<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-cats-security-considerations-03" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="CATS Security Considerations">Security Considerations for Computing-Aware Traffic Steering</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-cats-security-considerations-03"/>
    <author initials="J." surname="Shi" fullname="Jinyu Shi">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shijy70@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="C." surname="Wang" fullname="Cuicui Wang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangcc107@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="17"/>
    <area>routing</area>
    <workgroup>cats</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 62?>
<t>Computing-Aware Traffic Steering (CATS) inherits potential security vulnerabilities from the network, computing nodes as well as workflows of CATS. This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.</t>
    </abstract>
  </front>
  <middle>
    <?line 65?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The CATS framework is an ingress-based overlay framework for the selection of the suitable service instance(s) from a set of instance candidates. By taking into account both networking and computing metrics, the CATS framework achieve a global of dispatching service demands over the various and available edge computing resources. However, ubiquitous distributed computing resources in CATS also pose challenges to security protection. The operators of CATS may not have complete control over the nodes and therefore guarantee the security and credibility of the computing nodes themselves. Moreover, there are great differences in the security capabilities provided by computing nodes in the network, which greatly improves the breadth and difficulty of security protection.</t>
      <t>This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the following terms:</t>
      <t><strong>Computing-Aware Traffic Steering (CATS):</strong>  A traffic engineering approach <xref target="RFC9522"/> that takes into account the dynamic nature of computing resources and network state to optimize service-specific traffic forwarding towards a given service instance. Various relevant metrics may be used to enforce such computing-aware traffic steering policies. <xref target="I-D.ldbc-cats-framework"/></t>
      <t><strong>CATS Service ID (CS-ID):</strong>  An identifier representing a service, which the clients use to access it.</t>
      <t><strong>Service:</strong>  An offering provided by a service provider and which is delivered using one or more  service functions <xref target="RFC7665"/>.</t>
      <t><strong>CATS Service Metric Agent (C-SMA):</strong>  An agent that is responsible for collecting service capabilities and status, and for reporting them to a CATS Path Selector (C-PS).</t>
      <t><strong>Service request:</strong>  The request for a specific service instance.</t>
    </section>
    <section anchor="security-issues-of-the-computing-resources">
      <name>Security Issues of The Computing Resources</name>
      <t>The ubiquitous and flexible characterictics of computing resources and the frequent connections to the computing resources will lead to the following risks:</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized Access and Control  </t>
          <t>
Attackers may exploit vulnerabilities in interfaces or APIs to gain unauthorized access, potentially hijacking computational resources or manipulating task execution.</t>
        </li>
        <li>
          <t>Data Confidentiality Breaches  </t>
          <t>
Sensitive data processed by computing resources (e.g., model parameters in ML workloads) could be intercepted during transmission or compromised through insecure memory handling.</t>
        </li>
        <li>
          <t>Denial-of-Service (DoS) Threats  </t>
          <t>
Malicious actors may flood computing resources with forged computation requests, degrading service availability or disrupting task scheduling.</t>
        </li>
      </ul>
      <t>To address these risks, CATS implementations COULD adopt the following safeguards:</t>
      <ul spacing="normal">
        <li>
          <t>Secure Communication Frameworks  </t>
          <ul spacing="normal">
            <li>
              <t>TLS 1.3 <xref target="RFC8446"/> could be adopted for all control-plane and data-plane communications.</t>
            </li>
            <li>
              <t>Certificate-based mutual authentication could be implemented using IETF SUIT <xref target="RFC9019"/> for Computing Service to C-SMA interactions.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Granular Access Control  </t>
          <ul spacing="normal">
            <li>
              <t>Role-based access policies (RBAC) aligned with AAA architecture could be used to manage the data processing in computing resources <xref target="RFC2904"/>.</t>
            </li>
            <li>
              <t>Hardware-rooted attestation (e.g., TPM measurements) could be used for runtime authorization decisions.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Resilience Against DoS  </t>
          <ul spacing="normal">
            <li>
              <t>Proof-of-work challenges for request authentication could be deployed as the resilience against DoS during traffic anomalies.</t>
            </li>
            <li>
              <t>Geo-distributed traffic scrubbing could be enabled through collaboration with CDN providers.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Continuous Monitoring  </t>
          <ul spacing="normal">
            <li>
              <t>Nodes could be instrumented with runtime integrity verification using OpenTelemetry standards.</t>
            </li>
            <li>
              <t>Anomaly detection systems leveraging federated learning could be established to identify cross-node attack pattern.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="computing-path-selector-security-issues">
      <name>Computing Path Selector Security Issues</name>
      <t>The Computing Path Selector which is responsible for dynamically selecting optimal forwarding paths, faces the following threats:</t>
      <ul spacing="normal">
        <li>
          <t>Path Manipulation Attacks  </t>
          <t>
Adversaries may forge or alter path metadata (e.g., node capabilities, network latency) to steer computation tasks toward compromised nodes.</t>
        </li>
        <li>
          <t>Covert Channel Exploitation  </t>
          <t>
Path selection patterns could be abused to leak sensitive information through timing analysis or topology fingerprinting.</t>
        </li>
        <li>
          <t>Topology Poisoning  </t>
          <t>
Injection of forged network topology data could degrade path selection efficiency or enable man-in-the-middle (MITM) attacks.</t>
        </li>
        <li>
          <t>Decision Logic Corruption  </t>
          <t>
Runtime modification of C-PS algorithms may lead to suboptimal or adversarial path selections.</t>
        </li>
        <li>
          <t>Orchestrator Impersonation  </t>
          <t>
Spoofed control-plane messages could trick CPS into accepting unauthorized path directives.</t>
        </li>
      </ul>
      <t>To mitigate these risks, CATS implementations COULD implement the following countermeasures:</t>
      <ul spacing="normal">
        <li>
          <t>Authenticated Path Metadata  </t>
          <ul spacing="normal">
            <li>
              <t>Digitally sign topology updates and node capability information could be implemented using CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/>.</t>
            </li>
            <li>
              <t>Enforce strict schema validation for path attributes per IETF YANG models <xref target="RFC7950"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Decision Integrity Protection  </t>
          <ul spacing="normal">
            <li>
              <t>C-PS path selection logic could be isolated in hardware-rooted trusted execution environments (TEEs).</t>
            </li>
            <li>
              <t>Runtime attestation of decision engines could be implemented via Remote Attestation Procedures (RATS) <xref target="RFC9334"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Differential Privacy for Path Selection  </t>
          <ul spacing="normal">
            <li>
              <t>Sensitive selection patterns could be Obfuscated by incorporating differentially private noise.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Resilient Topology Discovery  </t>
          <ul spacing="normal">
            <li>
              <t>RPKI <xref target="RFC6480"/> or BGPsec principles <xref target="RFC8205"/> could be adopted for secure topology propagation in multi-domain scenarios.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Control-Plane Hardening  </t>
          <ul spacing="normal">
            <li>
              <t>Mutual authentication could be adopted in communications between C-PS and C-SMA or C-NMA via OAuth 2.1 <xref target="RFC9449"/>.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="computing-service-announcement-security-issues">
      <name>Computing Service Announcement Security Issues</name>
      <t>The announcement of computing services in distributed environments introduces several security risks that must be addressed to ensure system integrity, confidentiality, and availability. This section outlines key threats and proposed countermeasures.</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized Announcement Injection  </t>
          <t>
Malicious actors may forge or manipulate service announcements to advertise rogue computing nodes, redirect traffic to compromised resources, or disrupt service discovery, which may lead to data exfiltration, computation tampering or denial of service.</t>
        </li>
        <li>
          <t>Sensitive Information Exposure  </t>
          <t>
Service announcements containing unencrypted metadata (e.g., topology details, capability descriptors) may reveal sensitive infrastructure or operational patterns, which may lead to attack surface expansion for targeted exploits or reconnaissance.</t>
        </li>
        <li>
          <t>Replay/Reuse of Legacy Announcements  </t>
          <t>
Replayed announcements of deprecated services could lead to resource misallocation or dependency on outdated/insecure compute nodes.</t>
        </li>
        <li>
          <t>DoS Through Announcement Flooding  </t>
          <t>
Flooding the control plane with excessive or malformed announcements may lead to system resources exhausted.</t>
        </li>
        <li>
          <t>Identity Spoofing  </t>
          <t>
Impersonation of legitimate service providers through forged identity claims in announcements.</t>
        </li>
      </ul>
      <t>To address these risks, CATS implementations COULD adopt the following mitigation measures:</t>
      <ul spacing="normal">
        <li>
          <t>Cryptographic Integrity Protection  </t>
          <ul spacing="normal">
            <li>
              <t>Digital signatures (e.g., using COSE/JOSE) could be adopted for all announcements to ensure authenticity and integrity.</t>
            </li>
            <li>
              <t>Verifiable attestation (via frameworks like RATS) could be used for critical service claims.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Metadata Minimization &amp; Encryption  </t>
          <ul spacing="normal">
            <li>
              <t>Data minimization principles could be applied to limit exposed metadata in announcements.</t>
            </li>
            <li>
              <t>Hybrid encryption (e.g., ECIES) could be used for sensitive fields while maintaining routable/public attributes in cleartext.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Anti-Replay Mechanisms  </t>
          <ul spacing="normal">
            <li>
              <t>Timestamp/nonce could be used in announcements with strict freshness validation.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Rate Limiting &amp; Prioritization  </t>
          <ul spacing="normal">
            <li>
              <t>QoS controls could be applied to prioritize announcements from authenticated entities.</t>
            </li>
            <li>
              <t>Rate limits per node/domain could be adopted using token-bucket or similar algorithms.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Identity Verification  </t>
          <ul spacing="normal">
            <li>
              <t>The announcement from the computing devices could be binded to DIDs (Decentralized Identifiers) or VCs (Verifiable Credentials) for cryptographic identity proof.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="metrics-distribution-security-issues">
      <name>Metrics Distribution Security Issues</name>
      <t>Metrics distribution mechanisms in CATS are critical for performance optimization and resource coordination. However, they introduce specific security challenges that must be mitigated to prevent misuse or systemic compromise. This section identifies key threats and proposes countermeasures.</t>
      <ul spacing="normal">
        <li>
          <t>Tampering with Metric Data  </t>
          <t>
Adversaries may alter metrics (e.g., latency, throughput, resource utilization) during transmission to mislead the decision-making of control plane, triggering suboptimal traffic placement or resource allocation and leading to degraded service performance.</t>
        </li>
        <li>
          <t>Eavesdropping on Sensitive Metrics  </t>
          <t>
Unauthorized interception of metrics may cause the eavesdropping on sensitive operational details (e.g., geo-location patterns, infrastructure capacity), which will lead to the exposure of business-critical intelligence or user behavior profiling.</t>
        </li>
        <li>
          <t>Forged Metric Sources  </t>
          <t>
Spoofing of metric publishers to inject false data or impersonate trusted entities (e.g., fake "low-load" signals to attract traffic).</t>
        </li>
        <li>
          <t>Privacy Violations via Aggregation  </t>
          <t>
The statistical analysis of aggregated metrics may produce inference of sensitive information (e.g., user activity, infrastructure weaknesses) which may result in privacy violation.</t>
        </li>
      </ul>
      <t>To address these risks, CATS implementations COULD adopt the following safeguards:</t>
      <ul spacing="normal">
        <li>
          <t>End-to-End Integrity Protection  </t>
          <ul spacing="normal">
            <li>
              <t>Cryptographic signatures (e.g., using COSE/JOSE) could be applied to metric payloads to ensure authenticity and detect tampering.</t>
            </li>
            <li>
              <t>Hash-chaining or Merkle trees could be used for batch metric verification in streaming scenarios.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Confidentiality Preservation  </t>
          <ul spacing="normal">
            <li>
              <t>Sensitive metric fields could be encrypted (e.g., using AES-GCM or HPKE)while preserving routable headers in cleartext.</t>
            </li>
            <li>
              <t>Differential privacy or noise injection could be employed for aggregated metrics to prevent inference attacks.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Source Authentication  </t>
          <ul spacing="normal">
            <li>
              <t>Metric publishers could be binded to cryptographically verifiable identities (e.g., X.509 certificates, DIDs).</t>
            </li>
            <li>
              <t>Role-based access control (RBAC) could be used for metric publication rights.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Privacy-Aware Metric Design  </t>
          <ul spacing="normal">
            <li>
              <t>The high-granularity data (e.g., masking exact geolocation to regional levels) could be anonymized or truncated to protect the privacy.</t>
            </li>
            <li>
              <t>The federated learning or on-device aggregation could be used to minimize raw data exposure.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="security-related-metrics">
      <name>Security-related Metrics</name>
      <t>The service and network metrics could include the security-related capabilities which could be used by the CATS Path selector to compute paths with security guarantee.</t>
      <t>The security capabilities of nodes could be one of the metrics for C-PS to computing the traffic forwarding path and form a secure routing path. And C-PS will fetch the real-time awareness of the security capabilities available in the network and computing services and finally provide security protection for users. Clients with high security requirements could choose the service with desired security attributes and achieve dependable forwarding on top of only devices that satisfies certain trust requirements, which will avoid the risks of traffic eavesdropping, sensitive data leakage etc.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations of CATS are presented throughout this document. .</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9449" target="https://www.rfc-editor.org/info/rfc9449" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9449.xml">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ldbc-cats-framework" target="https://datatracker.ietf.org/doc/html/draft-ldbc-cats-framework-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ldbc-cats-framework.xml">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zongpeng Du" initials="Z." surname="Du">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <date day="8" month="February" year="2024"/>
            <abstract>
              <t>This document describes a framework for Computing-Aware Traffic Steering (CATS). Particularly, the document identifies a set of CATS components, describes their interactions, and exemplifies the workflow of the control and data planes.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ldbc-cats-framework-06"/>
        </reference>
        <reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7665.xml">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC9019" target="https://www.rfc-editor.org/info/rfc9019" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9019.xml">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="RFC2904" target="https://www.rfc-editor.org/info/rfc2904" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2904.xml">
          <front>
            <title>AAA Authorization Framework</title>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="L. Gommans" initials="L." surname="Gommans"/>
            <author fullname="G. Gross" initials="G." surname="Gross"/>
            <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
            <author fullname="C. de Laat" initials="C." surname="de Laat"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="D. Spence" initials="D." surname="Spence"/>
            <date month="August" year="2000"/>
            <abstract>
              <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2904"/>
          <seriesInfo name="DOI" value="10.17487/RFC2904"/>
        </reference>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC9522" target="https://www.rfc-editor.org/info/rfc9522" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9522.xml">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
      </references>
    </references>
    <?line 313?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Vb7XLbOpL9r6fA5lZNxSlTsXOT3GvX7MwqspP4Thx7YiW7
t1L5AZGQhGuK4BCkHE0q7zLPsk+2p7sBfshK9s7Wbm3+WKJIotHoPud0A0mS
ZFTbOjenSt2YtKlsvVVTV3ibmUrXFp/UwlW4tC6b2hbLZHKnK6NmlV4sbKpu
amMqXB7p+bwym1M1ncxuvvWmUebSQq8xVobH6+RO432prn3iwwNJOnggOfpx
5Obe5aY2/nTUlJnmD/TndIQnzdJV21Pl62zkm/naeo/HZtsSQ1ycz16ORras
TlVdNb5+cnR0cvRkBOP1qaocT2Z056rbJb6Up4rsGN2aLS5leLqoTVWYOjkj
S0cj3dQrV52OkpFStvCn6pexullZfJMJ/WKLbROuuGqpC/t3ngIcsrKFVu8L
m7o1fjRrbXNYvLK/bX86+reUfm34x3Fa4PcUXjhVL4z9jezDd9cUNc2R39ON
Px2rf9d8hxgwbWza2Hjt95hA3k/T46Of/udG/DpWL5vWhF8b+fZ7Bl802+Of
n//TI48KV63x4g2WX6l3L6c/H//0NH58+vR5+Hhy9OxJ+PjTybOjeMOTo2fx
hqdPT05HI4VviJFi0X/rRXI2zrN5KpG5qDA3CpP4vufP25ccHZ+Ej09OjqIZ
Jz/+GD8+f/pzHPvk2ZMnNKAajcfj0ShJEqXnvq50Wo/+u9xSDympDuDyFb7X
XpWuNkVtda5i3qhNkxfImrnNbW0NcrZya1WvjEIMk/WH8GQYRRUuwx3aqzuT
5/wXNyxyd+eVW3ACj9VsZb1CujZrjKRwf1rZOZ7a6Mq6xuPVyCOYoousMwLJ
myJrvKpMjtzMVO0ED+gu89l6Hl6XZeV0usLb8DuSe2PIUm/iS8eKVoVctLZZ
lpvR6AfKx8plTUoxpb78gCETS5e+4s4ZpsnDtGulLFkGhy0r430y1x7GuI2p
cr3t3UXARj7yJjfyZsyfLzS21vOcfqk2NjUU7bXG5B76A3Gtxk813R5/AX4U
mWV8GqsXW1XrW5osjHRKpxzGau7qVVwQ9gTc0i3L2tSVTf0hW7AzH7jLGvhJ
q2Xu5lh4jJxZX+qaMmjZ2pkhvYrM81z5PXG9aCi9QerxtEy2NL2R4STXVClZ
/trdYZzqUDVz+zd4gZ7FQLBs3tCK7nkIcwyrnHuH2MRCpiud56ZYhiWO8YF1
r8XRFGBGuZKA3lVt3Kk11qdwtVrpjRhIyE9xhaXOu1mFCMac8K0yWEejlo2u
NFDbhCUNY7KPK5NZTo1tXOHdbMC1NcJgQz64xOscO4HfrignlxSZ8MRigStF
mPVgoFSXXfphphvQWKbm23tDhQfbxLxb2XQlA+RbZdf0rFikQKk6Q8zQJGhs
QHwuc9jrU86F/8e8RaL+oN4ZxE1laHyv3oBjGr00kqRgV8IaxOeDy/c3sweH
8le9veLP787/+v7i3fkZfb55PXnzpv0wCnfcvL56/+as+9Q9Ob26vDx/eyYP
46oaXBo9uJz8il9oPg+urmcXV28nbx7ISvT9RSuNuc0p4cH/ZWXIGxrCJTgy
o2deTK//8x/HT9WXL/9C0H98fPL1a/hCdIQvdytTyGiuwJrKV/hqO4ITja7o
LcgQihkATY6cBwr7lbsrFEUcHPnoI3nm06n64zwtj5/+KVygCQ8uRp8NLrLP
7l+597A4cc+lPcO03hxc3/H00N7Jr4Pv0e+9i3/8c24Lo5Ljn//8pxHB/MxU
a1u43C23u7G81reIvAbhFlJ44XJwFkUmlmoNNYLwf/Tod5Lp6aNHSk2gDOVX
YBUMkRtinKuPgbc/YTgkf80GDACdzMi2UD94RaHrpmLj9mEkxULIeKhVJBnF
mStru7Z/b2km8aVJLdkT7QKyYRYZT9LRJ08UAKFS3KOmsfoQchxZbDaaXCaM
wqiKmG68pLYhvZMSy2GSrbGJZn/FkX30V+lym1rCxS9fvqWNvn4V34v2F7su
zuDqm+TiLPgadJyRallYgHhlkFuevpLD41wiFjJA55YRhBZcPA4mV7YeyzKH
UeKrHeEyW9sD3va98WrFyyBjUGiZHJ4EN2AQetYhFKEI1sQm7aOLpkilDPoY
1N8nMkHFf7vTvmSfq8mSYvbhNLm5nLQO0HyRg8nSMvmSqh0iZFIiKeKZkLxH
5wNOYchG6DReoIWegR9dxY8QgbGjBLmvNWjjhnUNboMd1zcHQ9fh2b81xtds
HKFz+M7vhetiKN6PM0WZ2pZ4F97jMYp71mFt7L9rY1/Avyco2PocxEJTh1Yg
FYzlw9xT/70E4qxnM+FGkFZhwtJg3kNS7567s8DZHDQab+pgo7L+FsXkKEF1
IvUdcjFTEwk1GnAqwoN0u5rUtU5vTSXpZD6XubP1Pd1tC6GOhabB4cnJ9QXb
t9T4qemPIyF92Kl5MAWqQgxCxslcuIaC3OvmQwGK6qpswNS87trfwhqsBmsA
ms2ZrjWZvpCE06x7XoCiibtpLjcGYUfljsroVmQHWbKrVroxH5rxcnyIxEDG
qFJT1tfkCMzo8g1XD7nTGaQxUDHPWvpMTUn0mTWcmQCWwocKXXG4k9LBBQKl
FWrw5YpijMLKALmQhXAHFgEMsZRpmQJzSdwiiRH88MyhLJqJ+qCJXWrCKg6x
lHUlLRUqG7dfuN5ZJAnCfdkKW/Z3zASsTWaWlc76KRlEdBCTFYnjqim7pfBw
ctYEo2fIxyyjGiQoJQ65Q0lRS+qWqC20WabMvDoDK+wEqtcLQ/I2k2i9ER8h
1dZUOovNLyMWsyNUomZvbtTx+EeGLSqNP3Wrw2MYQRCWIRLmSZlrQCCLTcRF
+Jr2hyGNx2+fmoqgnFowobxaN3WDSKUAp6gLZnUREWfbwi01aNTN+4uZEC2K
6U/DVlOLqSRHCUglrHQaLUnUKwQVMqGKSdtP2ES9c3m0LvBHJDP18N2LyfQA
s7fLAj9zJEwmEyhAFFQkqMnDrfGROZF5wHCh/V7mSKG3N8Q+hubAp+i411hG
Itqkco7FZY2KMcRdyLPZ9SUSQPsmqOiDHUMY+CE/7NqoiCfyggyY7VvnAIEt
sSg8OCH4AbYjYYId1xh/QcnEkqRXsAmtCBV8azEzA/TbsjRmZ1TdSLobqZf5
LCl04dZwuGmD6JVxSb+4bLVHWjXzuaBgGNEUVLh2SEFkqedO+oSyfNOzty3R
8xAJh4MtGgKES1eAfLhVKYO/5WKsh1iwowkByu+LLqagW0qTBSS1iM6QIL4q
TTEzFNk18IoYMqM8jTOc8JS3cFgo0pTfQlmtPSgJb9NLesfCcMMT44KnqmI4
b0+NCOtXEoBBQgGmK+d9QgUlRRA4A7hcU8tyTAODn7ssGkqBHd4O3ZNv3NxK
pV2tEkQvc1bonpCAIj0LDOipVli1AuAJHe6odsFthjQe9rLlNfhJ6JbBbJLB
VR7i1gRAJ8RWjF2YMQ9BUldzSoYcYs/05dNhK7+pxC3S7QFXsaRyB9hPIO6D
2B5wFBfvnFdTag7Uagp2KkCI5yIF+HEyl+fStZTCuvRCTc8jnmC9wRgtG7eN
SLIjBDpVCNwqQhh5y/xfu5IrJLXAL1SlWtbRbNss/nbtrHdFCPeL4reuwRUI
L7qjfRu7T4wU2jPi2m4qhrKT0pyZT1KSMDGxRYK1TaRdpx5eXswuD0Jc+sDd
AkzqjVsiwaeuYtIUh70LiQZ90aUXdYQgWrHGS2RtvVrL2kcl55t5jDYKhBgh
Ot+xWYa/qkj61NxsUhfrEjdDVsXxb0pAIUuAPg2uAex62UIEqfpbNYVFsQI0
wvoDTceDZ7aiwTccLpAAa6zukku+36kB2qs7GcNFJ2pd4QbJnEkH0Rhf8ijk
As0NrrdL6jFQooLruuUOmylSmQ6yZTsIxO8w+PTF1Tt1NafYUjd4eexpnhdp
tS2F0qZXN+cHgeGfPREaTHBHKEHJrTWLprVWG7BDJqMSyLAzEUVCDyBvpCqL
hl8nb1+JGg1V2cmzo0/DOLtoQfu6bZDJ0BxVO4Gdc1R2M/VO+mAg9dUOX/Ne
ksk6yY082NjKFdLwejg7P/cHYZYxsPscT43baKR0Hfx+F2+sBoOvMShhYfv8
NUmOjJYfGoa3BT6GTYfggdCi5O2B68pudMqI2Uf21hddIfA9vLqaLxov8TWn
2EhdVTLzYrmz3nA5dSMxYE0NWmDmQITUHTSdWZ8ShG6Dl67/csGToO2ST5TO
L15dow6glxWphUdklWn75hsiNlQNbWwDtEsIEZ4P1nDd5LVNMlAxvvgUwFVZ
F7Fccv6ac57EmYmgmajL70vaaIFIv55Ixo/1nTFFQDAqJFm+krhN3uIDre0V
Za56Mj6WBXz69IQW8Ic98ndSFEj8VBBhL3/r/h2DAjqULVyr9aXWIGht2FzB
bZ5lSW9jidFKehZrRL7Mm0ua2EwiLAqyptNKtN80KEAP+1sQjDJhk8lHZmrq
nLOBusT9NjUtpvOMzwP4G9+v3PtuaDnv24Vh1BFtQd1t+PQ9yvU7U0xtCb/d
srm3gXCoaI+BcL9VsXiorx/amuCwVzZ2GzcxJ2IPrE92zMzm88LmtQjewx3J
QozGAgwv5ipZtgj41SQIR/1Uv+iBO7SLI2dKV2Df1IkUkTbCdEaAnaq9Hb3V
qQj8YKmj3aMT6Z6X5PgDnliFKOMg6ymfSpMAl8IL85C9Iel+REja55ugfjEJ
0pjUl9GFjwxSa6ywoDVrNJZPWCRXFNqC3qmdJSAFzt8+fmdCe/mNWRJs9uOJ
lajcR3XPwEeM6SXeyxjZppwARTQ0rj/kgAdWuqhzaMlQRGQiqzgPiJizx20z
RNba9BQoFVezIBAHQf+Seh0Bv+Ln0BqTLTTRNlzfmM9cu25CCuQUFfemNtBc
kuNdcWs+rzSzIRt1wcmO5WY9FZVnX2yRo3IDOQLd1su1tmhrRW+QqDa+Mc21
XTOGDaz73+uwBIlGNg7U1ZTC3UEMlwi874iKILJYYvE+QNs0C0oJKujxLyyF
vtmFuQc5AVpb+onbmS3IBpnxgctSFuODbgKxTNuiR8Vpb40SyXC/n4D8JILL
u9Yzu5wXNupJdQkcWMdewx96Mi84ge5Z9+/pMXg37bKEHpDyB3fWlJsM7y2k
7Flm7pxs55Ul5urEpbj4fHpxvndSHb4srMkzT/DBFYttMY0OApHnHpcNyuy0
LzeJ1qkgr83nmv0wwSIkAgHwSYryz/q1F+Nm0HmegPhx4fg0wMCY3RlJAgbx
u0C0rAqK4E7/CipRkrwhH5GlfyA1R6VQcK6M+1cgQcjt/T4u40O7wC7HGAbV
A2db7M+E8XmNRHsT/jwOKupeFEuc1+7WFMm8SW/pdARWAE9Te66r4oZQ8aHX
UQmO3JUz7UmWjnEz0wdYGDG3RSbTPbs4Q+qhDMCj0DEsCy7afSfQD4z6MMUt
vaSZgrpFp9DpDk6Gfta3KFRSy4w12mXYWDuLioqi8Z4yi3dl/bvWbeB05yYI
42P+ceFjKqZoCqSwRyj5RNnf8kjqHPVYJF66gxu0zdwpuv4+Ttzt7x3O6Mu6
WKaGsMHbaAvReubEKqA/l0lR1OwouHZ/75sazu/VcLNWv3BahB20s1DB7nZ/
pOkTtzYDBISezmFkEATKYecpeD4PLjzYux1BrV3rheeotxsKtGQth3hYUff4
85C6Acul2NzrRETlh5uiFq86K3qkTy6h0SRlYrsl6xixCwD20LneGJ/Bh6Xs
U/bUXAgy8tRAC7c7MIF3+3vBqeZdVczU7L64g8y+AAuiLnp7aVzSzqUTZzsi
jgQgcdZBlG33tuJMUJ9k35wAhA5rtZlAM8hzu+S2MhwJmyvE6UpvLOVIBY3R
7g29FMEQQudG9Enb2wlrKC5QjPR+xXrDYRRuXyyQ/KGpj5fbVrWYruAP4Bid
sNCg0wfQDwltfj0Q6s990KS0SxHj4YBNjLX4B+vyoEeIoCfLZWWWLQAS/DGB
e3FC1/dbKB1uFa5sV7MMmQ73y9kkEf/7moqtJqGtcGpRcWG2s253Rt/SShig
Yae3EcaoogmzyjCRTZzI/9lG13mRJbVL8Od7/ZwBWP9TAqxjyRgaess7md9T
X9LK74quqE60XyWAVpEViKFLU93mFD6mz1StNpnT0b047mBjgXoUeEpz3/de
t2KwqXtNhyiqTY8+O2AIrw7Kp7eREku4gX8m5zfJq+klGf76+i/nB6KUSnl/
XyipFRI4bP725ZGo4F7vKYaJq6QbFDJt0EEx67CPxBr4fnj3iKiL7n5fWTK9
3wRtPXF5L9v3yIUB03MHa9PpgkD8vZz/j/GzoxOVdnufCHFSHG3D796GY+SN
sN94Pw76oBQCANyyqn0fNMJZpsiMhqK8k0sr3J8sw04o19u9wnytPXOY+UyI
BORugZtr0qUAPO1G5f2NRg0Zu10zk1AdXUGOddLASQasTFzkcWfMns0squaL
RERbu8qDOGj3V6V4AHzou9j1EIoY98+cJPGcYkt+DJtt/6Lb3IiBJCOhGMmb
bHhAtH3X4KyN4N7Qvvm2O5nb2+PhDZm2Ruf9riDvo+BqT6aOo6H7jowCtIvh
liSfR5KzbnEevD9OTcV2yFjg7zkxJv1zOSkkJ5a5nRD+7wP/PEZRk8kbmZ0X
pg7nrwBAeSLda4o9rk/i6ei99neni4cHXHdOObfdETYM8lXaxtwB2HeqladM
hOXHahrOhLF7Kep7bcr+qVPxYLpyzsfFltDgB+FjW5ne8ddezcc9ynDWWtoy
Omx5Rqdy4pTkCj7aGUsRVtKeeJv1L0EElUksHgbGDcSQ3jgrklParOTgeCKx
r8wOe3zOaUEbh3QSAcs1yIzd/7ojJ+XjTL/uxt/w5ngIm6AmHM/rdtwRNMPD
smM15oNgF5O3k/3DWoiXr7vHOFfaI87lqd5JjiQBI6a39MJJelu4u5zOqEvj
7ctp0azndFDvXx+wTntAb31xNuJ//wXCwacqwjQAAA==

-->

</rfc>
