<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-yang-spring-sid-as-source-address-09" category="std" consensus="true" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="SID as source address">SID as source address in SRv6</title>

    <author initials="F." surname="Yang" fullname="Feng Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>yangfeng@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="12"/>

    <area>RTG</area>
    <workgroup>SPRING</workgroup>
    

    <abstract>


<?line 37?>

<t>SRv6 is being rapidly deployed and is currently primarily used in trusted-domain backbone networks. Both the carrier market and the enterprise market are adopting SRv6 for end-to-end service delivery. However, if a firewall exists along an SRv6 path, legitimate SRv6 traffic will be dropped. This proposal addresses this issue by using SID as source address in SRv6 packets.</t>



    </abstract>



  </front>

  <middle>


<?line 41?>

<section anchor="introduction"><name>Introduction</name>

<t>SRv6 is being rapidly deployed and is currently primarily used in trusted-domain backbone networks. Both the carrier market and the enterprise market are adopting SRv6 for end-to-end service delivery. However, if a firewall exists along an SRv6 path, legitimate SRv6 traffic will be dropped. This proposal addresses this issue by using SID as source address in SRv6 packets.</t>

<t>The reason has been elaborated in Section 8.1 of <xref target="I-D.draft-ietf-spring-srv6-security"></xref>. In brief, SRv6 using loopback as source address will cause asymmetric address, which will be blocked by the firewall. As a result, users are forced to encapsulate traffic with multiple layers of tunnel headers—such as IPSec or L2TP—to ensure it can pass through the firewall. This approach introduces two significant issues: first, it increases overhead—for example, IPSec adds approximately 80 bytes of header overhead; second, it undermines the programmability benefits of SRv6, as forwarding is performed based on IPSec rather than SRv6 itself.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="terminology"><name>Terminology</name>
<t>AC: attachment circuit</t>

<t>PE: Provider Edge.</t>

<t>SID:  Segment Identifier, defined in <xref target="RFC8402"></xref>.</t>

<t>SRv6: SR over IPv6, defined in <xref target="RFC8402"></xref>.</t>

<t>VPLS: Virtual Private LAN Service.</t>

<t>VPWS: Virtual Private Wire Service.</t>

<t>VPN: Virtual Private Network.</t>

</section>
</section>
<section anchor="using-srv6-sid-as-source-address"><name>Using SRv6 SID as Source Address</name>

<t>Only unicast traffics are eligible for using SID as source address. There are a bunch of SRv6 services specified in <xref target="RFC8986"></xref>, and those End.DT* and End.DX* SIDs are locally allocated and associated SRv6 tunnel operation. All those End.DX* and End.DT* SIDs except End.DT2M <bcp14>SHOULD</bcp14> be used for source address. Put it simple, it <bcp14>SHOULD</bcp14> consider using SID as source address for IPinIP, L3VPN, VPWS, VPLS and EVPN services.</t>

<section anchor="user-traffic"><name>User Traffic</name>

<t>AC is associated with an SRv6 service, and the SID of that SRv6 service is locally allocated by the PE. Therefore, the traffic received from an AC can always be unambiguously associated with a specific local SRv6 service SID. In other words, the SRv6 service SID to be populated as source address can be naturally determined during the forwarding process.</t>

</section>
<section anchor="control-traffic"><name>Control Traffic</name>

<t>Control traffic will not be terminated by VPN, thus will not be impacted.</t>

</section>
<section anchor="oam-traffic"><name>OAM Traffic</name>

<t>OAM traffic terminated by the SRv6 tunnel <bcp14>SHOULD</bcp14> use the SRv6 SID as source address, such as ping, trace. Refer to RFC 8986 4.1.1, Allowing the processing of specific Upper-Layer header types is useful for Operations, Administration, and Maintenance (OAM).  As an example, an operator might permit pinging of SIDs. To do this, they may enable permission of Upper-Layer header type 58(ICMPv6).</t>

</section>
<section anchor="management-traffic"><name>Management Traffic</name>

<t>Management traffic will not be terminated by VPN, thus <bcp14>SHOULD</bcp14> not be impacted.</t>

</section>
</section>
<section anchor="use-cases"><name>Use Cases</name>

<section anchor="srv6-network-with-sr-aware-stateful-firewall"><name>SRv6 Network with SR-aware Stateful Firewall</name>

<section anchor="problem-statement"><name>Problem Statement</name>

<t>To provide VPN service in an SRv6 network <xref target="RFC9252"></xref>, the ingress PE encapsulates the payload in an outer IPv6 header with the Segment Routing Header (SRH) <xref target="RFC8754"></xref> carrying the SR Policy segment list along with the VPN Service SID. If the VPN service is with best-effort connectivity, the destination address of the outer IPv6 header carries the VPN service SID and the SRH is omitted.</t>

<t>Along the forwarding path in the SRv6 network, firewalls may be deployed to filter the traffics. If a firewall is SR-aware, it will retrieve the final destination of an SRv6 packet from the last entry in the SRH rather than the destination address field of the IPv6 header <xref target="I-D.draft-ietf-spring-sr-service-programming"></xref>.</t>

<t>A stateful firewall keeps a track of the state of the network connections traveling across it. Whenever a packet arrives to seek permission to pass through it, the firewall checks from its state table if there is an active connection between identified by 3 tuple or 5 tuple. Thus only legitimate packets are allowed to be transmitted across it.</t>

<t><xref target="f4"/> and <xref target="f5"/> show the bidirectional VPN traffic packets passing through a firewall in an SRv6 network.</t>

<t>The source address of the outer IPv6 header is the IPv6 address of
   ingress PE. The final destination address of the outer IPv6 header
   is the VPN Service SID of egress PE. In the SR-Policy-based way, the
   final destination address is encapsulated in the last entry in the
   SRH, Segment[0]. In the best-effort way, the SRH is omitted.</t>

<figure align="center" anchor="f4" title="SR-Policy-based VPN Traffic across Firewall"><artwork type="ascii-art"><![CDATA[
+---+   +---+       +--------+       +---+   +---+
|CE1|---|PE1|--...--|Firewall|--...--|PE2|---|CE2|
+---+   +---+       +--------+       +---+   +---+

Packet (PE1 ---> PE2):        Packet (PE1 <--- PE2):
**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-IP-ADDR     *        * SA=PE2-IP-ADDR     *
* DA=NextSegment     *        * DA=NextSegment     *
**********************        **********************
*        SRH         *        *        SRH         *
* Seg[0]=PE2-VPN-SID *        * Seg[0]=PE1-VPN-SID *
* Seg[...]           *        * Seg[...]           *
**********************        **********************
*    Eth/IPv4/IPv6   *        *    Eth/IPv4/IPv6   *
* Source=CE1         *        * Source=CE2         *
* Destination=CE2    *        * Destination=CE1    *
**********************        **********************
*       Payload      *        *       Payload      *
**********************        **********************

]]></artwork></figure>

<figure align="center" anchor="f5" title="Best-Effort VPN Traffic across Firewall"><artwork type="ascii-art"><![CDATA[
 +---+   +---+       +--------+       +---+   +---+
 |CE1|---|PE1|--...--|Firewall|--...--|PE2|---|CE2|
 +---+   +---+       +--------+       +---+   +---+

Packet (PE1 ---> PE2):        Packet (PE1 <--- PE2):
**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-IP-ADDR     *        * SA=PE2-IP-ADDR     *
* DA=PE2-VPN-SID     *        * DA=PE1-VPN-SID     *
**********************        **********************
*    Eth/IPv4/IPv6   *        *    Eth/IPv4/IPv6   *
* Source=CE1         *        * Source=CE2         *
* Destination=CE2    *        * Destination=CE1    *
**********************        **********************
*       Payload      *        *       Payload      *
**********************        **********************

]]></artwork></figure>

<t>The stateful firewall will check the association relationships of the bidirectional VPN traffic packets. A common implementation may record the key information of the packets on forward way(internal to external), such as source address and destination address. When receiving a packet on backward way(external to internal), it checks the state table if there is an existing forward packet flow. For example, the firewall may require that the source address of packet on backward way matches the destination address of packet on forward way, and destination address will be checked in the similar way. If not matched, the packet on the backward path will be regarded as illegal and thus dropped.</t>

<t>An SR-aware firewall is able to retrieve the final destination of an SRv6 packet from the last entry in the SRH. The &lt;source, destination&gt; tuple of the packet from PE1 to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;. However, the source address of the outer IPv6 packet is usually a loopback interface of the ingress PE. Eventually, the source address and destination address of the forward and backward VPN traffic are regarded as different flow, and they may be blocked by the firewall.</t>

</section>
<section anchor="solution-for-srv6-traffic-pass-thru-sr-aware-stateful-firewall"><name>Solution for SRv6 Traffic Pass Thru SR-aware Stateful Firewall</name>

<t>In the SRv6-based VPN service, the final destination of the outer IPv6 header is the VPN-SID of the egress PE, which is associated with that VPN service. But the source address of the outer IPv6 header is usually unrelated to the VPN service. So, it can be difficult for a stateful firewall to establish the association relationship between the bidirectional traffic flows.</t>

<t>The proposed solution is to unify the semantic of the source and destination address thus ensure the symmetry of the bidirectional flow.</t>

<t>When an ingress PE receives the client packet from CE, it checks which L3 VPN service it belongs to, and uses the VPN-SID associated with that L3 VPN service as the source address when encapsulating the outer IPv6 header with the optional SRH.</t>

<figure align="center" anchor="f6" title="Outer IPv6 Header in the Proposed Solution"><artwork type="ascii-art"><![CDATA[
Outer IPv6 Header of SR-Policy-based VPN Traffic:

**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-VPN-SID     *        * SA=PE2-VPN-SID     *
* DA=NextSegment     *        * DA=NextSegment     *
**********************        **********************
*        SRH         *        *        SRH         *
* Seg[0]=PE2-VPN-SID *        * Seg[0]=PE1-VPN-SID *
* Seg[...]           *        * Seg[...]           *
**********************        **********************

Outer IPv6 Header of Best-effort VPN Traffic:

**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-VPN-SID     *        * SA=PE2-VPN-SID     *
* DA=PE2-VPN-SID     *        * DA=PE1-VPN-SID     *
**********************        **********************

]]></artwork></figure>

<t>According to <xref target="RFC8402"></xref> and <xref target="RFC8986"></xref>, an SRv6 VPN Service SID is an IPv6 address, and it is routable by its Locator prefix in the SRv6 network. In the proposed solution, when an SRv6 VPN Service SID is used as the source address of the outer IPv6 header in the SRv6 network, it is treated as a normal IPv6 address and does not perform any special behavior.</t>

</section>
</section>
</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>TBD.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8402">
  <front>
    <title>Segment Routing Architecture</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="R. Shakir" initials="R." surname="Shakir"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
      <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
      <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8402"/>
  <seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>
<reference anchor="RFC8754">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>
<reference anchor="RFC8986">
  <front>
    <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="Z. Li" initials="Z." surname="Li"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
      <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
      <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8986"/>
  <seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>
<reference anchor="RFC9252">
  <front>
    <title>BGP Overlay Services Based on Segment Routing over IPv6 (SRv6)</title>
    <author fullname="G. Dawra" initials="G." role="editor" surname="Dawra"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Zhuang" initials="S." surname="Zhuang"/>
    <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>This document defines procedures and messages for SRv6-based BGP services, including Layer 3 Virtual Private Network (L3VPN), Ethernet VPN (EVPN), and Internet services. It builds on "BGP/MPLS IP Virtual Private Networks (VPNs)" (RFC 4364) and "BGP MPLS-Based Ethernet VPN" (RFC 7432).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9252"/>
  <seriesInfo name="DOI" value="10.17487/RFC9252"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-spring-sr-service-programming">
   <front>
      <title>Service Programming with Segment Routing</title>
      <author fullname="Ahmed Abdelsalam" initials="A." surname="Abdelsalam">
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname="Xiaohu Xu" initials="X." surname="Xu">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname="Daniel Bernier" initials="D." surname="Bernier">
         <organization>Bell Canada</organization>
      </author>
      <author fullname="Cheng Li" initials="C." surname="Li">
         <organization>Huawei</organization>
      </author>
      <author fullname="Bruno Decraene" initials="B." surname="Decraene">
         <organization>Orange</organization>
      </author>
      <author fullname="Shaowen Ma" initials="S." surname="Ma">
         <organization>Mellanox</organization>
      </author>
      <author fullname="Chaitanya Yadlapalli" initials="C." surname="Yadlapalli">
         <organization>AT&amp;T</organization>
      </author>
      <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
         <organization>Nokia</organization>
      </author>
      <author fullname="Stefano Salsano" initials="S." surname="Salsano">
         <organization>Universita di Roma &quot;Tor Vergata&quot;</organization>
      </author>
      <date day="3" month="November" year="2025"/>
      <abstract>
	 <t>   This document defines data plane functionality required to implement
   service segments and achieve service programming in SR-enabled MPLS
   and IPv6 networks, as described in the Segment Routing architecture.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-service-programming-12"/>
   
</reference>

<reference anchor="I-D.draft-ietf-spring-srv6-security">
   <front>
      <title>Segment Routing IPv6 Security Considerations</title>
      <author fullname="Nick Buraglio" initials="N." surname="Buraglio">
         <organization>Energy Sciences Network</organization>
      </author>
      <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
         <organization>Huawei</organization>
      </author>
      <author fullname="tongtian124" initials="" surname="tongtian124">
         <organization>China Unicom</organization>
      </author>
      <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         <organization>Telefonica</organization>
      </author>
      <author fullname="Fernando Gont" initials="F." surname="Gont">
         <organization>SI6 Networks</organization>
      </author>
      <date day="2" month="February" year="2026"/>
      <abstract>
	 <t>   SRv6 is a traffic engineering, encapsulation and steering mechanism
   utilizing IPv6 addresses to identify segments in a pre-defined
   policy.  This document discusses security considerations in SRv6
   networks, including the potential threats and the possible mitigation
   methods.  The document does not define any new security protocols or
   extensions to existing protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-security-11"/>
   
</reference>



    </references>

</references>



  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+1aa3IbxxH+v6eYUH8kGQuTFCVLiCQbIiETVXwgBOVHyazU
YHcATHGxg+zOEkLJcuUQOUDOkqPkJPm6Z2exCwKUI7mSSsqskjCYV/f04+vu
GYRhGORWpvGfZWJS1RE2K1Sg5xm3cru/u/tsdz+IpO2I3MZBXoxmOs+1Se1y
jun93uXrQGZKdsTF5bfBYtIRw8FF/+zbIIhNlMoZ5sSZHNtwKdNJmM8zTR86
DmUe5qbIIhXKOM5Unoe7z4LAaptgybB/JGQu3ARRThA6FcOLmyeBHI0ydbNl
VpCAUEeoNJCFnZqsE4SBwNK8I163xY8YxFfH2GuVTnyPybDocKpTKU7NSCcK
fZEpUpst0X+Gb2omddIRdI4xFn4T0eQZz21HZrYic9gWJzqtqBxOsWKBf2Uv
UzpTC3H86FBcqmiamsRMtMq3UUx0Gvk92rsHB3sH30wfRUwzSE02k1bfqA7m
X7w+fHqwu++bXz0+8M1nT5+UzWf7jzFBp+P6wn541HZa0sqOKy1lYa6yGw0V
zTMzyeRshu675t88wYqoyLRddoIgDEMhR7nNZGSDgDQndC5GCnNFJuc6TpYi
VvPELFUsYII0isWZSi1GsOdMZhqtIsc4dM8GqeIwNpBLKkYyuh7BZkWq7MJk
13lbvDJ2KuxUiUhmmVaZwA7XyvLm1I2dVYaNc1WNZGQ4Zm6JKWYRgsG8OLQm
xIcoJQBGEwgrW7bFsVkotFpCj4UUY52phUwSod7p3OaC3GgCgm6zubTTlkjU
RFucxirXC4mMxzoSC411I+ydmflcxW1xOYUIIOu5yWXiDVrl4B39cLtCiRHJ
g5m9y0VAOMLx8rbTwkzHMSw6uCf6MC8TF5GFB/+uk/+WTi5xbmBmblIxlSR+
lQqVyJHJwA/LdahYReJpe0+YsXj7Kzzuqg3tihFkPG45go6pxJg56WUDZ3zY
SEKZGFzOZspmEEE52hKLqY6mlURGiQH/MZ2W9OaF3BZdSBjHyYvEtsgwspxV
CKVFmG4NVBfJOYZJ2Cs5wyxmWKLniRKJXNIynNQWaaoSMVUyRs8///q3vAAP
YL0/gEwAnuJk/3KAft43L0BIW5whhXhz0kpmisl0jUPWoZxDixKb6dIHSIkL
I3I9STVYkql1+gSEY2mOw2BnYC9pCnMNDIzYAm22x3dyBtZbJWMQWkniHVsV
fOTpLmRlFR/Lnafa44+w4cikMZMoUgwBWtmolPBYKxFZoFaIPlVjbXkbUmuL
pAEOFjKLSb9kniojPCflSHJMGI7jCvY0BVk79caPfVQybgtgwT1xof5SQEYz
uGAuThBdCjlRzjqv1VLAgXGmndM3w8udlvsUZ+fcvuj96U3/ondE7eFx9+Sk
agTljOHx+ZuTo1VrtfLw/PS0d3bkFqNXNLqCndPujxgheNg5H1z2z8+6JzsM
NaREJBUF8csWBhOAXWoHIIo8R+ZBrPIo0yPnRq8OB//4+96BeP/+D4h9+3t7
zz58KL883fvqAF8WU5U6aiaFztxXCG0ZQJlKZrSLZC+ZayuTnKWfT80Crqsy
BWd++JYkc9URz0fRfO/gZdlBB250epk1Ollmt3tuLXZC3NC1gUwlzUb/mqSb
/HZ/bHz3cq91Pv8aaYgS4d7Tr18GbD2XbLSUuyyD7mFHSGvhXaycSGdRoRH0
B72OGGTmRpPx9+IJyQsg2REAuAlP7cf4H+5H4B3DzlOnuLdlLnPVdlEKyd4F
ew8Mm1xgy9TvBifDjvhOZ7YAWA8yfUOYc9I9Az2OGTzn+w1zvocjNCad3Z5z
5oJamwLpm7yKTiXqDx22dss0NDgneypSAEtuPew5ZETYmuhRwhB5V+Qg4FIU
DOmfGBVIAz0I+BiIJXMVkfxWskCyd9Uq46sBtPfSuH10+ZB7uP3DQ6LneAGo
w7yXZONo2TLqA0pNpPmri44OlQ2ARlJcAujDJ2rb/1Db/rLcXr2L1NyWffun
ojRYuCxnD3T49fMOCkuImGsHrWiWiwCWORvRXYGWduwPdNoftMTJI6iwJUjZ
9P/J0PGHzkp0bTbjN/gqLp16Ahgy4Wnt+BynPHqWK1tV8kJ8UNCaStuYQZvc
lmwZOQe9UrHgVzHYVFExU5FCSgPhZGZGZMEPxTaZLOQyZ9GhqBjpSWGKnPZe
Z9SbQ+TIN5kCt5wjGA4KDO+O/PqsElnnZs5BO94ga+IKU1Jpi4yPGQOAOYrF
Ii4oO3ExeBWnENciVjKL/dBQFE5WkvcdjUQsNZaouJ29DFmxdlrkjTkwGdQZ
yNh4+/Pu6Wpr+uK3bW5VHb408NLaKCGqhjbaWkv4vGSOs7Voe+AGIuqYwq2h
SkuQI4qD9l57r0XuYhZeKKUk6CuMp9LYGwScLDyhVMjnC1RkU5ZJHI2LhC38
3DshmOjGOIymEos6nF2eSoqIqUzB7X0c/UFbcIqWrlIWtJ0rY7uZnkwtZRAz
eBsdpmSLXBh2ahByOfS6qIgcfYm8SxJ68Rq+C6D5W7gXj5/e7x+eArQfOM2c
yhRZBmN/paBa37+j/lJbGwyAvFocUtrGNFmPJXo7RxlehHJB+De02JdE+7rM
FmnBPQpaOOLMDRNjSIsMKY5CmaihCOcHJTyURQ+jMNXZV867IFB2mUGvngmX
yZ5cJkbG5S6msGWE8yJkZtkUy3h5gTmkoWM3fn94cfzAwT7K/SsuspbezhAy
BybR0RLMutUJbKUsh6qd6TDDBkKMq/4anPH8kcptqMYwQ0uQnFKVcoMk1R0U
qZclPZFFeJwwbrPbJ3PlYH6LFLubh9eLYyJtYJpOsV1mfR1YkOS6BFE19NCq
KoCczZaqOl/awkXHOrGcG1fwm/PZa/UjaHtD4WDERplRlYRqs6wxUqBs/eA4
sGwUfA7LaXJCmYCiC54Vu8eNHH2bFBHfk9jLsi7FrYXhpqsbypC6IvcWXx3z
Wqk51XAEYteeCk/zX7xle50DfGj2DTIZqqyjzFCda9vie+TPVIljt/L0pOYb
0jMqLaWu66iBrkbRpm2rUbiJaKqi69wJkCogx5Nl9NHMWca2SRGSLFHVGIS6
7YIKa+0zTEaPR4B6qjiBfI9dk4IxwITT/9qtQFmtu+SL0NtZzYitJc2dSdaO
HgTv34+poiDjRfMxmlQn8IlGOsaZmC+YC5m7xzlPhgTh/NbJom6FtxAGxISg
HGI9Km/1Np2vTGc1mXZZoRNnJRss+mOb8y75JiyhJWq1fd8bfehgKXTVKlIb
1jvts506KNTQM/YedMunaBe4Vcsj5k9vd3+6qmjXAczTvQ0z71HNIEdPX+xE
fD21AwVEU5O92BkfoJ2xEkIKby92ZB5pHaJvR/Dl9Yud9fORUMpQ5+3FB5ud
D0Hwyy+/BMEXYRh+Ac79pyjb/FfvqCYFPx/29n5G6+cBf7bbbbT9xlXHoLfP
kw7x+SlUgoFz4/ugItDzEprcf9Ap54r66HO6auTR4OHGP79o82hQjbNt+bm3
Go1RLBp2X4B62B+E3aOji/VFPLrfHMWio+6LM/XO+qi6tmjT6GeeiWxs+5ka
o3QmNXm7e8Wcw3pCcqX6mfzo3mq0XASlX4nV39qi9dHPOFPPTr+EJg6+LNXR
PNOtUWKPoeoFrHYje350vyGIoxUS+LG6nhqje7+BngZlPrZZT83RT6Pk/P0O
hHn8cYR5RSjWcyj2a9BFfILji0/Al0+h8/8LMHXvXTfcbsN7P9dwf3fGz3LG
S5/uNrJi9zhCGSgnCf6qhXKSTCWuAp/qeZUXfTTHa4su8tPZDBvw/RbFFrcf
VSdYajJX9tDle/VC60oKVyu6VBE9ZfVDKcx9vv8mkvQi8s61H6zuJ9YyRMpO
N6RXLnMv7584p/f5u3GvehU5T4LIedIPuDoqs/VV8bAxUec3OaLgz+CrJKTY
bfG6/rLSqAWcjPjBwt232Y3p72ausdqCvfyuMnW1sibd1jaBVc9ifOpVPprr
mU5kRmu5mqTLCUc8btW0SGTYaDyTXMT6PTM1QZ+7d0MXviVlTYxCxb9MopZL
V/cY9ZqVxQ71/MaVqqsPnjuZt+pbvfRFVd1Q3W6E22AFWEicPa8BaUvUAPLl
6k7V3U5WvlQu268vq5DzZe3pd7M9rFUsJWt8o1a469nVAymb81hG1UHqtVHv
BvLgJRtJbTOTcidvUjSt0nkdI0iHdbXHejxW9OzOjlFJZ+lvMra9xrrrq6FJ
CmaDLgxZwz5FGFDBfTnNijuvwPqr25RaEVNdf2+1pzuLTx/tynlVYegfmjdc
vLOj10i3xatim+dvpe01XaSM266OX7t2akNkLf+STBdFmqRVJJYlKDeEB0Lb
nBBO59M7A0R1EXE7SHjlk4r97wLcTw3AZO51qPnypEj12Ok6VzOZWizzNzWl
KLZYIING+VTO091D/3Jz3GIYDgKOBhBF7e6yfJtwuowSTbZZ9/TDXj0KOJWe
PGpeI9JFLV3h0YmcTRe5alrHRhNY20fmm2yA3m5rdwT+FvSOS1X6jQmfmtDt
zqT8yceT8vMVnfJytoTOgdeo98oqL7+9hJ/3tl4fdILPS6g+LfHdksMON2S4
v1fWFaVPSkc3GsSr2p3V/54x/EeqIOdO3YhSaPZ7s/pZAMNM42HcRcT1u0qX
ntZvSB1CaU4XMsAI51UIuHQVfUJvuggN80yN9btNzw/VneMtRG85qLqDEX4g
34xy2yPdphcQx7zNlH/GlYJ/Mpo0r4I5dhggMaWr5a+J0Ll0j5OSktKpvNEm
48e1fvesSw+4/CLv4px4f496P1AMq/9Mh37elhq3QrqHA95iWP5o7fY2foS2
enVU/oCRUqbgX/Xs09SsLAAA

-->

</rfc>

