<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-savnet-anti-ddos-03" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="SAV-D">SAV-based Anti-DDoS Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-savnet-anti-ddos-03"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Li" fullname="Linzhe Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>lilz@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Routing</area>
    <workgroup>SAVNET Working Group</workgroup>
    <keyword>Source Address Validation</keyword>
    <keyword>DDoS Detection and Mitigation</keyword>
    <abstract>
      <?line 121?>

<t>Existing SAV schemes can not effectively defend against IP Spoofing DDoS under incremental deployment.
This document proposes SAV-D, a savnet based distributed defense architecture to enhance SAV's defense.
The main idea of SAV-D is to collect and aggregate more threat data from existing SAV devices and then distribute crucial knowledge to widespread devices, thus significantly expanding defense across the entire network.</t>
    </abstract>
  </front>
  <middle>
    <?line 127?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed Denial-of-Service (DDoS) attacks have been a persistent cyber threat, where IP spoofing DDoS is one of the major contributors.
Amplification DDoS typically exploit IP spoofing to generate large volumes of traffic with small requests, allowing attackers to overwhelm the target's resources while evading detection.
Some other DDoS attacks (e.g., TCP SYN Flooding <xref target="RFC4987"/>) also forge source IP addresses in order to drain the target's resources.</t>
      <t>To eliminate IP spoofing, several Source Address Validation (SAV) schemes have been proposed, such as SAVI<xref target="RFC7039"/>, uRPF<xref target="RFC3704"/> and EFP-uRPF<xref target="RFC8704"/>. 
However, the defense effectiveness of current SAV schemes highly depends on the SAV devices' deployment ratio.
A large number of spoofed packets can only be prevented with a significantly high deployment ratio, but the incremental deployment process is often slow.
According to CAIDA's Spoofer Project<xref target="CAIDA"/>, 24.9% of IPv4 autonomous systems (excluding NAT), and 33.3% of IPv6 autonomous systems are still spoofable by March 2023.
This indicates a limited SAV deployment, thus the defense effectiveness.</t>
      <t>In the above context, this document offers an SAV-based anti-DDoS architecture (SAV-D) that incorporates the following advances.</t>
      <ul spacing="normal">
        <li>
          <t>SAV-honeynet based threat data collection. Each SAV device functions as a honeypot that does not directly drop spoofed packets but instead records the spoofing characteristics and sends them to a centralized control plane.</t>
        </li>
        <li>
          <t>Collaborative defense with both SAV and non-SAV devices. The control plane detects ongoing attacks and generates filtering rules.
These rules are then distributed to both SAV and non-SAV devices along the attack paths to manipulate malicious traffic.</t>
        </li>
        <li>
          <t>Threat information sharing with the victim-end. The control plane shares attack detection information and IP blocklists with victim-end defense systems to assist their mitigations.</t>
        </li>
      </ul>
      <t>Through the mechanisms of honeynet, data aggregation and distribution, SV-D can fully leverage the value of SAV devices and threat data, resulting in a significant defense improvement.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<!-- # Body [REPLACE] -->

</section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>The effectiveness of existing SAV schemes highly relies on the deployment ratio of devices, which is currently limited.
Adversaries often actively test their bots for plausibility, packet loss, and amplification benefits.
This testing can force the bots to migrate from SAV domains to non-SAV domains, resulting in fewer spoofed packets being blocked by SAV devices.
Additionally, uRPF and EFP-uRPF have issues with filtering accuracy in certain scenarios.
Some managers may hesitate to enable SAV due to the probability of filtering errors.
Moreover, SAV can prevent spoofed packets from being sent out, but it cannot provide protection for the deployers.
The lack of direct benefits may also impede the deployment process.
In this context, there is a strong need to improve the defense capabilities of current SAV practices.</t>
      <t>To achieve the goal, it is essential to consider the following limitations. 
Firstly, due to the attack testing, directly dropping spoofed packets can reduce the possibility of capturing threat data.
Secondly, in amplification DDoS, the reflected packets sent to victims have the authentic src-IP, making them unfilterable by SAV devices. 
Lastly, although today's SAV mechanism can filter spoofed packets at local devices, the important threat information they provide has yet to be fully utilized. 
If victims were made aware of the type of spoofing traffic targeting them, they could execute faster and more accurate countermeasures.</t>
    </section>
    <section anchor="sav-d-architecture">
      <name>SAV-D Architecture</name>
      <artwork><![CDATA[
+------------------------------------------------------------+
|               Control Plane (SAV Controller)               |
+------------------------------------------------------------+
| +--------------+  +----------------+  +--------------+     |
| |Detecting DDoS|  |Generating Rules|  |Issuing Rules |     |
| +--------------+  +----------------+  +--------------+     |
|                 -\                  -\                     |
|                 -/                  -/                     |
|                   +----------------+  +--------------+     |
|                   |   Maintain IP  |  |Sharing Threat|     |
|                   |   Blocklists   |  |Information   |     |
|                   +----------------+  +--------------+ ... |
+---------/\-------------------------------------++----------+
          ||                 +-------------------+|
          ||                 |+------------------+|
          ||                 ||                  ||
+---------++-----------------\/--+ +-------------\/----------+
|            Data Plane          | |    Data Plane (Legacy   |
|           (SAV Devices)        | |Devices,Victims' Defense)|
+--------------------------------+ +-------------------------+
| +----------+ +---------------+ | |    +---------------+    |
| |Monitoring| |   Filtering   | | |    |   Filtering   |    |
| +----------+ +---------------+ | |    +---------------+    |
|              +---------------+ | |    +---------------+    |
|              |Receiving Rules| | |    |Receiving Rules|    |
|              +---------------+ | |    +---------------+    |
|                ...             | |           ...           |
+--------------------------------+ +-------------------------+

          Figure 1: The SAV-based Anti-DDoS Architecture
]]></artwork>
      <t>The proposed SAV-D is shown in Figure 1, whitch can be deployed on both intra-domain and inter-domain savnet.
It introduces a centralized control plane (i.e., the controller) that connects SAV devices, legacy devices, and victims' defense systems. 
The functions of the controller can be divided into three parts: attack detection, analysis and defense execution.
The controllers can collect spoofing characteristics from widespread SAV devices (as honeypots) and aggregate them for further analysis.
From a whole viewpoint, the controller can detect ongoing attacks and generate filtering rules for both SAV and non-SAV devices.
In addition, the controller can maintain IP blocklists based on the information reported by SAV devices, whitch can assist in detectiong DDoS attacks and generating filtering rules.
And then the rules will be distributed to corresponding devices to perform filtering.
Moreover, the controller will share the attack information with the victims' defense system to assist in their defense operations.</t>
      <section anchor="sav-controller">
        <name>SAV Controller</name>
        <t>The controller is a logical entity that can be implemented as a distributed or centralized cluster system.
The placement of controllers may take several factors into consideration, including latency, resiliency, and load balancing to connected devices.</t>
        <ul spacing="normal">
          <li>
            <t>To collect spoofing information, the controller will passively receive the data sent from the certified SAV devices.
The collected spoofing information should include but not limited to timestamp, 5-tuple (i.e., src-IP, dst-IP, src-port, dst-port, and protocol), TCP flag, packet size, and amounts.
This information will be readily stored in a database for further analysis.</t>
          </li>
          <li>
            <t>To analyze the aggregated statistics, the controller retrieves the spoofing information periodically (e.g., every 10 seconds).
The spoofed packets are analyzed based on their src-IP to detect reflection attacks or flooding attacks with certain algorithms.
A large volume of spoofed packets using a specific protocol (e.g., NTP, DNS) is a clear indication that the src-IP is being targeted by reflection attacks.
For flooding attacks, the posssible evidence is a large number of spoofed packets with same target IP and different source IP.
The detection results include the attack target, type, duration, malicious IP lists, etc.
The detection algorithm should also fully consider the source of the forged source address packets. SAV devices deployed at different locations may report different levels of information.</t>
          </li>
          <li>
            <t>Generating filtering rules based on detection results is a straightforward process.
Before the reflection, the filtering rules are based on src-IP and ports.
After reflection, the src-IP is the server's address, and the dst-IP is the victim's address.
Considering the reflected packets are often much larger than legitimate packets, filtering rules could be generated based on dst-IP, ports, and packet size.
The time required to generate filtering rules depends on the severity and duration of attacks.</t>
          </li>
          <li>
            <t>Communicating with relevant devices consists of two folds.
One fold is distributing filtering rules to SAV and legacy devices and receiving feedback from SAV devices.
The other fold is to provide the victim's defense system with attack detection information, which is essential to efficiently stop the attack traffic.
In addition, the controller may generate more advanced threat intelligence information, such as geographic distribution statistics of IP blacklists, attribute statistics of forged IP, and so on.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-device">
        <name>SAV Device</name>
        <t>The SAV devices refer to routers or switches that are capable of validating the source IP address, including SAVI, uRPF, etc.
Compared to simply dropping spoofed packets, SAV devices are required to selectively allow spoofed packets through if they do not match the filtering rules.
This mechanism can be considered as a SAV-honeynet that records threat data related to spoofing.</t>
        <ul spacing="normal">
          <li>
            <t>The SAV device must register it to the controller when being installed, in which a unique identification number and other information (e.g., location, management IP address) may needed.
Whenever a spoofed packet is detected, the SAV device will record its timestamp, 5-tuple, TCP flag, packet size, and so on. 
However, only if the spoofed packet matches existing filtering rules, will the packet be dropped.
After a certain interval, the recorded data will be compressed and sent to the controller.</t>
          </li>
          <li>
            <t>Modern devices are generally capable of filtering based on packet length and counting the number of filtered packets.
Upon receiving filtering rules from the controller, the SAV device must install them into its data plane.
The SAV device also needs to record the number of packets filtered by each rule.
If a rule filters no packet during some periods, the rule will be automatically removed to save the rule's space.</t>
          </li>
        </ul>
      </section>
      <section anchor="legacy-device">
        <name>Legacy Device</name>
        <t>The commercial routers that are widely deployed in production are considered to be legacy devices.
Access Control List (ACL) is universally supported in today's routers for packet filtering.
Legacy devices can achieve extensive filtering by simply connecting their management interface to the controller and receiving the rules. 
Since ACLs may vary across legacy devices, filtering rules must be adapted to meet the specific requirements of each device.
The legacy routers can join the SAV-D system by registering it to the controller with information similar to the SAV router.
Once registered, the legacy routers can receive the filtering rules from the controller in a safe and trusted channel.
These rules will be installed into the data plane.
Similar to SAV devices, if a rule filters no packet during some period, the rule will be automatically removed.</t>
      </section>
      <section anchor="victims-defense">
        <name>Victims' Defense</name>
        <t>Victim's defense can be a DDoS mitigation system, a dedicated DDoS defense device, or any system or device that can receive filtering rules and threat information.
The SAV deployers can request access to the attack detection information related to themselves.
The information includes various details such as the attack target, type, duration, and malicious IP lists.
These details can serve as auxiliary signals to boost the detection time.
In addition, SAV-D can provide real-time updated IP blocklists, which can be efficiently used for blocking malicious traffic.
In an ideal situation, the defense system could provide an interface to directly receive the information and automatically perform corresponding filtering policies.
This mechanism could improve the effectiveness of DDoS defense and incentivize more SAV deployment.</t>
      </section>
      <section anchor="connection-example">
        <name>Connection Example</name>
        <artwork><![CDATA[
            +-------------------------------+           
+-------+   |  +-------+         +-------+  |  +-------+
| SR 1  +---+  | SC 1  +----+----+ SC 2  |  +--+ SR 3  |
+-------+   |  +-------+    |    +-------+  |  +-------+
            |               |               |           
+-------+   |           +---+---+           |  +-------+
| SR 2  +---+           | SC 3  |           +--+ SR 4  |
+-------+   |           +-------+           |  +-------+
            +-------------------------------+           
SR: SAV router
SC: SAV controller

      Figure 2: Connection Example of SAV Devices  
]]></artwork>
        <t>Figure 2 depicts a connection example of SAV-D system.
There are SAV routers distributed throughout the network, and they <bcp14>MUST</bcp14> communicate with the SAV controller in order to collaborate.
This document suggests that each SAV router stores several records of the SAV controller for backup.
Each SAV router <bcp14>MUST</bcp14> try to connect to its nearest SAV controller at all times.
If the SAV router loses contact with the present controller, it <bcp14>MUST</bcp14> seek the next closest controller.
Such a mechanism can assist SAV routers in maintaining connections to the best of their abilities.</t>
        <t>The SAV controller appears as a single entity to the external.
Realizing the full functionality of the SAV controller <bcp14>MAY</bcp14> require many computing and storage resources.
As a result, the SAV controller can be built as clustered or distributed servers, where consistency and scalability are the primary concerns.
Each SAV controller can communicate with many SAV routers and perform the corresponding functions.</t>
      </section>
      <section anchor="data-transmission">
        <name>Data transmission</name>
        <t>Data transmission includes bidirectional data transmission of control plane and data plane.
The monitoring information of the spoofed src-IP packets is transmitted from the data plane to the control plane.
Following the existing definition of savnet, the monitoring information transmission protocol should follow YANG Data Model for Intra-domain and Inter-domain Source Address Validation.
In the opposite direction, the filtering rules and threat information are transmitted.
The transmission of filtering instructions can be referred to DOTS Telemetry<xref target="RFC8783"/>, whitch describes the transmission requirements of collaborative filtering instructions.
The threat information includes the attack detection resultant, victim IP ddress segmant and etc. <xref target="RFC9244"/> and <xref target="RFC8783"/> describe the transmission requirements for threat information, whitch can be the candidate protocol.</t>
      </section>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <t>The proposed SAV-D architecture can collaboratively defend the IP spoofing DDoS in a distributed pattern.
The typical procedures are described as follows.</t>
      <t>(i). The SAV routers validate and record the characteristics of spoofed packets, and periodically send this data to the logically centralized controller, where the global spoofing information is aggregated.</t>
      <t>(ii). Based on the aggregated statistics, the controller can accurately detect whether there are ongoing IP spoofing attacks with the help of predefined algorithms.</t>
      <t>(iii). Based on the detection results, the controller can generate defense policies for both SAV and non-SAV devices. The policies mainly involve filtering rules on 5-tuple and packet size.</t>
      <t>(iv). For detected attacks, the defense policies will be distributed to all SAV and legacy devices.
Moreover, the detection results will also be sent to the victim's defense system.</t>
      <t>(v). The filtering rules will be installed on relevant devices to block the malicious packets.
If a rule filters no packet during some period, the rule will be automatically removed.</t>
    </section>
    <section anchor="scalability">
      <name>Scalability</name>
      <t>When there are large amounts of devices introduced into the SAV-D, the control plane could be implemented with hierarchical structure, where multiple sub-level controllers are in charge of the devices inside AS domains. 
The single top-level controller can exchange information (i.e., IP spoofing statistics and filtering rules) with these sub-level controllers.
Additionally, a large number of attacks and filtering rules could introduce another scalability problem.
One possible solution is to prioritize the mitigations of these attacks, where severe attacks will be tackled first so that the number of filtering rules will be limited to moderate scope.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Adversaries may send forged IP spoofing statistics to the control plane or send forged filtering rules to SAV and legacy devices, which could cause severe harm to legitimate traffic.
To avoid this situation, the information transmissions of SAV-D could be encrypted with certification.
There could also be attacks directly on the SAV-D controllers.
As common systems, security systems (e.g., firewalls) are essential to protect the controllers.
In addition, hot-standby controllers can also significantly improve security and availability.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC4987">
          <front>
            <title>TCP SYN Flooding Attacks and Common Mitigations</title>
            <author fullname="W. Eddy" initials="W." surname="Eddy"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes TCP SYN flooding attacks, which have been well-known to the community for several years. Various countermeasures against these attacks, and the trade-offs of each, are described. This document archives explanations of the attack and common defense techniques for the benefit of TCP implementers and administrators of TCP servers or networks, but does not make any standards-level recommendations. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4987"/>
          <seriesInfo name="DOI" value="10.17487/RFC4987"/>
        </reference>
        <reference anchor="RFC7039">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC8783">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>The document specifies a Distributed Denial-of-Service Open Threat Signaling (DOTS) data channel used for bulk exchange of data that cannot easily or appropriately communicated through the DOTS signal channel under attack conditions.</t>
              <t>This is a companion document to "Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification" (RFC 8782).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8783"/>
          <seriesInfo name="DOI" value="10.17487/RFC8783"/>
        </reference>
        <reference anchor="RFC9244">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="E. Doron" initials="E." surname="Doron"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document aims to enrich the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel protocol with various telemetry attributes, allowing for optimal Distributed Denial-of-Service (DDoS) attack mitigation. It specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator in choosing the DDoS mitigation techniques and performing optimal DDoS attack mitigation.</t>
              <t>This document specifies two YANG modules: one for representing DOTS telemetry message types and one for sharing the attack mapping details over the DOTS data channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9244"/>
          <seriesInfo name="DOI" value="10.17487/RFC9244"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CAIDA" target="https://spoofer.caida.org/summary.php">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 375?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Linbo Hui, Yannan Hu, Wenyong Wang, Shuisong Hu, Haoran Luo for their contribution to this draft.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vc63IbOXb+ryq/A9au1FgjkpZkJ2OrNrsjS/KMJvIlkjwT
76VSYDdIYtzs5vZFMm35XfIjT5K8WM53DoBGd1O2J3EqlamttQiigYODc/nO
pTkej+9sVbXO03/VWZGbA1WXjbmzZVcl/1nV+7u7T3b372wluj5QNp8V6p46
WpjkLT3XTJe2qmyR1+sVPXp6cvnszpYujT5Q50VT23x+Z+uekoEfTG5Knak/
n5+8Ojs8Ovnrna3r+YG6OPz5xcml+qUo39J09UNZNCs8hO9O89qUuanVST63
uTElZlzq6q16VpQJUXlnKy2SXC9p77TUs3qcNHZc6St6Zqzz2o7TtKjGuw+x
YDGtiszUpjpQj77b2xvh//fpLOdmWVwZZWcqL2pFu6QmfXBuVpnGDvdUs0q1
f2r3s/PvbNW2zgyfazzVlUnVIQg5Pi4u1GGZLGxtkropaaqeTktzJTOP72xl
Oqcjm/zO1tvrgztbSo3VRdHQMdVhmpamqtTPOrNEC7FbvuY1jw0WpDFFd6ie
29rO3ZR7CoQfqP3d/f3xLv6nxmMeU7ZSM5tlRJyl55q6WNIzic6ytZqu1btl
tl/OEn/Eub0CVTRtUZRE2ViVBU5IvCg7vBDJUbQmcevNRB01Fh/lft4UdHdu
pCjppJcV3eai0ep1ThuUla3X+K6qS2NqZkBCQ/xHaeZ0ogP11NhfIQL3eDud
Xet1pfSVtpmeZrx1UqS0197u7u7jR/K5yetyfUASa3NNDzaVUZdnx+q+eZeY
Va1e/9M2kePnMa14brVgXcCfZknrHyiSrDUd4fvakT0xaTNJ+Caa0h6oRV2v
Dh48uL6+nripE5LCBy27Psmtnybql6Zl1k9W5yucVAZ/C7/U/yXDIn796o7w
fcIqHNj1Rew4m6izSHbObP5+YdwQM+NPtN183ug8aXJ1pqdFqeui/LoMefJ1
GZLZ7P337+cJ7fSbmfGnhYYpDfwwth36f8WPWKPe4wSZsX2mwLCwSsGawox5
LpnU0qFuYdY95dh1OlE/jV9N1EVTYu/Y32COcHDWZNmmb5mZL8u5zu17NqNh
woPjk7OTSz/PMVVd8L+3TBJ2H9H/3zLB38I5/zuYdOut8OJ8L68K8t0Zf7iN
CH9fxydfell4zF3XK/xzy8ruGk/wzy1T+Bpfn59u+Doh0FDaKfmeEvJ/gcsg
rjbsHJWulPgbUpuqHimap+aFqeiK60JFz1YiIHKrR7qsapOrp0W51HkeXWmw
mf/577V6SvJDsy7/dNo5SEJq83393k7oiYh8GPaKLDt5xEm1cqDA7/iTXqtj
nZl1tBdQEPnspc2J9FKk6OzsqLOXeWeScWpLct1F+b019azdNZyOZeNGBhVv
tSqLK0t4Q9VkDr/99l+en337reKD0R7FjIdrsyQsUpuJKA/+u1zoWl0TT//W
EPxQC5OtSAF4Qg5W1cQcNhDnz44efrf7yP/9OPr70ZPH3/m/v9t9+KSd8/ih
//vJ/iPMB0iMVz06PD0+5L+U8uioBgwhik9fqYtVUcysGDPofgAa8tGz+gfA
ENZZp9mR6spMx//7dk6nIiYtDCQpX5P6bH92tT3/x367XCUjB8M5UE1GfoqO
Sicge1EteOlKmTqZfDlJtS7nsCRezCpww5STRBPWg1A8qJrlUpfryWqxkkcC
rHs43n0i9tK803Tr5tzMyHgdyFh3bYdN3MRJUiwfhGlyJ5f4R3W4im+j68DH
8SdsZHhGKNx78vjRePcRxGxMyFNPoQ5Jjc8n70g34HgI/KoqWRgwLtE5Gzwz
mwHSXhmCo6mZGcK1eq7JuNexuAj8bfLUlGQVEtZp2MKUoHixxge6hcsFQV2K
ERp8hvqsiop2Ysg9UlpJrKAEqKfQVyge/sa+ZCx1BNkVmR6Tk9ciTE4rfFP5
WbyRUaTauSL11BBs3gJAm+0VYe2kZoSu53My+5D+ZYElFxQc1WCYVrOyWNJN
RpxJzZVNiF48SLqdRySqhGylpfO+zYtrQvJzJu+atq9WtGTqnx3Rg02lKpJA
OyOMn9fEVfOOJDbFLuGcSVlQiAEDQpwiw0TyXV9TUDZR/v6WNk0zI1aFIrOy
SJtEIo07W8cR645NTnSNi9n4wpSgQd3HVW0rXdc6eVuphSbnPTV0HK1WMF4w
2rVK1lO6SmHISF2zqtB9V537JobCIzlbt9S/svdq3QFdxSEJOB+VZZOfovDU
hTd08qywdWdh4tucg1PiagaVUVdF1kAisQ3FlbQYcbZeqGpJi5Db/ltjqppY
S5+KaywhR6OzYDHCJiWRny3FHrMSkrBQDMfxXEVns6Rp5kq7K3ARHNF+UZBF
KuixUgj3LLtvJvPJSF0ekfy/eaGeZUXBz3744Ezzx4/E36wqYI/oALITTqkl
eGTXSaoLbSESKVqmj5vJY79wSaKeWfJhYErErJGqzBXH8bcGp+o+ie520Or2
tp36pbRGkyzg42niKR8BHuXjx5Fqzl894wG4oY8fWfBPnr0ah/HHPA6h/LG4
BiUjPoUX42A6ctBE15c0ZQnhiu3Mws4XbFpWZFogT7xEpG/fREZEsQeHWDnZ
yJsl5JTWFlOdqhWuvhb7VeSIoQ2dlYjLoQ4sOLqngCBhsInAHNCy2Z6BgQnO
BSWYAehUJH4gLUnoZp0os7el+7wQR6JelcWvxJMPH/gLMHn/0eTJ34nzvXrE
4X9eLAsYiTVp4rJidJg1vOCLw8vtEV/Dw4eTh/6pf9j0lC6B4CwpCDMGUBXZ
hOcwoeytvD22ZHoS5FSILZAxcEm470/qjNatN8sieir3RqiNBAw2wLzjB2OL
X9BTJexnlI/RIR/TMe732WJv0wJkj+kCinKFKMoIGbMiqHp6BQ8gNHzL6wIk
r1s/Ett0Z/qh3epEEyNaMaMgJOdvKoa7ildZIaABBSnQLryhoETIK6nPQOYg
MfCMsPg0j8RA6A3GLVloOF1Twq0k4koqlnuatoTAEJHEKlJp+54WZmNaZIow
ZG7cGY/oEBJTEv/DjbBgT8lY8Zmwbl7k40iNJgpesbOgM3ZQunnRGk4hyxth
Tk7Vku0rm4xZTSvRlvyJBa3nDVMc5FO0KGQ35yIwvCVxsF6wuaZQwa6ajF0y
MSGxEGpn9h0DLuVGA7Alk1ERX0EgcwHL0ja1XY6JtZvOjemgQvYOJr+zJMgm
UzvNiuQtwp5KFm8XDqz3Kofbq+A/QYEtyUX79J+z4ouyaOZC39KQKBBMXbJd
9CI7EjH1qMSTEThLAyN1ASgD64awea0y9gBzI8fWWWMc4OnhlaAFIziXJmNY
g4RjbAzDmewS0Y1xwI1ABlKtFLCIIazUmc7nDe0q5zLqrVmra5b3u89fX1ze
Hcm/6sVL/vv85J9fn56fHOPvix8Pz87CH1tuxsWPL1+fHbd/tU8evXz+/OTF
sTxMo6oztHX3+eGbu2IU7758dXn68sXh2V3F/jS2PVoQ4xTmnKSZPALkVFdb
BNESYq5kX58evfqPf9t7RJ78d+Te9vf2yA+6D4/3voMPJCiRy27sXOQjsX69
pVcro0tmKVndRK8sOQzAEjLKi+I653BjsrX17Z/Bmb8eqN9Pk9Xeoz+4ARy4
M+h51hlkng1HBg8LEzcMbdgmcLMz3uN0l97DN53Pnu/R4O//mFnStPHe4z/+
gTNHv/8dodZ76mmRtgmYv6rx+A+CYckxkotaSiyKG/OSNQARZlO04lBESTDJ
BBDRd+l4OgBxgn3kAEhEHCiBKon7gw9PEceTTTHeuWsfA5FF9ApOJq7ikJOs
SlPZqc1svR45b6AygvAiKbqDgad0kpmtK++AsSD7Bqg0KilMO68Ne2jnDIU5
HGGtLhDZ8HfBqspQT7Fn5poAx8BFGXzNVo1GCRHELgIHTy2oBDwXANhBfYIf
bVU1xtnD1jnohDipkzX2TkxZA9NW5MyIi0Xl0TSZd7IaBAKWmnCXqSynHjiU
Y4jC1DQ8Ai6QEZpq4Ssur93MlKXEF88pbisYeeJR8NCBvcHJmYNy/IrRSONS
WRSA0HPw7i6jg3+9S8D1trJkSuf+CH6S54A8MSAIl8rnYuhPFtSkpi+HDjRO
HGCC+LVYCTGWBfggcw//iKQGOOGMcQeBkX0RxoiIdqD1ChjDRsEDQR1r3ALz
QmcjnJl2QihC+ItwreTxKssRSQdhsVI4L0ZA/5ktqxqyEd2S86NOkEddkMSV
k03gvDQUsgpNFIh49eGz6BWBQEbQrduCBBGkylNsDiM7CCwl+CjNDBgv2oxv
m0gV1+1iIKa7AXAhTqmqTManr0Z0e29lW7JETS7i5qFzB0vd2TrTwged1Qtx
60Wq199wGNW6d9FqXmfABA0bkXBQEZID7HkLUh6QPMQ5cDRBShfkWdamdm5N
0ABhBEaOoPB0Fo58DdFaanpIX8MT+uzkemVC7MQHd/G1xKGeFeLgkJfOUk6W
IuMxo/PToWAdOHci6o9UCNLXplwaXRGSr1zmUzIw3ZqrJNB2xv+D/3ZkjRvV
/e/Iwb1XDPcQTPihzJTbvck3X5OO3io7G9Ydju3EdNyoG1dGdmkWOtyN1Ot5
6BywG2OnZIbDgGPBzdeko//f+C+DoY1jn1zjwYY1Nox9ao2vcRYZe05Oih0V
IX0M3Fy4QEJijJsvWeNpGyHIGqeRwqr+vfw3zzKZTIZy+uAv/Uc3/rcTrebk
NDrBkKRNirBz8wUP3mx48sse3MCXm8Fxd4bL/+UBmLMzGOsdt7P8MUIsMQzt
ZjIl+ur+GUVgBGY2Xh0blGOx2tvRGm5o9LOY3W9oDnvr7S81Mf2zdL7boNrD
+Tv+LMMv4rPcPC9y1G9J1mX+swCthBs3/szdL+I1vgYdnf++xho35yYx9ioy
lP4sgy/+V+lQrLIdyjpTut9+Jfnoq9ozO0cybe+AcyCfb4ISaOszw23VROJX
MpN+QQ6faoqfAG+mAR0jKJbEj0UOayyBCWMEjrr9gBR6AIJrnoniBScgb819
qft2YiaCkJLIk3N2jgZyzmNFEG2kMlHg8BlUXHnF7OVuAJdw9DYJ6BBSu1c4
qpWiL9e+AdGIYbqsq4NBOglb6mxdWUnBhNwpAyipMFx2thBc7OtTtyYNOZCJ
aktxruc+YUKfuiTT1K1xMaxFQDNrSq5qePqIkmdYVNO1FhmyZ+Z6VVhJ/Q6Y
IAf8ZNKwnzPkXT+ZneSASLvoc+O2y8hXR1k5kWgX8cdYuTQA0oMgtyO6Ll9n
8/bW5t1aT3QqnGaYCz301UAOPviw10i7s6h0MqJJQSEa3aqv9cmN0RcrU4Ls
dvFOXNtjBS/OCcw49ooP3kuCDqQ9SlRK2cmWYUaxMmWUsuTEXxc9eysRkcQx
a1bMUdXjgiWFcaKYojIWRe6lFGA4uR4zBiXDWOuzhuMKIdWpCLdzuhJCR18Q
bdf6rQl1sJlGD0fbmcIRrRaZsrmvoyC9nCdrTphQvCR/46azgvRpqsniJK6A
42yLSSNJ5SR0MVTU6BI2X9sKbOcsUsnOyIX0QB0cpLJm84OmrCm4NWkvPSOM
z1yAu2lj2GqEaXJYwwkOpDZ8aQdGyy4pUqf4eaT+flw3dDfeuvowOK1q/hef
oUQyIn+BTciPFETHthRBZ5meh7RXRdfo016IBKu20BSLqGgI7JcldlQ1N2Rw
OhrsgFLfZqkc93nkvVMCb+KIJ8hVsJ0cXEFpSOhITno1mZgukn5bpK467cq8
kKy12tulK0L6odp29zAI57mZhIlKO1aJ1EsYy7VeMZ4uS8EZfmdpcFpfSfZj
rMo+maazOQG2erGsogKoFMc3FUCbileicZMgURJuzR/sxSVd8fGLi21R4CST
9HXqcyqswswqod767KFkB8SyDg8CZ7LhLKOQ6anslAvupJpo3hDr8ZlqrhT8
0SEkm3MxnUsjqClyus8X2d31tFUdyYpWQSXilBUvNuJECFJa3lS0pSfah/3M
yHUSdZcOV+LVTqr+nIrp5NMcdQ5VcFtA6gddU4A/66Tj0AOyQhosHBZ5I8Ep
sIDi6eKvSWYzxjCRcDvV+eFWZ9YK7QbeubSktvNFTUte6zKNkplPzaxwDqkV
CLnx/iZQk7CRkyy2KXQEFuxZzbraXaUVQf5kSlLKbyrPupHvyXGWy88TB9jO
o+WP3K243NaGdKHkx5DzX6IxgiUTl0i+jCAl4ZMlAI6bPRqcT7JkZNs8FoqM
gberfFZnSlur6aQL5pm7Wmwp9vpWUNXrmWAfCN/LiuFkGULQKqbUj5fLJmcl
9xXT0pDESPlPpI5lF+gKAnuNPpYsxfMvc04Np2BwW5XcIEpEtkd6XRzOQ2UI
xWbGpFNoYlvf6Dg76b7xWwIrueRn53p7+EaaPD5R3I2qP50UuEHy00oxiFzS
qmMqQg36U0AV6hjuS/Ki0qEQSrAIhLLMzsX2xTT5Ppy5KealXhGFncpv5Npc
r+YURQhnnYhK14rWneZMDaSOmw0K5SxBgHaStPCwLrY9pBvSoFQWtHDJLqq6
BnhmH6qlqsqViIxt25VrO3K6Neh7ijEYuo2kwuRNKwkmRVIi8xUw4+0FhFG3
wF12FaYyWWhZ5KawgTupXSneziS1nRYMkugmksUmq+UxTDevPzXByHtk22lA
YRa1fSBtHwrpm3ZgzMOQ0NsQXwFZoKrmxnTGxLb2FZcYWCL2EL+M1hONF4m4
QCIirhXp+t8ag1bIvG4LJs7VciGbdSyGQQ4geC8zcmU7RuDtbW6ztEvnLZH/
CxECC8SQI2Y3GwtWQ1DW7e4SJCg8UqifDcHpJzGmyHPcgMZlebnXPh18vegJ
9hXk3i2PhBrGKfIEgjiIoBSF2TPpgMc4pXGFapo4EpwBcQJu2APchGSaO/5S
3+uz4Q7d3T8vSJDyjlSLKWE00WpZS3VwLL7kbPI5TF+eShXGK2KLq+TZVhNo
69cr9vPBIvcj9xCTBHoHl8hi6qRPsgwcf+E+mRu+fakn3QyWID9s2Z0QdOkN
xVtPN0FOg84tEDfhGpfmv90MdGl5bqRSQ6xQdxZg70Aoz/c31H3hTl5mEc30
ZUJMJyfDrxv4ZhiXHe7aTrrspSm5D9hbzGAlka+RNkeBc5Y7MF3TrtjR1pRI
Ra/rOKWzEDjRF7fOEMHfPzw6YwDfyEsVfIqqWbncBwJ8V5f0JHHDgnAoTjic
dd00Z0dc2di8IzSEwDUWvbW30S5CdrKGvqfWWLCKUExuNhiuLhAI2RMo84WF
c6STCb690hSAuZ7oflavL64sirjWVK+ciV0a4+IYHwmVcSsTWkogUbKkL+/L
Np5n4MavhQ29qeNjjzU4BBL7zCZ4o4m2nBGNYnQKxglX+qlQCdmJIVZiwpLe
YG4gJ84gfIHOulYvPTOClfEyMdIt5M5yk/V6+rxuBIfis52mq88X7Tk6GTb7
m7TyS5WyhS39+gqGf+6DQeehteTz2mY8d3N44YDMNfe+pjLHPynnGAHu6Hzt
b7oovd0KuS1/B4MYJ4/gXhyAtQbQdZO4ZbiFHSV06He3q2Jzd2KEIGBvCfFc
Bcwcz3MxbwUd4niWltOWYkMPNr8gGOYS/yAgDiLjV8RJODCT98Xe2cxCb9Fd
SIZeWkIL6Z2KDgV/38fUomDSyyNon1iZjTkwkhfAe62ZHs+7K49hfFO514J4
Nq5oU1sptpe3RTIiuG6iHF4vtpDwztOl866JC50vsXb2u0q7wu2Tv93scCtR
qwLkboSgkuiLmoMGvXIdsZYyDJKtZHLfu/Ck2+rt3duRs+lE8Ym8o9QvLX2+
WLUTze2Wt3akXLYzmBiNxN/7AtvFudqTYZ5wceQ/juX/MLLvH93B9IeD0tqm
vW8+u3e3jvflnzfu3TnuTo9Tt5x7P5w7mknHfThYkc/96LZzb2L1J/ZWG574
8vu+OD+IfJsbO5KxpFNQaJ90Fcb9gw0y6BubXZld8ctQ/gFIsUURUAdEQk+a
zpPBbYvxQnRexu636pZsJEgs3Gsg7hWskGtaK27bTUI6xbSVl+4JOy/7JKF9
3wxeiaua+RzvMomHMf4NBSFOkuRVKHX4wNLlFHtbsskjq96saJeT3kpMOF4x
bgscyuH13KA1vu4vBxQLbI/oTGB3F7ig21XyRuRK6pYRCH74dbIoeCCMxARU
xrx1nH1HM3iFuhsWXbCX6oXdrnYVX5tty4NcMQ0CELzpFGsLqwiihtbJSZz3
iM/LzdzuXRAk0jMTKluyIEBxSZ6NVjg3KF55FIvsbygka9/TuOGKnh++8UgU
mHnNwaKk0zhWpOtGX3/8KtghyJGc7GjTks4BThtyH6DdVdOkzBbLtmRQK/9m
n8v3oRAme5Nv8n23vtK4Ki3efMVc/IpEFctVj4SBTvDx4gvj1KfzfAJUO97P
l+G9P+LGHHLXeeV+4oZfc+wPtmhnasUT8w0IZu1MbMuIrr2AU6b9UHUZemQ6
PrzoJhdcatpHqrbyW9VgdIDi7eq9CCFs+Sz03Ip8uSQFuW+Sar+ztE7I5d9C
X+ekoejjChTS2KveHL74QbiKrEPG5uK037NxGvds3PqG4SS8/FVQ1FnhnfbA
/FtKABvhsQhayzqfDu/dW7sYopOycWruJJ9Tli6EPn55eaEuDUrPZOvcC4uP
H+KlO9cC4N/9EBjc2akfIrZmuwv4YyI8xcOjBcHcCOxFoTXaLSSlDXTr+FyZ
+RKZefAMaVJ5yRTv9rsXMqNzhfN85jjS094nst/TwyKKF5P5R4q8HE3CD4Hg
R6JmJEu3tA11XufzfS2Bg+3L5Nhm+GJx3usSWBHTyOh4DssbxFKASpvSZcva
V3l05QRdLMh9uz0JqVVvglyy2vhEhE8+9dtthtXIkTdfba24kqNYl/ByGu56
IpAkGTY2sS8U84u586yY6mxzWRrVt1DidifCkZ7GvS9fVgSXvI60avMlcDma
yOAkcB1Ake/uia+mU5XGuvjtCs7SkcbBSoHzbZFaOUIHlA7KixupDGUUH7/4
SOjzzUR812E6zBdywvlVkW0I1okM3wYxLMjhAFdE/zOO/iWH3a1oD6i7pfsH
8GlzSWzQ7TMsv/KanC6dmk4S+ZYSmFB+5aS+f+JhekcyCt0aIAJ2xMziakLQ
3CaOf1vu9Tdlee6pixaBYOAX12HlpFPaBVyDSfRaV9tNGKWs3O9LDFxuW6qN
G5RYuBeWRA8GDFYm/BCOV9clXrKCvFTNdMy19k5TEgjEO1ALJtKhhZZAJHnV
4YV/a8u3HjqQWRerwZKsDuYdMPC8m05wfTuxkkblP4ha7+63g/JWt5A/eAls
2JwR98ZtLn+Ha6A5Ul6KEeVK3vVz9WR5+QfcLLLGmzuu9FpYEut6fKK3aR1P
K9NqolwMh0YmslMiZ/gEKZ/h3SWUjEJnS78wMtSRqG9qWaRikKqkWPlf9Dk9
fHGojuJGs0p9uIfRj+IY4/guwIC8CEk/WhizvdgbMs3g0WBJ/w0vG7+fiAw5
u59Q6t0oDJtAJxd0o0e/uIofEm5824nGL1k55pPUc4dh1CvR5tnQt3VVWOcq
e5m22zBs1UbvQWMpUinXq6Cvrl8uifKspddvbza9VIQcXRGn83saUHEME5LF
FX5pw91M+7sMXCQloTLXpCnotqU9O/0E7j3CnncbNLsuinrMv/o5XQ+6gZn6
7s9V+IxfoIiTivKDZKxgE/8jMUgAiFwdJuGXaQQDfrjXHyLB+nDgNMKk/3h3
Rlubux/BTJ2/ZWE4s/m0UD82dqTe6Dwn8n5sRuoXk+MXFtUvGi//XSwaW+Ej
vvpRE97L1VlT+BcpbfQLMXzRhYNN+MVQl+H/L9uvtAYHVQAA

-->

</rfc>
