<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chroboczek-int-v4-via-v6-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="v4-via-v6">IPv4 routes with an IPv6 next hop</title>
    <seriesInfo name="Internet-Draft" value="draft-chroboczek-int-v4-via-v6-01"/>
    <author fullname="Juliusz Chroboczek">
      <organization>IRIF, University of Paris</organization>
      <address>
        <postal>
          <street>Case 7014</street>
          <street>75205 Paris Cedex 13</street>
          <street>France</street>
        </postal>
        <email>jch@irif.fr</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="T." surname="Høiland-Jørgensen" fullname="Toke Høiland-Jørgensen">
      <organization>Red Hat</organization>
      <address>
        <email>toke@toke.dk</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Internet Engineering Steering Group</area>
    <workgroup>Internet Area</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>We propose "v4-via-v6" routing, a technique that uses IPv6 next-hop
addresses for routing IPv4 packets, thus making it possible to route IPv4
packets across a network where routers have not been assigned IPv4
addresses.  We describe the technique, and discuss its operational
implications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://wkumari.github.io/draft-chroboczek-int-v4-via-v6/draft-chroboczek-int-v4-via-v6.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-chroboczek-int-v4-via-v6/"/>.
      </t>
      <t>
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/wkumari/draft-chroboczek-int-v4-via-v6"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The dominant form of routing in the Internet is next-hop routing, where
a routing protocol constructs a routing table which is used by
a forwarding process to forward packets.  The routing table is a data
structure that maps network prefixes in a given family (IPv4 or IPv6) to
next hops, pairs of an outgoing interface and a neighbor's network
address, for example:</t>
      <artwork><![CDATA[
    destination                      next hop
  2001:db8:0:1::/64               eth0, fe80::1234:5678
  203.0.113.0/24                  eth0, 192.0.2.1
]]></artwork>
      <t>When a packet is routed according to a given routing table entry, the
forwarding plane uses a neighbor discovery protocol (the Neighbor
Discovery protocol (ND) <xref target="rfc4861"/> in the case of IPv6, the Address
Resolution Protocol (ARP) <xref target="rfc0826"/> in the case of IPv4) to map the
next-hop address to a link-layer address (a "MAC address"), which is then
used to construct the link-layer frames that encapsulate forwarded
packets.</t>
      <t>It is apparent from the description above that there is no fundamental
reason why the destination prefix and the next-hop address should be in
the same address family: there is nothing preventing an IPv6 packet from
being routed through a next hop with an IPv4 address (in which case the
next hop's MAC address will be obtained using ARP), or, conversely, an
IPv4 packet from being routed through a next hop with an IPv6 address.
(In fact, it is even possible to store link-layer addresses directly in
the next-hop entry of the routing table, thus avoiding the use of an
address resolution protocol altogether, which is commonly done in networks
using the OSI protocol suite).</t>
      <t>The case of routing IPv4 packets through an IPv6 next hop is
particularly interesting, since it makes it possible to build
networks that have no IPv4 addresses except at the edges and still
provide IPv4 connectivity to edge hosts.  In addition, since an IPv6
next hop can use a link-local address that is autonomously
configured, the use of such routes enables a mode of operation where
the network core has no statically assigned IP addresses of either
family, which significantly reduces the amount of manual
configuration required.  (See also <xref target="rfc7404"/> for a discussion of the
issues involved with such an approach.)</t>
      <t>We call a route towards an IPv4 prefix that uses an IPv6 next hop a
"v4-via-v6" route.</t>
      <t>This document discusses the protocol design and operations implications
of such routes and is designed to be used as a reference for future
documents.</t>
      <t>{ Editor note, to be removed before publication. This document is heavily based
on draft-ietf-babel-v4viav6. When draft-ietf-babel-v4viav6 was
going through IESG eval, Warren raised concerns that something this
fundamental deserved to be documented in a separate, standalone document, so
that it can be more fully discussed, and, more importantly, referenced
cleanly in the future. }</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="operation">
      <name>Operation</name>
      <t>Next-hop routing is implemented by two separate components, the routing
protocol and the forwarding plane, that communicate through a shared
data structure, the routing table.</t>
      <section anchor="structure-of-the-routing-table">
        <name>Structure of the routing table</name>
        <t>The routing table is a data structure that maps address prefixes to
next-hops, pairs of the form (interface, address).  In traditional
next-hop routing, the routing table maps IPv4 prefixes to IPv4 next hops,
and IPv6 addresses to IPv6 next hops.  With v4-via-v6 routing, the routing
table is extended so that an IPv4 prefix may map to either an IPv4 or an
IPv6 next hop.</t>
      </section>
      <section anchor="operation-of-the-forwarding-plane">
        <name>Operation of the forwarding plane</name>
        <t>The forwarding plane is the part of the routing implementation that is
executed for every forwarded packet.  As a packet arrives, the forwarding
plane consults the routing table, selects a single route matching the
packet, determines the next-hop address, and forwards the packet to the
next-hop address.</t>
        <t>With v4-via-v6 routing, the address family of the next-hop address is no
longer dermined by the address family of the prefix: since the routing
table may map an IPv4 prefix to either an IPv4 or an IPv6 next-hop, the
forwarding plane must be able to determine, on a per-packet basis, whether
the next-hop address is an IPv4 or an IPv6 address, and to use that
information in order to choose the right address resolution protocol to
use (ARP for IP4, ND for IPv6).</t>
      </section>
      <section anchor="operation-of-routing-protocols">
        <name>Operation of routing protocols</name>
        <t>The routing protocol is the part of the routing implementation that is
executed asynchronously from the forwarding plane, and whose role is to
build the routing table.  Since v4-via-v6 routing is a generalisation of
traditional next-hop routing, v4-via-v6 can interoperate with existing
routing protocols: a traditional routing protocol produces a traditional
next-hop routing table, which can be used by an implementation supporting
v4-via-v6 routing.</t>
        <t>However, in order to use the additional flexibility provided by v4-via-v6
routing, routing protocols will need to be extended with the ability to
populate the routing table with v4-via-v6 routes when an IPv4 address is
not available or when the available IPv4 addresses are not suitable for
use as a next-hop (e.g., not stable enough).</t>
        <section anchor="distance-vector-routing-protocols">
          <name>Distance-vector routing protocols</name>
        </section>
        <section anchor="link-state-routing-protocols">
          <name>Link-state routing protocols</name>
        </section>
      </section>
    </section>
    <section anchor="icmp-considerations">
      <name>ICMP Considerations</name>
      <t>The Internet Control Message Protocol (ICMPv4, or simply ICMP)
<xref target="rfc0792"/> is a protocol related to IPv4 that is primarily used to
carry diagnostic and debugging information.  ICMPv4 packets may be
originated by end hosts (e.g., the "destination unreachable, port
unreachable" ICMPv4 packet), but they may also be originated by
intermediate routers (e.g., most other kinds of "destination
unreachable" packets).</t>
      <t>Some protocols deployed in the Internet rely on ICMPv4 packets sent
by intermediate routers.  Most notably, path MTU Discovery (PMTUd)
<xref target="rfc1191"/> is an algorithm executed by end hosts to discover the
maximum packet size that a route is able to carry.  While there exist
variants of PMTUd that are purely end-to-end <xref target="rfc4821"/>, the variant
most commonly deployed in the Internet has a hard dependency on
ICMPv4 packets originated by intermediate routers: if intermediate
routers are unable to send ICMPv4 packets, PMTUd may lead to
persistent black-holing of IPv4 traffic.</t>
      <t>Due to this kind of dependency, every router that is able to
forward IPv4 traffic <bcp14>SHOULD</bcp14> be able originate ICMPv4 traffic.  Since
the extension described in this document enables routers to forward
IPv4 traffic received over an interface that has not been assigned an
IPv4 address, a router implementing this extension <bcp14>MUST</bcp14> be able to
originate ICMPv4 packets even when the outgoing interface has not
been assigned an IPv4 address.</t>
      <t>In such a situation, if the router has an interface that has been
assigned an IPv4 address (other than the loopback address), or if an
IPv4 address has been assigned to the router itself (to the "loopback
interface"), then that IPv4 address may be used as the source of
originated ICMPv4 packets.  If no IPv4 address is available, the
router could use the experimental mechanism described in Requirement
R-22 of Section 4.8 <xref target="rfc7600"/>, which consists of using the dummy
address 192.0.0.8 as the source address of originated ICMPv4 packets.
Note however that using the same address on multiple routers may
hamper debugging and fault isolation, e.g., when using the
"traceroute" utility.</t>
      <t>{Editor note: It would be surprising to many operators to see something like:</t>
      <artwork><![CDATA[
> $ traceroute -n 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 64 hops max, 52 byte packets
 1  192.168.0.1  1.894 ms  1.953 ms  1.463 ms
 2  192.0.0.8  9.012 ms  8.852 ms  12.211 ms
 3  192.0.0.8  8.445 ms  9.426 ms  9.781 ms
 4  192.0.0.8  9.984 ms  10.282 ms  10.763 ms
 5  192.0.0.8  13.994 ms  13.031 ms  12.948 ms
 6  192.0.0.8  27.502 ms  26.895 ms
 7  8.8.8.8  26.509 ms
]]></artwork>
      <t>Is this a problem though? If this becomes common practice, will operators
just come to understand that the repeated 192.0.0.8 is not actually a looping
packet, but rather that the packet is (probably!) making forward progress?
What if it goes:
<tt>192.168.0.1 -&gt; 192.0.0.8 -&gt; 10.10.10.10 -&gt; 192.0.0.8 -&gt; 172.16.14.2 -&gt; dest?</tt>
}</t>
      <t>{ Editor note / question:
192.0.0.8 is assigned in the <xref target="IANA-IPV4-REGISTRY"/> as the "IPv4 dummy address".
It may be used as a Source Address, and was requested in <xref target="rfc7600"/> to be used
as the IPv4 source address when synthesizing an ICMPv4 packet to mirror an
ICMPv6 error message.  This is all fine and good - but, 192.0.0.0/24 is
commonly considered a bogon or martian</t>
      <t>Example (from a Juniper router):</t>
      <artwork><![CDATA[
wkumari@rtr2.pao> show route martians

inet.0:
             0.0.0.0/0 exact -- allowed
             0.0.0.0/8 orlonger -- disallowed
             127.0.0.0/8 orlonger -- disallowed
             192.0.0.0/24 orlonger -- disallowed
             240.0.0.0/4 orlonger -- disallowed
             224.0.0.0/4 exact -- disallowed
             224.0.0.0/24 exact -- disallowed
]]></artwork>
      <t>This means that these packets are likely to be filtered in many places, and
so ICMP packets with this source address are likely to be dropped. Is this a
major issue? Would requesting another address be a better solution? Would it help? If it were to be allocated from some more global pool, it would still
likely require "magic" to allow it to pass BCP38 filters.
}</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques described in this document make routing more flexible by
allowing IPv4 routes to propagate across a section of a network that has
only been assigned IPv6 addresses.  This additional flexibility might
invalidate otherwise reasonable assumptions made by network
administrators, which could potentially cause security issues.</t>
      <t>For example, if an island of IPv4-only hosts is separated from the IPv4
Internet by routers that have not been assigned IPv4 addresses, a network
administrator might reasonably assume that the IPv4-only hosts are
unreachable from the IPv4 Internet.  This assumption is broken if the
intermediary routers implement v4-via-v6 routing, which might make the
IPv4-only hosts reachable from the IPv4 Internet.  If this is not
desirable, then the network administrator must filter out the undesirable
traffic in the forwarding plane by implementing suitable packet filtering
rules.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="rfc7600">
          <front>
            <title>IPv4 Residual Deployment via IPv6 - A Stateless Solution (4rd)</title>
            <author fullname="R. Despres" initials="R." surname="Despres">
              <organization/>
            </author>
            <author fullname="S. Jiang" initials="S." role="editor" surname="Jiang">
              <organization/>
            </author>
            <author fullname="R. Penno" initials="R." surname="Penno">
              <organization/>
            </author>
            <author fullname="Y. Lee" initials="Y." surname="Lee">
              <organization/>
            </author>
            <author fullname="G. Chen" initials="G." surname="Chen">
              <organization/>
            </author>
            <author fullname="M. Chen" initials="M." surname="Chen">
              <organization/>
            </author>
            <date month="July" year="2015"/>
            <abstract>
              <t>This document specifies a stateless solution for service providers to progressively deploy IPv6-only network domains while still offering IPv4 service to customers.  The solution's distinctive properties are that TCP/UDP IPv4 packets are valid TCP/UDP IPv6 packets during domain traversal and that IPv4 fragmentation rules are fully preserved end to end.  Each customer can be assigned one public IPv4 address, several public IPv4 addresses, or a shared address with a restricted port set.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7600"/>
          <seriesInfo name="DOI" value="10.17487/RFC7600"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="rfc4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark">
              <organization/>
            </author>
            <author fullname="W. Simpson" initials="W." surname="Simpson">
              <organization/>
            </author>
            <author fullname="H. Soliman" initials="H." surname="Soliman">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6.  IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="rfc0826">
          <front>
            <title>An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware</title>
            <author fullname="D. Plummer" initials="D." surname="Plummer">
              <organization/>
            </author>
            <date month="November" year="1982"/>
            <abstract>
              <t>The purpose of this RFC is to present a method of Converting Protocol Addresses (e.g., IP addresses) to Local Network Addresses (e.g., Ethernet addresses).  This is an issue of general concern in the ARPA Internet Community at this time.  The method proposed here is presented for your consideration and comment.  This is not the specification of an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="37"/>
          <seriesInfo name="RFC" value="826"/>
          <seriesInfo name="DOI" value="10.17487/RFC0826"/>
        </reference>
        <reference anchor="rfc7404">
          <front>
            <title>Using Only Link-Local Addressing inside an IPv6 Network</title>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="E. Vyncke" initials="E." surname="Vyncke">
              <organization/>
            </author>
            <date month="November" year="2014"/>
            <abstract>
              <t>In an IPv6 network, it is possible to use only link-local addresses on infrastructure links between routers.  This document discusses the advantages and disadvantages of this approach to facilitate the decision process for a given network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7404"/>
          <seriesInfo name="DOI" value="10.17487/RFC7404"/>
        </reference>
        <reference anchor="rfc0792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="rfc1191">
          <front>
            <title>Path MTU discovery</title>
            <author fullname="J.C. Mogul" initials="J.C." surname="Mogul">
              <organization/>
            </author>
            <author fullname="S.E. Deering" initials="S.E." surname="Deering">
              <organization/>
            </author>
            <date month="November" year="1990"/>
            <abstract>
              <t>This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path.  It specifies a small change to the way routers generate one type of ICMP message.  For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="rfc4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis">
              <organization/>
            </author>
            <author fullname="J. Heffner" initials="J." surname="Heffner">
              <organization/>
            </author>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets.  This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="IANA-IPV4-REGISTRY">
          <front>
            <title>IANA IPv4 Address Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="https://www.iana.org/assignments/iana-ipv4-special-registry/"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAEI8JmIAA6Va65LjtnL+j6fAGacqMylJK2k1N1Vie7KztsfZW2bWcblc
W3UgEpLg4UUmSM3KLudZ8hjnd86L5evGhaSktX0qtmtMkUCj0f31FRgOh6I2
dabn8uTu3XYmq7KptZVPpl5LVUi8u5CF/ljLdbk5EWqxqPQWY7ez4dao4fbi
RCSq1quy2s2lrVNhm0VurDVlUe82oHr38v1XQqRlUqgcP9NKLethsq7KRZn8
oh+HpqiHkdhwPBGg/lyoSiviqKh1VehavixWptC6MsVKPtT+4WvwCp6eyupx
RY/dCTcgcCIe9Q5fU3Dh3w9vaX2x1UWj50LKT8yT0jF/En7mymT4SY+qStb+
cQUhNQv8eHpsclWZZ7+/O5qSQVi2xpR1XW/s/NkzP3XkaI1M+QdE/uDzaF3n
2YkQqqnXZYUtDrGolMsmy5wCvm0y09hf5ItIgAeU1UoV5hdVQ3EQ1/3dVwP5
XWG2urKm3slyKd+BS8tjbV1pXc/5eShfKKvl5Xgy878vz6fjczdavtCp/ign
z/2nrypVJJp/aCfRn5L1l6Yyy9GyCqw6Nr9XVaUL+R8sHH5vCovXo+6rPtNf
l+Uq0wP56tWL7hJPTOlLL2bouL/Q+/JRy2/+/jeTqSIdfvv3v1UrXVhdHFng
XqfyG1V3ideY/SX9GaWPQhRllWPslqFVLZPLi/F4LoQplnsfZlcXE/84vppe
hOGz8Sy8vbye+sfJ5HoSp0358e7mzc3w7t1/zYb3L7++e3h//4NThjdk+izZ
mG/StNLWgvOVgdZ2PCpCg3WCLbrHFMicy6XKrNOQhZFpS7y771J+r4H1iNun
p5FRhRqBwDMFg18VuS5q+4xeDs0GiLQbnRiVDSu/+jMhxHA4lGqBXyqphfhe
y01VbkogqONR2AfBwAdSyVon68L83GhZr1UtGwvfFH3SED5JKLdHvIeUw1S3
/Y1KHnVtB5jbWNjwI30xtcSC1iwy0Cydv+Phwg+XKqkwAIsDLORc5NNaV9qN
rKxcq62WRVnLhQZC3daBDCYRmRmRuGSqbVKZBTGv261gX0UqU2OTBssYrFhu
dMUgU5kw+SYzCf+yIyew3KRppoX4jPxYVaZNQl+FeA+qaZmbQhU17T4nOw0S
MAWvGj0bzDHIrBUw70yoOAnaqMukzGSC1esKC5EcwtdakdCe1iZZEzkoI5WL
HaZjbZhZ6ikkBDmI1r8NaoBIiOE+MUP0AT0l3HJN5TWdq42NCthUemk+QsXY
lILbhf8GUnOT7eQpaxqaJ1ScYVkRohX0vlEGCoNQEMmw7Kp0goFElirRrAbS
slmtF2X1z3G9oMYBQ0p/VFAJTFd4O5CkV+yBdSSP/hN48DOm4/Fkni6u5uP5
ZD5/djHbG67r9RiL6avxfD6ZPp/Nzy8ur+Lc56PxaDLB32fT/Ylx7uR6ilHT
0QRGtSZYeqmTgBm42GmSlE5H0E2QYl8bMOBqR+aiRVelcI3amV4rLcZvifiw
a0FzSoB74weI2yMD3tyeyR/vv3pBDvBDgGhCEQRKIg3y4sFviXtty6xhMb+L
NG7u3zki5DqPEZkRDAhAvJEIeq9Ut/vMFI/DTO10Fd+fKnny+uZF+H1yNmih
DkKFYLxjdrQNXrhDaVkhpFiHX10kQHBD8T4Ygk6Di4Fd37Fq1GaDVIestypz
Judcxob3rBaQnyNXswsiG4ZdNUWqyNnCWyA/sRj5tN6F2RGYzmgY5PTpQA52
XTYZDBhkC0EjLIjGr8685t2F67UzcA3gMGhCfuihRnsQC01fPORqJBnNas2w
cQbRTSxnrehN4WXNagxqowmwyo5SMD3LiOVyUStDbrextB5hYgAvMCDlUNKi
sx25WdGJA07G/wB/F2HVkTi9I4eT1AMKHxAGiaAXRmxdVvoIqgCH1FQ6qeGq
vJijItjaCLP1vlv0EUttS+MMds325zxZ8E6yaq0jWpjK6nKlSWkd9CZlnpcF
OEjLgrQd/JwVTnpE/u3DXUvFNqbWZyMXYYJlHQutrQT3SgUsC7BXtUlgAhVv
Hl6X0Ymwg1Xhfg15+Ufy6v2QvGhMlorAo8O/D7o92GCm/pjoTS2dgUidrshH
AfBYJ8sE9rM1qYvuBIwCejBbymexCg0Gp5YDE9QLooZkGbjzO4pAhBwKVkJw
HmWistapEJNk0E1dFmVeNjbbCSy5NCuEtHTQVaFtoBZfZ+mC9E2ONS9T/hpz
AR+cHWRcHEwIZGvFXsDWGAUWINtODtKRDWhpQ0gQzpYDIGisWWJqQaAEc03C
Tgs7A9/wRZiYq6KBdwkbcPxU+ucGWE4hr9MHjeGZLdkRU+L6gWOlCmkNjXfI
FqgGGw7d2zLbgkm2MJYBBAoHWJUqWY/OOBuk/fiEg6BAXtNGb+EdWpsIHoBO
if00UjOIoRhUoA35zMCg33KEPDwn5MLgiRoA051kTOypjoYSYe2FT8jVLilS
nDXpJfRHUCLJLBvKbURgg0LAr/IlIIdvcK1k8jy/0nlJUlroJSl70ywCAyPZ
3wie11ptKQlawERTAZG74tDoejlcqIXOUBhCGigLJWcFn/qMIskKlx0Fg757
+fA13JzKBqEWq5ShvQETCTJKD3lb5trFBfy1ohOaSDC62kbBBL7xgrM4q+Ef
FG0cSMasjHxTGISXpXA2VbPhgUBO8qBCdhd1mHIqPXCfoKuyqhnVg1b4qUgy
rQr2QKxxp4iR/I3y6RcULQqna9LnLRBWGKdudn6PeiephWCRG3z38P5k4P4v
37zl5/uX//nd3f3LW3p++Obm1av4IPyIh2/efvfqtn1qZ754+/r1yze3bjLe
yt4rgVzkhxNXKpy8fff+7u2bm1cnbhNdFKhKewGzh4WNcK5nRag9WNz//uLd
//7PZCZ//fUvsNcpasrffvM/riaXM/yAsyncahwp3E/IC+n9ZqNVxUqDcSKr
MdAucmPFKcRTIclNAc7/8iNJ5sNc/usi2Uxmn/sXtOHeyyCz3kuW2eGbg8lO
iEdeHVkmSrP3fk/SfX5vfuj9DnLvvCTUvA0OQog3eyUVWSU5De2hvkCseSoj
2CkUbwD0wlWlMeyLNoD7dG0//x44e6NQ3hTkEXQne7FrwCAVVEfJWEcNDvMK
aOmzz+RDrLSO5R4O95+o0uSxKi3EwFil+SJsuFeE+W3llO75EmwQJp+5IFxX
ykVhBJ/DavWAV7d+Jzjw4u5FWwYKkmk3n4uj2tDBBTsFphg/ji4rojwwTxdI
6eGonCj2olSudq4EKX0UjgMoTHJi2q7u9BJh1RFWDwNONQeVmfGhDOnWvkYj
FB1dn6UI/VEnnABzfcs1WqxRfGoHedzYtoxECEC96EHbciAcB1QRNVltj2Wy
SMW1ayNQrpn5PgpkUyc+bmhfFg0QMoCLHHm9PVqyOP/kVw+bZvbq8mitB7n+
nlL7tU6Q3UGhxMWPQHxaQYupY9BZ9idpOBDMfSp5CKCAjv3U5jhY+h2vT9Tn
eWOpJSWVz6KjLFEXcT9AV0MvLaQLxnLzh9PDT236CA89RWCRxjpH0PY4sRYi
BSImNkG18rosrZeAWa1r+XvFC/wGEaQKn5F59242kG9u/fP24uyInex3rmzf
f0Xa/w8jUXZXUL+94Ky+LdUPXTRJ5WlNG65K5yawJS5njvhiKR8YHQfgdO52
pQtsMzM2bFV0nOORVl5LhvIl9rAukdUu49YfDVdf4kBic+qzdmgfyG7DPUeu
Un7PQQeLD5V8EfNh2Arx1JezbTaUsBFLByKAor8pn8gzDXpwajyWQrEGbpcZ
drYwGZV1vuDjBSNNEUV0sHPXTih0TFKjV2eR8UqeNBS5KTeun3MYh54OvQwd
onEnbq/XAWRR81htlcl4LsDNA3m1+Hav0KU0j6ZRZc7fAT42FmV994I1capH
q9HAjQwtPcoRnOV8Jm8NJduJHm7hkzvt8o710LBXVOBSgXloSJbb0C9ev6Pc
2ULYvlRyZhe7zfhYwwbka7CvUGi37Tuau51RswbeEYjYMbUzwR29y+vpBwf/
CL5Kk8zTGNdDpb2pDJ3oYL7vy4kEQYpqA7UqUNabxLXZ9aJZrVzfN7ooSjaY
jdjHIIe80KKEk6L+mYMQoOA6BEGupKKTbo+tKSqN6tXhntAsOm9O+oucDeSi
4UbFjpfj8plaWd01BRturrGLuj1y8Mvn4EWWHB8eTZFyUtVlp7+43xqp/gFV
Wgf1qd5k5c5VBr0zAsh6R9FiTzgWNisWvoezxxtE+ZrYAuSw7I7SPZjC6/ff
ybb/e/oOv1OnYjrO+uCji8pW2Hy9zmX0tT2pUxTzRDjm5eqjyZs8BH1rfvFp
aOgYEFkf/hgMlNStTaZ9F5NdoNgCNagSWXrMmKfB1TZLABwM63JIjLhm9XTy
wSnfzxWsibat9il5rtk613QIgjHkWYqEBCz2BNyH3TExz6VZ9j6IgA3iuynC
ti0x3ac+8LskzKEUZlPZ0LmuramAXGQYBueRkY34Bjq5+eXSJIDObaNddgXZ
EuhoSLuXgc8eHTNtF8xxE5KUHk3p67WQqsS9B7bD2j4+cnrCfpmbSr2ytl8K
h15akEx7BCV6DFQ60YYaEwysECz5RMj3Gu2R873QTG5ToLDrGNdCG6TDLlfA
bVYmDnYbIMAd5RgHjhxWea7EPle9SEEHC4VvrsE+6ka5lqZpMx4wzLA8um0i
Lj5FXJ4634PRjsusLDcL8B+LOPbqZrkvq0i65dsl7FGCNaqEpTz1b08CYRFZ
pNOY2kkHrPaIO9cdG298klE2VULlbdeh9wVOIWC531Fm7IYQ7PJsz2HCZyUh
/dAfYUDG97lyDY9bGJv3sXnvuqU0SNwPp1MynAfNJ7dyNrpyjdOL8fhDTJgo
nlrnl9q+fNrk+S62/N0x3xjT+zsN36l//MkdizdlTS1vzqtCGzWs0zv8AYs5
6jmzydoYBDGLtco3XAOFmMr1mMJQSK7MPNhcsGIsR/rihI78NRM7kUgpKKmi
HminBTqXd7V8CodStqkQ4q0/r8xVsfON2dKZttW6033MzCOd0P63/0d8Lv9J
tivKYSGvRvyv6LwFFf9WnvoHwOxixg0BLPlxIM+n8Mh1qDOtkBPJSphcXNGp
LH6Mrq5nMrf0dH3+3D/NLuhJyKnsqExej8aTKY/ASufuaTIdTScTHvy8N/hq
NJud85Dr0Wx64Z8ur9zY2R7h6yvPxHg0vZqGx0vPxnlv9OT56Drw/Hw0fj4J
jFzPrnj4RW/49HJ0PnYkpxfY7TmPuZRRdvT6fHxNr6P8xZ11rpAzOVgTlUyU
iX5BZsdfFhoBVIfTKQxTMA5qCXFSHnUtfmpcrGV9NYg7FTeM47ko/PlGM95b
pt15pQTFxp2QsK/ihoVvNVAqhgXWwRI6zQRMPiWmKZ/5y1m4NxJvM1Tliozk
C/E9R7sltahXpbZz8dcuMoafd/ihH3jp/zv8dknzRpPZaEo/KaX74q/it70j
AvlM/txQtlcWc9Hba3SrPgH58fCG0IfgMdw1P3Yr8ah7RMfRe35UyQfnW266
Nf+TsnwOBDbcctGNdc4/hF+KV9rzUOwWUFDjO/K3cIrcdVRs7qaqfJ+MPl1I
zb9zV03wTRLjvDWgsjSFu8uxKstUDkm1gyhfvjSBmisma4kvW2iXclGuqLYG
ZTqrxHLipbvtIU+5zFfy26Yw5POcGzzr+hh/de/Lqq6mo40qP+d+eOxvMUFL
1790PRrPRe/WxtgzN6brJUkt6VpUlsE1p8fHXYFJ34HCUGTFR0dPYKv/0Piu
kP7MhOksMPQnx09ncXzc6B8Pnh4f3XoXVn+uVTiGIjRFJ80pMQWEbOdBuTRZ
zRoHYDmSbJD0agdpgSqM69kw25f+WGAPugdk06rcbOg8NDo7lCg/UQpER55f
yO85lnlzcVB3GVSgSIkh/tSUYYR2WJgGr7LW2Yb9JZ6fdDzoIXEk7PAYoxQE
3QnYKoPTylCHlhlfVHCx1J2Fe8b9Ga48ydXKJCd8GYakS8PxvIEnocOi51de
Zsga+KAMmUtTUR/kWNUfb7bZ30vP6aw/thPcYR63bmBsdImMuIjXC3wDhTiC
jNWKEuZ4Lc/6LIpuQ8Sj8ZDCCjbyg6t5nd5/8B6f6CHl1KaE0W5VZuhOpCu4
nww19fiyDafyoN3kG3dwmKuUttC5PZabgm48cvxq0ztSxqakostwUEoU5ZM2
SNadkyMn+qq9dDZw2TS+ZcrVXiSeIe/R1cgEU3+4lLatSb6MGMvQxa6tiTqX
KY7dYGzFNGiF29+Rk1ArjJ0TRntR6YBHGE63NdFnM1bLUS9RtLS5RVU+gknj
7xLECrhq9xTrr2N9fid8xzIjkMjsM/gnWAtZi8ss6HTVVLFKKGT3lsaetCh9
ccZEZZ27CFLE+SJUpeF4er+vTw2BboEZO4DhVhOT5sZukzF+PnM3gA8ttWuN
/hYJj1RJuG3K10258gKVm+SxKJ8yna74xoL4dV40+YL86L+d8D3hE7iG929v
34JAGKlH4v8A3nmdi1MwAAA=

-->

</rfc>
