<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-savnet-anti-ddos-05" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="SAV-D">SAV-based Anti-DDoS Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-savnet-anti-ddos-05"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Xing" fullname="Mingzhe Xing">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>xingmz@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="18"/>
    <area>Ops &amp; Management</area>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword>Source Address Validation</keyword>
    <keyword>DDoS Detection and Mitigation</keyword>
    <abstract>
      <?line 122?>

<t>Existing Source Address Validation (SAV) schemes can not effectively defend against IP Spoofing DDoS under incremental deployment.
This document proposes SAV-based anti-DDoS architecture (SAV-D), a distributed defense architecture to enhance SAV's defense.
The main idea of SAV-D is to collect and aggregate more threat data from existing SAV devices and then distribute crucial knowledge to widespread devices, thus significantly expanding defense across the entire network.</t>
    </abstract>
  </front>
  <middle>
    <?line 128?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed Denial-of-Service (DDoS) attacks have been a persistent cyber threat, where IP spoofing DDoS is one of the major contributors.
According to CAIDA's Spoofer Project<xref target="CAIDA"/>, 28.6% of IPv4 autonomous systems (excluding NAT), and 35.6% of IPv6 autonomous systems are still spoofable by September 2024.
These statistical data presents the severe situation of spoof IP DDoS attack.
Amplification DDoS typically exploit IP spoofing to generate large volumes of traffic with small requests, allowing attackers to overwhelm the target's resources while evading detection.
Other volumetric DDoS attacks (e.g., TCP SYN Flooding <xref target="RFC4987"/>) also forge source IP addresses in order to drain the target's resources.</t>
      <t>To eliminate IP spoofing, several Source Address Validation (SAV) schemes have been proposed, such as SAVI<xref target="RFC7039"/>, uRPF<xref target="RFC3704"/> and EFP-uRPF<xref target="RFC8704"/>. 
However, the defense effectiveness of current SAV schemes highly depends on the SAV devices' deployment ratio.
A large number of spoofed packets can only be prevented with a significantly high deployment ratio, but the incremental deployment process is often slow.
One reason behind this is that uRPF and EFP-uRPF have issues with filtering accuracy in certain scenarios, leading the network managers being hesitate to enable SAV.
Morever, SAV can prevent spoofed packets from being sent out, but it cannot provide protection for the deployers.
The lack of direct benefits may also impede the deployment process.
These reasons result in a limited SAV deployment, thus the defense effectiveness.</t>
      <t>In the above context, to effectively defend against IP spoofing DDoS attacks and thus stimulating the deployment of SAV devices, it is essential to tackle the following limitations. 
Firstly, in amplification DDoS, the reflected packets sent to victims have the authentic src-IP, making them unfilterable by SAV devices.
Secondly, although today's SAV mechanism can filter spoofed packets at local devices, the important threat data they provide has yet to be globally utilized. 
If victims were made comprehensive aware of the type of spoofing traffic targeting them, they could execute faster and more accurate countermeasures.</t>
      <t>This document offers an SAV-based anti-DDoS architecture that eliminates the above limitations by incorporating the following advances.</t>
      <ul spacing="normal">
        <li>
          <t>SAV-honeynet based threat data collection. Each SAV device functions as a honeypot that not only drops spoofed packets but also records the spoofing characteristics and sends them to a centralized control plane.</t>
        </li>
        <li>
          <t>Collaborative defense with both SAV and non-SAV devices. The control plane detects ongoing attacks and generates filtering rules.
These rules are then distributed to both SAV and non-SAV devices along the attack paths to manipulate malicious traffic.</t>
        </li>
        <li>
          <t>Threat information sharing with the victim-end. The control plane shares attack detection information and IP blocklists with victim-end defense systems to assist their mitigations.</t>
        </li>
      </ul>
      <t>Through the mechanisms of honeynet, data aggregation and distribution, SAV-D can fully leverage the value of SAV devices and threat data, resulting in a significant defense improvement.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<!-- # Body [REPLACE] -->

</section>
    </section>
    <section anchor="sav-d-architecture">
      <name>SAV-D Architecture</name>
      <artwork><![CDATA[
+--------------------------------------------------------------+
|               Control Plane (SAV-D Controller)               |
+--------------------------------------------------------------+
| +----------------+  +----------------+  +--------------+     |
| | Detecting DDoS |  |Generating Rules|  |Issuing Rules |     |
| +----------------+  +----------------+  +--------------+     |
|                   -\                  -\                     |
|                   -/                  -/                     |
| +----------------+  +----------------+  +--------------+     |
| |Attack Situation|  |   Maintain IP  |  |Sharing Threat|     |
| |   Awareness    |  |   Blocklists   |  |Information   |     |
| +----------------+  +----------------+  +--------------+ ... |
+---------/\-------------------------------------++------------+
          ||                 +-------------------+|
          ||                 |+------------------+|
          ||                 ||                  ||
+---------++-----------------\/--+ +-------------\/------------+
|            Data Plane          | |    Data Plane (Legacy     |
|           (SAV Devices)        | | Devices,Victims' Defense) |
+--------------------------------+ +---------------------------+
| +----------+ +---------------+ | |    +---------------+      |
| |Monitoring| |   Filtering   | | |    |   Filtering   |      |
| +----------+ +---------------+ | |    +---------------+      |
|              +---------------+ | |    +---------------+      |
|              |Receiving Rules| | |    |Receiving Rules|      |
|              +---------------+ | |    +---------------+      |
|                ...             | |           ...             |
+--------------------------------+ +---------------------------+

          Figure 1: The SAV-based Anti-DDoS Architecture
]]></artwork>
      <t>The proposed SAV-D is shown in Figure 1, which can be deployed on both intra-domain and inter-domain metwork with SAV devices.
It introduces a centralized control plane (i.e., the controller) that connects SAV devices, legacy devices, and victims' defense systems. 
The functions of the controller can be divided into three parts: attack detection, analysis and defense execution.
The controllers can collect spoofing characteristics from SAV devices (as honeypots) and aggregate them for further analysis.
From a whole viewpoint, the controller can detect ongoing attacks and generate filtering rules for both SAV and non-SAV devices.
In addition, the controller can maintain IP blocklists based on the information reported by SAV devices, which can assist in detectiong DDoS attacks and generating filtering rules.
And then the rules will be distributed to corresponding devices to perform filtering.
Moreover, the controller will share the attack information with the victims' defense system to assist in their defense operations.</t>
      <section anchor="sav-controller">
        <name>SAV Controller</name>
        <t>The controller is a logical entity that can be implemented as a distributed or centralized cluster system.
The placement of controllers may take several factors into consideration, including latency, resiliency, and load balancing to connected devices.</t>
        <ul spacing="normal">
          <li>
            <t>To collect spoofing information, the controller will passively receive the data sent from the certified SAV devices.
The collected spoofing information should include but not limited to timestamp, 5-tuple (i.e., src-IP, dst-IP, src-port, dst-port, and protocol), TCP flag, packet size, and amounts.
This information will be readily stored in a database for further analysis.</t>
          </li>
          <li>
            <t>To analyze the aggregated statistics, the controller retrieves the spoofing information periodically (e.g., every 10 seconds).
The spoofed packets information are analyzed based on their src-IP to detect reflection attacks or flooding attacks with certain algorithms.
A large volume of spoofed packets using a specific protocol (e.g., NTP, DNS) is a clear indication that the src-IP is being targeted by reflection attacks.
For flooding attacks, the possible evidence is a large number of spoofed packets with same target IP and different source IP.
The detection results include the attack target, type, duration, malicious IP lists, etc.
The detection algorithm should also fully consider the source of the forged source address packets. SAV devices deployed at different locations may report different levels of information.</t>
          </li>
          <li>
            <t>Generating filtering rules based on detection results is a straightforward process.
Before the reflection, the filtering rules are based on src-IP and ports.
After reflection, the src-IP is the server's address, and the dst-IP is the victim's address.
Considering the reflected packets are often much larger than legitimate packets, filtering rules could be generated based on dst-IP, ports, and packet size.
The time required to generate filtering rules depends on the severity and duration of attacks.</t>
          </li>
          <li>
            <t>Communicating with relevant devices consists of two folds.
One fold is distributing filtering rules to SAV and legacy devices and receiving feedback from SAV devices.
The other fold is to provide the victim's defense system with attack detection information, which is essential to efficiently stop the attack traffic.
In addition, the controller may generate more high-level threat intelligence information with advanced statistical algorithms, such as geographic distribution statistics of IP blacklists, attribute statistics of forged IP, and so on.
These attack information and situation can assist operators to analyze and fine tune the defense strategies.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-device">
        <name>SAV Device</name>
        <t>The SAV devices refer to routers or switches that are capable of validating the source IP address through schemas including SAVI, uRPF, etc.
Compared to simply dropping spoofed packets, SAV devices are required to selectively allow spoofed packets through if they do not match the filtering rules.
This mechanism can be considered as a SAV-honeynet that records threat data related to spoofing.</t>
        <ul spacing="normal">
          <li>
            <t>The SAV device must register it to the controller when being installed, in which a unique identification number and other information (e.g., location, management IP address) may needed.
Whenever a spoofed packet is detected, the SAV device will record its timestamp, 5-tuple, TCP flag, packet size, and so on. 
However, only if the spoofed packet matches existing filtering rules, will the packet be dropped.
After a certain interval, the recorded data will be compressed and sent to the controller.</t>
          </li>
          <li>
            <t>Modern devices are generally capable of filtering based on packet length and counting the number of filtered packets.
Upon receiving filtering rules from the controller, the SAV device must install them into its data plane.
The SAV device also needs to record the number of packets filtered by each rule.
If a rule filters no packet during some periods, the rule will be automatically removed to save the rule's space.</t>
          </li>
        </ul>
      </section>
      <section anchor="legacy-device">
        <name>Legacy Device</name>
        <t>The commercial routers that are widely deployed in production are considered to be legacy devices.
Access Control List (ACL) is universally supported in today's routers for packet filtering.
Legacy devices can achieve extensive filtering by simply connecting their management interface to the controller and receiving the rules. 
Since ACLs may vary across legacy devices, filtering rules must be adapted to meet the specific requirements of each device.
The legacy routers can join the SAV-D system by registering it to the controller with information similar to the SAV router.
Once registered, the legacy routers can receive the filtering rules from the controller in a safe and trusted channel.
These rules will be installed into the data plane.
Similar to SAV devices, if a rule filters no packet during some period, the rule will be automatically removed.</t>
      </section>
      <section anchor="victims-defense">
        <name>Victims' Defense</name>
        <t>Victim's defense can be a DDoS mitigation system, a dedicated DDoS defense device, or any system or device that can receive filtering rules and threat information.
The Victim's defense operator can request access to the attack detection information related to themselves.
Upon receiving the request, SAV-D controller can provide real-time updated details such as the attack target, type, duration, and malicious IP lists, which can be efficiently used for blocking malicious traffic.
In an ideal situation, the defense system could provide an interface to directly receive the information and automatically perform corresponding filtering policies.
In this way, these details can serve as auxiliary signals to boost the detection speed.
This mechanism could improve the effectiveness of DDoS defense and incentivize more SAV deployment.</t>
      </section>
      <section anchor="connection-example">
        <name>Connection Example</name>
        <artwork><![CDATA[
            +-------------------------------+           
+-------+   |  +-------+         +-------+  |  +-------+
| SR 1  +---+  | SC 1  +----+----+ SC 2  |  +--+ SR 3  |
+-------+   |  +-------+    |    +-------+  |  +-------+
            |               |               |           
+-------+   |           +---+---+           |  +-------+
| SR 2  +---+           | SC 3  |           +--+ SR 4  |
+-------+   |           +-------+           |  +-------+
            +-------------------------------+           
SR: SAV router
SC: SAV-D controller

      Figure 2: Connection Example of SAV Devices  
]]></artwork>
        <t>Figure 2 depicts a connection example of SAV-D system.
There are SAV routers distributed throughout the network, and they <bcp14>MUST</bcp14> communicate with the SAV controller in order to collaborate.
This document suggests that each SAV router stores several records of the SAV controller for backup.
Each SAV router <bcp14>MUST</bcp14> try to connect to its nearest SAV controller at all times.
If the SAV router loses contact with the present controller, it <bcp14>MUST</bcp14> seek the next closest controller.
Such a mechanism can assist SAV routers in maintaining connections to the best of their abilities.</t>
        <t>The SAV controller appears as a single entity to the external.
Realizing the full functionality of the SAV controller <bcp14>MAY</bcp14> require many computing and storage resources.
As a result, the SAV controller can be built on clustered or distributed servers, where consistency and scalability are the primary concerns.
Each SAV controller can communicate with many SAV routers and perform the corresponding functions.</t>
      </section>
      <section anchor="data-transmission">
        <name>Data transmission</name>
        <t>Data transmission includes bidirectional data transmission of control plane and data plane.
The monitoring information of the spoofed src-IP packets is transmitted from the data plane to the control plane.
Following the existing definition of savnet, the monitoring information transmission protocol should follow YANG Data Model for Intra-domain and Inter-domain Source Address Validation.
In the opposite direction, the filtering rules and threat information are transmitted.
The transmission of filtering instructions can be referred to DOTS Telemetry<xref target="RFC8783"/>, which describes the transmission requirements of collaborative filtering instructions.
The threat information includes the attack detection resultant, victim IP address segmant and etc. <xref target="RFC9244"/> and <xref target="RFC8783"/> describe the transmission requirements for threat information, which can be the candidate protocol.</t>
      </section>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <t>The proposed SAV-D architecture can collaboratively defend the IP spoofing DDoS in a distributed pattern.
The typical procedures are described as follows.</t>
      <t>(i). The SAV routers validate and record the characteristics of spoofed packets, and periodically send this data to the logically centralized controller, where the global spoofing information is aggregated.</t>
      <t>(ii). Based on the aggregated statistics, the controller can accurately detect whether there are ongoing IP spoofing attacks with the help of predefined algorithms.</t>
      <t>(iii). Based on the detection results, the controller can generate defense policies for both SAV and non-SAV devices. The policies mainly involve filtering rules on 5-tuple and packet size.</t>
      <t>(iv). For detected attacks, the defense policies will be distributed to all SAV and legacy devices.
Moreover, the detection results will also be sent to the victim's defense system.</t>
      <t>(v). The filtering rules will be installed on relevant devices to block the malicious packets.
If a rule filters no packet during some period, the rule will be automatically removed.</t>
    </section>
    <section anchor="scalability">
      <name>Scalability</name>
      <t>When there are large amounts of devices introduced into the SAV-D, the control plane could be implemented with hierarchical structure, where multiple sub-level controllers are in charge of the devices inside AS domains. 
The single top-level controller can exchange information (i.e., IP spoofing statistics and filtering rules) with these sub-level controllers.
Additionally, a large number of attacks and filtering rules could introduce another scalability problem.
One possible solution is to prioritize the mitigations of these attacks, where severe attacks will be tackled first so that the number of filtering rules will be limited to moderate scope.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Adversaries may send forged IP spoofing statistics to the control plane or send forged filtering rules to SAV and legacy devices, which could cause severe harm to legitimate traffic.
To avoid this situation, the information transmissions of SAV-D could be encrypted with certification.
There could also be attacks directly on the SAV-D controllers.
As common systems, security systems (e.g., firewalls) are essential to protect the controllers.
In addition, hot-standby controllers can also significantly improve security and availability.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC4987">
          <front>
            <title>TCP SYN Flooding Attacks and Common Mitigations</title>
            <author fullname="W. Eddy" initials="W." surname="Eddy"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes TCP SYN flooding attacks, which have been well-known to the community for several years. Various countermeasures against these attacks, and the trade-offs of each, are described. This document archives explanations of the attack and common defense techniques for the benefit of TCP implementers and administrators of TCP servers or networks, but does not make any standards-level recommendations. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4987"/>
          <seriesInfo name="DOI" value="10.17487/RFC4987"/>
        </reference>
        <reference anchor="RFC7039">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC8783">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>The document specifies a Distributed Denial-of-Service Open Threat Signaling (DOTS) data channel used for bulk exchange of data that cannot easily or appropriately communicated through the DOTS signal channel under attack conditions.</t>
              <t>This is a companion document to "Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification" (RFC 8782).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8783"/>
          <seriesInfo name="DOI" value="10.17487/RFC8783"/>
        </reference>
        <reference anchor="RFC9244">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="E. Doron" initials="E." surname="Doron"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document aims to enrich the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel protocol with various telemetry attributes, allowing for optimal Distributed Denial-of-Service (DDoS) attack mitigation. It specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator in choosing the DDoS mitigation techniques and performing optimal DDoS attack mitigation.</t>
              <t>This document specifies two YANG modules: one for representing DOTS telemetry message types and one for sharing the attack mapping details over the DOTS data channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9244"/>
          <seriesInfo name="DOI" value="10.17487/RFC9244"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CAIDA" target="https://spoofer.caida.org/summary.php">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 368?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Linbo Hui, Yannan Hu, Wenyong Wang, Shuisong Hu, Haoran Luo, Linzhe Li for their contribution to this draft.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vc63LcRnb+zyq9Q69UiUVrZkRS2rXM2uyaIimbDnUJSdmr
zW6leoCeGVgYYIwGSI1EvUt+5EmSF8v5zuluNIChRFeUSkW7Zc40+nL63G+Y
8Xh8Z8vWukj/TedlYfZVXTXmzla2qvijrfd2dr7d2buzleh6X2XFrFT31OHC
JG9pXTNdZtZmZVGvV7T05Pji2Z0tXRm9r16urPpH9VwXem6WpqjvbN1T8uR7
U5hK5+pfz45fnR4cHv/9ztbVHAtotKa9rCJoopXqgJapn8vqbVbM1fdV2ayw
GdacFLWpClOr42KeFcZUmHGh7Vv1rKwSusadrbRMCr0k4NJKz+px0mRjqy9p
zVgXdTZO09KOd36PDcupLXNTG7uvHn+zuzvCf/fosmdmWV4alc1UUdaKTklN
+vDMrHKNE+6pZpVqv2rns/PvbNVZnRM85wc/jafamlQdAJCjo/Kcbposstok
dVPRVD2dVuZSZh7d2cp1QVc2xZ2tt1f7d7aUGqvzsqFrqoM0rYy16iedZynj
UB7znkcGG9KYoDWrs7mbck8B8H21t7O3N97B/9V4zGMqs2qW5TkBl9G6pi6X
tCbReb5W07V6t8z3qlnirzjPLgEVTVuUFUE2VlWJGxIuqg4uhLUU7UnYejNR
h02Gr0KfNyXRzo2UFd30whI1F41Wrws6oLJZvcYzW1fG1IyAhIb4Q2XmdKN9
9dRkv4AF7vFxOr/Sa+KmS53leprz0UmZ0lm7Ozs7Tx7L96aoq/U+sXRWaFrY
WKMuTo/UffMuMatavf7nbQLHz2NYsW61YGHBR7Ok/fcVcdaarvBd7cCemLSZ
JEyJpsr21aKuV/sPH15dXU3c1Alx4cMWXZ/E1o8T9XPTIuvHTBcr3FQGfwu+
1P8lwiJ8/eKu8F3CIhzQdSt0PJ+ov9DaFiHP6dv7hQmjjJG/0pnzeaOLpCnU
qZ6WpGDK6sti5dsvi5V3dO7y/Xfv5wmd9dtwcjqhC+sYKacma4f+X2EkFqz3
uEFusj5SFE+6J9IFxQqN5jFl0owudgPC7imHspOJ+nH8aqLOmwrnxyYJcwSL
sybPNz1lhL6s5rrI3rNGDRMeHh2fHl/4eQ6x6pz/3jBJUH5I/71hgqfEGf8d
TLqRMrw50+ZVSXY+5y83AeFpdnR8W4JhmSPZK/y5YWdHymP8uWEKk/H12cmG
xwk5GFU2JTNUQQbOQQzCasN2UmmrxPSoPLP1SNE8NS+NJRLXpYrWWmEQoeqh
rmxtCvW0rJa6KCKSBvX5X/9Rq6cVfBB18deTzkUSEp3v6vfZhFZE4EPHW1Ly
ZBwnduX8A3/ij3qtjnRu1tFZ8JjIfC+zgkAX90ednh52zjLvTDJOs4qseFl9
l5l61p4abse8cS2Dio9aVeVlRq6Hqkktfv31X56ffv214ovRGeWMh2uzJLek
NhMRHvy7WOhaXRFOf23IE1ELk69IAHhCAVTVhBxWEmfPDh99s/PYf34SfX78
7ZNv/Odvdh5928558sh//nbvMebDoYx3PTw4OTrgT0p5R6mGR0IQn7xS56uy
nDkVD9kPPod89aj+Hh4Jy6yT7Eh0ZabD//1sTrciJC0MOKlYk/hsf3a3Xf9h
r93Oysj+cA5Ek51ARVelG5C+sAve2ipTJ5Pbg1Trag5N4tnMAhummiSa3D4w
xUPbLJe6Wk9Wi5UsCR7e4/HOt6IvzTtNVDdnZkbKa1/Guns7N8VNnCTl8mGY
JjS5wB/VwSqeRuTA1/EndGRYIxDufvuEIHwMNhuTE6qnEIekxvfjdyQbMD43
ervqPrnI28omCwOkJrpgZWhmM3i+l4a81tTMDLm/eq5J8dcxK4mX3BSpqUhj
JCzv0JMpeezlGl+IQhcL8ogplGg4ICHRWpWWTmp9eB18eB358AzY+Gh7pLRK
IeEQVZrN0JB67cwlZWUKsnV0RVr1lfWz+HijSBkUigRaQxR4W3jprOHIUU9q
du/1fE6GAvKyLLHlgkKnGijWalaVS6K9x+XBT7T/ZZYYCbdIGxQRiCoh7ZoR
Ft4W5RWFAXMG74qOtyvaMvVrR7SwscoSz2YzChCKmnBt3hGPpzgl3DOpSqIY
VA7hj1QZSUR9RRHdRHmKL7M0zY3oIQrrqjJtEglT7mwdRag7MgXBNS5n43NT
AQZ1H2jfVrqudfLWqoUmcz81dB2tVlB3UPO1StZTIrAgZKSuWLiIC2yHCwih
sGFOOy71L2zvWgNCpDhIkrLiyxFCWFsRpc5FENWrqvyFSPHhAz/4+HGk9p5M
/vAPorwuH3MkVZTLEihbE1xLy9Y1b3jDFwcX4BSixqPft6v+sGkVRdJkASlC
kwvA1CMwOyc7bZa4KCReGMdiJomJ5QBOeIFoaAkpQhFrLoEMMniNSBOdy7sC
P8LSjFpcnvQB05nn8TOK/F1gSGTPy6zuYJVwNOdwn1gqh4ZRl2XeQEiBY4rI
aTNiq3qh7JI2IS/n18bYmviKvpVX2EIOJ0JiM3LlKqJdvhTzxTqL8E/XYd1g
ibAZocJcasd/LvYl2F/SisodTwRN4quBDJP5ZKQuDkkxvHmhnuVlyTt8+ODs
2cePxGK5LaHE6RpyHu6qRR2xv0H6DmqEAE0riOtmINmYXpC05xkZfqAmQtlI
6EGUuq26axne6aWU9miSBRwjmnjCV4AZBj82Z6+e8QBs98ePzG3Hz16Nw/gT
Hodc/lBeAZIR38JLctCpBWAiIiZNVUG+oFACRNl8wTp3RToXIsVbRCrnq0i7
KnZ7wFyOQ4qGOdhzIcn8CgxQi2IvC+QgDFiYgIBGYPbRPR0EEAaHiG8IWDYr
eiAwwb2gB2bwDi0xIXiHlAIpDks3mRqKZ6AvM55Ww10C8jqYFJpk1jZgScA3
y/Ja0lM6IZTpZA12odC3Bp/YxBS6ykri+9wI6wJKpyRJESEXRhIwNXhEMp2x
T8QWg2WfcEtgPi8roRhQDWQ5JA0QybZANoMeUGXj/GYSX1oH4+ncR/z1+SO4
L8ILQJhhdQjLlNOuIJf4qLRvYWYZnbIkL5RFJluuyP+J1sbIDlpKEMxy0uQ1
J54UJAQ0Ft7xS53VuZEvWcBOhOvIUSdSQImbd1hYfsYt6BoErx7EREIB19my
IZfZkyi6j5jl1jISLolBoBrI5BGf0dHYLBdEzEqv4PiOkvmE2D3LKDDJ1yNG
wEDfijRWZgaTH1GUyUgn0NkEoVMKfP8Gpp10v7JVMj55NSKyvHXQL8ntEcYM
BqS9ACHx3BDeUsCic3LsGhKpukz1+itWLGppkgWc2SXzmmw0YDUSj7xkw9N6
DAYcURLrA+bIRaEnIW6hG1i1NnwpEvd5Xk7ZylCok2fvTQpUnczCfa9gwpY6
BamXxPZ0Z0skVvoKptKHO+uVCXqFceAskOhoj5WRAEKBbp5y9AWHaKYtrgdG
YNdKxBieEuJhUy2Je8mLE97rO4wlsVwFLvq8x8gKJVgGG/FwxCcgFamwsloh
geN5sWUpnV7CjxRgvuZDEZyvkSqX02O0OwcSZlIdazIcLReoWVMkLilP/1e8
ywqJFIAJPcH6OCXDYwekh0Jh+Se1QIbReRse98Q78PBJKcIzERGzbC+YM4ns
BBkhj0wh6C1+WJkrClgL4y52SJBLEgu09rqAFe60rOUi2Lcoi3HM2gpqq7Oh
cxVgrOZl63YIWN6FsZEar5rcRLoL39gr6znSKfPvJ2BRKLsI/eRIQl+9YGeH
1H62grIBZ+dZksEDdCzrEHAhZAxRNGkJS3gFgIwFbCsiMibUbro3pgMKOTs4
TJ0tATapxikJ8lvkWJxNazcOqPf+Kahn4XoDgqwi796XHZz3s6hEncDN9mqE
/QnPpyPhTR/QeDACZmlg5MIg1j4NlEPOrtNcNN+lzhvT08pOkQfeHzlrA4Sx
wYm8iHApUlakk4wLBSlAQY3n1yYTD8KqU13MGzpVLmbUW1IeV8zwd5+/Pr+4
O5K/6sVL/nx2/C+vT86Oj/D5/IeD09PwYcvNOP/h5evTo/ZTu/Lw5fPnxy+O
ZDGNqs7Q1t3nB2/uSghx9+Wri5OXLw5O7yp2RGN1pCXanMIPInYmdQlG1XaL
wruEsCtln6eHr/7z33cfkwv8O/IL93Z3yYF0X57sfgPnkTzxQk5jLSBfoTu3
9GpldMUoJa8+0SvSXDm8etISi/Kq4OTGZGvr638FZv6+r/44TVa7j//kBnDh
zqDHWWeQcTYcGSwWJG4Y2nBMwGZnvIfpLrwHbzrfPd6jwT/+Oc9I1Ma7T/78
J7YOf/wdRbz31NMybdO9f1fj8Z8k/hW27hYDJZ3zYPw/+vdAdrlW3X+HTiO8
Yo0gOQs/mJtquzf9+svCMtjnwYa9h2MPYliu6X+u0OldN7rktZSaeewMGhpj
J+SVhwGHiusvC8vw3/hvtxv7zC4Pbzf25W90fSD24dwnCa4FwufkN3MEQ+aB
MX7urI8Yph528fUADhkHj3JJjD1tDYuMnUTGR30xGk0mkyHvPvxbf+nGfw86
uznejdA9JNcm8XhwfYuF1xtW3m7hBp65Hlz4wXD7vz0Eeh4MxgYX7hxwBPss
KqM9TqZEj+6fkvmmaLdDwvYflA1JLhvn7XgXNzb6SRz8r2iArfH2rdVP/0a9
pxvYabjigb/R8EH3RtfPywIVR+J9WfEseIpyn2t/8+6D7i5fBpbOvy+zy/WZ
SUx2GSlSf6PBg/91WBQLcge6zpTB0y/JL30xfJbNEbXt7rNr/fmeHvEQfaKu
zeOLV0SK1G+IHHVGsRic22nIucDTknAiQ2Q0TksuC8AFY1fODyxd5oj99G5Q
f1LzWuTX4Q/fHGOp+9nETCReTyJngEM/Gig4XuqkPHKR9fAdcF16Ae7FCAjg
gYs2wnRRentWuHwmlUwu6MJ7Jwzqqrb7g7AFR+p8TZGHRAs+O8RBvOSBLzpH
SFLRl1BuDE45YRbHEffJk/XBMCmubu2FA1hky2ZNxVlnDxQd/ww7aSJumSM0
M1crCjfrPpYZKrnVJyPSfkDKp34y9OXEmE7TTNC14dhlZNOjkE/42uVy4+iw
Msjl0LNu/ihmYBcLZkVLqQ0JtnnrrQ3j7ANfpOL8F9/1CvUPZo9OtJ2UFQV1
q9KXoIRg9GBlKkDdbu5SpmXIckeY4M05OI5j8/jevQB7wOFRECylAIqD/Ywy
NDu6fNE99vojp9uriggkMLXKyznXcZDTq9dOGEVMMlRrl5IU52xNjBhUsmJJ
zxvOZwmoTiy4RdHnMmMZQSa31m9NqE3MNJoR2hYLS/IpF0Le0he0kLookjUH
2VmeyWdQOi81sYsmLZO4KpHTJyaNGJUTHOVQOCMibCbbCmjn/G7F1smlnuGU
cJ6UpZkXmqqmaD8kmP3Jgvjc5Vg3HQyFjfSgXNZwrgvpMJ+whqLKlsbWerka
qd+P64Zo4zWqz8Smtua/+A4ZkhH5BDQh914SHNtSmJrlej5y2TVliYwySy+R
gbS+St1lUZEQlGwzQoetubOAMx1AB2T6JkXlsM8j750QeA2XtiVFOyBBhfIa
8Ukv3xfDRdyflamrG7rSGzhrrXZ3iETIOtttR4d+VrGTmOIOCQYw7SgoEjVB
MtfiRI+6pDmvc1oHN/eVPj/GYu0LMzqfk09XL5Y2KlBJDXFTgaqxvBONmwRZ
pEBBf8kXF0Tuoxfn2yLMSS5ZktSn+FmcGW0CfeZrPpKhFiU7vAjsyoa7CGnI
07DZlKuiJKVoLxBF8plim1Rl0fUiZ3OtkzNwSGZzVcnXQB2l2uShJNVskI5I
g8pmI87FE783Xmu0GU46hy3OyHXHdLcOFPESKEVZTv95RSQYFOicU8FV29QP
upqtv+ukY9qDq4UcYbgsihjipkAZis2LHxP75uzCRPzppOj7G+1ay7MbcAci
oQsmmy9q2pLi5jSqmT01s9LZppYfhOD9QyAl4SDHWKxe6ArM17Oaxba7S8uB
0iRQkXx+ZT3qRr5rxCkxP09sYTuPtj90VPFlimHxSko0qLcuUbdmzgQRyayR
R0meyhKujps9GtxPCjUoEjmvKNIFXsXyXZ1WbRWo4y5oam49yCpR3Te6V72S
NptDmGEWDMfLYIJWLqVMsVw2Bcu4T8xXhjhGkszCdcy78LPAsFdoM8hT60rP
+AwEt8nvDaxEYHufr+uG81AVwrSZMekUktj3aR0ySjYE/ki4Ta4g1yFvz9WR
GvwnagjeG+xXRA2KGeQZ1GKdVh1VEUodn3JZIY6BXlyaQ+1/zALpU/2IjfI8
m4v26/twrlqWdvpkWs3fdlPMTTmv9Iou0qlDRMbQtSlOURJ3Sowu43qqutOc
RgJzcumrVD48sRvdTZ4UenQir1p8yVIaZLy5xuwZks51U/jKu6MY+kxJqkzP
9ZSEi3c7Y4VIAitNLVVJ16jYbFrCXLIwrgECApzoFVeR6WqXrlXFCfygVwZk
4fIPN4xoG7mMaFiRLhWv/kl4KNgTubRwcaXcyG8/9GzWqFvqqbpCbU0e6v7c
XTQweR6sbCYV4LRkn44IkCw2aVbvcnUL4VMTDJF3xDsFWMZYWxJt67CkE7Tz
Hb3XFMp8MUVIS9qaG8LZhc+4Rt73gxEqieuAzgaNd3m4pUDEUCvSR782Bg2F
Rd22GDh3gEs6rAdiDnQ+jLeEI9eXwgFDS9xtlkjpeCXwfyZAoCXZK4rRzQqN
VQUg6zYIieMqOFJoJRn60p90iUWY4h4mLlAJXftwMHnRi+t7I3tUHgk07ErJ
CsScYEG+oFhPHVxGzsOQBPhODdwBYQ0o7P1x6VGw0gaQhuaNLg0d7Z+XxEhF
h6tF3bHH0wpdC3Uwfg7c3BRzqLkilWaF0F4UfD9Z20oCHf16xb5IsBr9PEMI
oQK8AyIymzruk5wIh4ugp3Qhukp+j7vZoQP/sEJzTNCFN/QxebjJKzboXABw
E24M0fzZzbAkxx4bZKZZdZRk8yUOcX4yz/cU6r7zJi+RiGT6xhpM/wpNDxQz
+7Kwy3V3VSkRe2kq7qb1CjQoTXTUSqecuJwZN/G51ldRq60qkZJt17hLRyp0
qi/incIm3D84POUYo5GXGfgWtlm5TA3yEa6Rx4OEKNBhKM6PnHZdCTY7yQLh
HclL7ZpsItZbex3tAnrHa2gBaJUFi8iM8LZBcXWdlZDsgTCfZzDfdDPxwS81
xYuus7ifeOyzK7MiyJrqlVOxS2NcqOWDtSou6hOXMUfJlr7TTY7xOAM2fimz
0N44PvL+EEdpop9ZBW9U0RmncaOUQrbMyPf1UyESchK7gYkJW3qFuQGcOOFx
C5l1TQ96Jh4Dv/CL7BCZs8LkvfYWLxvBoPiErOnK83l7j25D3G+SytsKZevF
9EtFGP6p77A6C60l/dj2pTjKcae+4XgczeaY41fKPUbwfnSx9pQuK6+3QirO
02AQh7W9J90gEaw1ANS7dW5L7otG1xn7T2XsJ29u2om8Cehe8n4uzQbFLkaK
dw/9NN18sPf/CfB8zKGSvPGMVB1ZPIp6vX98izCf++c2hPqdYkccFDTWvTjD
qWhAvKkXCgGCvB2Rt05yt3PZ0UuCRX8nXXSVkbSw9hKHfS+8y4Y+q9xNO7e0
X5UA12feuRHnSq8ZNmYqQSFuzjG2vM72LsszqDe0I5E9lCayUtqpInqT6mIB
6HuhkpqUtiVeMmjb7nC2lI+QHiaeeO+iqG7Lrbdwh06t0+HH8npQvyL2+Urb
g2hutzb3QKp9DwYTo5H4ua8Pnp+pXRnmCeeH/utY/oORPb/0AaY/GtQFN519
/dmzu2XI23/feHbnug96mLrh3nvh3tFMuu6jwY5878c33XsTqj9xttqw4vb0
Pj/bj8ybGzvcH+ifYc3VlUf39jdwou/1c60Dit8t8gvAyxkKljq4JrTSdFYG
+y06GcnlKrbDtltqkmixdK8UuGb9kBhbK+5kS0Lux7QVI+7P7xjh8OJIElpa
zeC9M9vM53g7xjUJ+1ZdAU6S+zaUaHyE6RKgvSNZo5KiblZ0ynFvJwYc7/i2
hRnlHPfCoF207m8HdxZOPsI08b+7HgwFjVaSXGQd6hYR7kWkThRBzhIDYI15
6zD7jmbwDnU3Pjpnw9OLv11aJCZb1lY1ubobGCCY0in2FlSRr6qnpH9rnyK5
GKJP+htdUzSS/rkJFTnZEN5xRbqbdjgzKLqFLu2GEOWL3vSAlmwm0fODN94l
hfO85qhRcn8cNBK50eoav1Z0AHAkgTzatKWzr9OGrBMCRFcFlPJgzNuS7rX+
RTmXnEQBT84m0yc4WvumZyJlhldPMRe/6GBjvuqBMJAJvl5MMM7TOsMqHmvH
uPqWAW+VuN+IvIHCut+j4bcG+4O+HGHVNBNDzxRw7x7EE9vyp2uF4PxuP2Zd
hpafjotQdrMMLo8eylfWH1UD0cEnb3fvhQrhyGehvV/4y2UryIgTV4cX9/i3
bYT4N8DXuWkoULlqirxDoN4cvPhesIr0Q87q4qTfcXISd5zc+LbaJLyKU1L4
afFSeUD+DfWKjX6yMFqLOp+779Gt3QxhStU4MXecz6lMF0sfvbw4VxcGJXPS
de7ltyeP8JaceKO+G1oc285B/VCx1dpdxz+GwQM8vFngy41OvcizRpOIpN/j
TKo18yXKCMAZ8qXywiJerncv90X3Chf6zH3kPa8+lD0fnTkUr/ny7wV5NpL3
ee/xrzXNiJFuaHjqvPHiG3AC/tr3snDI8CXdotfasCKUkcbx+JUXUqVUljaV
y5m1re3aOi4X9XE/256EBKvXPy6DbXw6wqeg+n1Bw7rpyOuutsBtjX9hUDSN
iLdr5ECqZNiBxYZQdC/myttPm2vpqBOGury7Ea70NO7XuV3lXrI78l4TE4Hr
5gQGp4Lr4BH5jqSYNJ3yOfbFL0dwro7EDSoKmG+r6coBOoB0UAjdCGUo+PgQ
xkdZn2+AYlqH6dBdyAwXl2W+IWQnMHzvxrB0iAtcEvzPOAcgmexu6X0A3Q0t
S/CdNhfvBi1Kw0Ix78lJ06nppJJvKNYJ5JeO6/s3HiZ5JJfQrVYiHkU8LnYm
BORt+vi3ZWB/U67nnjpv3Q8M/Ozawhx3SmOD64rh91Id0KHtMUpcsT4aDe1t
W1SOu6qYuRcZsR4UGLRM+BkaL65LvE0EfrHN1BUh404qAIgXfxcMpHMVWgCR
6lUHFJmzUQ09ks7DrMvVYEsWB/MODvC8m6pwzUaxkEYVSCkQdmi/HYTX3gA+
XExXhwVZRhvaSOKGvs2F+kAGmiNFptidJLU9zZlJUfkOvSu2zBuv7rgmnUGT
ZK4xKXq9zOE01FCDD+t+5qDVU8Jn8kouYK0sWlraFpx+eWQoI1Gz17JMRSHZ
pFz539M5OXhxoA7j7jirPtzD6MfhO6LBCSjKkO6jjTHbs70h1QwcDbb0T3jb
g5Qz/pWoN2d+QrV5IzNs8ji5yhstvXW/QXAUmNqJxu9IOeQT13NbZNTV0ebw
0Gx2WWbOVPayeDc5sLYN3YPEUphSrVdBXl2TXxJlWysv315teq4I+b8yTur3
JMByABNSxmgQ8JRpf9WDS6XEVOaKJAUdwnRmp/PBvVjfs26DBt1FWY/59zmn
60HbMkPf/d0Dn/QLEHHCUn4OjAVs4n9wBdG/8NVBEn7lRRzAD/f6Q8RYH/ad
RJj0n+7O6Ghz9yOQqYu3zAynWTEt1Q9NNlJvdFEQeD80I/WzKfBTh+pnjZ+2
OF80mcVXPPpBk79XqNOmHGExfr3vNPM/MpBFP7zCNC+dB4Vf8eQ7/DfdNIbZ
ulQAAA==

-->

</rfc>
