<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-idr-bgp-ls-security-capability-04" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="BGP-LS2C">the extensions of BGP-LS to carry security capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-idr-bgp-ls-security-capability-04"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="26"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 34?>

<t>As users' traffic faces more unpredictable attacks during transmission, there are more and more end-users now need high security data transmission guarantee, they need ISPs to provide security protection capabilities on the data forwarding path, but it is very difficult for operators to manage the security attributes of nodes through control surfaces.</t>
      <t>ISPs need to have real-time awareness of the security capabilities available in the network, then form a security capability map, finally provide security protection for users at the routing level. The goal of this draft is to collect the security capabilities of nodes, which will be one of the factors to form the routing topology, and use the routing programming capabilities to form a secure routing path. The security capability includes healthy information(such as the device software is up-to-date), security service information, device information(such as the manufacturer information of the equipment).</t>
      <t>The BGP-LS protocol is extended to carry the security capabilities of the node. The controller collects topology information, forms a topology path with security capabilities according to security requirements, and supports SRv6 path sending to execute node forwarding through programming.</t>
    </abstract>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>SRv6 (Segment Routing IPv6, IPv6 segment routing) is based on source routing and centralized routing. It can realize network intelligent programming and select forwarding paths according to customer needs. At present, there is a lack of effective technical means to inject security factors into the process of collecting network topology and centralized routing to achieve safe routing path forwarding.</t>
      <t>The most important reason for using BGP-LS as the extended basic protocol is that BGP-LS shields the differences of other routing protocols, and the underlying routing protocol types do not need to be considered when transmitting security capabilities.</t>
      <t>RFC7752 standardized North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP, describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol, using a new BGP Network Layer Reachability Information (NLRI) encoding format.</t>
      <t>BGP-LS is a new way to collect network topology. The topology information discovered by the IGP protocol is summarized by the BGP protocol and sent to the upper controller. With the powerful routing and routing capabilities of the BGP protocol, there are three types of BGP-LS routes, which are used to carry node, link and route prefix information respectively. The three routes cooperate with each other to complete the transmission of topology information. The node routing function is to record the node information of the topology, the link routing function is to record the link information between two devices, and the address prefix routing function is to record the network segment information that the node can reach.</t>
      <t>The state information NLRI collected by BGP-LS is described in TLV (type/length/value triplet) format. Each link state described by NLRI can identify a node, link or prefix. Therefore, three types of NLRI are newly set in the standard, of which type 3 and 4 are used to distinguish the prefix of IPv4 and IPv6. There are only two types of NLRI attributes in the original BGP protocol: MP_ REACH_ NLRI, attribute type 14; MP_ UNREACH_ NLRI, attribute type 15.</t>
    </section>
    <section anchor="bgp-ls-node-type-carries-security-capability">
      <name>BGP-LS node type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
    BGP-LS(Node)                          |
          |                               |
xxxxxxxx|xxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x                  +-----+-+
x   |Router |    x                  |Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  
 
Figure 1: Router and attached security products are used as node units
]]></artwork>
      </section>
      <section anchor="new-node-attribute-tlvs">
        <name>New Node Attribute TLVs</name>
        <t>The Local Node Descriptors TLV contains Node Descriptors for the node anchoring the local end of the link.  This is a mandatory TLV in all three types of NLRIs (node, link, and prefix).</t>
        <artwork><![CDATA[
0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |              Type             |             Length            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     //              Node Descriptor Sub-TLVs (variable)            //
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 2: Local Node Descriptors TLV Format
]]></artwork>
        <t>Node attribute TLVs are the TLVs that may be encoded in the BGP-LS attribute with a Node NLRI.  The following Node Attribute TLVs are defined:</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     263     | Multi-Topology       | variable | 
   |             | Identifier           |          |                   
   |     1024    | Node Flag Bits       |        1 | 
   |     1025    | Opaque Node          | variable | 
   |             | Attribute            |          |                   
   |     1026    | Node Name            | variable | 
   |     1027    | IS-IS Area           | variable | 
   |             | Identifier           |          |                   
   |     1028    | IPv4 Router-ID of    |        4 | 
   |             | Local Node           |          |                   
   |     1029    | IPv6 Router-ID of    |       16 | 
   |             | Local Node           |          |                   
   +-------------+----------------------+----------+
              Table 3: Node Attribute TLVs
]]></artwork>
        <t>The security capability is transferred by adding the security capability attribute to the attributes of the local node.</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     TBD1    | Node Security        | variable | 
   |             | Capability           |          | 
   +-------------+----------------------+----------+
              Table 4: New Node Attribute TLV
]]></artwork>
      </section>
      <section anchor="usage-of-new-attribute">
        <name>Usage of new attribute</name>
        <t>When programming the routing path, take the security capability requirement as one of the inputs. The description of the security capability requirement can be structured or one-dimensional matrix, which only needs to be consistent with the router's security capability description; There are many routing rules. After introducing security capability requirements, it is necessary to dynamically adjust the security capability as the position of routing rules according to the requirements. The main rule strategies are: ① Select the routing node that meets the security requirements as the forwarding node when the path is reachable; ② Select the shortest path when all the safety requirements are met; ③ When the same path length and security requirements are met, select the path with small load for forwarding.</t>
      </section>
    </section>
    <section anchor="bgp-ls-link-type-carries-security-capability">
      <name>BGP-LS Link type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-1">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
          |                               |
          |                               |
xxxxxxxxxxxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x  BGP-LS(Link)    +-----+-+
x   |Router |----x------------------|Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  

Figure 5: The peer node transmits the security capability through the link
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the direct node to achieve the transmission of security capability information. Therefore, for non direct nodes, It is required to report its own security capability information through the BGP-LS link state data packet.</t>
      </section>
      <section anchor="new-link-attribute-tlvs">
        <name>New Link Attribute TLVs</name>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Local Node Descriptors (variable)             //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Remote Node Descriptors (variable)            //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                  Link Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                      Figure 6: The Link NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    1028   | IPv4 Router-ID of   |   134/---    | 
   |           | Local Node          |              |                  
   |    1029   | IPv6 Router-ID of   |   140/---    | 
   |           | Local Node          |              |                  
   |    1030   | IPv4 Router-ID of   |   134/---    | 
   |           | Remote Node         |              |                  
   |    1031   | IPv6 Router-ID of   |   140/---    | 
   |           | Remote Node         |              |                  
   |    1088   | Administrative      |     22/3     | 
   |           | group (color)       |              |                  
   |    1089   | Maximum link        |     22/9     | 
   |           | bandwidth           |              |                  
   |    1090   | Max. reservable     |    22/10     | 
   |           | link bandwidth      |              |                  
   |    1091   | Unreserved          |    22/11     | 
   |           | bandwidth           |              |                  
   |    1092   | TE Default Metric   |    22/18     | 
   |    1093   | Link Protection     |    22/20     | 
   |           | Type                |              |                  
   |    1094   | MPLS Protocol Mask  |     ---      | 
   |    1095   | IGP Metric          |     ---      | 
   |    1096   | Shared Risk Link    |     ---      | 
   |           | Group               |              |                  
   |    1097   | Opaque Link         |     ---      | 
   |           | Attribute           |              |                  
   |    1098   | Link Name           |     ---      | 
   +-----------+---------------------+--------------+

               Table 7: Link Attribute TLVs
]]></artwork>
        <t>The new attribute describes the link security capability and transmits the link security capability information through this attribute.</t>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    TBD2   | Link security info  |   ---        |
   +-----------+---------------------+--------------+

            Table 8: New Link Attribute TLVs
]]></artwork>
      </section>
      <section anchor="useage-of-new-attribute">
        <name>Useage of new attribute</name>
        <artwork><![CDATA[
+------+          +------+
|  A   |          |  B   |
+---+--+          +--+---+
    |SCicg A         |
    +--------------->|
    |       SCing B  |
    <----------------+
    |SCing <A,B>     |
    +---------------->
    |                |

Figure 9: Assosiation security capability interaction
]]></artwork>
        <t>The Assosiation security capability depends on the security capability enabled by the node. As a node directly connected to the controller, node B first interacts with the enabled security capability information of the opposite end in a two-way manner, and then the opposite end initiates the transmission of the assosiation security capability information.</t>
        <t>The decision of assosiation security capability can be divided into two situations: one is under the same security domain, and the other is under different security domains. 
1. The decision rules for link security capabilities under different security domains are as follows: SCing represents the enabled security capabilities of a node.
Example: SCing A=[1,0,0,1,0,……]，SCing B=[1,1,0,1,0,……]，SCing Assosiation&lt;A,B&gt; = SCing A &amp;&amp; SCing B</t>
        <t>When the link passes through more than two nodes, it is necessary to logically and operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
        <ol spacing="normal" type="1"><li>
            <t>The decision rules of assosiation security capability in the same security domain are as follows: SCing indicates the security capability of a node that has been enabled.
Example: SCing A=[1,0,0,1,0,……]，SCing B=[1,1,0,1,0,……]，SCing Assosiation&lt;A,B&gt; = SCing A || SCing B</t>
          </li>
        </ol>
        <t>When the link passes through more than two nodes, it is necessary to logically or operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
      </section>
    </section>
    <section anchor="bgp-ls-prefix-type-carries-security-capability">
      <name>BGP-LS Prefix type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-2">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
      +----------+                  +----------+
      +Controller+                  +Controller+  
      +----------+                  +----------+ 
          |                               |
          | AS 100                        |
xxxxxxxxxxxxxxxxxx                        |AS 200
x         |      x                 xxxxxxx|xxxxxxxx
x   +-----+-+    x  BGP-LS(Prefix) x  +-----+-+   x
x   |RouterA|----x-----------------x--|RouterE|   x
x   +----+--+    x                 x  +-+---+-+   x
x        |       x       xxxxxxxxxxx  |   |       x
x        |       x       x     +------+   |       x
x        |       x       x     |          |       x
x   +----+--+    x       x  +---+--+  +--+---+    x
x   |Router |    x       x  |Router|--|Router|    x            
x   +-------+    x       x  +------+  +------+    x
xxxxxxxxxxxxxxxxxx       xxxxxxxxxxxxxxxxxxxxxxxxxx

Figure 10: Security capability is transferred between ASs through Prefix
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting the status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the directly connected node to achieve the transmission of security capability information. In the figure, nodes A and E are direct connected nodes, which are connected to their respective controllers. Nodes A and E are responsible for collecting the security capabilities of other nodes in their respective fields.</t>
      </section>
      <section anchor="new-link-attribute-tlvs-1">
        <name>New Link Attribute TLVs</name>
        <t>The IPv4 and IPv6 Prefix NLRIs (NLRI Type = 3 and Type = 4) use the same format, as shown in the following figure.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //              Local Node Descriptors (variable)              //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                Prefix Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            Figure 11: The IPv4/IPv6 Topology Prefix NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +---------------+----------------------+----------+
   |    TLV Code   | Description          |   Length | 
   |     Point     |                      |          |                 
   +---------------+----------------------+----------+
   |      1152     | IGP Flags            |        1 | 
   |      1153     | IGP Route Tag        |      4*n | 
   |      1154     | IGP Extended Route   |      8*n | 
   |               | Tag                  |          |                 
   |      1155     | Prefix Metric        |        4 |     
   |      1156     | OSPF Forwarding      |        4 |       
   |               | Address              |          |                 
   |      1157     | Opaque Prefix        | variable |  
   |               | Attribute            |          |                 
   +---------------+----------------------+----------+
           Table 12: Prefix Attribute TLVs
]]></artwork>
        <t>An AS has at least one super direct connection node, which has the security capability information of all nodes under the AS. By adding new attributes to Prefix, the security capabilities of the entire AS can be transferred.</t>
        <artwork><![CDATA[
   +---------------+--------------------------+----------+
   |    TLV Code   | Description              |   Length | 
   |     Point     |                          |          |                 
   +---------------+--------------------------+----------+
   |      TBD3     | AS security capabilities | variable | 
   +---------------+--------------------------+----------+
             Table 13: New Prefix Attribute TLVs
]]></artwork>
        <t>AS Security capabilities means the security capability information of all nodes under the AS, that is, the security capability information of all nodes is spliced, such as {[IP address (A)+node security capability], [IP address (B)+node security capability]...}.</t>
      </section>
      <section anchor="usage-of-new-attribute-1">
        <name>Usage of new attribute</name>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 366?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+08W24jyZH/AnSHBBqwpRVJSZRa3c3xDJZSq70y1Bqhpdn5
MIxBsipJplUPujJLEm3Z8AH2Z2+wux97Cp/GF/AVNiLyUVlkFfWe3R27ejAo
VUVERsYrIyOy2O1219eU5ln8A0/yTAyYLkqxviZnBd0q3d/Z+bDTX1+LuB4w
mY1z9oYdTUV0BXjlKJVKyTzT8xmgnhxfflpf44XgA3YhorKQer6+djOBN5kW
RSY0O84mMhOikNmEXXJ1xT7lRQTjra/FeZTxFKjEBR/rbjQVWVfGRXc0mXUT
1VWWXjfiMz6SCd7u7COiljpBvqeCiVstMuRHsXzMDn953j29YDpnES+KOXMk
mCchhWLA8GhUiOuBhe8fra8lPAOmRba+dnUzWF9jrOtn0P2I7JlnV2J+kxcx
COcNi7kGJvo7/f3u+27/gHW79IhJxcYySUQMsmO81HnKtYx4kszZaM5u06Rf
jCMmxyzLNZvIaxwUwKZ5AQN3WZHj3EQsdV6A4AuR5tfCgRtVMaCsBqiTDP8w
QvwsYH4gY/c0LyYIIjPOPucwd8KLQBgwbSF/BaD0IC8zXcwtJD4RKZfJgKE2
UkPynyN8lxKRXpSnyKUZ81Syi/IFBlNlIpdHMf+6IFc+Urrgkca/h4qVShTq
5yAMPh7LiI15BFpN80KwMpsVILpI81EiGNeaR1eKxSVZH8BnyppvB60HEMB0
DSb4g7kRWdylAUDgNwwsN2ZTOZlWtgRK5jVabFJy+FMLQVTnBunk4lyhJc6K
/FrGosKHB1pEGhFrZgl/o0UT+XFe3PAiRq5nXE87bFRqJjXa1rUAw44lzrxM
NEKyfCYKDuZC46U84xNBpPyQIIhCAglBXpLlMdzoaZGXMK8IfBlsDnRQkCB7
DKVM3NM8gOSUgwWCjyddLVMQFbAmMqGIWG2c2nz4NeiW9CDNzMCXwHmuSEgZ
Mp4y3oA7hynMOuBDGfnMKvnh5I2uuKYhYEoahZaIa5H02CU8muQ8MYyC8CjS
oBQxROTgpJFeMQMnqw67mcpoym7ArdlIgKaEmzqIzAmeJhQyofNZnuSTeYeM
C/isvYVpTAqepnhfG9WRsrIJMMASzJyahCazKClRsVNQlJ7OKXIXGHvybEOV
wD5XxsDEtYyARj7WqEiURjnr6ryL0WuzUxEHwRJkQKjjsNuIg/WVKBPguwiB
nLzE70o5S0WmN3toZjgZG7RRrTnoBPmhqB4b4zORfKWSyLhAUUY41qATYMCq
WHlV1OeCt2A61VuUMGhZT9tMOopy45XAmAcpcFIQp2FWyuhalbNZXsC4F1+u
DwxVBROyiOIWMLVhOfR055GBZfRcBExlHCe0ar7BhanI45JcAJ/QIBsXYoIc
sC/WWk7Orw869H8Y27yyhrSJIh5xBfIFxai8hPXYGxmyHwFwwRP5e4Cwz3vs
RIMsMgoD8MI5MwhUiySRE6QfmjSJQZCDLQSzBTFGkHHkKSgLow1EnyHSESAu
7WK0RB0lEMlR12I8RueHgARBYJrhwspSAcEYacnstzig14zzTmAyJysBDiMb
uKxtIBduLt4OWoSAQ3BYpiC4MMXHdc8MpulNO80VRJsUbYGj/AVXPmohnjV9
6zve6kE3sKyFDqGnEOAstAIGktj6MqwDIKIsMo6Qo8DCCEMErFEifAn0i2SO
bxehGGZ0ECFzSjRc6B+RPykIwLCuQhiEwG2XPk3YjX5C8//y6ejdu7d9Rqkm
ygUFeQaSmHYPIQ+I2UepzKpkw8OpzK66FxpTKGT30q7uYf64cXm8CeZfRZXv
nBgxMKkIyKGXgkFEU55JlWLGZWJ3gtRVRf24Fp3QsmmqZBPA6LjIU2cXyhjz
lJMIMDqgpgpYngABlJuh41uNahPQlqTbse85EL0hiDNrdKd8Djr7IsCwXCgP
Z7hxdvrlZBOykignjzFvSMLWHsg9kOoNn4fr2qJVm+jYFAnBjFQEWSbOb2Ri
7QlwGBqgKtOUF6RDC3EYQhhvBxO3fgbxj8Kvi8Q99j3KjVwwvxHFuExqEcfd
N0X2cKAwbYNwKYS12ir3R0rVio1wpQoXEgy6HbIGPzCGBTGWtzWRQAiamUCT
OMnReIY+TM0kXcIaBGjPeh9pIJ0lQpv1vpYp4pQaFGAGoPXASWJcZibHMclK
ITBk+pWuaWmt0g38i2Z4PzECC4mNwGoEevlNbtf6IHzwOC4wfFp5PYBXa4Nu
BQpHopjmJ2TXlmjqg6dx1hADXSHwUTDEygWc+9Ou6/L0X9kGWsZ2IrKJnm5f
86REVUjUy6ZzInbMbWSwg1VEgLYZDdiC4JdpOZ6jm1XWA0HciIGUB3eweegs
GiXRQCME/0wwo9IuGXZhsYNgxlgRi+2RsPdrlgvuiXIupbIuZMQPiLC87xMC
rvOWEULNMxgOdbjASrURsHzkhZxgpl1zM9hNnv/AvhwPj/7lB0LsVJiGzd39
rwjmu7OVUG97JmWxeiJN0xt0RvTxhkyWMN6wI7s+g95TQKMcvnG1Qfg/wYX7
yaVrq+uvrRDAP9868kEqgK0D3zVRCwa5M8BmkhtnwO1mAyt14AXK7cC39rpz
N7ergBcp3wdsZrRlptMA7N8b8DvMLiHI3bWA+/cB9a3uCupbIfWQ8WbO7xam
2Qy8VanofuBABQtcE4UAeCt4vGVv4d5KxpW/kGCA5J/f1e9rlyVxbtJ6tUjC
Pb8L70P9NfParXj1Rn27dOHo8N8nOcG95u6AWRViVKECylTEtc23YdHHJ66M
W5eZ1Mp5InnwGeQk6AyQ0ruoAIFZufh+mmPuTgAfKe7OKFfH2I2JA5eQ0y+9
xdzZrxk8i6Z54dKuhOhBBu0WRAzTPQZBEZYHSpJSDLlAZk6DYHUO9vMNEVux
jSrQm9XPhNxNUxwxc9xpsM/dhmf9hmd7LgjsAEofgv4+e8sO2Dv2nn14zDNL
Bv3oWf8snQW7vMRIHV7196e0ttbevy4/j74cP9vb9ecLZsUuylEXTZNtXEOS
izWrWgDf3n5hfl5APkurnXXg/mCVY32ixKfyUgLiNfe0ubX9g5K0FDYWI2H2
ICbB0lXdpsKmTJibgdGNyPewwpEk+Q16aUMwoNFi8K1MxIPaSh6uxi7YLl1L
yztqCCd6hEPBX04AmEZUamDeeO+YR2PnuYQUtV3N4UrBnskjhIWDPUvqc5lo
2b10+wI3gjPFGo8BBycmLZUQq1t4XL4CQrs7/X0DRmr5lHDYSEMIX8TerY8P
aG/N+29n/HeQVBN2MOh9bFf6fyrbBwHbZzxdINQ8PqC9M+9PLronF2wIe40H
oFXvny/t95YQpuxmje2efMQlJ8Tebxs/cOonjv/Bj3/QOv7uwYuP/zQfCa5L
UsveoDmXcJGstSyuzA58LApb3oBNrEsZmhCCLYypZdSbJ1WmQRXnv6uQdXn4
cdeQIlX4jNePcJ8THVVifnkel0xmf9CSgtay1O8Utsuw1QOwXtf48nusdoY1
7Vr7htpyml+JVksK+gKYJQddI5nNSq1M1ScO1N3aT6sTs9VKpYuSOi0xFiOA
fDeWqemGY1Gcw1RuXSGM6gFUYQ+rukojuRtXmqPaVvHzxl15yOdXQaEBcuq5
F0pRJthAHI41dX9Mm6K5TLzYNjHNzUxgeZ4XVMiM5xlPbeecx78tVVuvbu4q
6LNcSSfIGk/1lgPNNRjdKCKFHQdBo2C5FhPq+BRiwP767/8Bxu6bhY6yqWZQ
giSEVnXmQvqOvaARQrimnI58Y/8Apl+YKnAivoIx/zMcU8FGByKQti0qRDSb
F9OJWBoQNSM0kvkv9r0bRuFiSQRMWcyWbRs5NgQ6rofjuTTdsRQHT3Ie04Zs
ofPhyz1Y0f/plnuWolfj9dRyz+2PUu6xJStUFO142so9+PR2OQb/o9zz/7Lc
46s9bwcU+WYC268UzWxvT7VGWtekdgWWegZWVLUjJHJP/QhpmF4nFY96JlIF
jVmsypeq3rSnlUzlqbDnWHAxjCFuRRor3pb/qka0TMKtAME5gXBSC8cReuxb
auu4QzMQ7W2LdMWg4Wiuk7oayvJkaFpdVM3mpj5S8xmQekvJdSUwSGd5FpKH
JfdEmzWHwn5sOjfYqibV5TfZfUM0iS1spuBBphmProRpV9qKIC0KyxXBelD/
v1xbq2pB59ZGcB/1o9a+GjejC9fdA+iwjYN9NgJ1P6Bf8VLzWqzFtZWrmktx
VS3u1fj5ItJci4cy9Pr8oIjQZx4gnBfmpzHFYr7UeGBWD2KOuouL1cXGjXHz
dm7hqd91+o1x874YIEw9B+FYuO10O+Nm88en27bqW+E9nU1f4Gmu7yDE7t7+
NqCwOpsVQ00FlgXmG+ZSY+CDY2CpwEMM7O+8MgN7O8+SQOh4T2Rg91kSeD4D
740NDONUZpK2kXhSLcDs97dd2beBgQmspzO2AUtKXmyyEO/BDBgb+MxvZVqm
ZjmuYQIDH9oZGEHmdiPjWlfncQx82HEM9PAMjSiuqRbjMWH83Z12BojhBS4e
yYCxge8yMzokNnVMZGD3VSXQp/vLY4hYY45ntD8LyHaikIH3SwwA3h7dUzg9
r844h4z3V0huqVn3eMb36f7zOeRxLrUBRaorh2l9Z4nxt3SPR8b8TGsjtuEd
0P2FOVj3RcJAp9ZeV+B5yr8kZ3nWhN/RvW1knAa+8iAGmjoZj2TAhAuzgtY7
Gc0MPGWFWlrFTXX03aA5FQ+3c7WSaHDC0p8ca6zF4WGx2j6yFbR5MyFVNWh7
gf0nmkdcHn7sV0bhhUafYRGENwmXmj/fJoxBvB+0789q9XLRVjA3UEE5xl5b
flyYwLAuTLg9NFOx9ZY63paXDru7OJLRhPDD6bPFOX9jn7tBAA3PCHv4XyyJ
p6IPgL8Ydg6/WUW/+02dfsiPr6x8GLChUrmSxribjR/yE25P8Ydedx9iLGYi
i/0HQ00gIkOV+rO65uOIobInGKvSRZRnmTlMuVQU6RjQQzaWBZ5it9yqql3g
BrnPs21XI59ReZ6+sKLDN3g+sYuHllMOXBT+mGnWBC41SMSGnqUjtdilu1fa
VWnECToWkXQ07sO3PZdY4sdIsf2i4CZnwGJJWGpAHR78mgYP2VcF9+rDsRxb
DNVpWnNe2CO4s/x6EYM+ydp13SLLsmlrYGGnJbpiuf0+wlSF48oe0YAZGBco
hP0CQ92jZ3tKm7te6PEtx5PPjs7w61/vdnbgH/7/r3/+b/jvN3/7y79Zh8SX
uy0vAxcw/vi1I8l+9jPn0b5H59eYGWgx+LSNvufTU25OM9uqV0OjKcknrs2E
p8fswe6Vnxxh/8OUBGXQwgFa+QhPrq1a9twHEv1GjT7AFGXWalwtCpVZDBN0
7tNE02vRlDinQGOEx8Ct7n8k3d7dvaJu/YeSr69a3wE7Nye1X7sH1tKoYstv
PUbQB2vAqL19/CgszC8e2SEbXkBi3FT/dcCP6JABrf7OzoP6ZIunrFf2y4xa
N/FJCHFb65oNW7pmt75vdnxXId3TO7sNumcVUjglj1QTzF0IsAqJ/h920h6M
1HAIaNWcbn1nreqrbQVIjUfMb/3zOy+9GgBd9R5Z06jdsEPmR20zqOUXlXVU
J6Z3qp8+WHXwyH5XM7yoYpgxo1ftoNlPTf4eu2i19PZFOmonJviPSfEdO5kh
6erYHGQ1/bX6sLWP0RYTblkEX5oFwgRVni2RR0g8toO7Ncz8FvXctqLlgezN
AlYfdkwflD6gSYcGWvvkyC1w9tQ8dQGoEPW1/ZDJ/rG/6b9/p7TFCLWDqYqa
YqvRrqvVWWEj5N4/GoNN9Fuvn1Jj8HF9wR+jEWeN/X+7EecWnl3Tf0OH3CZn
9EfIA698WFPOLtRNV/NZ0OrAaktFjbWcWK2OrLYZ4MpDxc/nHOLF7tu+JY81
azz5rsIx/KgLR98RcS9ApDSEXfLJAuL+P2XLiPsB4rH70N9Q8GDvlxADnoJx
HiOrioO3FswaR71U77H37e0C8oGF+vbi/BOalDvH2IzM2iYxtB8QP3kS7xwf
pmZv5+KxgwPIrSw8+vuDZ9mcu0yNdbc/cDy3lViHmCPSBhySpERwpamupMoZ
lXLCBIMSI/pQzSQYU96+wV8oyFWb3KpaNbzosUN/Pr5W3aVTw4bxzv2/xYJr
UIH0XNUsSIRXnZhvlepz4pDT6ZNi0YvaRvssqOzvQguIrVm6y+frnzPwkmnu
mfr/feZ50bDbQe7sj7A8x/w6ZmcgVZuNraCDv1ExS2Qk4g5zP0j0h1+fnPvf
LNgYbm6Zvcwy2d90WA30cAVor9f7Y8/3QtpaIfaXeoZnQzBP8/sppkrM/vAG
n/7RpNMS5Zbm1Y83ZTkdyMOT3uBxCGk+OUVqXu5LFN0bQ/XwY/XLaSOOP9tn
/v0P/eco0vpPAAA=

-->

</rfc>
