<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-05" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-05"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <date year="2024" month="September" day="09"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 98?>

<t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 102?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address spoofing attacks. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, it is not feasible to deploy SAV at every network edge. Additional SAV mechanisms are needed at other levels of the network to prevent source address spoofing along the forwarding paths of the spoofed packets. The Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> proposes a multi-fence approach that implements SAV at three levels of the network: access, intra-domain, and inter-domain.</t>
      <t>If a spoofing packet is not blocked at the originating access network, intra-domain and inter-domain SAV mechanisms can help block the packet along its forwarding path. As analyzed in <xref target="intra-domain-ps"/>, intra-domain SAV for an AS can prevent a subnet of the AS from spoofing the addresses of other subnets as well as prevent incoming traffic to the AS from spoofing the addresses of the AS, without relying on the collaboration of other ASes. As complementary, in scenarios where intra-domain SAV cannot work, inter-domain SAV leverages the collaboration among ASes to help block incoming spoofing packets in an AS which spoof the source addresses of other ASes. It is noteworthy that scenarios where intra-domain SAV cannot work may consist of three cases: (1) the AS whose prefixes are being spoofed does not have intra-domain SAV deployed, (2) an AS requires the ASes near the spoofing attack source to filter the spoofed traffic, and (3) an AS whose source prefixes are spoofed may not be in the path of the spoofing traffic.</t>
      <t>This document provides an analysis of inter-domain SAV. <xref target="exp-inter-sav"/> illustrates an example for inter-domain SAV. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAV can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAV, AS 2 knows the correct incoming interface of packets with P1 as source addresses, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect interface.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating inter-domain SAV.</name>
        <artwork><![CDATA[
+------------+
|  AS 1(P1)  #
+------------+ \
                \            Spoofed Packets
              +-+#+--------+ with Source Addresses in P1 +------------+
              |    AS 2    #-----------------------------#    AS 4    |
              +-+#+--------+                             +------------+
                / 
+------------+ /
|    AS 3    #
+------------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>There are many existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses  are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Real forwading paths:</dt>
        <dd>
          <t>The paths that the legitimate traffic goes through in the data plane.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC2827"/> <xref target="RFC3704"/>: ACL-based ingress filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, peer interfaces, or customer interfaces of an AS, and is recommended to deploy at provider interfaces or customer interfaces <xref target="manrs"/> <xref target="nist"/>. At the provider interfaces, ACL-based ingress filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as suballocated or internal-only prefixes of customer ASes <xref target="nist"/>. At the customer interfaces, ACL-based ingress filtering can prevent customer ASes from spoofing source addresses of other ASes that are not reachable via the provider AS. It can be implemented at border routers or aggregation routers if border ACLs are not feasible <xref target="manrs"/>. However, ACL-based ingress filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system, which requires manual configuration to avoid improper block or improper permit.</t>
        </li>
        <li>
          <t>uRPF-based machanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses that are obviously disallowed, such as non-global prefixes (e.g., private addresses, multicast addresses, etc.) or the prefixes that belong to the customer AS itself <xref target="nist"/>.</t>
            </li>
            <li>
              <t>FP-uRPF <xref target="RFC3704"/>: FP-uRPF maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/>: VRF uRPF uses a separate VRF table for each external BGP peer. A VRF table is a table that contains the prefixes and the routes that are advertised by a specific peer. VRF uRPF checks the source address of an incoming packet from an external BGP peer against the VRF table for that peer. If the source address matches one of the prefixes in the VRF table, VRF uRPF allows the packet to pass. Otherwise, it drops the packet. VRF uRPF can also be used as a way to implement BCP38 <xref target="RFC2827"/>, which is a set of recommendations to prevent IP spoofing. However, the operational feasibility of VRF uRPF as BCP38 has not been proven <xref target="manrs"/>.</t>
            </li>
            <li>
              <t>EFP-uRPF <xref target="RFC8704"/>: EFP-uRPF consists of two algorithms, algorithm A and algorithm B. EFP-uRPF is based on the idea that an AS can receive BGP updates for multiple prefixes that have the same origin AS at different interfaces. For example, this can happen when the origin AS is multi-homed and advertises the same prefixes to different providers. In this case, EFP-uRPF allows an incoming packet with a source address in any of those prefixes to pass on any of those interfaces. This way, EFP-uRPF can handle asymmetric routing scenarios where the incoming and outgoing interfaces for a packet are different. EFP-uRPF has not been implemented in practical networks yet, but BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> suggests using EFP-uRPF with algorithm B at customer interfaces of an AS. EFP-uRPF can also be used at peer interfaces of an AS.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Source-based remote triggered black hole (RTBH) filtering <xref target="RFC5635"/>: Source-based RTBH filtering enables the targeted dropping of traffic by specifying particular source addresses or address ranges. Source-based RTBH filtering uses uRPF, usually Loose uRPF, to check the source address of an incoming packet against the FIB. If the source address of the packet does not match or is not covered by any prefix in the FIB, or if the route for that prefix points to a black hole (i.e., Null0), Loose uRPF discards the packet. This way, source-based RTBH filtering can filter out attack traffic at specific devices (e.g., ASBR) in an AS based on source addresses, and improve the security of the network.</t>
        </li>
        <li>
          <t>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</t>
        </li>
        <li>
          <t>BGP origin validation (BGP-OV) <xref target="RFC6811"/>: Attackers can bypass uRPF-based SAV mechanisms by using prefix hijacking in combination with source address spoofing. By announcing a less-specific prefix that does not have a legitimate announcement, the attacker can deceive existing uRPF-based SAV mechanisms and successfully perform address spoofing. To protect against this type of attack, a combination of BGP-OV and uRPF-based mechanisms like FP-uRPF or EFP-uRPF is recommended <xref target="nist"/>. BGP routers can use ROA information, which is a validated list of {prefix, maximum length, origin AS}, to mitigate the risk of prefix hijacks in advertised routes.</t>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential in preventing source address spoofing attacks across all AS interfaces, including those of customers, providers, and peers. An ideal inter-domain SAV mechanism <bcp14>SHOULD</bcp14> block all spoofing traffic while permitting legitimate traffic in all scenarios. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms used in the corresponding interfaces of these scenarios to identify their technical limitations.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>SAV is used at customer interfaces to validate traffic from the customer cone, including both legitimate traffic and spoofing traffic. To prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF. However, uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may cause improper permit problems in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. For brevity, we will analyze ACL-based ingress filtering and source-based RTBH filtering in detail using the concrete cases in <xref target="sav_at_p"/>.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, source-based RTBH filtering, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF in the corrresponding scenarios.</name>
          <artwork><![CDATA[
+-------------------+------------+-----------+-------+--------+--------+
|Traffic & Scenarios|ACL & S/RTBH|Strict uRPF|FP-uRPF|VRF uRPF|EFP-uRPF|
+----------+--------+------------+-----------+-------+--------+--------+
|Legitimate|  LPP   |            |                                     |
|Traffic   +--------+            |            Improper Block           |
|          |   HP   |    High    |                                     |
+----------+--------+Operational +----------------------------+--------+
|Spoofing  |  RAC   |  Overhead  |                            |Improper|
|Traffic   +--------+            |   Functioning as Expected  |Permit  |
|          |  DAC   |            |                            |        |
+----------+--------+------------+----------------------------+--------+
S/RTBH: Source-based RTBH filtering.
"LPP" represents a class of scenario called limited propagation of 
prefixes. 
"HP" represents a calss of scenario called hidden prefixes.
"RAC" represents a class of scenario called reflection attacks by source 
address spoofing within a customer cone.
"DAC" represents a class of scenario called direct attacks by source 
address spoofing within a customer cone. 
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios, and has 
low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with ACL-based ingress filtering, source-based RTBH filtering, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF for SAV at customer interfaces in the corresponding scenarios. Both ACL-based ingress filtering and source-based RTBH filtering have high operational overhead as performing SAV at provider/peer interfaces. Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF, on the other hand, may incorrectly block legitimate traffic in the scenarios of limited propagation of prefixes or hidden prefixes. Furthermore, in scenarios of source address spoofing attacks within a customer cone, EFP-uRPF may inadvertently permit spoofing traffic.</t>
        <t>In the following, we analyze the gaps of Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF for SAV at customer interfaces in scenarios of limited propagation of prefixes and hidden prefixes, respectively.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to false positives when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as Strict uRPF, FP-uRPF, and VRF uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           | NO_EXPORT     \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \ (C2P)  | (C2P/P2P)  (C2P) \     (C2P) \
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>Assuming that AS 1 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 to only arrive from AS 1. When AS 1 sends legitimate packets with source addresses in P1 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF, FP-uRPF, and VRF uRPF. Although EFP-uRPF with algorithm B can avoid improper block in this case, network operators need to first determine whether limited prefix propagation exists before choosing the suitable EFP-uRPF algorithms, which adds more complexity and overhead to network operators. Furthermore, EFP-uRPF with algorithm B is not without its problems. For example, if AS 1 is the peer of AS 4, AS 4 will not learn the route of P1 from its customer interfaces. In such case, both EFP-uRPF with algorithm A and algorithm B have improper block problems.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic with these hidden prefixes may be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ P3[AS 3]
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 1, AS 2] /     |      \           \
               P2[AS 2] /      |       \           \
                       /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
          P6[AS 1] \           | NO_EXPORT   \           \
           P1[AS 1] \          |              \           \
           NO_EXPORT \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 1 will improperly block the legitimate response packets from AS 1.</t>
          <t>Moreover, it is worth mentioning that EFP-uRPF with algorithm A/B may also permit spoofing traffic improperly in scenarios where source address spoofing attacks within a customer cone occur. We provide illustrations of these scenarios in the following. The source address spoofing attacks within a customer cone include reflection attacks within a customer cone (<xref target="reflection_attack_customer"/>) and direct attacks within a customer cone (<xref target="direct_attack_customer"/>).</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below.</t>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P1')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \ 
                          +----------------+          +----------------+
                  Victim+-+  AS 1(P1, P6)  |  Server+-+    AS 5(P5)    |
                          +----------------+          +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-reflection-attack"/>, the reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm A/B at its customer interfaces, it will allow packets with source addresses in P1 to originate from AS 1 and AS 2. Consequently, when AS 2 sends spoofing packets with source addresses in P1 to AS 4, AS 4 will improperly permit these packets, thus enabling the spoofing attacks to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, and VRF uRPF do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P1 are only allowed to arrive from AS 1.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below.</t>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                            +----------------+        +----------------+
                    Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                            +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-direct-attack"/>, the direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm A/B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, when AS 2 sends spoofing packets with source addresses in P5 to AS 4, AS 4 will improperly permit these packets, thus enabling the spoofing attacks to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, and VRF uRPF do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P5 are only permitted to arrive from AS 5.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>SAV is used at provider/peer interfaces to validate traffic entering the customer cone, including both legitimate and spoofing traffic. To prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering and/or Loose uRPF can be deployed <xref target="nist"/>. In addition, source-based RTBH filtering can be used to remotely configure SAV rules.</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+--------------------+------------+---------------+
|Traffic & Scenarios |ACL & S/RTBH|   Loose uRPF  |
+----------+---------+------------+---------------+
|Legitimate|   Any   |            |  Functioning  |
|Traffic   |Scenarios|    High    |  as Expected  |
+----------+---------+Operational +---------------+
|Spoofing  |   RAP   |  Overhead  |               |
|Traffic   +---------+            |Improper Permit|
|          |   DAP   |            |               |
+----------+---------+------------+---------------+
S/RTBH: Source-based RTBH filtering.
"RAP" represents a class of scenario called reflection attacks by 
source address spoofing from provider/peer AS. 
"DAP" represents a class of scenario called direct attacks by source 
address spoofing from provider/peer AS.
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios, and has 
low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in the corresponding scenarios. ACL-based ingress filtering and source-based RTBH filtering effectively block spoofing traffic from the reflection attacks or direct attacks originating from provider/peer AS, while appropriately allowing legitimate traffic. However, these methods may come with a high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In the following, we expose the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS (<xref target="reflect_attack_p"/>) and direct attacks from provider/peer AS (<xref target="direct_attack_p"/>).</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF below.</t>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                                  +----------------+
                   Attacker(P1')+-+    AS 3(P3)    |
                                  +-+/\----+/\+----+
                                     /       \
                                    /         \ 
                                   /           \
                                  / (C2P/P2P)   \
                         +----------------+      \
                         |    AS 4(P4)    |       \
                         ++/\+--+/\+--+/\++        \
            P6[AS 1, AS 2] /     |      \           \
                 P2[AS 2] /      |       \           \
                         /       |        \           \
                        / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
        +----------------+       |          \           \    
Server+-+    AS 2(P2)    |       | P1[AS 1]  \           \
        +----------+/\+--+       | P6[AS 1]   \           \
            P6[AS 1] \           | NO_EXPORT   \           \
             P1[AS 1] \          |              \           \
             NO_EXPORT \         |               \           \
                        \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                      +----------------+        +----------------+
              Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                      +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t>In the case of <xref target="reflection-attack-p"/>, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>By applying ACL-based ingress filtering at the provider/peer interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1, effectively preventing reflection attacks. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 1 and AS 2. Otherwise, it may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
          <t>Source-based RTBH filtering allows for the deployment of SAV rules on AS 1 and AS 4 remotely. However, in order to avoid improper block or improper permit, the specified source addresses need to be updated in a timely manner, which incurs additional operational overhead.</t>
          <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it can improperly permit spoofed packets. In <xref target="reflection-attack-p"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces, following <xref target="RFC3704"/>. An attacker inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to a server in AS 2 to attack the victim in AS 1. As AS 3 lacks deployment of inter-domain SAV, the attack packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block the reflection attack packets at its provider/peer interface, and thus resulting in improper permit.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <t>Conversely, <xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF below.</t>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                          +----------------+
           Attacker(P2')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
      Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t>In the case of <xref target="direct-attack-p"/>, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Similar to the scenario of reflection attacks by source address spoofing depicted in <xref target="reflection-attack-p"/>, both ACL-based ingress filtering and Source-based RTBH filtering have high operational overhead for the scenario of direct attacks by source address spoofing from provider/peer AS shown in <xref target="direct-attack-p"/>. Otherwise, they may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
          <t>Also, Loose uRPF can improperly permit spoofed packets. In <xref target="direct-attack-p"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces, following <xref target="RFC3704"/>. An attacker inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P2 and destimation addresses in P1 to directly attack the victim in AS 1. As AS 3 lacks deployment of inter-domain SAV, the attack packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block the direct attack packets at its provider/peer interface, and thus resulting in improper permit.</t>
        </section>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+---------+----------+-------+--------+----------+
|Problems|    ACL   |  Strict |  Loose   |FP-uRPF|VRF uRPF|EFP-uRPF  |
|        | & S/RTBH |  uRPF   |  uRPF    |       |        |          |
+--------+----------+---------+----------+-------+--------+----------+
|Improper|Not Exist |  Exist  |Not Exist |           Exist           |
|Block   |          |(LPP, HP)|          |         (LPP, HP)         |
+--------+----------+---------+----------+-------+--------+----------+
|Improper|      Not Exist     |  Exist   |    Not Exist   |  Exist   |
|Permit  |                    |(RAP, DAP)|                |(RAC, DAC)|
+--------+----------+---------+----------+-------+--------+----------+
|        |   Exist  |                                                |
|  HOO   |   (Any   |                    Not Exist                   |
|        |Scenarios)|                                                |
+--------+----------+------------------------------------------------+
S/RTBH: Source-based RTBH filtering, HOO: High Operational Overhead.
"LPP" represents a class of scenario called limited propagation of 
prefixes. 
"HP" represents a class of scenario called hidden prefixes.
"RAP" represents a class of scenario called reflection attacks by 
source address spoofing from provider/peer AS. 
"DAP" represents a class of scenario called direct attacks by source 
address spoofing from provider/peer AS.
"RAC" represents a class of scenario called reflection attacks by 
source address spoofing within a customer cone.
"DAC" represents a class of scenario called direct attacks by source 
address spoofing within a customer cone.
]]></artwork>
      </figure>
      <t>Based on the analysis above, we conclude that existing inter-domain SAV mechanisms exhibit limitations in asymmetric routing scenarios, leading to potential issues of improper block or improper permit. Additionally, these mechanisms can result in high operational overhead, especially when network routing undergoes dynamic changes. <xref target="problem_sum"/> provides a comprehensive summary of scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes. Source-based RTBH filtering has the similar problem as ACL-based ingress filtering.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF and VRF uRPF improve Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF and VRF uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e. interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose approapriate SAV mechansim for each interface. This leads to additional operational and cognitive overhead, which can hinder the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as the practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms, while working in incremental/partial deployment and providing necessary security guarantee.</t>
        <section anchor="improving-validation-accuracy-over-existing-mechanisms">
          <name>Improving Validation Accuracy over Existing Mechanisms</name>
          <t>It <bcp14>SHOULD</bcp14> avoid improper block and permit less spoofed traffic than existing inter-domain SAV mechanisms. To avoid improper block, ASes that deploy the new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to acquire all the real data plane forwarding paths, which are the paths that the legitimate traffic goes through in the data plane.</t>
          <t>However, it may be hard to learn the real forwarding paths of prefixes exactly under some scenarios, such as asymmetric routing scenario and DSR scenario. For such scenarios, it is crucial to minimize the set of acceptable paths while ensuring the inclusion of all real forwarding paths, thereby preventing improper block and minimizing improper permit. Note that the acceptable paths are all the possible paths that the legitimate traffic may go through in the data plane, cover all the links at each level of customer-provider hierarchy, and <bcp14>MUST</bcp14> include all the real forwarding paths. Reducing the set of acceptable paths means eliminating the paths that are not the real forwarding paths of the prefixes from the set.</t>
          <figure anchor="accurate_validation">
            <name>An example to illustrate accurate validation in all directions of an AS.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
              |  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
]]></artwork>
          </figure>
          <t>Multiple sources of SAV-related information, such as RPKI ROA objects and ASPA objects, and SAV-specific information from other ASes, can assist in reducing the set of acceptable paths. <xref target="accurate_validation"/> is used as an example to illustrate how to avoid improper block and minimize improper permit in all directions of an AS based on different SAV information sources. AS 3 is the provider of AS 4 and AS 5, while AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. Assuming prefixes P1, P2, P3, P4, P5, and P6 are all the prefixes in the network. Inter-domain SAV has been deployed by AS 1 and AS 4, but not by other ASes. Here, the focus is on how to conduct SAV in all directions of AS 4 when different SAV information sources are used.</t>
          <t>Additionally, since the source prefix ranges of the traffic entering the customer cone of AS 4 are not fully learned in the partial deployment scenario, SAV at provider/peer interfaces can use a blocklist. For example, as shown in <xref target="accurate_validation"/>, the traffic with source addresses in P5 may come from AS 5 or AS 3. In contrast, SAV at customer interfaces for traffic going out of the customer cone can use an allowlist to allow the known prefixes of the customer cone at the corresponding customer interfaces and other unknown prefixes at all the customer interfaces.</t>
          <t>The followings show how to generate SAV rules based on the SAV-related information from different SAV information sources to avoid improper block and reduce as much improper permit as possible.</t>
          <ul spacing="normal">
            <li>
              <t>If only the RIB is available, AS 4 can conduct SAV towards its neighboring ASes as follows like <xref target="RFC8704"/>: SAV towards AS 1 permits the prefixes P1 and P6, SAV towards AS 2 permits the prefixes P1, P2, and P6, SAV towards AS 5 permits the prefix P5, and SAV towards AS 3 does not block any prefix.</t>
            </li>
            <li>
              <t>When both RPKI ROA objects and ASPA objects are deployed by AS 1 and AS 4, AS 4 can conduct SAV towards its neighboring ASes as follows like <xref target="bar-sav"/>: SAV towards AS 1 permits the prefixes P1 and P6, SAV towards AS 2 permits the prefixes P1, P2, and P6, SAV towards AS 5 permits the prefix P5, and SAV towards AS 3 blocks the prefixes P1, P2, and P6.</t>
            </li>
            <li>
              <t>Moreover, if SAV-specific information that exactly contains all the real data plane forwarding paths of prefixes is accessible, SAV rules can be refined. AS 4 can conduct SAV towards its neighboring ASes as follows: SAV towards AS 1 permits only P1. SAV towards AS 2 permits the prefixes P2 and P6, while SAV towards AS 5 permits the prefix P5 and SAV towards AS 3 blocks the prefixes P1, P2, and P6.</t>
            </li>
          </ul>
          <t>It is evident that, in a partial deployment scenario, more accurate SAV-related information can effectively achieve 0% improper block and significantly minimize improper permit.</t>
        </section>
        <section anchor="working-in-incrementalpartial-deployment">
          <name>Working in Incremental/Partial Deployment</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption and <bcp14>SHOULD</bcp14> provide effective protection for source addresses when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism should not be less effective in protecting all directions of ASes under partial deployment than existing mechanisms.</t>
        </section>
        <section anchor="providing-necessary-security-guarantee">
          <name>Providing Necessary Security Guarantee</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> secure the communicated SAV-specific information between ASes and prevent malicious ASes from generating forged information.</t>
        </section>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> update SAV rules and detect the changes of SAV-specific information automatically while guaranteeing convergence.</t>
        <section anchor="reducing-operational-overhead">
          <name>Reducing Operational Overhead</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update. At least, it <bcp14>SHOULD</bcp14> have less operational overhead than ACL-based ingress filtering and Source-based RTBH filtering.</t>
        </section>
        <section anchor="guaranteeing-convergence">
          <name>Guaranteeing Convergence</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> promptly detect the network changes and launch the convergence process quickly. It is essential that the new inter-domain SAV mechanism converges towards accurate SAV rules in a proper manner, effectively reducing improper block and improper permit throughout the whole convergence process.</t>
        </section>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanisms should work in the same scenarios as existing ones. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanisms should not modify data plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as RPKI ASPA objects, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require exchanging specific information between ASes, some considerations on the avoidance of message alteration or message injection are needed to propose.</t>
      <t>The SAV procedure referred in this document modifies no field of packets. So, security considerations on data plane are not in the scope of this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Lancheng Qin<br/>
  Zhongguancun Laboratory<br/>
  Beijing,
  China <br/>
  Email: qinlc@zgclab.edu.cn</t>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="intra-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-intra-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="bar-sav" target="https://datatracker.ietf.org/doc/draft-ietf-sidrops-bar-sav/">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author>
              <organization>NIST, Akamai</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 653?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19aXMbR7Lgd/yKXil2TY4BUKQkW8N4hyGSljhDSXgkZe+8
sUPRAIpAW41uuA9SHFHvt+xv2V+2edXVF8BjZmfmGRG2wEZXVVZWVt6VNRgM
enkRJrMPYZwmaj8oslL1olVG3/Ji78mT3z/Z603DYj+Ikos0eBwcLNT0Yy8v
J8soz6M0Ka5X0O746Pz7XpipcD94pRKVhXHw59Oj8cno4Ojn3tUcXkgKlSWq
CI6SeZQolUXJPDgP84/B92k2Vb3eLJ0m4RK6mmXhRTGIVHExyMNLaDKIsO1g
li7DKBmssnQSq+UAwC7UUiXF4MnzXq+IihjanqUldBaMZrNM5XnwQxhHs7AA
KAF6BkG6Cd6q4irNPubBq3AVjJIwvs6jvB+MuffgTPfeDwA7wan6tYwyepD3
wskkU5f7fn9nox/eHp3X2/fiMIHpq6TXC8tikWb7vQEAk+8Hh8PgJOoFAc/6
MEz4zzSD189zQM+iDIP3SXSpsjwqruGnKfyzH7xU0S/wK/6dlkmRwaODRZSE
8EABKDEsXYrTTr4rpJehmpXDaaIH/sMw+LE0A/8hCpMVLgY9e4DRf5EOv5vS
glcGP8FZ29FPokmUyBMa+z8XaTKfl2EyLeF5OEmzsEiz24wfR2U8+e4v82kc
TiqDvxkGr6HruRn+DXT1K05eP34gGBbY3fLX7/CvYSMofxwGZ1mUhUsDyx/T
IvoYxuGqnEX2NwLo/dkoeEt0DPvqOMmB2stCBekF0lkyC7NZTmR6rqaLJI3T
OcKqyZQaH5+dG/BfhVGxgGWdlBnOIVNz6BhwcehOCJa+UDOm4xxHGi1hz06d
OX7MCcbvkigvhvP0stdL0mwJUF6qfXjr9PuDF7vfPpOve7u7v5evT799op++
sF/3Xux9K1+f7+0+ka/Pnn6jX3j+zdPn8vWbF7u7+oVvX3wjX7998nt4F7mU
AwWwjiw0rCPHR0FQhNlcAUdbFAU82tkBFhHCa9OPKhsi3xkC0neAH+00siKn
vyor2uHuN+NFpp/78CIcD3qF4fae7D2DP5dhkrVM8+rqakg/0/xgNukq35mX
0UzthEkR5as0vQCy9ibxZvT29Cw4Xq5iGpDhf4Vt6C3N0vB7MGBipSY+YE9x
JfJ02g5XJOIBXgJ0XxOEgDZCYU5rsfdk9/lOyMgEKAdAwoPpIoxjlczVIL0Y
RKtB4xRGpk0AbQLTBon6eBzoNq3zMZLrjGHzprb7HPcv7ID2qen9sbMqJzHs
IERhjpOL4gjFF01dKAqI4uIimg7UJwAT5zWZw6zUtMxg5w5g9QezWZoPllER
zakjd6KPTnWfDLNQ1zn3GRxJn8C/Xo2DM+mUSOrwMM2BF+pOH7XiQviIM//f
w59ltrpon/80yqfpcJoud2BDhcsdlXwo8x3gqmWxo6e2g0iI42iukqnawf6G
q9mFNzlgSNMwL4D8USSpYBwWC9QdroD74doeJTC7KW+LAHgALbZdO5VdRrAb
YU9dAvFmg9Zf9G4MjmZz1Y6JA5xVcHadw9aEvXqcTIceYp4gYUzCDBnHPbhO
NMtglw6kI4+uH7UzmPdE7bjM78eHo/MjAHB0Nh4J/3g3CrZejk4HoLJsdy81
NPsYAhFV2UyvNxgMQMDkCH/R650vojwA0EvEfrBiTOa0AnNgaaGwNNxx6hNs
B4TOVeoC3uiBbO/g0k5lqZBqoxyRDH1Os2giPV+UIPmIKcWBcOKcZzhTsKHl
rczhlkwWKCOBlOIgWiKk/NOQp7SMZrMYlNHHxKDTWTmlTdY7a4VvC7EIzC2Y
ZuU0gl5xDOgXhqFpJpq3X2TpsjpPzXuCsCiAEPJhcA4gM8+NQABHJMfg9ct0
SnJ4plZxeo0tYNgghFHjFPZCkdJcde95sEqB4QFGgs+fieN/+cKYCadTHNcA
BRo74zLKYGvFgDVcI8CfSqDbcA5rA89boAZlKr3C3div9XsRwvuXYRalZW45
bo6Sz5+CXd5gVtJEZtHFhcqQjqQ30J0voyxNaJ36QQZ8A3bppUpmaSYLnq7A
4hD1aJUpag8AAYD4bz+IClyhJC2CCxUyYnAkgoQxWQQ4kWs7Jmz+IW6tSLqt
AIuIAytmBioStE1Rnwpi6CImIkeU6p5gIADpEifUuvpge7FwurD8bAX8zXRG
r8JYK2QXhdBJ+/4fZdNFhBRYAphIoaNtoARRrb58QfoECoH1CINlGRfR4ALx
FIQr+CGcLmBImFSkhX6uUVQsMqWap7kvJND3NC5eHXenwz47voBhzdx5Rnp5
JnEKf854MKDFLAJjMaSN5JOYP05tmOpyTcG6Wqh4xQNQ3zIw4z5i5uDiHlY/
Z871F4WdAwIryiRuKg8KHBS3Pww2OqMx9crDhMsJShvBGvzM/ECjAR8KXbC6
zSTFrXLc0lcgH2lrS5dRAiKVmop8Fyawvmt+qx9cgRkAmwlYZEz7EQiHFKQ0
jtnmQVIyoIzOcEMBTmBYrQ1m14iBIJ+qBPc6AAlvqjpSABW4umbh/HVCgsrC
uTBsf/hwicuDY+P8nCU0069QEvEYXoCrRQS0TL977LGOZp7bsSZDBYAWi2ve
BreZHGjf1zCBBGSdLDVuGFBbFFh8W7vbeoGuFsi1kVNFnxQzk4kykwFym6WK
N8QivGwYkjmXmvWDrb1tma0IulzGwPYqzCz3sGJGIwIQehHFyExdFiPkxFt3
6+m2QSaCLC09yHVDnDvtYQRYthioaC4Hc8h12Ko1hImnMFTJZQgbUX1aiVMI
lCLgZ1Ecl6iLFNxcfQqRRGkv1puPd3GZHYLg2ZCNexbs8sTh27MgBxmT1wkM
9w32ApuxRlKAU2j6FFc+LecL/GMPd00Ok+ROzdKK+Kkubh9By1V9WKEzQK/m
kpNr6hL6j3En83C7xHhaOkf4KvvHzKqyW7xtwoipAKYZD7Ebmpue/SylGc5T
Fw/QQU4s6rp1KrvDmlPNsm4iKlg5vSHhXQZML9ieM2uvjz7/+jFJrzSPyTKQ
jhYJ1IKUFpjsBuvMROLRtbNM8AOoPbXZ7QWglk+VoCAFgiDMYS8IiAZJIIEN
8l/m0/t64Hy+7t0ENPOtMfCU4HHl1+AnVuSdz0/uH2eyYccMceXlrwdfP/7a
9kVI8DUN1uMAMRWg/H5u8H80a/g8HnR9Hsurz6hdNzxdn054gmAnqCJqp6eh
fEpQVtFc5QJWA2O81LY/40Vvg57HBXqbk2uDyhf0kLAcmgLRxN06VPJ5P3js
8Ua2Ff/10ajCFDW/rBliyCEffUHejLIO2TvYD9fWanN0qmbu6jN10Z9o1y3Z
AinAYF4VxCnDJL9S2X4QbQP3gfloa8SaaGA95sHW58/w75cv26A7VF9tMgKx
gXynRqQc1lqu0HSlQeomIsmGuNQKEPM9t3toAl0PA7AUH3sOueAkTOYlKDOE
wuAj7HRQDIB+Hr15f3b+qM//Bm/f0ffTo/94f3x6dIjfz16PTk7Ml568cfb6
3fuTQ/vNtjx49+bN0dtDbgxPA+9R79Gb0Z8e8dwfvRufH797Ozp5ZHioXaCM
9ACS2bCUIArR6xvmPW1rk+r78mD8f//P7jOQvP9DfLkgdPkP9PHCH6Abibaf
JvG1/ImMrgdGBeohqJWBAjsNVxGsFTJQ2FOL9AqZe4bM7nd/Rsz8vB/8y2S6
2n32b/IAJ+w91DjzHhLO6k9qjRmJDY8ahjHY9J5XMO3DO/qT97fGu/PwX/6d
jOzB7ot//7ce+hnOVQYSiH32sH8vc9jv6ksPJd9pGav93j7ZelmJNiuZZcks
YmcAkil5ItCNl7JVpaYRimRhTMdjY2wCWduHrPGgLYYuEDCeg5fIVfYDGc3x
b0BjsBBzHtvaTcIAYzUHA3kJ4NR5IWm1wqwiGQdIQ8x8MOum0xJVNpLyOL/c
BWiMeCluD5FmmzVwCJ4V9VrcBqJTxU6dq9Ca5QYsNtINJA46tHI0T2mlWA6I
Xoyev2AVh4lCDgJEcKTZa037eWP4LeCm+iOqsdcr5GEwC5gLRj6s8QzSgUx1
2pUiPLThINIDzCz0eLJLBRjb6Ozlab69gcuCHBAiILSbx/WOXIYRGHHsZjF+
hLrlx8ZyERnHPbwyp4HYMMEnxoOFBnieTtHqZl0VBwcwI3XFXIq1Q0UuO2Qo
wejgZDAB42vW2K0EnahjCUt9+bLf2ShCjwlLp19L2Y9gPUeoJCfYkqnGsaw0
bXKPbGFHWY06yfiUNQKGCT3SEq20T9pohcA4V6ryAJA4BXEOCqX7nDhCQoY+
CcAcIAWlExYCnVbW/dU8TFun7mpgYOPLF7A+ZBs2AduFTZovGSNVs7LQgnoa
g+yIUUUiBqA3kEdISL3UXQpPPxVgZZRIHDk6T2BnkOd0FmhlBRSSAYkoMxjg
ycyU7ObazBoQsX5megf5ffuumW6PhEUDGkuZCmF/4Z66jEIf4aMzl37MfmMa
quxx3HFzgHcuzFQeRxf6RZhXbgY17lKz7o7Tt3OniPscZpFH8wSFEmx0z1Gb
QicLFc5IFbB7B72qopKUqxmtHeoOoMkuFSwbgJGgxyIFhFzEaDFp8z2zlEBx
rryTWnKK3GhWYpwn0H0JsAEtXUTzUpxQqKpeppEVGkK2SFP6CUuWIXCd8nT8
veBlGWqWCHwFiDnMaYkbfMmGP6wLc21h99suy2JnMNiPMNOZCnEAfIeYq5YS
KWjwsNsjpuf8GthAkV3X3CuCHMz1Yb2fXFdsj0xUji75T0WwSFfMuTEgU5B/
FoPaMJGYDXx+FzcACQb9vnW5oJkvhE7acR/pLzQu2SyLLvVeCYOpygoEzmy+
foM3j9V05GXcB6iWZTxDIqrvmxwMBrc3EPspI1dcqN8fv3TI3GDLoR7jxAnj
q/AapxjPiN7EqlDiIEgNfIRJ7UIsHAcftOyLkeVGMLH5Mp0xT6D1JP2FHfez
YXBowiT+W+QwtDEU66wHey+aFgnCgn3D3vkUTaIYdEeGVccreIumGXsyposU
/X7aUbHEKeVlhHjOYJ5lDKq9bmk8pcPgR2WCdWI9MZQhGljAk68oReF3wRkB
xZB7Utj9Qbx1yxRDUQWyFz1tEW0FGx28BXMjc4keCB9hlVpYk0ZfNiwxO2hC
zUiEawARaC+PKFQe8TOxSYvc0lWYG4eO71kS0xjBrgpj7I+lMdtkRaPopRFn
EXqJYvIyJ8j9yIwmBy1pv67Is0obk3mOmHJFUzX8qJeZlUPkbgWailcJYF2F
y4p0pAU8IfKor5/zHDAM7F85anLT1lVOJAh3Ge1YWQoTq58g/y+mC0JswVNO
MWaZAV4zR4Fw1xBlXTaLZSTm99bf54aChO+EBbkWGyCVKJWGr+9OcxblU0rE
sj0O3d89Zd3Vw1t0J6O/WZ9tt+/JaAvphPguDhPlSA5XGCnQWlGSJoN5nE4k
VEro2lLD+RA0S5g/2i6Om5PCgySQnIeqmA63A+HovtI2URzLTH3FCWYBtKTi
iwr5fD8e1GlHP0SRhJwfle5MxCGFFJxI3RZJwxi61KIc1UBq5AFHrqc4FvWb
OIVEyEkDQoqZxuVMx8vSFZpxsTQjtZEi8UBsrKtrXhMmVU8686LIpemvqg5k
JAaFzVagESij1roqKf6NSMCpCZfLm/zVkQbd6aY+O+mQnMyw6xM2ZdkLYPBd
NxEqFmOjlZHVDRJFfggi9ILCRlafZ67FvXPoeZGizdqigROR/BBlBSplWviS
+HJI4IdTIAFLRpgzSPYJphEhPcHv/HPJIe9cgfBCOscfmNEgB0Y9AdQkthEo
eQYnBkaA8x4bgGzZ4pzaiY1yTxj5ZvbhDIi4iHItcIy7hgcycE4xxTpvYZUN
FMeKUlIH3mRwYFf+bFl+0bjNvI4YLRm2ynDoCns1PfYt7MRvXCZI3gQg82Hw
DhW+K5g+JWRQYpPHLO38MQSIuiTaADn5IwFboGj57oSXB+OnL1xDXrOAiFeZ
QrCGojnvzvVtOMl/jrrH29+aKWwCkaKE/dmJ5gLAIpTcBaUSYuQqccwlouAj
j8+9ED5nnkrEmLfpFQj0eJ5mwOMpn0l/BzpkbqT/Bh31yNm6roeBDQGmO5OL
AJhQyMOQONiyYm83bUOMDPicnBQno9ZwJgZ2RUqIVi/trh+ikaKDDH32xVDo
Dv2/CTmEnZQOEgi5xwFocnqDOAqVhcrNDdICMydTQkZDyjIoEUJs2C4kPmsq
IaUNXDOpe9F5oV9ErfeCO3dS7YBAnfF58gkoHkAqbELATjfmZyWrwNMZyY1e
FvPUY/W5GF1GW3H0fIcUPHJ0fQHWOgGqNpla1wok56Sk3fTimSuIXWIF7WEO
FjWQaEmphWY0xqWlyVYxIcrM0EeQv8uLqiixzcCu5iCkWNaZWqbkZY0ALtLg
Y8xsAGtKgU5w/vL1dtXXh/njZFm43eCbzouwJpNYiI/TNTEXAxgVHZDAlRev
LrBvZt7XTFfGFqp7dDJDYRl5JYadEJCIQvT04WtJItTqkH2kRRIOm8sGVwKQ
XdvM7X0d3FinJATIEuC/XXspuW6ymPDdCyv9arbSCohaon/emkVDBRro2zKO
n2yv16vtfss7kIkUJn5YzHOS7Be9hpjbowXwTGEOsFGE0Q++bROJDGttTgOQ
PFJGq06r9tPjkH4P0L4AUF5lIZiAb0fnwdbBq7fb+wH8n0WWSRk0xzh4YyC1
SZay4XukYgNF5TFqMhNoyeJHNHgAi9PNQcpdPnPoETdspN3QGjoCQRN/41DA
AKO57b/SKav7UVZR45DwVDijnAoCph+w5QFUXbIL3e+IXVl6kBxG13hEALUZ
rPxheBFIwDTQPyu1KPhmxqFkW/epY9G3UMP2V7jDDqwq3fqn2KR+EdBf5d50
eDwJ1eTWHSELiYGLipokiq6nUenEPa+Z9VdRkgnNi9NsZsDGMMioEEnkdNuY
e0Q28QH2MXTWxwYtObGO59aVOxskwDrq0u9IPxEtwc2zhseDdz+I5xNPAFGw
hra0EmfV5JoEteOArUA4uRb5JcxoEf0CzVnKYkbORDszGyxsR1d8idwvSctk
StI6QN/CwCrz3De7a7w8vtANEEoPcrCHSEgmIwlcrK2ZzIv2WSH5g3WP6bEX
pRMKbIrapTo33REM7JmgrcYg9HGTONiAHxj7NJTr37ZAxNFHZSxJoJWjFqvS
BldwnXX4AWcMrI7OJpgTXGniKfRCDNCH3mOfGdXoPv0ULctlgFnmxaJvlcwv
JDLluAxz6CzKPxJHckmA1T9rnrHlNsTYrHsmK/j8GDNRmkOxyMGSAo8ARMbF
Vg/y1J1u4TRL0Skbx6QVO3a065NAeehEqjAOqPkzM0BUnTBBNyHlP+5Ihw4k
5YGdSjhuLaUP0B6baDn+0BDZlowOx+trWBCd6FgqHT4wNFwhXMwYBTkAgCbM
UYB2GaiG4VIdY6mnkrI6IJHfIIyWJJHAqsLzG0A5rWdQKvCUji/Gd5X4Kqnk
QRoVHq3SGc7h4lrkoM1giiMAmW3PIWULSS79gRZCx6brXk8oSWvDjV7g1GwE
PwHTk4swd+XSzyT1kzWMDoSso45Oy7EbJIV+v18JFbD+0BUV7NTWiIp3YJWb
+UszOvp0dhbIxokX9DUbsl6JvsuRHDptHoqSuENkR5V4n8kAQxq5SitHmDQ5
7POaY+oeNA7nhod6/qFFNJuRwsbPCMKGgYXkvZEXLu1hZGcNgxGVL6ySB2/y
rigukUeHgq0lPrsTbNpMU8QW+4pRG8Q8/mi+aIwFsxcBzy1TXOoKVJYIjz1w
GuG9YKWjR0UYxaIC8CZPppjxJtE5OuSRh5cfwuLDCpWR1gxcnSHa9sfX1Wf2
S+9GH8j8X8GZXsYbjH/D3zsI9I1DzDdCtDealG80Gd+4ENXHuRVEJ4Yz3ATB
yXis03e9XN61nxs7NScX10vZ9Tryk8/8jvwmrw1Er5FybgFRI47eOZTXtKwN
TXo3Z3pb4dinowMG4p0Q7hqIbvRcN8TR96AZIoBE2Hlw9GnFXvPghvPi6jg6
1BC1ILsG0RoctdFRF46YfDtdLMPeI6CvR6ASAufLOdJtEyM0WwswSkaKXiMj
7WmuOQx6j17Xegvj5t4qLBdAgWXcFBTJNiEFQ/gqmuXMens13tvMc2HIw82H
5FjvfYYD9LRQkgdDLUnGVxd7xopplIro4WnW18yLPRFj+GpN12xUuIyAY+UW
nZq9OL1qFhrVFHiNhA+o+EkG/DmfRebTLHdWUdapGQirtXzsxJpmRnn2nz+7
wPLRTHMMCieI6Y3an0DwA7Gk04jsILJS/0aT0dlELWpp9yKCsZd2g7pWfJMB
3ao30MFItnrN4WgbJNipuJWHt5p6XwdVOGEJffp9UtXMoZ0us6VJYVunHwKq
q7wKJEKGw2OaQ+XM5T00wCMbasfpsAEMLMEk0zQd2zvmGXEeDxHSlTIaWuFs
swemr1uhsFHFzigwjYH8+JqMscfBifQz9vsZSxuarccadeCkzxauGdA5/ahh
Yt0YbWRua46464xpmFpBZ9h1bsbbdx+O/vf43ek5kgD8MTr84ej0/PjsCN0x
yxIrAjB5MCmKh93skVUaR9PIxKOsOdEQgGrKjTQZtOx1wfZaY78AoaqwrEBU
UI4MuVsrO47YUcNJIfLqYgqYNbHEe+rsMR7yCukK1j/gKjkenRkTvu8eh24m
Mlx+TWh4PDLWWWgWhLzE2Jm1nSXYyCV3MDHSl3K104eecdCuZ9V0p/q5tIpS
hkfHtsZPt1k56+r5652fpM+dn77u7jnA42/6Uz8f2PwenhvsenXH+6ur151g
62BvvN31boOS+XXry6y94vG8rfGzbedRc9eCH/o//2s07kaod7wevdOTzvvj
vT/jCbyfNR6svt3SwO/eU9C7Wxj0uSr9T8H4OQLw/Gf3e91O1VP1zIGfqt/N
Sci9rfHetvv+TTDexb53f64D6poOjGPb6BvbqGt67k83DgdsaWZg+cltVvk0
tLMd2x/rBlL3MvxklwG/7IzpD37GLeV77Qhry5I0/lY/RytHffuAU58G9Jo9
3xo/b+QXtxy5okcn6UB9WqVZoZXokzVSl6QNxSsNukHLDVDNNX2RjmuMH2Pz
2DSItdoRntIyshRb2LXVYhKPtYBgmIB8tAkieqw+H8OloILRNfiQ+54cFW/6
7Vmfzyg3/fbUVA14Xv+dnK90IFhXFuA4Z6Y4dpcvopWJ4LonhJ/pIx2KCvaZ
TgdFOjAZo0xykoZHv6Cyu4W0OZTebFaNQaI5pbwniTcSYexEpcY3Rm5Mp5SK
lZOvOBUUOsEPGoFk7AUrsHZZxQdn0wQkImNAAzSdAS3EeAKor6fyYHA+68tJ
QtGGCN+owa0H8Bt9wnsYHMDyqV9L0pmFPij/E88tSVpg0wR1yYTdul4RnJUr
zPGvUALn9etkzJq1zr5c5+wQvc8BW9tFbnuweVIFBb4blG48nEiVKxgTnBVu
imfUd0d0IRUuaIy8NUlo1OrMp5zu2JzI3vSwPWGcs7ctZofBjwu9n/gIv2Od
bX6K/1ngHuLXLMAeHiXtMBf10ivP5CmUfKiPwjebaaxS0KM90YrSp5pOJUVe
Plz9WId22nPNr3pygOW/nLDjsGFS7rGyxQVm29PZEL1L8FAIxX+cBDybxSgH
NnH3UqI+1xD6pOsPGjMewKoBXLF92zEiOUo6O4KOgkjcpJKdGF14pEwc02fy
RIbYG21kZx+jcSj7t3XbgMAhi45XgNh/x17wkzql4k9z4EmM1tds2Foj9QxN
UczbUVn+VfNJbDqsZAPcmqiRReIOKmwZJDbW/NZlgsVTEs1YO07U8XxwiZud
rsFJ3UdCOOEdVHmdbFDMQsccPNYsmgsI+pFca1HfIi4IK6XYXC6wQIvUsOEM
OEx2YwyYo/MeQR2kFMQODlUcUR05U9J16+Dw7TblNkAfdJCCk9S/ffGNTrHE
wrXwnXObTSbZr2Woc451RhbMfoKGvjntisdLsQAgnYeEMSQBQI/kHP+Pcknh
0md/Od8Ng2L2rFgqxUl12TbJBUJuTLmfdOAad8HMHPDA0XPbdBi856zFvohB
3SWvsUk1lnMA0SVzAM6E4SSYOuwOrTJnBZQKtevcrtwCSVuTcMEH3zPFxRJK
GDHWqWpU38+dMKufGqmUTZA4p600eiV2KJ55A0NRAo/YOjw7BZUL/m+Pk8qe
1L4Mf1TptW3aYeMJgIgKIKxQ7bDixk1ez2vDCCU3otnJ+TZIpjpNofi9lmqG
zmZzwmyT7cfuxIqMFNhqwG/oR9nQWgJzSGZ2Rqj/mi2eTX0qehTxrBiPwdom
gbXqO/wg46dovD792fXFmIfrx/A8M2tf930ure+3mYitDbTRaVwvHZ4XGcL1
v7R6X8RhwBbYz74PptMub/PDrPHC8Kfmi9mkVYM/psUbwz9u4pOpe2Te5y79
dvplmoDezDfTNl3zSrt/phVTG/hoWttu4qfZZIkqvhrC3HpPDX/avSbt/Aer
Rbs8p8Vns9ZjcwcIxk+1IutzdV33g80j7+yZV6MQ5WrV9TPLM1M7LDhkccez
C04dcWfNVg5mQrNqOUYSiA1uHkfiabv46abQGpeOUcDoFa3Oa9eIqPTGNWMd
OA2vCePpO2+bQm0tLbR/ZTMbvd9upIutyioG+yL2yGi1ao3oLRprbuWF43Ff
IiVeAVuEGjsa/BsCR/9/yvqT7sTRTgh/+oQYWTtG6cPDjKQ84fOlp0D5HQA+
vo8S1v5qr9BsJOeqEC8M/slzbrXDDWlolxkfA26e6q4z1T10HqG24xfd1FO0
YTCTbOy5aJ5aR0K7yTnakRIBGOPjZW1K1/azGD3fiVd3kiCFP8RvtstGaJMe
5boyqgqV4wHp9d6AyZxySi5ptVTYNlhyvq1x63TMj1Q5OqXVEhB24WsoBXy3
yDT7eKmMhOw5p2QhqrQNSbjVcKE4Ye42vo5PNmT9tLSgooD65Q/88gf9ypcv
21yY3s/oae+KX2zoRjwApxaukXT2+XHH+G6iycC+N+D3gGUD1wI7OfdyFfj4
bEfa04ZpSFoOUWyA6lXUcwWatwtWE7i6nYWwXlKv/dwqClsd9S6Wg/5sYEG0
tlkXq21rdZvRNrQo9OfWloX+3N7CMENuZGnoz50tDtPBfSwP/bmTBWIb384S
0Z+7WST6uBUotl9t390yaQDiDhaK/tzHUjF93MNi0Z+HslzsuxtZMF27/l6B
Z/z8AEIhWjYbNFUHyxqT5k4QAZ2Z6kp+YU8bS5tc+6fnzJGxKNEnSHukUKeZ
X3+EHmqzwvGAt6WT1gWnNZEeWmaSPXWM5xG6xHZfVPXKeF3DFeFHjAPHqHPK
0Mhpv8rrp0OMpaYxS51I3VkiDGjlOCypGjnlcVK4zTVdTGzCe/35dmBqo4BB
Y7zTkkLKtcakOh/2xFdySNhWqsCxTcojoqYLYMfitWa9GCtjTD9qc4PhpraZ
omjCIizFoVmY20UCc/WYGExZhrUkonXr4Vi+Yuss4U26FsgN9udOtJ8u1UDj
i2ZivL7G1ESjpGLEyrkdejgtWpvUDFr3PhuJVtdNW934bnFoDZxNl/Xt3J4U
Qd8gSLzzsiM0bUPFVOZj40Cx3CfjhImNkV+N5V9J9Hiv8xqI7tixG0x07CQx
pbyYMZJkmfMhOhNTrVordJRakks5E9faP3QAl7psy+x2Q8w6KOBmQbYdOpN0
UqwxYwNkfjKlQjMa8MBFBp2UVKmHi7tcJXm5YUyfqpiRH4irl5HVUI3vsyUk
vilrBbWYTp4FxO/YbYt5SRnWcQw9Rt56AOM3w6c+6m+Gj/n8ZvhsBPM/pOHz
/DfDp/r5/2T4dPZylxCO9+myfJwpbmr33Dak83yd3fP8b2j3eOKy2eZBSO4r
Lhtsnoqg7tfH+SvbOrUycbTY1peLuSFUKKzbLOr7tsltTY2qvvKbmfH3amY8
bzEz6kh6MGvj+W/Wxn2sjefW2rC3w9Ttjed8VYup36Kvi94ZK6+IC1ggpoJE
raBL24HUxqouWD0rM5UqNq3ssraiy2a35ZhjcT7IWDFtzSleLOHilO+rXjxj
6z8dJ6aW2PoyfrpGJHmHsPQjl0CnSxr8+3rWlOzormzQXJ0j8MtzgMh2JthS
QGHtOF7NDcxaCypa041fBsIvr3FjS4fgu05ZDL9cRAtsXRUwqrUugtORlN9o
L3bRXNaiUteicrdTrcrH4Wht4ZG74XqzuhQwzfsVg+i16SG0maobCYszHG4+
5C2KQTQP99+zFIRGwwdEw8PXg0CA3Br/3VUQOEeqBhKV110u4R25KfHhAXNO
17fKoHUlHO5TvUGB3JeD9/rKp8ZbZBvDGXTivUL/7s3gjfSuVUS603yVYQ6z
9ic217OrZVEvVbFIZ3KMHg9YSN3ojuJV7+qFIlxRaKpF6NsD6lBwLWa5p4Py
bpYgLsGOMd7QOuZ0gWox6dpKNODxy9w5YmlTaf7WZHar2hUtzHOT5J7Gpl25
Pc0NbGqP9iqvWhJ6Wtv7TumVuTu0O5PHvo98oxZvGqweLHGnGfAN3NcPRjp3
8nhv5svxshbudCDg7v7t23m2b+vTvq03e8c9t97V4g4e7Lv4rjf1Wt/DX31P
T/UdfdS3907fzS9dzcG4g0f6vr7o+3mh7+d/fjjP8/18zvfwNj+gn/l2HuaH
y6x52uRhtgn7HR7mBpH2ECk1zSqDeJdJxw25mnKLUO03uoIfLO1lT9Je2tNc
zhc2cb5AzyBlz98iveX2aS3N2oWxDG/tZ250GaN5CMpuhnePOWeuzYVJVfew
74Xudl3/ffqhsVT8ahXTNSGdBlTR4G2rnQ5gwrR3pdobdOk2js09e3xcBnMt
+p5t5lTuqG85z0LCA8VoWoV0mx5VZAEb6PK6/YrXqLDnYutVCWwVYX+KMMRy
RRX29CUczu2ubsW8Il3xlRlyOMdJ7PFvVGgt74xl5bqdF+K7QKulXhev61oX
uYxI34LqXPYo18HyZNNq/Rft6/Rrq/NFvZvfSiupcnxBQRNNbHTnrinGz6vt
3APR7InpVbzAczyJDb1lCu8F5j3TVMpRu/0B0aW+CQoPM8d4wQwRknNmh6fS
N3ech7NwVfA1Od4dwOamE4tHtrHrgRK9c8zp6uNW/tivXPDIJdD17erP6PKP
xg2tGYd7S0K9cWNEytbD8+4AHiVWYIl4bhTNFAmqCmbaEyRjuuMlhuo5xS3U
6Zf6yBo+kyCxEUb2cNgoZ5Bikt/+HqhzViuCHaCoNgyynG70DoMfEX735qSR
lFOiGo3mHFU9dVaPFZoCIs3rxyKrzP0iQrXroDfJUUPz/iBN6GQbCirtLnAF
cb5Ir7hIeUeK2j+Rhd+tN1uLfu/WFv1tLfnNLPhNLfdNLfa1lvotLPTbWObr
LPI7WOJ3tMBvaXlvbnHfzdLWSLyFhX1Xy/puFvXdLOn7W9B3s5zvYDE/gKV8
Owt5b52FvPfXt5ArkqDZOt488eoWlnFNBjVbxWHC0NfSpPb+ZmlSdWn5m9l6
T7NV6i5qt8LdXTEcnmB7olWJnmxSHL7LvFpTHF6bXQ+4Z0ghS1roz7M4Cywm
9teyOUdxnvar6TabmjQNO/y/qznDVVCpqIYYlg0negwr+8eycXwT4cHtG8yE
oxKXZwWQMM3182NJ5vvSnI61Loen/a4iyk6SATnzCT1FfByVkwFvdHIWPGy9
Oylwr8+5MZld2Jh/dr45il5dP7p5sEmZC4LewuIdYRURHIe/BP5D85FfHWhu
9FVKLoxbJ+NxP3g93q7kW/HH/PrXnBR3bGchIOg/bqq/ur/17J1HQcPnZut0
BBM4HHnzs78d4G8H2w83KReFen2aAOv6EPm9fvdOutlqSP/THx9pDd3IV5MQ
WEfDemi6cbPhZ6NEuz5Oe58TFt0sxHfGb/jXvyCqrbemC6L+yXMC730DVusE
/z5uwGrIB0TZ8SEvl24mYLVs0cZVLjuq9bZkQ/bbMt8bUyL7fBlQW8YZWm4v
dWCEtAl9zWk4gZco7wsvOaSEJ86L32Rm6tMimgBkbp4YIrd+jYyTnIlXxRDk
abBKC30Vbp6XfGnq2ihF1fCppf2jbsvaCALTipR+QNf8RHSdLJ2rMDakAF0m
sAnmmMk6u07CJUxHogXDgNIzNYV413FRzepMQX85ngvgjM1rl2pvTTwqmaYl
viNocvP68W7mMJk24Q5/brQbaqRVyKu3pCoubtzp+G0vK74Mk5JveOdwng3l
oYNZh2d0e4P4zS2mum3E2BsGb2hoGRgplgJNmxGKc7UTWwsXGZ/O4VuVuE45
lwA3MHebpOI6EkvaFILPuxCLprc9TVP1oONBlbAE7gYzmdZKXpO2Xjilq2lF
MDDMS4KBXrrLo2sZ3BxYzd14C/vF3SgVtsYOvIvVNrhHl3ZnSLYT3leFdsZg
Acx7ZrFtq5eb0Wi9dDVjc8eWa800HyJyooj6tq7IsMbaJVnmqueGewPYPHLn
SueHGsKVFIlUYonVC7O7Zbb9O6aNqe6s/wb3A2OPF3jJbWFP/LTeY1/FEdcI
hJ6iS7qfzFR774QQuIWu+O8e+dK1zF0sAQ2ZRa5kl/uEB/wTlrRJuFpq7JJG
lXr/hqPgmmNetji/OKK2/jq5hhvMfJo65aW2lwV4nmJZ6YKuBqdzXk04HQYv
S3ZYnjoUSjgI+QIz2x3tvyag7ThEGXke4Z0MTaP1es5NDZSd4I3g34tWKWtR
EESNdx/wVexpfClboW3rA3abyWYjEnGzTyhLnoQztKBLbsKMdA94UGiFdY73
7xUVfbh2sG7o34jYToU+B4N9Y87FMAk4LKNCCRXKrN53oJkddcPVb+295bDT
dH3VjXQMcQURh8cNgzcRkkZNCt1WNIQJ27XbZr+2COrpIgJk2+Qg7HuorzVo
EPtTgPyiZM5sg8havqjkMsrShLxDlKqxIK7Ga8inMxzgQWaSMqw4ucg4vIi2
UM0UXaIxAYW6T+cJXVToyHoOzaAOCXYC5c9g/D/kKz3CWbrSm76KUXJynXLm
0pIsFoTtrbriU58u7t9Y3GMS/6+gnfN+EDKM6fqUQsrrmv4c0FS8wjsesHIu
vgb0u0hQ4plw/CYLr9mVNwiFIWwUIgSIqN8SBGYcJfrcrBy2BMZKqUa4l0jl
SgJc3T4SJO4EvvglASQwiJi5SNkOwQhLtyJaf+ADrTBvxIKilzuOlp29fvf+
5NC7AuPS9AD0iL1OrxvoWFMtLvWGt4OwtxopU/s18R54xFMY72j24ThvkaZY
t+BZw27JUfmHdS0zvMJiXoZZCCMqfayDPF+X+LZFg6AGJkGgHmlQLdX0eseF
RkRjbhcBwiI/NrIcN6A+CgQdbUoizeljfWEBSAuMAdnImyweEA7dAUQMhK9w
0qIrU4jSsAixHkNSq+Bs7wiSQgz0kMGo6GB6rmTAaee/pHnZAYAY3VQvuUdm
AUP6gprgqgLj3TcHvJq8/mQ18q2vjtWrL5rp0EZo1dwq6CwDqKXTE2tf06yk
SCVaUlECEl44aa4ohgD7QK34oiWGlEmZTrvrs+Kk1ObCzUIOJ9TnaGvgOUmf
DeQmUHi/aoP9bVoou0Y12EJn/YFjsC6yfmFxreZp+9L2gb/jBtJdA/f6SAEN
khcxTCbGmZvqGSZqCiItC7Pp4pr19zfvz86NBeDRaRVXQ+D/YEuaSgkta7FU
ILsChXpZYu+PcyaspXsn4bWoYapA3vL3cufsP0DyVEe5rt+Sp6qv/5Y89c+d
POWA9zdJnqq43UNRCj84Kp1OZUq0NUTxfFvZSLdx1cBG7Y8cSOQKf6PvF5Nc
IcmuH1DaD/nbTOa4ldyn4z8eB6fvRkE6+UVN5caL0dnYPBBvD/QjKfRT/9oI
ZNE2+aDPeegg7fKCb+taLznQ79yAIqz0pIvHIFgtiFqkV62HARwJXvcatWPT
nraw18NRLZta6r1OnFp/94qTEvWQN7DoC0qdq22BtKGX8VP47xn8J/2Mv/EV
Ev1+9YRAzapDV+4E88RMQhXfSWPzrfjUPqVdXHt3Kb5WmdKXs+C19nS/jV6w
aYoOao3YRrMGyzmhh2HtKvAtjbBmdGmrF0fJI33pm5++mPEBCdE41lcdsksq
Wgyb+9pTIWhssJ7svcvragPgzqGrEpl60Vyu+EtgKZzMq8Y90/fm01X4yVR2
MEWeAs6re0oZUnhTTRbmhYG7weHFuWXGIqF4S1lopPr4M7NL2OOG0xPvNRIE
vO9eMWmXpuZ8K2plOpogo4tViRb17Z3Wy1SYbdBy7++5Wz6Cca7Jdq4SlWmH
DUd2Jm4IsoXhMpLXE3IXJ5OjQyHGCtA1VOFn8FybGTiH3wXHF+yY105VdBte
hlGMnNemS3kbsUhRIc8l9zSaLyYpbQeyisNckCIF0Chl7QWlrO17rYk76Cof
HrcZ7woz6lcb7LU1YHbW0up5QyvD8irvPrVuSufUIF9oSviiW6goG3OtUJSi
7a0M8SGQOwmzQR5e/qMg114F3TYAY9m5lOmiXa2QaD37HpAVoQd7Y3eK58FA
sp+izyoiurf7Vpx9+F6CouM+i9axRrQHx5isvNmi7Jn1YJ1hs1W586KQ1w0z
VlEoUc54yM7PsFua0U3WRkttY3uITveIrfasP/mfTRwOL0FAUgixLGSr5ibn
yn60Dsxjx4E5FqAPDdC3ccC+fXeO2muJl5er7DKkbAfjHycc84v6Zi4bInAC
LpTLUpW6OlgSmRgNzNHJUqdVIvUrUexdInpHdZSPvFJcNmO6zTHxPSuMd9Kf
DOydNME81lmpuLpiRiFNIGzUmiPyiIsBMA1X4SSKQWVC7R2P4fGdwDCFS5XM
0kzOHNRHAbFYxjNmqIo9shYbdD6ZEcIngJuc1uxUbCAz35PrOm557cfGHf3W
uKPPtDv6lXZH32bhyZltC8qWGHdAYm7lUO7xCXGRc8B5CdrYlNBNP5HgF62B
Ym9pNvc3yZBLa45MbsN7SuG4DfSSbWJ5Gyd0I/p5Sguj7rZOyORWSOoQ8h7j
2Sc1i05pwlSmylzEJtZdUy7jRvCTF9J1nOvcDJ2bZNJS6KbBjqC3D3+fUojw
+AMd2uASBDDJpZskAyyfYo2o5EYm9EART6LmxuMURJr3OK4hqHvlYvbAYvYW
i26KAzgLXUlpIWDisEymCyFtMxA2x60T/FpGYGxcg9LPciDPJXvNeKnXgKM7
zY3sccWCECQLFGbj+kS9KxiMo6BBLFQ1XfGNp5IwcLVI48ap0caqW7RnU+hs
E+rMNYvTMWSTEeBQXW75FBgowKFe0V5nGjQ5Nqy7HI8HAF+4ykuWlKabfdSM
3obEOY/Hjj6zL2kquhdST+dxOsHjXLIF2JXi6ECIs4MjkKaF9xh2wg/jt0O0
DCpwnPMNp1vHY2CD/eDV6RHoSaeXoIKoYjrc3jc3zlrxf6WNerF7HDeVGG4k
rYD4rrFCsDnphsO/xEkcjy/ZPwJfvrFiEnPAcH2ssi5zZxSlyQCvzOXkmypy
3oxPzmDAiYpl51VwwvZgQn3U3uDCgbYm73rCz10JuEzBuLt2lVKTw2RCnRh9
iXCrlhlX7UAJmU7TmP6o5HpOUIYCvJTkMrlukfROsgIIJEQ4/m42VsK74LEV
jlh4G70Pktf6+bH+Reo1e6qxNnZn1sblJEBXbmx9f/xyB+zLbZwEIrf2yhBN
UY7N2WaoBqVRnkqehz7vxJE5h3HQkSCA5SKMc+DYJ7V0NB3dnAGPWKmZewAM
sWqkse8TaSsQI53ZYti2u2FwSjMzcW9Z/gkxH8Iqz0VvTLO8QyLcGl4qXljf
6yqdU37PxGiXPIDv/nAIh3IVLtBtk5VEZoT6CtV6hCdZEsDESGSQSF2n7vQ5
Djz1SUnnYKP7AnN3kQ8sUTebo9uxkPeY0vlplPyiM5TQqabUjLNpOMUClYxz
IQVi6DNU0MCKUVmmFWYgohlwIdIZaQdGxDRA2qp45iUSngHPMgtXh9zZt9rB
p/k9cSPiac5otKmOR29H9Q2FT3XqiwHOuYKZylyR84Hao/9ryo2p0wP0u0WT
EvOLer0TwCTYDfPgPwAcDA/+5yJN5qCWJdMyCU5CMA0wE+mafnupol8wPxm+
HiyiJAzo6RFwrng/+DVK4ul3f5lPgUEOAZfDadLrvYV9/gq7xxdfl+GVitb3
BFxhnoTJdwt6fwjqcq83GAyoFBfOYDRFh1uMF2Bz8s3nx9VHXzAukpTLCW6Z
f31Ee5tCGIgW1LC4AP8fQlzpNyHskn7wMsxgnq8yoEKwbL4HYg1ehbCqo6QA
nID+j468HDN3/gTouYb/AFkhpmsfz7Eqewk8bKEuoUEM9lCKN7mHSdgP/pCC
6HsdxrDHYUeOol8AsT9SuzcR7An48RT/Bb0Gd+xJBBhR8OWVAvPrMJWM8Dfw
/0+4eU6iErtcJMG7r15mEb55msaUA5FOJhFaVihT9alcToksSYLTSe2kkJ3k
Edv/A+pAst6q4gAA

-->

</rfc>
