<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-sconepro-rate-policy-discovery-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-sconepro-rate-policy-discovery-00"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="29"/>
    <area>wit</area>
    <workgroup>sconepro</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 88?>

<t>Traffic exchanged over an attachment circuit may be subject to rate-limit policies.
These policies may be intentional policies (e.g., enforced as part of the activation of the attachment circuit and typically agreed upon service subscription)
or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation).</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts using Neighbor Discovery options. Examples of such
properties are link MTU (RFC 4861) and PREFIX64 (RFC 8781). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a new DHCP option is also defined.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="context">
        <name>Context</name>
        <t>Connectivity services are provided by networks to customers via
dedicated terminating points, such as customer edges (CEs) or User Equipment (UE).
To facilitate data transfer via the provider network, it is assumed that appropriate setup
is provisioned over the links that connect customer terminating points and a provider network (usually via a Provider Edge (PE)),
allowing successfully data exchange over these links. The required setup is referred to in this document as Attachment Circuits (ACs),
while the underlying link is referred to as "bearers".</t>
        <t>The bearer can be a physical or logical link that connects a customer device to a provider network. A bearer can be a wireless or wired link. The same or multiple bearer technologies can be used to establish the bearer (e.g., WLAN, cellular) to graft customer terminating points to a network.</t>
        <t><xref target="ac"/> shows an example of a network that connects CEs and hosts (UE, for example).These CEs are servicing
other (internal) hosts. The identification of these hosts is hidden to the network. The policies enforced at the network
for an AC are per-subscriber, not per-host. Typically, if a CE is provided with a /56 IPv6 prefix, policies are enforced
on that /56 not the individual /64s that will be used by internal hosts. A customer terminating point may be serviced with one (e.g., UE#1, CE#1, and CE#3) or multiple ACs (e.g., CE#2).</t>
        <figure anchor="ac">
          <name>Sample Attachment Circuits</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,80 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 8,208" fill="none" stroke="black"/>
                <path d="M 64,80 L 64,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 64,208" fill="none" stroke="black"/>
                <path d="M 120,96 L 120,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 120,192" fill="none" stroke="black"/>
                <path d="M 200,80 L 200,224" fill="none" stroke="black"/>
                <path d="M 368,80 L 368,224" fill="none" stroke="black"/>
                <path d="M 448,80 L 448,128" fill="none" stroke="black"/>
                <path d="M 448,176 L 448,208" fill="none" stroke="black"/>
                <path d="M 504,80 L 504,128" fill="none" stroke="black"/>
                <path d="M 504,176 L 504,208" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 200,80 L 368,80" fill="none" stroke="black"/>
                <path d="M 448,80 L 504,80" fill="none" stroke="black"/>
                <path d="M 64,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 368,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 416,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
                <path d="M 416,112 L 448,112" fill="none" stroke="black"/>
                <path d="M 8,128 L 64,128" fill="none" stroke="black"/>
                <path d="M 120,128 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,128 L 200,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 120,160 L 144,160" fill="none" stroke="black"/>
                <path d="M 168,160 L 200,160" fill="none" stroke="black"/>
                <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
                <path d="M 64,192 L 120,192" fill="none" stroke="black"/>
                <path d="M 368,192 L 392,192" fill="none" stroke="black"/>
                <path d="M 416,192 L 448,192" fill="none" stroke="black"/>
                <path d="M 8,208 L 64,208" fill="none" stroke="black"/>
                <path d="M 448,208 L 504,208" fill="none" stroke="black"/>
                <path d="M 200,224 L 368,224" fill="none" stroke="black"/>
                <g class="text">
                  <text x="472" y="36">Hosts</text>
                  <text x="456" y="52">O</text>
                  <text x="472" y="52">O</text>
                  <text x="488" y="52">O</text>
                  <text x="472" y="68">\|/</text>
                  <text x="404" y="100">AC</text>
                  <text x="36" y="116">UE#1</text>
                  <text x="404" y="116">AC</text>
                  <text x="476" y="116">CE#2</text>
                  <text x="156" y="132">AC</text>
                  <text x="272" y="148">Network</text>
                  <text x="156" y="164">AC</text>
                  <text x="36" y="196">CE#1</text>
                  <text x="404" y="196">AC</text>
                  <text x="476" y="196">CE#3</text>
                  <text x="40" y="228">/|\</text>
                  <text x="480" y="228">/|\</text>
                  <text x="24" y="244">O</text>
                  <text x="40" y="244">O</text>
                  <text x="56" y="244">O</text>
                  <text x="464" y="244">O</text>
                  <text x="480" y="244">O</text>
                  <text x="496" y="244">O</text>
                  <text x="40" y="260">Hosts</text>
                  <text x="480" y="260">Hosts</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                                                        Hosts
                                                        O O O
                                                         \|/
.------.                .--------------------.         .------.
|      +------+         |                    +---AC----+      |
| UE#1 |      |         |                    +---AC----+ CE#2 |
'------'      +---AC----+                    |         '------'
                        |     Network        |
.------.      .---AC----+                    |
|      |      |         |                    |         .------.
| CE#1 +------'         |                    +---AC----+ CE#3 |
'------'                |                    |         '------'
   /|\                  '--------------------'            /|\
  O O O                                                  O O O
  Hosts                                                  Hosts
]]></artwork>
          </artset>
        </figure>
        <t>Customer terminating points are provided with a set of information (e.g., IP address/prefix) to successfully be
able to send and receive traffic over an attachment circuit. A comprehensive list of provisioning parameters that are available on
the PE-side of an attachment circuit is documented in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
        <t>The required set of parameters is a function of the service offering. For example, a very limited set of parameters is required for mass-market
service offering while a more elaborated set is required for Enterprise services (e.g., Layer 2 VPN <xref target="RFC9291"/> or Layer 3 VPN <xref target="RFC9182"/>). This document
<strong>leverages access control, authorization, and authentication mechanisms that are already in place for the delivery of services over these attachment circuits</strong>. An example of an attachment circuit provided over a 3GPP network is depicted in <xref target="ex-arch"/>. It is out of the scope of this document to describe all involved components. Readers may refer to <xref target="TS-23.501"/> for more details.</t>
        <t><xref target="sec-aaa"/> provides another example of how existing tools can be leveraged for AAA purposes.</t>
        <figure anchor="ex-arch">
          <name>5GS Architecture</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="536" viewBox="0 0 536 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,32 L 24,64" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,64" fill="none" stroke="black"/>
                <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
                <path d="M 136,240 L 136,272" fill="none" stroke="black"/>
                <path d="M 144,32 L 144,64" fill="none" stroke="black"/>
                <path d="M 144,96 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,32 L 168,64" fill="none" stroke="black"/>
                <path d="M 168,240 L 168,272" fill="none" stroke="black"/>
                <path d="M 192,64 L 192,96" fill="none" stroke="black"/>
                <path d="M 192,240 L 192,272" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
                <path d="M 216,96 L 216,128" fill="none" stroke="black"/>
                <path d="M 216,160 L 216,192" fill="none" stroke="black"/>
                <path d="M 256,32 L 256,64" fill="none" stroke="black"/>
                <path d="M 256,240 L 256,272" fill="none" stroke="black"/>
                <path d="M 280,64 L 280,96" fill="none" stroke="black"/>
                <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
                <path d="M 304,240 L 304,272" fill="none" stroke="black"/>
                <path d="M 312,96 L 312,128" fill="none" stroke="black"/>
                <path d="M 328,32 L 328,64" fill="none" stroke="black"/>
                <path d="M 328,160 L 328,192" fill="none" stroke="black"/>
                <path d="M 352,64 L 352,96" fill="none" stroke="black"/>
                <path d="M 352,240 L 352,272" fill="none" stroke="black"/>
                <path d="M 376,32 L 376,64" fill="none" stroke="black"/>
                <path d="M 392,240 L 392,272" fill="none" stroke="black"/>
                <path d="M 400,32 L 400,64" fill="none" stroke="black"/>
                <path d="M 424,64 L 424,96" fill="none" stroke="black"/>
                <path d="M 440,240 L 440,272" fill="none" stroke="black"/>
                <path d="M 448,32 L 448,64" fill="none" stroke="black"/>
                <path d="M 24,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 96,32 L 144,32" fill="none" stroke="black"/>
                <path d="M 168,32 L 216,32" fill="none" stroke="black"/>
                <path d="M 256,32 L 304,32" fill="none" stroke="black"/>
                <path d="M 328,32 L 376,32" fill="none" stroke="black"/>
                <path d="M 400,32 L 448,32" fill="none" stroke="black"/>
                <path d="M 24,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 96,64 L 144,64" fill="none" stroke="black"/>
                <path d="M 168,64 L 216,64" fill="none" stroke="black"/>
                <path d="M 256,64 L 304,64" fill="none" stroke="black"/>
                <path d="M 328,64 L 376,64" fill="none" stroke="black"/>
                <path d="M 400,64 L 448,64" fill="none" stroke="black"/>
                <path d="M 24,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 120,128 L 168,128" fill="none" stroke="black"/>
                <path d="M 192,128 L 240,128" fill="none" stroke="black"/>
                <path d="M 288,128 L 368,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 168,160" fill="none" stroke="black"/>
                <path d="M 192,160 L 240,160" fill="none" stroke="black"/>
                <path d="M 288,160 L 368,160" fill="none" stroke="black"/>
                <path d="M 8,206 L 480,206" fill="none" stroke="black"/>
                <path d="M 8,210 L 480,210" fill="none" stroke="black"/>
                <path d="M 136,240 L 168,240" fill="none" stroke="black"/>
                <path d="M 192,240 L 256,240" fill="none" stroke="black"/>
                <path d="M 304,240 L 352,240" fill="none" stroke="black"/>
                <path d="M 392,240 L 440,240" fill="none" stroke="black"/>
                <path d="M 504,240 L 512,240" fill="none" stroke="black"/>
                <path d="M 168,256 L 192,256" fill="none" stroke="black"/>
                <path d="M 256,256 L 304,256" fill="none" stroke="black"/>
                <path d="M 352,256 L 392,256" fill="none" stroke="black"/>
                <path d="M 440,256 L 488,256" fill="none" stroke="black"/>
                <path d="M 136,272 L 168,272" fill="none" stroke="black"/>
                <path d="M 192,272 L 256,272" fill="none" stroke="black"/>
                <path d="M 304,272 L 352,272" fill="none" stroke="black"/>
                <path d="M 392,272 L 440,272" fill="none" stroke="black"/>
                <path d="M 504,272 L 512,272" fill="none" stroke="black"/>
                <path d="M 168,288 L 216,288" fill="none" stroke="black"/>
                <path d="M 240,288 L 312,288" fill="none" stroke="black"/>
                <path d="M 504,240 C 483.2,240 483.2,272 504,272" fill="none" stroke="black"/>
                <path d="M 512,240 C 532.8,240 532.8,272 512,272" fill="none" stroke="black"/>
                <path d="M 164,232 L 172,216" fill="none" stroke="black"/>
                <path d="M 180,200 L 188,184" fill="none" stroke="black"/>
                <path d="M 188,184 L 196,168" fill="none" stroke="black"/>
                <path d="M 380,168 L 388,184" fill="none" stroke="black"/>
                <path d="M 388,184 L 396,200" fill="none" stroke="black"/>
                <path d="M 404,216 L 412,232" fill="none" stroke="black"/>
                <g class="text">
                  <text x="44" y="52">NSSF</text>
                  <text x="120" y="52">NEF</text>
                  <text x="192" y="52">NRF</text>
                  <text x="280" y="52">PCF</text>
                  <text x="352" y="52">UDM</text>
                  <text x="420" y="52">AF</text>
                  <text x="24" y="84">Nnssf</text>
                  <text x="100" y="84">Nnef</text>
                  <text x="172" y="84">Nnrf</text>
                  <text x="260" y="84">Npcf</text>
                  <text x="332" y="84">Nudm</text>
                  <text x="440" y="84">Naf</text>
                  <text x="120" y="116">Nausf</text>
                  <text x="196" y="116">Namf</text>
                  <text x="292" y="116">Nsmf</text>
                  <text x="136" y="148">│AUSR</text>
                  <text x="168" y="148">│</text>
                  <text x="192" y="148">│</text>
                  <text x="216" y="148">AMF</text>
                  <text x="240" y="148">│</text>
                  <text x="288" y="148">│</text>
                  <text x="328" y="148">SMF</text>
                  <text x="368" y="148">│</text>
                  <text x="32" y="196">Control</text>
                  <text x="88" y="196">Plane</text>
                  <text x="164" y="196">N1</text>
                  <text x="228" y="196">N2</text>
                  <text x="340" y="196">N4</text>
                  <text x="404" y="196">N4</text>
                  <text x="20" y="228">User</text>
                  <text x="64" y="228">Plane</text>
                  <text x="216" y="228">|</text>
                  <text x="328" y="228">│</text>
                  <text x="284" y="244">N3</text>
                  <text x="372" y="244">N9</text>
                  <text x="460" y="244">N6</text>
                  <text x="148" y="260">UE</text>
                  <text x="224" y="260">(R)AN</text>
                  <text x="328" y="260">UPF</text>
                  <text x="416" y="260">UPF</text>
                  <text x="508" y="260">DN</text>
                  <text x="160" y="292">|</text>
                  <text x="228" y="292">AC</text>
                  <text x="320" y="292">|</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
  .-----.  .-----.  .-----.    .-----.  .-----.  .-----.
  |NSSF |  | NEF |  | NRF |    | PCF |  | UDM |  | AF  |
  '--+--'  '--+--'  '--+--'    '--+--'  '--+--'  '--+--'
Nnssf|    Nnef|    Nnrf|      Npcf|    Nudm|        |Naf
  ---+--------+--+-----+--+-------+---+----+--------+---
            Nausf|    Namf|       Nsmf|
              .--+--.  .--+--.     .--+------.
              │AUSR │  │ AMF │     │   SMF   │
              '-----'  '--+--'     '----+----'
                       ╱  |             |      ╲
Control Plane      N1 ╱   |N2           |N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     |             │         ╲
                .---.  .-------.  N3 .--+--. N9 .--+--. N6   .--.
                |UE +--+ (R)AN +-----+ UPF +----+ UPF +-----( DN )
                '---'  '-------'     '-----'    '-----'      '--'
                   |-------AC----------|
]]></artwork>
          </artset>
        </figure>
        <ul empty="true">
          <li>
            <t>The "AC" mention in <xref target="ex-arch"/> is not present in <xref target="TS-23.501"/>. It is added to the figure for the readers' convenience to position an attachment circuit.</t>
          </li>
        </ul>
      </section>
      <section anchor="networks-are-already-sharing-network-properties-with-hosts">
        <name>Networks Are Already Sharing Network Properties with Hosts</name>
        <t>To optimally deliver connectivity services, networks also advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
        <dl>
          <dt>Link Maximum Transmission Unit (MTU):</dt>
          <dd>
            <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
          </dd>
          <dt/>
          <dd>
            <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
          </dd>
          <dt/>
          <dd>
            <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
          </dd>
          <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
          <dd>
            <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
          </dd>
          <dt/>
          <dd>
            <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
          </dd>
          <dt>Encrypted DNS option <xref target="RFC9463"/>:</dt>
          <dd>
            <t>This option is used to discover encrypted DNS resolvers of a network.</t>
          </dd>
        </dl>
      </section>
      <section anchor="whats-in">
        <name>What's In?</name>
        <t><xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> discusses some use cases where it is beneficial to share policies with the hosts. <strong>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/></strong>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4.</t>
        <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
        <t>This document uses the host/network metadata specified in <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        <t>In order to ensure consistent design for both IPv4 and IPv6 attachment circuits, <xref target="sec-blob"/> groups the set of NRLP parameters that are returned independent of the address family. This blob can be leveraged in networks where DHCP is not used and ease the mapping with specific protocols used in these networks. For example, <strong><em>a Protocol Configuration Option (PCO) <xref target="TS-24.008"/> NRLP Information Element can be defined in 3GPP</em></strong>.</t>
        <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document.</t>
        <t>Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
        <ul empty="true">
          <li>
            <t><xref target="sec-pvd"/> describes a candidate discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>. That approach requires more discussion as PvD is not currently deployed in mobile networks.</t>
          </li>
        </ul>
      </section>
      <section anchor="whats-out">
        <name>What's Out?</name>
        <t>This document does not make any assumption about the type of the network (fixed, cellular, etc.) that terminates an attachment circuit.</t>
        <t>Likewise, the document does not make any assumption about the services or applications that are delivered over an attachment circuit. Whether one or multiple services
are bound to the same attachment circuit is deployment specific.</t>
        <t>Applications will have access to all these NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy (all traffic, streaming, etc.). An application that couples multiple flow types will adjust each flow type to be consistent with the specific policy for the relevant traffic category. Likewise, a host with multiple ACs may use the discovered NRLPs AC to decide how to distribute its flows over these ACs (prefer an AC to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policy. Readers should refer, e.g., to <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> for some examples.</t>
        <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/> or <xref section="8" sectionFormat="of" target="I-D.ietf-masque-quic-proxy"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
        <t>This document does not assume nor preclude that other mechanims, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link.</t>
      </section>
      <section anchor="design-motivation-rationale">
        <name>Design Motivation &amp; Rationale</name>
        <t>The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fate sharing</t>
          </li>
          <li>
            <t>Atomic configuration</t>
          </li>
          <li>
            <t>Updatability: change the policy at any time</t>
          </li>
          <li>
            <t>Deployability</t>
          </li>
        </ul>
        <t>The solution specified in the document is designed to <strong>ease integration with network managment tools</strong> that are used to manage and expose policies. It does so by leveraging the policy structure defined in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>. That same structure is also used in the context of service activation such as Network Slicing <xref target="RFC9543"/>; see the example depicted in Appendix B.5 of <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
        <t>The solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not require any data plane change</strong>.</t>
          </li>
          <li>
            <t><strong>Applicable to any transport protocol</strong>.</t>
          </li>
          <li>
            <t><strong>Does not impact the connection setup delay</strong>.</t>
          </li>
          <li>
            <t><strong>Does not require to reveal the identity of the target server or the application itself</strong> to consume the signal.</t>
          </li>
          <li>
            <t><strong>Supports cascaded environments</strong> where multiple levels to enforce rate-limiting polices is required (e.g., WAN and LAN shown in <xref target="ac-casc"/>). NRLP signals can be coupled or decoupled as a function of the local policy.</t>
          </li>
          <li>
            <t><strong>Supports signaling policies bound to one or both traffic directions</strong>.</t>
          </li>
          <li>
            <t>Is able to <strong>signal wether a policy applies to a specific host or all hosts of a given subscriber</strong>.</t>
          </li>
        </ul>
        <figure anchor="ac-casc">
          <name>Example of Cascaded NRLPs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="424" viewBox="0 0 424 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
                <path d="M 8,112 L 8,160" fill="none" stroke="black"/>
                <path d="M 64,32 L 64,80" fill="none" stroke="black"/>
                <path d="M 64,112 L 64,160" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 96,112 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,48 L 144,144" fill="none" stroke="black"/>
                <path d="M 176,48 L 176,144" fill="none" stroke="black"/>
                <path d="M 248,32 L 248,176" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,176" fill="none" stroke="black"/>
                <path d="M 8,32 L 64,32" fill="none" stroke="black"/>
                <path d="M 248,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 64,48 L 96,48" fill="none" stroke="black"/>
                <path d="M 144,48 L 176,48" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 96,80 L 144,80" fill="none" stroke="black"/>
                <path d="M 176,96 L 248,96" fill="none" stroke="black"/>
                <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
                <path d="M 96,112 L 144,112" fill="none" stroke="black"/>
                <path d="M 64,144 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 248,176 L 416,176" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Host</text>
                  <text x="36" y="68">#1</text>
                  <text x="160" y="84">C</text>
                  <text x="100" y="100">nrlp#2</text>
                  <text x="160" y="100">P</text>
                  <text x="328" y="100">Network</text>
                  <text x="160" y="116">E</text>
                  <text x="212" y="116">nrlp#1</text>
                  <text x="36" y="132">Host</text>
                  <text x="36" y="148">#2</text>
                  <text x="100" y="164">nrlp#3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.------.                      .--------------------.
| Host +---+     .---.        |                    |
|  #1  |   |     |   |        |                    |
'------'   +-----+ C |        |                    |
         nrlp#2  | P +--------+      Network       |
.------.   .-----+ E | nrlp#1 |                    |
| Host |   |     |   |        |                    |
|  #2  +---'     '---'        |                    |
'------' nrlp#3               |                    |
                              '--------------------'
]]></artwork>
          </artset>
        </figure>
        <t>Compared to a proxy or an encapsulation-based proposal (e.g., <xref target="I-D.ihlar-masque-sconepro-mediabitrate"/>), the solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not impact the MTU tweaking</strong>: No packet overhead is required.</t>
          </li>
          <li>
            <t><strong>Does not suffer from side effects of multi-layer encryption schemes</strong> on the packet processing and overall performance of involved network nodes. Such issues are encountered, e.g., with the tunneled mode or long header packets in the forwarded QUIC proxy mode <xref target="I-D.ietf-masque-quic-proxy"/>.</t>
          </li>
          <li>
            <t><strong>Does not suffer from nested congestion control</strong> for tunneled proxy mode.</t>
          </li>
          <li>
            <t><strong>Does not impact the forwarding peformance of network nodes</strong>. For example, the proxy forwarded mode <xref target="I-D.ietf-masque-quic-proxy"/> requires rewriting connection identifiers; that is, the performance degradation will be at least equivalent to NAT.</t>
          </li>
          <li>
            <t><strong>Does not suffer from the complications of IP address sharing <xref target="RFC6269"/></strong>. Such issues are likely to be experienced for proxy-based solutions that multiplex internal connections using one or more external IP addresses.</t>
          </li>
          <li>
            <t><strong>Does not require manipulating extra steering policies on the host</strong> to decide which flows can be forwarded over or outside the proxy connection.</t>
          </li>
          <li>
            <t><strong>Requires a minor change to the network</strong>: For IPv6, upgrade PE nodes to support a new ND option. Note that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>. For IPv4, configure DHCP servers to include a new DHCP option.</t>
          </li>
        </ul>
      </section>
      <section anchor="sample-deployment-cases">
        <name>Sample Deployment Cases</name>
        <t>Some deployment use cases for NRLP are provided below:</t>
        <ul spacing="normal">
          <li>
            <t>A network may advertize an NRLP when it is overloaded, including when it is under attack. The rate-limit policy is basically a reactive policy that is meant to adjust the behavior of connected hosts to better control the load during these exceptional events (issue with RAN resources, for example). The mechanism can also be used to enrich the tools that are already available to better handle attack traffic close to the source <xref target="RFC9066"/>.</t>
          </li>
          <li>
            <t>Discovery of intentional policy applied on attachment circuits (peering links, CE-PE links, etc.) when such information is not made available during the service activation or when network upgrades are performed.</t>
          </li>
          <li>
            <t>A user may configure policies on the CPE such as securing some resources to a specific internal host used for gaming or video streaming. The CPE can use the NRLP option to share these rate-limit policies to connected hosts to adjust their forwarding behavior.</t>
          </li>
        </ul>
        <t>Operational considerations are discussed in <xref target="sec-ops"/>, while deployment incentives are described in <xref target="sec-inc"/>.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref section="2" sectionFormat="of" target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="RFC9473"/>.</t>
      <t>Also, this document makes use fo the following terms:</t>
      <dl>
        <dt>Reactive policy:</dt>
        <dd>
          <t>Treatment given to a flow when an exceptional event
occurs, such as diminished throughput to the host caused by radio
interference or weak radio signal, congestion on the network
caused by other users or other applications on the same host.</t>
        </dd>
        <dt>Intentional policy:</dt>
        <dd>
          <t>Configured bandwidth, pps, or similar throughput
constraints applied to a flow, application, host, or subscriber.</t>
        </dd>
        <dt>Rate-limit:</dt>
        <dd>
          <t>Used as a generic term to refer to a policy to restrict the maximum bitrate of a flow.</t>
        </dd>
        <dt/>
        <dd>
          <t>It can be used with or without any traffic classification.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-blob">
      <name>NRLP Blob</name>
      <t>This section defines the set of attributes that are included in an NRLP blob:</t>
      <dl>
        <dt>D:</dt>
        <dd>
          <t>1-bit flag which indicates the direction on which to apply the enclosed policy.</t>
        </dd>
        <dt/>
        <dd>
          <t>When set to "1", this flag indicates that this policy is for
network-to-host direction.</t>
        </dd>
        <dt/>
        <dd>
          <t>When set to "0", this flag indicates that this policy is for
host-to-network direction.</t>
        </dd>
        <dt>E:</dt>
        <dd>
          <t>When set to "1", this flag indicates the presence of Excess Information Rate (EIR).</t>
        </dd>
        <dt/>
        <dd>
          <t>When set to "0", this flag indicates that EIR is not present.</t>
        </dd>
        <dt>P:</dt>
        <dd>
          <t>When set to "1", this flag indicates the presence of Peak Information Rate (PIR).</t>
        </dd>
        <dt/>
        <dd>
          <t>When set to "0", this flag indicates that PIR is not present.</t>
        </dd>
        <dt>U:</dt>
        <dd>
          <t>Unassigned bit.</t>
        </dd>
        <dt>Scope:</dt>
        <dd>
          <t>4-bit field which specifies whether the policy is per host, per subscriber, etc.</t>
        </dd>
        <dt/>
        <dd>
          <t>The following values are supported:
</t>
          <ul spacing="normal">
            <li>
              <t>"0": Subscriber</t>
            </li>
            <li>
              <t>"1": Host</t>
            </li>
            <li>
              <t>2-15: Unassigned values.</t>
            </li>
          </ul>
        </dd>
        <dt>TC:</dt>
        <dd>
          <t>8-bit field which specifies a traffic category to which this policy applies.</t>
        </dd>
        <dt/>
        <dd>
          <t>The following values are supported:
</t>
          <ul spacing="normal">
            <li>
              <t>"0": All traffic. This is the default value.</t>
            </li>
            <li>
              <t>"1": Streaming</t>
            </li>
            <li>
              <t>"2":     Realtime</t>
            </li>
            <li>
              <t>"3": Bulk trafic</t>
            </li>
            <li>
              <t>4-255: Unassigned values</t>
            </li>
          </ul>
        </dd>
        <dt>Committed Information Rate (CIR) (Mbps):</dt>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an attachment circuit for a
traffic category.</t>
        </dd>
        <dt/>
        <dd>
          <t>If set to 0, this indicates to the host that an alternate path (if any) should be preferred over this one.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Committed Burst Size (CBS) (bytes):</dt>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greated than zero.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Excess Information Rate (EIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if the E flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an attachment circuit for a
traffic category that is out of profile.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Excess Burst Size (EBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if EIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Indicates that maximum excess burst size that is allowed while not complying with the CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Information Rate (PIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if P flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Burst Size (PBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if PIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
      </dl>
      <t>The reader should refer to <xref target="RFC2697"/>, <xref target="RFC2698"/>, and <xref target="RFC4115"/> for examples
of how various combinations of CIR/CBS/EIR/EBS/PIR/PBS are used for policing. Typically:</t>
      <ul spacing="normal">
        <li>
          <t>A Single-Rate, Three-Color Marker <xref target="RFC2697"/> uses CIR, CBS, and EBS.</t>
        </li>
        <li>
          <t>A Dual-Rate, Three-Color Marker <xref target="RFC2698"/> uses CIR, CBS, PIR, and PBS.</t>
        </li>
      </ul>
    </section>
    <section anchor="ipv6-ra-nrlp-option">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |D|E|P|U| Scope |      TC       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of the IPv6 RA NRLP option, with optional fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-format">
          <name>NRLP Option Format with Optional Fields</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |D|E|P|U| Scope |      TC       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Excess Information Rate (EIR) (Optional)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Excess Burst Size (EBS) (Optional)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Peak Information Rate (PIR) (Optional)          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Peak Burst Size (PBS) (Optional)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
          <dt>D:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>E:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>P:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>U:</dt>
          <dd>
            <t>Unassigned bit.</t>
          </dd>
          <dt>Scope:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="dhcp-nrlp-option">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format-1">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|D|E|P|U| Scope |      TC       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of this field, with optional parameters included, is shown in <xref target="nrlp-m-format"/>.</t>
        <figure anchor="nrlp-format">
          <name>NRLP Instance Data Format with Optional Fields Included</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|D|E|P|U| Scope |      TC       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
|  Excess Information Rate      |  |
|             (EIR)             |  O
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  P
|    Excess Burst Size (CBS)    |  T
|                               |  I
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  O
|    Peak Information Rate      |  N
|             (PIR)             |  A
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  L
|      Peak Burst Size (PBS)    |  |
|                               |  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
          <dt>D:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>E:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>P:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>U:</dt>
          <dd>
            <t>Unassigned bit.</t>
          </dd>
          <dt>Scope:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-ops">
      <name>Operational Considerations</name>
      <t>NRLP senders should be configured with instructions about the type of network rate-limit policies to be shared with requesting hosts. These types can be provided using mechanisms such as <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>In contexts where the bitrate policies are known during the establishment of the underlying bearer (e.g., GBR PDU Sessions), sending NRLP signals over the attachment circuit may be redundant and should thus be disabled.</t>
      <t>In contexts where the (average) bitrate policies provided during the establishment of a bearer cannot be refreshed to echo network-specific conditions (e.g., overload) using bearer-specific mechanisms, sending NRLP signals over the attachment circuit would allow control the load at the source.</t>
      <t>When both bearer-specific policies and NRLP signals are communicated to a host, the NRLP signals takes precedence.</t>
      <t>Rate-limit policies enforced at the network are assumed to be consistent with the local jurisdictions. For example, <xref target="BEREC"/> says the following:</t>
      <ul empty="true">
        <li>
          <t>ISPs are prohibited from blocking or slowing down of Internet traffic, except where necessary. The exceptions are limited to: traffic management to comply with a legal order, to ensure network integrity and security, and to manage congestion, provided that equivalent categories of traffic are treated equally.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-inc">
      <name>Deployment Incentives</name>
      <section anchor="networks">
        <name>Networks</name>
        <t>There are a set of tradeoffs for networks to deploy NRLP discovery:</t>
        <ul spacing="normal">
          <li>
            <t>Cost vs. benefit</t>
          </li>
          <li>
            <t>Impact on operations vs incentive to deploy</t>
          </li>
          <li>
            <t>Enhanced experience vs. impacts on nominal mode</t>
          </li>
        </ul>
        <t>The procedure defined in the document provides a mechanism to assist networks managing the load at the source and, thus, contribute to better handle network overloads and optimize the use
of resources under non nominal conditions. The mechanism allows also to enhance the quality of experience at the LAN by providing a simple tool to communicate local policies to hosts. A minimal change is required to that aim.</t>
        <t>Networks that throttle bandwidth for reasons that are not compliant with local jurisdictions, not communicated to customers, etc. are unlikely to share NRLP signals. If these signals are shared, it is unlikely that they will mirror the actual network configuration (e.g., application-specific policies).</t>
      </section>
      <section anchor="applications">
        <name>Applications</name>
        <t>Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed
how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals
depends upon:</t>
        <ul spacing="normal">
          <li>
            <t>The extra cost that is required to support both mechanisms at the application layer.</t>
          </li>
          <li>
            <t>The complexity balance between performing the measurements vs. consuming the signal.</t>
          </li>
          <li>
            <t>Whether the measurements ("assessed property" per <xref target="RFC9473"/>) reflect actual network conditions or severely diverge.</t>
          </li>
          <li>
            <t>The availability of the network signals at the first place: it is unlikely that all networks will support sending the signals. Deployment incentives at the network may vary.</t>
          </li>
          <li>
            <t>The host support may be variable.</t>
          </li>
        </ul>
        <t>Applications that don't support (embedded) bandwidth measurement schemes will be enriched with the NRLP signals as this will be exposed by an OS API.</t>
      </section>
      <section anchor="host-os">
        <name>Host OS</name>
        <t>TBC.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerartions for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an attachment circuit may:</t>
        <ul spacing="normal">
          <li>
            <t>Decrease the bitrate: This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </li>
          <li>
            <t>Increase the bitrate value: The attachment circuit will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </li>
          <li>
            <t>Drop RAs: This is similar to the current operations, where no NRLP RA is shared.</t>
          </li>
          <li>
            <t>Inject fake RAs: The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an attachment circuit may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="neighbor-discovery-option">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" subregistry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dhcp-option">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left"> </th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="I-D.rwbr-sconepro-flow-metadata">
          <front>
            <title>Flow Metadata for Collaborative Host/Network Signaling</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines per-flow and per-packet metadata for both
   network-to-host and host-to-network signaling in Concise Data
   Definition Language (CDDL) which expresses both CBOR and JSON.  The
   common metadata definition allows interworking between signaling
   protocols with high fidelity.  The metadata is also self- describing
   to improve interpretation by network elements and endpoints while
   reducing the need for version negotiation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-sconepro-flow-metadata-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
          <front>
            <title>Bandwidth measurement for QUIC</title>
            <author fullname="Zafer Gurel">
              <organization/>
            </author>
            <author fullname="Ali C. Begen">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-24.008" target="https://www.3gpp.org/DynaReport/24008.htm">
          <front>
            <title>Technical Specification Group Core Network and Terminals; Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (Release 18)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="BEREC" target="https://www.berec.europa.eu/en/all-you-need-to-know-about-net-neutrality-rules-in-the-eu-0">
          <front>
            <title>All you need to know about Net Neutrality rules in the EU</title>
            <author>
              <organization>BEREC</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-05"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
          <front>
            <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="17" month="March" year="2024"/>
            <abstract>
              <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="I-D.ietf-masque-quic-proxy">
          <front>
            <title>QUIC-Aware Proxying Using HTTP</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Rosenberg" initials="E." surname="Rosenberg">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="David Schinazi" initials="D." surname="Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="12" month="February" year="2024"/>
            <abstract>
              <t>   This document defines an extension to UDP Proxying over HTTP that
   adds specific optimizations for proxied QUIC connections.  This
   extension allows a proxy to reuse UDP 4-tuples for multiple
   connections.  It also defines a mode of proxying in which QUIC short
   header packets can be forwarded using an HTTP/3 proxy rather than
   being re-encapsulated and re-encrypted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-masque-quic-proxy-01"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-10"/>
        </reference>
        <reference anchor="I-D.ihlar-masque-sconepro-mediabitrate">
          <front>
            <title>MASQUE extension for signaling media bitrate</title>
            <author fullname="Marcus Ihlar" initials="M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a new Capsule (RFC9297) that can be used with
   CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT
   extensions to signal the available bitrate for media traffic that is
   proxied through an HTTP server.  This information can be used by a
   media application to regulate its media bitrate in accordance with a
   network policy, as an alternative to in-network traffic shaping.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ihlar-masque-sconepro-mediabitrate-00"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="P. Roberts" initials="P." surname="Roberts"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber. Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing. These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches. Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on. Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
        <reference anchor="RFC9066">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document specifies the Denial-of-Service Open Threat Signaling (DOTS) signal channel Call Home, which enables a Call Home DOTS server to initiate a secure connection to a Call Home DOTS client and to receive attack traffic information from the Call Home DOTS client. The Call Home DOTS server in turn uses the attack traffic information to identify compromised devices launching outgoing DDoS attacks and take appropriate mitigation action(s).</t>
              <t>The DOTS signal channel Call Home is not specific to home networks; the solution targets any deployment in which it is required to block DDoS attack traffic closer to the source(s) of a DDoS attack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9066"/>
          <seriesInfo name="DOI" value="10.17487/RFC9066"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
      </references>
    </references>
    <?line 746?>

<section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be considered as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":1,
         "scope":1,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrive the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1923LjOJbgu74Cq4zYtJ2inL6kK9PVXTWy5KxybKatseyq
nZ2ZmKBIWGIlRaoJyk61nf2wX7APO+/zC7OfsJ/SX7LnBhCk5FtdZnsiyn1J
iSKAg4ODc8dBEAStMilTfajag8RE+bUuliq/Uqe6vMmLT+o8LHXwIZklpRrm
aRIl2qiN0/MPQ7PZboXjcaGvoem6t1x37VYEP0/yYnmoTBm3WnEeZeEMhoyL
8KoMxsVNAK9mel7kQYE9zbGPZRDbHoLXr1tmMZ4lxiR5Vi7n0Pbk+OJ9K1vM
xro4bMXQ6rAFfRidmYU5VGWx0C2AbK8VFjo8VDdJ2cL5TIp8MQcwZLjWJ72E
x/FhSwUqytM0HOcAQXKtVcYISLIJ/hbG4Zweh/M5wAav5FmrFS7KaV5g45aC
v6tFmvLEPuZT+DdWR/kigqZJQb/nxSTMkj9T40N1VoTZRNMPehYm6aGacavu
2Lb6u5ze6Ub5bHWMQZipHwm8la77ab6I1Si/Km9g+uo7nLT6Pk9jeN101EkW
damVXb9179MLUb7ISly3yywpYT6jEhBtkD56M10AHnzw4zC7gQH+boJf18N8
kRSLWZhqA+Oocx3HyzXQn+afkrA+/EkWJ7WxPuVZXAKCqrFaWV7MaOkOW60k
u6q+YTN10jvtBacD+QZ/QvUnw+sDIPZkMoWVr2hWnc0RGPWeujGulVtx+Qvc
p+Ys2jhiuxouLCa6PFTTspybw+3tm5ubbhJmYRdabYdA15NsprPSbCfRbH59
EMzDAjBW6sJsuz6IytVVmBrd8mZ1dHZ2MVyZGD1VP+gshnkdfy5hYwBcRoVZ
rAbf94cyw//IqY3zvJwH8TSaP3F6F6Ngd6/75vXOyuzaFyMlP6nR0pR6psIi
mgKRRuUCSBiWX5VTrd58Z3/eePPdaLPdGGz39e7+UxEAzOS74fDeWc/zogzT
7t5kPqeJx9p8KvP5LI8XQO/bo7mOkivhHI2vA10CFZtuaOafvzX+LyfxH/d2
9vcFHcB7gpkODUwQEbqKlCNY3JskLqfKe41w8feXJ/2fPflq//6P8EoX6jvo
OX3kzV6aqH5XHemJzu7FGcARlkUYfdJFN9HlFSMuj7ZNmgD+gp2dd8Es/1Mw
tvPypx/AvII/LZJo26OW/e7r12/XUIuOphngNFU1xAtn7OdAMVbg4f640MUs
yYAQvwZOPk5SrYowTnKVZECxV2Gk1YdwCYjYU7XV+pp7EsmhQL6UOQgV6AX4
5kTD6xvnOoUZaLXz9rekRdyBjhAHyyw810ie27v7gJ3utJwJxo6Oz4/7q9jq
pala5guYCLD8MlefsvwGZEW+KBFL8L8FLFqalEtVIG0DWmivHV82p8R7+clz
InAenBQIex119aLI5yH8s62z7TBNAwA2QGCDMg8Q2ICAhUf4PwtsQMAGSRYA
sIFeBK9brSAA0T42SINlq3UB6gispdKfoynK3VihLACKUGFZhtGUdlOUFNEC
9JxZuFRjrUAt+Ql4DqKJVJeUlKC5KEHd1sVUw3Lb77YVElKGJAMU6X7b0N1J
t6M0yq4IBg+NAjZZorRF9AKIyTWTrX2yChVSL+hHSOrpUoWTApdwMYc2RhfX
SUQAm6hIiPlvtoA1ADigIkWk3dwLC3BQoKCwSKBXmOoM2DsQNGAGMZTmIaCq
UPGiAPmvQjUY5COG7pMCdCQTAnuz22rJLgMxlMKg8RLAmSNpAsNCnCdmZrD/
MIZuy+TPMAQATijwdtUcf9P04jQ3pVELg+OukeI5y7guCMBwNk9ZdTGLaNry
ukGVJ02yT+rjxSXs0Pd9tf/2YGeTcDk8P35/8t8P9vn526/e7mx21cU0MQrY
1IJRn2PPJOFwVWC1yxw2PTUX9oCD3A8ezgMWYWEAz7CVzoF0gep6jAIjPW+c
98wmvgnDzRbIy0otw7lFs/jootoCOIwLbQxswhmuGpASbIIOAJLpG9YAZPgE
V8PkKtZXSQbqJ2+LWRLHKQjiF6B8lQVIsYh13hcvgMsB+X6GDQMfMo2Ug7xA
CIzxCei9BhYeq/HSrhzBFy1MmYPqaNQ1KHTwAk0E6Ys4bonrOM9he4CaiuuE
m8C2UTqeIGn2jwETMMFLGFEdgwSY0zpsXB4DhV3kMOEogQ2PCEIBA7ZAmBmU
WzAk7RsBrrCQdRTsHMSCMQvU2stpWKKwBRIpEuwGSBAUYniDWqIeZXkDdoe0
Y7hRxAipQF6dF9FFuAKD2liYBW1ahDJUQ/v7MUxabQyPNzc7Lfg9RxUbUQOY
NihulzxJy7McWEYAQ3LFHQ54KgBqmgpOttCAkoIZPDFwn6YB672KufSZuQDq
e30DYNxMUSTi1BcZgJguESTaQY1+oZv2WAM9FKYNZIWA8FcVAesY4+6eT5eG
BDMsaJpP6CN15eMTt49DaayJj2H3K1jsqt7KCDcw7xQ3AoxwQzjA/hktBnQV
fD5bpGUCu9g2LlFfyBEeIDjpifYnjKpNGY7TxEwJA9JA+OWPH3qnHRXpNF2k
YUH7dYI27oMEQTOxE2i1bm/D6MsXZab5DRILrCyxLuRc7rUGdmBHEFkxN4SN
0CGlT1pudlkI0VuFlo2KlmMOMwDYSa0BUbRp2QeiBtAKEsppSixyoBceAxZ6
CgxCE/NCPLgFwLaOI1WyrPTfaiF0MLVen5mFLgIRSyDgOyrLS3qGQ0GHVpzB
NkUU9I+V3YnIYMCyBy6htt8csC03BwJMPncqGHAEC0cLuS2iDl/HYRCoBIxL
6At2n9o+2JedfJOAEmRXHZiYxZFFUe+BJXW6AXNEgRGYhiWTy+MXOx2YCP4/
rht82tus0SFsNPsy/LiLovMv8BeG5nriqU3P+/seQf/Zrc/wPz+7tfqnu+1W
N6C/bvM3eV7/6zZ/7rbu+Psr/v7KvXC3bkB8q9f3XryD9oh5+3rV6tH2uAbQ
/iUP/PKeAep/Vae22b3I41etBWIfNtDVfWS4Vn1aj8yueuhhFynSYvflw+0b
2Nlbwc66odY+9LGzffdPq6++XEcdtVGgWUsIdN1YD/9Zuqbd8fzmvKlwc7Zu
D9WLMGIz6o/tEbPtdXK0DUyJ1joAy2SS/bEdaWQv7S+gUj2kOfiKlfA90Y6d
wwsYnPCNk6FVAbeZJ5I4qmkOY90CUUay1GhUS+B/YGBpNAVKMYbuN4GICYLy
W+gpOpeuUeEwBI1Tkwh45+oRxQpmEV6HSUpDg0qJPHh4HBiYFgm5teaWp52w
mnx7++1JMCC3QZDPTXgzCbISLD/XNJCmX76I6uHrQARlBRgqf+pqkUW+eWUt
pvwKNBqYCavVIlRRkSYdngy++zp1Q6LAm4F+GczC4pMuW82+FetUoZqhB0GL
H1q6bXZ0jMQCqqnRldIti85+iV31w/AUMQRGy7vddzugTkAz67Pwftt5u/vl
S9OiaW1tpRrmFqK2HRK5oKoBRkDaESNeXIEsvfAR6gqiKfiWnFtvsfZg3eYp
+k+sfy7WaWJDDm4ungq7SglmawsIr64WraUYt1OYgslj4vQnnK4GvcIRk/4c
oAMRiEWdEMbR22EJIQJbkb/4SnKJJhMrLTDBFPq5ztNr6BA3BUj7DPWEc5g3
EgOqBKQaY7PbW+fZhKUh2sBlj8UPiDqg0VEQhiH8LPNADY/1NW/moCPCV9h1
SEJsdoq2aleQKabX66n5opjnBn0SNVWia2XM6ocHfoSGd6ej0Xvk43fq9Nh+
OH/PnP1ODfvy7HLwkT/03qOUIn7+ihj46ocHfmydZsC2qPPTTNsPxZUIktN5
JM8W8cwJl7vT8ApGDKgL0Rrs51fVw1f2Bf+toCauT8OFHT2c2UHVqYHPDbHe
pdZd74N7aFHn//31f//P3uXoHP+lL6r38T1/4R/h/0fwhD43mr60ktDDHz98
9aC+8dd//femVL6zv/wfNOpxq6thGoLGytPc4TaAz12/0em+bXW63/rrv/6v
/3T/bZEPwZupQ49qYsguiUVTE6ldf3/Qx9M9RwKn76qPB/xykw5gvMtjVKte
qY3zzd6p6GGv1OXwPX/2PgYbanCqNle6eOnowVOSXlafvY/0ZS2J3ElrVu/4
767ScIRTWjXnzXcj1fNCLw/oNt+Qcdju9dtqxu7PBu9FvkvGH2gtyGHpV49V
Wt4Meg3b4sidr5KJH/EpmOG+RJF1rbNEZ+wsAN6X0JDrdRlybDnvZA867InM
Gk3Dgt2LLDqGleeQdDBWANHxhP60GflwRKxZC73uIOtUHjHyuz3N2SkSe/+r
PcAT+QGpa22tfvGWHbZaH8iXGX5OZouZukDnlwTOKYqrNj5eXG4etg7r2gyi
jiRkXTZVDkyS5W3r7yJfqUGYEe9geO/juhgRi/gWEDOZzVG6wLAzudg4TjDs
n6kNo7XCGN4+DrTJboO1HR88vWN6e537FMjNGHRY07DOw9vuAhZub0ea1b7d
7s5rRD7i+avXBwdIjxk7KK0q41w7hHT00SxSXIBMiA+Bt15VhmktOBvVoPvd
g+4+jvpfYFSECvQxNQHiEUeFWxdDYcxWLcq5MOhj4dguquwLIImUcALjlxg+
iEDZBFLxolJjnYLS4LpFnLMaR8oNqikpkD3tGG59BWoEQh2Ks9gsUIc4pLlC
i4i037DpqpqHsDU88qWt7CZt0czkDJtvSBYK++ftRuuJA5v88BJLY3pOGZar
Ip/xokdposWVRrSIWw21ro3T3sXB/qZsHnTff/mCpE/6buX+BjyCQUTOvYys
kjRHP+QANJzjvroGRhaLvmvDFW4HEwvIcnz3YL/6naCwHvgUUFTAVlfMfRDi
IM+ATSARdZQuI8QngPoMfBIlt0diRrwX06WtxmDY6fJBdKMz6TiLiuUcRwLA
LSYsiznYuw9LRBc2LQeQ5XcCU0X1tzA1TyUz1h+BlF8adZJ9i7otGW7FzbgI
SnMNdhtmCIRItwEMEUQhUDXsPRxmYZDCDRjEOLqin8BU0kDPbBOONeiCSZSE
tHpmSiay9fzR2iCli89ua+u7amOhxk60w+wTiaxiy4VnLZLRzKu6JoRze1tt
3K2tTsNE+JuM//ixHwZ/d2dvl6WvHwhyrJ3tZxhJwmmEH3TJ6vjw3kSxJaeJ
bVJjHyfEtOyqbFu2BDZzSIEMi7K4TsNvujvEJR3puIyxK+BngW1OzOQETPgi
ZlML88EQWgAbzCQcH0wpoDea3BgMKtmqsPxEDWsMzo5ic2yc5mPAEqWQGfEQ
kLTGea51cxQa2HRGUwFrU2foUnfB29ryiAmOQ6xacICIit8Q8dMSirJEdIPw
U2IBdj0L53PyKSD92wyFKh3BURqTj+264d7Y2toKK7YLRgHpWcx4JTlqAyT5
pigMlHgB2CFcnHjeqGOOjdpZWdqC4VH+wCiwYD9ONVm2SBEYw3dxOfmAz5hX
2kWrefc9NCPXJBDYwE/zpb8Po67C3AaeN2ykMTnYLEXLLre48WgWQOzBxuiI
y4LoR942MjriGz38ZMgzBJkpwwz9GRTtsEJd3Gox8Bai7C7qxUxg8+sY+Z74
FCjoBeuKskc7prvkwCTQqES9h76vbZDPQhgXVuZ6YJzYe8u684ULa2Jr4W9G
XA/MbEk/NgpaW+qKFkUBGCCdFtHJ2JlxVowjHZ/Jny3Kb5t7Ps41dzcLP2Ha
wJJjrUxGnFmCqMXMTrs/XFwU9YK4CqqxvNwU7UicpOQdWa/Wf0g+6Rtgo7J4
z4So8kkVfuqnt8dF1X8wWaSrLIUjifhxHts/pqkCZS8yZ9ZQaPIeR+gawgYK
9cGj8NU0xIRVduBhkNGRPuXvEs/A9xAzC+ByYfzTwtC0E8wKgdYJzrrpGmVv
GGmMQss2vdepy7wTeZOCHKCB+V3QkEowq2DRJrKQ5MzzUGtDmwtK13CIuiKt
FehD5ibAaiRl95tIUo/ZOxWgYoMMVGUuAp8N0bpoTKarKsoJWd2nzmohOlSX
F8J17Q6F2TN+e312EUbo2EZPHetOJWxukPCkoCPkNX8nxf3m7CjkACkq4uQy
DetoAilqSCWdJRN0FTtbE58JZi94R5owiZuaySr9Az8C1QKEVOjtAQQ7lJgA
MhjCg5Pg3pQZrZW/U0wjmgnAQ85p8nw+TfnD5SG1T+SR8XOHeO85q/n0w/nQ
ZvF80jZBKQGLRWwwFhZsFjEucSXlx8ouikJcSmE/ZYHkNcthe6sNURHRispL
Jq+YZg2bg16Ej5yWYADrw1o4e11aGHU1AdW1IG+BwzxrmyioMYkky8nrO0GO
XqqBzlDLBfCs0r8xyEebkmblAgCVxvSuu2f1fpAAexwDqH5+Sz+6EMosNH9a
aMqnDACAz0uKCww8sUD0AHOPE2YxlPuBcQvYgex8qCFN5D3sr/AzMgTnUV/v
TV9REx2BclaOQhMbNgZa/ZopgL3hEm6YGUtlH4BkPwDOs2gpX3Jj2MQdgdJK
9t3FFJS4yXQOEG182B9ZSflub+/1ly8dSRnAN4WTgc5RprBe0SdOHiF5N2BF
4GPu8vL+K2rBlNWnOeSEZAj4sC8Yx3aE0k4HTOmMPk/GFxxMa2rB1YqKKdva
Uu8pQ4mdVPC1V+YzZGO+wgaPL+eoHo8xMWp5qCRXyG2OJSZoIBMok5mGtwck
YeR1ngoYdwtmPL6CXpOpJJoQJ0zHW1ukkWLmxEQUR7aWrcqPSYQSSQG1dGur
EqrW1HR5hqDdfsboRZVZia5AohEwWMZLqy1THKSaFTDbBbtKPL3zOZFDVppI
Fld9WTvJ06MpQKY/l14cy0/YtKls1lgaCUMSsnuzD9vza4UmPfZlzX4/QgXS
HRhE8lkddd/gIP4kSsBzQJ+svmygfx1k4yRYwkK7CKhbQw8btV1IBLW1NbB7
T5REIg2yzubkKmfyQdUd3xbFQwLJREXopCGL2Rod9l3XczKbh1FpUSeCS7LT
gH2Ey5UWFhbMtIXFDlNO3qE0pXLp+DZlDYsDSMlu8+UmiF2dXiGxkQ+VeAsp
CCSHeMyR1e1BHEUhsmWdXSdFzucYoC1bYU4VQOJLDZublGjkMX2O36ekRPqB
XJsx1jsl8v4A/2LKl7jEwwhFYURMmKwJBs+F91g/4qxbbb+sqGrkrSVXlojn
+uyc6K0Ek1NBRVElY2vFZjG8OCcwnqz61hZ3pm5Yz3XKH6FeS5KbU8JIjUDl
MpWEKvYZsYlUyU4yDqtg5X3pQ1UAZuUPs1rQQU9hk1d+oEatifHYh5hK82KH
f71z79090sjLf7Gxm/6jjdzHrEjnL3YpcqqqMCT/Vs8MqiUGdeW9Y2hIXezc
PydCxPPmhIjY5flUwaSXjzRyiCCA9pq/P4KItX/rc4D8tBvaLzYodVw5Tvt2
C5NS/lDmTQ4sySauKtKBFKcpgioRzs2Cvc7BOES2j67Y3ADBO72L+fEUTFSr
TDkX1UzHCQjTErkCbGk2RZ/NjD2Wib738kaHeDxxawuPzFlvPeoPU3Tge7ym
wUjNApNO2HtOSTcavke8B4mlBSllioh7l/hyNNUzjZwvF5WaR4PJoXVJWf8Z
W8C4pee6IAdQRhkuVWKElfyk2XbVCKUiBxRE5aIDf6hZW2XO2W8c24A+ULvk
ZGE0R8jaEGjcQRQY+yYscM3x2JMsJbXzpeYajfcBRGWatDFY0Ql8QpxISgzg
hJQ6C1812v0STwAkzqt9TNUQhIkuKzE67r6a4VOmVfl6Cn1TsEjyhK7N9AWz
7WtWwRIjg3nrGKMSF1s1jpNj4VU8zgRmOPR/DVovR+lOexcPYJJF/sxzVsDE
q2Q1q8qKbnSwe/AOPeur1FIZe2NUmQBWivWy25pmLlvVbjQxHK3U/lzl9FbI
sGdJrJ+GsrE+y2sVkGiPrlVOAFfJnDgFdAINCxB6peYULydkZQ+h4GM9RHwE
bEuxT0DkfLXQuegzYEXRpq2IoYKegTq3qx2qWYJmk9X2a5nayDbeS4i1oxZz
XF3MwxOz04t68IkRMFXY/Q8KSV7q3yyI0rVQ7XecESMObxvVoxMLbAiunGZh
00xyLweVo6yPjoVWa4Q+Bc9/VkWVkGpI06ofX8FoKTHinme3LP2YvTicQSXM
JChlz0QhG6vi1N4LbDqz5S7nMxpOgiUFt0JjD3I1jmgt7T7Fg5686SrvXeW7
g43VTBOg7VKWnJtAeT6sJILEkONb7IjSnyM9lxNqoN1SCIo2H7Pkc1BXMeC3
KCihoXbagCbksgCJkslc8s9QZAWSOjF2ylpbyRSsMkQriKHDONX2YJlz2KW5
ccTNEFm7ioL4XVy9Wm2DldN3Vk2NKUK7GgFSG3PZw3SkBnPyA9gp8oX90bS8
ZOf5ubiJdbLFftJrhel1xiKeU8HOLL3J3jT2rAT2Tse0kCgXmMCEFFntlSaf
6QOo1gA1OuKxybnmVrChntcOO/Ci4QpPyG+L8OHmyCtXLi85joOLbR2itC2q
ECcHZ5m61vnE1uS01Mg6KXy5aWkc0HAGOBG3i/PNeWEdG0cW2x8DLWD1o5uH
c249bgCbFQnjWnBtIzFeS3iDKIoOwV0zFcmZetTi2DXGxvYnvVRYW8Ko9sfL
0UW7w/+q0zP6fH4Mysn58QA/j77vffjgPrTkjdH3Z5cfBtWnqmX/7OPH49MB
N4anqvao1f7Y+4c2e7zaZ8OLk7PT3of2mkNehXWYJ5xQrDnzoFWb91F/+H//
bWffRYp3QBzLl7c7X+3DFyRWHo2SGvgrLNiyBbtKhwW50FL0CM6TEjhBhwiR
bF00o5GQ/xEx88+H6g/jaL6z/408wAnXHlqc1R4SzlafrDRmJK55tGYYh83a
8wam6/D2/qH23eLde/iHb4FhaBXsvP32m9a9UXEMaZm6u8olKNVdto/4rmhF
/KwxL4rpj4wBAIoJw/YS7dQeMyRYQPqd14UP5oaoC9j7JXUggU3kIBSJIeZF
2SsNEYI2Xh4BA/IOd8bABEBMTOnYpXPKCjcn9kNueTqDRYfwsRM+hw+0Q2oz
sEuwhOSIPrshOr6intcc/di+6pJ9yMhEKcTHX2uBPmlNLkA6kIb5BU35QRix
MXLs2RYs6Kj53FDY2sBEMXGsmiVBAkOAIOPjHSKDHCY7PiQd5SLglYMEgDl3
rBSBuDTWD0ThBeDluIbsM5Pkc+eaoYcYjhKrZCYpg2KosksG4cDspJOydg6S
T7QV9C/69cXrJwIZi37Yk4PELEkUHGFyw+0Ll0ohW8AIdTPJ1xIrgKw5WOYp
CKL51YL92B2Q6QAxsBMA/AB2OBF92s/h05UPCxeWX0CcAJ6X7HvNSJ9wAS3o
8UeS7Jqosr3Tlv1DIzTyA+mHSn8DcQVr3Mhh8CP/jb5fP7vvRsJELavg+PDp
sGtJuWUr9PgzhYz9LA6kMrVxfHK++TyooUUjqReT/X42ZEPc6KtwDZ8N13Ad
XJe0gzIuWYO7mBIIRhivwl/2mbISncY27OXSu24kvu/FHnC5JKelQ5/8I66S
83dRY7dgQVvj1uWiHGKpjlc4m0OwgG0H/GwHnqFPj77tBjtvatBzb+j57yP0
bx+APlwN5QMGZXd4dCfO3OdD3qsyACTTKZHtqK9CsMe5g241rZFVLfnRLjzC
PxBEKYWo6OkePD1apGwKJBE93A9236zDA/n3gEmiirNKQH0gILXxcTw3lBk9
8rKeK77IxcaQDMdJ6TKC7dZD7mjPztHepBN1oumjOwH4XJ49WFKE8oSg5Uoq
AvLfK0vYr4WsPYr2pCVDhQoXqfCl5szRDTw6nS03bVx+TPtKTupL/gFarpnG
wUZar6bePSHzTlJGXSocGaghZhTQLLwlOAIloFQjNKA3+kcjQP54CVN5APtj
akGZ4ZwhwtKo5Px26hSewkJSbjJqj/DrBJUUruiQqT/rIn8cxgeZn0cjdgh7
VoF034RjLsfCc4xds5c7L7t/e3TlnAgSmYc1vQKL6NemgFyUwAq5/uofN1b/
PryKJCFPgmPZXBnO4+sWp5oHahINdQAw61iMP87nmM25hoXzNq8lo6IiIypF
4EHx4KQfEFpPoKfhPbRkixXRvHC6OjYWdsnnh89HI3YSkVPdMoohz+43WmOa
rr/Cwyeu8HD9Cv8SdjB81jrKKWEKKfj5S5K4hObvwbuv0HPgvr2ldBFnaO3v
7LyR7CWbuNSSY5rXYZHkC1NPO8X41Mn5NizTNtD3NuyFbQB5GzBWpUGQO1sy
mLxqGOKUHMHTVAdIUh1Ma9E66OcpNPmIB42LGtxsZMKAHSQMhhuG7FJHg0WY
PqGbt6vdDPETHdLAvrBgEJ3D6bFuzrnC5JWt1VRkbPOmsLHqWkMmqY4tngE0
4tg0qzHG2QIdpJskTRemLEKXNAMdBLOARyDrl6KF6vWa8OLOmme7a57tYfMd
+GlP7as36kB9pd6qd8951noV/ML/SJ2HC8x39AKqH3Q2AUTh98Hd8d3w7vJO
kepqA64XfRdr/bVg8P4e1a7qf78JDD4UKwrG6t+vAYMLQPvEZqPQHv0L0TMx
f3R0/J7o+IGg9LP2iHW2/L47ft8dfxO7ownDI7r1mRDw5m8JQwXGqha6AsBv
BMODGuEaIH4jPNyjqa3Dwm/ALZ/GKy0wT2SVzPmEVUrsyUurq8ZF/ziGG414
MdDNjUyjcpVUaRG2Pz+gFVK5QPETLakQs9q4OBrs4IE35jZVV4tM3qRcWF10
FZ93ZqZUh3bDRYzRYoPnxMooRZBf5zluElPPoOuEM3feqjwqdYkOH/KDsnZf
nVuzHsE1z4f3PH/EH7amBbua1vzwHOfLQ60f9BusmfETjfmVps5JhSVOa3L1
aVbs8zp8moX4M/p8yAx7XncvRK2nHMIjCb7ypqMksNjWYPBCu7UcdOvx43NN
RjIhuIpVtpRShPefka2liPC45O/yjEmXvWfdJS4/19u4poVHbHvmaz46ROPH
VEAnKqujTdv141585hMjP1eVp01GMeuHEZUMM0HkNCZ1vn3R71RdEPAmSeWA
Hcw5LGLvnJYtX+sGbhzEmQIeMXE4Cuecq++V7pUjev1jzmOiL5hAgV4E9nOQ
xxr6knzEyptbnf1ify+ZmidUZ8kqnlSEQw4ox1Velzu4SXWhxmTecwLymog/
DduScp5ib5NzC5bHuipiYN2cZiCOLc2p0nLaxjvfhWRFoIkvWpZnFbiuzOZe
uOoZQBYQGrDjfeasi+oghZxrKR4FoIUBpwiP/OTx6iluzqXwhpDkMGjEiWYp
VZKSvgVVLmGDk7eSKz/tm+ITutAtl1tjk5diyXbDXthl5B+x4GPea87Sueok
rsp1/fBhscj4PCwX3pIoboa5ggVHUyXESDI0jxKySqSgne3c82NSuY/r/BMX
l66KBveGJ4wt/RkzK6V8lpWn8CuS6dkocHktMEd72PGxw0gvOKms5sL4xst8
o1ng8RZ6DWdHLgrJgg+JrmzYRIiE4uJI8krqVQBzRfb8U55kpoZYZKM60zeG
DglSxfgOnzmADc83VgywF0y2mVsaqg1Zr7f60hBzKTTn70lm5Vev9798QYdy
FQfKqvPByMvxLAMiHQ+o+ayccqhc0dSplBW1sWBO9sR2jvJpg1U+L3z0/uy8
f3x+fHr8oz1RndgKFHu7rzld4Sk+o2qZqkoVK8ZuPI2eaOo+asI+rgaDqs3Z
H//yw/6/IGQrJugT+vgLwyPH6fkkuRrgEZwXZI7/5fE+FBU+azWOS3S7zQdP
BMnpBA/BlhFsT+2RAXRWQbVKNavAu61E6OAXWQENclg1A/rAQ1FBqi8iafe7
de3+pBaorqvzLpGAzk3BuE49X8Ub90XeGuOxwJWk0K5q0j+Gtzmku8ZLWq9F
6ZlBeC6j5vxxoXNK4Lfnw738MOtJwpm1VyfQFijo0MGcYm7/EdtsLQ26ffaU
bfYreIMQjgfMG68yr/1bcfk8e5Q1/puVUVb+nsR27F6skUhtO9ax/Sv5NS0d
N12ZPgn77syHiPl3uvtPR3ckB+7udxByP6uDsR1fG0yps6dIniH3tMaUt/5Q
+P3i8bkpdfKU4c64p/WGvu3ptDm74ZrZ9Z4y3Afb03ovwHpkrp3dUxevzjie
xTYaLj4rCeOnSfkmJ7hfrt+7Z1H8fnDCG83vyhZuSG/2kThhZ0Pyb1+ydk8C
mBTvnC6QcrmU/o0FcvkBlq1wRYJ+99r97rX7Dbx2DRWWypyDKYc6K6cgBHxC
i6x1Od3V41qirOtVx3gaddnQG7e39w6LZFoXHJdDuGrqzX5uis3e8EvQUQ4H
7LvdN28qHXkV8DmWeiJqquukrtBmb3ByOaKer/cDudwQq+9LuR0G+d3+/htr
WvKrqs+2uOfT9EocPqCMdyrzU8z5xKrwTeixhMjQpcvg+TwNC/yBquWv1uET
96bf85O8nA/o5dBHkVQ3tTXgYxjEI2o5Evlrc86p4SQ6Sis3CADS+f1GCjpP
/DM5/fqZHM4AxyM4wpLR5+eVDOICTjaTniQEwlQs5IDmarmw+0CRU0VjLo9i
OysY/daJyg43o6W4lOQROWbNDjKvpr09uPC8+wdOMlshxJbw89xgdY8bXmCX
+UfE3IVDM698oHfzUv0Kou+OztVwcAmMgur2mM0OIZgqGPuFJNz1VfffbQco
g2HwfCHdZcbLg+4zKuSXGCqQc+/kNkKuX7i5Ok2H3YdmGXo3OaHnkwC6KjSf
FckVLEnukuudi88rUCQIsacxN2UtudeqRbW2PwNTN4QTyilcPVApTjg+Y8dl
DjOuqNGEoSKALK4Pzj5YV/JTTodwUrmLSdqXSzrKg1WSdKxZqzhfsyfuuZVJ
NCa5A+3eSmrsWf4JVs7ECe/Jxjn121u6yRHLR4dLUw8uHKIb9WQ0dF72aTKm
irfkKwSZFn2SM4bGamC4HTAzkXzcuqxKyfEBIyG5TKN4D4uldQnL4SN7WJxv
6SjzQ5cGy8WF7FUOnAVqvdCpntCdZDEm61dlRN31EVTTCMvO0M6gQ5VUXDXz
yxZVZ5A6XjyB8jWr8/KSjJtw7WMLG/lehO/Cy5jwx07p6rDiSXVYkVkqnk2s
lTEnOYJrWnilxUs8S5pfXfGJZ/9uPj4IyRTlSlFR7KePHvxrWGYut1tiAIWr
GaAzeO5Y+7WpjlBWPcLbx9k0pLP51Tl96o9rItAhK6sxY0GDZlyxViHDKzhV
XY3hKSp07xxSbTU5Wg/LaFa3ph8XoE3MGsPKwWPnnheOwtuVqr5zHirpQJjw
WR2s5aPemTfBikM1T0oTG5EEWKI5Qhr1iyQgVY48FMosMCA2Xgo2OEhiEjoA
j4erm0WDG5GhqmhwD8sFYAF7G7DwyxVRGAwT05PZSik+PNKG9dGqY28cCdah
qZXKdMnWSWgZyhpm0rHv1XieuziSz85wemxW1YDg08U+N+yqE3tnnc9MWRXo
uJP4tgsJ6iy5uMUsKQpbPCoqMcrh8vFrkRCRMV6seJWpb7K66YfIpBBB7aCh
rY9AJ7PRqCCGUKHUu/rYq/bXuBMaq8dLGQlQultTKfVO4pkrtHE9UEYqC8Te
0XkXfTxyi6mwX9A00zCqCgLUhqe1A0LECZYWvS2ucWzovlniG8yIsQhG5M6m
NIjKzprEoqdmCWn7QXiqStOVbvnW1c+4J8ZhSvsENuuNBgkrR+Ttfq8BjkyH
q365A/iu7teP3hmuOrLbIZb8sGV/dFEu23Siyz9du4naSYp1G1cJxmokKNXQ
xa4p2g8fJtrOR4oDJKlXy8z24MhXqsdQ1JAKWR6uJWP0YHgF6uGboy3Rb6qJ
Az4G6w/A13UDVAmvUboKvHz/gb28l/VFTHFHnbAZDyag4jx7WbXY0LOxxls8
NtdTuK045ErNcMUIq8OvaD5YiHOaeK9TtUBKzQKF/mxEsWLahpTAcjYCEXPU
J5E6EundsFNYkg5gKqZZQqAqwNhxZUMphO5XPJFD73w9QY1nGMAxHgYAVoat
ZljfwIbm6dbIaOFVQBrbystcZAmaBN8tME1Eorg7r9Gglfti6Z00bWbeUMYL
qfORxKqkhgagm64zF0OPaucx1kAMwN7GAwv8KtVdKZZ8z5QVvFKmQWw0uieh
PjQd9Y+8wlqu/q2lwjqkcji6smnj5IrOeZcr14rZy8krjPlV1kldsmtikWvr
NTaqV9cvnOZwNV9E4l0Sa3W8qsJEwcSNkg7LcdUKdKdVgeGaOoU7I3MYBU6d
Uw5PVaOZPRnmyVeQE5vFv4GOClcAXgwuOahDd3rkN/Z0qi4kd+Tv85E9sEa7
OZxMsLYR/JZKA84/KP0rZLDfrowJGujKmJz9wudD19lLsj/9EjljzBkoE856
8o34BguitjZJSg542UOlFgvAnhF/h84r5o7dM26lnLmntHas/ZDzUp33OL4U
SuE0nijd8X6FpZKld426a8XiSLOoD+V02ytXqo2eS3oQWbhgZiR4Z1CJ/VZe
qadQCbmHnnxTfYxWY5qTBQBTm1kFYl5QZYZG34Lxza4N1FlvuLcJhed7xZDR
8OHL3rHcdp5fcX1KUOjZb0gQA4WBdmAoqYwccAfBaEo+KuZnXwFDs7ePeJYp
g4fZTU7lApWBLnko6L4MfNAfHneoaja/PaS7eDd6w81NSzamDoS9F6iZrIXV
DFgzBW5Cl2+iB51tBXsrzQ/uVhi0hYAfytU+o94PJ5tVcT9kAzSmTO/Nzt7D
07tKUgp32pp2xFyhlwlVMiMQ6nXIaInCcX6t/eVhx4SYrS5jyU6nSl5kHlxg
2QB7bYFzaPPWtOqf61r8MVYGILL8kkeVf84r2mUrsUqxVuQ3dj94b/HpMUyl
XieLV3NDbWJWvZSKOPgM9yTm4MSWBrSkjHXDOJXq3n7Jvyg2Z/vhdyWgZdp4
yr+AXQ1ibinGHze33gt7vd5HuZLKXbGBpc2wpwO1cdL/CKNttpzPGPp1ndrS
5uy/ub3FWQanA3Iz3mGy+J0IBKwVQMDxg3MtFVPu4LWjwc6d8rPb7hCHwUBw
eEehPDDTwgDwFABTtaG8VQR4nbS/OBb2i9fGz/rBjBy3EEdnZxdD9QOQMl6F
ypdfuSJMVaNHUUb9CNbCiVzBDOgW9FXhQX7wUYeY1HjXQOPuXSPX6/TuqViN
p5HDazPZcBWTBuvKSwTkaSGPx3Efxw3EryBdBEL7FwHyi1biUYTfh2KsB7Qw
NSyfNujquROBPcTzwOUJggBsl+gT8qy1l7CwVw4vdWm18EYVqhsohfDqdwg0
3Fcu+oTz8478dlbVIS9SQpc4M+P9PqAz4zCUvRgNeHZL1p9udwEplkh4xo9g
1i6m2/GuD9jha8Nub2E6gf5cv5bWv6eMs9TlPp62Z75vQ8tXPxm8o4wSljlz
rgqw2fo4HBO6kuLQ3j0KXv0Q0arpumnEqq0G6cyG6u4dUHBder91yLSqzDYH
Kg7oXmwUSkjcpbl/wQm0brFyUxuzDdqH/yiFi2+rAsZtV4WnfbjT8Z5TsnHj
WRm1D1/7D0Brax++qT8aG2j1Gv78pxqf7uJTeYi5vOqfW18YUtoIvFq1PAxb
Gpn0CiAF4jTKK5jcq13n3KHvjRufQcHCQr1I7Bu9Xm9TSB3vK0YakZ33GJlY
5dWWbgDJUnJ9MOfKCX3toEWHCrKfBaBoIRQ2hc18ra0t5N/UQWmP9iIKCywH
REylQ7nrCVlpG3HPG6e90aYir4ZhZ9a5nmG2eB1akJthGpxkii6elZs8WhvM
d+w1FLtvD7CKgMR+nVyTOfiHPSxZ4srX65/7Sb73/+LdV9tSclaWHCTKfqsy
gZAp90Yrv3BSUq8nNbzvGFYJqte7oF8EX40u7FMHRWNk+Sz8mXtf/x51IeXC
X/nX4PLf/b/wb1Tp3CtGfn+K1L2/+LXMcx4HZz44GfXPfjg+5yffPKn5/aNT
x0yCgU0o4H5/PeAfaP4Hb3j8Z17ytPJnjN6Qsiuj/8Gh7uz9e4s3GgR/3qir
AZvrgV/71i+c+1Oa5w52rFl5PLqwsD9n3f9/AS+YZ/h7/f/WwPzfIvDrrw8g
hrPmj9mIJyedxLKispf5IlHYjshPkVosOHsR5mukOqabbAz0xuWcdPzH9hVo
e5rSFc8GZ2Dk2zd1t/X/AJeixbt4mQAA

-->

</rfc>
