<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-vyncke-v6ops-james-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="JAMES">Just Another Measurement of Extension header Survivability (JAMES)</title>
    <seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-03"/>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="R." surname="Léas" fullname="Raphaël Léas">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <city>Liege</city>
          <country>Belgium</country>
        </postal>
        <email>raphael.leas@student.uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <street>Institut Montefiore B28</street>
          <street>Allee de la Decouverte 10</street>
          <city>Liege</city>
          <code>4000</code>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="January" day="09"/>
    <area>Operations and Management</area>
    <workgroup>IPv6 Operations</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>In 2016, RFC7872 has measured the drop of packets with IPv6 extension headers. This document presents a slightly different methodology with more recent results. It is still work in progress.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/v6ops-james/draft-vyncke-v6ops-james.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vyncke-v6ops-james/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Operations Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/v6ops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/v6ops-james"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In 2016, <xref target="RFC7872"/> has measured the drop of packets with IPv6 extension headers on their transit over the global Internet. This document presents a slightly different methodology with more recent results. Since then, <xref target="I-D.draft-ietf-opsec-ipv6-eh-filtering"/> has provided some recommendations for filtering transit traffic, so there may be some changes in providers policies. Also, <xref target="RFC9098"/> raises awareness about the operational and security implications of IPv6 extension headers and present reasons why some networks would drop them intentionally.</t>
      <t>It is still work in progress, but the authors wanted to present some results at IETF-113 (March 2022). The code is open source and is available at <xref target="GITHUB"/>.</t>
    </section>
    <section anchor="methodology">
      <name>Methodology</name>
      <t>In a first phase, the measurement is done between collaborating IPv6 nodes, a.k.a. vantage points, spread over the Internet and multiple Autonomous Systems (ASs). As seen in <xref target="analysed_as"/>, the source/destination/transit ASs include some "tier-1" providers per <xref target="TIER1"/>, so, they are probably representative of the global Internet core.</t>
      <t>Relying on collaborating nodes has some benefits:</t>
      <ul spacing="normal">
        <li>propagation can be measured even in the absence of any ICMP message or reply generated by the destination;</li>
        <li>traffic timing can be measured accurately to answer whether extension headers are slower than plain IPv6 packets;</li>
        <li>traffic can be captured into .pcap <xref target="I-D.draft-ietf-opsawg-pcap"/> file at the source and at the destination for later analysis.</li>
      </ul>
      <t>Future phases will send probes to non-collaborating nodes with a much reduced probing speed. The destination will include <xref target="ALEXA"/> top-n websites, popular CDN, as well as random prefix from the IPv6 global routing table. A revision of this IETF draft will describe those experiments.</t>
    </section>
    <section anchor="measurements">
      <name>Measurements</name>
      <section anchor="vantage-points">
        <name>Vantage Points</name>
        <t>Several servers were used worldwide. <xref target="table_vantage"/> lists all the vantage points together with their AS number and country.</t>
        <table anchor="table_vantage">
          <name>All vantage AS</name>
          <thead>
            <tr>
              <th align="left">ASN</th>
              <th align="left">AS Name</th>
              <th align="left">Country code</th>
              <th align="left">Location</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">267</td>
              <td align="left">NETHER-NET</td>
              <td align="left">US</td>
              <td align="left">Southfield, MI</td>
            </tr>
            <tr>
              <td align="left">3764</td>
              <td align="left">AFRINIC-Ops</td>
              <td align="left">ZA</td>
              <td align="left">Johanesburg</td>
            </tr>
            <tr>
              <td align="left">4134</td>
              <td align="left">Chine Telecom</td>
              <td align="left">CN</td>
              <td align="left">Beijing</td>
            </tr>
            <tr>
              <td align="left">7195</td>
              <td align="left">Edge Uno</td>
              <td align="left">AR</td>
              <td align="left">Buenos Aires</td>
            </tr>
            <tr>
              <td align="left">12414</td>
              <td align="left">NL-SOLCON SOLCON</td>
              <td align="left">NL</td>
              <td align="left">Amsterdam</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">Digital Ocean</td>
              <td align="left">CA</td>
              <td align="left">Toronto, ON</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">Digital Ocean</td>
              <td align="left">USA</td>
              <td align="left">New York City, NY</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">DE</td>
              <td align="left">Francfort</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">IN</td>
              <td align="left">Bangalore</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">SG</td>
              <td align="left">Singapore</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">UK</td>
              <td align="left">London</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH</td>
              <td align="left">AU</td>
              <td align="left">Sydney</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH</td>
              <td align="left">PL</td>
              <td align="left">Warsaw</td>
            </tr>
            <tr>
              <td align="left">20473</td>
              <td align="left">The Constant Company (Vultr)</td>
              <td align="left">MX</td>
              <td align="left">Mexico</td>
            </tr>
            <tr>
              <td align="left">20473</td>
              <td align="left">The Constant Company (Vultr)</td>
              <td align="left">SP</td>
              <td align="left">Madrid</td>
            </tr>
            <tr>
              <td align="left">20473</td>
              <td align="left">The Constant Company (Vultr)</td>
              <td align="left">JP</td>
              <td align="left">Tokyo</td>
            </tr>
            <tr>
              <td align="left">37684</td>
              <td align="left">Angani</td>
              <td align="left">KE</td>
              <td align="left">Nairobi</td>
            </tr>
            <tr>
              <td align="left">37708</td>
              <td align="left">AfriNIC Corporate Network</td>
              <td align="left">MU</td>
              <td align="left">Ebene</td>
            </tr>
            <tr>
              <td align="left">44684</td>
              <td align="left">Mythic Beasts</td>
              <td align="left">UK</td>
              <td align="left">Cambridge</td>
            </tr>
            <tr>
              <td align="left">60011</td>
              <td align="left">MYTHIC-BEASTS-USA</td>
              <td align="left">US</td>
              <td align="left">Fremont, CA</td>
            </tr>
            <tr>
              <td align="left">198644</td>
              <td align="left">GO6</td>
              <td align="left">SI</td>
              <td align="left">Ljubljana</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="analysed_as">
        <name>Tested Autonomous Systems</name>
        <t>During first phase (traffic among fully-meshed collaborative nodes), <xref target="table_analysed_as"/> show the ASs for which our probes have collected data.</t>
        <table anchor="table_analysed_as">
          <name>All AS (source/destination/transit)</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS Description</th>
              <th align="left">Comment</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">174</td>
              <td align="left">COGENT-174, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">267</td>
              <td align="left">NETHER-NET, US</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">1299</td>
              <td align="left">TWELVE99 Arelion, fka Telia Carrier, SE</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">2497</td>
              <td align="left">IIJ Internet Initiative Japan Inc., JP</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">2828</td>
              <td align="left">XO-AS15, US</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">2914</td>
              <td align="left">NTT-LTD-2914, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">3257</td>
              <td align="left">GTT-BACKBONE GTT, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">3320</td>
              <td align="left">DTAG Internet service provider operations, DE</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">3356</td>
              <td align="left">LEVEL3, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">3491</td>
              <td align="left">BTN-ASN, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">4134</td>
              <td align="left">CHINANET-BACKBONE No.31,Jin-rong Street, CN</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">4637</td>
              <td align="left">ASN-TELSTRA-GLOBAL Telstra Global, HK</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">4755</td>
              <td align="left">TATACOMM-AS TATA Communications formerly VSNL is Leading ISP, IN</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">4788</td>
              <td align="left">TMNET-AS-AP TM Net, Internet Service Provider, MY</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">5511</td>
              <td align="left">OPENTRANSIT, FR</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">5603</td>
              <td align="left">SIOL-NET Telekom Slovenije d.d., SI</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">6453</td>
              <td align="left">AS6453, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">6461</td>
              <td align="left">ZAYO-6461</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">6762</td>
              <td align="left">SEABONE-NET TELECOM ITALIA SPARKLE S.p.A., IT</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">6895</td>
              <td align="left">ESPANIX Neutral Interconect Exchange for Spain, ES</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">6939</td>
              <td align="left">HURRICANE, US</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">7195</td>
              <td align="left">EDGEUNO SAS, CO</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">8447</td>
              <td align="left">A1TELEKOM-AT A1 Telekom Austria AG, AT</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">9498</td>
              <td align="left">BBIL-AP BHARTI Airtel Ltd., IN</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">12129</td>
              <td align="left">123NET, US</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">12414</td>
              <td align="left">NL-SOLCON SOLCON, NL</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">DIGITALOCEAN-ASN, US</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">14103</td>
              <td align="left">ACDNET-ASN1, US</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH, FR</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">20473</td>
              <td align="left">AS-CHOOPA, US</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">21283</td>
              <td align="left">A1SI-AS A1 Slovenija, SI</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">23889</td>
              <td align="left">MauritiusTelecom, MU</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">33764</td>
              <td align="left">AFRINIC-ZA-JNB-AS, MU</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">34779</td>
              <td align="left">T-2-AS AS set propagated by T-2 d.o.o., SI</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">37100</td>
              <td align="left">SEACOM-AS, MU</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">37271</td>
              <td align="left">Workonline</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">37684</td>
              <td align="left">ANGANI-AS, KE</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">37708</td>
              <td align="left">AFRINIC-MAIN, MU</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">44684</td>
              <td align="left">MYTHIC Mythic Beasts Ltd, GB</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">58461</td>
              <td align="left">CT-HANGZHOU-IDC No.288,Fu-chun Road, CN</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">60011</td>
              <td align="left">MYTHIC-BEASTS-USA, GB</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">198644</td>
              <td align="left">GO6, SI</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">211722</td>
              <td align="left">Nullroute</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">328578</td>
              <td align="left">KEMNET-TECHNOLOGIES-AS, KE</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <t>The table attributes some tier qualification to some ASs based on the Wikipedia page <xref target="TIER1"/>, but there is no common way to decide who is a tier-1. Based on some CAIDA research, all the above (except GO6, which is a stub network) are transit providers.</t>
        <t>While this document lists some operators, the intent is not to build a wall of fame or a wall of shame but more to get an idea about which kind of providers drop packets with extension headers and how widespread the drop policy is enforced and where, i.e., in the access provider or in the core of the Internet.</t>
        <section anchor="drop-attribution-to-as">
          <name>Drop attribution to AS</name>
          <t>Comparing the traceroutes with and without extension headers allows the attribution of a packet drop to one AS. But, this is not an easy task as inter-AS links often use IPv6 address of only one AS (if not using link-local per <xref target="RFC7404"/>). This document uses the following algorithm to attribute the drop to one AS for packet sourced in one AS and then having a path traversing AS#foo just before AS#bar:</t>
          <ul spacing="normal">
            <li>if the packet drop happens at the first router (i.e., hop limit == 1 does not trigger an ICMP hop-limit exceeded), then the drop is assumed to this AS as it is probably an ingress filter on the first router (i.e., the hosting provider in most of the cases - except if collocated with an IXP).</li>
            <li>if the packet drop happens in AS#foo after one or more hop(s) in AS#bar, then the drop is assumed to be in AS#foo ingress filter on a router with an interface address in AS#foo</li>
            <li>if the packet drop happens in AS#bar after one or more hop(s) in AS#bar before going to AS#foo, then the drop is assumed to be in AS#foo ingress filter on a router with an interface address in AS#bar</li>
          </ul>
          <t>In several cases, the above algorithm was not possible (e.g., some intermediate routers do not generate an ICMP unreachable hop limit exceeded even in the absence of any extension headers), then the drop is not attributed. Please also note that the goal of this document is not to 'point fingers to operators' but more to evaluate the potential impact. I.e., a tier-1 provider dropping packets with extension headers has a much bigger impact on the Internet traffic than an access provider.</t>
          <t>Future revision of this document will use the work of <xref target="MLAT_PEERING"/>. Readers are urged not to rely on the AS attribution in this document version.</t>
        </section>
      </section>
      <section anchor="tested_eh">
        <name>Tested Extension Headers</name>
        <t>In the first phase among collaborating vantage points, packets always contained either a UDP payload or a TCP payload, the latter is sent with only the SYN flag set and with data as permitted by section 3.4 of <xref target="RFC793"/> (2nd paragraph). A usual traceroute is done with only the UDP/TCP payload without any extension header with varying hop-limit in order to learn the traversed routers and ASs. Then, several UDP/TCP probes are sent with a set of extension headers:</t>
        <ul spacing="normal">
          <li>
            <t>hop-by-hop options header containing:
            </t>
            <ul spacing="normal">
              <li>one PadN option for a length of 8 octets</li>
              <li>one unknown option with the "discard" bits for a length of 8 octets</li>
              <li>one unknown option (two sets: with "discard" and "skip" bits) for a length of 256 and 512 octets</li>
            </ul>
          </li>
          <li>
            <t>destination options header containing:
            </t>
            <ul spacing="normal">
              <li>one PadN option for a length of 8 octets</li>
              <li>one unknown option with the "discard" bits for a length of 8 octets</li>
              <li>one unknown option (two sets: with "discard" and "skip" bits) for a length of 16, 32, 64, 128, 256, and 512 octets</li>
              <li>one unknown option (with "skip" bits) for a length of 24, 40, 48, and 56 octets</li>
            </ul>
          </li>
          <li>routing header with routing types from 0 to 6 inclusive</li>
          <li>
            <t>fragment header of varying frame length 512, 1280, and 1500 octets:
            </t>
            <ul spacing="normal">
              <li>atomic fragment (i.e., M-flag = 0 and offset = 0)</li>
              <li>non-atomic first fragment (i.e., M-flag = 1 and offset = 0)</li>
            </ul>
          </li>
          <li>encapsulation security payload (ESP) header with dummy SPI followed by UDP/TCP header and a 38 octets payload</li>
          <li>authentication header (AH) with dummy SPI followed by UDP/TCP header and a 38 octets payload</li>
        </ul>
        <t>In the above, length is the length of the extension header itself except for the fragmentation header where the length is the IP packet length (i.e., including the IPv6, and TCP/UDP headers + payload). Also, an unknown option means an option with an unassigned code in the IANA registry <xref target="IANA_IPV6_PARAMS"/>.</t>
        <t>For hop-by-hop and destination options headers, the choice was made to use one unknown option instead of multiple consecutive PadN options in order to avoid packets from being discarded on the destination. Indeed, the Linux kernel does not accept consecutive Pad1 or PadN options if their total size exceeds 7 octets. Not only multiple PadN options violate section 2.1.9.5 of <xref target="RFC4942"/>, but it is also considered as suspicious (see section 5.3 of <xref target="BCP220"/>). Nevertheless, for comparative purposes, multiple PadN options were used for experiments of length 256 octets. In that very specific case, drops on the destination are not considered as drops.</t>
        <t>In addition to the above extension headers, other probes were sent with next header field of IPv6 header set to:</t>
        <ul spacing="normal">
          <li>59, which is "no next header", especially whether extra octets after the no next header as section 4.7 <xref target="RFC8200"/> requires that "those octets must be ignored and passed on unchanged if the packet is forwarded"</li>
          <li>143, which is Ethernet payload (see section 10.1 of <xref target="RFC8986"/>)</li>
        </ul>
      </section>
    </section>
    <section anchor="results">
      <name>Results</name>
      <t>This section presents the current results out of phase 1 (collaborating vantage points) testing. Probe packets were sent between all pairs of vantage points with a hop-limit from 1 to the number of hops between the two vantage points and for all the extension headers described in <xref target="tested_eh"/>.</t>
      <section anchor="routing-header">
        <name>Routing Header</name>
        <t><xref target="table_rh_types"/> lists all routing header types and the percentage of experiments that were successful, i.e., packets with routing header reaching their destination, both for UDP and TCP:</t>
        <table anchor="table_rh_types">
          <name>Per Routing Header Types Transmission</name>
          <thead>
            <tr>
              <th align="left">Routing Header Type</th>
              <th align="left">UDP</th>
              <th align="left">TCP</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">74.3%</td>
              <td align="left">71.2%</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">88.3%</td>
              <td align="left">81.4%</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">97.4%</td>
              <td align="left">90.4%</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">97.6%</td>
              <td align="left">91.3%</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">78.8%</td>
              <td align="left">72.6%</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">97.4%</td>
              <td align="left">90.9%</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">97.4%</td>
              <td align="left">90.0%</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="table_drop_rh0"/> and <xref target="table_drop_rh1"/> respectively list ASs that drop packets with the routing header type 0 (the original source routing header, which is now deprecated) and packets with the routing header type 1 (NIMROD <xref target="RFC1753"/>, which is now deprecated).</t>
        <table anchor="table_drop_rh0">
          <name>ASs dropping Routing Header Type 0</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1299</td>
              <td align="left">TWELVE99 Arelion, fka Telia Carrier, SE</td>
            </tr>
            <tr>
              <td align="left">5511</td>
              <td align="left">OPENTRANSIT, FR</td>
            </tr>
            <tr>
              <td align="left">6895</td>
              <td align="left">ESPANIX Neutral Interconect Exchange for Spain, ES</td>
            </tr>
            <tr>
              <td align="left">6939</td>
              <td align="left">HURRICANE, US</td>
            </tr>
            <tr>
              <td align="left">7195</td>
              <td align="left">EDGEUNO (DE-CIX Frankfurt)</td>
            </tr>
            <tr>
              <td align="left">9498</td>
              <td align="left">BBIL-AP BHARTI Airtel Ltd. (Equinix Hong Kong)</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">DIGITALOCEAN (DE-CIX Frankfurt)</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH</td>
            </tr>
            <tr>
              <td align="left">37684</td>
              <td align="left">ANGANI-AS, KE</td>
            </tr>
            <tr>
              <td align="left">58461</td>
              <td align="left">CT-HANGZHOU-IDC No.288,Fu-chun Road, CN</td>
            </tr>
            <tr>
              <td align="left">328578</td>
              <td align="left">KEMNET-TECHNOLOGIES-AS, KE</td>
            </tr>
          </tbody>
        </table>
        <table anchor="table_drop_rh1">
          <name>ASs dropping Routing Header Type 1</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1299</td>
              <td align="left">TWELVE99 Arelion, fka Telia Carrier, SE</td>
            </tr>
            <tr>
              <td align="left">4134</td>
              <td align="left">CHINANET-BACKBONE No.31,Jin-rong Street, CN</td>
            </tr>
            <tr>
              <td align="left">5511</td>
              <td align="left">OPENTRANSIT, FR</td>
            </tr>
            <tr>
              <td align="left">37684</td>
              <td align="left">ANGANI-AS, KE</td>
            </tr>
            <tr>
              <td align="left">58461</td>
              <td align="left">CT-HANGZHOU-IDC No.288,Fu-chun Road, CN</td>
            </tr>
            <tr>
              <td align="left">328578</td>
              <td align="left">KEMNET-TECHNOLOGIES-AS, KE</td>
            </tr>
          </tbody>
        </table>
        <t>Regarding the routing type 0, it is possibly due to a strict implementation of <xref target="RFC5095"/> but it is expected that no packet with such routing type would be transmitted anymore. So, this is not surprising. The same reasoning could be applied to the routing type 1.</t>
        <t><xref target="table_drop_rh4"/> lists ASs that drop packets with the routing header type 4 (Segment Routing Header <xref target="RFC8754"/>).</t>
        <table anchor="table_drop_rh4">
          <name>ASs dropping Routing Header Type 4</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1299</td>
              <td align="left">TWELVE99 Arelion, fka Telia Carrier, SE</td>
            </tr>
            <tr>
              <td align="left">4637</td>
              <td align="left">ASN-TELSTRA-GLOBAL Telstra Global, HK</td>
            </tr>
            <tr>
              <td align="left">5511</td>
              <td align="left">OPENTRANSIT, FR</td>
            </tr>
            <tr>
              <td align="left">6939</td>
              <td align="left">HURRICANE, US</td>
            </tr>
            <tr>
              <td align="left">7195</td>
              <td align="left">EDGEUNO SAS, CO</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">DIGITALOCEAN-ASN, US</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH, FR</td>
            </tr>
            <tr>
              <td align="left">37100</td>
              <td align="left">SEACOM-AS, MU</td>
            </tr>
            <tr>
              <td align="left">58461</td>
              <td align="left">CT-HANGZHOU-IDC No.288,Fu-chun Road, CN</td>
            </tr>
          </tbody>
        </table>
        <t>This drop of SRH was to be expected as SRv6 is specified to run only in a limited domain.</t>
        <t>Other routing header types (2 == mobile IPv6 <xref target="RFC6275"/>, 3 == RPL <xref target="RFC6554"/>, and even 5 == CRH-16 and 6 == CRH-32<xref target="I-D.draft-bonica-6man-comp-rtg-hdr"/>) can be transmitted over the global Internet without being dropped (assuming that the 2.5% of dropped packets are within the measurement error). At least, this is true for UDP. We still need to investigate the differences for TCP equivalent transmissions.</t>
      </section>
      <section anchor="hop-by-hop-options-header">
        <name>Hop-by-Hop Options Header</name>
        <t><xref target="table_drop_hbh"/> lists all experiments (types and lengths) along with their success percentages, i.e., packets with a hop-by-hop header reaching their destination, both for UDP and TCP:</t>
        <table anchor="table_drop_hbh">
          <name>Hop-by-hop Header Transmission</name>
          <thead>
            <tr>
              <th align="left">Option Type</th>
              <th align="left">Length (bytes)</th>
              <th align="left">UDP</th>
              <th align="left">TCP</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Skip</td>
              <td align="left">8</td>
              <td align="left">8.6%</td>
              <td align="left">9.1%</td>
            </tr>
            <tr>
              <td align="left">Discard</td>
              <td align="left">8</td>
              <td align="left">0.0%</td>
              <td align="left">0.0%</td>
            </tr>
            <tr>
              <td align="left">Skip</td>
              <td align="left">256</td>
              <td align="left">2.4%</td>
              <td align="left">2.4%</td>
            </tr>
            <tr>
              <td align="left">Skip w/ PadN</td>
              <td align="left">256</td>
              <td align="left">0.5%</td>
              <td align="left">0.6%</td>
            </tr>
            <tr>
              <td align="left">Discard</td>
              <td align="left">256</td>
              <td align="left">0.0%</td>
              <td align="left">0.0%</td>
            </tr>
            <tr>
              <td align="left">Skip</td>
              <td align="left">512</td>
              <td align="left">1.4%</td>
              <td align="left">1.5%</td>
            </tr>
            <tr>
              <td align="left">Discard</td>
              <td align="left">512</td>
              <td align="left">0.0%</td>
              <td align="left">0.0%</td>
            </tr>
          </tbody>
        </table>
        <t>It appears that hop-by-hop options headers cannot reliably traverse the global Internet; only small headers with 'skipable' options have some chances. If the unknown hop-by-hop option has the 'discard' bits, it is dropped per specification, although we observed in some cases that such packets were not necessarily dropped directly by the very first hop. Globally, there are no notable differences between UDP and TCP.</t>
      </section>
      <section anchor="destination-options-header">
        <name>Destination Options Header</name>
        <t><xref target="table_drop_do"/> lists all lengths that have been tested along with their success percentages, i.e., packets with a destination header reaching their destination, both for UDP and TCP:</t>
        <table anchor="table_drop_do">
          <name>Destination Header Transmission</name>
          <thead>
            <tr>
              <th align="left">Length (bytes)</th>
              <th align="left">UDP</th>
              <th align="left">TCP</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">8</td>
              <td align="left">97.8%</td>
              <td align="left">94.3%</td>
            </tr>
            <tr>
              <td align="left">16</td>
              <td align="left">97.7%</td>
              <td align="left">90.5%</td>
            </tr>
            <tr>
              <td align="left">24</td>
              <td align="left">97.6%</td>
              <td align="left">89.8%</td>
            </tr>
            <tr>
              <td align="left">32</td>
              <td align="left">93.5%</td>
              <td align="left">86.2%</td>
            </tr>
            <tr>
              <td align="left">40</td>
              <td align="left">93.9%</td>
              <td align="left">86.2%</td>
            </tr>
            <tr>
              <td align="left">48</td>
              <td align="left">93.7%</td>
              <td align="left">86.1%</td>
            </tr>
            <tr>
              <td align="left">56</td>
              <td align="left">93.8%</td>
              <td align="left">52.7%</td>
            </tr>
            <tr>
              <td align="left">64</td>
              <td align="left">45.9%</td>
              <td align="left">37.8%</td>
            </tr>
            <tr>
              <td align="left">128</td>
              <td align="left">10.9%</td>
              <td align="left">10.9%</td>
            </tr>
            <tr>
              <td align="left">256</td>
              <td align="left">4.3%</td>
              <td align="left">4.3%</td>
            </tr>
            <tr>
              <td align="left">256 w/ PadN</td>
              <td align="left">4.3%</td>
              <td align="left">4.3%</td>
            </tr>
            <tr>
              <td align="left">512</td>
              <td align="left">3.1%</td>
              <td align="left">3.1%</td>
            </tr>
          </tbody>
        </table>
        <t>The measurement revealed no difference with the discard bits, which tends to show that routers do not look inside the destination header, as expected.</t>
        <t>The size of the destination options header has a major impact on the drop probability. It appears that destination headers larger than 24 octets already cause drops. It may be because the 40 octets of the IPv6 header + the 24 octets of the extension header (total 64 octets) is still in the limits of some router hardware lookup mechanisms while the next measured size (extension header size of 32 octets for a total of 72 octets) is beyond the hardware limit and some ASs have a policy to drop packets where the TCP/UDP ports are unknown. A major drop also occurs once the size reaches 64 bytes for UDP while, surprisingly, it happens at 56 bytes for TCP. In either case, the chances of surviving are approximately halved. We still need to investigate the differences for TCP equivalent transmissions.</t>
      </section>
      <section anchor="fragmentation-header">
        <name>Fragmentation Header</name>
        <t>The propagation of two kinds of fragmentation headers was analysed: atomic fragment (offset == 0 and M-flag == 0) and plain first fragment (offset == 0 and M-flag == 1). The <xref target="table_drop_frag"/> displays the propagation differences.</t>
        <table anchor="table_drop_frag">
          <name>IPv6 Fragments Transmission</name>
          <thead>
            <tr>
              <th align="left">M-flag</th>
              <th align="left">UDP</th>
              <th align="left">TCP</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0 (atomic)</td>
              <td align="left">55.8%</td>
              <td align="left">49.8%</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">89.2%</td>
              <td align="left">87.6%</td>
            </tr>
          </tbody>
        </table>
        <t>The size of the overall IPv6 packets (512, 1280, and 1500 octets) has no major impact on the propagation.</t>
      </section>
      <section anchor="no-extension-headers-drop-at-all">
        <name>No extension headers drop at all</name>
        <t><xref target="table_no_drop"/> lists ASs that do not drop transit traffic with extension headers and therefore follow the recommendations of <xref target="I-D.draft-ietf-opsec-ipv6-eh-filtering"/>:</t>
        <table anchor="table_no_drop">
          <name>ASs not dropping packets with Extension Headers</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">267</td>
              <td align="left">NETHER-NET, US</td>
            </tr>
            <tr>
              <td align="left">2497</td>
              <td align="left">IIJ Internet Initiative Japan Inc., JP</td>
            </tr>
            <tr>
              <td align="left">14103</td>
              <td align="left">ACDNET-ASN1, US</td>
            </tr>
            <tr>
              <td align="left">21283</td>
              <td align="left">A1SI-AS A1 Slovenija, SI</td>
            </tr>
            <tr>
              <td align="left">33764</td>
              <td align="left">AFRINIC-ZA-JNB-AS, MU</td>
            </tr>
            <tr>
              <td align="left">37271</td>
              <td align="left">Workonline</td>
            </tr>
            <tr>
              <td align="left">37708</td>
              <td align="left">AFRINIC-MAIN, MU</td>
            </tr>
            <tr>
              <td align="left">60011</td>
              <td align="left">MYTHIC-BEASTS-USA, GB</td>
            </tr>
            <tr>
              <td align="left">198644</td>
              <td align="left">GO6, SI</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="other-next-headers">
        <name>Other Next Headers</name>
        <t>Measurements also include two protocol numbers that are mainly new use of IPv6 as well as AH and ESP. <xref target="table_special_next_header"/> indicates the percentage of packets reaching the destination.</t>
        <table anchor="table_special_next_header">
          <name>Transmission of Special IP Protocols</name>
          <thead>
            <tr>
              <th align="left">Next Header</th>
              <th align="left">Transmission</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">NoNextHeader (59)</td>
              <td align="left">98.2%</td>
            </tr>
            <tr>
              <td align="left">Ethernet (143)</td>
              <td align="left">98.3%</td>
            </tr>
            <tr>
              <td align="left">Authentication (AH)</td>
              <td align="left">98.1%</td>
            </tr>
            <tr>
              <td align="left">ESP</td>
              <td align="left">98.3%</td>
            </tr>
          </tbody>
        </table>
        <t>The above indicates that those IP protocols can be transmitted over the global Internet without being dropped (assuming that the 2% of dropped packets are within the measurement error). Globally, there are no notable differences between UDP and TCP, for cases where it applies.</t>
      </section>
    </section>
    <section anchor="summary-of-the-collaborating-parties-measurements">
      <name>Summary of the collaborating parties measurements</name>
      <t>While the analysis has areas of improvement (geographical distribution and impact on latency), it appears that:</t>
      <ul spacing="normal">
        <li>AH, ESP, and non-atomic fragmentation headers (to some extent) can traverse the Internet;</li>
        <li>only routing headers types 0, 1 and 4 experiment problems over the Internet, other types have no problems;</li>
        <li>hop-by-hop options headers do not traverse the Internet, whatever the size;</li>
        <li>destination options headers are not reliable enough when it exceeds 24 octets.</li>
      </ul>
      <t>Of course, the next phase of measurement with non-collaborating parties will probably give another view.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>While active probing of the Internet may be considered as an attack, this measurement was done among collaborating parties and using the probe attribution technique described in <xref target="I-D.draft-vyncke-opsec-probe-attribution"/> to allow external parties to identify the source of the probes if required.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="IANA_IPV6_PARAMS" target="https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml#ipv6-parameters-2">
          <front>
            <title>Internet Protocol Version 6 (IPv6) Parameters, Destination Options and Hop-by-Hop Options</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0793"/>
            <seriesInfo name="RFC" value="793"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="TIER1" target="https://en.wikipedia.org/wiki/Tier_1_network">
          <front>
            <title>Tier 1 network</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ALEXA" target="https://www.alexa.com/topsites">
          <front>
            <title>The top 500 sites on the web</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GITHUB" target="https://gitlab.uliege.be/Benoit.Donnet/james">
          <front>
            <title>james</title>
            <author initials="R." surname="Léas" fullname="Raphaël Léas">
              <organization>Université de Liège</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MLAT_PEERING" target="https://catalog.caida.org/details/paper/2013_inferring_multilateral_peering/">
          <front>
            <title>Inferring Multilateral Peering</title>
            <seriesInfo name="DOI" value="10.1145/2535372.2535390"/>
            <author initials="V." surname="Giotsas" fullname="Vasileios Giotsas">
              <organization>University College London</organization>
            </author>
            <author initials="S." surname="Zhou" fullname="Shi Zhou">
              <organization>University College London</organization>
            </author>
            <author initials="M." surname="Luckie" fullname="Matthew Luckie">
              <organization>CAIDA, San Diego Supercomputer Center, University Of California San Diego</organization>
            </author>
            <author initials="K." surname="Claffy" fullname="Kc Claffy">
              <organization>CAIDA, San Diego Supercomputer Center, University Of California San Diego</organization>
            </author>
            <date year="2013" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-opsec-ipv6-eh-filtering">
          <front>
            <title>Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ipv6-eh-filtering-10"/>
            <author fullname="Fernando Gont" initials="F." surname="Gont">
              <organization>EdgeUno</organization>
            </author>
            <author fullname="Will (Shucheng) LIU" initials="W. S." surname="LIU">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="3" month="May" year="2022"/>
            <abstract>
              <t>This document analyzes the security implications of IPv6 Extension Headers and associated IPv6 options.  Additionally, it discusses the operational and interoperability implications of discarding packets based on the IPv6 Extension Headers and IPv6 options they contain.  Finally, it provides advice on the filtering of such IPv6 packets at transit routers for traffic not directed to them, for those cases where such filtering is deemed as necessary.
              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9098">
          <front>
            <title>Operational Implications of IPv6 Packets with Extension Headers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9098"/>
            <seriesInfo name="RFC" value="9098"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="N. Hilliard" initials="N." surname="Hilliard">
              <organization/>
            </author>
            <author fullname="G. Doering" initials="G." surname="Doering">
              <organization/>
            </author>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="G. Huston" initials="G." surname="Huston">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document summarizes the operational implications of IPv6 extension headers specified in the IPv6 protocol specification (RFC 8200) and attempts to analyze reasons why packets with IPv6 extension headers are often dropped in the public Internet.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-opsawg-pcap">
          <front>
            <title>PCAP Capture File Format</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-pcap-01"/>
            <author fullname="Guy Harris" initials="G." surname="Harris">
         </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works Inc</organization>
            </author>
            <date day="29" month="July" year="2022"/>
            <abstract>
              <t>   This document describes the format used by the libpcap library to
   record captured packets to a file.  Programs using the libpcap
   library to read and write those files, and thus reading and writing
   files in that format, include tcpdump.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7404">
          <front>
            <title>Using Only Link-Local Addressing inside an IPv6 Network</title>
            <seriesInfo name="DOI" value="10.17487/RFC7404"/>
            <seriesInfo name="RFC" value="7404"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="E. Vyncke" initials="E." surname="Vyncke">
              <organization/>
            </author>
            <date month="November" year="2014"/>
            <abstract>
              <t>In an IPv6 network, it is possible to use only link-local addresses on infrastructure links between routers.  This document discusses the advantages and disadvantages of this approach to facilitate the decision process for a given network.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <referencegroup anchor="BCP220" target="https://www.rfc-editor.org/info/bcp220">
          <!-- reference.RFC.8504.xml -->
<reference anchor="RFC8504" target="https://www.rfc-editor.org/info/rfc8504">
            <front>
              <title>IPv6 Node Requirements</title>
              <seriesInfo name="DOI" value="10.17487/RFC8504"/>
              <seriesInfo name="RFC" value="8504"/>
              <seriesInfo name="BCP" value="220"/>
              <author fullname="T. Chown" initials="T." surname="Chown">
                <organization/>
              </author>
              <author fullname="J. Loughney" initials="J." surname="Loughney">
                <organization/>
              </author>
              <author fullname="T. Winters" initials="T." surname="Winters">
                <organization/>
              </author>
              <date month="January" year="2019"/>
              <abstract>
                <t>This document defines requirements for IPv6 nodes.  It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
                <t>This document obsoletes RFC 6434, and in turn RFC 4294.</t>
              </abstract>
            </front>
          </reference>
        </referencegroup>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <seriesInfo name="DOI" value="10.17487/RFC8986"/>
            <seriesInfo name="RFC" value="8986"/>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="Z. Li" initials="Z." surname="Li">
              <organization/>
            </author>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC1753">
          <front>
            <title>IPng Technical Requirements Of the Nimrod Routing and Addressing Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC1753"/>
            <seriesInfo name="RFC" value="1753"/>
            <author fullname="N. Chiappa" initials="N." surname="Chiappa">
              <organization/>
            </author>
            <date month="December" year="1994"/>
            <abstract>
              <t>This document presents the requirements that the Nimrod routing and addressing architecture has upon the internetwork layer protocol. To be most useful to Nimrod, any protocol selected as the IPng should satisfy these requirements. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <seriesInfo name="DOI" value="10.17487/RFC5095"/>
            <seriesInfo name="RFC" value="5095"/>
            <author fullname="J. Abley" initials="J." surname="Abley">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil">
              <organization/>
            </author>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic.  This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8754"/>
            <seriesInfo name="RFC" value="8754"/>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." surname="Previdi">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <seriesInfo name="DOI" value="10.17487/RFC6275"/>
            <seriesInfo name="RFC" value="6275"/>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="J. Arkko" initials="J." surname="Arkko">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6554">
          <front>
            <title>An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL)</title>
            <seriesInfo name="DOI" value="10.17487/RFC6554"/>
            <seriesInfo name="RFC" value="6554"/>
            <author fullname="J. Hui" initials="J." surname="Hui">
              <organization/>
            </author>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur">
              <organization/>
            </author>
            <author fullname="D. Culler" initials="D." surname="Culler">
              <organization/>
            </author>
            <author fullname="V. Manral" initials="V." surname="Manral">
              <organization/>
            </author>
            <date month="March" year="2012"/>
            <abstract>
              <t>In Low-Power and Lossy Networks (LLNs), memory constraints on routers may limit them to maintaining, at most, a few routes.  In some configurations, it is necessary to use these memory-constrained routers to deliver datagrams to nodes within the LLN.  The Routing Protocol for Low-Power and Lossy Networks (RPL) can be used in some deployments to store most, if not all, routes on one (e.g., the Directed Acyclic Graph (DAG) root) or a few routers and forward the IPv6 datagram using a source routing technique to avoid large routing tables on memory-constrained routers.  This document specifies a new IPv6 Routing header type for delivering datagrams within a RPL routing domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-bonica-6man-comp-rtg-hdr">
          <front>
            <title>The IPv6 Compact Routing Header (CRH)</title>
            <seriesInfo name="Internet-Draft" value="draft-bonica-6man-comp-rtg-hdr-29"/>
            <author fullname="Ron Bonica" initials="R." surname="Bonica">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yuji Kamite" initials="Y." surname="Kamite">
              <organization>NTT Communications Corporation</organization>
            </author>
            <author fullname="Andrew Alston" initials="A." surname="Alston">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Daniam Henriques" initials="D." surname="Henriques">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Luay Jalil" initials="L." surname="Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="14" month="November" year="2022"/>
            <abstract>
              <t>   This document defines two new Routing header types.  Collectively,
   they are called the Compact Routing Headers (CRH).  Individually,
   they are called CRH-16 and CRH-32.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-vyncke-opsec-probe-attribution">
          <front>
            <title>Attribution of Internet Probes</title>
            <seriesInfo name="Internet-Draft" value="draft-vyncke-opsec-probe-attribution-01"/>
            <author fullname="Éric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoit Donnet" initials="B." surname="Donnet">
              <organization>Université de Liège</organization>
            </author>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>Université de Liège</organization>
            </author>
            <date day="3" month="March" year="2022"/>
            <abstract>
              <t>   Active measurements at Internet-scale can target either collaborating
   parties or non-collaborating ones.  This is similar scan and could be
   perceived as aggressive.  This document proposes a couple of simple
   techniques allowing any party or organization to understand what this
   unsolicited packet is, what is its purpose, and more importantly who
   to contact.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank AfriNIC, Angani, China Telecom, Jared Mauch, Sander Steffann, XiPeng Xiao, and Jan Zorz for allowing the free use of their labs. Other thanks to Ben Campbell and Fernando Gont who indicated a nice IPv6 hosting provider in Africa and South America.</t>
      <t>Special thanks as well to Professor Benoit Donnet for his support and advices. This document would not have existed without his support.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIABjou2MAA91c6XIiSZL+z1PEqm2spR1A3EI11raTQpRElYRkQlV9rK2V
BRBAtpJMOg+pmKIeYN5kxtZsX6JebD/3iMgDkLp6emfXbGsOQWSkh4eH3+5B
pVIpxW7sqVfi4E0SxcLxg3ihQnGtZJSEaqn8WAQz0f8YKz9yA18slJzi+SgJ
H91HOXY9N16LwzfOdX90dFCS43GoHgkYDRyUJjJW8yBcvxKuPwtKUTJeuhHB
idcrrDno378uTYOJL5f4Ng3lLK48rv3Jg6o8doJVVPkZD6JKrVlyV+ErEYdA
sVGrndYaJRkqiXVuViqUMQBGQvpTcS19OWesD0pPQfgwD4NkhWmD28eOyOYe
lB7UGs+nQMGPVeiruHJOq5celZ+oVyUhnn1TCI37wfeA7/pzcUEzaXwpXQ/j
jPmfXRXPqkE4pwcynCzwYBHHq+jV8THNoyH3UVXttGMaOB6HwVOkjhnCMb05
d+NFMsa7SpPlOEcWeu6BvlGcg23mVfWLVTfIv3H8HIWri3jpHZRKUQwifpBe
4GODaxWVoqUM4w+/JAGWeSX8oLRyX4l/j4NJWURBGIdqFuHTekkf/qNUkkm8
CEKQrwLcBM4cL335a1W85xV5TB/1l7+G7iQ/DBJI3/0LE/mV6LnRJODxCGso
bPBcibcePnlS+qLT4meTYApQ9W6zrr+CEzHRVWAA8zzxY+K9M+XN3UQPKn1K
hk5/ntBK1UmwLOB8VxVXX/4uoxzGd3K1kF/+08s9KOL8zsd5hpEbf/m7mCpx
5X7521zlEMsPvIBYSOsor+pBAP8cxckUvFxNPNpVdawKWL6pikESLqWfQ5OE
2PXz41+LpaE0f65ALAAnTmJxDVlVMzcIlThrdM1Tx/O+/F0RAE+K8y9/x4YA
NVaiXsudTKtWq/12AvzMO6i6vIM/Zzsv+QFGYqBPOA6cofNhcPu+8+HWuXOu
Rxpvo8qsTIvbMACvBp54T3uG9uqIQxLoI3ErQ9AL08C/54pWZAJB0jNlchms
KuN1BX/ssF5EhnNiSStyT09PVRd6R4sxtNvcJwUUHburx05llS60/b36kaTu
m63RSqNUIl2Z2+v9oH9XL2zw3oUKrgtskZTcXqyUX31yH9yVmroaM/p2TC9+
qH/IXnSu+j84RdgLJWJsuV2rCfCJigTIApsgntT42f1LT32UJEbHeJXfwtSL
wf3lu7MCcNY2e6FAYXlynHH68ZnyAzeungc+sD3OXkx1DP+rmL8viKkRgud4
H3Our5z7D7f9/t1geLHFSDMVhqTkrxMvdknbhtITt0rR4N59wOJBf86rE+lO
NeGnKgZjR8crCSty3KjVmx9cC/fDMgf3w0rDPdbyiM8qIlawez2/GUDd1ar1
eqt93Gg3282TRpX/nmo5mwLOK0ErVOqNryDWexm5nnKDSFy4QRw9S6+16AWe
h3MRV4E/DfxnwI0WrvhpESS/D8q1jMFtT+IqmTy4qgir5wzOnbIYwQaQng/g
hoCmYLtVAgqKniLBL+eXvJmJnvRcyJPvyuzFZ9Z+OxE9T85m63/WsqVSpVIR
cgxlKydxaeDTaXXK4u5176R70hALGYmldr2mLHTTEKIIB2wlYa3iSDzBrgv2
SdSWSxZVIbpuJOBOJey2rUIVkR4SUkSeO1/E3lpM3Rk4j55C2yyCaQBWXWug
S1LxoZrQQ7wJvgTEQSwAEurR8wRpDBgewA3mmBBV9WaW7nTqQYy+IbUbBtNk
QqqylO3t06d/M9v7/Pl3bdAoIjeEIyjxBJ4p6M1Q5l4whmBaxf/PIMXI9SeK
FvN5S4PKeVW7U+TCVaD11KTCulwtKjPXi1mUzY5Bskd3ih1HwZIhB0vgNTWO
K7hEpG+ke8Pf2cxlR4tWBUZLuRZjpWFMFtKfQzfr8yDgoM8q8NwJlEYVBjoK
LOVPa6dd4BFKN8IL8gmes4/jAxcGsO9EvcC6tyAhGT5sJQmJjd3lChANmjik
Z86F3jEkxuZkRLOfFmuNqbE1GAkSb6rPG4sugTrg6FW9NZjpJV4ri7HBVWs0
QJN4HSwUpCsb2vJxCRlzcFGp15vi8Jqca3Bjo3FUZftG/gktho37eC8JcbK0
CQzJR/LOx54iEJ8+aRv2+XOVGPw6YxTmb4ljCxE0weREqszoLXNxE3Ogr3Bm
8ZPCQnBEADkgUuOcmZY+EMHmZPWhKqviEXtC+IJzBG3IscbW5DTj8tSvIVzZ
cqyAp5PEgR8sgyQSo3UUq2UkDp1RhK06ICctDEJ++gQPxVtHCu599PmzRlbv
HAYq9X+OLfcBAF6bePA/NWEPYrgOlfpBnt2A1qdP7J0QROI4QF0j3FE0awwq
rnEg5nzYnSEm2iOvIE2oQOI75a2JNsE2sZhOLEqMzBgcPHPj6BVUEC21knPt
vk2gaccq0zDqUW+fOWcMNCaMgvTXYtC7vsXEKCKKQwKBKNCdAzLWxKvjtdZP
GXH+RKsZsYSHsCTEtheUE4gO3gcosCZo+QQiPS0UB9V7JAekirzgiQ8YoFae
JO+dWMMoxMKiZrWJXMW8GtgkENUVvu9XSfJpXqGnEH8oGGbp7NyZi8xIbpes
jtgjEZplXNL0rxNaUXM6KWnIKKg55XPGANDwA7+y79BYo0qwK0QQOCcTpd+i
GRE8nqkWyTwGDN5y36dP7KNiC3AtKz65oexgliEmqwSBtOidDyFCWEnhNfwF
C0+DJemFmftRzEJ8ZukhqhrGQ8jOKMYk6RAUYPbo8skwg0JySXvojIRGB/hN
QndMFiCIFI4S3O+yn29UQyr3Eb5/A99Ky/Ity3KpNAIrku8It46cBCALciaQ
R9J13vQJIlXFXhmhD0YRYM+eG5E2AwK0haKCAEHmmrGYxto0OiPhJ8sxn97U
BlpAceOMhvifGMLR2fT0MOvBzVWgNfymtGl0TjbD/v1l/66CP5t3o80IhFrM
XOVNy+J6gCnNk05r47yGqzzoVW5W0eYnZ/MmAO+qaJyEc8xo1ZutTW/hQvPd
K49s3aY33Jwp92dQHM9P6qftTX+Kbbzzg41ztzlL4OpHwnGhKPC83mjVW5vh
VWV0c9W7GQr9BwMbZwn1Fk7lkma1ap365txF3ACq3kyU9Dc9Z3MfhAhYoYnw
xv5J70bOZgj/8kcyMT1YubIY/shzO7Xtuef9zWtw0wQiET8zZYCtwRTD5w/V
M1NGFxs4D3O5en7Ku7cb7RTT807jpLO5eX+5cd5tRuupr9aF0durzfcyhGzT
gdVaJ80NyU8PRjcGe+DDckX67fA9DER4tLn+YXOtPrqT4Oumj24313IautOv
m/7mFiR/WAeaM7pgDZ/SDZu3/c1QuiTm/OSk1t04s9AF0wBEuCIVocRQuwab
63eb/vjL33yiTqtFUK7XEMKJOINUgc+JPD25HAOrOc3p1Gr1+ub6x/tL8OBZ
3xndjyp0rODX15BBMEAZPjsR7bTbabU2FzedzWiwufo5GXs/Q6ltSp9eiW8K
oqYjvu8OHEiaHXJGB59Zlu+hmyCoewztp2/yZrVUOk/Yh8u5BeLQKm8JxPAo
gbdTgd1ZqGneyME2sr48KqdaoGCxRbQInlgJkGkmHf0ECi0EVLlVwgv5qBik
mhC6cC+lFnwxZI1An85ZjXE2A1qAvFBibFE/aYmN6N1c9If3FXxBMDPCwD3b
fEEzoBowkCkHM4Of1RunpzT7+/7V+z4+OqHysEBZzB4k6QCEQD2JeJeCpFF/
C27rlAAPBm8yb2Dgu7GrafJGgt0wMKmWxZtbu2Cj2+ji8w83FWdUbxtU7tRc
u7CcHeFpp3Xa1vD+vnJ1f16hr7sbazbahMAFJp05vbdnN8M+fdkzsdmoYeT8
3rnIUCV17k5U6hVlvjQllvrbENodjFz13/evmnsWaJ3igzi7H2Jbw93npFjp
lC4HQwcnkKE7DKrNevmN61dCYrERZ/IgAsO9VGl1mrRhLFG571+N7u+cysXV
zZlzRUdFgam4YCNZFpdv9wM4abcJM+fe6d1cXwNZ/ky6YZn4abxAOSwVwhF6
PxpekTN8BaeHPd/RbVkMhvYwWyddOsz7a9qTM6o4t/hMuqGckXlkyHxryAxj
9KN9v92uE9lubsG7d85wNMDZvb4rkq7dqTUxMhrcXBHzsmF6gF8w8uBc++7P
8D+qU7DYaGChdlrtJlOJPuyeRafVoUV/cn68qZjP+acnnQYt13fofPSK/as+
qCUG987VwBGjW+fu7VVfjKqrqoOFB/dbELqnROM+5g0HP4AaSRxah3mCoGIS
i/5HHQSyMhit4DiWMT/F/7RJMnn57u5u0AO7PCskZI5ppfOL/rvhjRg5I3DO
jQXTbbWYWeqE/9sbHPY9vqT0cxIwDMTbuSgL596+dNo6pRM9Oxtc0WmeXTp3
9wOy7/CLxVVMhM6Ov96A+hD0t7mjVlpafrdcARjsq3QOWXiSysEFUfam13fy
0mPm1Pn0HTiKzGLDeuExWVZioPeXhnG08iDjxxxQ6V3e3Nw6+XeAc5cf1kcD
4n+QxLKSzHNRo9nt0uauJQXUbhIZjwj8+87OaZJLRbCMU/WTU3kzPKvQOeQm
tU5OWMdWGrzeCJonTkMfHa7gGdg4wH/yKDRP6rWaZsYenV8R7EnjhMhHtazA
98hnS5/ADhNWwwtwIL/2tp89hEHPoXztDIZ5sGzEadtsokXRmoMByuLiLBXf
rhaf3n3lEov9dHnzrjI475FSa3S75ddJZbJIfHEXyKlRaZq/yQdIl8h5AXnY
2v6Tdr/pFI6lXj9pkIQOYY0pFsi23ei2T2hrb/usj+77vcvhzdXNxaA/KhAh
8yByZjrvReCIDp8PsI/IteBUu8k1QIzGCWXbOcClYFv8klAK0ehTCrH4EZn/
saTAweTlv7dpfoSMc5WPyE3OJORchx8ISjtReCU5OJ2qCVQp3IiA8x5CB/hV
cWaB83Kc+6S0iqIkSjkNReC2wDwfqo8TtYo1fbVDwrCiOBnbzM8RR7k2sZCm
D+CafL+goDQupOp0wMNLa1MaUImGVtT5Ir2VmDYwTlwPESz2A5wQt83kkiP5
bCRa0BCRgVN6eGfO2RMBDKRJgGmsH1xES5SGTLMbnKgqZCX3J77ILaPozSRr
0pwmJ+PWhK6icg6FvTT9ic6jLNyqgpTazMRkQgm5zIcI7RPKi9icSZrcJJ/0
G3FOi1i+MQzijEol9tB1JnHBZJ8o5nAbiRMO+EBb37MhzwueIo1UDjSlTAwt
TAIvEJTZckZglyQu6zM0JwPyQtDBYjJ6oHCczi0kpQX18kBpRCxKka8OyOV0
Sgk+WgIKaG3AikN3xsCSiHZCb1Y8xKmeSTpxRrlVa33+fLSd600oQUEbmAW0
GXpdevMA6nex5JyMFbXsqNLdsCk1+9SySzkW+5BIR/lfcrQZLKZS3B1KTvtj
xBl9MwsCLmGKsZrR4WFoLENOVLn6HPN0XMjVSvmRTcPouIGPKwQJmEcWmOa5
S4jOd9+JOvapjACE7nzOYb5OZWFeRc8jmVRTNT0qa3TTfZJoRhHIxHlTPjPa
Fo6IxSrN2ZGA+Jx3NXlpq2r24UfjiyDidErKwSDaEmOWdSecNaoIoy1ACApT
KO+gppYtxeCH26Pqr9AJcA2N5UzjxRLP0g0CHEZHZgpo/vLuxyoHbHe30u7S
YsdcPJOUNjMcm77+VTgDoa/A2XLNPGABDswK/ztbwfqc1o5MqopPrZzT9pkc
PUnNhKsgilwyYIeqOq+Wtd5m+EuySBAyvTbJJ79g86sp2yY+1CYcWQKSsbpl
4ZcSuDvaax+/s0KyEj+tilvqq6CdRIwPKQEje/NAemn2L9UmmbX5lpNuoCtc
7pAznql9+rZgYtSj9BJp9Msq4CIHQLtQy5O4KgYsNdbcZiJDGK9YiF62OZQE
N+nUsdYAGrKV0TRmSjPVlFim/xatTJbU3cl9prvnzCepaq7/U8IMUz59ytfL
P3+uIqjIstlJOMexGZqFijW6SVsUTAqfaX6tR92iUc1nXLK2s0uzxKdvYn70
QS0+M7NmakmnW3SWpZiI3q6rWApLD65QhMl4DNcX3OZyOlWKd+e3mLX2Aiq/
0MB9Lx3QEuFhM0R7KrEwpXBYbMDo4ejHoZh5cs5OurW4nJAhbQu2AY8bpz1S
XC8VzWpLE/dfyLSdNj9/FocNSrDLUM6pKYjqOTgL+IQ5o57WmIrrA/3jHMap
wd8nNvrVRxly5SWzImT3QnqOc4TQhL71J+iggLsVbNoefFLO4iMCtcojRUHn
prjQkRJKMmGw3R32ZkO50I03pA4C049jcDVHBUypp+FfWZfeyunQzGP7LYGu
PydyzERXBJMYR51OTvwHP3jy7XybOBcHUzeayHB6AKGKo98M5xCeLu0peqVB
ZuCIPAcRPHQN+WgHdKPd4UntesMuAhLkyyH//2lAbQLNRll0WmVE/d0yEaW8
TZXnltWLvUhigG3V8L+uAdrJUdqWgvLSkJaH1ivwLleQaiQHHV2VitxHRa/O
IJqsu8y7WMrK0Yz6uSwK2ATvq6aXr1NrlUZAnyCMyBKKOgVnPKvrCuuQ77C2
5OhkRlKDr0f8FhXc7JusAJ99v77zPpCHKZWrKPE0j6Ulf6syDvuj26MCUabJ
crkWo9uB8ay1/rJybmZyTVE0La9YcLQgVe7JFpp41rxw6Fwe/U/AH/iZo1K2
hHd1JJBxAn3bUYDgGeXNrHNKzMNGxVCzgC1Hb3mYZoXBrXX9zPihDfCoiGmD
MQp4NAtgR8dkY6xR/6PdyJHt3YDB3mL0pZLcmFiQW56mmw65njBV1luiDkkY
4Dni6XANu7LdMck9Da+x2Zy2JdSe1zzGF5wsAkrFkgu4xDDJBbkIe0TT9WGq
JcfVabcCtBfxGif3c1orKtgb+Ri409RMs/yNFVHRqJQs+ZHDFq6VP4XXqLG8
cv3ko3ggV8jLgibygVbxNhJ1svFFZGa20yigIl3k/kUZnzQSJ4b3qmIYxNrm
prsrAHl0A6qjpya+Ua1XT6ttbeYpgm2dtho2T6NDMPZLCTvy0ChjAPciiVbu
xKWq02GkMmjtatNAOuvdNho1DoWHZH2Bucc9M8TKE04H6GLKKgnhsJNPvx/h
rCZNb+ZK3LSQYexGqjyJ3tp9xpprquVPXN2kQM0w5M5Ge06JPQE6iuIueXpV
d9VMp65NaGSxx46nUBb6poJxMBj3zMPwMd8KLZev0/YlM0iqMA7Y3Wif5nJX
B36Qf/mgLBTvjJqU8o0cobQqSEd1hGnxVT48c1it6olx7bqNWo26sdQvCdW7
NQEPdFOBAbjU6QMBmQ5CkzZaQcY11ye+TvtPt2JOly32E0vHAW2r3mrm9tUn
xCksSBV8npmoqzTjy+5ptwN2or6GO91PRblKN9tO2k/H+iAJw1ynnCBHkzJp
7I7XxeFLvviRiJk15lUq7YxVFvykx2m7pyilt5JuGGkzW2iEME5l5ryyyqhb
DjINEXhvQUxpIbI/C59lCxiRmz0Ik+ncDcFsL8hUd1ZlEclnHb3cGfdBBy2l
ki3ohosP7FEU+jq2/A/tcphUE4UK1IXILUqzgkQy32gqJRzYzRLPphULEeQW
fI62jUGCfstJJvQQJIq3TqbJmClIyGZrQ+IeOIoNz9pwZESZc6oxnLSqzT/Q
33q18Qedgce3blePduvVlh6l1PvpCX8TpzU72tSjHR6t8ztUSyB43WqX4Tb4
KVUNihBO9WinOFr7QyFRb8lvs/S32MqenUXinnLV5qIS5ent+ZGSAhSSX6LO
1nCdxZqUBSlbaAs6Y07X81nt5pPpgPecPih5yF2ZoTt3qVRn2rWKU3OiDZOL
c4RMcj7tyOiLr1gIwjkcXN/dnBu5r5+0m2SPnoO8000wzXUTgPzcCLD5yjYA
foFqt5utyi0/oPrn5rdXP/W7p83TTaHwycO678iUOQ/P+5UeQFN7z8MsCeMj
nkOVy83zdUt4xVDbvvtRXFKW4S3+7yitQm7yNchnFsi6eGyJbVMosKUFsc1X
lsOou4ZLVpvnC1Z5GbAsnFaqRlGWedon5jUSgP/hU9cdYl/fxvAiq/wfUrH+
1VSsExXv1BzW2QYD+RhTIDI0OXidUF0jGmLPmkppoQt+p1ZslcUjqa1u107b
UDyZC0lGgvt/WOvAJTH+AWuCiLsw8yvrruyxKdCZvJT015TNrIpRUKztRPAg
Qzdig03Vy0hyzzW1fHM3rAUmVyvPtWWGrb3WqzsatZVaxH9AXbbE4UjpwHeL
9MabOWlznehX2Pi3cjG10Wy+qonGNqns4979uqqgqkxHRtbOuKfVId8gaEBz
3X9TqPpj9DeKxQ7Lt76a5Vu6wu1G6RWP0d0lR426ZJHyKUZGd3DMyb/UMYRm
nDDxdXTlUg2D/TrqaguW0PU4zBv2xPd6T4cNqpUtgzGVl9np15wACrXJvjXp
8d3tlR1uE4PowJzrDW163ru7rNR1aq5jvzcbhTbrcUDdTpXOUlLr83JVCeN5
ZTENwW22VTsvVc/dVknTsybGJapi+iGXeLS6MDWKRrX9B6KknZImskOdATah
f/4SggrDIKSsAqUmZJSr1cZhoqy3VxXfK3P1wlea/K7/SL7h3FYy7H2ZidKp
QfL7KIh5lB6tE+d8pki7wbv3J3c8YuaqxXhR8Ijzbu5h5g/rABQhA91Pnud7
no0HnPOWo72usMznOn6PP6y3Y/3gK5PyGa8RCRztOMajB3dlr5PBjgnqLuka
L7da147ruc5rFOZo/9X82YHT4FbChvZ1G9aF5jlPxxzW2zk1Yhr609m3lp3z
0lqUhIWC1GvVGdwOHD2nCGdLe+Ccrfa4zM7B6owtn3sQkxFRMjT24NmaQESi
RraJNDaXr22NYp+s/UmrlGhJjGYBMHN8SxlkQvbbbAFqqE2vW03oYtVAx9w2
0bWDFZfnaMa3JlX1LeekrXlPBZcyECZhYphNeqQE5gsEdSIY8zUBji/1+jKy
uQI24YUwmTYPn5iusoQuuQ5mkakLx52uupmrLJym0aliIFw1Fspbl02TkM7M
EDiuxuYF3obMOUHQMr7v7vReIZ8GBRk3wmzOlug85pBc1/1+h4TnU02/R8R/
Raizf10dc3J8etqyUWv6r25i0hMTk7a3njdauai3e8pw8s+bHCs3tQx3Ozau
Tv+1avr56XPPu/r5iXle33rO4o/njH+7wfPyz7k1sdXW8Jsn2/jVuRG7riNw
+zf3XKsXYfICIqUPjRs9tfd5ih6rFdFkvO3fbcUyDaxeybPjM4rlfstAhjD5
MGFUs86xfOZyGjk2YqxD41j5U/ZjTFO+jLf7HLwgoAuMlOHcyYDaAF5mznpV
48V5ZlOmeKECaFoA5M/BdvFfe83cx8O/zMI3eAt6dBeRSHh0h93cQAM/2rym
Rw1ta+geSu/rBC2BM9dQx0o/oGVbtp6V9qrlMq1/1K5La2vKThnmUOfaO3bi
UXYd1Pg17AMyAH3XU7e1LHA6dKmVaZ6scLikrd1oSZdQdYOh0nnZ9JYe0/lw
BwNL/qatOZpKokYMD04aedzGah2YPF2GA6cf+RKtbdZk7SZtPyA1XhZCm7Si
ZGtCqyA0Lp2xMlT414fNb3KNIKB7hpRf13eSNeqs6KCtQUJWW6liYzqUc9Eb
KX03zrefQR6zd0i9U3bf9ENM0uutxg7yEfAvAHEfXMgBXxh8dJf66uNCeo/U
bfNPcCpfF8py1tSQ8OTvgRKPPQXc1cnI7ivmRRyM2O7dV7tVWFswtQVYW0+l
CqpOsvFtze3i6/Ov1c3144JhpBdhGqFmAG6tnYf8VnIkohDWgttNvx7qDZCt
are1Pm+l9qSeaXQ2Mw02B9rsbKtTwsgqVBZkS/PdzOi20gq4+cMr3GAVh8/X
v49Yl0Hz7lNmOSrosx8G+5Lxug+WvIrM5fAD3sqetIJWz7rts3jT/qUmX3aQ
uDNP16Z1MmLrHr/OyXztDwO8eulqFlvA/Veu6NFvvDT10h2Ir7rM8Ou3FJ65
S/DiXYFf7+K3N/jyHfw5bjWnnE9J2MPd7aTb6SUzl/t0HmFI9sE8KJXyt3m1
vrW3kUmrrOyvCum6kuEsyb/Q4FJ04asnXRI3Jcfc3WTnkvmpP7rNbvua+uIH
slEfNNeBcaG6KDYwzczFQpDdWN6zLZTCSVHktkSuU150mfbDgGaYCYft0yNS
Dadd60GmBcPDeqt5ZDTHadc6aE6xm4PaOPix8S+xQbH1L3s7O8E9W7enWcCX
skd6KrVa2J91iqwK0iXiPMU4YRJEujPDTv8nJWX+0ZTM74u/THlf38fXlzxi
k3fVV9JHyXIpEfHZHuxCGXYlwxgT83hF2YUMlV79174mZXgJDvRzCIJpOzdX
ATcmutSWP6U2E9vbyT+lkapy6oHwJ+ujskEw9UW5+O5cUt3mVluGfEvTXot9
aG/BsJqOdZqtEO+ngT4B51i/mCKMTI4Qtki3RbVy+SZ2nT262Lvzmxu23UC/
zT6dH6Tz//Ri22IaFezFlIIKkMguSOb0Ty+3AEZpE4XJeYAevs4dUP9z2j8d
ZV43JUyp6x5Oo3Hl2CPWRXrqz8nxp26g2Pk5B8sy3BSc3hWYk8GR5lcjH131
pHnPtpP1TJeHNpGWw+RE96OYn4HYuuBiI4xihwh1MMcxpMtkMAsYS9MGu6/7
1+JNh62vkxjnYly85BIjbvDdXxK1Xd/PmXTz04naqDOISg4E/0aFvkPDDBpS
9dYuT94v/ZifO9PZGFPVNXs3XSzuzHaGUEhIv6lEXVzbRCxeeDEeFM+U3J9h
f5ppDGoREGdCcQRiXO3FQf9qy6Wm3x3MYN5UqkdzP66jazfSfxDm4n5Z6Lv9
ZUE/7iBFepXxjaQjupYJ3Q8bgcz0+6Cxms2k75fFD+6tAs1/cGWghfwNTvKn
IPyLbbLQd3R0y51S1nDqXA2OEUGnNtGMDNPxDEzek8vVmI0qQL4mUvsQsouA
uIFutBlbQN2CPrWr6Yh0zz0V2t1EMhj+sQvhLBWNgIbW5JiVrRkHBrBAMxVF
2AD9TN2X/4qF/p063hN3yiQriuN0v+KU7i7v/D6XrryRFLM2UR/dyF6HIbuT
g1It/TddjNRnqFUAAA==

-->

</rfc>
