<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="pre5378Trust200902" docName="draft-mglt-ipsecme-dscp-np-05" category="exp" submissionType="IETF" updates="4301" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DSCP Notify Payload">Differentiated Services Field Codepoints Internet Key Exchange version 2 Notification</title>
    <seriesInfo name="Internet-Draft" value="draft-mglt-ipsecme-dscp-np-05"/>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Halpern" fullname="Joel Halpern">
      <organization>Ericsson</organization>
      <address>
        <email>joel.halpern@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Preda" fullname="Stere Preda">
      <organization>Ericsson</organization>
      <address>
        <email>stere.preda@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Liu" fullname="Daiying Liu">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="U." surname="Parkholm" fullname="U. Parkholm">
      <organization>Ericsson</organization>
      <address>
        <email>ulf.x.parkholm@ericsson.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="17"/>
    <area>Security</area>
    <workgroup>IPsecme</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 47?>

<t>This document outlines the DSCP Notification Payload, which, during a CREATE_CHILD_SA Exchange, explicitly indicates the DSCP code points that will be encapsulated in the newly established tunnel.  This document updates RFC 4301.</t>
    </abstract>
  </front>
  <middle>
    <?line 51?>

<section anchor="requirements-notation">
      <name>Requirements Notation</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In the ESP Header Compression Profile Diet-ESP <xref target="I-D.ietf-ipsecme-diet-esp"/>, two communicating peers can reach an agreement on DSCP values as part of a compression context. Within this context, DSCP values serve not only as classifiers but are also compressed by the sending peer and subsequently decompressed by the receiving peer for both incoming and outgoing traffic. This process necessitates a mutual agreement on DSCP values for a specific pair of Security Associations (SAs). The DSCP Notification Payload outlined in this specification facilitates the negotiation of these DSCP values for a pair of SAs during the CREATE_CHILD_SA Exchange.</t>
      <t>Furthermore, the explicit negotiation of DSCP values enhances the "classifier" mechanism, allowing for the establishment of this mechanism and the agreement on various clusters of DSCP values to be considered for each pair of SAs. <xref section="4.1" sectionFormat="comma" target="RFC4301"/> recognizes that aggregating traffic with multiple DSCP values over a single SA may lead to the inappropriate discarding of lower-priority packets due to the windowing mechanism employed by this feature. To mitigate this issue, <xref section="4.1" sectionFormat="comma" target="RFC4301"/> advises that the sender implement a "classifier" mechanism to distribute traffic across multiple SAs. While <xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> refers to the "DSCP values" fields in the Security Association Database (SAD), <xref target="RFC7296"/> does not provide a way for peers to indicate which classification is ongoing nor which "DSCP values" are linked to the created SA. This document addresses that deficiency by specifying the DSCP Notification Payload, which explicitly identifies the DSCP code points that will be tunneled in the newly established tunnel during a CREATE_CHILD_SA Exchange.</t>
      <t>It is essential to recognize that in a standard "classifier" context, there is no necessity for the same cluster of DSCP values to be linked to both the inbound and outbound Security Associations (SAs) of a specific pair. Typically, one peer may employ one pair of SAs, while the other peer may choose a different pair. This flexibility arises because DSCP values are applied exclusively by the sending node, rather than the receiving node. Although the use of the DSCP Notification Payload does not inhibit such configurations, it is likely to diminish their occurrence. Conversely, we anticipate that the explicit negotiation of DSCP values and pairs of SAs will facilitate the management of these "classifiers."</t>
    </section>
    <section anchor="sec-rfc4301">
      <name>RFC4301 Clarification</name>
      <t><xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> mentions</t>
      <ul spacing="normal">
        <li>
          <t>DSCP values -- the set of DSCP values allowed for packets carried over this SA.  If no values are specified, no DSCP-specific filtering is applied.  If one or more values are specified, these are used to select one SA among several that match the traffic selectors for an outbound packet.  Note that these values are NOT checked against inbound traffic arriving on the SA.</t>
        </li>
      </ul>
      <t>The text does not clearly specify what happens when the DSCP of a packet does not match any of the corresponding DSCP values.
This document proposes the following text:</t>
      <ul spacing="normal">
        <li>
          <t>DSCP values -- the set of DSCP values allowed for packets carried
    over this SA. If no values are specified, no DSCP-specific
    filtering is applied.  If one or more values are specified, these
    are used to select one SA among several that match the traffic
    selectors for an outbound packet. In case of multiple matches a preference to the most selective list DSCP value could be implemented by the peer's policy. 
    If the DSCP value of the packet does not match any of the DSCP values provided by the associated matching SAs and there is at least one SA with no DSCP-specific filtering, then, one of these SA SHOULD be selected. On the other hand, if all SAs have DSCP filtering, then, any of the matching SAs can be selected. Note that these values MUST NOT be checked against inbound traffic arriving on the SA.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>The illustrative example of this section considers the following use case:</t>
      <ul spacing="normal">
        <li>
          <t>Expedited Forwarding (EF) with low latency traffic has its own IPsec tunnel,</t>
        </li>
        <li>
          <t>Assured Forward (AF) classes with different drop precedence (which may take a different route) have their own tunnel,</t>
        </li>
        <li>
          <t>and all remaining DSCP values are put into a third tunnel.</t>
        </li>
      </ul>
      <t>This section details how a peer uses the DSCP Notify Payload to classify traffic carrying the DSCP values AF11 or AF3 in one tunnel, traffic carrying a DSCP value of EF in another tunnel, and traffic with other DSCP values in a third tunnel.
The third SA is designated as the default no-DSCP specific SA. It is RECOMMENDED to configure the Security Policy Data Base (SPD), so that such a default no-DSCP specific SA is created and it is RECOMMENDED its creation happens prior to the SA with specific DSCP values. 
Note that according to <xref target="sec-rfc4301"/>, there is no specific ordering, but starting with the no-DSCP specific SA ensures compatibility with an IPsec implementation that would for example discard or create a new SA when the DSCP does not match.</t>
      <t>Generally, it is recommended that the outer DSCP value matches the inner DSCP value so that the tunneled packet be treated similarly to the inner packet. Such behavior is provided by setting the Bypass DSCP to True.
If the initiator prefers for example every tunneled packet being treated similarly, then, an explicit mapping needs to be indicated. Typically, the initiator may be willing to prevent reordered traffic to fall outside the anti-replay windows.
Note that such policy is implemented by each peer.</t>
      <artwork><![CDATA[
   Initiator                         Responder
   ----------------------------------------------------------------
   HDR, SK {IDi, [CERT,] [CERTREQ,]
       [IDr,] AUTH, SAi2,
       TSi, TSr}  -->

                                <--  HDR, SK {IDr, [CERT,] AUTH,
                                         SAr2, TSi, TSr}
]]></artwork>
      <t>Once the no-DSCP specific SA is created, all traffic with any DSCP value is steered to that SA. The initiator then creates the child SA associated with specific DSCP values. In this example, it creates the SA associated with the DSCP value AF11 or AF3, followed by the one associated with  value of EF, but this does not follow any specific ordering.
The initiator specifies the DSCP values being classified in that SA with a DSCP Notify Payload that carries the DSCP values.</t>
      <t>If the responder supports the DSCP Notify Payload, it SHOULD respond with a Notify Payload that indicates the DSCP values selected for that tunnel. 
By default these values SHOULD be the ones specified by the initiator, but the responder's policy MAY select other values. If the responder does not want to perform DSCP filtering, the responder SHOULD send an empty DSCP Notify Payload, in order to at least indicate support for the DSCP Notify Payload.</t>
      <t>As specified in <xref section="3.10.1" sectionFormat="comma" target="RFC7296"/>, a Notify Payload with status type MUST be ignored if it is not recognized.
The absence of a DSCP Notify Payload by the responder may be due to the responder not supporting the notification, or not advertising the application of DSCP filtering. 
We do not consider that the absence of classification by the responder prevents the SA from being created. The classification is at least performed for the outbound stream, which is sufficient to justify the creation of the additional SA.
Note also that DSCP values are not agreed, and the responder cannot for example narrow down the list of DSCP values being classified.
If that would cause a significant issue, the responder can create another SA with the narrowed-down list of DSCP values. The responder may also REKEY_SA the previous SA to redefine the DSCP values to be considered.</t>
      <t>When multiple DSCP values are indicated, and the initiator is mapping the outer DSCP value, the outer DSCP value is expected to be one of these values.</t>
      <artwork><![CDATA[
   Initiator                         Responder
   ----------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, AF11, AF3)} -->

                                <--  HDR, SK {SA, Nr, KEr, 
                                          N(DSCP, AF11, AF3)}
]]></artwork>
      <t>The initiator may then create additional child SAs specifying other DSCP values.</t>
      <artwork><![CDATA[
   Initiator                         Responder
   ----------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, EE)} -->

                                <--  HDR, SK {SA, Nr, KEr}
]]></artwork>
    </section>
    <section anchor="protocol-description">
      <name>Protocol Description</name>
      <t>During the CREATE_CHILD_SA exchange, the initiator or the responder MAY indicate to the other peer the DSCP filtering policy applied to the SA. This is done via the DSCP Notify Payload indicating the DSCP values being considered for that SA.</t>
      <t>The initiator MAY send an empty DSCP Notify Payload to indicate support of the DSCP Notify Payload as well as an indication the negotiated SA as a no-DSCP specific SA. This SA MAY be followed by the creation of the DSCP-specific SA.</t>
      <t>Upon receiving a DSCP Notify Payload, if the responder supports the notification it SHOULD respond with a DSCP Notify Payload. The value indicated SHOULD be the one selected by the initiator.</t>
      <t>There is no specific error handling.</t>
    </section>
    <section anchor="payload-description">
      <name>Payload Description</name>
      <t>The DSCP Notify Payload is based on the format of the Notify Payload as described in <xref section="3.10" sectionFormat="comma" target="RFC7296"/> and represented in <xref target="fig-np"/>.</t>
      <figure anchor="fig-np">
        <name>Notify Payload</name>
        <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>The fields Next Payload, Critical Bit, RESERVED, and Payload Length are defined in <xref target="RFC7296"/>.  Specific fields defined in this document are:</t>
      <ul spacing="normal">
        <li>
          <t>Protocol ID (1 octet):  Set to zero.</t>
        </li>
        <li>
          <t>Security Parameter Index (SPI) Size (1 octet):  Set to zero.</t>
        </li>
        <li>
          <t>Notify Message Type (2 octets):  Specifies the type of notification message.  It is set to DSCP_VALUES (see <xref target="sec-iana"/>).</t>
        </li>
        <li>
          <t>Notification Data (variable length): lists the DSCP values that are considered for the SA. Each value is encoded over a single byte.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>IANA is requested to allocate one value in the "IKEv2 Notify Message Types - Status Types" registry:
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>
      <artwork><![CDATA[
  Value    Notify Messages - Status Types
-----------------------------------------
  TBD      DSCP 
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As the DSCP value field is already defined by <xref target="RFC4301"/> in the SA structure, the security considerations of <xref target="RFC4301"/> apply.
The DSCP Notification Payload communicates clearly the DSCP value field to the responder.</t>
      <t>When the tunnel mode is used, the communication of the DSCP value field could be easily interpreted by monitoring the received DSCP values of the inner traffic when that traffic is encapsulated, and so no secret information is revealed.
When the transport mode is used, that value may be changed by the network and eventually, the value of the field could be unknown to the other peer. However, this cannot be considered as a protection mechanism, and the communication of the DSCP value cannot be considered as revealing information that was previously not revealed.</t>
      <t>The notification of the set of DSCP values to the other peer does not require additional resources either for the initiator or for the receiver. The SA is created either with DSCP values or without.</t>
      <t>Similarly, the notification of the set of DSCP values to the other peer does not introduce additional constraints on the traffic. First, the responder may also ignore the DSCP Notification Payload. Then, when an SA is associated with a set of DSCP values, this does not prevent the other peer from sending traffic with a different DSCP value over that SA. In other words, traffic coming with unexpected DSCP values is not rejected as would have been the case if the DSCP values had been considered as Traffic Selectors.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank Scott Fluhrer for his useful comments; Valery Smyslov, Tero Kivinen for their design suggestions we carefully followed. We would also like to thank William Atwood for his careful review and suggestions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC7296" target="https://www.rfc-editor.org/info/rfc7296" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-ipsecme-diet-esp" target="https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-diet-esp-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-diet-esp.xml">
          <front>
            <title>ESP Header Compression with Diet-ESP</title>
            <author fullname="Daniel Migault" initials="D." surname="Migault">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Maryam Hatami" initials="M." surname="Hatami">
              <organization>Concordia University</organization>
            </author>
            <author fullname="Sandra Cespedes" initials="S." surname="Cespedes">
              <organization>Concordia University</organization>
            </author>
            <author fullname="J. William Atwood" initials="J. W." surname="Atwood">
              <organization>Concordia University</organization>
            </author>
            <author fullname="Daiying Liu" initials="D." surname="Liu">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Tobias Guggemos" initials="T." surname="Guggemos">
              <organization>LMU</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="David Schinazi" initials="D." surname="Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="17" month="August" year="2025"/>
            <abstract>
              <t>This document specifies Diet-ESP, a compression mechanism for control information in IPsec/ESP communications. The compression uses Static Context Header Compression rules.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-diet-esp-09"/>
        </reference>
      </references>
    </references>
    <?line 220?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81b23IbOZJ9r6/Ayg9r75JsS3bftLPTS0vUmOObRpTb0TEx
0QFWgSRaxUJNoUoUx5a/Zb9lv2xPJlCoCynZPfbDsCPaJqsAJPJy8mQCHg6H
UanLVB2LU71YqEJlpZalSsRMFdc6VlacaZUm4sQkKjc6K62YZqUqMlWKF2or
JjfxSmZLJa5VYbXJxJF4bUq90LEs8TWS83mhrjH77OTcPdmKc7lNjUyixMSZ
XGPppJCLcrhepuVQ51bFazVMbJwPs3z4+NtI58WxyAv17ZPvf7gsKlsePX78
4+OjSBZKHkPOuCp0uY02y2MxPefR0dXmOIg5PKXZI8hzLNRNHtkS49Z4Prk8
i6o8wW7tsXj65PFhFOX6OBKiNPGx2CqLv1pT4PWFDd+36+ZrJKtyZQoaQp+h
/1MIneGN05F4pZeySsvwu9vtqcyg0p2HpsAGJoWOrYXe6l/VWuoUGuIxo7Ub
8z/KvzaKzXr/6n8eiecyzaGB3up/Nli7/+jetX/DiNHKjfiMlWcjcV6oRPbW
ncEaqvfk3mUtDRjlNOAzVoW2X+pqR9N6q7Nl58m9a65kYdJklOrqM5Z8i43K
4mpl0nVv3X1P7l23Shejm1Hux3TXxmc4HAo5h+PKuIyiy5W2ArFTrRGswlRl
qjPEablSrSjz8VfH2kBsVjpeDUSCYIFGpDi5mIwvJ7+ePJ++PP11Ng6BPKAg
SXUMUNhinwlN1J49BhAIjwTlSpZio9NUzJVQWSxzW6WMHjrjEZnaYBZlSzlP
tV3hQVllGdxJiO4ufByKi7MTDsVRJHjXa50kqYIKHghxof5e6ULR+5Y26QAG
6lDiCki0MUVixcGrt7PLg4H7U7x+w3+/mPzl7fRickp/nz0fv3wZ/hL5N2bP
37x9edr8rRl58ubVq8nrUzcYv4rOT9HBq/EveCKzRBy8Ob+cvnk9fnngtt/e
H7AKsEJq0gRL8GrSkrRRomxc6LlT2bOT8//738On4v37f4Mijg4Pf7y99V9+
OPz+Kb5sVipzq5kMmnVfoeltJPNcyYJmkbAHTKFLmVq8a4VdmU0mVhRO0R9+
Im8Rw+9++mPEagVMFiapYqfMqbPbZHYuniuZqALAv4a0lrH9vDALncIRNGCV
3nn//qfp8HSEr4sGuemhsvntLSTbGDjMel1l7I9wvFwhT0C8TACF4xW2IuSy
UMr5cuZ87FqmFZwBoiMk8PMC/hq35IgNlHhTjsQ7DTV7XfsfB50pLLIY3NCU
Tl+YMU4lJlloEmNeOctAUSYsAFPMt6wFq+D+XmbWua3mFk4IUTFXonZHFCpW
+jqMWZhCzE25glXwLscdWa4ql4a+IJ4XCNSRi4W8MEi3FjFDf8B6FA9SrKuy
kundSqI1pLC5iinooTBdkMLqtCjGAJJYc6xY8XA2to9ovXugokaUJHhxPbl7
bSFjnXrxXIwvTekWoIXxk1V7JAyCjW0NQjT6LhgaRdFZVeCNYm0KxT4egKm/
ZHsxlWF47EU7aIx9INaKZtZ2PaAIMRuSgETjmWuEchpeuH2HEWw2eq9jhWtZ
aFORR1WUq2xfFBfvcEurEUjQJ63GTt/SxcjHN4HegKzGm3o6OkSww5vMMtP/
UB5p5RLLL10ced8B+sK91uAEOk+7ajfXij0Db+MJVLuWW5EiqEkw2ozOgBmF
yQsifCLRNpYF+zskg35UMcQjw06Uy/hKlWQ4VY+G/hKnxEZNap2nZluHAzS4
ULKsADvi0gDKS7AXrMRPtLUVzHr35mVyrW298zoasSONNZwJ5B32JQmxmxKw
WtFyXlMyLgzCK+iKlf9uRXi2X4qnoyNvhgVZ1+/7oKXjA7EgcmzrdLcv6EBC
4FsSMYHgO31Ub/n7ox+/w9yJwRYJnmCIa7gJNrWBmchTHFJi1ToJuxQeAMyH
I3RpMocnGUa5d7pCEsQhoq9UMH0M8GWSPx71ErFMEoY0r/hEYSGN1L4lmzog
2Nax+ym20WESCVUWUNfnUAlHEj5NIz7NZkYCOa0kJdGmqLZJSQchsty6lDTB
NxHliICuV4WsQlCkaKLMBIjeBgCx4H01EOzHgcYAnBFcAM5NBWTxScF9uQe4
XSLsQD3Mt82h/TTdDuAHyuUdinQXi+63Bm7YMqni5Q1tqRkQr4yx5IBJXQjW
K3Akp+pGzwn4kUULjsy5imXVw3rOpjmsjq2qG1KIvlbptp9RM1h+IArJEsAE
WS970vORGKcor6qlUxat5NLLPakrhJPOVpC2RMamiDHZQi+rwulyIDQ7RKqv
SDIGC+Rm+BVNTpqKYQHsP4YIJyajwlaRejfYGjwo1rlDMY9Ln5OVyMKkTFtn
QPb0JpPyRGuZyaVqMhDl0ZYv2tEB8TUPVOIkhRmCAt4/APkaFouYnt1G0f2I
RmuQKqLoPzpignA7K5U7G6CM6VNYnQyQLgqyMycaBnWCEzFdUIi0/ME7rAIs
4AHNOgw+DDqJiCGTY7h3HDcHOS4Wo+x/x2ROQ/RjZV1kwU7YKw8FBsg1gBG/
QTyKerLXWpaxc6c6K7ghpvA0JWsC0W0TwsDTGnPbjjRUD8QrFVNky6VEWViG
qA55B1pipzY+SYzBbbhqIWBpXDZGbi7SALIIVKy4IlqP+Cei3/g+44CTrxnv
9iazbR0msYEX29y4kGtZc9QrIYkEGOuReWFqckTiHX8VF/HlbtdRfo+f+Am+
2Fv8PF/mM36ST3sOiqlYOtgKrINnY2KfM68gmKmz8trAfdy0QE0AFL42GoY9
qzThErKmQE3hQSj+76ghDKBoi6TnRJy28NLN4V3jk77TNqynJmEt6RMTfuFx
ZA/CNE+SXZaE4uDPNiiWeerd4c/2yVwKC+CHYb4anyuvF7L3m6yVvpA7YFy9
4KqXpFjJay/+zuSt/XUEp2q0s8IdEV+3FJjW/1NR/4BK6NLEJhVvrqnBqjYO
CpAOKurvsOHVjSQLhzrEegCvS4l+oFJqJEfjYJ3c5CrRZJwzU2w8o384OXvk
TIAhglo0xOhqWVcoizWilboE3EH19GqA6cBCqqKZTDwcYyZOSsq6GRu6kABH
yK1jlbBbP3QskMhFKa+61KJAtKhHzlo+7WL1Zl1yJjJpQR2yrAdgHMB5RVpH
6EjSUhFaS75BVistUaXUKfwCG5eO7VRW9dtloSlNsehzbqMggrEu6/VyjM8O
Dwl3xmdPiESS9/ot7I6VvTicnDHvzJwf18Nky4dYve5xe1Fmq90tczbhXxAz
BO3K6mUmXY+JpQaRp84xQnDIc4UQZChmQtRqbLEWPGtS3dLmnCGGqxrxzJU1
51TWWOMihhmXvG89WqsuQGi7emd1ckZ+gwxYp0AuRmuorBElTNtObyJqAljG
SIMcAxj5/n2bJd12SX2YCu972KD+EMqCgituXo+rkT1bgoDQlOUmEsT2RJmH
yDqoAmy7fbmKhzGdGwM+6H0dTl7llARlov7hHXdIQBe84fZ/UhllLaKqTqVU
5azXVDYnDV2luGv7U8hIriLJug9rq3L6q6synz2oUPNmtGDQKbOX0FugiepE
OCOfmCsEO5lQd1MKqERZx9azbY7QcwJgpsuiUqPIZzGgALFrYhe+Im+rjTL2
do+IrlfSk7JJCA17X8PNuPRQKrGhV+sq76RTZnWFIXSbKyb03ssg3jVDnGJP
Uk1A4+GCQA02ICB32RRUfFioPJVb31MBP2v8l8PJpXVSXC/1u24SMA3m//jx
I6X9aZDsrs+FI4WqoNeHX/ihOZ6fXqDKeCHeT0/1QPz1ZHJxOfib+/Ni8pfB
3+rTjr9OTws8GL+9fI73x/poUD+5nGHg5ay4JYH+GEX7BW8+fwANbS9bNMvy
7J+cIHxm4+Jo0KzPWozeMCm7I9Qb9OJGYhetiWK0wofyUKmcD/hIci2XtgeR
L/opXRSCmaSM5C2mdQ/aTX2b1ocCR397uj0T9VhhK40NPK9o6B4ltf74dhZz
MOmPOzwkuTlYGzuw6rJVs/2ao1vRz64uekMF7NtBrEOv7f0ZnF5xlcfOnIgT
DydFHQUIsTw3RXknJWCFeiLqR9XL71t5z5lZOIxwBNN3jQhW/WlY9GwbMmaH
cjb815vCNjVNbaCgytoSrc2FmkC8Gv8Sah2mFMF9+voIVtwAmxjQVAGJ1/tY
dWuYF5VaPAys67zc3qHOzDkDzR3qhNDl9OYIrbU9U/gCJxq3tYFZm9Zq0/V4
Mjp8POJkv2MuF1NIxxVstc2VI/iE+8vMUMyirHCZlLQReoaJ82A5t8xyuRjf
54fhTKjWkE8VrSZ684xW8Duvk2HW6nANKDzpHZkg0ZXa1i9xFRx3m07BRNDT
O6xnXH/BVw9NQm/toNdU3hHd57QAKIvCrOv4dGDoUG23OR0M7L0ouL9qCmZ3
JaPuGhNoVgvXd2b/+w2lEdPxunPdHDVRv1rTd5lyicWJk4/zeJf9moE1SGc4
ySCc6TSbRB3owKuhFRlgBECWcHGy8jV5r/HRhynPWAK7c11SOomB+5BqsrI+
/thZP3A+XxbUSMf+wLKoZMjS7JHEmaDrb6yLi8mLyS/UFufaH6bkcyv6Tq1w
6vFnaget+sdXgM53lKn2HjaRcgNbanTboDwdp3mGtY+FDvZzU85quQNNJ0+n
QRAw/V+A+8zGA/EaLOLFBP97/ZA2MeDESv9/8uj2nyE2PGdBc+J/n89p9i3v
iE0383Jh3pCPdizVFMS2z3x2SlGv+X9J1U8mX6xzr7Ru3+aUL2zk7rrE6d0H
2Srcp+kGgse+JkopMYfk5/NC62gmhGXT/PQZvT5nCSWxP6phIoYwudbyzi6H
X3BfT8PDWffYOlDXvg85WvGJlN85xazz+85hTvO6tGKjQK0lNRWDrKY+DHTH
LMpTZKqP9zU1Ll2jmSWcqx1a208k3cak2+pbmKh1KrU3zXPz8R5C2c7idxPJ
vSSHNO1xsIbWXULYsMo+HeRO2J7+hkIacY3TlOk4ebdXfMe52dJ7nQdOIql9
7i1CaV0Gg+7asnPH6S6ORkf+0AcqYajGFbj89kIvh1l+e9ug/O7ncM9vR3t+
exKJx3j5SDwRT8W34jvxvfhB/Ph7fov+c/iF/0UfxGs696n1Iz6cfAA4TmaT
i58npxDyQxC3fuWlypZUdLnPh68iQwNo01O35ux8KmZ0JN7I4E35Slkrl4p6
IOqryvBFnw/RxzuedI6GuVG5//PxK8jw5Xogr35/LB44Rxd8G/u/D7pRdCBu
XTj6+yZtDxqIkwIRHyNrP9PlILiSY2E9HyKe5vheLxgRYHCB5lyGl2m9uXOd
kQ8b2k708FAY4FD56BgTKSbu/1CFGeG1pnksC7lWRPKmQMob6h1PHzmvu2f4
Pjd8eORet/x+p4XApZxZdJF37QbTaSFXdNYtQfD268/jl28nM/HQKuVbxFpm
8vb2UVi840wP6eKXnIMBp6xUSEBkfLfedw3oYucOWJ2tJ9S9a4huRvdhkt69
rfm2VAzR0/HrMV1H4In8rRB36s/CRhG/wF3fv2Nxz5jpUJazLhMCn0tYgIPp
i8n10T7dWjEUM1cV89cDTLmk+1Tb4+ihvJY65c3T6XRZ5vb4m282m82IpBiZ
YvkNlUHLjG/pfqOv1PXRMK+tvvvD6GZVrtMH/Z+Hh989agqf5qSLHZI56nGd
Dn7mTYk+WPU3Ef0eann57NTFN1vTscAHjRd3rRBRG6LXUOP44eo3Bc1ItiGS
kKObqxlIefXFsTHVwFVMl+UG/oDdLxZ3TQ6/7kxAJHA76qXq/rWY5gouHVH4
ewZ7Re73Jeqir+n/izXd2sLW6ADdydq64dvlU52pw/G1klbz3fLmIjTUsjYw
rAl02rEuPOpcaaxPAuhwIfRdnXzU0/C/uGAKl9EdEFrDJEiB91GzyXEW36Og
5oZMqcRtNlvIzDJP7e8XC9UHJ1t3Ekw0P9CvTJUbU1zxmtwzqZpTg84ZfE8r
VXaVcZehXwGMxHPwVoDCwIGw71J0r5ZKd6PAlJ5RtS+7+lr8U1a6a16nHL50
0dKa62/QDW3fToBFXZesVqVLWB0Q9ovuuTyyW/eELmThrv23q1O4p6kKuuWr
NI+oUbVTZi1CqcWuVDhC3T1/9OMZajqe5n4zVYmNzDrnRl9hS9rfue+W3NA6
vI5vQ5rghO6C+JkubNlvF4X2jmtX9qqpHgbw5rOBixYUVU4N/b6+3LORQa+3
Xx9v9TbHHcH6fl/3TKR17N8+Ar9WrbpymvnJ+J9xtI7P3b15nqjKQjOocx5e
+8lv7hlVjxxVfLlgrnxE81UcvXu9ZUWtWnqp6/aXXoBZfc3H3d8YxxSmcHB3
Uw/o/0755ehCoT/mya7ELDZlKc7SalV4B105EFlUqXDnsqX9L0pfdHA5W29t
aq4H4hKcR7ygehMSeQ/WhT/QR2W5RGpzmWBDWypounQbqtuRCOKwa3RlekeH
lHItxoAokwSh/DQUu1pt/L90CAuN+B/izGV8BQX8PxmTfJswOAAA

-->

</rfc>
