<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-rate-policy-discovery-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-rate-policy-discovery-01"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra">
      <organization>Verizon Inc</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <author initials="M." surname="Amend" fullname="Markus Amend">
      <organization>Deutsche Telekom</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>markus.amend@telekom.de</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="05"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 99?>

<t>This document specifies mechanims for hosts to dynamically discover Network Rate-Limit Policies (NRLPs). This information is then passed to applications that might adjust their behaviors accordingly.</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts (e.g., link MTU (RFC 4861) and PREFIX64 (RFC 8781)). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate NRLPs to hosts. For address family parity, a new DHCP option is also defined. The document also discusses how Provisioning Domains (PvD) can be used to notify hosts with NRLPs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 105?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To optimally deliver connectivity services via a network attachment, networks advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
      <dl>
        <dt>Link Maximum Transmission Unit (MTU):</dt>
        <dd>
          <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
        </dd>
        <dt/>
        <dd>
          <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
        </dd>
        <dt/>
        <dd>
          <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
        </dd>
        <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
        <dd>
          <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
        </dd>
        <dt/>
        <dd>
          <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
        </dd>
      </dl>
      <t>Traffic exchanged over a network may be subject to rate-limit policies for various operational reasons. <xref target="I-D.brw-scone-throughput-advice-blob"/> specifies a generic object (called, Throughput Advice) that can be used by mechanims for hosts to dynamically discover these network rate-limit policies. This information can then passed to applications that might adjust their behaviors accordingly.</t>
      <t>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate rate-limit policies to hosts (<xref target="sec-nd"/>). The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Fate sharing</t>
        </li>
        <li>
          <t>Atomic configuration</t>
        </li>
        <li>
          <t>Updatability: change the policy at any time</t>
        </li>
        <li>
          <t>Deployability</t>
        </li>
      </ul>
      <t>For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4 in <xref target="sec-dhcp"/>. <xref target="sec-pvd"/> describes a discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>.</t>
      <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
      <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document. Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
      <t>Applications will have access to all available NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy. Likewise, a host with multiple network attachments may use the discovered NRLPs to decide how to distribute its flows over these network attachments (prefer a network attachment to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policies.</t>
      <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
      <t>To enhance flexibility in applying rate-limiting policies and better accommodate diverse endpoint performance requirements, mechanisms such as solicited Router Advertisements (RAs) <xref target="RFC8273"/> and endpoint-specific DHCP responses can be used. These unicast responses enable granular signaling of rate-limit policies to individual endpoints, facilitating differentiated rate-limit configurations. However, this document does not prescribe how resources should be partitioned within local networks, as such considerations fall outside its scope.</t>
      <t>This document does not assume nor preclude that other mechanisms, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link. The reader may refer to I-D.brw-scone-manageability for a list of relevant mechanisms.</t>
      <t>Refer to <xref target="NRLP-WIRE"/> for configuration examples to use NRLP.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref target="I-D.brw-scone-throughput-advice-blob"/>.</t>
    </section>
    <section anchor="sec-common">
      <name>Common NLRP Parameters</name>
      <t>The following common fields are present in all NRLP options:</t>
      <section anchor="optional-parameter-flags-opf">
        <name>Optional Parameter Flags (OPF)</name>
        <t>The format of this 4-bit flags is shown in <xref target="opt-format-opf"/>. This field indicates the presence of some optional inforamtion in the option.</t>
        <figure anchor="opt-format-opf">
          <name>Optional Parameter Flags Field</name>
          <artwork align="center"><![CDATA[
 0 1 2 3
+-+-+-+-+
|U|U|P|E|
+-+-+-+-+
]]></artwork>
        </figure>
        <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/> for the meaning of the P/E flags.</t>
        <t>U are unassigned bits. These bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
      </section>
      <section anchor="flow-flags-ff">
        <name>Flow flags (FF)</name>
        <t>The format of this 6-bit flags is shown in <xref target="opt-format-ff"/>. This field is used to express some generic properties of the flow.</t>
        <figure anchor="opt-format-ff">
          <name>Flow flags Field</name>
          <artwork align="center"><![CDATA[
 0 1 2 3 4 5
+-+-+-+-+-+-+
|U|R|R|D|D|S|
+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/> for the meaning of the R/D/S flags.</t>
        <t>U are unassigned bits. These bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
      </section>
      <section anchor="traffic-category-tc-throughput-parameters">
        <name>Traffic Category (TC) &amp; Throughput Parameters</name>
        <t>The following parameters are used:</t>
        <dl>
          <dt>TC:</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a mandatory parameter.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a mandatory parameter.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-nd">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="sec-ndf">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
MSB                                                          LSB
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of the IPv6 RA NRLP option, with optional fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-format">
          <name>NRLP Option Format with Optional Fields</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Excess Information Rate (EIR) (Optional)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Excess Burst Size (EBS) (Optional)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Peak Information Rate (PIR) (Optional)          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Peak Burst Size (PBS) (Optional)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1) (see <xref target="sec-iana-ra"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
        </dl>
        <t>Refer to <xref target="sec-common"/> for the meaning of the other parameters.</t>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="sec-dhcp">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).  (see <xref target="sec-iana-dhcp"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of this field, with optional parameters included, is shown in <xref target="nrlp-m-format"/>.</t>
        <figure anchor="nrlp-format">
          <name>NRLP Instance Data Format with Optional Fields Included</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
|  Excess Information Rate      |  |
|             (EIR)             |  O
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  P
|    Excess Burst Size (CBS)    |  T
|                               |  I
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  O
|    Peak Information Rate      |  N
|             (PIR)             |  A
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  L
|      Peak Burst Size (PBS)    |  |
|                               |  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
        </dl>
        <t>Refer to <xref target="sec-common"/> for the meaning of the other parameters.</t>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be used as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":0,
         "scope":0,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques discussed in the document offer the following security benefit: An OS can identify the type of application (background, foreground, streaming, real-time, etc.) and enforce appropriate network policies, even if a misbehaving application tries
to evade the rate-limit policies. If an application attempts to bypass rate-limiting by changing its 5-tuple or creating multiple flows,
the OS can detect this and manage the application's traffic accordingly.</t>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerations for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an AC may:</t>
        <dl>
          <dt>Decrease the bitrate:</dt>
          <dd>
            <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </dd>
          <dt>Increase the bitrate value:</dt>
          <dd>
            <t>The AC will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </dd>
          <dt>Drop RAs:</dt>
          <dd>
            <t>This is similar to the current operations, where no NRLP RA is shared.</t>
          </dd>
          <dt>Inject fake RAs:</dt>
          <dd>
            <t>The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an AC may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-ra">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" sub-registry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD1" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-iana-dhcp">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD2" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="provisioning-domains-split-dns-additional-information">
        <name>Provisioning Domains Split DNS Additional Information</name>
        <t>IANA is requested to add the following entry to the "Additional Information PvD Keys"
registry under the "Provisioning Domains (PvDs)" registry group <xref target="IANA-PVD"/>:</t>
        <dl>
          <dt>JSON key:</dt>
          <dd>
            <t>"nrlp"</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>"Network Rate-Limit Policies (NRLPs)"</t>
          </dd>
          <dt>Type:</dt>
          <dd>
            <t>Array of Objects</t>
          </dd>
        </dl>
        <t>Example:</t>
        <artwork><![CDATA[
   {
      "nrlp":[
         {
            "scope":0,
            "direction":0,
            "tc":0,
            "cir":50,
            "cbs": 10000
         }
      ]
   }
]]></artwork>
        <dl>
          <dt>Reference:</dt>
          <dd>
            <t>This-Document</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-pvd-network-rate-limit-policies-nrlps-registry">
        <name>New PvD Network Rate-Limit Policies (NRLPs) Registry</name>
        <t>IANA is requested to create a new registry "PvD Rate-Limit Policies (NRLPs)" registry,
within the "Provisioning Domains (PvDs)" registry group.</t>
        <t>The initial contents of this registry are provided in <xref target="iana-pvd-initial"/>.</t>
        <table anchor="iana-pvd-initial">
          <name>Initial PvD Network Rate-Limit Policies (NRLPs) Registry Content</name>
          <thead>
            <tr>
              <th align="left">JSON key</th>
              <th align="left">Description</th>
              <th align="left">Type</th>
              <th align="left">Example</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scope</td>
              <td align="left">Specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0)</td>
              <td align="left">Boolean</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">direction</td>
              <td align="left">Indicates the traffic direction to which a policy applies</td>
              <td align="left">integer</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">reliability</td>
              <td align="left">Specifies whether the policy is for both reliable and unreliable traffic (when set to "0"), for reliable (when set to "1"), or for unreliable traffic (when set to "2")</td>
              <td align="left">integer</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">tc</td>
              <td align="left">Specifies a traffic category to which this policy applies</td>
              <td align="left">Integer</td>
              <td align="left">0</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cir</td>
              <td align="left">Committed Information Rate (CIR)</td>
              <td align="left">Integer</td>
              <td align="left">50</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cbs</td>
              <td align="left">Committed Burst Size (CBS)</td>
              <td align="left">Integer</td>
              <td align="left">10000</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">eir</td>
              <td align="left">Excess Information Rate (EIR)</td>
              <td align="left">Integer</td>
              <td align="left">30</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">ebs</td>
              <td align="left">Excess  Burst Size (EBS)</td>
              <td align="left">Integer</td>
              <td align="left">5000</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">pir</td>
              <td align="left">Peak Information Rate (PIR)</td>
              <td align="left">Integer</td>
              <td align="left">70</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">pbs</td>
              <td align="left">Peak  Burst Size (PBS)</td>
              <td align="left">Integer</td>
              <td align="left">20000</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <t>Assignments must not be added directly to the "PvD Network Rate-Limit Policies (NRLPs)" registry.
When a new attribute is added to the "SCONE Rate-Limit Policy Objects" Registry Group created by <xref target="I-D.brw-scone-throughput-advice-blob"/>,
a new JSON key is mirrored in the "PvD Network Rate-Limit Policies (NRLPs)" registry.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="I-D.brw-scone-throughput-advice-blob">
          <front>
            <title>Throughput Advice Object for SCONE</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="3" month="December" year="2024"/>
            <abstract>
              <t>   Traffic exchanged over a network may be subject to rate-limit
   policies for various operational reasons.  This document specifies a
   generic object (called, Throughput Advice) that can be used by
   mechanisms for hosts to dynamically discover these network rate-limit
   policies.  This information is then passed to applications that might
   adjust their behaviors accordingly.

   The design of the throughput advice object is independent of the
   discovery channel (protocol, API, etc.).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-brw-scone-throughput-advice-blob-01"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-PVD" target="https://www.iana.org/assignments/pvds/">
          <front>
            <title>Provisioning Domains (PvDs)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRLP-WIRE" target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery/blob/main/example-nrlp-wire-format.md">
          <front>
            <title>Examples of Wire Format Options</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
      </references>
    </references>
    <?line 566?>

<section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrieve the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Tommy Pauly for the comment on PvD.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+09aXPbRpbf8St66Kq1OENSp2VHm4vW4WhHljiinOzU1NRU
E2iSiECAi4MyIzm/ZX/L/rJ9R3ejAYIS7Tje2aqhKmUSR/frdx/9Ot1u18vD
PFJHonUSZn6yUOlSJGNxqfK7JL0V1zJX3YtwFuZikEShH6pMbF1eXwyydsuT
o1GqFvBq01N2uJbnw+1Jki6PRJYHnhckfixnMGWQynHeHaV3XXg0Vt0Uh5nj
AMtuYF7v7ux6WTGahVkWJnG+nMOL56c3Z15czEYqPfICeOvIgwEyFWdFdiTy
tFAegLXvyVTJI3EX5h4uZpImxRxgwLm8W7WEa8GRJ7rCT6JIjhKYPlwoEfPS
w3iC92Qg53RZzucAGDySxJ4ni3yapPiyJ+AzLqKIl/Q2mcK/gXidFD68GqZ0
P0knMg5/oZePxFUq44miG2omw+hIzPit3si89X1Cz/T8ZLY6x4mMxU8E3srQ
x1FSBGKYjPM7WLt4gysWPyRRAI9nHXEe+z16y1Cu6Xl6wE+KOEeKvYvDHNYz
zAHLGXJGf6ZSwIMLfiDjO5jg+wn+bIb5JkyLmYxUBvOIaxUEywboL5PbUFan
P4+DsDLXbRIHOSDokbmGaRhMJSAQuPdnOUnmMpLxPw2yWpkBrzcJ0zCblktp
ra7lzRKW8RaeSmXDCn6E0X9JYgT1EwCZwNi9rDej0b9f8FgVOMIYxOltD9+O
A7qiuVymt0XmXAawgC9VkWf+VIkbFalbpIwL0huVzmS8rLA9DdOTOMz3Ob/U
C5RXmf6iJ45B7lOVyswB4aIIMwSteo/gwOnHSWyWayEYzmUYu/NHMMYsnBQK
sa+HmRVpGEUJgcODEJN5cQLgoyI48rwwHpe/cDxx3r/sdwc/nuif8NFadZAm
ixAVF/CUOElg3hgU6GBxkrXto1aZ6E/XfqvTu4XztMo5ZDpR+ZGY5vk8O9re
vru764Uylj14a1uCvpzEgNo8254vgmzbvkYKU4xllCGqLfiXq9CfDxaHYArC
yRS0Y6nRxdUc4RFnhIXsCy4k9GfzxWF3DuIzU7lKn17V66urm8HKwugqiE8c
wLpO3+dgOQCuTMg4ECc/HA/0Cr/k0kZJks+7wdSfb7i8m2F3b7/3Ymd3ZXWt
m6HQt8RwmeVqJmTqT0El+HkBmgu4V+Qgpy/emNtbL94M263aZHs7ewebIgCs
7ZvBYO2q50may6i3P5nPaeGBym7zZD5LggJswvZwrvxwrK1r7eeJykFYQUtk
8/ffZe6d8+Cb/d2DA40OdEq6P51fn66g4/S9nM0j1oM/hbB+5tsVGteBnoT5
tBih+G9bw7zNPsv79++70m92WLZHUTLaRknfVjxzN06jefcOpu6y4ujNgmbC
drvgcYyyPJV+7nk3U9Bx4C0VyCFCrx3WMVP+FDhulhElp0mWZyJPRLAE1Qi4
iaKlMNBs4sj1BE1ktRpINvwEBonFHDgU7AgM7rg/eA/QB5pzmoN/9HOR5fh0
mIqRmspFmKQgSL4P3hUovWjZ8zwNBFyOwCMLliIr5sgSZiXZjBYgA4A4D38B
Z0tkKkd6aWdMzNNkjvcUPchL3lK9Sa8jojC+FW9v3omt67NjcfDqcLdNcjy4
Pj07/8/DA77+6uWr3bZZqsUp0BboQwKIS8gUjJ5ErAdKfMsmHZiwDgRoRkoU
iKUQHI6kALEVfV5Ipkfeuu5nbXwSppsVaFNyRfxaLqaHTAkICFKVAVmBjkBE
0ANhvuzA/LG6Y72kZw0RlRmQXI3DGBxHWJYqV8W3ANICqJfBBHfr7VBb+OBh
mCUAOHGSh+OlRjG4zlOGtMfMOQuDIAJGfQY+R56C+PrsEN8kBNqMmU9FIfIe
GNUYVE64gFUAQdNF6AM4i1DSipiwMs+lP0WwO+ZatiEj3N9/B5T96uDl/ocP
jF2aDpbBwGeFPxUyA4N9QSwi34ezYiZuwPXKdDhBjpLYAu5pH3lHRAMtsx3S
kKjUYB6ramGiki1IClr4mGXBDGFGoQTLeYBUypAeABs+9e5UjJbAJX5UoGQI
mBlYBu8Mjq/EVqbAcwLFfYATtZmkjQMfbj4wPd3ElCB5WSYniqe1gtPqARbu
74eKyCr2ers7iHzE88udw0NYfggOuU9eJS1fCl9FURFJ1kMimyZFhASItY1B
4A3TMkyN4GyVkx70DnsHOOsfYFaE6sOHtpgAQ8U8paVLRrbLq5i2AhlesUGH
oC0vgCUiwgnMDzwxl/6tQrlPbaAHzB+BhNhhEecd0gA56oqZXIoIlBYiW789
TuUEoTa6MitUhojDtcIbPvneErWI4SZczlyCLDnsCxA5izZoZnYGaRukINvv
2WoZJd7X+oHUW5rkCUSuzM8RwzJOkxkT3Y9C1moJ8yKKHzgUoPP7N4cHbS08
qBU/fEDWJ71YahfAIwQh+LaK5QgWECVgWMTJ5XB4eiwWMgoDmrFjVbkVXtIZ
cYLPHh6U9wkKo+AiQFEKakrAbIAlhLibxBGrnY5QuY/4BFA/Ap/Eya0hqxlx
VsSE2ZYYQTCl8kfR3QZ8AxrH4FnADGiSJjAj2c9SUyEjgJ7MitHPMAqihsx/
RDZ1bmwqyugC9HZSIDpVSlgCzIHdy8B09gCIP5x3T3pl1iOfQiA5mc6LvAt6
D2DvogNR0TRSTFSMAZxIePIttPIq6ADZzMsoUPBym4XEVeqgGz7GY2A7aFbd
sMYGfwGn+5wOw5tS3AE45miGGlm/tBMgxan6rwI8K5rT8FqDuQa0W3XSYclu
8Kx+F0vfxCalE3N/nym/GwfIhaTz0TaLGVjhhUaecddhalIGJ3SFrZsl25KQ
EYVZzvCVvL5veN0Iu/dHcYZwZVPg03gCP/t5AmyABnQM4TDzLFx+Nwchl6MQ
pBXCZxYLgoRdXoHUiZfgZs8UPH2i5lGy1I973qP+jOvLMGX2dvf30LxUHRvH
luKDiCmMkEBB6l8Q2cJbEE74aTgiAjoImYN2AOcCEIcW4JFQXMPw6hVaeNQF
JAIMH3MZy9vRWnd6yc40KpKfpgpwxFLWzZOu5lbr3uA1VnOwtlGCSsxwBfMz
GLKYiQhShaMiVgLCrsuufk/0QTZYXIHfRmEsS4C1KPA4FXbH17KE/RtAHASg
5uFMT44IAs0ETJgqDUCc5TL2tX6TxhxrlRmA/BGvwer7rtjfhQAgSLhC8UZG
QL0Al+QCQjoyK+wFo1DjswhUkXWadQRZADHWeh2ZGgg9V2ypNSQm02zdFEaj
ZtieuAhv1R1IK/Ig+StkrGZFlIdoVVadUrb/KHmELs1bMKx13wMgRqDIyc7J
686BE0E3kLsxBs8iEw1q1Z1haw6mvmJqyrvkdUTSx2W6KhXsOTmwHdSqqGCs
s43X0H6SNpH5c3AVZRjUVV6QAC3B1Yfl3SqSYiAh6CwVs12HKBQUHK1K4i0F
TjxwBeGMfKwaOqxtcII9Vt/Wlb+8uB5kWkvdKlAHsDQUwlxqx5DHYF+N14zU
0TdLZ82XWhHi5TxFRpklEHKILW0h0LVL0McDHzAg6IBz6EH4GiiKQgA7A5V2
wZiz5kgbtTQORZaXLKTFEBsbUC7odcJcAT46QX2SgxaMQzD3AJ7xRLZOkmGb
SXprg9ZSPX/VKxX0qx1yRsj2FBygMB1gLUHIMlXA/Km4m4ag2LQNcJGgDX+q
IvkeuR+4r8hLYSG0ucqAQjcVT1G6gV3V+5AVOMkN8NsSCVLiBn+V6AHJG6kc
7SCa7xlAgJwYYPAHJAJMzROgrwA3iFwFnEKba+L8jhv/62hNZDQ6kuoxE6vd
1z2K/RAOM1nXaEe2MWB+5lgZylyPiOwsAEgGGjBXPqSdXZComGIa1I6S4gdA
3Bo7jqpmEQYFUN0AASsbSx/xKAljQTgGAQfwQ1JJzkAVkwue1Q/JnYLlrhVX
UBXMsCSa8CMpUlTLOu6C62Bkc2IVFRj5Yd/deE0dwjJi20iI8TNQNQPO8Rpp
L2KZXj0PZWEBVw+uCIz0ACwMPhXLfEL2r6QtKCRi+gsA+QLWHvtL/SPJMg61
hgAhod5xaLcuDoaG0l/t7++g44YSyUTSmh0MaB6BiPq3FLixC4VJJoRAotCi
asUoqOJ0AzNC9KudFW3U0HkiOqtILWTsZqcACddmoPt7m2oE3sNXK0Q0IQrx
BmoqfLqHGZPjJF4gD9hEM/o4LNXkcohbtRRYlMxE6+274U2rw/+Kyyv6fn36
l3cw6Ql+H/7Qv7iwXzz9xPCHq3cXJ+W38s3jq7dvTy9P+GW4KiqXvNbb/l9b
TInW1eDm/Oqyf9Fa8RwI++wGA5OrFKjOkZlnHDAiyuvjwf/89+6Bdex2vwI8
aQ9r9+UB/LiDUIFno6CPfwLTLD1QOQrkDkkboTKbgwhFmmWB42MBnIUs+ce/
IWb+fiS+Hvnz3YNv9QVccOWiwVnlIuFs9crKy4zEhksN01hsVq7XMF2Ft//X
ym+Dd+fi198BTyvR3X313bdeXQ6tGQZKzDLrMZOjvGGIqdkSFHdM5lkMbOVB
3D9D/5q0evyB+XOcRODPoELjywJipihgM4mKCaHSlCOvUTvQEHE8e6az7aCH
7BziLJITUOhXg7O2mYAS88ZIHXRHoCLH9FRoGIDWByPrVHo3mY8xHCDcEDyV
FJUBzCfTlyUz49YDIBTAypmbm+J7gJZf4eOJHbEr9sS+96eu/vMe3sHf4OH0
wblGz94fiWdVqLj88E1r7cLPENoWYI/DArAzk/iblq9QtFqA8qFSjp/wglJi
G6YOTMg4UzLW1ovyjNunjE5Y4TsiWxFzDQrTBGGeGcuI3wUJFGY8FLmhv6g0
wVxChh5QyirMPAIjJCmnGthZhAd6RHZYKyh6puHW2RpCH25C6PEKnTObtFbv
5xRoEoFNrsTJDen1ozteJ644EC9KYhoiX8PfCfwNH2r3mog9trR2FvvlqXu9
fbI9/NL0NWmzYxN5bd0ct8W/uXa8VCp1NVIWOhlYoCYoi5tjTEh+On4AMNRp
YY7G6dzJUmHQLraOz6/bYuvtaJ61f+s8Om2KSQtwNjB0QgzYVVUAeV2k4F4M
MRLaOn4Njs3WaAk66gvAcPqeYu9VTJx+NkyUMMSlfiUpLed3EXD6+RDw6NQD
JW8bFj74Mgun2d1lD77Qsp/pwk+f7bDersEWPQ4+OPbY1MLNvfGHVQWtqqPx
bB1OnZD/VrKddgi4FIX5aYQxigqsaNvEJGrOmdadJK2kU98OX4tP/lwMX6NC
X/3sNlzba7i2X7EH4lC8FK/EVx9zrWonPuXPeyBQbpYQp9OHf1+oeAKY5t/g
K5nrZ2f2mZtjfv6zweB8nlSl1c/vAoMLxYoeXf18Dhgqdt5wqzHzrlRpASJp
eGsFgax/9oj5/yghq8j3p4nXv6TjX9Lx+8HwhIthQqD27wlDCcaqp7ECwO8E
w6P+RgMQvxMe1jgeTVj4HbTlZrrShsWbqUrWfFpV6sphY5yI+WCIJWSm4wxM
P6DSQH/rFcWZYYBZOBgxNeM5KpeqTDZkWtImUohpXp/stnmHAdcdcQtnN5W8
dYB1UDlBEev3MUs2AR9c8GYeVlXVNWzZbTueoOuk4DD20pqNV94mVR9jyjon
NLwSiZ+rvJaZdFI2a8NEzs6WoRfHcWR9fsDyzmtdb2PEQxDtq8DsGl2XudYb
BkUGYyIGEct6Jwju+eYp15fW3eI8l1+50mTCTwjuAV4O9XX8WRbt3FSTh5X5
fvbvQmHdl+bHihzgOC+rhduY7XVKadQXAtOeM35oZj1L1jyNNsuwhAgGQtzS
4Ns3x51yCAI+C4Hqud5eIdOAkmO5W14uJ66V2aaAx4v+JSZBOU9Nm1w4kz5L
4IoSx6dYQ9Y/prA0DOUJtpxq0DBWmyEqY+6ynIooUBntBwAIsF2ib8vN0hRd
At5T5JTgOHErR5Tu49JCQ2WEpvW42maqE5hZQPKYfWsBiC+4LkrOdMUTZsMV
6xqdXolhKwJtIaNCZYY8q8D19GrWwqWTlcki1GU8LoPjhB3nO9UOnB0PunqW
PgmAhyVupxjGtHa3zlSm0NVj3ndJVbtlObZGFeXaUVNypTE0q7NLulOp8szW
WltwDfS+BxyFd7MlDiS8qwELQFmOhLS4thsty4pupaafFjFrE94dRayKtbVI
yZSTqKACU0q/gh5NfC55sSpoKnDTzsVFgv1WuHtDmbp9f3DO2FLvJUhvwNvA
jRKDu8imV8Oy3gdrNPsHnip5PuPi4GpwTJtLPO9bcZnkqtxuOJKAOXoFV0ox
L1cGsTiOVNYbYjTDYD2D2F/obXigxNEW/5yEcVZBMqpUFau7jOptgELcmnCH
NQ4Qfu6+OMFRYNZibvipMqWGUA/4PCNFkypKY+va2eHLnYMPH2AYZ59TXO6O
Qb0O/1HlHUvcrloH3DnlTaqvwzhITERxVmBZE9+zUkDCpjlFk+rs6vr49Pr0
8vQns92ELDZCtr+3w5sd6/mIpvioJFm5TXEl+AECbhj6PBnSPO0WgevFRZt/
/HjwD4RsJSTZYIxfGR5a2LneZiNOZC7FMwrPfn16DHiq2+16veoKe736hQ1B
svHmY7DFBNumIzKA1kssqVTxEp3OG80Hv8krrLHDqlt4DPoUvbYqEcnb22sD
tur+Hm89q3p855ViU9XFU+DaJWhCcRsdQmRdtlWM8lgU12eOoqxbsCXrxFr9
hOshTQk5J8NeLaxQS4qbJjgSP6HaynD7gYzMxiyn4GtyDriy1uoCWmVVBrw1
hSL5JQSwkTutBG4igJ8hb4BjPJIJwDFqUdpKcuCjZ2mI9FdmWflspJCMlFZY
pCKoVWx/pgyY4eN60stlYTfx9Rgz/4vv/t/xHVmIh/WpJKHxU5+MU0yVyQCx
m9ikAY/UkDQymTO4f/P02oQ432S6Kx6pOUVkRrqsr27QsLr+JtNdmJGak0HN
yGxc3abEqyqOj1IbtWSQsYSP1c8d+1/XBOst/lqZRfN7YY03BullxFyz3rUt
CLp6/vzVc/b7yQCTS57MQlySDofwWRt30oYzvefG7K3+LJmcmitDVWFw6dFD
4d3hXd6ASaPwZhfR5+2AHT2F3vNmowWzpQj99f2vsAfMpGW4F2Jc958UCJQK
2CGa6aY7d8M/9bLBEvZevCg9olXA5yrVKqfqgdg+sv7J+bshjbw46OpmXtHP
zf5rBvmrg4MXJsTgR8Uxx2ROnispu18ecb06ZRiiw7rQOGx16HFnYrnd5xpQ
rkD8LmiD4WrXg055uSNvlPl6xAuDMVLdZIZA1+BjGHSWzPAf5fAI05iSMS1X
wN/IYPn6jqAlBdSN3RUcVGOPhucNFieU8aD2DsM8NEPJcrlDCNo2idlQ7k/q
VOJmaiwwoaru/VEcCf/QxR0wAiYxLXAQPXupJgFC0Q94LzXIpquHKy2Iu6YB
kXtC0Oe/v4eFdNV7EAAtx/WONE7i6faNlpNixAMY/vRzht1oesMwNQbJeksI
6ydSDrA+Z3O67m9g558eos2qiE/NgyVXlL0aIJo2+2nSOV7p0ltQcUL7YK2V
gjNAqNp/xQV499i43kI12zr6m25ivy/PAmjZXpDW0U7HuU65mNq13K9d8MO0
dfSiemmUtY52d+DjXlV4dQ+v6ouY3hB/9z4wpGSFmFoVA6RPAmCbA6yAduSZ
AKoX2JiEG3Sd/dAslDkwZxwi89iOaquB7FbMZDzmDg/HamRm1JGK1TjMj0Q/
FldDyuXoCgTbCTzSiIyOk5LeGkmfzivCnBaQR5nvnC6F8Tu4yTnqYu+V7vfQ
2+AxlaM4uzNPQ1dwy9Sswu4d4A6QvTDjhDBm3xwASHtgLlMtZFBmnVY6ATlx
7L4pQWXP5txfOFpiP2CtfWCk82TcqZyJF928IAFKhY+KB69bZqYGmo5HOoxx
FyjquqB4AVfMO7kJQgeM55ll5GpnIZiByxPP69fI6bbDdmyTCaVO3R5DvbuV
O2wrmbIMPBNs+wTs4lsz7MgwKVnaY+ejojI74UdL3dBFeMfMe/dNgeUBnbHb
3UGjxUqVWrqlo++k2bGKE8Ggha+zD9xjAnojHWP3jFbmdKqFbgOVSDdsTeVH
MabKUwKCG1oW3MpkW//DmFp9q1PTbmw8OcEYJtv0RANNVQ1SvYepJKpth6ic
/4DJ1lhZc68xhtpSzXFLIpZR0EfSNDHINQ2Zugpie0Mr50m4TfqsRKmkYGW0
3gkBvIjN3JVewmhp/TBSJuYmJshji1BwAhMq3ZQdb+ysZCudxbHoH6MKB7/0
RCHr6y4z7TDarmzqQE/utIYBt0iXB/6SDFGIbcFJTia4CRbuRfoFTivn7oEH
ODKWnOLVCbm2wdMqhI2sLJCCCl2JpMB7hHnfPOQqlqsTqoloftcUvRSHWMaK
wXpBOSFOjpztixkMgz03GmNAGWIR20Sd6cw49pYTAa77nAZANqQlUWv0GBva
7NBgDmdO8YI6I6vzwH3pc001v4NQyfCwLvSgYhaRmoR4uEWOI5e+5CaEJ6du
HeXBguDoCWVAYB0zU98Dt29BDReVsTRu2736PlpHjHSXutP8hm12AP2EWn7n
STJGMLBqGLB3X+2TQmZEN/mwO5ySJ8ka6SWoJHNQgNPFyOBhXcpAjh05KTbf
pNS9hReOB6cdWjM/PaCesK3+oN02DJJVgTCHU9TLbNimyKUv02gFmBhSB5Q9
GuFHezSBOJ+hRtPnSwz7P563sbms4IMSsAyNc+rlvdjdf3x54zCiFBQfAaHV
I4yCROUmLLAKpuGZfCYcSY6ShXLJc0eFUDyoMHXqS7ZTzpadWYum6EuZDlzr
qbIQcmHRGRqMI3eIsRZHZLkt+txIaFmSz4MQWqGhO5Lz6QuG/52neEcpboSo
e0hoTdceD8bev9kpUW9f0R55xgOjtqZdFzUvCg++efwUMo/8J+2RtTY7sayF
vjVEwhM0XEvdUsnvU60VQgk6Vy6JxFt9Too9bgO3vuNQh2Lr/PgtTNf2yg3u
LWEHNa2tGOXkwGb6jDWK9h5wk8eDOKGuKYLsQVDsT40qgvIyuOXkwS1RPpCm
7J5oBD6Qk0vYBSR1QZ8aT3d19c4oLae8qU3T2bE4hYgoSY/EgEqQmMDnnmPQ
4S0EpAWBOivkSl3ebpQhZVkqxgYO0JXVT+UBd1Qs21iCb3qS21OUoXE0cSB8
5LTYJToJnAVzckUPwBSch4EbDWTbe6hVBS/dfJpL0ccIiggzJK1Xqz+JiHuf
RsQMG6V1ImazzMvTVA6CGolXyKuX1fpNgPxWmsPHkncNaddRMJVBWGQVIl7W
2PhjVwOw8GJavIG/MeMyBGcnx6N31mQ5wE1CIlCRjqiiD2tZoQgmkJaWDGtS
JphN+bNaZi2vSZc+cuCGQxnafWUoMvjxhE4o+Y/h1SW2w6JF5mQD+shWW9Ll
jY4otlv/+mkq6WTjKzpBJ8O2FEoGHJliUZnHqKU3qhmONcmMR3IfTamO5myH
TXiIXSe3YdIblOGgHwSwZ3nTeNGWEbVhviMCbYAny1pr2IPicqXPobOUa+Ho
j2HfPtrxnJMcPoYvtBtFbdKSIuCcUnqmYGifruzqoniexBBzQPpllnNhOIuV
eslSroq2m8wfbMaovFcqfFAJxAgPQ7uv5k6f/UKBGm/Q4Uw2R2hbd1xip4pB
a7fVRv8L7zqpvuozO+2H10kCCj1+2BV1bfNgGQ4hq+5EWDmbBYfjUyOk3TvE
OwAf9DbVphlSFYW6S/7JZY7NeTb8UsTbWIvY/jQw1ZbYand4c6l5bgVNdFQO
PvLkYHut9mPLyX1nFXL12BiLI+KuGprO9bg7K8OCJD881QlgX3/R8P4oe1hf
YbVvklJYeVnB5I/uv7fv7ze8DDPrl1e2zTsQN0w7h2kf2e5uX37Z8CpMSq+u
lCXtW3tNS7XW1RFrY13P9c+P1Xjk6MPoaFT75XG8nMDDeAqCabCOuImHJCkq
jeKGU5U6refRFhtWo9Laddpu6+xGbQ2Pry5PG46Y0qarVQLPZ5b7ul4zWm7e
+t/xGAyrDzHRFKZpkpYOyaeskE4Jxew1xoynZW2kX8CIEGX6OoTt03nC+tRk
3lLc9+mobrQKW/1+v63DBykxeLy/1y7VUwUYk2upHDpHji+eVXOniABOcOvR
bub4kwDUQTTV5jBjvlAmReeeLGTOTyWv2EDLh6dkZQ7AnvHISYchD7112R+2
hZqNsKBKyvVazdDvr4ILsZ6MuuexeAcgmZOHvC32KM0ZKnuvDl8A7nSF0QZI
ehHuNnNT8UFvo9d1P+6WwvV3ynt0gj550tRbYP1qa07xA2tcucMbHfp9DKrY
ViOsunRbHYLuaHzVhjBXLRS1mfV37Xnz6M3P0RDPeVF/4n+eO4+tv8P38MZz
x9Fbv+1i7Z0H98RtngdXfnIO6uLH02u+8u1Gr6+fnQZmFuyasjWP+/mAf+T1
r53p8Z95zstKPmL2Wvy0MvvXFnVXZ2cGbzQJ3t6qBnjtZuAbn/qNa9/k9cTC
jgfbnA5vDOwfQ/f/K+A15hn+/vGfa5j/ZwTea7xOCqfhw2rEKUFbk2W8lH7s
2kStdnRpWpstrkn3/ds4uYtUQAcNZzAa/+9uVPBNi86K5y1QMuZK1w04j0sx
kIVTpOLD6nLBcXrP+19i6Mk+7GcAAA==

-->

</rfc>
