<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-14" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-14"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>sriram.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="15"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 98?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 102?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is a fundamental mechanism for detecting and mitigating source address spoofing attacks <xref target="RFC2827"/> <xref target="RFC5210"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. 
This document provides a gap analysis of existing inter-domain SAV mechanisms, describes the problem space, and defines the requirements for technical improvements.
The corresponding work related to intra-domain SAV is documented in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>.</t>
      <!-- Intra-domain SAV is typically deployed on a domain’s external interfaces, including interfaces facing a host, a non-BGP customer, and an external AS (see [I-D.ietf-savnet-intra-domain-problem-statement]). For example, at interfaces facing an external AS, it prevents the external AS from using the domain’s internal-use-only addresses. However, intra-domain SAV cannot determine whether traffic from an external AS spoofs another external AS’s address space. -->

<t>In this document, inter-domain SAV refers to SAV on AS-to-AS interfaces that carry external BGP (eBGP) sessions. The eBGP sessions include Customer-to-Provider (C2P), Provider-to-Customer (P2C), lateral peering (p2p), and Route Server to RS-client connections. The terms customer, provider (transit provider), and lateral peer (non-transit peer; peer (for simplicity)) used in this document are consistent with those defined in <xref target="RFC7908"/> <xref target="RFC9234"/>. Further, <xref target="RFC9234"/> mentions Route Server (RS) and RS-client. An RS-to-RS-client interface is akin to the customer interface. For the purposes of SAV, an RS-client-to-RS interface may be treated (1) like a provider interface for simplicity, or (2) like a union of lateral peers considering all the ASes the RS-client chose to peer with at the IXP RS.</t>
      <t>Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) based techniques are currently utilized to some extent for inter-domain SAV. In this document, the inter-domain SAV methods from only the existing IETF RFCs (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>) are considered for the gap analysis; IETF work-in-progress documents are not considered. This document analyzes the available methods and attempts to answer: (1) what are the technical gaps (<xref target="gap"/>), (2) what are the outstanding problems (problem statement) (<xref target="problem"/>), and (3) what are the practical requirements for the solutions to these problems (<xref target="req"/>).</t>
      <!--Beyond the capability of intra-domain SAV, inter-domain SAV leverages inter-domain information to enable detection of cross-external-AS source address spoofing on eBGP interfaces.-->

<t>The following summarizes the fundamental problems with existing SAV mechanisms, as analyzed in <xref target="gap"/> and <xref target="problem"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: limited propagation of a prefix and hidden prefix.</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead (HOO): ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The HOO issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>To address these problems, this document specifies (<xref target="req"/>) the following key technical requirements for any new solution:</t>
      <ul spacing="normal">
        <li>
          <t>Improved SAV accuracy over existing mechanisms: Any new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and have superior directionality property (reject more spoofed traffic) than existing inter-domain SAV mechanisms.</t>
        </li>
        <li>
          <t>Reduced operational overhead: Any new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. Any such mechanism <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
        </li>
        <li>
          <t>Benefit in incremental/partial deployment: Any new solution <bcp14>SHOULD NOT</bcp14> assume pervasive adoption of the SAV method or the SAV-related information (e.g., Resource Public Key Infrastructure (RPKI) object registrations). It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
        </li>
        <li>
          <t>Automatic updates to the SAV list and efficient convergence: Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the BGP (FIB/RIB) data, the SAV-related information (<xref target="terminology"/>), or the SAV-specific information (<xref target="terminology"/>). It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.</t>
        </li>
        <li>
          <t>Providing necessary security guarantee: If any proposed new SAV method requires exchanging SAV-related or SAV-specific information between ASes, security mechanisms <bcp14>SHOULD</bcp14> exist to assure trustworthiness of the information.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV List:</dt>
        <dd>
          <t>The table of prefixes that indicates the validity of a specific source IP address or source IP prefix per interface. Sometimes the terms 'RPF (Reverse Path Forwarding) list' or 'SAV rules' are used interchangeably with 'SAV list'.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results in packets with legitimate source addresses being blocked improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results in packets with spoofed source addresses being permitted improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Customer Cone:</dt>
        <dd>
          <t>The Customer Cone (CC) of a given AS, denoted as AS-A, includes: (1) AS-A itself, (2) AS-A's direct customers (ASes), (3) The customers of AS-A's direct customers (indirect customers), (4) And so on, recursively, following all chains of provider-to-customer (P2C) links down the hierarchy.</t>
        </dd>
        <dt>Customer Cone Prefixes (CC Prefixes):</dt>
        <dd>
          <t>IP prefixes permitted by their owners to be originated by, or used as source addresses for data traffic originated from, one or more Autonomous Systems (ASes) within the CC.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>Objects registered using Resource Public Key Infrastructure (RPKI). This can include existing RPKI object types (e.g., ROAs and ASPAs) or any new type(s) that may be proposed.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>Information dedicated to SAV, which may be defined and exchanged between ASes using a potentially new inter-AS communication protocol. The information may also be in the form of new RPKI object type(s) meant to assist SAV.</t>
        </dd>
      </dl>
    </section>
    <section anchor="SAV_methods">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. One may think of using ACL as a disallow list on a provider interface to block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes, etc. But it is impractical to store and maintain a very large and dynamically varying set of unallocated IPv6 prefixes. Also, for the customer interfaces, the ACL method is impractical while other techniques (as described below) are more effective. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knowledge of IP address prefixes it has allocated to manage those services. Here ACL can be used in an allow-list form.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/> <xref target="RFC8704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always hold in practice, and to address cases where it does not hold, many enhancements and modes of uRPF have evolved. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We briefly describe these modes as follows:  </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode. It permits a packet only if it has a source address that is covered by a prefix in the FIB, and the next hop for that prefix is the same interface that the packet arrived on. This mode can be deployed at customer interfaces in some scenarios, e.g., a directly connected single-homed stub customer AS <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of a packet is routable on the internet by matching it with one or more prefixes in the FIB, regardless of the interface on which the packet arrives. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses from prefixes that are not routed on the global internet (e.g., IANA-allocated private-use addresses, unallocated IPv4/IPv6 addresses, multicast addresses, etc.).</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: Unlike Strict uRPF, which requires the packet to arrive on the exact best return path, FP-uRPF allows a packet to pass as long as the router could reach that source address through the interface it arrived on (based on the feasible routes in the Adj-RIBs-In <xref target="RFC4271"/>), even if the route isn't the primary route (per best path selection). This makes it more effective in multi-homed environments where asymmetric routing is common, as it prevents legitimate traffic from being dropped simply because it didn't take the "best" path back to the sender.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm A (EFP-uRPF Alg-A) <xref target="RFC8704"/>: EFP-uRPF Alg-A expands the list of valid source addresses for a specific interface by including all prefixes associated with any Origin AS that is reachable through that interface. Instead of only accepting prefixes directly advertised on a link, the router identifies all the origin ASes present in the BGP updates received on that interface and then permits any prefix from those same ASes that it sees elsewhere in its Adj-RIBs-In (associated with all neighbors — customers, providers, peers). This "Origin AS-based" approach provides significantly more flexibility than strict or traditional FP-uRPF, as it accounts for cases where an AS in the CC may send traffic for one of its prefixes over a link where it only advertised a different prefix (multi-homing and asymmetric routing scenarios).</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm B (EFP-uRPF Alg-B) <xref target="RFC8704"/>: EFP-uRPF Alg-B provides even greater flexibility (compared to EFP-uRPF Alg-A) by aggregating all customer interfaces into a single "customer group" for validation purposes. The router first identifies all unique prefixes and origin ASes associated with all directly connected customer interfaces using only the Adj-RIBs-In associated with them. It then constructs a comprehensive RPF list that includes every prefix originated by those ASes, regardless of whether those prefixes were learned via customer, peer, or transit provider links. This list is applied uniformly across all customer-facing interfaces, attempting to ensure that legitimate traffic from a multihomed AS in the CC is never dropped, even if the traffic arrives on a different customer-facing port than the one where the specific prefix was advertised. In comparison to EFP-uRPF Alg-A, this method (Alg-B) reduces the possibility of improper block but at the expense of increased possibility of improper permit, i.e., reduced directionality.</t>
            </li>
            <li>
              <t>Virtual Routing and Forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV list.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential for preventing source address spoofing traffic at all AS interfaces — customers, providers, and lateral peers. An ideal inter-domain SAV mechanism must block all spoofing traffic while permitting legitimate traffic in all scenarios of interest. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms for different types of interfaces under various scenarios to identify their technical limitations.</t>
      <section anchor="sav_at_cust">
        <name>SAV at Customer Interfaces</name>
        <t>To prevent source address spoofing on customer interfaces, operators can enable ACL-based ingress filtering, or uRPF-based mechanisms such as Strict uRPF, FP-uRPF, or EFP-uRPF. However, the ACL method typically has high operational overhead. The uRPF-based mechanisms may cause improper block in two inter-domain scenarios: Limited Propagation of a Prefix (LPP) and Hidden Prefix (HP). They may also cause improper permit in the scenarios of source address Spoofing within a Customer Cone (SCC). The LPP scenario occurs when an AS applies traffic engineering (TE) using a no-export policy. One example is when an AS attaches NO_EXPORT BGP Community to some prefixes (routes) forwarded to some upstream providers (in multi-homing scenarios) (see <xref target="noexp"/>). Sometimes this type of TE is done without attaching the NO_EXPORT, i.e., by selectively propagating different sets of prefixes to different upstream providers. The Hidden Prefix (HP) scenario is typically associated with the Direct Server Return (DSR) scenario; anycast prefix in a Content Delivery Network (CDN) application is not announced by the AS where the DSR (edge server) is located (see <xref target="dsrp"/>). Source address Spoofing within a Customer Cone (SCC) scenario arises when a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC <xref target="spoofing_within_cc"/>. It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in the SCC scenario.</t>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with the ACL method, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the LPP, HP, and SCC scenarios mentioned above. Illustrations and analyses of these gaps are provided in <xref target="noexp"/>, <xref target="dsrp"/>, and <xref target="spoofing_within_cc"/>, respectively.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for customer interfaces for the scenarios of interest.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |         possible           |
+----------+---------+Operational-+-------------------+--------+
|          |         |  Overhead  |                   |Improper|
|Spoofed   |  no SCC |    (HOO)   |                   |Permit  |
|Traffic   |         |            |   Functions as    |only for|
|          |         |            |      Expected     |EFP-uRPF|
|          |         |            |                   |Alg-B   |
|+---------+---------+            +-------------------+--------|
|Spoofed   |   SCC   |            |                            |
|Traffic   |         |            |       Improper Permit      |
|          |         |            |    (in partial deployment) |
+----------+---------+------------+----------------------------+

LPP = Limited Propagation of a Prefix
HP = Hidden Prefix 
SCC = Spoofing within a CC
'Functions as Expected' connotes the absence of improper permit. 
It also connotes low operational overhead. 
]]></artwork>
        </figure>
        <section anchor="noexp">
          <name>Limited Propagation of a Prefix (LPP) Scenario</name>
          <t>In inter-domain networks, some prefixes may not propagate from a customer to all its providers and/or may not propagate transitively from the providers to all their providers due to various factors, such as the use of NO_EXPORT or NO_ADVERTISE Communities, or some other selective-export policies meant for traffic engineering. In these cases, it is possible that a prefix (route) announcement in the CC associated with a customer interface has limited propagation in the CC and is not received on that interface. Then the prefix is invisible in BGP at that interface but the traffic with source address in that prefix may still be received on that interface. This can give rise to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF Alg-A, which is the focus on in the following analysis, while it also applies to Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of a prefix caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \(C2P)   |(C2P)        (C2P)\      (C2P)\
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t>In the scenario of <xref target="no-export"/>, AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. AS 1 advertises prefixes P1 to AS 2 with the NO_EXPORT community attribute attached, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive on the interface with AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 via AS 2, AS 4 improperly blocks these packets. The same improper block problem occurs with the use of Strict uRPF or FP-uRPF. EFP-uRPF with Alg-B can avoid the improper block in this specific scenario, but even this SAV method would have the improper block if the TE at AS 1 is such that none of the customer interfaces at AS 4 receives a route for P1 (or P6).</t>
        </section>
        <section anchor="dsrp">
          <name>Hidden Prefix (HP) Scenario</name>
          <t>CDNs use the concepts of anycast <xref target="RFC4786"/><xref target="RFC7094"/> and DSR to improve the quality of service by placing edge servers with content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest edge server (DSR) location. Usually, only locations with rich connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, from where content is sent directly to users. DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, the ASes serving the edge servers do not announce the anycast prefixes through BGP, so the anycast prefix is hidden (invisible in BGP) on the customer interface side at intermediate ASes which — with existing inter-domain SAV mechanisms — would improperly block the response packets.</t>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5; AS 4 is the provider of AS 1, AS 2, and AS 5; and AS 2 is the provider of AS 1. AS 2 and AS 4 have deployed inter-domain SAV. When a user at AS 2 sends a request to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast server in AS 3 receives the request and tunnels it to the edge servers in AS 1. Finally, the edge server sends the content packets to the user with source addresses in prefix P3. Let us say, the forwarding path for the content packets is AS 1-&gt; AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF Alg-A or EFP-uRPF Alg-B (or any other existing uRPF-based mechanism) at the customer interface of AS 4 facing AS 1 will improperly block the response packets from AS 1.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ 
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 2, AS 1] /     |      \           \
         P1[AS 2, AS 1] /      |       \           \
              P2[AS 2] /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \(C2P)   |(C2P)      (C2P)\      (C2P)\
                    +---------------+         +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t>Further, there are cases of specific prefixes that may be exclusively used as source addresses (legitimately) without being advertised via BGP by any AS. While different from DSR scenarios, these cases similarly result in existing inter-domain SAV mechanisms improperly blocking legitimate traffic originating from such prefixes.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone (SCC) Scenario</name>
          <t>In general, improper permit of spoofed packets in SCC scenarios is unavoidable for various uRPF-based methods in partial deployment. For example, consider a topology in which AS 1 and AS 2 are customers of AS 3; and AS 3 is a customer of AS 4. AS 1 and AS 2 originate prefixes P1 and P2, respectively. AS 4 performs SAV on its customer interface with AS 3. P1 and P2 are announced from AS 3 to AS 4 and they would be included in the SAV list (allowlist) of AS 4 with any SAV mechanism. Assume AS 3 doesn't do SAV. Now as an example of SCC, if AS 2 spoofs AS 1's prefix P1 and sends the spoofed packets to AS 4 (via AS 3), there is no way for AS 4 to detect the spoofed traffic. AS 4's SAV cannot differentiate between the spoofed and the legitimate packets that have source address in P1. In an SCC scenario of this nature, the only recourse for blocking the spoofed traffic is for AS 3 also to be upgraded to do SAV, i.e., deployment of SAV closer to the source of spoofing.</t>
          <t>Another scenario is highlighted in <xref target="customer-spoofing"/> while using EFP-uRPF Alg-B method on customer interfaces. This scenario is non-SCC from the perspective of each individual customer interfaces of AS 4, but it is SCC from the perspective of AS 4 as a whole. EFP-uRPF Alg-B relaxes directionality to reduce (or eliminate) false positives and that makes it more susceptible to SCC (per the latter perspective). This is expected because EFP-uRPF Alg-B somewhat conservatively applies the same relaxed SAV list across all customer interfaces.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \(C2P)   |(C2P)      (C2P)\      (C2P)\
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's customer cone, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, AS 4 will improperly permit the spoofed packets from AS 2, enabling them to propagate further.</t>
          <t>In the scenario of <xref target="customer-spoofing"/>, Strict uRPF, FP-uRPF, and EFP-uRPF Alg-A — applied on the customer interfaces — work effectively to block the spoofed packets from AS 2. This is because these mechanisms have stronger directionality property than EFP-uRPF Alg-B.</t>
        </section>
      </section>
      <section anchor="sav_at_peer">
        <name>SAV at Peer Interfaces</name>
        <t>SAV is used at peer interfaces for validating the traffic entering the validating AS and destined for the AS's customer cone.
The data packets received from a customer or lateral peer AS must have source addresses belonging only to the prefixes in the customer cone (CC) of that AS. 
In both cases, the focus is on discovering all prefixes in the CC of the neighbor AS.
So, in principle, the SAV techniques suitable on a customer interface may also be used on a peer interface, especially EFP-uRPF Alg-A or Alg-B, which are more accommodative of asymmetric routing.
Indeed, asymmetric routing is thought to be prevalent for peer interfaces.
If SAV techniques suitable for customer interfaces are considered for peer interfaces, then the gap analysis of <xref target="sav_at_cust"/> would also be applicable to the SAV for the peer interfaces.
However, due to increased concern about asymmetric routing, network operators may conservatively use the same relaxed SAV techniques for peer interfaces as those for provider interfaces, e.g., Loose uRPF <xref target="sav_at_prov"/>.
In that case, the gap analysis of <xref target="sav_at_prov"/> would also be applicable to the SAV for peer interfaces.</t>
      </section>
      <section anchor="sav_at_prov">
        <name>SAV at Provider Interfaces</name>
        <t>SAV is used at provider interfaces for validating the traffic entering the AS and destined for the AS's customer cone. <xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider interfaces in the scenarios of interest. ACL-based ingress filtering may effectively block spoofing traffic from provider AS, while appropriately allowing legitimate traffic, but it has high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In <xref target="provider_peer_gap"/>, Spoofed from Provider Tree (SPT) is a scenario where the spoofed traffic comes from the provider tree, i.e., the providers in the transitive hierarchy above the validating AS. The spoofed prefix may belong to (originated by) any AS in the Internet other than the spoofing AS; it may even belong to an AS in the customer cone of the validating AS (example below).</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering and Loose uRPF at provider interfaces in the scenarios of interest.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|             |            |  Functions    |
|Traffic   |     --      |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofed   |   Spoofed   |  Overhead  |               |
|Traffic   |     from    |   (HOO)    |Improper Permit|
|          |   Provider  |            |               |
|          |  Tree (SPT) |            |               |
+----------+-------------+------------+---------------+

'Functions as Expected' connotes the absence of improper block.
It also connotes low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider-spoofing"/> illustrates a scenario of SPT and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF.</t>
        <figure anchor="provider-spoofing">
          <name>A scenario of source address spoofing from provider AS.</name>
          <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>In <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2 at AS 2. AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. Suppose AS 4 and AS 1 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>Using the ACL method in the form of a disallow (deny) list at the provider interface of AS 4 (facing AS 3) incurs a very high operational overhead. As mentioned before (<xref target="SAV_methods"/>), it is impractical to store and maintain a very large and dynamically varying set of unallocated IPv6 prefixes in the ACL.</t>
        <t>Applying Loose uRPF at the provider interface of AS 4 (facing AS 3) can greatly reduce the operational overhead because it uses the FIB as the information source for allowed prefixes, and can adapt to changes in the network to prevent false positives (improper blocking). 
However, using Loose uRPF at AS 4 will naturally permit packets with source addresses in P1 (since P1 is present in the FIB) and hence will not prevent the improper permit of the spoofed packets from AS 3 <xref target="provider-spoofing"/>.
This is an expected limitation of Loose uRPF.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <t><xref target="problem_sum"/> provides a comprehensive summary of the gap analysis in <xref target="gap"/>. It highlights the scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead. The various entries in the table in <xref target="gap"/> can be traced back to the terminology and analyses presented in <xref target="gap"/>.</t>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+-----------+----------+-------+--------+
|Problems|    ACL   |   Strict  |  Loose   |FP-uRPF|EFP-uRPF|
|        |          |   uRPF    |  uRPF    |       |        |
|        |(CI or PI)|   (CI)    |  (PI)    | (CI)  | (CI)   |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |    YES    |   NO**   |      YES       |
|Block   |(manual   | (LPP, HP) |          |    (LPP, HP)   |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |NO (no SCC)|   YES    |   NO (no SCC)  |
|Permit  |(manual   |YES (SCC)  |  (SPT)   |   YES (SCC)    |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|        |   YES    |                                       |
|  HOO   |  (Any    |                  NO                   |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
CI = Customer Interface
PI = Provider Interface
HOO = High Operational Overhead
LPP = Limited Propagation of a Prefix
HP = Hidden Prefix
SCC = Spoofing within a CC  
SPT = Spoofing from Provider Tree
** Typically, an HP (like DSR prefixes) is hidden on the CIs
   but received on a provider or peer interface; 
   hence included in the FIB and that helps avoid
   improper block for Loose uRPF.      
]]></artwork>
      </figure>
      <t>The problem statement that results from the gap analysis can be expressed as follows. New proposals for SAV should aim to fill in the following problem areas (gaps) found in the currently standardized SAV methods (found in IETF RFCs):</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: limited propagation of a prefix (e.g., NO_EXPORT and some other traffic engineering (TE) scenarios) and hidden prefix (e.g., CDN/DSR scenario).</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead (HOO): ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The HOO issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>The limitations of existing uRPF-based mechanisms are due to their exclusive reliance on BGP data. Although the algorithms themselves have evolved (e.g., <xref target="RFC8704"/>), the underlying input has remained unchanged, inherently constraining their accuracy in scenarios such as LPP and HP. With the availability of authoritative SAV-related information, plus the potential SAV-specific information (<xref target="gap"/>), it would be possible to develop comprehensive new SAV algorithms or mechanisms to overcome the existing gaps.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements for any new inter-domain SAV mechanisms which may be proposed to bridge the technical gaps of existing mechanisms.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>Any new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and have superior directionality property (reject more spoofed traffic) than existing inter-domain SAV mechanisms. The requirement applies for all directions of AS peering (customer, provider, and peer).</t>
      </section>
      <section anchor="reducing-operational-overhead">
        <name>Reducing Operational Overhead</name>
        <t>Any new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. Any such solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
      </section>
      <section anchor="early-adopters-benefit-in-incrementalpartial-deployment">
        <name>Early Adopters Benefit in Incremental/Partial Deployment</name>
        <t>Any new solution <bcp14>SHOULD NOT</bcp14> assume pervasive adoption of the SAV method or the SAV-related information (e.g., Resource Public Key Infrastructure (RPKI) objects such as ROAs and ASPAs). 
It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
      </section>
      <section anchor="providing-necessary-security-guarantee">
        <name>Providing Necessary Security Guarantee</name>
        <t>SAV-related information, such as RPKI objects, may be used for designing a more accurate SAV. Such information must be protected at their repositories and during communication to the relying parties (the BGP security community is already diligent about this). If any proposed SAV method requires exchanging SAV-specific information between ASes, security mechanisms must exist to assure trustworthiness of the information. The idea is to prevent malicious injection or alteration of the SAV-specific information.</t>
      </section>
      <section anchor="automatic-updates-to-the-sav-list-and-efficient-convergence">
        <name>Automatic Updates to the SAV List and Efficient Convergence</name>
        <t>Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the BGP (FIB/RIB) data, the SAV-related information (<xref target="terminology"/>), or the SAV-specific information (<xref target="terminology"/>).
It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.
In this context, convergence refers to the stabilization of the SAV lists on the AS-to-AS interfaces performing SAV.
It is essential that any new SAV mechanism converges to the correct updated SAV list in a proper manner, minimizing both improper block and improper permit during the process.</t>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>Any new inter-domain SAV mechanisms should work in the same Internet Protocol (IP) address scenarios as existing SAV methods do. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both the global routing table based forwarding and Customer Edge (CE) site forwarding of VPN traffic.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, the focus is on the validation of the outer layer IP source address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>The scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, any new inter-domain SAV mechanisms <bcp14>MUST NOT</bcp14> modify the data plane packets. Existing architectures or protocols or mechanisms can be inherited by any such mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The SAV list will be generated based on routing information from BGP (FIB/RIB), SAV-related information, and/or SAV-specific information. If the information is poisoned by attackers, the SAV list will be inaccurate. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. BGP routing security using available methods for the prevention, detection, and mitigation of route hijacks, route leaks, and AS_PATH manipulations should be deployed which leads to greater accuracy of the BGP (FIB/RIB) information used for computing SAV lists.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing intra-domain source
   address validation mechanisms, describes the fundamental problems,
   and defines the basic requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
        </reference>
        <reference anchor="manrs" target="https://manrs.org/resources/training/tutorials/anti-spoofing/">
          <front>
            <title>Anti-Spoofing - Preventing traffic with spoofed source IP addresses (Module 5)</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author initials="D." surname="Montgomery">
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="NIST SP 800-189r1" value=""/>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 538?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Ron Bonica, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, and Roland Dobbins for their reviews, comments, and suggestions. 
Apologies to any others whose names the authors may have inadvertently missed mentioning.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9V923IbR5bgO74iR4oYAS0AFEnJlul2T4MUZWFMkRiCck9P
26EoAEmgrEIVXBdSMKWJ/Y1922/ZT9kv2XPLS10AgnL3xjajWwYKlbeT535O
nuz1eq0sD+LZ+yBKYn2k8rTQrXCV0qcsP3j27JtnB61pkB+pML5O1GN1stDT
D62smCzDLAuTOF+voN3w9Op1K0h1cKS+17FOg0j97fJ0dDY4Of25dTuHF+Jc
p7HO1Wk8D2Ot0zCeq6sg+6BeJ+lUt1qzZBoHS+hqlgbXeS/U+XUvC26gSS/E
tr1ZsgzCuLdKk0mklz2Ydq6XOs57+89brTzMI2j7fbBSgziI1lmYddWIX1Vj
82pXwVLVpf61CFN6kKnrJOW59V5R/2o8+FG1gskk1TcyaxkZfzk/var32oqC
GFao41YrKPJFkh61egCt7Ei96quzsKUUL+xVEPPXJIXXrzKAwKII1Ls4vNFp
FuZr+GkK/zlSxzr8BX7F70kR5yk8OlmEcQAPNEwlgt1JonAWxH/OpZe+nhX9
aWwGPuur/whjO/JZEE8XGgDOD2n8/1ok8XxewC8FTCuYJGmQJ+lD5vBrGEfT
P/82n0bBpD7+WVi48cNJGMuTv9PgUVhEk+bB3/bVG+h6bod/C139ivhmHtMc
4MutDh8w5AJbL6WvPy+oeX+aLM24P/TVOA3TYGkH/iHJww9BFKyKWeh+o9Hf
jQfqPMiBgIBUhnEGCFzkWiXXiFfxLEhnGSHrlZ4u4iRK5ggcg5bUeDi+spP/
PgjzBSDRpEhxBameQ8ew8Ff+cgDRcj1jvM1wpMESyHDqrTCjKfaR9v48x0e0
vFacpEuY6o0+arWQC9hvSl2+Pnl+8PW+fHxxsP9MPn79zbOX8vGbg8Pn5umz
b8zHw6+fmY8v3ceDlwdfm34PvzJPn3/98iv8OOy96lcYQxpsZAzYAv63DOI0
w89K5UE618DKFnm+yo729uinPuzHXqqzpAA+lO1Bj2EMG7wH+5GkYRBle0Gc
h71slSTX+Jx7Yn4zwF/G8ovqAW/QNzAyfoF+rq/DqbqFnVHUGGDPg6jhSAWz
GYyZwUa03yazItLqRYd6NiwEP0OPhCxvB+eXY3oyg7XBsNMptp2pg2cHX7Xg
hzBLps1LvL297YfCe+ElgN66smBgvHsHz/Zf7MmUYPI9QKbedBFEETAN3Uuu
e+FqAwBsGwVtlG2D6AWrNG02rsyKhTHPzVskzol3MA6zvHl1sySk1ew/63/1
7ODlHhJFfzzqv3z2rLf/8pt0vx+uZtSHnfGj4ySd6RRIJte3wRrZeZ5Mk0iN
9bRIgZpERmRhFOp4qh/V5t5A7vhH6xGqtC+BBHgLMnKeAKmtG180iz14QV8z
IEkYG6gMpoovqfFI2eU8ws0u0tX15s2ehtk0Qbrdm+7NguWejt8XgMKTpMj3
MlniHmJEFIVzXOAe9tdfza5LUAJmMQ2yHACBwkmrUQBoDKL6FjgT7vZpvADu
7QlR3H63mzq9CQHRAbg3IUC7t/EXda7z2yT9oE5n8wZYGzw5wVWp8ToD0gbJ
Poyn/RL0nr1otfr9fqvV6/WATWZAfdO81bpahJkCBC9wnmrFYwJjVXNQFAJR
FBBX9UfAMVyXr2sYchXCUDcBCl3k2WoJbDkAvMTJQI/TNJxAvwgDYUOA+sFU
s8Ix00AD8nNaVT5yZPAA60iFS5wg/yQrWYazWQTK0WMEbQp8Yoqjt1pjnphQ
n/rRTawNWkoH+AGs8boAOYK9Qd92vjTmTMOotFyc3jLMw3lAXysLNuSrgjwP
ph8ydXcnPPrzZ/6MHN98Ro5uPr+kz331e3cAtbF/PKyvkHUlKax5lcSE3oSS
qY4ClJh5onxJQ5PyVgVvwMO/PUw4/dxH9G21/vgvsM3Dht5Br8aZRmtY0ipK
1jAKbG+g+K3/8z/+ZwYgQ6LC1SDIrgEGAKEwnkbFzAKSnir4l7ZRLZIMtWAV
J3Hv+PuRmoKSj7yJgQcKqu1zMFbtTOsHr6vTRzYB/QTLVYSbkjdNpDQQTBpR
g0Qn75w/i+s0WarCihhv/SzXgqhXZCCkYgCVlaqgAia3yLq69a2bBnGc5EQE
KahzWt0uNGpPVmTTiBVYECmgSpbQq95PNBVHMbDMvur1/tRqDWOYsIcn3Tpq
p/oauCsiGH6D/R2Me3nSg/E8mOULgOE0SNO1Gxb3rq3h3w5IDLLDYMmIxvjM
PhJk0OpEthk7t5y3fXIw6nQdj4bfzHuqPTo4gd8Q/9GWW4nB1l4drDpiRSWo
ryI7R8gl6nLcm6LEhKkmcayJUcmcEM6Zh2orOwOAeJyFli+k0rc/rGojrtoX
4cm38hwpOgNCjkJUgjsdQBImxRLUFVilOCVgMzl+JX0MBAzINOYV1ISYFuqs
hoGh0ooM7HWR4oZ3vacKuyXwlmDQvhx3GDIGEn3QD/EbANZBx24sMekPON2E
dScDe/sGUxIxOpDRScZaO2AKQskNw/17HS9BrZkA2MEcR+bU3u+AufQB2LqD
vHu5DMUuiFvVPrANihiFCozqb0nG8JwxTgCPojkOxsJ2PUwgMMP6aMMI8oDK
pCn85wjeA/nQYl1WnSQo4CIwEkHpaA9OzhiWxT1qSLu4HL3uqEmAW8/s/dcC
5QtuegEcPc6BLRQ5KHO/MSfPAMZERzA/XHuVJvuqTrc44waxBFgEVhpxC+I+
zLlEjKFHBG0XUPCPT0bq8GVJeOLa8PHL55tkZ8chLgAa5m6ULF9wfsvDoLTq
MTeeExsyU2dAILdzHSFNlugD+/pN9i64AasvAJZul0dyIQfmvsqJUQEd3ur0
iLDqFjkTjpATlRvhCjOEVd/dwX9hHV3Cp9KrQDbkdUI4iQSBBlaaG1nSwU7k
KXWEc2kfVjpboapH49blPfycJVHB1Mp0lmlvyLs7aANd91kQH+s1yH+mxmAV
TABrwB4A7K/KkAZWHiGGBnOdlX+y9nJChK5jAq4oYExa0zTJsp5h7cj8N6lh
8D7xdycc+iRpkMleJ1GU3JISVyyXQRqaLfXVQLtyokWLq1UtK8gMVghzpJ0k
8HsbctRq/UENUZFaAXVPomT64Uidmj6RMHtMl65rmNs1SDymmbDUFPg52Nqw
OQnw+fBGZx1i5bdJRSWfAgjTMMnQBbQkhwb2EswDA07kcsDYP9J0F6BA61ie
9EsTXqH0B+PpL2SgM1eoz70KmrDc3Mw61vNAZg3qhVoEqxUMiwpbvEZVTgsW
CdNtO2HoM1bivlYWgn250tPwmtVAGPqa9pMJk5TTj7LFM8D6KfuSEGGR1smN
kW9iLp+JGEChQIKeLkLAXfWbTpPKngAsmPnBpmShRw4VIICaAbKG1K72eYIW
2TBH8QazSuYxc14k2SKOEJ9RoJL4uy5AdgSzZGX2jnTfuCwOYTUAsJOTDr5g
OTFL0NjyNdr++vbAIMj9cKC1UTGJAn1UQgUw1ZupbgqSRPg80o1M8OQEhuvr
ftfDuFzhZAdFnsTJMikysVhBoI07yrbDWRmPkOiarFWS3sdcCygW3ux3EGXf
hPOFwlUZfyFYLulCB8AM31xcdI4UiEtBV5gvTR4BeR1GOYvoUIxHQJcshA1B
lALkaOqSiB8AF2s9I5ZZrNDGxiFUWsD2oT+tILsEcWcWrHIS8AwAQN8UmDuO
iSTD3BDgk4dLDS2gaaxTVgph5gCHrECNXvMuwXTygBWiJlJ0ZAiEfJXYjSoz
9W5F/cuYhrTH7ZktWn75Qa894VUTIkjBsb61gsSxvRvhDwEiSDBdExDd1N18
0VHInWw2btXbd+MrkL9JOKtTIfOyAKg0K+B5iDZ8mea5AXxop/oX+EEtE0Rp
wTKxbHDlZNfcb2oTr7zUiDSzRkTZfU2gihLJIb4AZaAwZMPWYk8sPqDZOg6W
4VSUjmy9BF6XgkFmcMpSbJ8Gz4rpojoYAYm4TCPB0PrvIRda+rGOAaORtTF3
YwG6twrSPIQO2SYnL7OFg0EQNX5z8e7slTq/gP0EDAdKhqncBBnIhxK3QzR0
mqQShQWe9Iznwdce2ro/B2ZzKY5bNSomoLOrHwB7h/F1ClpyWkzzAna9fTn6
YQjsckKIgMEAFAekBIFQAdYsE5zIGnWQ0m7AzFC5n6xFBiHINcjrKUo2fGaU
FmJajj9eV1gn0BoyWoRdHV4E3YHBA2EvRjljTQpNAMQAjThrTErYQXJX7oR3
doGKfToEehjCY0o4GlnRr4fHe5fD4w76EoPu9i24u2OfAQVkSCX1Nk04zXR7
E38DyuQgnLYEhttFCJTDIlq2Q0CS6p4HFYNOKDcIwiO7g2CLw54EIOyN+1fN
iwDs6VyjoL4mBofsI0GKQMB6OCncEH1NBDvRFi10YPkblz4BqtY6JsOw6wb3
tEEBA/EjYg9ALajVY+gZGAKKWqJkI/dt37DEx4/LgdwzmF0B+jdrw8jToQcQ
YY+QLTzq8n+RJvHz5el/vBtenr7Cz+M3g7Mz+6Elb/DU3CfX8uTi7dvT81fc
GGm89Kj16O3gr4/YVHl0MboaXpwPzh41eyVgxRNRZ0B+IjiDrGU8nKR5g4n4
v//XPtqI/4K24/7+N6TH4ZeX+1+jUgeqS8yjkQnKXwFa6xaqoEFK8he0LLBn
QmBgrNxni+QWlFRQehBX/oaQ+flI/XEyXe0//5M8wAWXHhqYlR4SzOpPao0Z
iA2PGoax0Cw9r0C6PN/BX0vfDdy9h3/8twhdfb39l/8GBlPrsbpyVKnuHvs0
2mrdHd2QI+9zC0nhjMJPR+zKIkkGCMkKj/HOhWDLTpmPwUsUJxBVOVCWNmrB
P6Qe91BUqFXZAzQGHRi1p0xsbPSkPQGdCJh8s0ukQ4zjCfb9hFyMqLQ9IXwT
/xh0wnwQ1rJmS/CJYThP0CVjTaRjtulk7V74A2ZfRHnGHH76QediUUYga2C2
yMZqImGikXmQRqOdioP+7YJ1AxQYrErljgP2vemMxGLbfT6VuGt1Mmwk5A+b
jvWRnmDGjMyl9NBaK4GahzfEATFyASoukTg6eQfGUa8zdqXgM9C7Mx1ds8ME
HzzJRM2z1lCGpgRYmV3yg1x5dhJH9Dc1QgQtP8MunsMwMUJHoe2UIodGSYnG
plOPiXssQMZmjPfOWzwteYsBPvEH5HC3LFxBZKUBYNq6CjOMkjPtAJzslw6C
0pIB/Og2Z0KutTBV0LW4y4FvJmkI4ijgF0gQE34je6vuNsW8QLpbD7/XFnWZ
Lplt8BIpzTXzzQC9bP3BsnxJOHTSCVdyQcpXJtoXOfA4hrGz/iZ+uikhIrvx
reKOLxj9Dr0LmdUOLwasPQ/GowHM2LNf8L121mGGJS5iI/aR6ktyvLIa7ysg
MvO6mYQtuqikoCLOXRqnOilwrDTgDnm6gAACrOYEvbAhKT9OoQMjeJosl+T5
pQFXEqFnu9HXMHBIkGkiRsWsS5eIp9hfFUq4+qVGy5d1DdQ60OOL4sD6raop
X+qt01fuHsOD9+IZ/YwRnsq7pbgdIDDOBmGRi4ecvISRalMkD1larMG2nyS4
6p7za4BxEmbsAMftJ6hKDBC6gm4mnMOAdpHwhONL3NrE+Dg2OTMIhoBiKA5u
0JQCJPcUMuf+zckXFJFyVde02S72smKsJeWcDnd3mLdB+grl2dAnTFT5/Nmg
DM4C5hvqWy9wk7GRwXZCzVLz+7eurR08IBhytvEBpgGgXHQLJLHn3IBlcyMr
R7jXJBYWVOUtXqDx7+2FcbNCZ4xwPTYSZg1uFXwBeGeE2L7VHVOLZljzmrhd
X13EHENCZvcBiYkJFueDnmEQL1mA0oFNFMblemAJ50uOXQFZWWOi4EbElmcY
kyjfOjewdXL9Me+y0Q/TGA7OB6xbofOU42MkBGKcGzOo4ejm+R7885UdvKt0
Pu2r4yJX7B1EwW/iBxgdylECUFYE+k8DAjNsylpFmGvDKQbspSAaBxpaE+h0
ToAqD+7G7asB8KmujUrUg30Zm54IZLG9KrNjU5AdhV6kqw2wcDbDRMO+cOiI
ZJk13/v3oucC93aFcUAT+MDJTtIkmE2YE5Hqi56nOZoSsBMTHjZFDxh2GCXJ
SrVfjTF4x0/Es2NcrGSiSgaQRRkcmFBBfYiT20jPbPqY4V4WdWDPaJoWyLBl
gP1g9klIVzpHssTxEJrCQU1wOCB7KLntEfIigyZO0+hnBL4CMwsyE3ctscpU
O95wX7aUhCk3pslIAgrg/kwHhEio4l+zdU1SBV2iIAJCliTiGlvbqEKFXDBb
GwGzhtVnBrUmOkO/7keAIWwTsXDEnBwVIZSmyCNRmNp3UZaQhDDvczwNqZmi
pIyLZGZTdCIQpgmwSTEWIs5tNRW/rsX1rteTM4aumTNIH2CjFtGMXTgBQB2R
7yYMnHfc6w2QLWFAixvp9fDYY8wWWh4/sU7nILoN1rjEiNBD6E2yiXLnZSZA
ChrDLtj22LDLsNZ+ThzxkGTGMXvaTnJN6pskukGF61WIkTCUrg1vzeyPpDDQ
rxm6QnNyiGDfwOg/SkiG52qcqCxPkpRVx+kiQbqgnQDILInJFZhJgZ65aQFs
zbb03Kt/ARRIQ5Ama8tcxM/Osw0ysRCyI0xJ/IMa0+x4CSXJ7P8QshW7TAC5
cDkgkWT95BVjjT9zeEQuDUAsQ/ZVlGHbG9MRbkjDBkPBxmJEmAAmyFYudBn5
Gdnk5awBr/gNCn/5aI0EL7o5zrxJQ2vg7hRwwiCjBTKIIlLZAzHXorXJnEGD
FWAT6d4iQfUxy4uJ6xPUP6Na9Tk/9g/qjDa5DnzvOUCIwyB2VXX6s4DH2B0Q
CnN8TypjBucEFY58uiCVRvJpfPPJMWtvB8AMAlYYlbx5BswwAKuDNVADIg6v
m+YqYT0zx66/UNBOppQ+77rr+78359aZna7pMQwYtFycRlP2MdSsTaS1urZj
Jmy1STWPkonJ3kPIig2Hmk3PibgVQAI+YJKbG6S7Qc/xXlgWUc5SyXuI2g9m
OyDSvNZgZuAOk7Qi2LRfj3o1UYUnBygdyCNlo8Fb/7C3d8g0afvMOvVH4Kks
UlINFi46afJFV8lgLI89skczBoVugBoFWoqSzknWDp5niGYsFBi4NaYAL84X
1VCxT76q7Wv16toAgkawiDuY/dK7HB5nvaHkh+FJB3L6c3Tj2s0KkCp+YjAo
XKKznZ+3KYpHwhSBnOmIrRtj3S+DD6zWlLU1Et+4f8IBdHwTpknMkoVlUEN4
jDjhcom+HA7i2pxKzy9XSnJkN9gsTVYrYjpg8aERPw0Q2VDKhTNaF8ySFvcI
l/KI1zKBzTLyNtMxEI1lR5IcPmtCMaKZQTRPUviwBAWrfWrwAJ72Bh1fMzpS
5R9RCQJmzvjA1sc1+wGbnT6e99Wzrtdekix6tyytAtIlYE8gSXGyGgj1C3IV
EfmLtHH6iEM1P8u1T+d5MNoIk+O0VFCGVzlnO8lQlucHM+DMeZiZ/F70onV9
fAd2BJY2sW6TapeYOWnSjTO20W1Iy8TUYARtML48RSMRYydzKQhEwlB0BVKn
USBKYl9AJlOmMRgUZVo0oRidliVSadegCLM2fo5M/etyFmSLb50j0uWD4kdM
LzTE8cjCnjXzR2ifgD0ChG8TyT1LGi1hpCJPM+J4L2tOFKpLg1kotrYglqEV
1CELE/P3lT3m/S55Ay1jxHdHSdCABOA1wcJuMWUD8IY6vVHSlO2eB56uJ/Bv
W8o3kf9toXDDzR9Ac8cVmjveRnPHDtbE9uaUVZqWoNwGtgP6JNtjVXJGpWw+
T7UcMSB3cqN+hHJDFB/1yL4yhxWvHhGQPYe/SYhl00ko5TpMgSNU6KVgj4+j
cQyVefTThK0NClnTlNktYlM/fSKo9oqqN+m4RHScoFVMSddF2KUaHlOQGgFH
jE0IlmMECPp07dw6nudbKJWDrGU1y+a10xsWAreIimhvo5sWTSovM9skoVUT
s9m5L3RJ8wvFW6ApSRftaGJ0mMtY2uOepPz7jg7JJxWDDVZOUV9c8CZBFbA4
ZGlYIkdUBRE6RoqVpbPpxFikfITCUlx1kqskzZlnEJvlswHGb2EkiezCLVok
lpDJIGYyCDPO9SwTguQliW+nLXSXanYIbkuyY51zUuRGSQUhCDCTlELOvJvd
k6JnUtVSyegpZw/1lZHcP4ZpXgBzvBQ2g9Ti+zF+vATd0NkZeEaTfBl4hsx3
9R4peJNfLDI675NpAA3uK/7AlgXSNKlxpWMNlCuO4+K5IOKWCs/p8ZrYIc08
gAW8jczhaZrHpRPg6u4xJq42++lRSaDgA/Wzcgc3N6UBWlTKCb/LZzS2S7Xq
mQbKXyJfT7Qti2UJncnu44i1mbBHUOJk+EMD9Uj43+U6Go+RRpB5h2TYOhV3
0YbMYJJ9QO1xzicgyITiCTYMndgszOrMhY+Ip18F4ZI8XMAW8YTbtsNhlflQ
YM9SM0fC/ERb4NGomNpQhwMDxjdYUJjgoksBpMRizpfiRBNK8stdkHfo+r97
nAU374P8Pe78Z8pLvCcEgzyo0f1bdtxIpviWCAjHPDekWbOTvGSxWYUHmhne
5KFAxfvsbGR0vSw2paCyAG6eBWKLmBJlXnZPYveZJHaPqondI1GQzkYjjo69
4fRu8/zNiFRHvXaRwcr4NmGZWbpPFZXtsqe6JegbVGP845MTHk3BdGxXJlsY
E3FEdWQxmVm60F4FjPbVacfGQ+OkB6wdRdAqicLpmiMxcpIOeZbfKZ7IXECv
5xfvT/9zdHF5RczzhCOn+doedbFiv83WbQeJBvm5dxymWGV4WGjpeBZmDKiS
HuoUTj4XeHcXJzBbymjzk1TYvULC6eqUj0miGAUgJiTBcNrmLJ+duxFPk7Ux
kTELwWX2o5FqyTxD10spBSfxfq2vRfKNa6ji9qzkEmpQ3dQrTp6Qk16X7MRo
vxpfuk6+RROK3C3OARnQsSac1SsdhaTCmePO7ZNX5x0TbzHud/JHxzHYIVOb
9oCb7ZQQGFK1KUKS0VzoqK9xA8m+zLLUbMvDMdoBBRUZbXDuH5bhDvM1jPE9
z+v9dIohkX+GEwSUqglrMDADaXF3Z4Z9z4dm3JHnmJgmRrvNPOigVBO+OT7c
3cDDkftZBdMEija7nnNmU131ZsRt/Wln5kQj2qOTBIOFwygqbNKwnA1GcayN
/zYzs0+t01TOCglb6FpM7MrBoaZ97lKCriF4ORP93/av9bTX8Pd005en1WdP
W5+uhOv+qxrb5X6i0gIIZPj75AH4k0D0kwHtJ38GTxs+7TCDM6sa4bgoLJTM
QP5KX6p/n9wSlPJm0NRBOXHPdVB+883ItqGTJaUZsBkB6O3PoBkGF04d6DXt
kw+DpsXCpwuTl98Ig09mPbCEsXATejNOCH+pDR2B2QDET5wxWAFiaQblib0G
zison9EzMkCAvGpA3NAB/J1+XLHLgJ45RNq5g/IS2AdDS2jCvxIebN2FKhAJ
hF+MifcsoZKzaTvYDQbtxpMDnY2YuIka68BotZD+vrtPxWy9wZfKKkML4fVd
kxQ9aT0pIY7BgCfkP0pMWnAwyUyqfkXIgP09zEVfNS0wv6ZZ4fb5492ReuwL
HK7f8t2jKyNdMCl0mwmxo3RpEis2I6DRtnz0GU2nxzsq84Y3gz3F8oPKJ5QM
BJNK0q3otajq0+kxGUDbtAMzZ3QsgprAzlmj4MIS9zBkWWstri/WQE3c3Gso
vbHR6B5L2rCxNAFEaMq5fCXspGCnjVPZYQLwZfDqx9PLq+H41KrvIdmDKa+U
NSerF5dsBLQrOKXxOkmbLAw5zo7yWmx71mksn+f4pPU9k5HQsVro0gstAPrX
nKUNiEH2YtPZXK8b9u5QRHRjjILU9liAb6L0YXwT8rzxdAQYPEFeaUaOMt/1
1xCk5am48D+59PMQdpXSTbbNSDJyMa9boYIsiZK+dXsrcRX0iRqfRfm8tXfM
DheJWRXOajbJvlX3IQdcJVPhOgHAKwdUL13blj9k91AojMVaoUkpJYMcfMYX
MGC8Ls/HP7JtFXdzVr/up7RpnE4n9vjVZulS49tPt7xMUgJsicP26LDDomVb
z0/3fpI+9356ur1n+Nuzn37a+uKe9/knte3VvdK3bb3ucVWWbe82CLinG18W
TXesnrdHzzveo+auBT70L//X6heNs94r9QhQcH/e+6ODv8EMDn42cHACf0OD
cvclDWF7Cws+X6f4SY1e4ARe/Ox/rpsWZqklfeSn6ueWwb2D9uig47//SY32
se/9n+sT9fUWhrFr9JVrtG15/k9VPa2hmZ2L91tNvWto54ST+7GuFm7fhp8M
En8qYTN9+cn/XGm5cUsaf6s0/kS7st8e7XcBpmUcMHv2oj160cgvHjhyRQNz
jjtRv87uKU1BXkny8Fhwg8IEpq9Ia8+deE0mtfSPBjMukvPZreylkz/q4Fv+
jY9/qAMpglM6HqSe00vPGzs4/Na0fVH/fZJgDBleMu8878twJgbmhb5H+yhn
aBLWp+EQa2qdlEEOomiCiTLiz5x1/VAMdUCC55rLMJU8gi77RiI4CFk7Mkzv
BPRx/WtBNYC6vGyy5yj2mW1sTwMylKuyTI2L1YrDrQ7QzyVn06SS1SI6fuY2
xZzpfdB+un4XmevBin7KuciatO8+IQtvqTTMqskyze6gLmftRbbUwT3pbLAI
AApAaPQVgpZDcqX8Lqd7caIBwKav/rKg4z4AJkyWKKUgPWg8WiBGqREZZBe9
03qkdNgaENwxO3w5mbOsnFi1RZz0BjdFMfcVI5iA1YssXE0iBVjkqAVytQYC
wQYlyJ79FAzqknpKEWp6wTtqfUt5bYQaTT2yx/DqVE4AEQsg24J01FgSUDac
LZBGz41yi8TtUB/A3SZ4d8QBh3Zbg7/cM9LIs9dqnbw6zwh4NG4SY5qTJEyy
L5yjxF+//OrzZy6x9uyb51JJCF3ZRnmWNf9aBCZ+bU4JYDGCiIPznttbtm4q
3vVpBDRJdh7MRaKrZgbeMYKQnK3hPObQx0zTUQHcLC/fOmF3vERtQRnn8AfS
Cpi17PCUNE5TuA1Hh5G8+UlswHTWV++ygov4MAMyg/AyUlTsTdW8Gy5By+YX
+w3qKzGJZ2ABMbLDRpih7RbbKUsFRbF61ZQyeKCTAkaMbOkFmr63fK53Q452
A2eK2ca5y49xEMfdtMmgZpPEOCn3LI02LU1M5brBJpUcPCovhy7HMrARDSV0
mSWl4EppcC9V10IVnQwNLyEEpKRUu2qKdgw7bDCJMcBgK2Eu9SykkjpjCq/g
5pv0gbKZuKU8i2tBXKPKEFm2VQGG0QkgXKC/0Lj3iRPg3lmFw8WavM0xwvGQ
aMhlrwF1kkpQwkdTP8+WAKVXQluylROKRB2xGofTSxpe2+8K+3dvWy1nQ4u+
6EC7yWiRVwGhs3DLA5FcgaEkQykGMP7hmeGoK4a4TZahLNkwo656f8JJ0L+H
TLGmE6FaTjE9dNTLO8jjUramUGuYlwjWIzVe9eswZk5TeUUWI4yayNnIYemP
lr5RJlsU6KszDTISiC1YN6/ZHnKrjMOw2O/9SVlgHIBKFSJBsh5jDtUIFFxm
s3fo11fWDp2y1q1qP16Wg4jstpyGNiVct5SY6phcqwZiNpgrOWMkjEmf2okK
3Yx39YzsaP8oLIxDKMVh6qdsw+zqJTGjiK/E+gDubaKcnb7FszE6RHP08Gff
u7LVZ1Lu+Z7e7du+vbnx/U3G3sYGxny0TpQtPhQZwvekbPSjsOnPWu3+z2Vv
yiZfyn5DEzef5kbcsuKFuddtU/pr8Kxs8KsIAHbwrtR9K+8yH2+3eliaJr2b
l+Xe5W72tGxsarvf7G3ZPGyDq2YHB0992k1el3t9LvxX3a6nG39xHAEr9vu8
ZoP35V7fy6ZxtsxgZPWJin5WyhvdrqdUnTigGRn3zWCXhB+KcNny0Lktq8Bn
B9CEKScMm0MUUidDf5yCDsZRpo2FS9rOao7WHZtFxcd2vPWhfYzREMy1j3Gt
qM+g08EZNiR2fE2PTwWbuBAe/gkjOo7PxXRQ5u+kiVal3oZEVJO0jj9z/biC
znHI+Xg2Oiv3GuyWseSZpQ0pJhRInPOdVPXsHtomDopbLSWuJMeEmEVKpr7N
WjZRvpLqwPWSm4velWvim5QjLOGQrLgGVWhOQd7vw3N+usNGP571zJlO7IGB
kocOfx4dVDNwSLWR6FVmytI3O6Gsuwd0QtsfzdglsRlt59D6cuTo0VpMFyrd
QhEvWwDCVr9r08lA/NixWpc9mFVCQ5g3V1qkoVCPxHNrs4R1+/Pklmsa22RK
dPZQAddr0fS5vD+C7Unm+QJxsk5xrqKKWVJb/FOHHcMIKLpJeeuILvQSeRxy
qkWzqFXmZLg/yUoXFBjaJWvRVNDxG5tzzQ2+NWI1XDG0ZkmP9slIC8qIzu4j
nHiAVYi6cgSCGMIU+sgY9S2NN6yCMvJ4vYdSS0CKlszTQBJOZ1I0iBM+HYmY
5D3ny/HcAIZMKaDt/lqtgeQV+qmcmKscwf9zk5FmT3mYPqhuHrJHzrytmAmm
HGdjmrZJXffGw/sJEJAuVwBIVSiKktfxiAMW4AL7FM9WNPnnBLvZPcgR+m1d
MiEh6d8ukkj3q0swxaErRWKpQgweACFTSGOQHrlCR1VKbwtikbDyz6dmRUYH
GaVAEM6QDrgSDuKhntSfqDnGR64AyYkyZ0sr88U8ByrqjpwRa6VK+oUNWht/
Li9s5tUJrZ848nfrQSbWvRrPfX8PCktXxvwSu0v+djC/NjXZzQqrNXrAWDva
ZPL3YNNM/h5uoZkBdzLU5O8L7DXT8ovNNtPB77Le5O+hRpz8fZktx8mGKWj9
TzpfbtLVp/B7LLuGye5o4Mnf77LzTB9/H3PP/Pw7rD75e5DptaWfzRH4HW3A
L5kPoJct31Ku9mm0uBfmJAX/nrpMqpDUcBSoLdGTvRO/JoBtbEYXv62ZjjUF
wxmSvna16UCYtW5KJxbIvhxu0F8aKyi50UlqY9xMm85FvSyN0C2dbiXYdJuA
8xDYdEVdrh9W3FqPFbXSF9Itqo6JKJjkT/Yd6MrzoKcplg3ZqOK5IId4o5fw
ApWLo5qdGItahKusVJuyzxMgl7mNRdnQgtXlTRjCJNnxQzrP3dykFsDoo5Eb
mkOU3eZQhmn8ZXkHZnKkx9eTD7Cy7rb8geMt2Qcuh4ALAd4f0afNdXao57av
wqUha6PqXRfjvckkMx1Dl3SCUiyVJdfGtBnC7LbpyyVt1XybRoLbIVOaAw8m
NGeOx28MC/pRvPSDq/7CgVUXQti4RqdgG726lr3JJmCeAkHpzZdG0JH38u73
W/7R15HecOwVjzN/puKx5CfJuJQSneGupIqb6g1C2S5XWeoP4kPvHVgf3+eI
Hijtrr8ajKtsjO9vpPq+BkI2h7eaCg6dlC6Xg1HolHWDpUxVopERuSIPiZeN
7M5VbTpnRlFETO2POXnKK8XH6bvkqKR6VZjcX6tG4/KlJbHDFFHBblvjpMth
uTCehuRVMq4TrzgkVnozRbwac7X9CrqFrUFT3j6gJKmzCTCoB9kIW/yKrmQq
YjmV5TKZBcZkrdcw6QNkZlpTsdOmWkbo6wQrXnwImBYWRObWtgqC9ZGVbVr7
pvMLDferVbolmMbmqF7pRPrdnX/u+7M4swwoTR1NtpPNxhgUrk3eJjLIIQJX
1YFyatJY0f29DXDqNpT9o2PXZTva5FvUbGgPXg3rZ2mWZCZDrlYbzdSwK9Wf
M5wBXscSdUNJo0f0726HJTfZGZZVOFoFssS5zKwbuRcOqOrsq6EK3K4s7AF8
iy9To5GIj8qJ0cr9bTsc46ERvT3wzoM2LaXp9LurCbFtHEQtX0xJgd+qricV
8GRkrH4v95hg+SbgWBTOYNWhOVpg/WD31B64iD3tBmTYrISKdKUv5SmZKldb
RqJ8PkS5ZZih/hybGdaXZ+rTifZLVybEzZvZVWP/GLRFxqtUY/hidCV3NTek
31R9q8BPTXHBkpKYQ1fGnVo+qST77A40uZr8fM63LnMlddIoHO54DItCXHq7
VH6oIwEnM5i96FsKFZtaOhaIg/G35E9ETMI0SNdxqdBWWaiKACyrB23jzOei
x/37Dw6TxbjxS8+cVG06Mlw5Mwz/9xBt08HEXcYrnw4uGdOlL+6EoWo8itnr
ee28c73eecTt8/SO89bDwbWzo/63zad4G+ZJCCzfzNldd9JXzovWTopawtl+
XrXaziOze9p96f59+dFP4p39Bxz8rHodauzmgYc/q1LjS6QF+igc42u2vkv8
DaM8oysTpyeBS6RPt41+obz7Ox0xsw7L/SedByZPPdR9v5vHflcn/a5++Xtd
8Q/wvj/E4X6fj/1BbvUv8aR/qfN8d3/5l7nIdzpK9iUHyb7oGFnTIbIvc3f/
bg/3Tw7wFmX5A7eTz9V2v8eR/Xuc1w9zWO/f57De39FhfdjklHVJTlsc1jWG
/TCHdVW/d67qBknQvW8pD1kJmjZz3XREwJ4cakjZqCjv+NzP3S73cGDSv/v2
nM3/B0ftPAewdT/v/24H8LvMmq3evSPlm5S8+17aMx2vOxJ431Qw3eYntF2C
9CHWhqIjV3KbyhabbuCXI5roa/Qmte/u/JuXsAb3/9PrWwxMAEoAtcFqFVGz
svL0IHBQEQE8iEP5NZSTQdvUdGmtV5Cbimnii6+HxybW4CfHC01QaUzcMmvE
aTnQRGauuXe3cimQcSV510hVE0PatauJO2D+Wv8V59OUweI8+JRYZK7GWob5
TgcB2xmdDxgRIVaKXb/Ga1vpamTSrnmQxNY9Z+jUM/62+dQPm5kY+pjZ005J
ZGJPuUKR2G1JIX2MJgudNRzDG1xH4+6xnD80SjN+fp8Vy1KZsEpBYPYGrb2S
Yc53RqEv8jNQvTSb+JRVNHZ2KuyUzUl2eUylsBGL8YLuzNxVyG2zHOtMZ3Vb
JuS7gJt8LJVNyOXVKnOmmif3lJo0qZcA0DR0uGtrsglAzLUc0DPV0vOK1Xt3
fZYrmwl2mbQxAeymimQbLMaGx34hLMGKjJUK8iaQPc3BJfzMaAQf67XIyiqJ
+8hOCPrsfSy/6bdunwzpgO2wQ1b4ydAon+2R+cgPzX99A/nL1m1LeSn119Px
3vmFTA2+mGmeX/zhD27G8gPP3NQz+9Tm2+d5ilLQrlMFh/dLed3GR15WR6ut
/T+/9SwE4kJG09m99T8AavBPmwug0TxKALS/0Mxt9TMPavh6W95Q4hrh1t4v
/+RQ83v2wLPLH838zcUFN2njVePNrXErmlvLR+s67Ow+9n3r3vb3tAVE/V1D
jeLWCJ/XwyAtXOZ37Cr0fX/Gm/fFldK2FErDtLDRlf9j3S3eAi5wZaqxotKC
BQvbdAENHl8w6kzHO4srEfaTYYaWGTr0/SJO3u2EtaDRt+RYYfWhmoZOKpZJ
hF3oCKtd4ikAbFE5nY/6lif+eT8bjC4j8H1P3ReLadLjNxQ4wAntIIhL7z9Q
GqPNd7VwpaAyq+fI7Zp8JbMNWJQ0F5HOoEmRsjfzLhTrq3N9KzfTgvZpg1ly
IVwQLuWWzqhe/MrMJcDwqWqjKxHrHRfxzMUV0pRSS3C+8QyPrf4msVBzgqNt
GwxPr16ry9cnWedI4SWBwxKwj9ylsZuqcLvKWZV9alcUa66du6UmdlNBNb+i
jNwd5YqskBnsysdtLD7t1XUmTZopqtzryavzPf/oUKdfgsZK7uX+C6vxS914
traMwXVUFJDEdFEIgQSRZIHX2BOFY5zJVJZ21lXbXV7hJ3YQ7hqyx1LIchaL
eYoU0xB71yTLk1ugnCDDF3WgKbnp7sbPpFWmlByCla3B8FC/6bRaFI5C9WQg
br2mwUb+gQra50muj/4p6iBXWdjGyvdcdoUrS/h3aZv45T+uznS/gyj7ZhM3
41DUDvcIP/AO3zCny3u56AVdy+Rd68taGScWWZt869W9lSt/pbI5yHEy1Nz5
+ZXcuEnXhm7jUXRrBnbi3XlQunChmbOhu0tyVXKqg2lPM9KtykHM1/rhkUTM
y8LKgpzNw9EwcxMRIfAy09GNcUvJ9ZiG8fxN6OxnPljFtzmw7yWMVwXnB6Qa
mSXdQyPXjaPButDC5y0Ni6srpOtqC7AL12XcNZU6Ue+hywVGfWZpNGe+GdsS
blDAglIC2Q1lpNiL4D13TFetACpC93LXuSrds+77btpicrJzy56Oc5U6qWSN
jpJVxUWAd51TuoeDK1Y2dduFqZeAlZhBQJOxu4sCkpwVl1y6hS+YQ4mLMnj7
Veip/pU0AO8iD3QMusoVpf7MLfTblJrSPfLmanpK/0rD2VyL8W5u6TBxwqaq
mpQANKBdxhtn7L1ReGDsvnmot+/GV1Laqe7gIBlJyYIFPA+TzTmV7VTTzfN8
cqqczNHhxIhdVD254crB0x6KEiefm4BxPK+MfPcudhJRyE5AfKHDQLpE3yO+
3GgC7AwuzNMSHAXKSBCj5TYFw9eMc1Hcr9m9F5thFac1E2WWRAUhGI1F4Oc7
rpo4OUH2Hj7Oaz+l484DlJrotT/WMbBeci4OUQzTTUPR3khO876yRxUdWOzE
xm8u3p29AvXrCktM4UHUFabfEXn6Ytmkr5kzhql50sQ+DBe81CJQR8UkAlD9
oNcww+s04EvE8PKs9uXohyHI9QminGNllxeDTKIFowHeq4fpBjLXiSyX72AP
DBQma0EWKrllL6SEZ7lQOZ/etjK9GiYyF8U1H4QmwI/sAOcarwlH/+ZYA7Ui
AX1fBCnIVDAEWxvZql0frNosums4ByUV0M1AmmQ03a1iklKZI9Cp4HFB5zId
uPm+JbtWbW6FDbGoFqnqCbkcKYpQEIlJKUO5wkMcjDDlNRfDSbGSs2rjQ5SF
mVmjq4BIl26DyjdbK/GU5JLsiWdxO3QBLt/NKOzQwx5bbwukLwo+KTbcLF38
Uw5dNxPfpsTlE0siMs74VrYUngLhorJWur3X9swMii4u54vKjfd9GWCBatTd
wvgXwR1iWblQrUcQjXMWNm74iXon91p6aaBnoZRHOkW2GuKwJ0kMrIBcTjvx
L0sOplQPons9OIL71349PN67xKADajXd7bR7d+c5mkmqe9S+SQEoN+l75Fpm
q6JLGjBQRE5yLMkIEeIVkKS6N3VQsSEQ0IwlPZdujgUQfcypOIF9E3RRKXlO
DXJSgH6rbp7IffHCDMa9POkNStejlath07JKV7BxEXLZq/L2mOnYWUhWp4DA
OwociqsH5TXrx8ASQO1bhr/hwBRVrZjhlIZUMXSEsiWah+yJNKSaMjSeQqtd
MCwzrguSf75ZYpMlgSHmyTSJVHuIN1sZu8mqpkFWvQKNXRWzpK++59oWZNd6
N0aiZjAc9WAbQU8qGD+dPwGNoXPWXYcjr4DXkZwoMb0Q0Mh7w3dVGynNph9L
WK/8F8LTeiCpPkz7BH0MYV6qEgao8+Po3NY+QF9CZaZXVO0MwQGcqqu+vzzt
qvHlzVdyg/WRLTLnCmtWz1X4CaMOXfmm0ChYoyt0VBFdOJNjXDFeqE2LKV+q
3WdbKcOdd8aWAIthmsQ9rJfHUcUqNN+OzsYw9kRHvUbQse0aUx+1N/iwUiCn
xro7adSkL6FSskxmctOdHJSJgtirpGgdWZgcHKLwK1CusA+FMLNqUogDj+ys
UG4iDYy+5qjX84qAAELQ4wytWhEb6rLS/8T3QqCZYX4Rb6PjdlKun0u70AzM
nd6NVeNQaSnx8O5mq03uhtgol8yt9P4AdKcCXv0psMB6xh/o9se8adphbJQR
rKdXK98hqoy5mds7+0Z3VhjButvhSmNRcey11F2fYGJ1b7MLciMd27yRtvzG
nmCRGs0ILC5qYuAGHDcPnX+Si8wuwl9gXXg/LX2NdPAhM0f+3o8GV2+QX4er
Qk5lGn458XJb2DaEluxLMbcQW0teyLsspf39sVoh2s6F5aQkupjBD84HdfTD
p8bMnQF3IQvMq1NoCjSuub3kj5irI+n+N6pwnaRZq3UORAPsek6Xrb4pglsd
0sdjHf6CHkL4eAJ6VqDo6SlQdHSECD6Pg/jPC3q/D9NvtXq9HoW0cYjB9EOc
3EZY6pHN7bvH1UefMf4QF8sJHnT67hE5WtF9/5Z8qkCqHwio/05XOL8NgIS7
6jhIQSv/PgWdUXfVa9CF1PcBsNlBDKiA5Xco1UmDwvDXArqB/6v/Qo2pq4Zz
jIYUQI4LfQMNopsgTbCGVhCDzvTvCfD1N0EE6AcYc4leogQVaHgx/KWI1V+o
j7ew2wG8eIn/TWcZYtdZCNDR8OF7sK/Vq0RusHkL/36ktJOwwO4Xsbp4cgyK
uiDkZRJRueFkMglji8Kk0+NdbFmXTwbHuaBkVsznmByGW6haAyrPJBdn2OKR
6KvAaA+YsibDm/xBfmAm5vpc7IRahhm70IhoqIxN6/8C8s/YgH21AAA=

-->

</rfc>
