<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-guo-idr-bgp-security-policy-community-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGP Security Policy Community">Using BGP Community for Inter-AS Security Policy Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-guo-idr-bgp-security-policy-community-00"/>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Capital Normal University</organization>
      <address>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="12"/>
    <area>Routing</area>
    <workgroup>Inter-Domain Routing</workgroup>
    <keyword>BGP Community</keyword>
    <keyword>Routing Security</keyword>
    <abstract>
      <?line 53?>

<t>This document specifies a set of standardized BGP communities to signal inter-AS routing security policy intent. Current mechanisms such as ROA <xref target="RFC6482"/> <xref target="RFC9582"/> and ASPA <xref target="ASPA-Profile"/> <xref target="ASPA-Verification"/> provide validation outcomes, but leave "NotFound" or "Unknown" states operationally ambiguous.</t>
      <t>This document defines transitive communities that allow an Origin AS to explicitly express its security policy expectations, such as a preference for strict handling of ROA or ASPA validation ambiguity, to downstream Autonomous Systems (AS). Unlike validation states, these communities do not assert correctness or authorization. Instead, they communicate origin-declared policy intent to all downstream ASes, enabling them to correlate this intent with locally derived validation results. By enabling explicit signaling of security expectations without exporting validation state, this mechanism allows downstream ASes to make more informed policy decisions while reducing the risk of accidental outages caused by misinterpretation of ambiguous validation outcomes.</t>
      <t>This mechanism is orthogonal to existing routing security validation technologies and does not alter their semantics or deployment models.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://FCBGP.github.io/bgp-security-community/draft-guo-idr-bgp-security-community.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-guo-idr-bgp-security-policy-community/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/bgp-security-community"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Inter-domain routing security mechanisms intentionally separate validation from policy. While this separation improves robustness, it also creates persistent operational ambiguity.</t>
      <t>Internet routing security relies on distributed validation mechanisms like RPKI <xref target="RFC6480"/>, ROA <xref target="RFC6482"/> <xref target="RFC9582"/>, and ASPA <xref target="ASPA-Profile"/> <xref target="ASPA-Verification"/>. However, there is a functional gap between "knowing a route's validity" and "knowing the origin's policy intent."</t>
      <t>These security mechanisms are often locally enforced only. No consistent method exists for an AS to signal its security requirements or expectations for propagated prefixes. <xref target="AVOID-RPKI-STATE-IN-BGP"/> advises against carrying actual RPKI-derived validation state in BGP, in particular using transitive attributes such as BGP Communities. This is an important safeguard, but it leaves downstream ASes with ambiguity. For example, when a Transit AS observes an RPKI "NotFound" state, it cannot distinguish between an Origin AS that has not deployed RPKI and an Origin AS that has deployed RPKI but suffered a configuration error or a hijack attempt. These mechanisms do not allow an Origin AS to express:</t>
      <ul spacing="normal">
        <li>
          <t>whether it expects strict handling to be applied to ambiguous validation outcomes;</t>
        </li>
        <li>
          <t>whether certain propagation behaviors are explicitly expected or operationally acceptable;</t>
        </li>
        <li>
          <t>and whether "NotFound" or "Unknown" outcomes are operationally acceptable.</t>
        </li>
      </ul>
      <t>As a result, downstream networks frequently face situations where routing information is technically acceptable, yet operationally unexpected. In large-scale deployments, this ambiguity leads to:</t>
      <ul spacing="normal">
        <li>
          <t>inconsistent treatment of identical prefixes;</t>
        </li>
        <li>
          <t>reliance on bilateral or undocumented conventions;</t>
        </li>
        <li>
          <t>and difficulty distinguishing misconfiguration from malicious behavior.</t>
        </li>
      </ul>
      <t>Existing uses of BGP communities partially address this gap, but lack standardized semantics and a clear separation from validation state.</t>
      <t>By signaling security policy intent, an Origin AS can explicitly inform the network of its operational expectations regarding routing security. For example, an Origin AS may indicate that it prefers downstream ASes to apply stricter handling for its prefixes when local validation results are ambiguous.</t>
      <t>This signaling enables downstream ASes to distinguish between intentional non-deployment and unexpected validation outcomes, and to apply locally appropriate policy decisions without exporting or redefining validation state. The mechanism defined in this document is explicitly designed to follow the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/> by avoiding the carriage of RPKI-derived validation state in BGP.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl newline="true">
        <dt>Strict:</dt>
        <dd>
          <t>In this document, the term "Strict" as used in community names (e.g., "ROA-Strict") refers solely to the Origin AS's stated policy preference regarding the handling of ambiguous validation outcomes. It does not imply any mandated filtering, dropping, or preference change by downstream ASes, and it <bcp14>MUST NOT</bcp14> be interpreted as a remote instruction to suppress routes.</t>
        </dd>
        <dt>Security Policy Community:</dt>
        <dd>
          <t>A BGP Community or Large Community defined by this document to convey origin-declared routing security policy intent.</t>
        </dd>
        <dt>Validation State:</dt>
        <dd>
          <t>A locally derived outcome of a security validation mechanism, such as RPKI Prefix Origin Validation or ASPA-based path validation (e.g., "Valid", "Invalid", "NotFound", "Unknown"). Validation state is explicitly out of scope for the communities defined in this document.</t>
        </dd>
      </dl>
    </section>
    <section anchor="policy-signaling-and-transitivity">
      <name>Policy Signaling and Transitivity</name>
      <section anchor="transitive-property-requirement">
        <name>Transitive Property Requirement</name>
        <t>All communities defined in this document are specified as transitive, with the intent that the origin-declared policy can be observed by all ASes along the AS-PATH.</t>
        <t>Intermediate ASes may apply local policy that removes or modifies communities; such behavior is outside the scope of this specification. This specification does not impose any requirement on intermediate ASes to preserve these communities. Preservation is an operational choice intended to maximize the visibility of origin-declared policy intent.</t>
      </section>
      <section anchor="policy-signaling-versus-validation-state">
        <name>Policy Signaling Versus Validation State</name>
        <t>This document makes a strict distinction between:</t>
        <ul spacing="normal">
          <li>
            <t>validation state, which is derived locally from cryptographic or registry-based mechanisms; and</t>
          </li>
          <li>
            <t>policy intent, which reflects the Origin AS's operational expectations.</t>
          </li>
        </ul>
        <t>The communities defined herein exclusively signal policy intent. They do not encode validation outcomes, confidence levels, or security posture of any AS other than the origin.</t>
        <t>Downstream ASes <bcp14>MUST NOT</bcp14> interpret these communities as an indication that validation has been successfully performed, nor as a substitute for local validation.</t>
        <t>Implementations and Operators <bcp14>MUST NOT</bcp14> configure policies that set, clear, or modify the Security Policy Communities defined in this document based solely on per-route validation outcomes (for example, "if validation is Valid, then attach ROA-Strict"). Doing so would effectively re-export validation state in BGP Communities, contrary to the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/>.</t>
        <t>This design explicitly aligns with the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/>, and avoids propagating dynamic security state within BGP.</t>
      </section>
    </section>
    <section anchor="protocol-operations">
      <name>Protocol Operations</name>
      <section anchor="architecture-overview">
        <name>Architecture Overview</name>
        <t>The mechanism defined in this document operates entirely within the BGP control plane and does not alter protocol message formats or path selection procedures.</t>
        <t>An Origin AS attaches one or more Security Policy Communities when originating a route. These communities are propagated unchanged unless explicitly removed or modified by policy.</t>
        <t>Intermediate and receiving ASes may choose to:</t>
        <ul spacing="normal">
          <li>
            <t>ignore the communities;</t>
          </li>
          <li>
            <t>log or monitor their presence;</t>
          </li>
          <li>
            <t>correlate them with local validation results;</t>
          </li>
          <li>
            <t>and incorporate them into local policy decisions.</t>
          </li>
        </ul>
        <t>No mandatory processing behavior is defined, and no interoperability dependency is introduced.</t>
      </section>
      <section anchor="origin-as-behavior">
        <name>Origin AS Behavior</name>
        <t>An Origin AS that chooses to signal security policy intent <bcp14>SHALL</bcp14> attach the appropriate Security Policy Community when originating a route. It <bcp14>MUST</bcp14> ensure that its published RPKI ROAs and ASPA objects are consistent with the signaled community to avoid self-inflicted DoS.</t>
        <t>For example, an AS 65001 that wishes to indicate a strict policy posture with respect to ROA-based validation ambiguity for a given prefix may attach the following Large Community:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65001:1000:1</tt> (ROA-Strict, default strict posture)</t>
          </li>
        </ul>
        <t>An Origin AS <bcp14>MUST NOT</bcp14> attach the Security Policy Communities defined in this document as a function of per-route validation outcomes (e.g., "attach ROA-Strict only when a particular route is currently Valid"). Instead, the communities are intended to describe a relatively stable per-origin policy posture.</t>
      </section>
      <section anchor="intermediate-as-behavior">
        <name>Intermediate AS Behavior</name>
        <t>A receiving AS that chooses to process these communities <bcp14>MUST</bcp14> verify that the Global Administrator ASN in the Large Community matches the rightmost (Origin) AS in the AS_PATH. If they do not match, the community <bcp14>MUST</bcp14> be ignored to prevent unauthorized policy signaling.</t>
        <t>If this check succeeds, a receiving AS <bcp14>MAY</bcp14> correlate the presence of ROA-Strict or ASPA-Strict communities with its locally derived validation results as part of its local policy framework.</t>
        <t>For example, a local policy may treat a route carrying a ROA-Strict community as less acceptable when the local RPKI validation state is NotFound. Such behavior is illustrative only and is not mandated by this specification.</t>
      </section>
      <section anchor="applicability-to-route-leak-and-hijack-detection">
        <name>Applicability to Route Leak and Hijack Detection</name>
        <t>Security policy communities may serve as additional context for routing analysis systems.</t>
        <t>For example, a route that violates an origin-authorized export constraint, while also exhibiting abnormal AS path patterns, may be flagged as anomalous with higher confidence when it also carries a strict policy community.</t>
        <t>Such signals can reduce false positives in detection systems by providing operator-declared intent, without asserting correctness. This document does not define detection algorithms or mitigation procedures.</t>
      </section>
      <section anchor="deployment-considerations">
        <name>Deployment Considerations</name>
        <t>The proposed mechanism is compatible with existing routing policies and does not require changes to BGP implementations. Deployment of this mechanism is expected to be incremental and partial.</t>
        <t>The proposed mechanism is intended for gradual deployment and interoperability with existing BGP technologies. Origin ASes may selectively signal policy intent for specific prefixes. In hybrid networks where both supporting and non-supporting ASes are present, policy communities will simply be ignored by legacy BGP speakers, providing backward compatibility. No coordination between ASes is required.</t>
        <t>For environments supporting both Standard <xref target="RFC1997"/> and Large <xref target="RFC8092"/> Communities, implementations <bcp14>SHOULD</bcp14> attach both representations to maximize backward compatibility. Operators are encouraged to monitor for loss or modification of policy communities due to intermediate ASes that filter or rewrite BGP Community attributes, so as to ensure policy expectations are properly signaled end-to-end.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines a policy signaling mechanism using BGP communities. It does not define a security mechanism and does not provide independent security guarantees. It is not intended for real-time attack mitigation or automated incident response.</t>
      <t>This document follows the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/> by not carrying any RPKI-derived validation state in BGP. The communities defined here do not encode or imply specific validation outcomes (such as Valid, Invalid, or NotFound). Instead, they allow an Origin AS to express a relatively stable policy posture regarding how downstream ASes may treat ambiguous validation results, if they choose to do so.</t>
      <section anchor="authenticity-and-integrity">
        <name>Authenticity and Integrity</name>
        <t>The communities defined in this document are not cryptographically protected and may be modified, removed, or added in transit. This is consistent with existing BGP community usage and with the design goals of this document.</t>
        <t>No attempt is made to ensure integrity or authenticity of community propagation. Accordingly, these communities <bcp14>MUST NOT</bcp14> be treated as authoritative security assertions and <bcp14>MUST NOT</bcp14> be used as a basis for accepting otherwise invalid routes.</t>
        <t>The semantics defined herein apply only to communities that are plausibly originated by the Origin AS, as determined by the Global Administrator field matching the rightmost AS in the AS_PATH. This check is intended solely to limit semantic impersonation and does not constitute a security guarantee.</t>
        <t>An adversary capable of hijacking a route may also attach, modify, or remove communities.</t>
      </section>
      <section anchor="relationship-to-validation-mechanisms">
        <name>Relationship to Validation Mechanisms</name>
        <t>The communities defined in this document do not represent validation results, security states, or assertions of route correctness, legitimacy, or authorization.</t>
        <t>In particular, the presence or absence of a Security Policy Community <bcp14>MUST NOT</bcp14> be interpreted as indicating whether a route is valid or invalid under RPKI, ASPA, BGPsec, or any other validation mechanism.</t>
        <t>These communities <bcp14>MUST NOT</bcp14> override locally derived validation results, including a "Valid" RPKI state. They may be correlated with validation outcomes as part of local policy or analysis, but they do not alter the semantics of those outcomes.</t>
        <t>Implementations and Operators <bcp14>MUST NOT</bcp14> use these communities as a reason to skip or short-circuit local validation.</t>
      </section>
      <section anchor="policy-semantics-and-downstream-behavior">
        <name>Policy Semantics and Downstream Behavior</name>
        <t>The communities defined in this document express origin-authorized policy intent only. They do not define required actions.</t>
        <t>Downstream Autonomous Systems <bcp14>MAY</bcp14> ignore these communities entirely without violating this specification. Any routing, filtering, or preference decisions remain solely a matter of local policy.</t>
        <t>The absence of a policy community <bcp14>MUST NOT</bcp14> be interpreted as expressing the opposite intent.</t>
        <t>This document does not require or expect consistent interpretation or uniform behavior across Autonomous Systems. Differences in interpretation, deployment, and operational use are expected and acceptable.</t>
      </section>
      <section anchor="denial-of-service-and-abuse-considerations">
        <name>Denial-of-Service and Abuse Considerations</name>
        <t>This document intentionally avoids defining communities that directly request route suppression or traffic dropping. As a result, it reduces the risk that a malicious actor could trigger network-wide disruption through abuse of policy signaling.</t>
        <t>Nevertheless, operators should be aware that misconfiguration or abuse of these communities may influence local policy decisions if such decisions are explicitly configured to consider them. Operators are encouraged to avoid automated hard actions based solely on the presence of these communities, and to combine them with independently derived validation results and operational context.</t>
      </section>
      <section anchor="threat-model-summary">
        <name>Threat Model Summary</name>
        <t>Potential abuse scenarios include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>false or misleading signaling of policy intent;</t>
          </li>
          <li>
            <t>removal or modification of policy signals during propagation;</t>
          </li>
          <li>
            <t>inconsistent signaling across multiple origin points.</t>
          </li>
        </ul>
        <t>These risks are inherent to existing uses of BGP communities and do not
introduce new attack vectors. Operators <bcp14>SHOULD</bcp14> correlate these signals
with independently verifiable information when making security-related
decisions.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="large-community-mapping">
        <name>Large Community Mapping</name>
        <t>This document defines new BGP Community values for signaling security policy intent. Compared to Extended Communities, Large Communities are used to avoid ASN exhaustion and ambiguity associated with 16-bit Global Administrator fields.</t>
        <t>IANA is requested to create a sub-registry "BGP Security Policy Action IDs" under the "BGP Large Communities" registry.</t>
        <t>The format of these communities are "Global-Administrator:Action-ID:Parameter". The Global Administrator <bcp14>MUST</bcp14> be the ASN of the Origin AS.</t>
        <t>The "Strict" qualifier expresses only an origin-declared preference and does not define any required downstream behavior.</t>
        <artwork><![CDATA[
  Action ID | Name        | Policy Intent Description
  ---------------------------------------------------
  1000      | ROA-Strict  | Origin expresses a preference for strict handling of
            |             | routes when RPKI validation results are Invalid or
            |             | NotFound.
  1001      | ASPA-Strict | Origin expresses a preference for strict handling of
            |             | routes when ASPA validation results are Invalid or
            |             | Unknown.
]]></artwork>
      </section>
      <section anchor="standard-community-mapping">
        <name>Standard Community Mapping</name>
        <t>This mapping is provided solely to facilitate incremental deployment in networks that do not yet support BGP Large Communities.</t>
        <t>For <xref target="RFC1997"/> support, the following values are assigned from the Well-Known range:</t>
        <ul spacing="normal">
          <li>
            <t>"65535:1000" (ROA-Strict)</t>
          </li>
          <li>
            <t>"65535:1001" (ASPA-Strict)</t>
          </li>
        </ul>
        <t>Operators <bcp14>MUST</bcp14> understand that these Standard Communities cannot encode the Origin AS in the Global Administrator field, and therefore lack the plausibility check described for Large Communities. Their semantics remain the same, but they are more susceptible to impersonation and <bcp14>SHOULD</bcp14> be used with care.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC8092">
          <front>
            <title>BGP Large Communities Attribute</title>
            <author fullname="J. Heitz" initials="J." role="editor" surname="Heitz"/>
            <author fullname="J. Snijders" initials="J." role="editor" surname="Snijders"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="I. Bagdonas" initials="I." surname="Bagdonas"/>
            <author fullname="N. Hilliard" initials="N." surname="Hilliard"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document describes the BGP Large Communities attribute, an extension to BGP-4. This attribute provides a mechanism to signal opaque information within separate namespaces to aid in routing management. The attribute is suitable for use with all Autonomous System Numbers (ASNs) including four-octet ASNs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8092"/>
          <seriesInfo name="DOI" value="10.17487/RFC8092"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6482">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6482"/>
          <seriesInfo name="DOI" value="10.17487/RFC6482"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="ASPA-Profile">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a Cryptographic Message Syntax (CMS) protected
   content type for Autonomous System Provider Authorization (ASPA)
   objects for use with the Resource Public Key Infrastructure (RPKI).
   An ASPA is a digitally signed object through which the issuer (the
   holder of an Autonomous System identifier), can authorize one or more
   other Autonomous Systems (ASes) as its upstream providers.  When
   validated, an ASPA's eContent can be used for detection and
   mitigation of route leaks.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-22"/>
        </reference>
        <reference anchor="ASPA-Verification">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
         </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   This document describes procedures that make use of Autonomous System
   Provider Authorization (ASPA) objects in the Resource Public Key
   Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP)
   AS_PATH attribute of advertised routes.  This AS_PATH verification
   enhances routing security by adding means to detect and mitigate
   route leaks and AS_PATH manipulations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-24"/>
        </reference>
        <reference anchor="AVOID-RPKI-STATE-IN-BGP">
          <front>
            <title>Guidance to Avoid Carrying RPKI Validation States in Transitive BGP Path Attributes</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Tobias Fiebig" initials="T." surname="Fiebig">
              <organization>Max-Planck-Institut fuer Informatik</organization>
            </author>
            <author fullname="Massimiliano Stucchi" initials="M." surname="Stucchi">
              <organization>Glevia GmbH</organization>
            </author>
            <date day="26" month="January" year="2026"/>
            <abstract>
              <t>   This document provides guidance to avoid carrying Resource Public Key
   Infrastructure (RPKI) derived Validation States in Transitive Border
   Gateway Protocol (BGP) Path Attributes.  Annotating routes with
   transitive attributes signaling Validation State may cause needless
   flooding of BGP UPDATE messages through the global Internet routing
   system, for example when Route Origin Authorizations (ROAs) are
   issued, or are revoked, or when RPKI-To-Router sessions are
   terminated.

   Operators SHOULD ensure Validation States are not signaled in
   transitive BGP Path Attributes.  Specifically, Operators SHOULD NOT
   associate Prefix Origin Validation state with BGP routes using
   transitive BGP Communities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-avoid-rpki-state-in-bgp-03"/>
        </reference>
      </references>
    </references>
    <?line 285?>

<section anchor="Parameter-Extensibility">
      <name>Parameter Field Extensibility</name>
      <t>The "Parameter" field in the BGP Security Policy Community is explicitly designed for extensibility. Currently, a value of "1" conveys default strict enforcement for security actions (e.g., ROA-Strict or ASPA-Strict). Future assignments may introduce further parameters to support nuanced policy signaling, such as variant handling levels, time-limited policies, or security requirements specific to more recent routing security enhancements.</t>
      <t>Example encodings:</t>
      <ul spacing="normal">
        <li>
          <t>"65001:1000:1" (ROA-Strict, default strict enforcement)</t>
        </li>
        <li>
          <t>"65001:1000:2" (ROA-Strict, but only for prefixes with maxLength constraints, a future possible assignment)</t>
        </li>
        <li>
          <t>"65001:1002:1" (hypothetical new Action-ID for a future policy, e.g., "AS-Cones Strict")</t>
        </li>
      </ul>
      <t>The Action-ID and Parameter range is managed through IANA for orderly growth as the community adopts richer security policies.</t>
      <t>The extensibility of the Parameter field is intentionally limited to policy refinement and does not introduce conditional logic or dynamic state signaling.</t>
    </section>
    <section anchor="relationship-to-existing-mechanisms">
      <name>Relationship to Existing Mechanisms</name>
      <t>This section clarifies the relationship between the mechanism defined in this document and existing routing policy, traffic engineering, and routing security mechanisms. The goal is to explicitly delineate scope and avoid overlap or semantic ambiguity.</t>
      <section anchor="relationship-to-rpki-roa-and-aspa">
        <name>Relationship to RPKI, ROA, and ASPA</name>
        <t>RPKI-based mechanisms such as ROA and ASPA provide cryptographic or registry-backed validation outcomes for routing information. These mechanisms answer the question of whether a route is consistent with registered authorization data.</t>
        <t>The communities defined in this document do not provide validation and do not alter validation outcomes. They do not indicate that a route is valid, invalid, or authorized. Instead, they allow an Origin AS to express its operational expectations regarding how ambiguous validation outcomes (e.g., NotFound or Unknown) may be handled by downstream ASes.</t>
        <t>This mechanism is therefore complementary to RPKI and ASPA. It operates strictly at the policy signaling layer and does not export validation state, consistent with the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/>.</t>
      </section>
      <section anchor="relationship-to-bgpsec">
        <name>Relationship to BGPsec</name>
        <t>BGPsec <xref target="RFC8205"/> provides cryptographic protection of the AS_PATH to ensure path integrity and origin authentication. BGPsec is designed to assert and verify routing correctness.</t>
        <t>The mechanism defined in this document does not provide cryptographic protection, path validation, or origin authentication. It does not attempt to replace or replicate BGPsec functionality. Instead, it provides an optional policy signal that may be used in conjunction with BGPsec or in environments where BGPsec is not deployed.</t>
      </section>
      <section anchor="relationship-to-bgp-color-and-color-aware-routing">
        <name>Relationship to BGP Color and Color-Aware Routing</name>
        <t>BGP Color and Color-Aware Routing mechanisms are primarily intended to support traffic engineering and transport-specific constraints, such as latency, bandwidth, or SR policy selection.</t>
        <t>While both mechanisms use BGP communities as signaling vehicles, the semantics are fundamentally different. BGP Color expresses forwarding or transport preferences, whereas the communities defined in this document express origin-declared routing security policy intent.</t>
        <t>This document does not define path selection behavior, traffic steering, or forwarding constraints, and does not overlap with the objectives of Color-Aware Routing.</t>
      </section>
      <section anchor="relationship-to-only-to-customer-otc">
        <name>Relationship to Only-To-Customer (OTC)</name>
        <t>OTC <xref target="RFC9234"/> is a mechanism designed to assist in route leak prevention by signaling export intent at AS boundaries.</t>
        <t>The communities defined in this document differ from OTC in scope and semantics. OTC signals propagation constraints related to business relationships, whereas this document signals security policy expectations related to validation ambiguity.</t>
        <t>These mechanisms are complementary and may coexist on the same routes. Neither mechanism subsumes the other.</t>
      </section>
      <section anchor="summary-of-scope-separation">
        <name>Summary of Scope Separation</name>
        <t>In summary:</t>
        <ul spacing="normal">
          <li>
            <t>This document does not export validation state;</t>
          </li>
          <li>
            <t>this document does not assert routing correctness or authorization;</t>
          </li>
          <li>
            <t>this document does not define forwarding or traffic engineering behavior;</t>
          </li>
          <li>
            <t>this document does not mandate filtering or rejection behavior.</t>
          </li>
        </ul>
        <t>The mechanism is limited to expressing origin-declared security policy intent and is designed to coexist with existing routing security and policy mechanisms without semantic conflict.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vc63LbRpb+z6fopX9MvEXQkhNnEmUuYSQ7UcWWtJaSTHZr
a6cJNElEIMBBA5I5meyz7LPsk+259QUXMspUbX7EFAk0uk+fy3e+cxpJkkya
vCnMmZp+Z/Nyrb76+kadV9ttW+bNXq2qWl2WjamTxa26NWlb47c3VZGne3Wb
r0tdwE3TiV4ua/MAg+Dt/ev8cNNJqhuzrur9mcrLVTWZZFVa6i08Pav1qknW
bZXkWZ0s17vEyijJjkZJUjdKcnIyse1ym1ubV2Wz38Htl6/v3qhnShe2gknk
ZWZ2Bv5XNtOZmposb6o61wX+cbn4Cv6BZU0v39+9mU7Kdrs09dkkg5mdTdKq
tKa0rT1TTd2aCSzp44mujYZR31dtQ4t9rOr7dV21O/iShXNRbXVeKn/FvdnD
RdnZRKmkK1H6Rq7zgpo8mLI1ePUzdXxgvIJXPP0BZoGDfI038C9wbYHLz+ov
c9Os5lUtt+g63cAPm6bZ2bMXL/A6/Cp/MHN34Qv84sWyrh6teQEjvMA713mz
aZdw55tzWMWLzrakYVeVKkB6tokeQTfM+f55Xh249cWRbfcXzTfNtphOJrpt
NlXNMmWl+VGX65XJ1ddtBd8q2NX1mfr3TVWu160u07ZUb/WyqjXs/p4uMCwh
eN6eb/3y7+u00Mu5ydp5WtLQq7YoePhvjfpLGwa+Q/vYtFp9V4Lgasu76Qf9
0N6bLxu5ZnzAv+QadBmerH6A/4WRz/Uub3Shrqp6C/+Mj/8It3xwA5x8+vLj
L1fVB/xpDpKaTEq8t4EbUUDv35yffv75789g62Pty41Vi6ap82XbGL7sk5e/
P3WX7eqqqdKqkF8+/vTE/fL6Q4PmlB0b6bOTz1+669/qem0OXDxBy+/O9dNP
PqNHvb/59hIdQ60tWF/atLXxF7x0FyTvrxfyxJcnr+SJoDW96X/+8uNP6Jaq
MDN1fXc+Iysy6q3R9+oGvBV4B/AfcvWr7gOSZW7hl8XtzSK5qatVjh7yMrkg
c0ksKGu1s4m2O53s+Gd39femzlc5+DkY+9AtD9E1eN/315cXCT369m5x9zq5
vEpgTWN3P1R5ltS7+zyxDZhckpdoNJME3Dj+T+klSE6nzWRyt8mtAvfabmGd
yu5MCo+EjdDKmkZVKwUDlJmus/zvsK+4aWm0XU2lLHl32A7x/rU4LWegiv0y
XVA2c3Xe1jU+amvSjS5zu7XKtulGaatAoOrnn2Uff/mFP6PI4TNMggQHX8bS
pqsGAoVvQdwPeWbUA0SejL5UMDGYu7EzBQqmCqMfjJpeVc2bqi2zKfn678r7
snosp4rEZlW1MzXdrItir/R2mYNPaO28L7fMrPIS5VHrEgwSVLYrpo1uIOgU
1SOsQ13X+RqcNcgKxGc+7EA8EFr3+LE21qq8sQPpwW8mbWgqMH8nMA3LNCsD
8kwNxWDY1TxtFAg2w4CL+4dChV9IdpEweC3whBnOIoNFw71Gb9Wibaqy2sIq
1e3eNgb256PF7fM5uJsiv+8IlIUEA2yM7S44q1RZwZKtNXUDv8CWp02Ji4Op
sIPO/06DzAE3wFN0RsPs3SgIAOBaFFSSGfC9NWhfR5Nw2iDSztRvcTam1Eta
PIy3xavo8Rh54BvYNLn9EWKOKqqUdjYD5XmAJ0SLg61oi8bO1Vf7MKTbLdF6
EbHfrHiX6AGgcvhlVZNJ9EU34wl5S2AVsf0l4Rq2GkS/rWqj2C0GaYB0cssP
3IBBwLyzNpXlqzq39zhDnaY5whwwVJiSXsOgqW4tjLLcK0BIZL2gS41Yyiro
+pgFOf0PM89xZ2G9azQV1uvc0qIH/iAar4H7y6qo1uRxwMKzCj6Q5hQwIVxC
DkoNkQ18cErKA4itqPZkdNsqMwXOBT3aNs8y8K6TZ4hD6wpkQF5zwvgoY3w0
mEvkhFgtnKlbs9M1qkw021VdbUXqc/UDCZv2T67FS/It+h1YQ10tW0saPwN7
JsCpUthRdCo7DNqWlDDyL8Ei5zLrEhzwYMagySgseFaWW4mVHb2NlkT2SsHS
edWTX36ZHXOzs9/qZ+fqm+oRYmRN5ovqiV5p1ZaprGqtd2ppmkdjSjVF54qr
0bQu8ztRLgSH9GB/AeouWz9c0w0gU9Q99DdjmwhuApQXrvOWbdBcUhBRVRaw
bVfoDkon/q0Blc1YVy05UO38sgtrsS+uzd/avDaofKSLHXPHu2Hzd3qtcUfQ
MecfwFRQbuOBG6Na9pBb1P01qKcFT6nrek8SAlQDj6d7RpwTuQ+QCAbkGf4L
GggW0oKfVC3lZ1Ek0g5ThUjbQ3tzReaMe0c6DKasEQ3olQGEXGccMXMJmkMH
Rb406K96Q8LR2x1iqscNbIdWdzwhFG+1hLDwQCbP6hlFYXGMOcqiRE+QsR9p
c7vxitQNohhcN5r9BrsHEBaNizo1fm33OlydbVcYSeEG1JAVLEVs2tQ1LAd1
Q23yn3R6jwI1212DUkNFjPTPxb1DoR7j+xk4LBQK2guuk7XIDmI33LGEzdtB
xIFZYbQ75pK/iAZNIeiiu3PqiNctzUY/5FXNNtJFHfB4NJC6D3fS1OwaiHwG
B0dZugccQk1uMmyHBwYD97ZAJ8EBdhYrE3g8TJrBmNDUwMzgxpUGbAOK07qw
Sm7G+UWfJKDztRxQ8rT3xJnam6Y3n7Z0C0cEAokpZCKJhTtNFGKsRGiv2mgA
GQZk2sS8jHwJrqChuATRk4ItzsP7ARQh+m6NUA33I0dEUmNABpMtHZKEfYAx
JeewTu5ZvlqhdcMEInPA9UPs7morBSnIDmF3UVPctoPQX7uI3KLHgUn2wTz5
EBZdlhESpcWDBxfEjLrfSQdCZCZLUymIp47jIc2m77dgLoCpAoIazxRmXfsB
bxBrLe87xQlRGhJ704HsXQddmzXOewSS9BxW57lbjQ/LGJCS+wCTZdQ9CtTQ
Xvdiy2Ap3poxPOD0nD6wW6QoNYI6yYAG6UYQGQHSEUeMUH7EX0bYBvwTImoP
onDjgi2Mp0t4jV+aC6zwF7iXOke5DKHoAPvC8sG5Ypo0hoTJlUZwkvOpDCNb
00m04HOkBZlBkbB3XFXkdFEjYPEZ2Rncfiz6AvalTNkhDoy+OYBjSpueEHnn
CDfPg7mSoC5ojfQ3IRV1D1kNsnxWTd99d3uH5CL+q66u6fP71//23eX71xf4
+fabxdu3/sNErrj95vq7txfhU7jz/Prdu9dXF3wzfKs6X02m7xY/Tnn7ptc3
d5fXV4u306FMUdc42Pg0AMOgnYB4U0AOvA9fnd/87/+cfgIC/ReAiy9PTz8n
TIh/fHb6+0/gD9RofhpiLfkTk7oJ6Ao6BhgFM7aUaSxULNDpDaiwQp8O0vzX
/0DJ/OeZ+sMy3Z1+8if5Ahfc+dLJrPMlyWz4zeBmFuLIVyOP8dLsfN+TdHe+
ix87fzu5R1/+4c9gw0Ylp5/9+U+TyeTnM/VgdxDl/jg9mf4yuSXXcTY5w7DU
2SgSJoQ48HtTvmqKEqQ0DkTriVBiPSFrN/P1HNXkepHI5c+VOC5bFQa2CHYd
h/Te7neW9dsnlxG9ENwn3hIzDMdTRXXZhLQOsCW6jhJAO4YRfBJkF7AkGAqQ
ADiUHX0iLO0fjV4BrBLMdZDso7aBQ3ZaMlRiAhrbimyW2UJKPAHgtzumWygV
QR/b34hD5Qncm0WvAAIT7pKZe+/DYNpdeyNKApzGfkBw/Ap3Npji90Hetw0V
JnBmfVJDtoK2ajQN9343MEsEi28oVjn1iB4mfFKy1Kh7Ow3oPxrOKR7dQLWU
8sF99MBxFmDj83k8tjjYjp/HUII8SwrBnSIpeeuYbzoQL8hD98tQpDR3Lj9C
+nzy7Fn4wsC6EUSAjN6HhA9AK7quJzyT/KkjUkkFQy4241QJp+9YLIQUId0d
kF2Ie0CpJWUibUIfStFeF5WY4+I2uVncfeOYg63JKC7TVYhgotDtBqYHo2lg
IgYi3VYZM7/RGr9gfXAgklietrHIq+JTeT9gY5gG4SWnQuvdDb7ruIEKEif0
A1FOjbA4H0wfrAXtFFc/JBrnqKP4m88AQFwxAkw3VZ6KsDMGClv9Id8CfKUl
QPqdAxQnE14dJxznpCYDZfoe/Cm4vr4p9hliJPCIVecsj1FaKqkZoTRKKYYU
4eMmhy3AocScnXkTtk7r/a6p1rXewWUMstbIC+3FNkNu+gWqPTyhB7J5eDD0
gpLQfjg4hKbnjG3G7AFjeY5gPS1aCzMuHNbvVwLukO+VjBn8fHWIracEJ6NI
UBgYz1J8iHykxQoQuTdQKOQXKEkFBS8jy4IZX/TQso8aPmSMUNmaSRFOASh2
oOFEE0U6YYkoG2wlhYCCdbw9knzM085gfTUHItsuYdcbrC6hE+uDf7RezEBQ
X3QAlNe0BZi5+/m6lE+Qty8xWAM7SknYzJv0nmRwKJgddWSsQoIVYKUwkYSi
5dg+qY9WcRI1zVfxVblYCGGYEhkUDWoXQ5O5uqgo9lWAltsiU2a1AnVjBapN
wqnEISgeL4g0Bnxu7QHOExMCX9ahtCIOQPDQtaQ1v2VAxieUY9jAxsAisz1g
NDBYr8S8Fhw/Si1upFIpKsApBfigBdbkG0OFT3X9AO4vN49skE9IodikYcMw
a6lRuvJYXBhzAsigg7kWujRjtLyroMLTrMV8iTkYCiMEBqxBb4J7BJemJoN5
osdYxIk1qwBR2YaVtT6uppQwsy2zEIVFdjRcx2jRNAIZ25YMIfFTgZgv2loO
gVkUAinICs/fC6gojNqkBmADTMCHV4gyGM8cLbQucS09jIJcTlGt+TkldppI
eYOiG+gSXhCXqsw2qlGNcASOHEIWqt5Vtb8LvFnVjfU+MYf1XFWCvat6z9tj
iTCOg7zoDqtvWbF/JL2RWOn6ZtCbU+mEKi4m4xgZNvkrGbS39+SsWGhxDXkc
9ipO48RloFRj6uEgSj+iL5eSMGAHT+1ZHbDQdlnkduNYYfBONtRDquVPFCFR
tSLaz7sEXgPxd24GyJmg7aM9rJK8XBU5kSwX1S0Iqs85gVw+fXVycsrzecSJ
kHA8++TBg0vOJPDRFEApMDrjDdSXQK57rN7LZQ61BsdaChvFEDHIl6kUFFkv
pyH1/ivN8uz05OTk7PSv6qPgxGeoOBp0M0yUZvi8t/0+jkXP/KcClI6LTQgA
fiVCSWIyiD6BsMCSeiil8FDwxJSbFuAiTmqed8vWA98T403HolAmWmiJaJaY
aZow62hvV9mSemg+tqeOHxpYlBj2CJ4h4VNnyT4kH18X1RIMcJFt8xLhI3oH
GPZKSVjo57bg7cl3c415vWm2MGv1EW/xc5yQ3Li4/S9KTNTliuv7gvdogK7s
9jw1zODJgWYC/ZFdA7/tugYCLPd0KHppSUJgVkhSIxIzGfIDXTG9W/zY9bHe
+0qrhFcIyXDlz1iAZG7oLn69eQAVFNXJcdMdp7yq9dYgcz3wBd3r0DipuOAc
WFQljKcc5AhPpSgXKiCs27heHpr82xBKWeXy87m67Wd+eQF4HlUDU2QyGIo+
VvZT6BzHdnSzwQnjFqxlpS6GoKcKnVY41jdcXrswjZHq/W0vIsT7gHLhtBDd
QJblLuUD+GI+NOTnHKGi4Ye9xWlxS8tQ5CxZxvZ5RX2KlEtyRhgpn+BQDAEg
jFxyKBAx1fjNhw3kk/zMZcl9eqB3hIp2WDessX8Hpw56vir0ei0sVVnBpcih
kXptwKawkBcyH9pA30mARHWcTvbEg7iF9o9NxBKLQI0h8FD4G/MGJiQweIMC
i8CdeAgAUQMVUXySgIS82CePQvNznw9eG7X6CAUQeqQciGR3Hj1VF2sQbrPZ
MhEBE5OiZQc9ggJdhLrFOYbgLMDiuw0jvqqT9ZLvrrYg+ZysAGU76EzxOVQH
6goxIeQjOVUEx3k3Q5vHc3JMSOfxvrTiKPaU2Q7s+CgzV3SbH1uBjyao0pDr
Z9ga0KvhDCBad6049bjbZh7CsTelwqdbY/k695eJVUftDZeQAe+XNaAcX73l
Eu2ywkyg3bkKEGPJMom+Yhardl4YNGrEzh/B8cCMiDmOgsMSi7FrDRfj2mBi
+t7UYFtBb5fgTB51nXkNIMFID0iFXLaO+ReeTW7dzmfOSZQPeV2V3PURTZ7W
dyvlUG6iwWZa6VXkiEnfYscrfNvJUHtqpKQCIciEhq6NSEUuiamrQ0sLXAFV
+SEzaGu9Ft5Lsg6mHmxE+qW+62tE/FlrGIUOiDn0lczeM/H0CDZserx46D2Z
YWavaRmCu0daG33iZmqvhuhzyyxpqgT+obzYR4WhExhrytQDwBCZV+tPM3Ro
xcuhv9IjHUddl+F6TqNzBeEebKTRIEQZXeJmx7QhyBdJk28N68F97Aq5bxKC
REP+l9v5CPXjUYRBQypDePtby6E4pYAuyv3TyqDqGBXYY/gQS5Ape1cyitRd
HUJII6kgEKvlIMrzfuvo0a6bcfTdTaRCiWsDA/Vr6xEOGyt4CeQD0xak60kB
lICtOIItWuS/GuQeGD8hwl/T4Y6DhOpogYF2KiZ/CYoiM8PRBscWmOFojZnj
OkiMgJhkbK5OhB6wfnbbCSIBZbZE/VBbkMuBhThbV4g5XDSMajHgeaV3Cp+z
1ZmJ3EHuJOF6hL2cYKTw2Kipaa4WaUqOfF3sx9qQ47IgbZ2ALUZzDUNZb6GC
YhzvGt9MNVbKNiGxzqVVkNA1ASTkmyFhxzWQRoSaIu5p6JLpUeRclSEoTTXB
fsM4+sJCg4daFnvPZDiMHfH0VEhHOFVvQ8XxQFIHilBknH6FJmGXwI3kbXch
q4qRSCggFxCRGr9GNG4Iw5WE1o57JMjM9Lce8YtMEOoMz7Qgd5vqHRkp7D73
3UUcDjMWCIU5Ys6E655xJEIt7/hzsr33ZP8wiU2+w5lHJZt3vkzyG8xQHJuP
06PeoMvwcukiUjRYnOR0ATjPENjAs7cAbmbDhnmkJCOSYtZLY2s83OEyWn2E
HztSM3fVDhC4a/nTgQxhFUdHLtoOzhiuwFAxo6x5JkdtePIQRbggM1Zxnrtu
3lGzhW2ERCczT0i1sQs2LdqMlURqz5znhg6jvXOJngMQ5zUWg6LcvZOP05o4
neS+uJjX8H3rcdc6OkIMBVH7/BMLPa0dKXq6rgZtpZPhHvQZwTkoSZOkeZ22
2Ko7rC5F5ctO415UFwsE05PNwAXYYarczR+4ATsu+gmwcngbm56FpL44eh4F
WZxAsveE06lqYHLK6Tw7u2GZeoE1aE4EZ3EvSrcDJXS21YZOEoj/0+hJCQB3
lUQ8f8cS+zn6MQMUmfpW+B3l665pYHj8qJ+0+ub0OJj3D3lg32lObZSe5tFp
jZnBUOaQ5+YrkQZxBt3BZlE6Ki1gUeEYtVi6jgM46TQEU25fQh6cVKvkFgta
KUOLxRJvPo7zuyc3pNrmWw0HYTXL0dEW3HpgbCOOzfUDiWggXGLPre9JAk2J
m5bzRvgUx4HaewnaUfMt6HOFJA5WMyENWq9BUSRJTh7RrWW5rdudVJVhGmvA
vLTgkIrFJOcVHrSAxxUUJCrvLsDw8RFIMT9qV9AYdAZTZJDBh2bDfa6rouU6
+2j1CKEtAfPwTa+Z3BemM+lyom2jstTx5JTrJCHD2WByK/5gUIfu87aD1fiW
VfhuiS4mVNOi3OxXqNueEgutyMp6t6FE4B2eQFK37XYLgGUyualIEZHZIUHb
1JS6zisrsclwvHDwnZATLZ/qKkzMEQFmsc2ciuHxMbOOO+V+cgA63EF+IJF3
/F/W1sR0Bez8Rb9/PTxKnMAWxJDvCtc/AUPCk60P2KjyrtiBeJYb28yvNZkz
IsT1T3zZEIzi0aW8DwaNxsbaItxIh7e3ruBmJyPbygdnCT3GBwSIQ93q+7jF
LhEcMIlrpM/U5eJqMXA7sPH9Qsg7Td7hEPWAC+sSIrBf4HSYTPuVDvg53rbT
YkxjZ6tnIyeocUcoXfFWhXUc82EDiYTH5KEaCFi0SvOAhE4/TZbg3A7nDoRe
UDrClIEHFWunBIvbXBLXhjT+pocF876XF3Yq4BFNejp6JHzqW5okqPJ+jnsx
XPyU55505n7Gj0wuL85uNBZeIHpNmbgYXaorRXEudCVPCymXzMX34f6thZ0E
+dQudFNjA9VIhl1lAVd08iPHM4WuuCwmIaKjHP9N/+GRcCdI9Q91BatS8t8/
nKQvGXtdUA1yJwfJk9/+H9yFBV83elR2gr9EKmHlTziXPFHRf/9Q3b84fWZ7
7Zeq4hMSQguBhI8O54tavIpT931c4ft/XkX/+PU/sQppl5273Ud35OnnQx5p
y3+hsQo7GefuK50iccxUXqhLRKUFEIin9Rk9MXTHA1XChY+/yUHI85gWl+tn
vR4D8Yh04sXKeQ7qbcTLfjBFkXyL61Y11mEoUk4/ffXq41fUgTCN+w+ed347
neLB9Zvw46SXYJHnofNMvhAO7mQgUuqJ5bOIwmF2PIFjTA57TEEjGCRXmLPQ
OSrCMEzucL2GOZZw5GI1aCmXg5rdI9GSj1DGCQ4gykhRoNRUZVtLTBWGQ2Ty
BwyNBFjHc1EcSDX1IODRaiw2UDuac5zqDZFIFJH8/H9+5n9POr/8Iq4y+F0h
oaKWs8MsxYEDP9xrGD3Fv1gCmUDNSoVeewpqwN32tt+dIkeDt7645YlAwZ3S
L3KwLeD5XL1piTlmxeUSESNpB21WbU3kx86t3rrDB2g6Jb5/ZqSjITTiPwCA
xLO43um4FlisEyQOQroSZrcztnNe2fPtVAoitjulEkL/zIEpNzgpuouODVKN
nHUfLrTOBEMT0PRoE1Ak5ue9O1/27kTdpai5kvSbT8qhPm71h7emXKNm+so7
9XeseAcgQbak4WEruk97SfPc7HdIRvHZTERnHhdIX5QfDjdkpqRjaHGbABiE
ubhuVdbpcDOaUbAPclVMcZec4Uh2R8BpRceJMypxrevqsaGN7rbC6KzawabB
w1B5uvgw98xyxwIcRgnTEDPrv9sg5B1O72pCHr6WHPr0vRqD0H2DBVaQqdfc
d7FSBIkz1SHZ6k+fdqlWen0CgxhER3wCgTLq+H5XoW2e1uGKaxiv8mOVQBJ7
UCa4W9ge6us8/HIIBopY1qBDxlXXJeFpLhIAHYfwHb/EXhaaqTlHj8cveRih
pJlDBZMIL2KYTKgG12/n77w0xzcpugrksWMB6f34Oc9Ow0yUNo0cc9elfRTQ
TgmAJJ0jXHG/lsTz4HP2MautYDL6yKGCQ+T7yGt+QoYpbOzoqbSYh+ye7+0z
3TPHc3e4eD43/vTy4xOPJmPh8eh5OheUHKbFOQkyfO7YbYoVXAfqFTFHX9wS
kAl2Ewgtzc3z/i0KqF1Ut/bd4+zdMcPhFsJBjb3Qe9SF2J8c6OGfjTbUPr1p
f8SQuAAxmcg7v7gP4+XJq/BmKNszEimdiipHNbC4Y0ET1eDqlEQR8Wb7eqWY
jDzXHyaQfJzfh4T3SQems7e4b+rJnfyDxoNDK5r1z+iRKh+Yetz64Kq1MPca
kgLNBSb8yAYjywzveyEk5u0ib4K06WCWKH9HV4SuZNUNh1nLn1xfL2mEPImq
Tt2WHO42CgKPXwNyUDkAYRYVayd9ShbEnMoLFElvjl/Sf+vMrs63EL+Kfaf3
1+G8kaDDSQHW3vGKxMOzDrxxTh4pqhKj1xLuesyzZkM7ePvei9KduIAV86uJ
qIcomiQSkgMyLn6nwIMBpSnkfV7xqx1qRLGQE3F2iCFPSgHNPBJlyJvBlTyK
O2MinZcYZdN2xrvWgz2/pcz09DOzx7sQe+dVHMkScAKocigJRUvrwtDYy7m4
7z0ZHx2gbktwLSPKNK6m14CEk7sqOW9tA66/Vh9d351jGnt3Lu9sevkxnrun
Vy7F7qLjcMCtKnn1FZ6f0/eup5qWGzts8c5SrtPUDrDEGKPrADmfFpxJQTiL
x9liwcyDI69Zc/rNUdTxy2oi2SpXp8X2SWzWoiPbkaQ6utR5l6EMfOxVevHo
Y4clPNvds/ZuoHS9NmlFqNOVKDAfd50g6srkhI3CPuFpwHYrcJcq5KwGUk5A
Vbklod3696lQ6d/y75SGHdDtA3EWOf8DEUQi00g4GjQgHBlFbGrgAAa+z5nZ
kbGkozzUZDny/NQz1EG0zG2c4ESF1L7jOHDaSJraYyty+zrePhxog9In8pG6
uDK0TwGwRoYHgShNWqQI3QCsrSmYTX4+4xcNm+yPUyoITZE++epiPvk/lGJn
fYNZAAA=

-->

</rfc>
