
|          |   Providers |            |               |
+----------+-------------+------------+---------------+

'Functions as Expected' connotes the absence of improper block.
It also connotes low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider-spoofing"/> illustrates a scenario of Spoofing from Providers and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF.</t>
        <figure anchor="provider-spoofing">
          <name>A scenario of source address spoofing from provider AS.</name>
          <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>In <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2 at AS 2. AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. Suppose AS 4 and AS 1 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>Using the ACL method in the form of a disallow (deny) list at the provider interface of AS 4 (facing AS 3) incurs a very high operational overhead, as mentioned in <xref target="SAV_methods"/>.</t>
        <t>Applying Loose uRPF at the provider interface of AS 4 (facing AS 3) can greatly reduce the operational overhead because it uses the FIB as the information source for allowed prefixes, and can adapt to changes in the network to prevent false positives (improper blocking). 
However, using Loose uRPF at AS 4 will naturally permit packets with source addresses in P1 (since P1 is present in the FIB) and hence will not prevent the improper permit of the spoofed packets from AS 3 (<xref target="provider-spoofing"/>).
This is an expected limitation of Loose uRPF.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <t><xref target="problem_sum"/> provides a comprehensive summary of the gap analysis in <xref target="gap"/>. It highlights the scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead. The various entries in the table in <xref target="problem_sum"/> can be traced back to the terminology and analyses presented in <xref target="gap"/>.</t>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+-----------+----------+-------+--------+
|Problems|    ACL   |   Strict  |  Loose   |FP-uRPF|EFP-uRPF|
|        |          |   uRPF    |  uRPF    |       |        |
|        |(CI or PI)|   (CI)    |  (PI)    | (CI)  | (CI)   |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |    YES    |   NO**   |      YES       |
|Block   |(manual   | (LPP, HP) |          |    (LPP, HP)   |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |NO (no SCC)|   YES    |   NO (no SCC)  |
|Permit  |(manual   |YES (SCC)  |(Spoofing |   YES (SCC)    |
|        |operator  |           |  from    |                |
|        |diligence)|           |Providers)|                |
+--------+----------+-----------+----------+-------+--------+
|        |   YES    |                                       |
|  HOO   |  (Any    |                  NO                   |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
CI = Customer Interface
PI = Provider Interface
HOO = High Operational Overhead
LPP = Limited Propagation of a Prefix
HP = Hidden Prefix
SCC = Spoofing within a CC  
** Typically, an HP (like DSR prefixes) is hidden on the CIs
   but received on a provider or peer interface; 
   hence included in the FIB and that helps avoid
   improper block for Loose uRPF.      
]]></artwork>
      </figure>
      <t>The problem statement that results from the gap analysis can be expressed as follows. New proposals for SAV should aim to fill in the following problem areas (gaps) found in the currently standardized SAV methods (found in IETF RFCs):</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: Limited Propagation of a Prefix (e.g., NO_EXPORT and some other selective-export scenarios) and Hidden Prefix (e.g., CDN/DSR scenario).</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the CC of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one AS in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead: ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The high operational overhead issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>The limitations of existing uRPF-based mechanisms are due to their exclusive reliance on BGP data. Although the algorithms themselves have evolved (e.g., <xref target="RFC8704"/>), the underlying input has remained unchanged, inherently constraining their accuracy in scenarios such as LPP and HP. With the availability of authoritative SAV-related information, plus the potential SAV-specific information (<xref target="terminology"/>), it would be possible to develop comprehensive new SAV algorithms or mechanisms to overcome the existing gaps.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements for any new inter-domain SAV mechanisms which may be proposed to bridge the technical gaps of existing mechanisms.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>Any new inter-domain SAV mechanism must provide improved SAV accuracy in terms of improper block and improper permit over existing mechanisms. It must seek to achieve zero improper blocking (i.e., avoid false positives) in certain scenarios of interest (<xref target="gap"/>). Further, it must improve the directionality of filtering (i.e., achieve greater rejection of spoofed traffic) over existing mechanisms.
The requirement applies for all directions of AS peering (customer, provider, and peer).</t>
      </section>
      <section anchor="reducing-operational-overhead">
        <name>Reducing Operational Overhead</name>
        <t>Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. Any such solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
      </section>
      <section anchor="early-adopters-benefit-in-incrementalpartial-deployment">
        <name>Early Adopters Benefit in Incremental/Partial Deployment</name>
        <t>Any new solution <bcp14>MUST NOT</bcp14> assume pervasive adoption of the SAV method, the SAV-related information, or the SAV-specific information. It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
      </section>
      <section anchor="providing-necessary-security-guarantee">
        <name>Providing Necessary Security Guarantee</name>
        <t>SAV-related information, e.g., routing information and RPKI objects, may be used to design more accurate SAV mechanisms. Such information must be protected during both its creation and dissemination (the BGP security community is already diligent about this). If any proposed new SAV method requires exchanging SAV-specific information between ASes, security mechanisms must exist to prevent malicious injection or alteration of the SAV-specific information.</t>
      </section>
      <section anchor="automatic-updates-to-the-sav-list-and-efficient-convergence">
        <name>Automatic Updates to the SAV List and Efficient Convergence</name>
        <t>Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the SAV-related information or the SAV-specific information. It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.
In this context, convergence refers to the stabilization of the SAV lists on the AS-to-AS interfaces performing SAV.
It is essential that any new SAV mechanism converges to the correct updated SAV list in a proper manner, minimizing both improper block and improper permit during the process.</t>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>Any new inter-domain SAV mechanisms should work in the same Internet Protocol (IP) address scenarios as existing SAV methods do. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both the global routing table based forwarding and Customer Edge (CE) site forwarding of VPN traffic.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, the focus is on the validation of the outer layer IP source address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>The scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>SAV mechanisms based on modification of packets in the data plane are outside the scope of this document. Existing architectures or protocols can be inherited by any new SAV mechanisms for greater effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The SAV list will be generated based on SAV-related information and/or SAV-specific information. If the information is poisoned by attackers, the SAV list will be inaccurate. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. BGP routing security using available methods for the prevention, detection, and mitigation of route hijacks, route leaks, and AS_PATH manipulations should be deployed which leads to greater accuracy of the routing information (e.g., RIB and FIB) used for computing SAV lists.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="19" month="March" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing intra-domain source
   address validation mechanisms, describes the fundamental problems,
   and defines the basic requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-22"/>
        </reference>
        <reference anchor="manrs" target="https://manrs.org/resources/training/tutorials/anti-spoofing/">
          <front>
            <title>Anti-Spoofing - Preventing traffic with spoofed source IP addresses (Module 5)</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author initials="D." surname="Montgomery">
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="NIST SP 800-189r1" value=""/>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="SAC-004" target="https://www.icann.org/en/ssac/publications/documents/sac-004-security-and-stability-advisory-committee-securing-the-edge-17-10-2002-en">
          <front>
            <title>SAC 004 | Security and Stability Advisory Committee - Securing the Edge</title>
            <author initials="" surname="Paul Vixie">
              <organization>ISC</organization>
            </author>
            <date year="2002"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 551?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Ron Bonica, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, Paul Vixie, Amir Herzberg, Jeffrey Haas, and Xueyan Song for their reviews, comments, and suggestions. 
Apologies to any others whose names the authors may have inadvertently missed mentioning.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81923IbR5LoOyP0D7VSxAqwAVCkJEumZ2YHoiSLY12wBO2Z
2bHD0QCKRFuNbrgvpGDK+y3nW86XnbxWVTcaACl5TywjbAGNrltW3jMrq9/v
39kryiid/RwlWWqPTJlX9s5evMzpY1EePnjw9YPDO3vTqDwycXqemXvmeG6n
76FdNVnERRFnablaQtOTF2cv7+xFuY2OzLc2tXmUmH+dvhi9Hh6/+OnO3tUF
vJKWNk9taV6kF3FqbR6nF+YsKt6bl1k+hYHv7M2yaRotoLtZHp2X/diW5/0i
uoRG/Rhb92fZIorT/jLPJold9GH2pV3YtOwffIXty7hMoPW30dIM0yhZFXHR
MyN+2Yz15Z6BNZtT+2sV5/SgMOdZzvPrP6cRzHj4g4H1TCa5vZSpy+D409sX
Z+vd3tlLohTWaVOcSlSV8yw/urPXB8gVR+b5wLyO7+wZwwt8HqXyPcuhzVkB
wJhXkfk+jS9tXsTlCn+bwr9H5pmNf4Gf6UFWpWUOz47ncRrhEwtzSmC/siSe
RelfS+loYGfVYJq64V8PzH/GqR//dZRO5xY2QJ7SLP5rnqUXFxX8VMHsokmW
R2WW33Imv8ZpMv3rbxfTJJq0zOJ1XAWziCdxqo/+uCkkcZVMNkzhzcC8gu4v
/CTeQHe/Ii665zQT+HZl49sNPMceFtLfX+fUw2CaLdzo3w3MOI/zaOGH/y4r
4/dREi2rWRz8SHP4fjw0b6MSqAzI6SQtAL+r0prsHLEunUX5rCBcPrPTeZol
2QUBSrGWWp+Mz/wavo3icg7oNalyWkhuL6BvAMHz2rIACUs7Y8wucLThAqh1
Gq60oIkOkEL/eoGPeJl39tIsX8CML+0RfkOm4b8bc/ry+NHhkwP9/Pjw4IF+
fvL1g6f6+evDh4/c8wdfu88Pnzxwn58Gnw+fHj5x/T/8yj1/9OTpV/T5pP98
0OAmebSRm1AT/G8RpXlB34wpo/zCAh+cl+WyONrfp98GsE37uS2yCjhYsQ+d
xils/T5sU5bHUVLsR2kZ94tllp3jc+mK2dQQfxrLT6YPHMVewuj4BTo6P4+n
5gr2y1Br2A8exZyMTDSbwaAFbE7nTTarEmsed7lrx3bwC/RJaPRm+PZ0zI9m
sEQYeTrF5jNz+OCQGKcxcZFNN6z06upqEAvzhrcAjqvGuoFv7x8+OHi8LxOD
JfQB0frTeZQkwGVsPzvvx8tNcHCNDDQyrhFiHixWG21ZoBMtY55euFacl+5n
GhflhkXOspgWdfBg8NWDw6f7SDiD8Wjw9MGD/sHTr/ODQbyccS9u4nefZfnM
5kBWpb2KVigSymyaJWZsp1UOFCeCpoiT2KZTe7dlCW2MAf9oXUq97jWQIm9A
5F5kQJCrDa/qsg8f8/cCaBemAJQIM8bXzHhk3LLu8vZX+fJ8y/ZP42KaIYnv
T/dn0WLfpj9XgNuTrCr3C1nsPuJIksQXuNR97HCwnJ3XAQacZRoVJcAEpZw1
owjwG8T/FbAy3P8X6RxYfyCUESH87tr8MgYKADhfxgD4/sZfzFtbXmX5e/Ni
dtEKdsWcY1yYGa8KoHzQFU7S6aAOxQePGUDj4XH/gXCcDSQyjdKUcMim+0UR
TfeX1SSBp8i/iUYqWtc+/IRd9RVwfcASZD4TQBP8NrsEYsxXfQD3Ii5La+VN
ISoLS+ofPOkfPOjD9A77Nq3DGGZqoHvzsY6GYx0A6I0HMMc6AEBjLEMQxDdB
TbBwFFWJ+SH+ENsaCp6MjxuwO0TYDQYD/Kff74NkKoCzTUv8fjaPC6NAMUve
OBBn5gK0t0i0N2QB9gNQLc4sVAGVGQrDMZcR6j8IabMAYRgBpeN+Qo/TPJ5A
v7gsYfTAUaKpZS1wZoG1yM95UyMsUazCBiYmXuAE+Se3mkU8myWkt95DHM2B
E09xBvhkzNMT1mZ+8NPrgP7YBXYLKz2vQIZjnzCCmzWNPLMwNi0aJwmbFF9E
9LWxbOWNJirLaPq+MNfXIg5//50/o4jVzyg+9fNT+jwwn70RqCn/fwD5GUqG
LIdVL7OUeAXRd26TCHWVMjOhTKdZBcuCN+Dhv26nBvzUM1fzeDo3IMczGDwt
kLXAPOOkZOtlnhUw76iktSBd4gYIp2Dg3tk7SeHXYCq9dfDl9hz7hTXgN8CR
4bhfZv3hmF89B9AhuGCcaZQD3doPyPYARs++HZmOhf93gcuTNVYMDEIKn7lH
0Ms0qWbWHINNh5IDO3ecsnN8OOr2PE+F3/Q90xkdHsNvCGI06JZitMFjbELC
LUOFFNkvvn467uIqTsf9KUq8EoGWWiIKmRh0tCjMVAboKbpBW9gJALBDwFwG
CMc2nTRL++5FePKNPEfUKQBjgN0Ch+t2TVXwltdAb8A+5X0Edg9fSbsC9gaC
iJGSmhB5oDaqpILaKO7myypH7bkXPDXYLcH4dMzw0KUPQL3DbwBODw63nUT/
73F+Ges8CnH3xgDFIpMQiNKsYEUc8APB4ofh/oOOF6CHTADOYIkj1ncOumAO
vQeO4UHtX66DrQds3HQOXYMqRX4Fo4Z7UDhCILaTJDTH4VgIOth6giusj3aI
QC2EcvKPEbzH1MGaKEgi5J8JmIKgHHSGx6+7BM1qh7rQqU5HL7tmEuFuM+v4
tULehftcAbNIy2RlqhLk3m/MJAqAMtEPzBBX36TFgVmnV5xzC8sDxAHz6zzP
FkCyMAzxAGWR6A9BCwQ09GfHI/PwaY0z49rw8dNHmxhz1+MqgBrmrspQyJS/
4WGQEfaZgV2QVHCqBnWSZmXQ0aDJ8Kmz32T7oksw5SJgg259OFUQLnaxLIlD
Ae1d2fyIEOsKWRIOURJlK+eGKcKyr6/hX1hIj1Cq9irwDPI7IaCE60IDJyqU
/3axE3lKHeFcOg8bnS1RoaBx14UJ/FxkScUUyqRW2GDI62toA12TSP/Tv4FM
v7PX+W581DUn8Hr2HmfKveicgLaS7Ip3nQA2ARllllEemUlVKqedqbrIrB0V
YmOjHAgjH7ifYBMQmwBzSI/eKlZoguYdsh+/uz1TVCidakIHBDCotFXB+wkK
hs2TFSsSgSFal8u8HGAr2RLoXNwNCGzVUIGG82KJjPwShDguVBGL+GzEgwEZ
sqKAXxh/+pNVnz/VEHeACtRfWAtELpQATEm7qRaLKI8VG0P9yG0acRJHZ03t
IyoUoYWXExLSYgJcIt/EF+YEVQxYmpkk2fT9kXmhvSJb6TNX8Z3D7M5hMxlY
ca0pCCDQEQAPMhBMAKOiS7LnKmvorFObwvIy9ITFC/KxgNhdRhesGQLkInQC
nMcfaMKvQL+0qTwZNKYM/0EPR+bv5CFgrrY++yZ44npznXdqLyKZNxgxZh4t
lzAwTClKga+tlmSKe7HR8fI7FA0kP5z4BkQHjInPkTQTkC1xiBekt32QbZ4B
0U4Z6xDXkFeRI6XcxByJlEEPQnY0nccgHMxvNs8amwKgYN4Nu1LEYvvgOhow
AJoFYQkCdmA6bzO0XE5KJE6YVHaRsuBAhlOliWWyykl+n1cg/KJZttTNI50z
rctzWAzA6/i4q3QRqACpY8u0/+u7A4MgjeFAQILsHSLmHOIScEOc0CbDIJsC
CYuYQtKRCR4fw3ADO+iRYsAoVxqc7LAqszRbZFUhZjHI43HXuHY4K/VICd/I
iC+RusrcEogW3hx0GWdfxRfzGmsBlpnPbTQ7MiDpBVNhrjRxBKLnhLGYVYAp
RQybgdgEeNHWGdE+AC21dkbMvlqiHYpDmLyCrUNvXoW4SHgzi5YlaSe8eMDc
HJgwjonUgpo8LCYCo3phoQU0TZF3I7uab1oOQKaoAJ0zy/sGr5QR63httOnp
kmj7LHObVxdTvYYSWzBZ2UB+Mbd0bPS9XQXieE0sIlGn9sqJxpAbXgrTiBBt
oumKFuen7+eM7kvuZrM1aBZABsoR1KBr9I/wIZsgpExmqsgDmySxaToDJFoa
rrD2/W7OYDqC/ZdZDHjcwr2nsnue0JQHWtRRVb0JzIJYZiALbeNt0IVHbp2C
TPSCVHbAQ/sLN8G3ldLEIdzdDADexFOL1DLbRG67t2z86t33r5+jCUGcBgEJ
DAFd+MTHPeGk4mGbrdJoEU9FUyxWC+DweTx15OTgN6DhSWVRzDNvvh+fgbiB
1RNvbaUqYL7pLkYhq39mU6BmZOnM1Vl32Af1rIyhy5ldJtmKPPwOFPWpvH13
BmsANcQiwl2CQnNpazwe99Sr/z393lc/hAt4oKfn+hpRO+bIDGmwopRiCyHj
6fYmhNduT3h1qEmueFZoj01WQmIIbQsqCqlp+KwUPCI27SXCeUNYACdB0YJQ
W4eUQHaoSCBsVdVpAkaCVhtuv0UcVcMf9o9cwbdEO/bwEOBhiIAZbwP1DriG
UKyjswiJ2kqu5jFgPpOlwFRWldt+sDDFBxR3AqaR24jUomEbgZbilOiLCswE
AAFqGOfEhZEpZYjUCB2PVsqyYV8+EABE023HmQkQorUp2eA9P1qguBJXIp4h
Eg8VCZBpaPajnI9Tx3FAOiBJRQ18b4cqrhk1JtaP6lLqHD6Q0yLd5i7kluK8
tYRDTNOAidP3tmR1H62jRTaLz8mQgTdBZ0mi1OpLKJdRK5kC/4AtBDnB848L
GjtljgKwiXHXIhWT3Jp7Fjc92NJVMvNqB5JILAxpZlEF6aEIFf+DuPKIa7F+
qR5OpZ66hge0aldZOlv3jIKBWc3iFpcVqRygomQ5GF4N2DE/hEkzRFpWg1Ya
GtsofglTCUK0reEY5MK+V8+IeA1oV0UXVo001CmA34NqdRc55d0e/4scEz+f
vvjP709OXzzHz+NXw9ev3Yc9eYPJz3/yLY/fvXnz4u1zbowcuPZo7+6b4T/v
MmDvvhudnbx7O3x9t923B9g9ERUbsLwk03RPHdIE3GfHo//7fw7Q7fJv6I45
OPiaTAv88vTgCdoWoE6nPBp5dfgrAG+1h1ZRlJNeCJr/NFoCniVscxbz7Ars
Jtipwd7eF/9CyPx0ZP40mS4PHv1FHuCCaw8VZrWHBLP1J2uNGYgtj1qGcdCs
PW9Auj7f4T9r3xXuwcM//UcSAwn2D57+x1/2OAhy5kWXub4XCjL8/froknAd
viAiv+ZY7BG7hUnZAMRkdVzd3XE6Q1QWO5HYhGhRkXEcaS0sjlzMPxQFf1l3
ro7BOkPdvhDfFWqg90E3N50NvsYuyYb72Pd98tmjSXGfsE58zdAJSytYy4rd
FPdVptyXWICqoc/Y4aDLD6JXsIAqKQsWxp4Fgn50AYxogVxyTXpPLLIzUm2t
V5lhErOKNTjkwaxxl17ODWozGok/4RZTauQlNOfDGnt52xm54MMx5qTpdGpP
nUEdmYv4kkQfxp3A5mJn1HDcH/bUF1ewrxKfgYZe2OScPZL44H4hCroz2Au0
dsEC6JGj8Sww5TkRZlMjxNT6M+ziEQyDbrTMoHmfo2hGxQbdId5aI2YyB9lY
MAH4OMy0FocBEKXvkeFdsS4E6kkeAcqtCGwjJRxnqBPsHAHAL35DJuStjnMD
fUnkCfhmlsegaUT8Aumq6t1b22GKUaLU0USVoC1qmz1yJcBLCxBcHB2oOR9o
yqEyd+LVCpr3qVgPNeXYDi7AXjo9eUbs+eXJM44SZBNUX2B9GG4v5ipFLWZe
8MRHFIg334EMg4HyqCjzalpWMLXO6ei7ky5zmyv0o8hC2OMi2hmuFiNPiKcu
GoNeUAy2UHBwIlwA36QoAmIOdu0mpzE4Z7oFv5KLrXDrezdkY2o4Hg3BFgX4
X1l0NRXOcuf3adIS79G5OsA69tiEbPAdaIb560xijxrwlE41KEaqPWuiiBuB
vgmrJhQG25n0LIKbV/WHY4NJDBTGoQGXmiFDbggOxBTq+0w9cPQ9BmSIBA7k
ZfTeit8jX2B7HLYJ1A7AD7EwSkGVWXAIzvfFsRuyObOcLeh73gncTPo0b7zq
dX0PHvwsMZLfOczbeBt0E5iBmBkwBg6LsCwlYAYcHTiB6aCaRtIptfHFfJIh
1PreS0hOdcZzdM3SrqB2yV1BNxPOQUJzW9jXs9OiGyr6G1yDolqSCLtECx0s
gUC79KGgkvwnicKvsU72KIWxBbXQvafj+hozr0jTorQ5+oQZZxivkBh7jqbf
ZWyvAi24YLNEbdA1H0A4gvMU38CriNkNLlzIdASMKGZzxTsMYeENa8Sp3Mw+
m3xxYF5lV6g/9P5wz6afFTo4hWOz9TprcVXiC8D3EySErS7OteCm89uQ83dg
3qUcVEbu/R7pjEke54McCcNNZFGx7czYvB5pxvmSU09AVtfzKNaZsF8jTkn1
2Do3sKpK4B0+AHYyfDtkjRBjEcyiSYAhJ8+YxZ2MLh/tw/++coP3jC2nA/MM
A3fkbUdFRaOJGCwuUXpRBg6GIyICM2zKyiSY/8W2Hru/iMqBishCLcAOQ0DV
B/fjDswQOFjPxSjXo/8Fe5YQyOISaMyOfRTseA8C3x2Ahbd3KFbJkWSSw845
NNiJnnPc2yUmBmjWGE52kmfRbMK8iBR20AJAXGJ8rqgmPGyOvl3sMMmypek8
H2Msn5+Iy1BDFmSRSuKeQxkcmFDBvE+zqwSjn5IHqvzLoQ7sGU3TARm2jDm9
JHVI50iWOB5CU3iopodEKbsD+oS8yKKF17T66YGzwNyiQlMxauwyt5477Epz
lLyFjUlZkuwE2D+zEaESmiaiXJBkwZACiIFYwtPsdV05F3WDYPD0BoJmBesv
FLkm6MdOgYzMHDaK2DjiTolqnHhPWNDquyhPSEro+xxfR3qmtAnGRnISULjP
+SSiPEe3uoSLnGfdYXsv6MkbcefMG6QPsLDRM0MOwgigjuh3GUc+3hT0BuiW
MaDFSQmqYsCaHbQCjuKCNlFyFa1wieQG0uwCSV0rfYyGACmIDLvg2mPDHsPa
hsmsxEWyGafx0HaS29teZsklqG3meXxOmQJl21sz9yMpDfRrgV72MsW5kNss
AeUpdEKpf97pN4T703mGlKH5CwticxVmU6Hnd1oBY3MtA8/93wEF8hjkycqx
F4lS8WyjQgya4ojTZb8wY5ofL6ImncMfYra/FxkGbkrkPAoBctmyxVJ4TCKX
DKCWkn4TadhrgDlKl5Q1A4aOi2+KQAFckM2c2zr6M7rJy0ULZqmf09YRG0le
XJA48zY9rYXDUxAX4/YOzCCOyACIxL5MVpo/h0Y2wCax/XmGSmRRVhPfJyiB
qmANNNP9C/OaNnod/MFzgBEHEt261mnQgR4j4kAszPcD2Yzp1xNUO8rpnBQb
yasLDcBlwzilPcjtBbDDxNF6CGj0xJJauAZsjPSdt81VguU6x164UEyJocMy
vrtB+HtNVw/3TRy1DW2mEHMFAO/0mrpnZM1eRnpb13l0wk6nNBdJNsHkV4Ws
2ISo3/S9oFsCJOBDH8SYH6S3QdsJXlhUScmSKXiIOhBnQCHavLRgcOAek8wi
6HRejvprAgtPCVGeYEDOqsu78EWwe8g6aQN1pfYDcFYWLLkFWxydS+W8Z2Qw
lssB6aNBg6I3Qs0CbU7JICa7B88uJTMWDQzeNcYAL17MmykYIQmbTqjdm3MF
BI3gUHc4+6V/evKs6J9IpiieZ6LYHsfQzv2sAK3S+4pD8QJjQfy8Q5FoEqkI
5MImbOd0lYuAaUvqTV1rIyGOOyhcwKaXcZ6lLF9YErXEX4kbLhbogOIECTEL
i9ClqG4cwlN2383ybLkkxgO2H7oDphGiG8q6eEbrUgP8Li7lLq9lApulUrew
mH0WsCQ53TFrQzKim2FykeXwYQGKVueFYgI87Q+7oYZ0ZOo/ojIELJ0xgu2Q
c/ZgtruuAu9xYGmvxEmjTjlHr4B2GVgWSFacxwrC/R35iYgFiMzxeolHtijI
+R3QCT6MaMPkSJChWrwUf4cM5Th/NAPuXMaCkBE5/3ohxgNLAqub2Ldm4WY6
J0tacsH2Ov2E+eAauYURrOJ8fYoqF1MveSlKSSJRdAZSrFEsSs5vRMZTYTFa
mRRWNKIUfa01YumsQRFmrT6Pwvz7YhYV82+8/9TnhuNHzDxW8rjrYM8a+l20
VMAyAdJ3pxcCmxptYqSjQEPinALWoCh2nEcuzCeIpdSCumSlmTOh0sf836dF
oY2MGO9pCRqQEDwnWLgtpgwO3lCvPzI++D2PAp1P4N9xtK/nQrZlW3iOfguq
e9agumfbqO6ZhzaxPs1fCeHcAdYDmiXbZk2CRuXs4iK3crSF/OCtehLKDlGA
zF33ygWseXmXwBwEK9Q/y0aU0Mp5nGNeTp1iKvb+eCpHV3JAQW342qKYtU2Z
XSQuKzwkg2avqISTrktkx7mP1ZR0XoRdbueWkyEQcMTahGQ5uIGgz1fexRN4
8IVWOS2grmwB2rHngN5wECAHONre6PRF4yo4p6H5nc1jGhyVEMqk+cXiObCU
v482NbG6PCuK2h73AVbuNJE4PSTTXEw3WHmVi9a9SVhFLBJZItYIEhVChI5K
srqE1k7UNiUm62muOclllpfMNYjRAlkHPgyVJbILV2iZOFIm05jJIC6ydJ0Q
JL9P/DwdobvcsnNwWwIra56Uji254h+WADPJ1uWs1tmO9FdNA80lcayesDYw
Xnr/EOdlBQxSQzMUgwl8Gj+cgobo7Q08h01+DTwJGrp+jwy8yS9ShgiQtsUE
ethZ/IEtDKRqUuZqZ53oKAmlBRbCMQ2eu+VVsYNaPPsk5F1c0Rj27YeFIcz1
Pczg2+S7R2WBAhrU19Ifzd6UaOsQqiQsrx/e2i7dmuecKFWOfD/JzuxKSZWE
Eddmwj5CifrhDy00JMkMrUmOgctEbVVxH21IvycZCDTvc25QcaQJtgyduaTO
5sw1n0eSkqJ4QR4vYI54wnLbycTGfChM6Wiao2ZhJnvBByRc+MODAWMeLC40
VOoTan2GUaGpM5TSWvoo9Ykf4fpeEV3+HJU/494TulGu747gDPKjVrdw3Z0D
00Vq2RIZ4TjuhvMM7DyvWXBO/YFmyqcCRGh4pb3VjO6YjZnRLIzbZ4E4I6ZF
na/94ScocBIrH0BsDOpOA0imVEAQjT1yJRskpB1hQJviJGDTIh/CNrum5weI
SaNMRaGkg7xzwJu3735+8Y/Ru9Mz4nzHHEYtV+4Qm5PaHTZQu5qYFhx0q5YF
HgRceGaDmQqmpkh6jdF0QItHV1IGcoRyT8MsmdiThx4qmKzUdsWcBopBR6LM
eaor0CtSy+zJgl/XZ8i4Uts5P3DNUdOiSpnnnIUhB1JP2bHQeT4+7bpOvkGj
hpwg3jEY0QlEnNBzm8SkUmkFgc7x87ddjYWoY5w8xWkKlsHUpVPg7nmlAIY0
HYpeFDQXOvKtzhkB9KzIFc47EczDAPUIqzjTPLzRUIBudlAD046V8fzMY/48
nWr28WcehYHu/+CjL5STeguIEZO+vlZ2+jMfCfMH3VPiUxh61pnSCcY29PKs
r7eBbSLbcfqdRmw2e4Cx0x2solcnBh7iNusv9JQy2pV4XhG2NUkqPGTFWalk
S5I4teqLLRQIuXOAyoE64Q49h789OV3XhkE9SudWDjHA4hC4Gf/t/u7sfdlv
+fty05cvm8++vLP38Uw0in83Y7fkj1SXAvcL/j4Ge/VRNuej7tLH2hy+bPl0
kzm8dgoOjvx6NMJhTfBX+9L8+xiswphgDm091LMIgx7qr74auUZ0Aqs2BzYK
gJ5qc2iHwzsv0fttu1WDQ9uC4dM7Pc3RCoePuiRcxVh4Fr2aZmYMqLwTkh85
f7EJyY/tjfDLS+Ddgv4FPSODAih2HZIbeoC/Fx+W7AWgZwFG3biH+irYr8Kr
aMPEGj5s3Ys1SBIcPx0nd6yikUfqe7gZHDqtZ0+6m3FyE22uAwT5DZLjn3fx
2Tt7r/CtuuZxZw/B9udWBntn734NiRQZ7pN3KNO05WhS6GmRhpRD6/qkdOVF
uAmm0rTr0HW+eX1k7oUijev//PnumcovTFfdZhfcUH61CS4X/G81G+/+zlbR
vZ1KsLJrMJJYrEjBlJrOr1kjvYbei4o8HbOUzq3LL9AZo98QFBP2vqoCDAvc
p5TAZmvxbLEu6w74+4bSG1uD/rFkNKsJCQBC68ynJmEnFftkvEoPE4Avw+c/
vDg9Oxm/cOp9TCZezitlbc1p2H0AEHqhlhme26FAaCqiWsxy1psca+cwo3Mf
k5nQdWrrIogOAIqveTtbNp6MvET2dBnsadANO2cosLkxzEAqfirg1XB7nF7G
PG88pgEmT1Q2mpGnK/TdtcRaeSo+jk9e+TKGfaPMkW0zitmkxoxygyq25D2G
JumVhEbQqanuhno9gvBE6hknSHhTV3OAm/4/jppKygEdnDIeqEGiuCtpyp6d
WFgHe1u5flCQW0H+OTXgh4y59fmEBQ2cOaDnktYdjS4rM9SrQ5a0WZassegv
t71NIgGslIed0cOuCJJtfX+5/6P0uv/jlzv6hr999+nH7W/uB59/NFvf3a99
29rvPpdc2vpyi0j7cvPbouuOzaPO6FE3eLShcwET/Z//dXpF+8z3a30CLPxf
2GB0+C+YxOFPCg0v5ze1qA9Q0wx2NHFQDJWJH83oMU7h8U/h5xYbQ9db00R+
bH4W9QXX1BkddsMGH83oAHs/+KllrqHKwqD2rb7yrbYuMfytqaa1tXPTCX5c
U+/aGnqh5H9d1wt37MaPitIfa7hNX34MPzebbtyZ1t+arT/S5hx0Rgc9gGwd
GXTrHndGj9uZyG3HbmpfaaYiWVSv1y2ikVOoWBiRx5HcRQ7ooCyRRSyyPHCx
nZOtLSOgJY0r5dR1J5npRJI5/IZ/4zMj5lDKX9WOLZlH9NKj1g4efqNtH6//
PskwRAwv6TuPBjKchriC2PboAKUQTcL5TDyCTZ0TMypBUE0wF0b8nbNeGGOh
DkgsnXNxhZpv0SfYSGgGYetGhukdg0Juf62o+lePl03GHYU2i43taUCGclPS
mXG1XHI01QP6kSRnar7YWqgmTNKmkDK9D7pRL+yi8D04xYCSKoo23Xsg6MKb
Kk2LZj5Mu8Opx8l5iasJsiNrDZYBYAEYjb5C4HLErZbE5XUzziQA6AzM3+d0
OggAhfkQtTyjW41HC8QwNKKD7GNwlJCUElcsxZ8E16zNuvLi1Bp2XTvsFNU8
VJxgAk5vcnDVTAkwz1FL5LohBIINSpI7nio4xHWzKARNLwTH/fnQOSFHW4/s
k1RTPKye3zl70ZVjQMQayOYgzTaVzJMNxwuk0SNViZHoPUnAJnRoF7rOY4fW
XN0yDmw38gPS2c3nbwuCKA2bpZjeJMmS7HHnyPCTp1/9/juXWXzw9SMpz4UO
c9W4BRC/Vq5qip4TwGIXCYfkA+e67OdUfPjTBEiVzD+Yi0RTdQbBQYKYfLzx
RcoRk5mlwwK4g0G+dSb1e5lkQYPnqAkSkC2kwp6kcGotRxwdCy74+UkEQjsb
mO+LiqtiMV/SQXgZOVoDWjnzkuv3ss3G/oT1lWjCGZhNTAGwETq022E3ZeJz
BBk+VkZ5O9BJBSMmrrAHTT9YPleQIo+/wplitGnps2I8xHE3XRqobpJYNPWe
pdGmpYkFvW7lSZ2QgPTrQcqxDKwSo4Yus6wWwqkNHqTpOqii76HlJYTAnKmi
07Rfu8ojW+xoKsig9ufCzmIqVEWnZMkU1HSBum25rY6Ga8H1KxpckkVeE2Ac
FgHiBQqMNSBArAB3z2kiPqYVbI9KzSdERT5vDeiTdIUaRmpJTQmP9viV2FUI
5kQi0VOcKuIVlpbXDnoiFfzbTv3Z0GIgytHNhLeIsYgQWtjloQi0SGlJaUUB
Ex6fORn1xH53KTKUIRsX1FX/LzgJ+v9DplntROiWk0sfevrlPeRxKU9T6DUu
ayQbEBuv+iUfZ+41X5HFCKsmglbxLP3R0jeKaocCPP3mOt3htkbfvP4DWvkh
KFZUk4WA687QyJJ9CnN4ZjdQ2Z54la3X1ICC9AUR2x0pfcb62NaKbF1NqGqh
XdG5jSSGkeglnepGROdnfAvvyU3NIYOVlgiHOP79JVo04kcBA+lJd4cnRccR
f4pzEOxuY7wJv9n3sW9GD9FIffhT6ILxDze2hIZP1hpS0yc7mv7o36+7XX4M
Xtk44U0G4uYlqtHpHDHb/DAySOiNuYEvRlcT9N5unCu4HzG/XfPKtLZSUDcb
bXf+/Fh3f7V6Zzb5ZgQKN/DQtPhnvi8Ey3d7aVqXezNPzS7v1TZvzea2boDN
HpstA7f4e27iJlqfeZvnZrffhv+au/blxl8CJoKXSzQYVJsHZ7f/ZtNI2+bA
CkuLJqdZpT6DmlRz1WfQDEVdpl7wzMUv2HYK/D6obif2Eo/0izAFnerOXpDE
Q7pHjPHCb+TgqZ44qfcTvjlYd0KB+qbup+FNsp8kOueKVpauBgQfbqCak7V8
5kalEfthCqoiR8k21ofpeJs/WXVdETc+WRSoiwJWOgqQIqhR7UKnibfASGCG
CikfX9aoF55PihOqHMB1ilA1uZHK3JTXGzJkFSPwZy6kWNFBEznKr8Zx48KP
lnhxrYJRYD235M1IGPSCL9Jbz44KCoM6tSq9wRSO62mHVUpuDJdwrTHMmkrE
ZeDba0PSHQVOq9eULqxFkS25DFisBzl3eyi9F/Jhq5fS+R21E0erNf8j/jw6
bCYekcYvkbtCr9lod7E5Vxbo5a4/mrHP+FMt7qHzU8nJqZVYYFSGTmrB+9qV
fECiQ0cb8WPXGT3uXFkNSWHeXIyUhkL9GA/ezTI2UN5mV1wUKMw7vQES0OF8
NmfwV9bH7xeBJ5Rrv6t10EQ1XXJHfHMPu8pGKPJLKfmITvQSOVZKqscTdOUS
vfGd+7wheH1SVnrKJ6NYiw2FjfXwdotfkRgVGXbrDoPRAVmi0a3oxBVLBDyr
cqlUQJIBcyIrLO5AhTGUgbQskhIkGRwPpaKCFG+5yCPJ1p1J+SU+ixHUj5Rc
Su/RCpwhygWolo//o2s1JNUzTJzF7OwE/is1k8+dcdFeqPohcl8+v9Swn8RZ
2Z6Y7kpw+vFwM28Cap9q4S8ZkAPWWFUNbHg8dbLREnvEjlXOffic8Qhdkyyj
fQzOK210xDfgoyXtGyWfqRAP1RJFA9Ri+gTyrG6z6LSgNQna8PhvURV0SlQq
Md1khXS+mCgEz1Pl4UL1DCV5YyR3TY/2NtaDOSh00wbydSyGLKkxLt1APe28
8FlQCnj9sFcIuNsavrtVyl1/t0soaIz6Sdaw/O02ije32ZlzsKHVbUZrGMW7
2t3eIJa/T7CLdchbmcdsU3Gw6OCnm1jJvulBS9PtxnKzh0b6w+6Eiba/W5vO
8veJFjTniOZgZN3vfoYhvT6Jz7KnW+Z7U7Na/j7PutZO/iAjW3//HFtb/m5n
7m7paHPuxE0t70+aEeCZK65Trx+r6udjPU/Dv+c+PS4m+wJlNWg4bAEEB7E1
8UBDDz7u3mI2r+k+3ogOVb9Np/OctK1d9CK29ckG5aq1zJUfn6Q+Bjetdi/K
MWrs4WljgkqvDSy3AUpPNPz1Y6Nba/uiIv1YukV1NhOll3z+YWDDBJGNPMdS
LhuVTh98kojBAl6gUn5UHhbdIPN4WdQqjw54AhTKcFFCF/Jx5oeGhzRnkh/S
+fr2JmuBpQHqWrEeZ+21h5i08acliujkyLZYzxbhQs3bEj6ebUkY8UkfXKZx
dwoGba83roMYSxMyLYk2zVCIeCza7EjtGLqkc6xiPy24dqlL6mZP1cDdpdlM
kmqltBskt3OcSAOnWrJgY9A2jLHm731VHg57+4jPxlV6zVsV7rWEXLZcyxyI
CusW1A0JBqkWL6nv/4DPFfuTyCO74RQyni//XYoEkw+o4EpXdLS+keKvZTWE
xJVB4H2q7qrg4J3hWG4/QN+b9VcWDsf3iwaj5DsFgnsLgqo0zSx+6KV2CSgM
QyffW8x8qj2OLMmX38gCN21YHdvVFxzSTZSAWZToFtRH5ERsqjRABcTwIMZa
aaC1Q45a0Qb7xWuAexwqjdNpTE4y9QQFRTux/p6WVWvDu7Uq01jmxDaI3Er1
U1jzeiSUcCSstEuWJZa2WSyyWeQs7rV6MgOEzMxaqkHbVloK/boX81JcGpjC
FyV6t2ZjjgNiYpvWvumoScs1mGtrL/U0QbMuwPV1ePb+d/HNKSy1vikb1rox
irXrs3f5JXLkw5fYoFSnPJWLHNch1Wupxkjn3uuWtabBrFnVAcBaAMCiLCs0
n3GtXJ0WFgwq3nUcaPB9vgLzRE5FIA30tsOTG90Ynk1YOt2xwbR06q2MC4c0
bZyrpT7fTbnXLVgW3x9JIxETlWPEjSsrb3DyikYMtiI4JNy2lLaCBL5Cx7Zx
EMNCMSUFmJv6ntQmlJHxKgW5AAmLagHnohiOvzVnPUTiHHA7akC8SwMNB2TY
rIaRdLk3ZZFp7bEtI1EKJqLdIi5QcU51huvL07qBogG7S7lbt7PnHWoElpE7
5uXv6I4CL6dGN5ouX2CsvuqjgyxRYkzLD1SAVRh0jKkeWe3XoKxDi3NZDjuJ
tjRz3s04D0WR1sNyyok/HcUCExfWqZWP6kpEThHwREtSStFprYXkAD4cf0NO
S8Q6zHL1HddKpdWvxhSpWdciOhrP4ALWaw7DjQc+tx4LldPJbYfFG6fF4b8A
MTceQr3RiPVz4TXzu/bFnyQ17Udv+/2gYXCgOzh4umOqwTnu9cj9+nFh3dft
x7fbpko4KN86r969YydC44jw+uFgT2xbDyl/znZ8xpFd4p6D2xzYXfc6rHGc
Wx7abYqOTxEZ7KPw3K/dEC9CNodBqA1sUdImSBYTpdPdy58oCv/AA4XOrXlw
v+sThG55oPCmLv8bevlv7Ni/sS9/t/v+Nh77Wznpd/rlb+eK/yTv+yc73G/h
Y/9Et/qNDg5+0rHBTzs02Hpk8BNd5J/vFf/Rw98hMH/ghvJ5reFnOb8/y+F9
Syf3wS4n98FNndwP2/y5Pr9+q5N7jcXfzsndVF9D93aL9OjtWs9tVoNa74Vt
O/vhzom1JKk09H58Hqbk13s41Kz+gTs/9b/gaGXgP3be64M/wH/8feFs3uBS
GS0xwDdoBZf5dGY2XXUlnL+pDr7Lmuj4ZPiHeHk2HbGTq3I2GoRUYdlXpqLo
QHir1u807+FymdClOnW151YTorIOeMqJ0nYoF4NA1XbbdFDnnKqT4osv8cY5
/hgeRRC8pFqjCDRnV1k5LUZWqt6X3bhzSR1CwT1dzYSQztqt5V20Xp0birN0
6nDxPnhKWNLLxxZxeaOzlx2+IndE1NAoIe7u25uTbsyDZK6ePINnPVFxm0/8
IfqhWlhJlxzE7Cyn9Daxb4K7fbHEYl1xvIdqKZ3xHMM7XN/k+p6c+/RKL377
uagWtRJwjVrL7NRZBeXgvBuM8JScBVQdz2VVFQ2dmyN2N8pEJZM5pTrjiM1F
UVHYxhWjBxZaYgnvYt0giflC7zZXSWMvSnm1ySip3syOyp2aGAogzWOPw64i
XxOwcgMKjEDlEYM7AYJLYetl5wTZlBEIgLeUi9tgA7Y8rtUnExwpWOaTwU/W
LseL8DOjFXxsKRRXVxn8R3YU0OfgY/3NWvPO8QkddD7pkpF8fKJKYmekH/mh
/lszez9x7a7KmjH/fDHef/tOZgdfdKZv333xhZ+0/CCT13JzHzuLKMWcPJrd
69GoZ16ButasveB/aaxdfeB1tbHZPPyrNZ/FQG/Igrq3aP4/ATr4X4fr09FM
alB0v/DkXXW6AHT4fkde6Tj7WnuSX24KutDlcmvQOXO++z8BunBbAhjd5I8n
/+rdO27TGaarDc1xQzY0l8/O27e+yM2j71r7tj9YOxD5n1uKQoOBgD+shztA
uMNa/8zuvdBdp/63zyhlt62SHbJZoPszLa2L6gvWj+zQDT94+EIVm25w5FlC
5ccnBZlL6JoPK2wF90CuhYC+YQcIaxLNRPmXcsEvJ3PbBMuQ4jkFatIojoDK
V6AH8Ma1WkIqnkKX2ydLa1KtN1SYwCndQB7X3r+lUGZD7Gzuq3UVTuWR20z5
ym6X61xTYUQ8g1pFyt8suL5tYN7aK7lNGNRRF5yS6/eieCG3oibr9cl0LhFG
RU0H/X9YlLpKZ973n+eULILzTWd4XPg3CXHqQZOOa3Dy4uylOX15XHSPDF/K
eFID+JG/qndTfXNf3qyxV52Grt01n1ltXO7p8rVuyDrdUsUvKLu9Vqlcezt+
/nY/PPnUHTTgsJRL2//OKv3Cth5rruPvOiIKMFK6iIWAgQgyj5ZLJnKMA2Ht
/FrpfNPxl4OE6RmEuUr4WNpaDpMxW5FaJmJ+asY82en1ZBe+CAVvXd10S+bv
pFLmlOIRTecxGCHmN5s3a/ZR9J2sxa3XYLhgPlBAB4/4Hf2vLH3dZFgbbw/g
KjdcsyO8eF2PmPwxhcMHXUbIV5s41Q3uYr7lPchxSRcgc9kQutAquBqZlStO
+3GG99brjxvXJrO5s5Hxsm3mCxUs5SZTuo51Gy+SG0iw8+D2iNrVFe08jE5/
VppQEef++CXdWB2lfFkinqHEbCos9MgpORzH0pudCGEXwIQu1S8kF48qq/mX
0NVPfJaL78Vgx0ucLiuO7ecW2SLd6yOXwaOVOrfC0x3NiqcppquAKzACV3Xc
1dKoqMsQ8xsNmIXRnPnecUeoUQULyglkl5RR0qekUEIo54vpmSVARehcbqKn
d4N73rzjpnN9HdihdHkf5kjqwT1fQJWKAtkkWzb8A3jVPKVsePhiSVm/bZhA
CTiDaQA0KbfLKBTFW3HK5XH4+j6Usyh5t186n9tfRfIH16Ogj85XB6n1iJwb
57pNnWFHrRzuZcHPntlJHs8urFjteveJBvXaCp5KMs+Q9hxv83G3cvGRtF1z
4bQ+kR1aCIrFV4hHuHUtnhAORTb9T5dhqY+QHoG703CFte93ixDTEbZJZb/a
lAe91Lg16IoYRx4NEIju5HUsMwgrXjWkIHThOaVOQSaq163l9hdBhOBUsKiR
3c0AYGYUYIw71yX+TD8X9XMvtepYcC2YCHr2d+ILXUWDU3S04uvtdsyNEGL8
6t33r59TbpnQI3CDDKlYbgBRHq/eVLmNvdh5PR7WBFsxIyqypCL4vfl+fMbM
ke9JaxMAlPayQ6YpBF7QqfQh6gYYLHhmUxBE5E49QWWDbqtK9kdyrPq5O/QZ
Aqc+ubfvzrBkGZ4IXmLeIDGjUPnQpDu9o0K+t7NMyXXbxCaJRtwO8NwtLSnS
JU1WggFUj83dUwrPSsFJPjHv1JJmsEnvDmw/Xi5wHLkh3lq8Rx49s2MLDAFJ
5NsqykFhsFYyA9uXykKurZ4QIsrp6LsTk02QjvCSXGaFmtIws6iXuIxZZm11
HopRGwx2Bd3y3VwOFHixWkXEQzEfStVH+tUZzECxsAuNU3VwW1CkF7pKXzmT
bmWHprOVEW9OKWmneEy5S7cj86WdwslVVjmdW4qygSKBMlzKWLcLyvDARc/P
JjSGcZ3EX8JIxiLCEuXoMY5Tx52Qq5RCUgGutuOeyhIld/O9XF4aZJa+jqUS
1gvkdTEOfJylQKnk4ro1i5FSTYjA6+GaDZh1Gxqqsy7RXXUtFGiTvEti8EJR
sq7c9qd+aS6sAlq45u3SNb+wzA8lFWJwr/q8RWpRkmb1W3MTRIkQj85w3C+z
/rB2g1296jnnQdWuyeNq8wLwOox1Pm4akuspQAhODsfiNkLZyxo50CMolIv4
N088u8W+0JoECZFniM61pl6Np9DuZqhSqBOEJE1oCLnUSOBUZTbNEtM5GXW9
VeZUgqhoXlXHTo9ZNjDfcrEPspKD+z1REp+M+rCXoHlVjIDeL8Hm11vWjU9G
QRG2Izltov0Q6MgTxDeMKy9k05KlWVDCDaHqHJdUsadz/KILJlpZq/QGGPTD
6K0r50DOicZkz6hMHUIE+EfPfHv6omfGp5dfycXjR646oC+U2jx9EWaIerTl
q12TaIUe1FFDsNBUnuGa8SJ0Wk79MvSB2mMFYoA36QRgCtks7WO1Q45bNmH6
ZvR6DBOY2KTfCkC2mlPqY+2NgaayBwjmLiBfZDOyhHW9QZWX0h2cSaKUK/cA
JCjHonTL0aoVM4AiV2pxvrIoB/6CMqlCKcDOGkJa5xckky6WS2RbKZqVRNVA
neBPPaE5+XwcOjvQhtFfnAvTsz+5poHL3tD4Co9N7Fcu89jCftX/4tvQFRl4
FassEAtQv6d7OMu22YBQFqk/MK/XK46ItqC3pQcn3+iSEZWDNztcqVYYB2xr
3Q1IIXB6rIKXcwDEZk6s4yjuFIsU1UYliOuw0EfEThgi9p5MrmA1j3+BdRU9
+ZrY6H2hB/5+Hg3PXiFXjpeVnMpUjjgJklPYnoSW7KNRJHEWnFBvmy4mvohT
8f9TwkElVEMWeOU4J8krZerDt8N1PMOn3lhWQgiLTGopzRX3gDkc0/BaT7oT
kMqUZ3mBT94CfQCbvuAbcV9V0ZWN+fMzG/+Cnkb8fDwHlDH8/AWIkeQIMfoi
jdK/zqnJAJaC3fX7fYqN82DD6fs0u0qwQCcb8Nf3mo9+p2BGWi0meBbqz3fJ
DuVYwBty0gJ1vieo/43u3H4TgVraM8+iHDTmb3PQ5GzPvAS9xnwbAZsdpoAr
WHKIkpksKA7/rKAb+M/8F2o/PXNygeGVCshwbi+hQXIZgXV8assojXrmbxnw
9VdRAvgJKHWKbqgMvQTwYvxLlZq/Ux9vAB0iePEU/81nBaLf6xigZOHDt2A1
m+eZ3Ej0Bv7/gXJa4gq7n6fm3f1neWyp+4SqRGeTSYzliEdRlZgf4g8xlpNd
xLl5ZfPfAC7Qzd+AIeV2BVOLBHn/UdlVhAWyMKuNKSNGyxnv/Ct6fOA4LeXl
orq4wKQxxAPMwaNKVnK/iqsfin4TjDqBuak54+SnCsNDKRc6Y+fYIi7YtUfE
SCV77uz9P0jS6DCDuwAA

-->

</rfc>
