<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-architecture-03" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-03"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="01"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 84?>

<t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV-specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>.</t>
      <t>There are various existing general information from different sources including RPKI ROA objects and ASPA objects, RIB, FIB, and Internet Routing Registry (IRR) data, which can be used for inter-domain SAV. Generating SAV rules based on general information, however, cannot well satisfy the requirements for new inter-domain SAV mechanisms proposed in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. As analyzed in <xref target="savinfo-sec"/>, general information from RPKI ROA objects and ASPA objects can be used to infer the prefixes and their permissible incoming directions yet cannot be updated in a timely manner to adapt to the prefix or route changes, and the local routing information, which represents the general information from RIB or FIB, cannot deal with the asymmetric routing scenarios and may lead to improper blocks or improper permits, while IRR data do not update in a timely manner either and are not always accurate.</t>
      <t>Consequently, to address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of new inter-domain SAV mechanisms. Inter-domain SAVNET architecture proposes SAV-specific information and uses it to generate SAV rules. SAV-specific information consists of prefixes and their corresponding legitimate incoming direction to enter an AS. Inter-domain SAVNET architecture can use it to generate more accurate SAV rules. In order to gather the SAV-specific information, a SAV-specific information communication mechanism would be developed for origination, processing, propagation, and termination of the messages which carry the SAV-specific information, and it can be implemented by a new protocol or extending an existing protocol. When the prefixes or routes change, it can update the SAV-specific information automatically in a timely manner. Also, the inter-domain SAVNET architecture will communicate the SAV-specific information over a secure connection between authenticated ASes.</t>
      <t>Moreover, during the incremental/partial deployment period of the SAV-specific information, the inter-domain SAVNET architecture can leverage the general information to generate SAV rules, if the SAV-specific information of an AS is unavailable. Multiple information sources may exist concurrently, to determine the one used for generating SAV rules, the inter-domain SAVNET architecture assigns priorities to the SAV-specific information and different general information and generates SAV rules using the SAV-related information with the highest-priority. SAV-specific information has the highest priority and the priorities of RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data decrease in turn.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating the incentive of deploying inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
+-----------+
| AS 1 (P1) #
+-----------+ \
               \           Spoofed Packets
             +-+#+-------+ with Source Addresses in P1 +-----------+
             |    AS 2   #-----------------------------#   AS 4    |
             +-+#+-------+                             +-----------+
               / 
+-----------+ /
|   AS 3    #
+-----------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>The inter-domain SAVNET architecture provides the incentive to deploy inter-domain SAV for operators. <xref target="exp-inter-sav"/> illustrates this using an example. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAVNET architecture can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAVNET architecture, AS 2 knows that the packets with P1 as source addresses should come from AS 1, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect direction. Specifically, by proposing SAV-specific information and using it to generate SAV rules, the inter-domain SAVNET architecture gives more deployment incentive compared to existing inter-domain SAV mechanisms, which will be analyzed in <xref target="usecases"/>.</t>
      <t>In addition, this document primarily proposes a high-level architecture for describing the communication flow of SAV-specific information and general information, guiding how to utilize the SAV-specific information and general information for generating SAV rules and deploy an inter-domain SAV mechanism between ASes. This document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the design and development of inter-domain SAV mechanisms, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for performing source address validation on the data plane.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>The information that is specialized for SAV rule generation, includes the source prefixes and their legitimate incoming directions to enter an AS, and is gathered by the communication between ASes with the SAV-specific information communication mechanism.</t>
        </dd>
        <dt>SAV-specific Information Communication Mechanism:</dt>
        <dd>
          <t>The mechanism that is used to communicate SAV-specific information between ASes and can be implemented by a new protocol or an extension to an existing protocol.</t>
        </dd>
        <dt>Local Routing Information:</dt>
        <dd>
          <t>The information that is stored in ASBR's local RIB or FIB and can be used to generate SAV rules in addition to the routing purpose.</t>
        </dd>
        <dt>General Information:</dt>
        <dd>
          <t>The information that is not specialized for SAV but can be utilized to generate SAV rules, and is initially utilized for other purposes. Currently, the general information consists of the information from RPKI ROA objects and ASPA objects, local routing information, and the one from IRR data.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>The information that can be used to generate SAV rules and includes SAV-specific information and general information.</t>
        </dd>
        <dt>SAVNET Agent:</dt>
        <dd>
          <t>The agent within a SAVNET-adopting AS that is responsible for gathering SAV-related information and utilizing it to generate SAV rules.</t>
        </dd>
        <dt>SAV Information Base:</dt>
        <dd>
          <t>SAV information base is a table or data structure for storing SAV-related information collected from different SAV information sources and is a component within SAVNET agent.</t>
        </dd>
        <dt>SAV Information Base Manager:</dt>
        <dd>
          <t>SAV information base manager maitains the SAV-related information in the SAV information base and uses it to generate SAV rule accordingly, and is a component within SAVNET agent.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Source AS:</dt>
        <dd>
          <t>The AS which deploys SAVNET agent and communicates its own SAV-specific information to other ASes for generating SAV rules.</t>
        </dd>
        <dt>Validation AS:</dt>
        <dd>
          <t>The AS which deploys SAVNET agent and generates SAV rules according to the received SAV-specific information from source ASes.</t>
        </dd>
      </dl>
    </section>
    <section anchor="goal-sec">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy and facilitate partial deployment with low operational overhead, while guaranteeing convergence and providing security guarantees to the communicated information, which corresponds to the requirements for new inter-domain SAV mechanisms proposed in the inter-domain SAVNET architecture draft <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>
          <t><strong>G1</strong>: The inter-domain SAVNET architecture should learn the real paths of source prefixes to any destination prefixes or permissible paths that can cover their real paths, and generate accurate SAV rules automatically based on the learned information to avoid improper blocks and reduce improper permits as much as possible.</t>
        </li>
        <li>
          <t><strong>G2</strong>: The inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of the Internet does the deployment.</t>
        </li>
        <li>
          <t><strong>G3</strong>: The inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</t>
        </li>
        <li>
          <t><strong>G4</strong>: The inter-domain SAVNET architecture should promptly detect the network changes and launch the convergence process in a timely manner, while reducing improper blocks and improper permits during the convergence process.</t>
        </li>
        <li>
          <t><strong>G5</strong>: The inter-domain SAVNET architecture should provide security guarantees for the communicated SAV-specific information.</t>
        </li>
      </ul>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture-overview">
      <name>Inter-domain SAVNET Architecture Overview</name>
      <figure anchor="expcase">
        <name>Inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
 +~~~~~~~~~~~~~~~~~~~~~~~~+       +--------------------+
 |RPKI Cache Server/IRR DB|       | AS X's Provider AS |
 +~~~~~~~~~~~~~~~~~~~~~~~~+       +------------+/\+/\+-+
   ROA & ASPA |                 BGP /            |  |
Obj./IRR Data |            Message /             |  |
              |                   /              |  | BGP
+-----------+\/+----------------+\/+-+           |  | Message
|                AS X                |  BGP  +--------------+
| +--------------------------------+ |<------|AS X's Lateral|          
| |          SAVNET Agent          | |Message|   Peer  AS   |
| +--------------------------------+ |       +--------------+
+-----+/\+/\+----------------+/\+/\+-+
        |  |                   |  |
    BGP |  | SAV-specific      |  |
Message |  | Message           |  |
+------------------+           |  |
|AS X's Customer AS|           |  |
+-------+/\+-------+           |  |
          \                    |  |
       BGP \  SAV-specific     |  | BGP
    Message \ Message          |  | Message
    +------------------------------------+
    |          AS X's Customer AS        |
    | +--------------------------------+ |
    | |         SAVNET Agent           | |
    | +--------------------------------+ |
    +------------------------------------+
AS X and one of its customer ASes have deployed SAVNET agent
and can exchange SAV-specific information with each other.
]]></artwork>
      </figure>
      <t><xref target="expcase"/> provides an overview of the inter-domain SAVNET architecture, showcasing an AS topology and the flow of SAV-related information among ASes. The topology captures the full spectrum of AS relationships in the Internet, displaying all peer ASes of AS X including customers, lateral peers, and providers and the existence of multiple physical links between ASes. Arrows in the figure indicate the direction of the corresponding SAV-related information from its source to AS X, such as gathering RPKI ROA objects and ASPA objects from RPKI cache server. The inter-domain SAVNET architecture conveys the SAV-related information through various mediums such as SAV-specific messages, BGP messages, RTR messages, and FTP messages. Based on the SAV-related information, AS X generates SAV rules. It is also worth noting that the inter-domain SAVNET architecture discusses AS-level inter-domain SAV.</t>
      <t><xref target="expcase"/> uses AS X as the representative to illustrate that what SAV-related information the SAVNET agent within AS X will collect and where the information is from. AS X has deployed SAVNET agent and can generate SAV rules to perform inter-domain SAV by consolidating the SAV-related information. It can obtain SAV-specific information from its customer AS which deploys SAVNET agent and local routing information originating from the BGP update messages of its neighbor ASes. Also, AS X can obtain RPKI ROA objects and ASPA objects from RPKI cache server and IRR data from IRR database.</t>
      <t>The inter-domain SAVNET architecture proposes SAV-specific information, which is more accurate and trustworthy than existing general information, and can update in a timely manner. SAV-specific information consists of prefixes and their legitimate incoming directions. The SAVNET agent communicates SAV-specific information between ASes via SAV-specific messages, when prefixes or routes change, it can launch SAV-specific messages timely to update SAV-specific information. Additionally, when SAVNET agent receives SAV-specific messages, it will validate whether the SAV-specific connections for communicating SAV-specific messages are authentic connections from authenticated ASes. Therefore, when SAV-specific information of an AS is available, SAVNET agent will use it to generate SAV rules.</t>
      <t>Furthermore, if the SAV-specific information is needed to communicate between ASes, a new SAV-specific information communication mechanism would be developed to exchange the SAV-specific messages between ASes which carry the SAV-specific information. It should define the data structure or format for communicating the SAV-specific information and the operations and timing for originating, processing, propagating, and terminating the SAV-specific messages.</t>
      <t>The SAVNET agent should launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. During the convergence process of the SAV-specific information communication mechanism, the inter-domain SAVNET architecture can use the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process is finished, since these information includes topological information and is more stable, and can thus avoid improper blocks. However, the detailed design of the SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      <t>In the incremental/partial deployment stage of the inter-domain SAVNET architecture, when the SAV-specific information of some ASes is unavailable, SAVNET agent can leverage general information to generate SAV rules. If all these general information is available, it is recommended to use RPKI ROA objects and ASPA objects to generate SAV rules. Since compared to the local routing information and IRR data, they can provide authoritative prefixes and topological information and have less improper blocks. The systematic recommendations for the utilizations of SAV-related information and the corresponding rationale will be illustrated in <xref target="sib-sec"/>.</t>
      <t>SAV-specific information communication mechanism will require specifying a new inter-router (or inter-AS) communication protocol or modifying an existing one. Therefore, while this is pursued, a new SAV mechanism that utilizes RPKI objects (e.g., ROA, ASPA) and BGP data (RIB/FIB) can be pursued. The latter solution may have the potential for deployment in the near term since it utilizes existing SAV-related information and can be deployed by network operators by policy configuration on routers.</t>
      <t>For ASes that support a network controller, such as a multi-AS or single-AS controller, operators can deploy the SAVNET agent on the controller to represent the ASes it manages and communicate SAV-specific information with others. Additionally, ASes managed by the same controller may obtain SAV-specific information directly from the controller without needing to communicate with each other.</t>
      <t>Regarding the security concerns, the inter-domain SAVNET architecture shares the similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security.</t>
      <figure anchor="arch">
        <name>SAVNET agent and SAV table within AS X in Figure 2.</name>
        <artwork><![CDATA[
+-----------------------------------------------------------+
|                           AS X                            |
| +-------------------------------------------------------+ |
| |                      SAVNET Agent                     | |
| | +---------------------+  +--------------------------+ | |
| | | General Information |  | SAV-specific Information | | |
| | +---------------------+  +--------------------------+ | |
| |            |                           |              | |
| |           \/                          \/              | |
| | +---------------------------------------------------+ | |
| | | +-----------------------------------------------+ | | |
| | | |              SAV Information Base             | | | |
| | | +-----------------------------------------------+ | | |
| | |            SAV Information Base Manager           | | |
| | +---------------------------------------------------+ | |
| |                          |SAV Rules                   | |
| +-------------------------------------------------------+ |
|                            |                              |
|                           \/                              |
| +-------------------------------------------------------+ |
| |                      SAV Table                        | |
| +-------------------------------------------------------+ |
+-----------------------------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="arch"/> displays the SAVNET agent and SAV table within AS X. The SAVNET agent can obtain the SAV-specific information and general information from various SAV information sources including SAV-specific messages from other ASes, RPKI cache server, and RIB or FIB as long as they are available. The SAV information base (SIB) within the SAVNET agent can store the SAV-specific information and general information and is maintained by the SIB manager. And SIB manager generates SAV rules based on the SIB and fills out the SAV table on the data plane. Moreover, the SIB can be managed by network operators using various methods such as YANG <xref target="RFC6020"/>, Command-Line Interface (CLI), remote triggered black hole (RTBH) <xref target="RFC5635"/>, and Flowspec <xref target="RFC8955"/>. The detailed collection methods of the SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
      <t>In the data plane, the packets coming from other ASes will be validated by the SAV table and only the packets which are permitted by the SAV table will be forwarded to the next hop. To achieve this, the router looks up each packet's source address in its local SAV table and gets one of three validity states: "Valid", "Invalid" or "Unknown". "Valid" means that there is a source prefix in SAV table covering the source address of the packet and the valid incoming interfaces covering the actual incoming interface of the packet. According to the SAV principle, "Valid" packets will be forwarded. "Invalid" means there is a source prefix in SAV table covering the source address, but the incoming interface of the packet does not match any valid incoming interface so that such packets will be dropped. "Unknown" means there is no source prefix in SAV table covering the source address. The packet with "unknown" addresses can be dropped or permitted, which depends on the choice of operators. The structure and detailed usage of SAV table can refer to <xref target="sav-table"/>.</t>
    </section>
    <section anchor="savinfo-sec">
      <name>SAV-related Information</name>
      <t>SAV-related information represents the information that can be used for SAV and consists of RPKI ROA objects and ASPA objects, local routing information, IRR data, and SAV-specific information. In the inter-domain SAVNET architecture, RPKI ROA objects and ASPA objects, local routing information, and IRR data are categorized into general information. In the future, if a new information source is created and can be used for SAV, but is not originally and specially used for SAV, its information can be categorized into general information. In other words, general information can also be considered as dual-use information.</t>
      <section anchor="general-information">
        <name>General Information</name>
        <t>General information refers to the information that is not directly designed for SAV but can be utilized to generate SAV rules, and includes RPKI ROA objects and ASPA objects, local routing information, and IRR data.</t>
        <section anchor="rpki-roa-objects-and-aspa-objects">
          <name>RPKI ROA objects and ASPA Objects</name>
          <t>The RPKI ROA objects and ASPA objects are originally designed for the routing security purpose. RPKI ROA objects consists of {prefix, maximum length, origin AS} information and are originally used to mitigate the route origin hijacking, while RPKI ASPA objects consists of {ASN, Provider AS Set} information and are originally used to mitigate the route leaks. Both the objects are verified and authoritative. They are also stable and will not be updated frequently.</t>
          <t>Based on ASPA objects, the AS-level network topology can be constructed. And according to the ROA objects and the constructed AS-level topology information, an AS can learn all the permissible paths of the prefixes from its customer cone. Therefore, the prefixes and all its permissible incoming directions can be obtained. SAV based on RPKI ROA and ASPA objects only may lead to improper blocks, because not all ASes register their ROA and ASPA objects at the current stage. In addition, all the permissible incoming directions learned from ASPA objects do not only consist of the real incoming directions of the prefixes, but also the extra non-used incoming directions by the legitimate traffic. Only utilizing RPKI ROA and ASPA objects for generating SAV rules with their full deployment within the customer cone may lead to improper permits when not all ASes perform SAV.</t>
          <t>According to a recent study <xref target="rpki-time-of-flight"/>, the process of updating RPKI information typically requires several minutes to an hour. This encompasses the addition or deletion of RPKI objects and the subsequent retrieval of updated information by ASes.</t>
        </section>
        <section anchor="local-routing-information">
          <name>Local Routing Information</name>
          <t>The local routing information is originally used to guide the packet forwarding on each router and can be stored in the local RIB or FIB. It can be parsed from the BGP  messages communicated between ASes. Existing uRPF-based SAV mechanisms <xref target="RFC3704"/> <xref target="RFC8704"/> use the local routing information to generate SAV rules. As analyzed in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, in the asymmetric routing scenarios, these mechanisms, generating SAV rules using local routing information only, have accuracy problems and would lead to improper permits or improper blocks.</t>
        </section>
        <section anchor="irr-data">
          <name>IRR Data</name>
          <t>The IRR data consist of ASes and their corresponding prefixes and can be used for SAV <xref target="RFC8704"/>. However, SAV using IRR data only would have limited functioning scope, in inter-domain networks, it may only be able to prevent spoofing by a stub AS. In addition, the IRR data are not always accurate <xref target="RFC8704"/>.</t>
        </section>
      </section>
      <section anchor="sav-specific-information">
        <name>SAV-specific Information</name>
        <t>SAV-specific information is the information that is specifically designed for SAV and consists of prefixes and their legitimate incoming directions to enter ASes. It can be contained in the SAV-specific messages which are communicated between ASes which deploy the inter-domain SAVNET architecture. When parsing the SAV-specific messages and obtaining the SAV-specific information, ASes can learn the prefixes and their legitimate incoming direction to enter themselves.</t>
        <t>Moreover, in the inter-domain SAVNET architecture, a SAV-specific information communication mechanism is used to communicate SAV-specific information between ASes and distribute the updated information to the relative ASes automatically in a timely manner once the prefixes or routes change. Compared against general information, it may be expected that SAV-specific information is more accurate and trustworthy, while it can update the SAV rules in a timely manner to adapt to the prefix or route changes.</t>
      </section>
    </section>
    <section anchor="sib-sec">
      <name>SAV Information Base</name>
      <figure anchor="sav_src">
        <name>SAV information sources, their trustworthiness, and their usage for SAV.</name>
        <artwork><![CDATA[
+----------------------------+---------------------------+-------------+
|  SAV Information Sources   |      Trustworthiness      |  SAV Usage  |
+----------------------------+---------------------------+-------------+
|  SAV-specific Information  |Specific security mechanism|             |
+------------+---------------+---------------------------+             |
|            |RPKI ROA & ASPA|     X.509 certificates    |             |
|            +---------------+---------------------------+Complementing|
|  General   | Local Routing |            ROV,           | each other. |
|Information |  Information  |   Route leak detection    |             |
|            +---------------+---------------------------+             |
|            |   IRR Data    |    Lower level of trust   |             |
+------------+---------------+---------------------------+-------------+
]]></artwork>
      </figure>
      <t>The SIB is managed by the SIB manager, which can consolidate SAV-related information from different sources. <xref target="sav_src"/> presents the summary of SAV information sources, their trustworthiness, and the recommendation about how to use them for generating SAV rules. Inter-domain SAVNET architecture can use SAV-related information from different sources to generate SAV rules. It recommends using the information from all the available sources which is verified as trustworthy to generate SAV rules. Therefore, SAV information sources complement each other for SAV. For example, when both SAV-specific and general information are available, the inter-domain SAVNET would use them all equally.</t>
      <t>The recommendation for completing each information source for SAV depends on their verified trustworthiness. Each AS deploying inter-domain SAVNET can utilize a specific security mechanism as discussed in <xref target="security_con"/> to validate the received SAV-specific information from other ASes to guarantee its Trustworthiness. RPKI ROA and ASPA objects use x.509 certificates <xref target="RFC5280"/> to protect the objects and guarantee the trustworthiness. Beside, local routing information relies on some techniques, such as ROV and route leak detection, e.g., ASPA or OTC, for achieving the Trustworthiness of their information. Instead, IRR data has lower level of trust compared to others and may be disregarded if RPKI is deployed well, and they are usually updated in a slower manner than the real network changes and not always correct.</t>
      <t>It is noteworthy that using each type of SAV information source complementally in <xref target="sav_src"/> is recommended rather than mandated. If a new inter-domain SAV mechanism needs to generate SAV rules using an informaiton source, it should ensure that the correct information is obtained from the corresponding source and adopts appropriate SAV actions in the data plane to avoid improper block and minimize improper permit. A new inter-domain SAVNET mechanism, in line with the inter-domain SAVNET architecture, has the flexibility to determine the utilized SAV information sources and how to use them. Especially, when using RPKI ROA objects and ASPA objects as the SAV information source, the new inter-domain SAVNET mechanism should avoid jeopardizing the use of RPKI in routing security.</t>
      <figure anchor="as-topo">
        <name>An example of AS topology.</name>
        <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
Both AS 1 and AS 4 deploy the inter-domain SAVNET architecture 
and can exchange the SAV-specific information with each other, 
while other ASes do not deploy it.
]]></artwork>
      </figure>
      <figure anchor="sib">
        <name>An example for the SAV information base of AS 4 in Figure 6.</name>
        <artwork><![CDATA[
+-----+------+------------------+--------+------------------------+
|Index|Prefix|Incoming Direction|Relation| SAV Information Source |
+-----+------+------------------+--------+------------------------+
|  0  |  P1  |       AS 2       |Customer|SAV-specific Information| 
+-----+------+------------------+--------+------------------------+
|  1  |  P1  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  2  |  P2  |       AS 2       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  3  |  P3  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  4  |  P5  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  5  |  P5  |       AS 5       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  6  |  P6  |       AS 2       |Customer|  General Information   |
|     |      |                  |        |SAV-specific Information|
+-----+------+------------------+--------+------------------------+
|  7  |  P6  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
]]></artwork>
      </figure>
      <t>We use the examples shown in <xref target="as-topo"/> and <xref target="sib"/> to introduce SIB and illustrate how to generate SAV rules based on the SIB. <xref target="sib"/> depicts an example of the SIB established in AS 4 displayed in <xref target="as-topo"/>. Each row of the SIB contains an index, prefix, incoming direction of the prefix, reltation between ASes, and the corresponding sources of the information. The incoming direction consists of customer, provider, and peer. For example, in <xref target="sib"/>, the row with index 0 indicates the incoming direction of P1 is AS 2 and the information source is SAV-specific information. Note that the same SAV-related information may have multiple sources and the SIB records them all, such as the row indexed 6. Moreover, SIB should be carefully implemented in the specific protocol or protocol extensions to avoid becoming a heavy burden of the router, and the similar optimization approaches used for the RIB may be applied.</t>
      <t>Recall that inter-domain SAVNET architecture generates SAV rules based on the SAV information sources in the SIB and each type of source complements each other. In addition, in the case of an AS's interfaces facing provider or lateral peer ASes where loose SAV rules are applicable, the inter-domain SAVNET architecture recommends to use blocklist at such directions to only block the prefixes that are sure not to come at these directions, while in the case of an AS's interfaces facing customer ASes that necessitate stricter SAV rules, the inter-domain SAVNET architecture recommends to use allowlist to only permit the prefixes that are allowed to come at these directions.</t>
      <t>Based on the above rules, taking the SIB in <xref target="sib"/> as an example to illustrate how the inter-domain SAVNET generates rules, AS 4 can conduct SAV as follows: SAV at the interfaces facing AS 3 blocks P1, P2, and P6 according to the rows indexed 0, 1, 2, 6, and 7 in the SIB, SAV at the interfaces facing AS 2 permits P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 1 permit P1 and P6 according to the row indexed 1 and 7 in the SIB, and SAV at the interfaces facing AS 5 permits P5 according to the row indexed 5 in the SIB.</t>
    </section>
    <section anchor="savnet-communication-mechanism">
      <name>SAVNET Communication Mechanism</name>
      <figure anchor="sav_agent_config">
        <name>Gathering SAV-related information from different SAV information sources.</name>
        <artwork><![CDATA[
+------+
|      | SAV-specific Information +-----------------------------+ 
|      |<=========================|  SAVNET Agent in other ASes |
|      |                          +-----------------------------+
|      |                        +---------------------------------+
|      |                        | +-----------------------------+ |
|      |                        | | RPKI ROA Obj. and ASPA Obj. | |
|      |                        | +-----------------------------+ |
|      |                        | +-----------------------------+ |
|      |                        | |             RIB             | |
|SAVNET|  General Information   | +-----------------------------+ |
|Agent |<-----------------------| +-----------------------------+ |
|      |                        | |             FIB             | |
|      |                        | +-----------------------------+ |
|      |                        | +-----------------------------+ |
|      |                        | |         IRR Database        | |
|      |                        | +-----------------------------+ |
|      |                        +---------------------------------+
|      |  Management Information  +-----------------------------+
|      |<-------------------------|      Network Operators      |
|      |                          +-----------------------------+
+------+
]]></artwork>
      </figure>
      <t>SAV-specific information relies on the communication between SAVNET agents, and general information can be from RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data. Therefore, as illustrated in <xref target="sav_agent_config"/>, the SAVNET agent needs to receive the SAV-related information from these SAV information sources. SAVNET agent also needs to accept the configurations from network operators for the management operations. Gathering these types of information relies on the SAVNET communication mechanism, which includes SAV-specific information communication mechanism, general information communication mechanism, and management information communication mechanism.</t>
      <section anchor="sav-specific-information-communication-mechanism">
        <name>SAV-specific Information Communication Mechanism</name>
        <figure anchor="sav_msg">
          <name>An example for exchanging SAV-specific information with SAV-specific information communication mechanism between AS 1 and AS 3.</name>
          <artwork><![CDATA[
               +------------------------+
               |      AS 3(P3, P3')     |
               |   +----------------+   |
               |   |  SAVNET Agent  |   |
               |   +----------------+   |
               +-+/\+---------------+/\++
                  /                |  |
   SAV-specific  /                 |  |
    Messages[   /     SAV-specific |  |
   (P1, AS 2)] /         Messages[ |  |
              /        (P3, AS 3), |  |
             /        (P3', AS 3)] |  |
    +------------+                 |  | 
    |  AS 2(P2)  |                 |  |
    +------+/\+--+                 |  | SAV-specific
SAV-specific \                     |  | Messages[
   Messages[  \                    |  | (P1, AS 1)]
   (P1, AS 2)] \                   |  |
                \                  |  |
              +-------------------+\/+--+
              |         AS 1(P1)        |
              |    +--------------+     |
              |    | SAVNET Agent |     |
              |    +--------------+     |
              +-------------------------+
(1) The path of the legitimate traffic with source addresses in P1
    and destination addresses in P3 is [AS 1, AS 2, AS 3].
(2) The path of the legitimate traffic with source addresses in P1
    and destination addresses in P3' is [AS 1, AS 3].
(3) The path of the legitimate traffic with source addresses in P3
    or P3' and destination addresses in P1 is [AS 3, AS 1].
]]></artwork>
        </figure>
        <t><xref target="sav_msg"/> uses an example to show the exchange of SAV-specific information between AS 1 and AS 3 through SAV-specific messages. The SAV-specific information is expressed as &lt;Prefix, Incoming Direction&gt; pairs, such as (P1, AS 1), (P1, AS 2), (P3, AS 3), and (P3', AS 3) in <xref target="sav_msg"/>. AS 1 needs to determine the incoming direction to AS 3 for its prefix P1 to obtain SAV-specific information, such as (P1, AS 1) and (P1, AS 2). It then assembles this information into SAV-specific messages to send to AS 3, which can subsequently generate SAV rules based on the received information. This process may require AS 1 to collaborate with intermediate ASes between AS 1 and AS 3 to obtain the SAV-specific information. Similarly, AS 3 needs to determine the incoming direction to AS 1 for its prefixes P3 and P3' and send the SAV-specific information, such as (P3, AS 3) and (P3', AS 3), to AS 1 through SAV-specific messages, allowing AS 1 to generate the corresponding SAV rules. AS 3 may also need to collaborate with intermediate ASes between AS 3 and AS 1 to gather the required information for obtaining the SAV-specific information.</t>
        <t>The SAV-specific information can be exchanged between ASes via SAV-specific messages. SAV-specific messages are used to propagate or originate the SAV-specific information between ASes by the SAVNET agent. For an AS which initiates its own SAV-specific messages, its SAVNET agent needs to obtain the incoming direction of its own prefixes to enter other ASes and assemble them into the SAV-specific messages to the corresponding ASes. When ASes receive the SAV-specific messages, they parse the messages to obtain source prefixes and their corresponding incoming directions.</t>
        <t>Additionally, if SAV-specific information is communicated between ASes, a new SAV-specific information communication mechanism would need to be developed to communicate it and can be implemented by a new protocol or extending an existing protocol. The SAV-specific information communication mechanism needs to define the data structure or format to communicate the SAV-specific messages and the operations and timing for originating, processing, propagating, and terminating the messages. If an extension to an existing protocol is used to exchange SAV-specific information, the corresponding existing protocol should not be affected. The SAVNET agent is the entity to support the SAV-specific communication mechanism. By parsing the SAV-specific messages, it obtains the prefixes and their incoming AS direction for maintaining the SIB. It is important to note that the SAVNET agent within an AS has the capability to establish connections with multiple SAVNET agents within different ASes, relying on either manual configurations by operators or an automatic mechanism. In addition, SAVNET agents should validate the authenticity of the connection for communicating the SAV-specific information to verify whether the SAV-specific information is provided over a secure connection with an authenticated AS.</t>
        <t>The need for a SAV-specific communication mechanism arises from the facts that the SAV-specific information needs to be obtained and communicated between ASes. Different from the general information such as routing information from the RIB, there are no existing mechanism which can support the perception and communication of SAV-specific information between ASes. Hence, a SAV-specific communication mechanism is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-specific information.</t>
        <t>Furthermore, in order to obtain all the source prefixes of an AS, the inter-domain SAVNET architecture may communicate with the intra-domain SAVNET architecture <xref target="I-D.ietf-savnet-intra-domain-architecture"/> to obtain all the prefixes belonging to an AS. If the legitimate incoming directions of SAV-specific information are learned from BGP AS_PATH information, it needs to note that BGP AS_PATH may hide some interfaces that exist between ASes in the scenarios involving topological fork and merge.</t>
        <t>Some scenarios, such as the ones where policy-based routing or static route exist in the inter-domain networks, may rely on the wider deployment of SAVNET agent or more interactive communication between ASes to make the inter-domain SAVNET work better. In these scenarios, operators may override the default BGP decision by using policy-based routing or static route. For example, in <xref target="sav_msg"/>, AS 2 may use another AS which does not in the AS path [AS 1, AS 2, AS 3] to transmit the legitimate traffic with source addresses in P1 to AS 3. For such cases, inter-domain SAVNET may require AS 2 to deploy SAVNET agent to obtain the SAV-specific information for the legitimate traffic with source addresses in P1, or AS 1 and AS 3 may need more interactive communication to obtain the SAV-specific information.</t>
        <t>The preferred AS paths of an AS may change over time due to route changes caused by operator configurations or network failures. In addition, the SAVNET agent should be aware of the route changes and launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. If the SAVNET agent cannot be aware of the route changes caused by failures, it may not be aware of the failures. A wider deployment of SAVNET agent can make network failure sensing more sensitive. However, the detailed design of SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="general-information-communication-mechanism">
        <name>General Information Communication Mechanism</name>
        <t>The general information communication mechanism is used for communicating routing information between ASes, obtaining RPKI ROA objects and ASPA objects from RPKI cache servers, and obtaining the information about ASes and their prefixes from IRR databases. The general communication mechanism can be implemented by using existing protocols for collecting the relative information, such as BGP, RTR <xref target="RFC8210"/>, and FTP <xref target="RFC959"/>.</t>
      </section>
      <section anchor="management-information-communication-mechanism">
        <name>Management Information Communication Mechanism</name>
        <t>The primary purpose of the management information communication mechanism is to deliver manual configurations of network operators. Examples of the management configurations include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>SAVNET configurations using YANG, CLI, RTBH, or Flowspec: Inter-domain SAVNET implementations on vendor devices need to accept the configurations from operators, such as the SAV rules directly configured by operators, and may support various tools to do this, such as YANG, CLI, RTBH, or Flowspec.</t>
          </li>
          <li>
            <t>SAVNET performance analysis: Inter-domain SAVNET implementations need to support various operation methods to report the statistics of SAVNET, such as alarm and exception reporting, performance monitoring and reporting for the control plane and data plane, which are discussed in detail in <xref target="manage_con"/>.</t>
          </li>
          <li>
            <t>SAVNET deployment provisioning: Inter-domain SAVNET implementations may support the configurations which relate to its deployment process, such as maximum hardware resources used, "on-off" of SAVNET, and access authority.</t>
          </li>
        </ul>
        <t>Note that the management information can be delivered at any time and requires reliable delivery for the management information communication mechanism implementation. Additionally, to support performance analysis, the management information communication mechanism can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, and the information regarding the prefixes associated with the spoofing traffic, as observed until the most recent time.</t>
      </section>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>This section utilizes the sample use cases to showcase that the inter-domain SAVNET architecture can improve the validation accuracy in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks, compared to existing SAV mechanisms, which are also utilized for the gap analysis of existing inter-domain SAV mechanisms in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. In the following, these use cases are discussed for SAV at customer interfaces and SAV at provider/peer interfaces, respectively.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>In order to prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF <xref target="manrs"/> <xref target="nist"/>. However, as analyzed in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, uRPF-based mechanisms may lead to false positives in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may lead to false negatives in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. The following showcases that the inter-domain SAVNET architecture can avoid false positives and false negatives in these scenarios.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
                 /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
           \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>In this scenario, existing uRPF-based SAV mechanisms would block the traffic with P1 as source addresses improperly, and thus suffer from the problem of false positives <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interfaces facing AS 1 and AS 2. As a result, the false positive problem can be avoided.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                             +----------------+
             Anycast Server+-+    AS 3(P3)    |
                             +-+/\-----+/\+/\++
                                /        \  \
                      P3[AS 3] /          \  \ P3[AS 3]
                              /            \  \
                             / (C2P)        \  \
                     +----------------+      \  \
                     |    AS 4(P4)    |       \  \
                     ++/\+/\+/\+/\+/\++        \  \
        P6[AS 1, AS 2] /  /  |  |   \           \  \
             P2[AS 2] /  /   |  |    \           \  \
                     /  /    |  |     \           \  \
                    /  /     |  |      \ P5[AS 5]  \  \ P5[AS 5]
                   /  /      |  |       \           \  \
                  /  /(C2P)  |  |        \           \  \
      +----------------+     |  |         \           \  \  
User+-+    AS 2(P2)    |     |  | P1[AS 1] \           \  \
      +--------+/\+----+     |  | P6[AS 1]  \           \  \
        P6[AS 1] \           |  | NO_EXPORT  \           \  \
         P1[AS 1] \          |  |             \           \  \
         NO_EXPORT \         |  |              \           \  \
                    \ (C2P)  |  | (C2P)   (C2P) \     (C2P) \  \
                 +----------------+            +----------------+
    Edge Server+-+  AS 1(P1, P6)  |            |    AS 5(P5)    |
                 +----------------+            +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a direct server return (DSR) scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2.</t>
          <t>In this scenario, existing uRPF-based mechanisms will improperly block the legitimate response packets from AS 1 at the customer interface of AS 4 facing AS 1 <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. In contrast, if the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P3 as source addresses can arrive at the interfaces facing AS 1 and AS 3. As a result, the legitimate response packets with P3 as source addresses from AS 1 can be allowed and the false positive problem can be avoided.</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                         /     \  \
                                        /       \  \
                                       /         \  \
                                      / (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |    \        \  \
                     P2[AS 2] /  /   |  |     \        \  \
                             /  /    |  |      \        \  \
                            /  /     |  |       \P5[AS 5]\  \ P5[AS 5]
                           /  /      |  |        \        \  \
                          /  /(C2P)  |  |         \        \  \
              +----------------+     |  |          \        \  \  
Attacker(P1')-+    AS 2(P2)    |     |  | P1[AS 1]  \        \  \
              +--------+/\+----+     |  | P6[AS 1]   \        \  \
                P6[AS 1] \           |  | NO_EXPORT   \        \  \
                 P1[AS 1] \          |  |              \        \  \
                 NO_EXPORT \         |  |               \        \  \
                            \ (C2P)  |  | (C2P) (C2P)    \  (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |   Server+-+    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone. The reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks originating from AS 2 <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can only arrive at the interface facing AS 1. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                      |        \  \
                                      |         \  \
                                      |          \  \
                                      | (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |   \         \  \
                     P2[AS 2] /  /   |  |    \         \  \
                             /  /    |  |     \         \  \
                            /  /     |  |      \P5[AS 5] \  \ P5[AS 5]
                           /  /      |  |       \         \  \
                          /  /(C2P)  |  |        \         \  \
              +----------------+     |  |         \         \  \  
Attacker(P5')-+    AS 2(P2)    |     |  | P1[AS 1] \         \  \
              +--------+/\+----+     |  | P6[AS 1]  \         \  \
                P6[AS 1] \           |  | NO_EXPORT  \         \  \
                 P1[AS 1] \          |  |             \         \  \
                 NO_EXPORT \         |  |              \         \  \
                            \ (C2P)  |  | (C2P)   (C2P) \   (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |           |    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below. The direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 4 and AS 5 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. If the inter-domain SAVNET architecture is deployed, AS 5 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P5 as source addresses can arrive at the interface facing AS 3 and AS 5. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>In order to prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering, Loose uRPF, and/or source-based RTBH filtering can be deployed <xref target="nist"/>. <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> exposes the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS and direct attacks from provider/peer AS. The following showcases that the inter-domain SAVNET architecture can avoid false negatives in these scenarios.</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                               +----------------+
                Attacker(P1')+-+    AS 3(P3)    |
                               +-+/\-----+/\+/\++
                                  /        \  \
                                 /          \  \
                                /            \  \
                               / (C2P/P2P)    \  \
                       +----------------+      \  \
                       |    AS 4(P4)    |       \  \
                       ++/\+/\+/\+/\+/\++        \  \
          P6[AS 1, AS 2] /  /  |  |    \          \  \
               P2[AS 2] /  /   |  |     \          \  \
                       /  /    |  |      \          \  \
                      /  /     |  |       \ P5[AS 5] \  \ P5[AS 5]
                     /  /      |  |        \          \  \
                    /  /(C2P)  |  |         \          \  \
        +----------------+     |  |          \          \  \
Server+-+    AS 2(P2)    |     |  | P1[AS 1]  \          \  \
        +--------+/\+----+     |  | P6[AS 1]   \          \  \
          P6[AS 1] \           |  | NO_EXPORT   \          \  \
           P1[AS 1] \          |  |              \          \  \
           NO_EXPORT \         |  |               \          \  \
                      \ (C2P)  |  | (C2P)    (C2P) \    (C2P) \  \
                   +----------------+             +----------------+
           Victim+-+  AS 1(P1, P6)  |             |    AS 5(P5)    |
                   +----------------+             +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS. In this case, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interface facing AS 1 and AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                        +----------------+
         Attacker(P2')+-+    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                          /          \  \
                         /            \  \
                        / (C2P/P2P)    \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P)    (C2P) \     (C2P) \  \
           +----------------+              +----------------+
   Victim+-+  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS. In this case, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Also, in this scenario, both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. If the inter-domain SAVNET architecture is deployed, AS 2 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P2 as source addresses can only arrive at the interface facing AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
      </section>
    </section>
    <section anchor="meeting-the-design-requirements-of-inter-domain-savnet">
      <name>Meeting the Design Requirements of Inter-domain SAVNET</name>
      <t>The inter-domain SAVNET architecture proposes the guidelines for the design of new inter-domain SAV mechanisms to meet the requirments defined in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. The followings illustrate the design guidelines to meet the requirements one by one.</t>
      <section anchor="improving-validation-accuracy-over-existing-mechanisms">
        <name>Improving Validation Accuracy over Existing Mechanisms</name>
        <t>As analyzed in <xref target="usecases"/>, existing uRPF-based SAV mechanisms may have improper block or improper permit problems in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks for SAV at customer interfaces, and the scenarios of reflection attacks and direct attacks for SAV at provider/peer interfaces.</t>
        <t>Inter-domain SAVNET proposes SAV-specific information, which consists of the source prefixes of ASes and their corresponding legitimate incoming direction to enter other ASes. ASes which deploy SAVNET agent can communicate SAV-specific information with each other and generate accurate SAV rules for the prefixes from the SAV-specific information. The use cases shown in <xref target="usecases"/> has demonstrated inter-domain SAVNET can improve validation accuracy compared to existing SAV mechanisms. Along with more ASes deploy SAVNET agent and communicate SAV-specific information with each other, accurate SAV rules can be generated for these ASes and their prefixes can obtain better protection.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>A new inter-domain SAVNET mechanism should consider incremental/partial deployment as it is not feasible to deploy SAVNET agent simultaneously in all ASes, due to various constraints, such as device capabilities, versions, or vendors.</t>
        <t>Inter-domain SAVNET can support incremental/partial deployment, as it is not mandatory for all ASes to deploy SAVNET agents for communicating SAV-specific information. ASes which deploy SAVNET agents can establish a logical neighboring relationship with other ASes. The connections for communicating SAV-specific information can be achieved by manual configurations set by operators or an automatic neighbor discovery mechanism. An automatic neighbor discovery mechanism can utilize existing protocols or tools to collect the SAVNET neighboring information. This flexibility enables the inter-domain SAVNET to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes. During the partial/incremental deployment of SAVNET agent, the SAV-specific information for the ASes which do not deploy SAVNET agent cannot be obtained. To protect the prefixes of these ASes, inter-domain SAVNET can use the general information in the SIB to generate SAV rules. When using the general information, inter-domain SAVNET needs to guarantee the SAV accuracy for the corresponding application scenarios. The use cases in <xref target="usecases"/> demonstrates that inter-domain SAVNET supports incremental/partial deployment.</t>
        <t>As more ASes adopt the inter-domain SAVNET, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas", these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing. Especially, along with more ASes deploy SAVNET agent and support the communication of SAV-specific information, the generated SAV rules will become more accurate, as well as enhancing the protection capability against source address spoofing.</t>
        <t>In addition, releasing the SAV functions of the inter-domain SAVNET incrementally is <bcp14>RECOMMENDED</bcp14> as one potential way to reduce the deployment risks and can be considered in its deployment by network operators:</t>
        <ul spacing="normal">
          <li>
            <t>First, the inter-domain SAVNET can only do the measurement in the data plane and do not take any other actions. Based on the measurement data, the operators can evaluate the effect of the inter-domain SAVNET on the legitimate traffic, including validation accuracy and forwarding performance, as well as the operational overhead.</t>
          </li>
          <li>
            <t>Second, the inter-domain SAVNET can open the function to limit the rate of the traffic that is justified as spoofing traffic. The operators can further evaluate the effect of the inter-domain SAVNET on the legitimate traffic and spoofing traffic, such as limiting the rate of all the spoofing traffic without hurting the legitimate traffic.</t>
          </li>
          <li>
            <t>Third, when the validation accuracy, forwarding performance, and operational overhead have been verified on a large scale by the live network, the inter-domain SAVNET can open the function to directly block the spoofing traffic that is justified by the SAV table in the data plane.</t>
          </li>
        </ul>
      </section>
      <section anchor="reducing-operational-overhead">
        <name>Reducing Operational Overhead</name>
        <t>The inter-domain routes or the prefixes of ASes usually change dynamically, which requires the SAV rules to be updated acutomatically. ACL-based ingress filtering and source-based RTBH filtering requires manual configuration to update SAV rules to adapt to the routing or prefix changes, which leads to high operational overhead.</t>
        <t>Inter-domain SAVNET proposes the SAV-specific information communication mechanism and utilizes it to communicate SAV-specific information automatically between ASes which deploy SAVNET agent. Upon receiving the SAV-specific information, SAVNET agent will use it to generate SAV rules. The use cases displayed in <xref target="sav_at_p"/> show that inter-domain SAVNET reduces operational overhead compared to ACL-based ingress filtering and source-based RTBH filtering.</t>
      </section>
      <section anchor="guaranteeing-efficient-convergence">
        <name>Guaranteeing Efficient Convergence</name>
        <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and route changes, in order to avoid improper block and reduce improper permit. To effectively track these changes, the SAVNET agent should proactively communicate the changes of SAV-specific information between ASes and generate SAV rules in a timely manner.</t>
        <t>The SAVNET agent should launch SAV-specific messages to adapt to the route or prefix changes in a timely manner. During the routing convergence process, the traffic paths of the source prefixes can undergo rapid changes within a short period. The changes of the SAV-specific information may not be communicated in time between ASes to update SAV rules, improper block or improper permit may happen. Such inaccurate validation is caused by the delays in communicating SAV-specific information between ASes, which occur due to the factors like packet losses, unpredictable network latencies, or message processing latencies. The detailed design of the SAV-specific information communication mechanism should consider these issues to reduce the inaccurate validation.</t>
        <t>Besides, for the inter-domain SAVNET, the potential ways to deal with the inaccurate validation issues during the convergence of the SAV-specific information communication mechanism is to consider using the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process of the SAV-specific communication mechanism is finished, since these information is more stable and can help avoid improper block, and thus avoiding the impact to the legitimate traffic.</t>
      </section>
      <section anchor="security_con">
        <name>Providing Necessary Security Guarantee</name>
        <t>For inter-domain SAVNET, the SAVNET agent plays a crucial role in generating and disseminating SAV-specific messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-specific messages, it is important for the SAVNET agents to employ security authentication measures for each received SAV-specific message. The majour security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-specific messages.</t>
        <t>The threats to session security include:</t>
        <ul spacing="normal">
          <li>
            <t>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</t>
          </li>
          <li>
            <t>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-specific message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</t>
          </li>
        </ul>
        <t>The threats to content security include:</t>
        <ul spacing="normal">
          <li>
            <t>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-specific message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</t>
          </li>
          <li>
            <t>Message injection: A malicious router injects a seemingly "legitimate" SAV-specific message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</t>
          </li>
          <li>
            <t>Path deviation: A malicious router intentionally diverts a SAV-specific message to an incorrect next-hop AS, contrary to the expected path defined by the AS path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</t>
          </li>
        </ul>
        <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each source AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-specific messages. Upon receiving a SAV-specific message, the SAVNET agent can verify the digital signature to ascertain the message's authenticity. Furthermore, it is worth noting that the SAV-specific information communication mechanism may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack, and the implementation of the SAV-specific communication mechanism should ensure uninterrupted communication. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
      </section>
    </section>
    <section anchor="manage_con">
      <name>Manageability Considerations</name>
      <t>It is crucial to consider the operations and management aspects of SAV information sources, the SAV-specific communication mechanism, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG <xref target="RFC6020"/>. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="scope-and-assumptions">
      <name>Scope and Assumptions</name>
      <t>In this architecture, the choice of protocols used for communication between the SIM and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation for SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
      <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
      <t>This document makes the following assumptions:</t>
      <ul spacing="normal">
        <li>
          <t>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAVNET agent and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</t>
        </li>
        <li>
          <t>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAVNET agents, even when data-plane traffic saturates the link.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV in the dataplane. Network operators have the flexibility to choose their approaches to generate SAV rules and perform SAV based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually specify the rules for governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS to communicate SAV-specific Information. The ASes have the flexibility to establish connections for SAV-specific communication based on the manual configurations set by operators or other automatic mechanisms.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of SAV-specific Information between SAVNET agents. It is important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</t>
        </li>
        <li>
          <t>The SAVNET communication mechanisms are loosely coupled and are used for communicating or gathering SAV-related information, and how the inter-domain SAVNET synchronizes the management and operation configurations is out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Mingqing Huang<br/>
  Zhongguancun Laboratory<br/>
  Beijing<br/>
  China<br/>
  Email: huangmq@mail.zgclab.edu.cn</t>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Mingqing Huang and Igor Lubashev for the significantly helpful discussions and revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="14" month="February" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing inter-domain source
   address validation mechanisms, describes the problem space, and
   defines the requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-14"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies the architecture of intra-domain SAVNET,
   which aims to achieve accurate source address validation (SAV) at
   external interfaces of an intra-domain network in an automated
   manner.  It describes the conceptual design of intra-domain SAVNET,
   along with its use cases and design requirements, to help ensure that
   the intended objectives are met.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC959">
          <front>
            <title>File Transfer Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author fullname="J. Reynolds" initials="J." surname="Reynolds"/>
            <date month="October" year="1985"/>
            <abstract>
              <t>This memo is the official specification of the File Transfer Protocol (FTP) for the DARPA Internet community. The primary intent is to clarify and correct the documentation of the FTP specification, not to change the protocol. The following new optional commands are included in this edition of the specification: Change to Parent Directory (CDUP), Structure Mount (SMNT), Store Unique (STOU), Remove Directory (RMD), Make Directory (MKD), Print Directory (PWD), and System (SYST). Note that this specification is compatible with the previous edition.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="9"/>
          <seriesInfo name="RFC" value="959"/>
          <seriesInfo name="DOI" value="10.17487/RFC0959"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="rpki-time-of-flight" target="https://dl.acm.org/doi/10.1007/978-3-031-28486-1_18">
          <front>
            <title>RPKI Time-of-Flight&amp;#58; Tracking Delays in the Management, Control, and Data Planes</title>
            <author>
              <organization>ISOC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="sav-table" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-general-sav-capabilities/">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 848?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Mingxing Liu, Zhen Tan, Yuanyuan Zhang, Yangyang Wang, Antoin Verschuren, Olaf Struck, Siyuan Teng, Gert Doering etc. for their reviews, comments, and suggestions. Apologies to any others whose names the authors may have inadvertently missed mentioning.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19aXPc1pXod1XpP2CkqrFkNVsiJTm2XiYTarM5o4UhaSeZ
2OVCd6O7YaGBDoAmRUua3/J+yPv03h97Z70LcIFGU7KTmoSVWGQ3cJdzzz37
sre3d/1aVcf57Mc4K/LkUVSXm+T6tXRd0q9VfXDv3lf3Dq5fm8b1o6iqZ9HN
6Mkymb6B1zaTVVpVaZHXl2t48+jZ2fPr1+IyiR9FXyd5UsZZ9JeTZ8cvDp88
++H6tYsFPJLXSZkndfQsX6R5kpRpvojO4upN9LwopzDv9WuzYprHKxhuVsbz
ei9N6vleFZ/DS3spvr03K1Zxmu/F5XSZ1sm03pTJ3r37+Gqd1lkik8hj0Wmx
gYGjw9msTKoq+i7O0llcw5qjW6eH3716dnY7OnRGgvVPJmVy3hyFHm08mcU5
bCnJcep4Uy+L8tH1a3tRmlePoqfj6EV6/VoU8V6exrn8XZTwzlkF+15u4ujb
PD1PyiqtL/G7Kfz7KHqcpD/B1/RBscnrEj57skzzGD9JYDkZnEyB28h/X8tA
42S2GU9zM/2LMR5SbhfwIjUf0Ar+a1nki8UmzqcbWFk8Kcq4Lsohq4Dz31RJ
dPbiaXQreTtN1nX07X/ehlH1OZrRWWuWTmHm3/+8mGbxpLnQV2NElYVd6CuA
lH5CK/1mE18k6S+xsAVMkwMQlzTDeFqsXPi9SDcu+CZprh/9+gDcZJMO+MFC
/5C65wwLAmgv9NNfe61/TfNs+nv8fdxY8PVreVGu4OqdJ4/whZPnT77c/80D
/f3+b+6Z3790fv/i3sE98/vBg339/eGDA/PMw4Mv8Zk0n3szHO09HXeSj3VZ
TLJktQe0r05WSV53vVLGIYpjpv7i/kOz7K8e2t8P9s2yv3r4Ff26ivOyot+i
qI7LRQIEdVnX6+rR3bsXFxdj+n4MJ3YXpi7W1d3FJp0ld+O8Tqt1UczhhO7K
20zoXh6+OjmNjlbrjHbAZO1rfIkfM0QJ/4j2GBnoJf4ICCGMcnDv4D4hUFrV
PavDr8eL4vzuejOBK02TVXeBqKZZCpMzdAVSALT5PJ3uAcosgUgme5PFeq9K
ppsS0G0PmM3ebFZUe6u0Thc0kLetGyc6KBNhocFnPGj0TAYFtP36ODqVUSMY
NXr6tKiil2bUGz1geHV0euZDYf8r/Ltcv0n36nSV7BXzvXmWLpYAhzBUZtk4
nq7owGZFenf/3nj/3r3f3P3qN1/u3QeOtL938OWDL7/Y2/9x/0tvfyfH/3kU
nckUz2mKf7358Mv/hTucvkGO+DTJ4ssKbnhUL5PoZZzHCzrhUfQEmG1ZZCPe
blzH0TGwoaTq2enR6esn+Amg9F4dA9J3HDLAIa5xBUlJd0A2Nr3bZsQL5u74
5940XscTOK46TSofPVUG6GbBT5x3Gyj5ECnG3t5eFE8qXFWNf58t0yqCJW0Q
GBFezmK2mSYVQCNKA/zavbEREIdonZRIIxDGh6d7WXKeZPgsQRMowjlcHRgM
iNtqXSZARyugJdG8BBp3UZRvaAi8lPg+ngw8nS7yqJi3Zo9WCWJpWq2qcXQG
j8Lo66JKZv6aktW6uAABAFYDE9dFxJCtExqj3GTw6eQyqpYxSUrw4V61TqYp
3gND7gCQk6S+SBJCl1WVZOdJNYoulsB4o2mM3yIVn3njrwqYPp7C5cG/cP8k
7cE26+WlMztsJ47wPmSXSMDgbYIOSHk0HkJBsMFd0Dh6uikVSmk+LZlAZcg5
4N06hV9nyTorLukkAYBdWxtFaU2b2NSAKD8HZwsDDt6cI2Icnn5WdUMOEGqT
x+fAsPBqjKOTGJZcwrrhzRlAEjcBh1vgAdbFtMii5G2NiAHUD3eTetQXJq09
HF2X6QrODoA3LfJpguykBqjCxIwQrVPFkwhtkT4X1FsWF7hlhQgeehgEgHoF
LyjJZwTJOKsK2BfwElhFVawSFx9hSjxbUAPyumKcWCZpGZVAjmh3Y72Uq3Q2
y0hcv4k0mq4h0/Hr1w7rGogI4G2MOAdLr/j+Hx1HsZAAZWejqNoAjsYVTDHP
YA143YCIn9Lk86woaL8xjzhCGNZpvkkiOo+kQgjjDUTIAZuM4MplGUg/fJeM
sqGcZ2x4A2MmSDYyNKK5d4XhNbzxuLC/blKYKkrmc1mg7Ec3c+6rFLfH0R+X
aZZEj58cf/kgevdOhJsPH/j3L/n3AoYr5QjwvKoi2wgGKUwOn7zYYyDCemmq
eZrVrDMhfDYnx8/lAUttRoCfwKkFbbtoUrSMYSNZChyYT5Z4TVLCN3AXnR0x
hZgyey3WiF/wMV5k0FuWSYxri2YpboYOA1Ac0B248Lt3u4lfHz6MmcInSJfg
/+c4zqay2wndinlZrNzp6WRwM9NsQ6hDvPbk9WFUTH6C42OsPjw9Nh+MopOj
x6PoOf4HvzNIc1JsaNqTZAELAEn31tHJyW1kUHGItiJraAJ8LCywlluuBF0v
RmBHI7zcwJbKEY6eF3V0kWQZ8G6QAeeXRE4FI1d0SXHaPLnoPWvDeuCrKxxL
dIhQi7PLn3UIeBOXjBLdhw+j7oPZCvwmd4IRiPYiuwQa9TZxqRAgH5kbYIF4
wAVx8RlAYsoYfJnUCjMcco2ixCzEv2CieBaDKiP8i+dCYl7CmScRi5fVSOeO
smIK2ysFIbzTYkQoE6FGVRdDFIAcPcZpCNlkqbMEHrxI6yW9GVeXq1VSl8AI
dDp7pXA5q/gyyvDaIbRWeLKwoQks8I1yI/6IgFWzFADwAtQlzAXGFOGsDJ0Q
cJKU+B/OhbcQH46zC5RGVVigewpyaAV4CFvOLkcMUaaGTFbhnDYJMcNkiGA2
BQRQpnjOPK5bCFNOmGTExPAGOLIYfuvzZKRoW67IOGjt8RYpl6hHkiCSjE+k
dRc37nwXGFsFVIaobwD1p0UJwAXGTKDJgCLBofEBNu8BTp3gZlj0GbAzEq7w
zOoeAdHZxBFAtJzxPVqotJT0CHBx375Xq00u2qQ9kOii2GQzvMYzFNEBo5nA
FmW6SHMZFk4EaH1FYgSeTrzQ+RBuiP+5OX9c4AoejlE0UOJdlpfbVo7IVCuV
MmgFqwGhPCasMmIhLI8kQ8be3PItfQLlAhbR7RErzamE6Fhply9o3/JQ2yvw
VyBOcH/bdxkoN0h7Ay/hRZplznFsmRq5P0xHglWC2JsL9qkigpooQIqGmpF2
Q2TjJSBVQdxtFtQP7gaUAyBlaTHTU+w+rEHbRNii2lcCJnTS6m51oh8oom60
dIqXm6xO18S27NMqqyBFJ1whDWFTlpamzhJGY14piOVW1FgEBIuBIIgrJJQo
FqRwn1D1VkbYS9qslNWpngjMKkfW2VR6yjg4KRLElO2bhvct0wXwjnpP1nXZ
Qy6XceW+olu5NBzb2Rucyu5CoGGXCaBmXBGnBODlhMT/bX6uX7uzZ3/uXL/2
Ho9/P7p1vH87utn4Nvpe7DL253vn91PUiQA2x2iBqavGs3f27ty8Y0YimPlm
FVbVj/ejxoq8Ud7jf2CFB/DPzb2+n5v84AN6q3ctfT99a4miu1ETQncRgjTx
fXygCUHQLXFJIGjNRIcEeK0ZXgwTXzUzMAH8pjGvX6uXQG8XSwICHObRnA+M
EQLgwnSndYn4ajWnRKcYcQYSwNC2U+vALo68exTdTN6uRdIG4ZkNZP924xC5
RIxchdWHLNugrat2CCPSUJB+AIl5ZSG9rnnDxzc+iCq1nRgYo5c/HxGfICSY
D5MiWJQgDbx7520NNFuzDRo1VRoQm82O8UhSnlIOTEVwPo6Rnod31sRL3cOG
UeKqfeR62N5RgxJTbUDVpkFnBTzGwrfu0Vj5zWlXSXtaq17oiYMcgEMiq62X
Ot0+sZmOwXF99LYV3syuSDChWVkbMHsygGksTAztrF3Q3nT3IugvChcOMEBF
pP6ycyv7AyXGZZKt2UANJ6k6Crw78EI1xxzx02/y4gIRAy4SkfEBx10tSVac
oiFFwbBvdbfQGcIXm6q99YOowhsg8DHjyc1AEXxaW0Eb2JOwJhS/RjhGh0mv
rSTQLe7QEgZy8QVc04qFdEdWsjfYNdIOsQipKkty4CRpaPwgd0yBDVZipQEV
AA4gVbkrbPA0GlNMfFqs7S2TPBCfaYnuVaZ5vkYwz4qLPutwl7l01GMr3Xmw
ToGL5SJG8IAHwtFnVCwmQTjy3RiGGvGaLgdamuGuATavNyUCmchpodSclOcc
vbUb2Elbc44RywN6syhbapLvxRZA+uKCcMpoRWVlTSueGs7EzD14YwJj/dac
hmfbwjHEDgsq7XlaFjl9QSh482Z04j78AtSnDQj1yvnewB2GN4F53Hj57enZ
jRH/G716Tb+fPPvDt0cnz57i76ffHL54YX65Jk+cfvP62xdP7W/2zSevX758
9uopvwyfRt5H1268PPzzDSZAN14fnx29fnX44oYhlebY0bqCrEDuOnBAlIzj
6ppcCL56j58c/9//vY9m5H85ef7kYH//K7Ij/4t4z+GPC9CzeLYih1vHfyIJ
uxav10lckmKIul28TkHDwqMjonmBNByEhWvXPv8LQuaHR9FvJ9P1/oPfyQe4
Ye9DhZn3IcGs/UnrZQZi4KPANAaa3ucNSPvrPfyz97fC3fnwt/+O9qJob//L
f//dNfZcnJF2VWTF4hI/ePfovAIukYD0hNh+siFX6SNy3+F9Z76UgoY/FeEm
YVM5ah6o/Fk8brs84LbZD1ncITzGmc7IKxvpXOSkxRdIBQFRasOXhqfXS1Up
LXNoEQlboiE6rs5uhwXfQJ5ojY5kXZMlkEeWEBpoeMoyrarivcdIZHl+XZmh
nOTLI8N8EpD9PHtXr4Wrapi4Rrp1NkYxO2+zEpcEW6VzV8tUL3yiJ95LL/Ul
AzfLEBRqavl2LS9bvby0Bdz0UMMUyd7CS4hGh8xTuLMXZOlW18fgowdVgMnV
4enjk88qMZhba7e72JYn2vc1i1ihJgm1ggufo0VqXMHQ5Rne2sDOycaY9kQ8
6FiYwbA0T9E6BWTWvEDqEBlBZYnAmJ84VpwOE5Nr8K0b6x7mOxn1uSVU+kWb
EQ2nFg2Dv2qKGQTE7UdHANLLvauApYuiEMsFx2LxSmL8i24rmTf5mb14Vqxr
juEwh8z2cfYOkbxGxEBl8ZDhiURxOsY+cdwQafeePwbxhdaIX3g3NGZZLO4k
4rg2vC99K4PbiM5wxC7fv9mcTm2Igp6xdd8rzFR1QDh2bkUijMruLa34AfgX
ZIg0N7wnuHwJWwoOtM1Jgh4HkNoAOnh7dtjXkXq+HqNOZxDI4XWAIZus7tIu
HZbTUjFRVFNVUT1sQANmHIiQ5gEvibekY3LG7b4mtTcFF8Qevnq3JanN8NQs
Bq4QK36sx1QeZJluW9aExwYk6yLvvuIwO5NDYlJdmhMtxgkE22lBITuzQRvD
OJJpAnrwrHuldLcqBYis6Wb0lPWhrwuQlaN3NxcFxrkl0+EmtThdVcY9e84n
4IVRzOMpxrzh6QTcHYyNqPYGoi3UnwuqThnDQhLcMfAS+BqgMk2cQDYS/DQ4
0jxvbP3Oqc583iHuMeNyrCxIPyLwYJBRgyINrxSjgCeDQEJNB49MWdakLN6A
xDRDnKUwLlzHvFDlNUbMqDEo9/q1z6PPP/96//PPlQduWavYnTJQsXIBD0y7
BrZDTL0p3JLUdYnadq1+SdcL6AY38BiG8U7J2aaRWDrHyLsKAUdtwz3oaty8
6AbVxgWeF+msFVaA84B4t5kmrfACVCVXEq0EJ03LHxtYHuwKSzVfVBs0aqZs
TipqcS2qwaIJWbKNJgIwNTfWoyg5h4NP56wWg3pTlK432MT5kPmFDSF6B+0W
7u+6BRNYMrvM4xVQHBNIRhEVveEd7nnZJTy4AhRX6xqZQYLf0N7UjCKhLbSY
LN7k06UQA0tBxK0e8Ccr8SFkENNPC1NaKOI4egPT2H0+vDK2BIic4opH5bo4
Aa3hNTEtMYYhBXEC8bqoMW04gUNt2OZGxKAp1BKepG8B+WJhX7L8ScJKwCwR
3cksTTUyJgxtY+DYxF32JihFr2Hy8zS5aPosozv/3fFzJ+C38xx470kteRJP
Ub6D0ZPyLmoWTx+/Nx5G4N9/AhXwmE8H5QByIO4255273+P/xGmIatC/svLz
Pmr+YBLA3YaTEyZ8PflpzGtD+dt77SUHgvhvyWtR87PWz93WI+9xDQ1X5fd3
WzCkz+40X5XFsOPT+0FANj97z/ttHhB5noOH5j0Vvf8t//ZeDukF3Atgmc7U
OJDzp6uUuat4L8vGR48TOGVcLQFw2DpkoPY27njH33zRwwoLw/aPPUwEFz3k
3X7nIcUG9zRaIwX21DxJ2LpA9ckGFLwVof77zpGc/bVHsn+7EQLhh3CD30ft
7VnExL90Y9+3t+ijYeBYOk6Rn3V22N6+mUKfHYIb+qwdOYyF+Mju4w7dG90+
tqqT+x1Z2dTuLJEQahYamLkYLeX6NbV3aQJUtxZC4n4CBJXVpnDoAPreNGhg
m3dWvP/kl8f3PnxwMls4cguZgjU8bXPMoq8ABhIfPppcQKpHm7mxMrleuqCl
ZVWQsSaRXBgzwBSEpU0p8td8g4HOKI+Xm5V4vE3mwTJdm3woFd1G0Syt1llM
QREo+K8TPRt++09OILieHdrNmOrR4yJHC4RKY4Rm+yhJKjDWSgO41svLCgW0
KEtzTHHw3HqHZYnea1nlPF0gE1Z3AYuYJkpToO8HdnbBjzRVREARfdnH/ycr
oFhj1/aQa2tdnBIbr4iNj4eJXiTBXfabfzTeQAP4V8ks3YA2qIv1roIGZY6I
jtm/Ts5OnL9wE8/P7PdjMlsZdaZjJSPGgYC5AH2nZFhCEY1SntBIzGKqGGK2
66ppBTiF1hiTSdaK/29exA0/jpSlEp1RAsdjDbux0TO8lgv8TzeoE988ItYx
mkIiOsmUSBC8oNyKprU5ZZQY80sYWRekacaEHzD+oueZvU1tc8CEMp+qgk09
/bGAdCw4RzGp5f0e002DIm+zGnVay21UMXxuIj4QHSUI1wQOCxvIk3SxnBSl
XnsKsiXoOWu/6kX04w892z2q8ONdIrv6A9bV0pNWW5IBKReuLw1nZJCjM6/g
6rHv/b5AplveYXv2ymG+tPM07iJL6E8fEK8tynRwEIUEhqEwfDo1UYzmTFnL
RPs3Te5tTsyanVQ0rfnei405wSHCIfo2aJvVZcfh2QxgMhshtVYju/0REFED
Qd94PAC8AgUJ3c326GkTOz1qkjfYWiBXwbcrP9+UuOUVTbotaBv9g0kya3th
XQQZiU/1U+QxUDyWSIWtlRlI+97qgQkLRD/FvMA5nta7bz1QcNb8RuDYt4ZH
kVNRTSFyTVO6k15+huRktPMz8A8vPyM0qWHzSuw8JFDDa++Na6R4eYldQfJ0
doVgAF0K/DXLmpPAcSUo0l52WlZ5Uowv1zuImV3iw2ja1jBNQBysJMCKdU9u
TiNxbYb1AygtlHU9kCfySmr1jDgHG91MwBMrclg/7bXRbUu96ALPDikZeKev
5gbv8EdvgAxl3bZNTKWFJS6T2cgGfVYNwcjEqrC6QnJ/8z4o86xqJlfKCCnC
tOPUv9EMT7Y6g7iQJTOnlsBVYC2hlED14RxJp2ygPJzipkZrI9vQp7AinsuJ
SdPYznp7Ug7sd5EM1yEvNPOpj/xTLjQRPD+BpsEEvBSewek7FJqMSiIfdOg9
n/GkElaAAE9yYRCIp1dESZCACNGa1RO65VJXEhyZqG0b5EnFPlJRHXzJqQdj
OfObbkGIHFWXoPaSG8LuPbZSAq6Ygybkwz61X/iFr+SqFT0xocZW5dH84nTC
ucXtaKtBTBfHFWelBtVySql1WNLtKKNbJmv78PR2Y0A3gGpVzHQQRxQu8qQh
4KQUJZgSBq83ZbVBAmNkh2b8lwQRVYxSij23kvFiPEIMGxFa3SZAoj5CjPzW
ydHju8+PHt9WF6fMw8cHp4D70moCxDboxCm4oKhRPMOYYKIWTti4eInikjiz
0MTUWaLZdN9py4qMAgnKn3qeTMoIBcqDOjglxZCsJCYWkU9FpDhRsBhU1WaN
PhSCpbiyuBJOhoRUTQsxW2rgMCneEqNIEvzDfdYuxEnSaCnSolzbF/G6Gm2d
vmNKVUtsTNWMldhi8iNrX9UU+GlMHtCEMVbxylsIHuk2BZkVJJA9jD7rDIDz
A6BJ7hVpw1132yJ5/dpJsohLU/bGeNwoyrzMh+YsYBkbjf0EoTEDbDND1UsQ
hDTwBZFd8cmQeoOB+K15zwk3oLDQJQW3TwoMn0lI4JGDyWviW1oKpC+Rb9ef
OwHvjfMTcuR45vxBXpOuufn1jvk7LOcNG/r7Tgv6nV6D+R37+ntT7ckNLms7
XvxvP9Xs3oZ6AN2xd/vzfcO7F/V8t2Xx/T8e6HYd4I4LutbZByP8Ggv/hLNv
m1liC5vzfxLQdZ+0BvBXoS8/yY3r+en9Mtr2eh8Omtd/MXLByQjdO/v42T+S
0jbdY8hh1DfWMvrihjgS17WMw7/P2TtzYLxlOMyHD+pRqtoSQedwIROktQNv
tah0FotR/0lX0K/1bYVtIDSIjcUctW3NrK66YfoY60JhcaxukL3P1jE464rq
vXWK8qjApAU5hAalCFwNGKpmAzQRolYwgkk1MBnkKDwe+0EwSNSLgTuVtIQ5
aAukHJugZQndbqXGRLZ6hQ4gAq8jsbXlXU73tN4wEL5m1hv258NXX3NhMKx0
iuWUMIkES2S+QPsd+TrnMYg0t568OLo9Ahl0VaBvqEwXC052yeLpm2hZwJJv
nZw9/uY2j4aFSXE0cp1lxQWCXAqQffXwoYZMGuuD+IlYkeIVOpaIkLwPknOS
G2g6ykS4Ak9IQHSFNy04hAeBtgAyULDG2WGhsCcz8kKnxUfQQH+jbapl3KKR
OXKTROdFYpPx1Y+4br2pg8OCL0BQttp9nryt4XDWVIkPrl6anLOGOLJ2yRIu
XfEGEGXNYjfP/Fkz1xnJFrqf2GDgr3qBK5VIBZSkncQ0CpOtHkU3KNwaUxaP
cvryBt76G9/mmHOd3xjrA3AocW4j0kvJZ/AT9TWVnRZAAapGN/DXLCcv9ka1
CND81p2TKpJX/ljxlBJY28/5w8Llb0Z/4+LWMM4UvfYjszUbXd84rrEDFd3/
R259RPlFYkrrXb/NAIarhbiWX3ZCiPP3SSE2mGL3MyuL9Zp2o8fa3E1eXHE7
UsWUF0xK2o2NzmETE9QAwOswgc14aUbWQUs1HVTDXhYpA8QpKkGGKOOw4NRk
IVSbSgyPzqpjTKSYs45O1em4zq3Yj256JMyVT9/ddCvZNTOjXGLXKPDWmyCl
6WWidhrf5sdldFlDoAgiXR6gYaH2o0+QYGa81DFZ8etkUZQplwwwFtAsuLr5
hteABVrFKNeUbxBZsfYOJUU3sgcFwnzDJMFPXE/ob6EgW873w0w97w0koJ4N
kYcdvHpmKJRYHi58iANSWIkf34thFUDL9ja+k0FT2QPKs81z9BFxLnn2QTwU
YBjzDzsVPiLnUX0gnw5bZMs3e4Z8zR+w72+7uZ3EBnv83p6VyXrZMJpM2h7b
va/vmEKOgCq/TVebVYSVZevlSOaCNXxoyamNpWjCpBQ6TxxfpAyyTH/imt9q
PaYl+TUy3TUdnr4aebHVp0n9McvIkhgt/48LyYd2YYq8YJ7K/fO8DUShL22U
e2UlEWJFjRqc81JLRY4jPH0TvOUjEBtVJZZK5WgnVjDXO0WcAdkcCv2tzK8m
roj1U9+yU5ihG7iKYGXLI6b2iM8okKGjTFw9L+2opGnTQ+A9T2CF0fGVbcVN
ZfesVOLW6TIrHA0et+4GibM9RUOBhibTGKkSV/rMWFguqeitSTsKDi2BclKy
jj2CRCNtaZgQ7EK703wkqd/jTCJljGgbchEU7pQLFRqtcS7MJghPawrsrEtg
OkW+t+HUtPYAIt47kUdSZ2kcvc5N8rcXbtmO7uqqGaOlBwCsFPHaSP0TBdpD
ofABaoIN+Va909NgPA1B9MTjmGKI6MA2s0uQlwIdD1BxZBCaAAC6y2bLHuO5
XEuOmamVXZHNPgOCk1OwFJccWAJjl+I3SU5uUK7XtUxs2j/5pbJEtUbPMWZK
Om0mUnsWZgRFODnHnJy5U/LXMU9cOrmdwHQ6Cxwws+l2xqIDvU1RqQ6tK8qL
RsHeQVbnRMdzhBhbL8E6gK0VxkRBTig/tNJ7oVGJ1sLjZTf5scjP1FniFAlv
aNxdlck1FqMbFh3+7Vad6F3TOEcKkr48Oa2B5hYjCl40trv0hH3m6HEj56hJ
z5VFMa5daIJn+N655ZbFg65YpnlHjFRGTnYImCnhUQcK/HocIqRaOMflhJPg
N7xpMyOXBJIgJa34jgNtcqJ1DFnYAoE+WAF/xD7OSx4LK4MhFecC/OdER7TC
GpUeAaoykbrDXo2wxFcXAnWlvV2JXNzlO+qJCkg7VDQtUSMF29qicVNf+4i6
NHwH7TVG7yObLkMW4UZhYtKmum62F+U8SNOTssNISXqD7dj6RfLFtkhA8VNb
Gakl1gwAl4VWbZqWNGoED0wbv1KF6Y+uvTPDrgDpZCPidIj5mLz5jGN0+N0t
VZujQsLRuqOOx2gj5iCieIHlOII1ec3FnaDQs+aCIrWmE3Tdnd5QcFVSgkWq
uxvGDCy4b601bS/iu5saFLST477vS/879uE35z4VX4vx6Z0ZYGDx+Uq9YvTi
t5xXt83FdYU1hf3n0XutQBkIh/A9fM01NdfQu6Ze5+V7IwJzhi5/+afxw3tf
RdOkrIne1uyHba3J+2CnNeEFYA8DEBUeSc0lOI8v5nnTnLz+buR5NJ1QF1pT
I4DBhzgOYBRnJwb30+6uH+Lwf5PYrPO+wDZSEeu1qP8gmobWdHUs8P9q+2FB
xvuxKqeOKzbktRwJa6j9ezRyuAZbeIUrO7WM0d+WtqKjHJ+f25bF5hx1e7DC
zWPGbELGvVDqpGP2rTarVVxeqvX5CttrxFSCLIX+Lq1RWkkvp86qOcObOey2
586Q2dou2K3l3hpRFX3jLDYjmxwja02q/OyijsZV1mjS5QCfGhrg3GGDONhR
VitOSwAyRYV55LTT5+w6vruj21iyNueGUADFlOp3RIq2jROXnIs16rgATVp4
wPqtQqnvLQHMMmBsoBiofDjU4emWQuFuKzW3YGWLgZDJWnIcNS5XHvoRbhfc
DTg5k2YkuD2k5JLjkyUNOuaiHWQGO2tuqtvAglB/22Yz7Pw++PIeL1Dqx/i2
TSqDq9PiNy1YPk7QcN9j00ahLuWeNRS2DpMs8/Sv1PRGXfvAabh4ToBhjCKO
8uUtldHrsycjOnT2EetFa4obbNpKy6ZfoqqpOJRRsZZctaTNEtzocw5BpSWK
mAjnXVKkJ564WF9SJyEUe1EZWsb23021YYuI22+p4rlV/FvGToWkUCkaRxuU
Otvs6FeHRmIzEWshQ3RxsO90NzV2CITK2i5pb0T3l07jP4y/iMnCfDT3wsaD
xZ0xjrYzD0Xz5mV5aW2WR/K5ZBAleWUqvNYaMj+tWxYoMf+6Yb2u4UBdtmhY
xhqJAN01WijKVFcVi6qaNmMourKUGD1AJ1whxWgYQcbRYRA4SGicNCD4kGrv
mqqr2zU67fAxz5K3KbUIvWx3RDEerC4OQfkOPnMFOml8g8IW+IwG+Jlsyd32
ZCMJ99gCDFMnikD9U1Ks0Vr4s953XKWaPdO85blqRS1HHT/t0indz2pTkPu3
ju/fFjGxe9w7d7/nAbkWS8+4kVMr5/so0P0kio7v/wUn/sEtqoOPmi96Rvei
JDvGN4/eenJwfLv34TbE+p5WmD24dfzgtvmge3CBlvmflfD1+eMv/sKNC7AR
AQHkrq1u41aB8SY4PviL+7wth9P5hoUJQ9AW0Nn2ir7h1tyBk3qIK3j4gx6c
/Nl42bzrFezpnxHfkXPzqvy03+o4O782UPM1rnUUcT+cW8cHzjHSi8f7dCA/
9E6oVXycCeUgf+jYn/na/ZJefPX6x2d/On59ctYFGbOi7xtvej/BV+3Y3/e8
uhUFvo/cA8Hf7x7j3/Qpv8wPtF7uvF6d33uvv6dj2r91DBfk+IvbgVD+iJ54
eOv4YYCGXWV2com7vUwe7GJ1jQI1gHqjXxtZNyMYgG1tjrgszlBT4zBQLCiu
9tCtHegwxCVx1OctenXbkHYnpO77H3WaCe6Q9WSWvH1/TBY++EOsvk/V6vv+
RCr6vO+wtVkjxceuJIruEWIc71t0kd5XhCFap+p9l4HtffTplrIfWsp+aylR
MI0m+pRAOeCVHGwByq+wkvu8kvveSu7rSjTI5ddYyQNeycO//Uoehlby8G9x
Ol/wSr64Op4YZur80yLa9EvnDfx02/lNaDu//gVsWU3TSUc3uJCqQckWTMgf
OFksXwg1/2NinPcyknZ6IdVXeAOovsiaKM2ajSSpdHC3SRFOFSrRnwK6bTOd
YmzGBA6Vsgrlsh811yYULkbVFyLOoXmgeTdqaTJLFbNWWVy4I4g/tWLFGhjO
KNJgvYCj0YsHwgyKrG779KyJNqRSh/o0aMm01nyuE1njeEamxJwUnEvQ3eCZ
KDX1XYNvcM8kFdAOgZn5nWfCG+XOenRTdT/h2NruCOJXRe1YIij7uMuabLLL
TYE8V/PW00IrCzZiUhuptZDpNmmHMPYXbo4NvurUyjXlVNxuJ2LGaJXO7aic
a40ck0SgF0fLJD6/jCabcpYYXOGYHaeLnKQrY9+JldQ+YNsKplM5XXcoAJFc
EhwrsV5naTKTHOopm8mpidC29m5b05c6s8IM3Lk6sWMma5nFKs/55UVsaBya
UByKivysclM1sIw994/hYFSsX+NUVtRwBUw8yIqi8kqTlwKaab993QOJ44kQ
ew4ZqDKMqNGECD8YgyNWyIrl+dPpCHANZHRDkZqjABKJaaycSo2mhfpggPhV
QmmuPKFKSFTyH6MGphj24IRaX3H/1ION9q+bZbNcx27pcRPyENzs2AvPJY/O
BHsY6DrjNyY2BL1xhmJR8QVL7P06hsRBOnZo8VymIG4gHjxgSdzzJK6kZn/F
/UncGo0e7Elsk4pJpCse8B0Gvt/uEMHFOpny3Buh7QWe/oJf+I1zkUZb5zww
QWG7TiqPfrHTdPt6zsf7fROZefYDW9J01r55HtptPeyf4aEztg3jwAPuaInV
EcVhKyn01A3oTyC+E9kxfvtvXT/vG7UR0txVtN87y+j82bKM7UNsT4QeMMi2
ZOw7QzaDCeHG/o2V071cjLGmff8qK/lE23F/kCE3vodB+Py7Jf5BK2Hs0brq
rZ9fZDvPg9v5dQD7ibejcSwTp0bFr7edHS8gV7KgeAMPVQYTgi4sQTyhn1fi
G31tksf5xU9CjiyJDYXuUKr+j1yRSTXSr7f2UBvWn0zU007bp/Wls/4Vatvo
VhTwmt+00+8myeAWeifICp8rPzQpam70Ccge7QJlDYCpyuaVPTBuYYmLMPbf
TkCyNNYFxEY5CsxnMVMAc07W6jp2impJUlK7KIHqKiuL07as5ziyJ89rQg2C
6x93HpvGl3TVgpRAoK09AjsHCLdR7HiYgxrM3ga8sy3kfKgkM/Ratj2ncrnF
FQty5P3Pbuv9DzwadGqEH21KO/zhx4x6Zy/QoKPTIdyqaPNex/Sg3X7OPqgd
Kqq/mPG8d82D5CNCmfy261a2b78PbMc8R3DHA7g9Cj3oPveZPPiD8+CdJuDa
m4lM2wzrd2xT9daQDO2OIV1ANMjs9603zFsGJDSRA97gO+zxE9ju3/6hBevQ
WyFYB8cPPRi6OdxXp4VjFoDiJTS+/nBLn2bfmZ5H3/s35/1Hj9rNp2Fbt2Dl
Z0tOMFVbVDsNUbpDNrtCAms63ufpuGSCbTXnP3QfDYBOuAFj8g9AAW8d/Crz
f+YvgKe+/5FT3+epgbHhBP0r2NcF8HXf/yHgSkUmv6oWHeZ58eq2yi+1fLo7
Z6ZYq7T1Pd83dapkVdpMwje6VGpqMT5nKc+6JaXFmSjS9h3BJKEtdbIxs/Pt
muBMcb6/PRabe9sR/Ds46LR0oiUtbRk5dGXkkWRcpEN6rTBGEBnzToxQ5AeL
hTOQaMt4npSEzXkpgB1oT+svsRlauKxP107x0zVGmGGi62pCrTKoOKxXZRrm
Cidk4YEmVM03Yky14e02BTa73OqaMXG5DedFWpkEXzRXa8VcAiLZCLMsnhSl
qQlKNiLs5oKfkJ2kA4OKIcXPsB4yGdW57im8t+vB7TcODhYEpI0MYkIAGHy9
mWz2FBXNmlg2MtP1Xo0R21eNic71mbXdSm7aLO4dD8CI9LtD/75Cn+fVUFbT
s7WhbGCp/kGZfm4F/g4qxgqXEpxGtmJnY41xB85zSDGDQJsGUMsCbS2wJYzG
m33SLuzLPjeu8aAaCfZ07+xt7LbWqDoUPAfbw145HdntBsu5j47RkaJ2hVCw
r8w0rO2kD23E4tRTSvmUSg6+8hnYGMVyU6Y5q4TO+LKzZsvVrsTlUIMWKkDg
FTlOe3hS2pPV/pFdOPRmNbtxuOmfqe1zNEk8TyMlN+PsrouRPIuzZllwfeKK
TSUcMri9hUdj/d3I8ks277CX+mjOkBCHqxR+aEHGzb7d2iJvFMDy9ojiKZbK
MyArJlwi5qxplpH8cMwc5JhyLS3egl2XoSB6fLk9nZqi+/n6VL4/zl4ec10w
a8fQCzwLLXbpeNu0Z5ltJltTOKDjq/f2KcVEmNRpOP00Xsc2mt4EYnitfIjb
GIe+Z3fTQa3Fj+9lmWSXWvIiJYq2inMs3dcwRsElsiYopsMmHdoFsOeJ9lcg
5+wlHpm+Q7gv01lPd7Rrm5u64CSry+7eSQ2KJS7wGTVXxPQXDNf3lkAw5d16
HZIMfyXiRPk/g3AQ+GRaackhypOIqfGEgwnh1Rri4hQTalaub9YSeWpO20wX
ssWpJBXKljIvksG1pqAALgNhr7JDrx05195NQBw0cqZF3liwMNlBMsE4+gY7
wbRKBvSUCbDtoUznDelpKDImFfQwnfDcSxUyZPt3xxhih2hsge5WWDFnxin2
wqs1FTPQJp1owcBoAxRIW10B5M0y7nszWPfFvLLnPsvhZ42FmxVPEixGrGWL
cq4q0jIMdFSA6sQGRDuv3hTW1Dk8/fH48Owbn+2kjohnCa37OMU/UQ9yjKdw
fOj0JGG2L5FqvJJp+p7m50XG6X5Oz5Y5GuvJhI2di7gLCs7gFMFxQ6iK3ETa
cGcNKfijNxF7YdREYzkVkRcWqq5hi76wRphdqhJ5QTE+TrEqhrHTMaPk2hE0
HqaZnXe5cjT1cxW/STqRkfwV8EYtkUnsh3AAYBkJFacByltqLSYQnGLgX9wz
BVCARJHJpSR6DQFRMDRP7Qys3tO0FIWTqxCvxVm0nKtAGL4go1bb4kYiPPfm
qq9ga1PLAK+WMALDk1D2COWg+Tr+AYuYlErgHeQw9d0Qrt2WTN3HfHMBrovY
3xb0GWhWUI66plKZJbFZW7CPxSEibkJukWVjuZJotiEbWrOLG8mpjuDSlGng
E3WvzeM0w3bGgeJHHoRtVGN8QaUanaBDLy/2nz3uPl2Pu6N5+yBAxFCFofsg
LAro+ZrKOqGXLRIcbieaU0o2fpM0UQgtV0SsuLkc/sF1N7f1jtv5eOefqm9c
uIptn9f0rEOQ3FayqS3Ph0RO33JgzV1XbcwrQQe+3cwTLKiWR6Owm18c1O3k
K1dDAdC16bApQnLgm1qwdnLlWv6yRlN+Kmj3BB7J3ba5+trB/j3TNeDsmD/8
6uFXtiJbRxDMlmNelylVTpHKu3pXdvPQk+qOPCtLzztVTBi5Fe2A5RAlHaI9
ceN9oT9SNFTCg7VsXl08oroen9toB+9lPhZs6TCKnrw4QsA+/oaIkbZgeBQs
4eK3S6CQivMkn9HVPE9RoFTj1ZZAD7NlX0C0jgFTGVrf9plbpZETl0b10sYV
dYH4hfAvIm5g4Law6Nrv2AOXFCalFl1UKrJKq2EQ0f03V2XMWaZtBfdpU6WR
hDq4JNPK0l6nX1wWl6zFgfoluiW/zIYvZ7mrIk8BQGzrm9mnjBwkDdakmgK5
H50GFba0n1dThSk4y5eMk1xbxQebw0BIBUUWB1MPg5x7lgG04YVxSBLx5Lpq
zDelAkYKMi2GvYzLGbE9YHWSeoDEeRTdKPK9Yj6/4cI75jrN6GnSOtJcy8DP
NekiB9pVkO492itq6pFAUhsfhtSdxYgkqj4kz16G4pwGURoPiM0ufQ4ehjB6
dJUZKeSdOzwnOHVdXoYJNtdFpSK/hhMVbt1ZZ0lqOt2w6GEqdWrfCKljOOWK
L/KpzXrxg73cDoDWmFlVxTQlo5GxEJhpRB+gGLpiQmx05nTmXRVVrcWI8Swl
cPxb4A9PkEFG724CSpFGI0XAsIanCISmMSXNyB5w1MbocfWFU7KGQa9BnYhJ
JhV/iRgZiblrhdiWBg9wVfZgDOUssNoC1Mt0NnPayKPBdK7tduK6jqkQNx8G
lX0xn7nletwOnF71W0tbyINoqqIo7i/itcFNXJcZqK8fz5UK+NoGD4X4QrVa
rz0anwZqnSvsoaF5M44dxclS0Dyju5RcZJ9BYCKnQREnu3Si+PAlzeu0fZQq
6SBkzGZaxtaxmWnzGkXkZtNQOHokModPXogVAZ6hF+ZpVlPY5EiGku+RLbpf
wrbuwsad2sxuJ6QgKEZRHpMyd0r5Q/TuKHp+vMe/fHfyXD6CcZ/Jx8xUyooK
PMPgtVcuOP74cs3hDbjVyueAkmiVYv2FDWAXhY955i492naTuKBP8zIVZWDK
PFnEdsrmje04aL14xnni12HXVLCeg2eTcPfZG0FGaqdaySxQN5VMALKrZbpY
WmkHC57DIS7hS1YjzIUzdK/akfCx+t48L+qQFgSoa42z5dXl/I798zuWs/pn
+aL22D3jm0f//ssXtXf3z/JF/xPLFwXXQy/+s3xRN8F6/+uXL2pGs+bFXvKW
lUCOZ32xhdVas6eB/vjGh4ijUM1obonc2DAEcUaRe2DLNAUK1pUa3/ENe9ii
K9WXyJe51rpImKgIyFwce8md+gy35hoZB+KpCX33QFKNQ9/dH6l34mH7+4nU
hTIhdw/Uxs2Fjaplug4GRj4wsXIcIqGD7tXFnkmiZ/yjvnnyDUq7txBNJbw1
np1jvVNk8DbsUV1BB1L7kast9INS4U3N1nXQFTdJZzcQg1AEZJPqTIamOXuh
3dggx3Q+L9TyaZf2oBnwuf8p1/mA1AAMWiG9huGNprvtC/zCutGewPFpWK3g
B6XVk7+46tygtC1CLGwgJ+wZDQVV0sAEKpphyqq29LBW5S96HrYzcodwCrMa
iR9rS7gdqKwCwRWJ27cn2d4phuPnbCEFz8+HOejNVqVJZXw7CEi2J2yw6S3G
PthoEFEq8Fo1Bc8rKZ/hNrMtcdcpaSuYyAUHeuLoGgFCdALmKLT9JvuBjNg9
BEwkeZclmuf7M/5lsgNusyPIPhKPkws6A1ShNiTXSwkSFNG/YfVpV5F8CJsD
HpZfgu5RR6fkMrnDjGqgcC4z7CSh0882MZ1+PkZW92fZNpN5frvUzj9d7L3n
lU4Bvm+aTinef6mvEukWCatLnt8qzvNPS6gf9l5Ash8q2DcG8HWD7XN3yPhd
rw4R9ENy/reVe5d6pf2tU/eK/N17HlS2tAdkg4T/nveHaQDD8KWtBiA4jeQf
dWoB/NMvjXeRyGczDHG2ZLFHH9iiDVx1FZz2R/GyQqVFgqGCb9Iq0ghYM26d
5ySEgfwVyJKbVaXJkJPsLtlmdJIAt82jW09PT25biUgT2eBFLMJuUuuRq4n5
mx3u2Nyv/b6jWug2jo6NLHZ/6EaMGmFivOiRVGO1tabV3GP1D63SEHjMxHbZ
p5Vrd70x3kkuHHULhpLyASpbWYn8e8DpT9R7FavRiRitUHOTI4+ORZJwvEgY
sSal5PZ+h4uj/95nZUcHkdAImfG+l21iJibxb5PnScZpLbKQBG+EPwDA43mq
TrbmIyaZCz2tIvnjn7znzpgzgxqqpuFgXVvdd7Z6sIvE7ErLKA1a8deRm51Q
Oc5lqBLjirM6hOmr2hThDTa6cuEVnTTkrYYTpGycv1+h+f4nEZrvB4TmvrPo
m9uek8rXUlVNnaa7SeMn1hF4KL6Hdzetd/BHdkj8qMjQKtoc4m9bOcWg15QL
DRbddbbdBXjzw1LYAOG69c6Ob1lhfpfXXJF+wHthFj3gxQ7pfsiUHTJ++NVh
PQd6pt1uvx+kKHWa8re/HbTqq7C/XfJvDROW47etY6utPzTAbmZ/1QWYSiQl
yI6f3R6mEwxcxkBnQC8qDW1r0AHQHV0EHaPs6i3YjmUhjcGQgu+36Av60yux
DyLS36XAFFYd6kPT5NKrPVx5TYB1KsuS0zyZ+YlGaOeStOtYMNW2gEtzCiQG
MQbwGAVUjqbPpTWpWLBVTLdSbkDtMMZzyyv3eEKrjRiVAYPHWwE3uMyuMICw
+9+oLt2TO7Wv3ZiDT7YCEWEbI/UNVMdv0FOQofwogyJn+axqhzYYvUoPjgbh
nZwT6sFbR8dmDqqzo2UWKk/REJn9M/9xwEdTjNa0X6Z4TUrs5bg6ikbkkQJi
m6iGPCOGQMCyM0r/UikOi18gFhTOuiXlEMCUvF3GG4l+qisTKmyCGEW9KaVO
a7TlsJ0qt6yZrOBJbC7luYOqRgoiqUq0E9NUyiiGc86PcVVOCTqhD50+VM1X
WupnM2wxqIjqy1fzVOjiKAstoJWGFSjjreC02GyBAaFLEKvvPm5pT05F41aU
jpOxbuTyg38kzwFbOsKakKsI+QUNmw+21cqDUTCQU5UY0mgdJUbMPlaBYTvO
P5Ly4sqMg/UJT1C8wls7vvaPo7xYue8Kysugl/Wnx2VxJeXF6C4D3BatYcLu
iysqL/0D7ObKaCsvD4cqLwOXMdCt8RHKy1aA7uji+CjlZRcs2+bu+HtQXpyd
/iMpL8wnexUXyvP0sgI+heLiTYwxXEUJPP7Si+GCyT92YnUtaa0fiTfXrAQK
xQ4b0bH2wwUL494ifmFVJ24OTnhoMzMw0zkuF0ndrxWNfNVkV02jeTr/Q7UM
O/vftZbxa+oTD38NfeLhrk4Vr7uKPfdfUKfQ/B1tvXf3OPGSeEDHoBrs9Y/r
D10JPZ43p0HvG/4cF1fvSvOiUX9+zwtqacQpN5LO05f2YXIYBcVtPs7u6IU1
VotKUt8ovtbmPn9UTpKzKTcxqyvzKnJzd4Zk1RCsm3BmOnilV02xiIBtLfxC
O8eub1GfNqlmUAJNnz9Q9en1ror0EPnM8ytcIXDvqsrzoOC90PND39g1bk/d
fJwasO2dK8TuXS16b3j83vBe4sHphuTk9K6zNzWn780tGTpDFOKtiTrd8w/I
1/Ff3jVth99uumkG5+50TD44hacDSYY3Im+BbueEntYIu+f19OFPWNF1A/u2
qLpb8my2kNFBCu5gFfcKa/mU6u39kHp7f5h623KU7K0/hVMuzKhVtQ1M+smc
cR0igqocKBiMflnP2YF4zro9ZWe2UBFOm3O43A4est09Y2GQl4kkhO2sqwbV
zmZXUTciM6Ri+ppsv/r79+oxe0wpZh+RZM7qbU4tnWOzo2D6eEvwpyJsLc1Y
CYoqVf9ATrYB/jUnO2c3pfj+J3W0DVcMelmZVQUOdlUFPnGCffvBrY/unFff
L+f/rfPqh4ry/gT/zKu/cl793ySrfmdZ3MLl7zGrvil2f+Ks+oGC9jZJ+yqz
A0XcImIf/Coituch6BKvh3tv+kXrxmQg41lzWI+/6BeRqLXYcstNc/CruWna
4PinyPvRIu9hVhWjVvr8SKot/FMUFlH44NcQhQ8+Nt7sFxWDo5dJYqo5POXC
xydcAHJFZUhg+EBdTK5DuxXgeNjGt7LYpFhIMnfaNNhKy9gLqK+AHha4h5Wa
VLi05OVxV58rllxr+CWqpmtYlucsvL0MBVOeUOXXPFGf2xGVPkTQfmcLHx5q
4UMqlP5MU99Mhd8K7m6zkJyp2vhhUHkJ6qKAxMCvB4500Hwid09AEi7q9kuV
YdxSpNDWy/RWEzAx9Q/d5WYT93YbcQ2udndOkk4qwIHSqjbVjwOtQRplq/1u
S73dNkK9zMY8nrRDCPQYaFKx/haaSTxVecj2/Ya3uCinV0VP76lfd7uPSPKV
svUpUbbJm3gs1VZWAEjTB7x9IG790FDt0AHVPAFy2PREmjAVpbT6C8Gw0bVn
MAxHIbgJpVXQmuKhVdJEDadAVK4NGbhPB5UhZ6RQkvJHkKWkIs9RPmXSE2d3
j+OyRvnoqSk0DFQkSFGpcUWzFwHh84wuiR1zLWM6xYuxdTv1zMJCQPMkrtIJ
90kNgbNKsedVnCfFpsqozis2pOHq8VKdSotOTxkNUupEr3V5uVK37bCV4oto
jkX5j4pUcknv7vvsNjzq39nI39oKTgerk3K5Y112x0a1RrxbP7/7bvTfYymH
ajoexZF2sMmTdLGccL1srzIWIaNLKc6WbqesXVZncmqBfyfnnOgfLgqPPZp6
e4/pcqkybUGVo512ZIdDH6UVSf3dUHV+vFNaRl2q9CttQpi6QGv3agV28jaV
5m1cgbbqFCK5UjxAsaAqo4C41J9tloD4zATfRSZY4KqwFYEJTDIRExltRUrU
bFVQznyJ/dbWsdQFoz5hm9LUh2aUveugcU8bjFG/FKs03cVF6sjUxVqkLYf2
NwP4FUqbfObA/FBoXLhrDp2odMYMNavQdjRHj72Or05/VynMoKAJDBKe2fSe
WmziMoYHjLBvOYotPu/y63i9zrTCuA0xafC5JodzuJtEuYQWJfSp2kKgWKer
HA4Wz4p1Z+AMI8ANo0ECk4xvYJgToF9lk7dozthAUvtckO45T/LK628IEmCa
Y4mKsAliHPmN1Oa25aG/juqG0hmhbcQcYAvWdBNPywKGvpEX+V7jXa1/3Xgj
OAXig0NCYaaUi7izZEgdP/IlfjRzWK3ZaHuHz+g6sV4f7yJW+P0CBvbZGzno
XYuUz8KFaJ1TbGFGk6sAQnzsIoFv4V/em60wbza4w6FKLKDtvQS8x8EYXNJ8
k9sucV3008FuPO4qOnn25PXLl89ePX32lKrZ51jiAauQIN5fxJecxkhWBtbD
DK0r00pEf0EjlV5YW2r0W5hcttuXPOJmEM/Tsqq7u/cZ/XzGft0V7HtTagMC
XpVpSMGqCBNRDJumfgoiYUvf3uix20PcHQ2H4XU0yqKDzLtRTTShDqx9MJaR
2/3DRhLXh6cWEqOpJnVHvwMHn+wCGwWzpbcG4GM+2wLPdSL17AVp8JhJzWR9
mnpTzz0TClPOKvoJfenzFG941TJsMC32oacVNT8VFPkit1oxqLhKuzBFMWUj
pndk0xCDdAO7Gy03pXmpPaVAFqSVckZR9ry2wBmOug8QoxYCp8YWggnaT6k7
a8q4CeQSDb3A5uIsUdM79v7Qa3SFAzY2ZFu5pwWQ9jHbZuNRTe0BWpdOlaIT
pBM42Gtnn69lnwE7FZUcZeFxGdDaN9WGqJQ0tJtd5vGK+dTIdHeR/ii6QNOs
FMgRF6JHJqYiLr46/iijq5kwJI4Hq9+Hmtml3JdRPCum8RvvCeviV/2F8bfa
TXqlzs7Ou7B303wkbXXg7u476oLX74XZqV+No2/X1HsFq2o5TKyD/zb6P8Nl
RnGP1xiSTH2BEPSZNbfUM+0uKb6e3T3dIiGzvSp8a12Tx0dglOkwp6IwvvMM
b2KKe31S5OfYKRUoyPVrzh9wQ6sNGsi+ef3ti6fEfE3HQocNO8Wn5fZEecyN
1pnwEhYBQRmb3/RSbnIYYlFQPa0035B1QBFVm5cwhr/89pRQL5ZOJR6+V05j
Q6XQTnW+RutDt+tvqOuiNEUiaaRhQSVdiLkKrwIIGtM4dwmOTup1rHSX33RC
aMfAoZ2YfVNeXx8M09IztKQrtMhs0ZTQnK42q8Ro6mCWaYzlMn/TZjRkZSVN
UtCljNdwajq9SZ6DPXFPqbSQvh4OVHupldON0uvkjUwI22Q1e+82CfBogPGd
7fRrYJnoB0Sfdm4siQ6PT93a8SwMZ5hamOZD7Tp+60amjlQn3r2p2PEcZacs
fZP4vT5HAGaA+iydMiNWgRqdqqBgaMsY6RsqB0l2bn1AEg/b7TWvxDGaVkvR
CJk0+XpDEKIcE5jgy9XIqPydarSnl4gVEP+wDbzDp0bLmVmsd7H9qltPxdQl
O7dWkFZz+O1tOYNMzGknFridwXX3rBVEvLRaoq8VFspHUvlrTcWmUTFqqVq3
TLJ1kBQ7xc/pa7N/YItTQ5c6RGlgeMdG9X+V4I6wiSZoLhvsoGe5IabDyYfU
P/D6NWwI3YkhHh1dZ5z3Oy03HLNQsOwqsFbmDNJBlay02kqY3IodxO9wTxyn
iucJmrFmRoP3MZWVZJTKiGrEQGsy4O3ITg9P3aWg/6kkD1pBYQkLNjS0FzMS
+zgAGmgqQMlcHN+Aja6YFQleCkFqUYjrMhhCqi9bpsmNIlVOwzMz7VjFPwH5
t2PWyzKJa6pOyVvs0khIRqkTTFZlfyqiyAXwMepxVj2CIanFsbNcMtFySVT9
EAh08zHpF0g7Jg3q0uDiDHeLDgvT34Iseom2p2c+EpupqWFmXllSgZtZ0CzK
++RJWRd1VvAWOFLFlY0O2F0aSdt0g5JokTdWaE5E98uNHtkmFJ7SKfmEtnJ/
r3PHnNWHREby0OOjAP0GYCUJ8ZGaFfhrASoFkCRlVXCl3UdsypemJ6Qhu7hO
8gk2fQX8qllMZU0Fe7W5VIJcxPI0YrDjgdH1GXrPkVDS6x4lm8feouh+8ynw
A9q+Uhcl+0DkxLsLFFd6eP6c2K6ecCbmNrMQla431FOUPSXlZh0yJyqnbxBB
Xkg1boDUYBnWLgZyxRBtZ367IKV7tgJhwI4LxL3ekHRkpocLhiAl3ZXnphdz
jYsCIBLExH1V8gqKy0o5Ty1uDQ6zYDUqTB0ey92fa3ySYcv9d6gRD4fH4cLV
tD51+6DjUJ6G6J6R04h9ha4sz8xbumICboQ7xEpT20kifi2Ks5DInMY9aZKk
xj15KeJXjBqe3I3D9lVYiiFPLzsu1sMtur5kvqSGvLznuAP2yBVNwW8PnCjb
Ch+oQSLIU8yrMaoYyy2xCf06BF0+L1a4ztPLqk5W0avNaoKNeg5PX1H7nlUx
c+gX8DAuMt3wyqdqXLW4wYjmYUY3ArjHmWL7YVb55OSmKVuNZl5RbjUlsHCN
+jmIX2nVJuUddNZFBtdJ6R9rmv+UTDtPlb+l6NEEhYoFrP+Gvf83gscnvLBF
Q+AiJvHKCa5Rs0zbMZYnb+u9ZbGWDG+UTi+5n72ErKqnB3QKqU2I5QdRRJIn
gsVD4BfAnVqEebmAVF7/POVogikoodRrGzE2npSinbmKqoPWOPgkWcbwdikH
SD2fK0th3FNkiYNhagcllEbUQZrt0kNDOiteTeaLuCOXMFhxSyVuI4wJlVBp
t6GufB4dI8JjUET35fZJ7Aw7NhNSBE+fysc4C3LOciTlzMtLU1v+7ZqBseZV
cMid6KNyG+m6yQI1JFlvQD4Tfqn14bdQXwGCIyRbX1ngsnBdHOfCSoQWa58S
Fz7PKHUxbRnRRbkRDDZmBZjXdRoANHNlzcZ10i7S4IzrUKRtcZJ0xmiyhpML
e6+rZYwyc8Utv9qCMFE3auklKlSGhfnxoE3cBH5r3vMjK8UPysKqK5YOEIS1
C5u6UidK+anQg47V1AHM7Btp3U5dJJyOZi1+x/PkgHu1RS4/CGLrVsm4garx
CB+BJ0ZGL8bAAomqrhL3HcpZk9NtLUrAT+iclnAKIMgAnYpn7soQq1gbHEff
qn6dq0aVG0WUTAvnSVas+WrCEHhz3PkcK4hcaL7rWv11HtZTx9Frz8Mar8n0
SGkURg0TTIbrjOJGnE2ZemIbEeAk8BbOwXZc845yYr6AXD2EIdh6qXIvRFg9
aJrnw6QroHTjGbGKw1jRWjBSOxBoSWVzZYTPKk8ZakYx0AFdgCC0RGsg8/S4
bu9giO2GTIrSrZht+wkHAcfWopbmb4wrDE68pM55TI7atbQaRV0a1X3FwIiU
u0zJiFMhRfBse9L/ebEUU92laxAs8kVhR3e62KO4R758pcqDTUJiuSNdN4Ft
EaYi0U9m/jvj6KkaCw3qM45XSpbIAibxaCYMX6LrjX4NejeCeVbGcwCJp2OX
xWRTOTeLRPv2xZEY+TgHZFHJ7Yk/+7ubK/paTEXXrx25V94z2Hk+dN4Kvyvx
lWSTEEbnIZVkzwQiuzpgPcIQKvzPS+s48fyoW1lSo2SPEwMvxzjRr214K5BA
wy2dnZGOIvEWzn5b0XF2YImYscFAHA4q8cfWIiYxoKwV64ccpGKt/FW8IpEC
hANYwETjMGLEQPI1kxIGKkaSGRXlz4evvo7evTt5/uSLewf3OFMAzV+gv1eV
UNFJQoZ5z6XFGgC1E/WWrLGuumAWr3XFsji7ciIC04IYWiOUllBSoy3QT0+n
arCqiVSrpF4WM6t7wTk/ef3quezt4MH+hw/sLbysssIGV/L3Dx8cPGCHZfNc
LDysRRCtKlQj0GQgLIF0lRh2R+gBy4+pzjhaxcjhpsYBKcZAXm7EIPFDdm1K
9GMKi3C2am+WG/IC0moM4INPUjo1z3mOgVxxydpO8naarGk2UFEKCswYYfTY
gn5xoioAVWCswjhazeNO/CAKo5kbHGTCFrygmlky2cgEFsiGmxNXVXIr3ieJ
5TIBsObAQH4HAsexRmfEgh1KI0KabAKGkqa5WcECRIHtwVYgH6DoNXEjlVw3
tJvwwl4UdLsuWb82nldxgLHVyx5OJ1FTzTgWNgAygImFniSed3WKyVK4to1L
zpt0RK+F/EFn28apFvntiQpqyeroSUjPUQXwmQEh5uOn/MjR4avDNrPATz8I
AgMCFNMNzY6Wmbzgd1pwvhmdTmHhLKxW1Wa1NrOpuc5d4kg8yEXKviaLMCRt
N0LCG3ZDYBkN6tR1bhIuL3lCqjZvzQiT9tYNHg7jUlgEc8uCtKhO64hPU3U9
YY8W2VIZ7+nTjRe+2Iot4tCioMPSu442ljqkyivLTd6CfEGfsDCvt8qRHLtT
3liNMuZAF1tmRcLAn7IIOVuhqw2jjZHzwqImuE3SVzFEnVPUiMoibcZbpSZu
12xL52c8FIFIH3ZjKH1pnCCmQE6Sy8JkbxVr8XQ6Kx9H34DAcI5mcZauY0Rn
lIqpk4WvJpKuLcbxluIo5MGlj6TJkmxJo3F6pTWuk7M+lCrVZX/zYb6ieri1
JxXF9jKKIfZQ00WsYSsYEet0m0bAGTAUmrhGr1rlUHM6zlFQ0hNrRRqj4dYz
0atqkWRCTiz8yQLjXk2DVMjSK7YCG0T1CmNKkB9eKcA1N7gnrbyVcs+/z5EK
LrBBohyqpoObKkmSfcJRCXB0erXXBWYFBWVW2RnuKKFQR+NkzUZm2yglpZK0
YvirA2v4a1nA/FkykHytUGmYSGR8RpvWWEfJzUG3gdHZABmmaQkIBNctnyae
YGLTGy2qcMTLnIyUGHZZqnc4aPUqVanLyAUVA88AMtxSP4R8daFixSZ3Lusr
6iCaITjrsgIuyvDlHJUN2WdkfyBzIJuCvwWKAcBrxr8DxMF6oEH04LmQxxnk
AJCp2feH9HuPZS4NIaoQNyUHIyEF20TVDjjt5o3ABikzP+/XcYMHmSRL8kyr
tG53KHjQMX2lDn2nqJsaAyTKFBUEYmmWV2pyVI8nQVUm7tOpyypKjym2GeCr
Ztg8S/R0753MKeTXS0rxZ/VPLUuD2bErbKalpTcekOmlMiF5hIpIvPYj5VmY
ZbKsFn0sG5HPlGJt6kzTxIcIeeRzomDbTGkgm5ZsWuwCOW+usgTqgd0Gai+X
w9qyVVRW04qVFoy03DyWj0HehJHIJeFVoknVIv2SQoA6HJEDjhUTi2BXVO5R
M/nXlqMIYIv1rTezFHvMGp5GMjwnUTIwTK6hmxe8AyCFIVeh7bhpgX+AZcHH
e8V8D8uSovB96w/F6W3gYlmKiRZWFPMZ+B7nH4qEUohaFsG7MHeKddat/MPB
M6CkbWqPUKwo7cSKI1E8wQyDWpOMK7w5Krk5KyEV0psDdCVKSSOxJEVGCRTM
t52pc1yY1GUrSvUoEH7okW1lU9Z6UFP6jIhuuPXU6gic9sEJBkYb9cRPzLlY
koUNzfWGJ9NjolEOVvAc3NBIorCRjWGUIfmjCN7NOhOtHT8P6Vocgr+gtfaw
diYJSyFmYaadT5clCB0/C166dkQ356N5T1IihuS5CgvouHnUODHEqEwBzeAy
4ScvYb1/xTV/s4nhvxEWf/qvJch1C/h7usmjF5zUinnT9OXjJP0p1SefLNM8
5l+fwT6yR9ESh1n99ff41/jnxRQU9nEy24ynecSNohcAqRcbuPrL5JzfPHwT
w9PRGUYUFJjXB3unL/YfPIweA9+ZYeoYzxevJmU6Q2/By8NRdO9g/8EBf/Nt
TlUtTmuSCjDrY5WgA9lbXJrxxL+PacoxHCHBAEViRLE3xN4aIEG4+6tW4QDl
L3LWkD0foxvnm4wynjdVZWwR6N9m39pmIdIyq/97e3tUY5QP5nD6Ji8uMmzm
zVf43c3mRx+orFVOQRTJ7N9ukFea6081tnCYgahdYG95wJ9R9J9Fnb6Js3gN
Imp0WqZlvBpFJ//v/8zSBVyu74rszSj60ya5hEt2WqDV6jFc7JeYH1gh1v4H
5Sa8jDfTJfxRgAz5TZwBJsJXh+lPgCN/jPGl/wASUyaX8GUMlOxPaSxgfLKk
r+mfC4ToixTeRCi/TemvzQhQDmY8i+HzPwPQL+H/8BG99mf47yW+xZMc5jUo
D9F3IPZMl3Ct4Y3XWQx0Cv31sI3TlF4+S/Dhr5Oyjp4WfCmTejp2LNp4LMkF
B3esWOTkpE57SNHhWvGR/OqS/IeSPXLePF7JLWVt1K3Rkscz9NOzpwfjjCjk
IBeFYnzt/wPKilYcUlgBAA==

-->

</rfc>
