<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 3.0.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekater-panrg-scion-overview-01" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title abbrev="SCION I-D">SCION Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-01"/>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>ETH Zuerich</organization>
      <address>
        <email>corine.dekatermuehlhaeuser@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>ETH Zuerich</organization>
      <address>
        <email>nicola.rustignoli@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="A." surname="Perrig" fullname="Adrian Perrig">
      <organization>ETH Zuerich</organization>
      <address>
        <email>adrian.perrig@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2022" month="May" day="19"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Internet has been successful beyond even the most optimistic expectations and is intertwined with many aspects of our society. But although the world-wide communication system guarantees global reachability, the Internet has not primarily been built with security and high availability in mind. The next-generation inter-network architecture SCION (Scalability, Control, and Isolation On Next-generation networks) aims to address these issues. SCION was explicitly designed from the outset to offer security and availability by default. The architecture provides route control, failure isolation, and trust information for end-to-end communication. It also enables multi-path routing between hosts.</t>
      <t>This document discusses the motivations behind the SCION architecture and gives a high-level overview of its fundamental components, including its authentication model and the setup of the control- and data plane. As SCION is already in production use today, the document concludes with an overview of SCION deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-overview_I-D/draft-dekater-panrg-scion-overview.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/rg/panrg"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-overview_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Introduction section explores the motivation to develop SCION, followed by a short description of SCION's main elements. The sections after the Introduction provide further insight into SCION's key concepts and deployment scenarios. The document concludes with some concrete case studies where SCION has been successfully deployed in production.</t>
      <section anchor="why">
        <name>Why SCION - Motivation</name>
        <t>Since its inception, the Internet has continued to expand, encompassing new uses over time. The continuous expansion has brought many issues to light, including a lack of control, limitations in scalability, performance and security, occurrences of severe outages, weak fault isolation, and energy consumption. With the core focus on functionality and operation, the current Internet offers little protection against attacks such as spoofing, IP-address hijacking, denial-of-service, and combinations of these. For more background information, see <xref target="SCHUCHARD2011"/>, <xref target="LABOVITZ2000"/>, <xref target="GRIFFIN1999"/>, <xref target="SAHOO2009"/>, and <xref target="RFC4264"/>.</t>
        <t>There have been numerous initiatives to address the above issues. Although these initiatives have brought many improvements, concerns regarding security and scalability still remain. For more details, see, e.g., <xref target="RFC4033"/>, <xref target="RFC6480"/>, <xref target="RFC8205"/>, and <xref target="RFC8446"/>, as well as <xref target="LYCHEV2013"/>, <xref target="LI2014"/>, <xref target="COOPER2013"/>, <xref target="ROTHENBERGER2017"/>, <xref target="MORILLO2021"/>, and <xref target="KING2022"/>.</t>
        <t>As a consequence, today's Internet fails to fulfil many users' requirements. This especially pertains to the demands of enterprises globally exchanging sensitive information, such as financial institutions, healthcare providers, universities, multinationals, governments, critical and transportation infrastructure operators. These users require the Internet to be highly available at all times. They expect reliable operation of the global network also in case of failures. They need availability guarantees across multiple routing domains, even in the presence of attacks. They further want to rely on an Internet that can be multilaterally governed and is free from global kill-switches.</t>
        <t>SCION has been developed in order to meet the above-mentioned requirements. SCION aims to reach the following goals:</t>
        <ul spacing="normal">
          <li>Provide high-availability architecture (also in the presence of adversaries)</li>
          <li>Provide fast failover in the case of inter-domain link or router failures</li>
          <li>Prevent from IP-address hijacking, DoS, and other attacks</li>
          <li>Enable path transparency as well as application-specific path optimizations</li>
          <li>Improve the inter-domain control plane's scalability</li>
          <li>Prepare the Internet for tomorrow's applications, such as virtual reality, Internet of Things (IoT), and all other applications requiring high-performance connectivity.</li>
        </ul>
        <t><strong>Note</strong>: A more detailed motivation for developing SCION will be described in a separate gap analysis internet draft.</t>
        <section anchor="scope-of-scion">
          <name>Scope of SCION</name>
          <t>The above section describes SCION's aspiration to improve <em>inter</em>-AS routing and to focus on providing end-to-end connectivity. However, SCION does not solve <em>intra</em>-AS routing issues, nor does it provide end-to-end payload encryption, and identity authentication. These topics, which are equally important for the Internet to perform well, lie outside the scope of SCION.</t>
        </section>
        <section anchor="practical-considerations-based-on-related-rfcs">
          <name>Practical Considerations Based on Related RFCs</name>
          <t>The SCION inter-domain routing concept has initially been developed by researchers of the ETH Zuerich <xref target="PERRIG2017"/>, and could in the meantime also gain attention and recognition in the international academic world. However, for an IT architecture to be successful, it must work well in practice, too. This section pays attention to the implementation considerations of a conceptual framework such as SCION in real life, on the basis of some RFCs exploring this topic. It also verifies in how far SCION meets the requirements mentioned and questions raised in these RFCs.</t>
          <section anchor="avoiding-pitfalls">
            <name>Avoiding Pitfalls</name>
            <t><xref target="RFC9049"/> describes why previous proposals to tackle some of the Internet's fundamental issues did not manage to succeed. SCION seems to avoid the pitfalls mentioned in that document. For example, SCION does not have to be adopted by the entire Internet to be effective: The routing architecture provides benefits already to early adapters. Even if only a small part of the global network works with SCION, adapters will still take advantage of using the SCION routing technology. Moreover, not only users of SCION benefit from it, also ISPs and operators benefit from deploying SCION: early deployments showed that providers can charge the use of SCION as premium connectivity, with users who are willing to pay for it. Furthermore, SCION can be installed on top of and function alongside the existing routing infrastructure and protocols--there is no need for high-impact changes in an operational network.</t>
            <t>Another RFC that must be mentioned in this context is <xref target="RFC5218"/>, "What Makes for a Successful Protocol?". SCION seems to fulfil most factors that contribute to the success of a protocol, as described in section 2.1 of the RFC. This includes such factors as offering a positive net value (i.e., the benefits of deploying SCION outweigh the costs), incremental deployability, and open source code availability. More importantly, SCION averts the failure criteria mentioned in section 1.4 of the RFC: SCION is already deployed and in use by many actors of the Swiss financial and academic ecosystems, and allows for multiple implementations, both open and closed source. As existing SCION implementations are easily portable, adoption in mainstream platforms is also possible.</t>
          </section>
          <section anchor="answering-questions">
            <name>Answering Questions</name>
            <t>SCION can be considered a <em>path-aware internetworking</em> architecture, as described in <xref target="RFC9217"/>. This RFC poses (open) questions that must be answered in order to realize such a path-aware networking system. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            <t>SCION intends to answer the questions raised in this RFC. This especially pertains to the second, third, seventh, and eighth question:</t>
            <ul spacing="normal">
              <li>How do endpoints and applications get access to accurate, useful, and trustworthy path properties?</li>
              <li>How can endpoints select paths to use for traffic in a way that can be trusted by the network, the endpoints, and the applications using them?</li>
              <li>How can a path-aware network in a path-aware internetwork be effectively operated, given control inputs from network administrators, application designers, and end users?</li>
              <li>How can the incentives of network operators and end users be aligned to realize the vision of path-aware networking, and how can the transition from current ("path-oblivious") to path-aware networking be managed?</li>
            </ul>
            <t>SCION's answers to these questions can be found in <xref target="key">Key Concepts</xref> and <xref target="deploy">Deployments</xref>, respectively.</t>
          </section>
        </section>
        <section anchor="why-now">
          <name>Why Now?</name>
          <t>The emergence of multiple SCION implementations and early deployments highlight the need for standardization. The time seems therefore ripe to take SCION to the IETF, also in order to contribute to the important discussion regarding path-aware networking.</t>
        </section>
      </section>
      <section anchor="scion-overview">
        <name>SCION Overview</name>
        <t>SCION has been designed to address the fundamental issues of today's Internet depicted in <xref target="why">Why SCION - Motivation</xref>. The following section gives a high-level overview of SCION's main elements, providing a basic understanding of this next-generation inter-network architecture.</t>
        <section anchor="network-architecture-and-naming">
          <name>Network Architecture and Naming</name>
          <t>SCION's main goal is to offer highly available and efficient inter-domain packet delivery--even in the presence of actively malicious entities. To achieve scalability and sovereignty, SCION organizes existing ASes into groups of independent routing planes, called <strong>Isolation Domains (ISD)</strong>. An AS can be a member of multiple ISDs. All ASes in an ISD agree on a set of trust roots, called the <strong>Trust Root Configuration (TRC)</strong>. The ISD is governed by a set of <strong>core ASes</strong>, which provide connectivity to other ISDs and manage the trust roots. Typically, a few distinguished ASes within an ISD form the ISD's core.</t>
          <t>Isolation domains serve the following purposes:</t>
          <ul spacing="normal">
            <li>They allow SCION to support trust heterogeneity, as each ISD can independently define its roots of trust;</li>
            <li>They provide transparency for trust relationships;</li>
            <li>They isolate the routing process within an ISD from external influences such as attacks and misconfigurations; and</li>
            <li>They improve the scalability of the routing protocol by separating it into a process within and one between ISDs.</li>
          </ul>
          <t>ISDs provide natural isolation of routing failures and misconfigurations, provide meaningful and enforceable trust, enable endpoints to optionally restrict traffic forwarding to trusted parts of the Internet infrastructure only, and enable scalable routing updates with high path-freshness.</t>
          <section anchor="links">
            <name>Links</name>
            <t>There are three types of links in SCION: core links, parent-child links, and peering links.</t>
            <ul spacing="normal">
              <li>A <strong>core link</strong> can only exist between two core ASes.</li>
              <li>A <strong>parent-child link</strong> requires that at least one of the two connected ASes is a non-core AS. ASes with a parent-child link usually belong to the same entity or have a provider-customer relationship.</li>
              <li>A <strong>peering link</strong> also includes at least one non-core AS.</li>
            </ul>
            <t>See <xref target="architecture"/> for a high-level overview of the SCION network structure.</t>
            <figure anchor="architecture">
              <name>SCION network structure</name>
              <artwork><![CDATA[
    ...............................
   :                               :
  :      [TRC]                      :
 :          (::::::::::::::)         :      ......................
:        (::::: ISD core :::::)       :    :                      :
:    (:: +---+ ::::::::: +---+ ::)    :   :    [TCR]               :
: (::::: |CAS|===+---+ : |CAS| :::::) :  :        (: ISD core :)    :
:    (:: +---+ : |CAS|===+---+====)===:==:=====(=+---+ :: +---+ :)  :
:       /(:::::: +---+ ::::::) \      :  :    (: |CAS| == |CAS| :)  :
:      /  (::::::: | :::::::)   \     :  :     ( +---+ :: +---+ )   :
:     /            |             o    :  :       /(::::::::::::)    :
:    o             |           +---+  :  :      /         \         :
:  +---+           |          /|ASb|  :  :     /           \        :
:  |ASa|           |         / +---+  :  :    o             o       :
:  +---+           |        /    |    :  :  +---+          +---+    :
:    |             |       /     |    :  :  |ASx| ---------|ASy|    :
:    |             |      /      o    :  :  +---+          +---+    :
:    o             o     /     +---+  :  :    |                     :
:  +---+         +---+  /      |ASe|  :  :    o                     :
:  |ASc|---------|ASd| o       +---+ -:--:--+---+                   :
:  +---+         +---+                :  :  |ASz|      ISD 2        :
 :                                   :    : +---+                  :
  :            ISD 1                :      ........................
   .................................
Legend:
                      |
                      |
Parent AS - child AS: o
Peering link: ----
Core link: ===
Core AS: CAS
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="routing">
          <name>Routing</name>
          <t>SCION operates on two routing levels: intra-ISD and inter-ISD. Both levels use <strong>path-segment construction beacons (PCBs)</strong> to explore network paths. A PCB is initiated by a core AS and then disseminated either within an ISD (to explore intra-ISD paths) or among core ASes (to explore core paths across different ISDs). The PCBs accumulate cryptographically protected path and forwarding information on AS-level, and store this information in the form of <strong>hop fields (HFs)</strong>. End hosts use information from these hop fields to create end-to-end forwarding paths for data packets, who carry this information in their packet headers. This concept is called <strong>packet-carried forwarding state (PCFS)</strong>. The concept also supports multi-path communication among end hosts.</t>
          <t>The process of creating an end-to-end forwarding path consists of the following steps:</t>
          <ol spacing="normal" type="1"><li>First, an AS discovers paths to other ASes, during the <em>path exploration</em> (or beaconing) phase.</li>
            <li>The AS then selects a few PCBs according to defined policies, transforms the selected PCBs into path segments, and registers these segments with its path infrastructure, thus making them available to other ASes. This happens during the <em>path registration</em> phase.</li>
            <li>During the <em>path resolution</em> phase, the actual creation of an end-to-end forwarding path to the destination takes place. For this, an end host performs (a) a <em>path lookup</em> step, to obtain path segments, and (b) a <em>path combination</em> step, to combine the forwarding path from the segments.</li>
          </ol>
          <t><xref target="beaconing"/> below shows the SCION routing process in a nutshell.</t>
          <figure anchor="beaconing">
            <name>SCION routing in a nutshell</name>
            <artwork><![CDATA[
+------------------+             +------------------+
| Path Exploration |             |                  |
|   (Beaconing)    |------------>|Path Registration |
|                  |             |                  |
+------------------+             +--------+---------+
                                          |
                        +-----------------+
                        |
     +------------------v-----------------------+
     |            Path Resolution               |
     |+--------------+     +-------------------+|
     || Path Lookup  |---->| Path Combination  ||
     |+--------------+     +-------------------+|
     +------------------------------------------+
]]></artwork>
          </figure>
          <section anchor="isd-and-as-numbering">
            <name>ISD and AS numbering</name>
            <t>SCION decouples end-host addressing from inter-domain routing. Routing is based on the &lt;ISD, AS&gt; tuple, agnostic of end-host addressing. Existing AS numbers are inherited from the current Internet, but a 48-bit namespace allows for additional SCION AS numbers beyond the 32-bit space in use today. The end host local address is not used for inter-domain routing or forwarding, does not need to be globally unique, and can thus be an IPv4, IPv6, or MAC address, for example. A SCION address is therefore composed of the &lt;ISD, AS, local address&gt; 3-tuple.</t>
          </section>
        </section>
        <section anchor="infra-components">
          <name>Infrastructure Components</name>
          <t>The <strong>beacon service</strong>, the <strong>path service</strong>, and the <strong>certificate service</strong> are the main control-plane infrastructure components within a SCION AS. Each service can be deployed redundantly, depending on the AS's size and type. Existing Internal routers are used to forward packets inside the AS, while <em>SCION border routers</em> provide interconnectivity between ASes.</t>
          <ul spacing="normal">
            <li>The <em>beacon service</em> discovers path information. It is responsible for generating, receiving, and propagating PCBs. Periodically, the beacon service generates a set of PCBs, which are forwarded to its child ASes or neighboring core ASes. The PCBs are flooded over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>The <em>path service</em> stores mappings from AS identifiers to sets of announced path segments. The path service is organized as a hierarchical caching system similar to that of DNS. Through the beacon service, ASes select the set of path segments through which they want to be reached, and they register them to the path service in the ISD core.</li>
            <li>The <em>certificate service</em> keeps cached copies of certificates and manages keys and certificates for securing inter-AS communication. The certificate service is queried by the beacon service when validating the authenticity of PCBs (i.e., when the beacon service lacks a certificate).</li>
          </ul>
          <t><em>Border routers</em> are deployed at the edge of SCION ASes. The main task of border routers is to forward packets to a neighbor border router or to the destination host within the AS. While SCION takes care of inter-domain routing, it relies on existing routing protocols (e.g., IS-IS, OSPF, SR) and communication fabric (e.g., IP, MPLS) for intra-domain forwarding. <em>Internal routers</em>, therefore, do not need to be changed to support SCION.</t>
        </section>
        <section anchor="formal-verification">
          <name>Formal Verification</name>
          <t>An additional feature of SCION is its formal verification. The SCION network system consists of a variety of components such as routers, servers, and edge devices. Such a complex system eludes the mental capacities of human beings for considering all possible states and interactions. That is why SCION includes a formal verification framework developed by the Department of Computer Science of the ETH Zurich <xref target="KLENZE2021"/>. This guarantees that packet forwarding as well as SCION's authentication mechanisms and implementations are correct and consistent.</t>
        </section>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="key">
      <name>Key Concepts</name>
      <t>This section explains the SCION key concepts, including authentication, control- and data plane.</t>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>SCION's control plane relies on a public-key infrastructure called the <strong>control-plane PKI (CP-PKI)</strong>, which is organized on ISD-level. Each ISD can independently build its own roots of trust, defined in a file called <strong>trust root configuration (TRC)</strong>.</t>
        <t><strong>Note</strong>: This section describes the SCION authentication concept on a very high level. A much more detailed description of SCION's authentication will follow in a separate internet draft.</t>
        <section anchor="the-control-plane-pki-cp-pki">
          <name>The Control-Plane PKI (CP-PKI)</name>
          <t>Trust within each isolation domain is anchored in the trust root configuration (TRC) file. Each TRC contains a collection of signed root certificates, which are used to sign CA certificates, which are in turn used to sign AS certificates. The TRC also includes ISD-policies that specify, for example, the TRC's usage, validity, and future updates. A TRC is a fundamental component of an CP-PKI.</t>
          <t>The initial TRC in an ISD is called the <strong>base TRC</strong>. This base TRC constitutes the ISD's trust anchor. It is signed during a signing ceremony and then distributed throughout the ISD. All entities within the ISD obtain the initial TRC with an offline mechanism such as a USB flash drive provided by a trusted AS, like the relevant ISP, or with an online mechanism that relies on a trust-on-first-use (TOFU) approach. However, all updates to the base TRCs are performed in a straightforward process that does not require any manual or out-of-band action (such as a software update), see <xref target="update">TRC Update and Verification</xref>.</t>
          <t><xref target="chain"/> shows the TRC trust chain and associated certificates. TRC 1 is the base TRC, and TRC 2 and 3 constitute updates to this base TRC. TRC 2 must be verified using the voting certificates in TRC 1. Control-plane (CP) root certificates are used to verify other CP certificates (which are in turn used to verify path-segment construction beacons PCBs).</t>
          <t>Each SCION AS must hold a private key (to sign PCBs) and a certificate attesting that it is the rightful owner of the corresponding public key. One of the main roles of the TRC is thus enabling the verification of <strong>AS certificates</strong> and PCBs.</t>
          <figure anchor="chain">
            <name>TRC contents and trust chain</name>
            <artwork><![CDATA[
                               TRC 2
               +--------------------------------------+
               |+------------------------------------+|
               ||- Version       - Core ASes         ||
+--------+     ||- ID            - Description       ||    +--------+
| TRC 1  |     ||- Validity      - No Trust Reset    ||    | TRC 3  |
| (Base  |---->||- Grace Period  - Voting Quorum     ||--->|        |
|  TRC)  |     ||- ...                               ||    |        |
+--------+     |+------------------------------------+|    +--------+
               |+----------------+  +----------------+|
               || Regular Voting |  |Sensitive Voting||
               ||  Certificate   |  |  Certificate   ||
               |+----------------+  +----------------+|
               |+----------------+  +----------------+|
               ||     Votes      |  |   Signatures   ||
               |+----------------+  +----------------+|
               |+------------------------------------+|
               ||        CP Root Certificates        ||
               |+----------+-------------+-----------+|
               |           |             |            |
               +-----------+-------------+------------+
                           |             |
                           |             |
                           v             v
                 +-----------+         +-----------+
                 |   CP CA   |         |   CP CA   |
                 |Certificate|         |Certificate|
                 +-+-------+-+         +-----+-----+
                   |       |                 |
                   |       |                 |
                   v       v                 v
          +-----------+ +-----------+      +-----------+
          |   CP AS   | |   CP AS   |      |   CP AS   |
          |Certificate| |Certificate|      |Certificate|
          +-----------+ +-----------+      +-----------+
]]></artwork>
          </figure>
        </section>
        <section anchor="update">
          <name>TRC Update and Verification</name>
          <t>With a base TRC as trust anchor, TRCs can be updated in a verifiable manner. There are two kinds of TRC updates: regular and sensitive updates. A <em>regular</em> TRC update happens when the TRC's validity period expires. This period is defined by the <em>validity</em> parameter in the TRC. The default is one year. A TRC update is <em>sensitive</em> if and only if critical sections of the TRC are affected (for example, if the set of core ASes is modified). For both regular and sensitive TRC updates, a number of votes (in the form of signatures) must be cast to approve the update. This number of votes is dictated by the voting quorum and set in each TRC with the <em>voting quorum</em> parameter.</t>
        </section>
        <section anchor="dissemination-of-trc-updates">
          <name>Dissemination of TRC Updates</name>
          <t>Information about a TRC update is disseminated via the SCION's beaconing process, through the path-segment constructions beacons. Each PCB contains the version number of the currently active TRC. If an AS receives a PCB with a TRC version number higher than the locally stored TRC, it requests the PCB-sending AS for the new TRC. The new TRC is verified on the basis of the current one, and is accepted if it contains at least the required quorum of correct signatures by trust roots defined in the current TRC.
This simple dissemination mechanism has two advantages: It is very efficient (as fresh PCBs rapidly reach all ASes), and it avoids circular dependencies with regard to the verification of PCBs and the beaconing process itself (as no server needs to be contacted over unknown paths in order to fetch the updated TRC).</t>
        </section>
        <section anchor="grace-period">
          <name>Grace Period</name>
          <t>At most two TRCs per ISD can be active at the same time. The TRC parameter <em>grace period</em> indicates for how long the currently active TRC can still be active after a new TRC is disseminated. This so-called <strong>grace period</strong> starts at the beginning of the validity period of the new TRC. An older TRC can only be active until either (1) the grace period has passed, or (2) yet a newer TRC is announced. AS certificates are validated by following the chain of trust up to an active TRC.</t>
        </section>
        <section anchor="revocation-and-recovery-from-a-catastrophic-event">
          <name>Revocation and Recovery from a Catastrophic Event</name>
          <t>The TRC dissemination mechanism also enables rapid revocation of trust roots. When a trust root is compromised, the other trust roots can remove it from the TRC and disseminate a new TRC alongside a PCB with a new version number.</t>
          <t>In case of a catastrophic event--such as several private root keys being disclosed due to a critical vulnerability in a cryptographic library--SCION is equipped with a recovery procedure called <strong>trust reset</strong>. This procedure consists of creating a new TRC with fresh, trustworthy keys (and potentially new algorithms), and redistributing this TRC out-of-band. A trust reset effectively establishes a new base TRC for the ISD. It is possible for ISDs to disable trust resets by setting the <em>no trust reset</em> Boolean parameter to "true" in their TRC, with the effect that the entire ISD would have to be abandoned in the event of such a catastrophic compromise (this abandonment would also have to be announced out-of-band).</t>
          <t>The partition of the SCION network into ISDs guarantees that no single entity can take down the entire network. Even if several entities formed a coalition to carry out an attack, the effects of that attack would be limited to one or a few ISDs.</t>
        </section>
      </section>
      <section anchor="scion-control-plane">
        <name>SCION Control Plane</name>
        <t>The SCION control plane is responsible for discovering path segments and making them available to end hosts. This process includes path exploration, registration, and lookup; it involves the path service, beacon service, and certificate service, both in core ASes and non-core ASes.</t>
        <t><strong>Note</strong>: This section describes the SCION control plane on a very high level. A much more detailed description of SCION's control plane will follow in a separate internet draft.</t>
        <section anchor="path-exploration">
          <name>Path Exploration</name>
          <t>In SCION, the path segment construction process is referred to as <strong>beaconing</strong>. The <em>beacon service</em> of each AS is responsible for the beaconing process. The beacon service generates, receives, and propagates the <strong>path-segment construction beacons (PCBs)</strong> on a regular basis, to iteratively construct path segments.</t>
          <t>There are three types of path segments (note that all path segments can be used to send data traffic in both directions):</t>
          <ul spacing="normal">
            <li>A path segment from a non-core AS to a core AS is an <em>up-path segment</em>.</li>
            <li>A path segment from a core AS to a non-core AS is a <em>down-path segment</em>.</li>
            <li>A path segment between core ASes is a <em>core-path segment</em>.</li>
          </ul>
          <t>All path segments are invertible: A core-path segment can be used bidirectional, and an up-path segment can be converted into a down-path segment, or vice versa, depending on the direction of the end-to-end path.</t>
          <t>Path segment construction is conducted hierarchically on two levels:</t>
          <ul spacing="normal">
            <li>
              <em>Core beaconing</em> is the process of constructing path segments between core ASes. During core beaconing, the beacon service of a core AS either initiates PCBs or propagates PCBs received from neighboring core ASes to all other neighboring core ASes. Core beaconing in SCION is similar to BGP's route-advertising process, although in SCION the process is periodic and PCBs are flooded over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>
              <em>Intra-ISD beaconing</em> creates path segments from core ASes to non-core ASes. For this, the beacon service of a core AS creates PCBs and sends them to the non-core child ASes (typically customer ASes). The beacon service of a non-core child AS receives these PCBs and forwards them to its child ASes, and so on. This procedure continues until the PCB reaches an AS without any customer (leaf AS). As a result, all ASes receive path segments to reach the core ASes of their ISD.</li>
          </ul>
          <t>On its way down, a PCB accumulates cryptographically protected path- and forwarding information per traversed AS. At every AS, metadata as well as information about the AS's ingress and egress interfaces (i.e., link identifiers) is added to the PCB. The ingress and egress interface IDs identify connections to neighboring ASes. These IDs only need to be unique within each AS. Therefore, they can be chosen and encoded by each AS independently and without any need for coordination.</t>
          <t>SCION also supports shortcuts and peering links. In a <em>shortcut</em>, a path only contains an up-path and a down-path segment, which can cross over at a non-core AS that is common to both paths. <em>Peering links</em> can be added to up- or down-path segments, resulting in an operation similar to today's Internet.</t>
          <t>To reduce beaconing overhead and prevent possible forwarding loops, PCBs do not traverse peering links. Instead, peering links are announced along with a regular path in a PCB. If the path segments of both ASes at the end of a peering link contain this peering link, then it is possible to use the peering link to shortcut the end-to-end path (i.e., without going through the core). SCION also supports peering links that cross ISD boundaries, according to SCION's path transparency property.</t>
          <t><xref target="pcb"/> shows how intra-ISD PCB propagation works, from the ISD's core AS down to child ASes. For the sake of illustration, the interfaces of each AS are numbered with integer values. In practice, each AS can choose any encoding for its interfaces; in fact, only the AS itself needs to understand its encoding. Here, AS F receives two different PCBs via two different links from core AS X. Moreover, AS F uses two different links to send two different PCBs to AS G, each containing the respective egress interfaces. AS G extends the two PCBs and forwards both of them over a single link to a child AS.</t>
          <figure anchor="pcb">
            <name>Intra-ISD PCB propagation from the ISD core down to child ASes</name>
            <artwork><![CDATA[
                                  .-----.
                                 ; Core  :
                        +-----+  : AS X  ;
                        |PCB  |   \ 2 1 / +-----+
                        |Core |    `+-+'  |pcb  |
                        |Out:2|     | |   |core |
                        +--+--+   +-+ |   |out:1|
                           |      |   |   +--+--+
                           v      |   |      |
                                .-+---+.     v
                   .---.       /  2   3 \             .---.
                  (  J  )- - -; 1      4 :- - - - - -(  H  )
                   `---'      :   AS F   ;            `---'
                            +--\7       /
+----------+ +----------+ <-+     6  5
|PCB       | |pcb       |        `+--+'
|Core      | |core      |         |  |
|Out:2     | |out:1     |         |  |
|----------| |----------|         |  |
|AS F      | |as f      |         |  |
|In:2 Out:7| |in:3 out:7|         |  |
|Peer J:1  | |peer j:1  |         |  | +----------+ +----------+
|Peer H:4  | |peer h:4  |         |  | |PCB       | |pcb       |
|          | |          |         |  | |Core      | |core      |
+--+-------+ +--+-------+         |  | |Out:2     | |out:1     |
   |            |                 |  | |----------| |----------|
  <+           <+                 |  | |AS F      | |as f      |
                                  |  | |In:2 Out:5| |in:3 out:5|
         +----------+ +----------+|  | |Peer J:1  | |peer j:1  |
         |PCB       | |pcb       ||  | |Peer H:4  | |peer h:4  |
         |Core      | |core      ||  | |          | |          |
         |Out:2     | |out:1     ||  | +----+-----+ +----+-----+
         |----------| |----------||  |      |            |
         |AS F      | |as f      ||  |      v            v
         |In:2 Out:6| |in:3 out:6||  |
         |Peer J:1  | |peer j:1  ||  |
         |Peer H:4  | |peer h:4  ||  |
         |          | |          ||  |
         +----+-----+ +----+-----+|  |
              |            |     .+--+-.
              v            v   ,' 5  1  `.
                              ;           :
                              :   AS G    ;
                               \         /
                            +---` 4  3 ,'
                          <-+     `--+'
                                     |  +----------+ +----------+
                                     |  |PCB       | |pcb       |
                                     |  |Core      | |core      |
                                     |  |Out:2     | |out:1     |
           +----------+ +----------+ |  |----------| |----------|
           |PCB       | |pcb       | |  |AS F      | |as f      |
           |Core      | |core      | |  |In:2 Out:5| |in:3 out:5|
           |Out:2     | |out:1     | |  |Peer J:1  | |peer j:1  |
           |----------| |----------| |  |Peer H:4  | |peer h:4  |
           |AS F      | |as f      | |  |----------| |----------|
           |In:2 Out:6| |in:3 out:6| |  |AS G      | |as g      |
           |Peer J:1  | |peer j:1  | |  |In:1 Out:3| |in:1 out:3|
           |Peer H:4  | |peer h:4  | |  |          | |          |
           |----------| |----------| |  +----+-----+ +----+-----+
           |AS G      | |as g      | |       |            |
           |In:5 Out:3| |in:5 out:3| v       v            v
           |          | |          |
           +----+-----+ +----+-----+
                |            |
                v            v
]]></artwork>
          </figure>
          <section anchor="security">
            <name>Security</name>
            <t>Each PCB contains signatures of all on-path ASes. Every time a beacon service receives a PCB, it validates the PCB's authenticity. During this process, the beacon service can query the certificate service, for example, when it lacks an intermediate certificate.</t>
          </section>
          <section anchor="policies">
            <name>Policies</name>
            <t>Each AS can independently set policies dictating which PCBs are sent in which time intervals, and to which neighbors. In particular, PCBs do not need to be propagated immediately upon arrival. However, during bootstrapping and if the AS obtains a PCB containing a previously unknown path, the AS should forward the PCB immediately, to ensure quick connectivity establishment.</t>
          </section>
        </section>
        <section anchor="path-registration">
          <name>Path Registration</name>
          <t>Both the beacon service and the path service are involved in the path registration process. A non-core AS typically receives several PCBs representing several path segments to various core ASes. Out of these PCBs, the non-core AS must select those down-path segments through which it wants to be reached. It is the task of the AS's beacon service to make this selection, according to the criteria described in <xref target="selection">Path-Segment Selection</xref>. The beacon service then registers these path segments both at the local path service and at the path service of all core ASes. When links fail, segments expire, or better segments become available, the beacon service updates the down-path segments registered for its AS.</t>
          <t>As a result, a core AS's path service contains all intra-ISD path segments registered by the leaf ASes of its ISD. In addition, a core AS path service also stores the preferred core-path segments to other core ASes.</t>
          <section anchor="selection">
            <name>Path-Segment Selection</name>
            <t>Among the received PCBs, the beacon service of an AS must choose (1) a set of PCBs to propagate further, and (2) a set of path segments to register. The selection of these PCBs and path segments is based on a path quality metric. This metric aims at identifying consistent, diverse, efficient, and policy-compliant paths:</t>
            <ul spacing="normal">
              <li>
                <em>Consistency</em> implies that at least one property along the path is uniform, such as an AS capability (e.g., high bandwidth).</li>
              <li>
                <em>Diversity</em> means that the set of paths announced over time are as path-disjoint as possible, in order to provide high-quality multipath options.</li>
              <li>
                <em>Efficiency</em> refers to the length, bandwidth, latency, utilization, and availability of a path, where more efficient paths are naturally preferred.</li>
              <li>
                <em>Policy compliance</em> implies that the path adheres to the AS's routing policy.</li>
            </ul>
            <t>Based on past PCBs, the AS beacon service assigns scores to the current set of candidate path segments, and sends the best segments in the next beaconing interval.</t>
            <t>Core beaconing operates similarly to intra-ISD beaconing, except that core PCBs only traverse core ASes. The same path selection metrics apply, where a core AS attempts to forward the set of most desirable paths to its neighbors.</t>
          </section>
        </section>
        <section anchor="path-lookup">
          <name>Path Lookup</name>
          <t>An end host (source) who wants to start communication with another host (destination), requires up to three path segments: An up-path segment to reach the ISD core, a core-path segment to reach the destination ISD, and a down-path segment to reach the destination AS. The source host queries the path service in its AS for such segments. The path service has up-path segments stored in its database and furthermore checks if it has appropriate core- and down-path segments in its cache; in this case it returns them immediately.</t>
          <t>If not, the path service in the source AS queries core path services (using locally stored up-path segments) in the source ISD for core-path segments to the destination ISD. Then, it combines up-path segments with the newly retrieved core-path segments, and queries core path services in the remote ISD to fetch remote down-path segments. To improve overall efficiency, the local path service caches the returned path segments and uses parallelism when requesting path segments from core path services. Finally, the local path service returns all path segments to the source host.</t>
          <t>This recursive lookup significantly simplifies the process for end hosts (which only have to send a single query, similar to stub DNS resolvers). The caching strategy ensures that path lookups are fast for frequently used destinations (similar to caching in recursive DNS resolvers).</t>
        </section>
        <section anchor="link-failures">
          <name>Link Failures</name>
          <t>Unlike in the current Internet, link failures are not automatically resolved by the network, but require active handling by end hosts. Since SCION forwarding paths are static, they break when one of the links fails. Link failures are handled by a two-pronged approach that typically masks link failures without any outage to the application and rapidly re-establishes fresh working paths:</t>
          <ul spacing="normal">
            <li>The SCION Control Message Protocol (SCMP) (the SCION equivalent of ICMP) is used for signaling connectivity problems. Instead of relying on application- or transport-layer timeouts, end hosts get immediate feedback from the network if a path stops working, and can quickly switch to an alternative path.</li>
            <li>SCION end hosts are encouraged to use multipath communication by default, thus masking a link failure with another working path. As multipath communication can increase availability (even in environments with very limited path choices), SCION beacon services attempt to create disjoint paths, SCION path services attempt to select and announce disjoint paths, and end hosts compose path segments to achieve maximum resilience to path failure. Consequently, most link failures in SCION remain unnoticed by the application, unlike the frequent (albeit mostly brief) outages in the current Internet. See also <xref target="ANDERSEN2001"/>, <xref target="KATZ2012"/>, <xref target="KUSHMAN2007"/>, and <xref target="HITZ2021"/>.</li>
          </ul>
        </section>
      </section>
      <section anchor="scion-data-plane">
        <name>SCION Data Plane</name>
        <t>While the control plane is responsible for providing end-to-end paths, the data plane ensures that packets are forwarded on the selected path. SCION border routers forward packets to the next AS based on the AS-level path in the packet header (which is extended with ingress and egress interface identifiers for each AS), without inspecting the destination address and also without consulting an inter-domain forwarding table. Only the border router at the destination AS needs to inspect the destination address to forward it to the appropriate local end host.</t>
        <t>Because SCION splits the information about the locator (the path towards the destination AS) and the identifier (the destination address), the identifier can have any format that the destination AS can interpret--only the destination needs to consider that local identifier (see also <xref target="RFC6830"/>). In other words, an AS can select an arbitrary addressing format for its hosts, e.g., a 4-byte IPv4, 6-byte media access control (MAC) address, 16-byte IPv6, or any other up to 16-byte addressing scheme. A valuable consequence is that hosts with different address types can directly communicate.</t>
        <t>The next two sections describe how an end host combines path segments into an end-to-end forwarding path, and how border routers forward packets efficiently.</t>
        <t><strong>Note</strong>: This section describes the SCION data plane on a very high level. A much more detailed description of SCION's data plane will follow in a separate internet draft.</t>
        <section anchor="path-construction-via-segment-combination">
          <name>Path Construction via Segment Combination</name>
          <t>Through the path lookup, the end host obtains path segments that must be combined into an end-to-end path. A valid SCION <strong>forwarding path</strong> can be created by combining up to three path segments, in the following ways:</t>
          <ul spacing="normal">
            <li>
              <strong>Immediate combination of path segments</strong>: The last AS on the up-path segment is also the first AS on the down-path segment. In this case, the simple combination of an up-path segment and a down-path segment creates a valid forwarding path.</li>
            <li>
              <strong>AS shortcut</strong>: The up-path segment and down-path segment intersect at a non-core AS. In this case, a shorter forwarding path can be created by removing the extraneous part of the path.</li>
            <li>
              <strong>Peering shortcut</strong>: A peering link exists between the two segments, so a shortcut via the peering link is possible. As in the AS shortcut case, the extraneous path segment is cut off. The peering link could be traversing to a different ISD.</li>
            <li>
              <strong>Combination with a core-path segment</strong>: The last AS on the up-path segment is different from the first AS on the down-path segment. This case requires an additional core-path segment to connect the up- and down-path segment. If the communication remains within the same ISD, a local ISD core-path segment is needed; otherwise, an inter-ISD core-path segment is required.</li>
            <li>
              <strong>On-path</strong>: The destination AS is part of the up-path segment or the source AS is part of the down-path segment; in this case, a single up- or down-path segment, respectively, is sufficient to create a forwarding path.</li>
          </ul>
          <t>Once a forwarding path is chosen, it is encoded in the SCION packet header. This makes inter-domain routing tables unnecessary for border routers: Both the ingress and the egress interface of each AS on the path are encoded as <strong>packet-carried forwarding state (PCFS)</strong> in the packet header. The destination can respond to the source by reversing the end-to-end path from the packet header, or it can perform its own path lookup and combination.</t>
          <t>The SCION packet header contains of a sequence of <strong>hop fields (HFs)</strong>, one HF for each AS that is traversed on the end-to-end path. Each hop field contains the encoded numbers of the ingress and egress links, and thus defines which interfaces may be used to enter and leave an AS. In addition to the hop fields, each path segment contains an <strong>info field (INF)</strong> with basic information about the segment. A host can create an end-to-end forwarding path by extracting info fields and hop fields from path segments, as depicted in <xref target="HFs"/>. The additional meta header (META) contains pointers to the currently active INF and HF.</t>
          <figure anchor="HFs">
            <name>Combining three path segments into a forwarding path</name>
            <artwork><![CDATA[
up-path segment        core-path segment        down-path segment

+-------+              +-------+                +-------+
|+-----+|              |+-----+|                |+-----+|
|+ INF ||----------+   |+ INF ||---+            |+ INF ||-+
|+-----+|          |   |+-----+|   |            |+-----+| |
|+-----+|          |   |+-----+|   |            |+-----+| |
|| hf  ||--------+ |   || hf  ||---+--+         || hf  ||-+--+
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|| hf  ||-----+  | |   || hf  ||---+--+--+      || hf  ||-+--+--+
|+-----+|     |  | |   |+-----+|   |  |  |      |+-----+| |  |  |
|+-----+|     |  | |   +-------+   |  |  |      +-------+ |  |  |
|| hf  ||--+  |  | |               |  |  |                |  |  |
|+-----+|  |  |  | |   +--------+  |  |  |                |  |  |
+-------+  |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |++ Meta||  |  |  |                |  |  |
           |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |+-----+ |  |  |  |                |  |  |
           |  |  | +-->|+ INF | |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+ INF | |<-+  |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+ INF | |<----+--+----------------+  |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  +---->|| hf  | |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  +------->|| hf  | |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           +---------->|| hf  | |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       || hf  | |<----+  |                   |  |
                       |+-----+ |        |                   |  |
                       |+-----+ |        |                   |  |
                       || hf  | |<-------+                   |  |
                       |+-----+ |                            |  |
                       |+-----+ |                            |  |
                       || hf  | |<---------------------------+  |
                       |+-----+ |                               |
                       |+-----+ |                               |
                       || hf  | |<------------------------------+
                       |+-----+ |
                       +--------+
                     forwarding path
]]></artwork>
          </figure>
        </section>
        <section anchor="path-authorization">
          <name>Path Authorization</name>
          <t>It is crucial for the data plane that end hosts only use paths constructed and authorized by ASes in the control plane. In particular, end hosts should not be able to craft HFs themselves, modify HFs in authorized path segments, or combine HFs of different path segments (path splicing). This property is called <strong>path authorization</strong> (see <xref target="KLENZE2021"/> and <xref target="LEGNER2020"/>).</t>
          <t>SCION achieves path authorization by creating message-authentication codes (MACs) during the beaconing process. Each AS calculates these MACs using a local secret key (that is only shared between SCION infrastructure elements within the AS) and chains them to the previous HFs. The MACs are then included in the forwarding path as part of the respective HFs.</t>
        </section>
        <section anchor="forwarding">
          <name>Forwarding</name>
          <t>Routers can efficiently forward packets in the SCION architecture. In particular, the absence of inter-domain routing tables and of complex longest-IP-prefix matching performed by current routers enables the construction of more efficient routers.</t>
          <t>During packet forwarding, a SCION border router at the ingress point of the AS verifies that:</t>
          <ul spacing="normal">
            <li>the packet entered through the correct ingress interface corresponding to the information in the HF,</li>
            <li>the HF is still valid, and</li>
            <li>the MAC in the HF is correct.</li>
          </ul>
          <t>If the packet has not yet reached the destination AS, the egress interface number in the HF of the non-destination AS refers to the egress SCION border router of this AS. In this case, the packet can be sent from the ingress SCION border router to the egress SCION border router via native intra-domain forwarding (e.g., IP or MPLS). In case the packet has arrived at the destination AS, the destination AS's border router inspects the destination address and sends the packet to the corresponding host.</t>
        </section>
        <section anchor="intra-as-communication">
          <name>Intra-AS Communication</name>
          <t>SCION routers use IP to communicate within an AS, therefore they rely on existing intra-domain routing protocols, such as Multiprotocol Label Switching (MPLS) or others.</t>
        </section>
      </section>
    </section>
    <section anchor="deployment">
      <name>Deployment</name>
      <t>Adoption of a next-generation architecture is a challenging task, as it needs to be integrated with, and operate alongside existing infrastructure. SCION is designed to coexist with existing intra-domain routing infrastructure, and comprises coexistence and transition mechanisms that facilitate adoption, in accordance to principles defined in <xref target="RFC8170"/>.
The following section discusses practical considerations for deploying SCION and briefly touches on some of the transition mechanisms, with focus on:</t>
      <ul spacing="normal">
        <li>
          <xref target="deployment-as">Autonomous Systems</xref>,</li>
        <li>
          <xref target="deployment-ixp">Internet Exchange Points</xref>, and</li>
        <li>
          <xref target="deployment-end-host">end hosts</xref>, covering both native SCION hosts and SCION to IP encapsulation.</li>
      </ul>
      <t>We then describe some of the early adopters deployment experiences. A more detailed adoption plan is to be outlined in dedicated documents.</t>
      <section anchor="deployment-as">
        <name>Autonomous System Deployment</name>
        <t>A SCION AS needs to deploy the SCION <xref target="infra-components">infrastructure components</xref> and border routers.
Within an AS, SCION is often deployed as an IP overlay on top of the existing network. This way SCION allows to reuse the existing intra-domain network and equipment (e.g., IP, MPLS). Customer-side SCION border routers directly connect to the provider-side border routers using last-mile connections. The SCION design assumes that AS's internal entities are considered to be trustworthy, therefore the IP overlay or the first-hop routing does not compromise or degrade any security properties SCION delivers.
When it comes to inter-domain communication, an overlay deployment on top of today's Internet is not desirable, as SCION would inherit issues from  its weak underlay. Thus, inter-AS SCION links are usually deployed in parallel to existing links, in order to preserve its security properties. That is, two SCION border routers from neighbour ASes are directly connected via a layer-2 cross-connection at a common point-of-presence.</t>
        <t>All SCION AS components can be deployed on standard x86 commercial off-the-shelf servers or virtual machines. In fact, SCION border routers do not rely on forwarding tables, therefore they do not require specialized hardware. Practice shows that off-the-shelf hardware can handle up to 100 Gbps links, while a prototype <xref target="DERUITER2021">P4 implementation</xref> showed that it is possible to forward SCION traffic even at terabit speeds.</t>
        <t>Overall, an AS can be connected to SCION without high-impact changes to its network. In addition, use of commodity hardware for both control and data-plane components reduces initial deployment costs.</t>
      </section>
      <section anchor="deployment-ixp">
        <name>Internet Exchange Points</name>
        <t>Internet Exchange Points (IXP) play as important a role for SCION as they do in today's Internet.  SCION can be deployed at existing IXPs following a "big switch" model, where the IXP provides a large L2 switch between multiple SCION ASes. SCION has been deployed following this model at the Swiss Internet Exchange (SwissIX),  currently interconnecting major SCION Swiss ISPs and enterprises through bi-lateral peering over dedicated SCION ports.</t>
        <t>Additionally, thanks to its path-awareness, SCION offers the option of an enhanced deployment model, i.e., to expose the internal topology of an IXP within the SCION control plane. This enables IXP customers to use SCION's multi-path and fast failover capabilities to leverage the IXP's internal links (including backup links) and to select paths depending on the application's needs.  IXPs have therefore an incentive to expose their rich internal connectivity, as the benefits from SCION's multi-path capabilities would increase their value for customers and provide them with a competitive advantage.</t>
      </section>
      <section anchor="deployment-end-host">
        <name>End Hosts and Incremental Deployability</name>
        <t>End users can leverage SCION in two different ways: (1) using SCION-aware applications on a <xref target="native-endhost">SCION native end host</xref>, or (2) using transparent <xref target="sig">IP-to-SCION conversion</xref>. The benefit of using SCION natively is that the full range of advantages becomes available to applications, at the cost of installing the SCION endpoint stack and making the application SCION-aware. In early deployments, the second approach is often preferred, so that no changes are needed within applications or end hosts.</t>
        <section anchor="native-endhost">
          <name>Native End Hosts</name>
          <t>A SCION native end host's stack consists of a dispatcher, which handles all incoming and outgoing SCION packets, and of a SCION daemon, which handles control-plane messages. The latter  fetches paths to remote ASes and provides an API for applications and libraries to interact with the SCION control plane (i.e., for path lookup, SCION extensions). The current SCION implementation uses an UDP/IP underlay for communication between end hosts and SCION routers. This allows reuse of existing intra-domain networking infrastructure. SCION end hosts can optionally use automated bootstrapping mechanisms to retrieve configuration from the network and establish SCION connectivity. This way, clients require no pre-existing network-specific configurations.</t>
        </section>
        <section anchor="sig">
          <name>SCION to IP Gateway (SIG)</name>
          <t>A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
A SIG can be deployed close to the end user (i.e., at branches of an enterprise, on a CPE), or within an ISP's network. In the latter case, the SIG is called carrier-grade SIG, as it serves multiple customers within the AS where it is deployed. This approach has the advantage that it does not require any changes at the customer's premises.
In order to allow incremental deployability and to ease transition from legacy IP-based Internet to SCION, SIGs can be augmented with  mechanisms allowing them to coordinate and automatically exchange IP prefix information. A more detailed description of the SIG and its coordination mechanisms is to be presented in dedicated documents.</t>
        </section>
      </section>
      <section anchor="deploy">
        <name>Deployment Experiences</name>
        <t>SCION has been deployed in production by multiple entities, growing its acceptance among industry. While early deployments started on academic and research networks, SCION has expanded to serve the financial industry, government, and it is being evaluated for the healthcare sector.</t>
        <t>In 2017, SCION was evaluated for production use by a central bank, with the goal of modernising the network interconnecting banks and their branches. SCION was chosen, as it allows moving away from a dedicated private network to a reliable Internet-based solution. SCION connectivity was later extended to support system-critical applications, like the national real-time gross settlement (RTGS) system, connecting all country's banks to exchange real-time payment information.
The network, called Secure Swiss Finance Network or <eref target="https://perma.cc/PU5L-ALPM">SSFN</eref>, is implemented as a SCION ISD, where a federation of three ISPs forms the ISD core.
Financial institutions are themselves SCION ASes and directly connect to one or more of the core ASes. Institutions deploy SCION-IP gateways (SIGs), transparently enabling their traditional IP-based applications to use the SCION network.
The concept of the SCION ISD also provides a mechanism to implement strict governance and access control (through the issuance of AS certificates).</t>
        <t>Besides the SSFN, SCION connectivity has also been adopted by government entities for their international communications. In addition, Swiss higher education institutions are connected thanks to the <eref target="http://scied.scion-architecture.net/">SCI-ED</eref> network.</t>
        <t>In addition to productive deployments, SCION also comprises a global SCION research testbed called <eref target="https://www.scionlab.org">SCIONLab</eref>. It is composed of dozens of globally distributed infrastructure ASes, mostly run by academic institutions. The testbed is open to any user who can easily set up their own AS with the aid of a web-based UI, connect to the network, and run experiments. The setup has been the earliest global deployment of SCION and it has been supporting research and development of path-aware networking and SCION.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Currently, this document has no request for action to IANA.
However, when full specification of SCION is available, requests for IANA actions are expected regarding the registration of optional packet header fields as well as the coordination of SCION ISD and AS number assignments.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCION has been designed from the outset to offer security by default, and thus there are manifold security considerations. As a matter of fact, SCION's protocol design has been formally verified and the open source router implementation is undergoing formal verification (see also <xref target="KLENZE2021"/>). Describing all security considerations here, therefore, would go beyond the scope of this document. A separate document including all security implications and considerations will follow later.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4264">
          <front>
            <title>BGP Wedgies</title>
            <author fullname="T. Griffin" initials="T." surname="Griffin">
              <organization/>
            </author>
            <author fullname="G. Huston" initials="G." surname="Huston">
              <organization/>
            </author>
            <date month="November" year="2005"/>
            <abstract>
              <t>It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner.  In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable.  Also, the stable state where BGP converges may be selected by BGP in a non-deterministic manner. These stable, but unintended, BGP states are termed here "BGP Wedgies".  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4264"/>
          <seriesInfo name="DOI" value="10.17487/RFC4264"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski">
              <organization/>
            </author>
            <author fullname="S. Kent" initials="S." surname="Kent">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.   This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6830">
          <front>
            <title>The Locator/ID Separation Protocol (LISP)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci">
              <organization/>
            </author>
            <author fullname="V. Fuller" initials="V." surname="Fuller">
              <organization/>
            </author>
            <author fullname="D. Meyer" initials="D." surname="Meyer">
              <organization/>
            </author>
            <author fullname="D. Lewis" initials="D." surname="Lewis">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).  No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure.  The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
              <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6830"/>
          <seriesInfo name="DOI" value="10.17487/RFC6830"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski">
              <organization/>
            </author>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram">
              <organization/>
            </author>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes.  BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message.  The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9049">
          <front>
            <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
            <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
              <t>This document contains that catalog and analysis.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9049"/>
          <seriesInfo name="DOI" value="10.17487/RFC9049"/>
        </reference>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol.  Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult.  This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="SCHUCHARD2011">
          <front>
            <title>Losing control of the internet: using the data plane to attack the control plane</title>
            <author fullname="Max Schuchard" initials="M." surname="Schuchard">
              <organization/>
            </author>
            <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
              <organization/>
            </author>
            <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
              <organization/>
            </author>
            <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
              <organization/>
            </author>
            <author fullname="Yongdae Kim" initials="Y." surname="Kim">
              <organization/>
            </author>
            <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications security - CCS" value="'10"/>
          <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
        </reference>
        <reference anchor="LABOVITZ2000">
          <front>
            <title>Delayed Internet routing convergence</title>
            <author fullname="Craig Labovitz" initials="C." surname="Labovitz">
              <organization/>
            </author>
            <author fullname="Abha Ahuja" initials="A." surname="Ahuja">
              <organization/>
            </author>
            <author fullname="Abhijit Bose" initials="A." surname="Bose">
              <organization/>
            </author>
            <author fullname="Farnam Jahanian" initials="F." surname="Jahanian">
              <organization/>
            </author>
            <date year="2000"/>
          </front>
          <seriesInfo name="Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM" value="'00"/>
          <seriesInfo name="DOI" value="10.1145/347059.347428"/>
        </reference>
        <reference anchor="GRIFFIN1999">
          <front>
            <title>An analysis of BGP convergence properties</title>
            <author fullname="Timothy G. Griffin" initials="T." surname="Griffin">
              <organization/>
            </author>
            <author fullname="Gordon Wilfong" initials="G." surname="Wilfong">
              <organization/>
            </author>
            <date month="October" year="1999"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 29, pp. 277-288"/>
          <seriesInfo name="DOI" value="10.1145/316194.316231"/>
        </reference>
        <reference anchor="SAHOO2009">
          <front>
            <title>BGP convergence delay after multiple simultaneous router failures: Characterization and solutions</title>
            <author fullname="Amit Sahoo" initials="A." surname="Sahoo">
              <organization/>
            </author>
            <author fullname="Krishna Kant" initials="K." surname="Kant">
              <organization/>
            </author>
            <author fullname="Prasant Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <date month="May" year="2009"/>
          </front>
          <seriesInfo name="Computer Communications" value="Vol. 32, pp. 1207-1218"/>
          <seriesInfo name="DOI" value="10.1016/j.comcom.2009.03.009"/>
        </reference>
        <reference anchor="LYCHEV2013">
          <front>
            <title>BGP security in partial deployment: is the juice worth the squeeze?</title>
            <author fullname="Robert Lychev" initials="R." surname="Lychev">
              <organization/>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization/>
            </author>
            <author fullname="Michael Schapira" initials="M." surname="Schapira">
              <organization/>
            </author>
            <date month="September" year="2013"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 43, pp. 171-182"/>
          <seriesInfo name="DOI" value="10.1145/2534169.2486010"/>
        </reference>
        <reference anchor="LI2014">
          <front>
            <title>Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec?</title>
            <author fullname="Qi Li" initials="Q." surname="Li">
              <organization/>
            </author>
            <author fullname="Yi-Chun Hu" initials="Y." surname="Hu">
              <organization/>
            </author>
            <author fullname="Xinwen Zhang" initials="X." surname="Zhang">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <seriesInfo name="Proceedings 2014 Workshop on Security of Emerging Networking" value="Technologies"/>
          <seriesInfo name="DOI" value="10.14722/sent.2014.23001"/>
        </reference>
        <reference anchor="COOPER2013">
          <front>
            <title>On the risk of misbehaving RPKI authorities</title>
            <author fullname="Danny Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="Ethan Heilman" initials="E." surname="Heilman">
              <organization/>
            </author>
            <author fullname="Kyle Brogle" initials="K." surname="Brogle">
              <organization/>
            </author>
            <author fullname="Leonid Reyzin" initials="L." surname="Reyzin">
              <organization/>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization/>
            </author>
            <date month="November" year="2013"/>
          </front>
          <seriesInfo name="Proceedings of the Twelfth ACM Workshop on Hot Topics in" value="Networks"/>
          <seriesInfo name="DOI" value="10.1145/2535771.2535787"/>
        </reference>
        <reference anchor="ROTHENBERGER2017">
          <front>
            <title>Internet Kill Switches Demystified</title>
            <author fullname="Benjamin Rothenberger" initials="B." surname="Rothenberger">
              <organization/>
            </author>
            <author fullname="Daniele E. Asoni" initials="D." surname="Asoni">
              <organization/>
            </author>
            <author fullname="David Barrera" initials="D." surname="Barrera">
              <organization/>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization/>
            </author>
            <date month="April" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 10th European Workshop on Systems" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3065913.3065922"/>
        </reference>
        <reference anchor="MORILLO2021">
          <front>
            <title>ROV++: Improved Deployable Defense against BGP Hijacking</title>
            <author fullname="Reynaldo Morillo" initials="R." surname="Morillo">
              <organization/>
            </author>
            <author fullname="Justin Furuness" initials="J." surname="Furuness">
              <organization/>
            </author>
            <author fullname="Cameron Morris" initials="C." surname="Morris">
              <organization/>
            </author>
            <author fullname="James Breslin" initials="J." surname="Breslin">
              <organization/>
            </author>
            <author fullname="Amir Herzberg" initials="A." surname="Herzberg">
              <organization/>
            </author>
            <author fullname="Bing Wang" initials="B." surname="Wang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="Proceedings 2021 Network and Distributed System Security" value="Symposium"/>
          <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
        </reference>
        <reference anchor="KLENZE2021">
          <front>
            <title>Formal Verification of Secure Forwarding Protocols</title>
            <author fullname="Tobias Klenze" initials="T." surname="Klenze">
              <organization/>
            </author>
            <author fullname="Christoph Sprenger" initials="C." surname="Sprenger">
              <organization/>
            </author>
            <author fullname="David Basin" initials="D." surname="Basin">
              <organization/>
            </author>
            <date month="June" year="2021"/>
          </front>
          <seriesInfo name="2021 IEEE 34th Computer Security Foundations Symposium" value="(CSF)"/>
          <seriesInfo name="DOI" value="10.1109/csf51468.2021.00018"/>
        </reference>
        <reference anchor="DERUITER2021">
          <front>
            <title>Next-generation internet at terabit speed: SCION in P4</title>
            <author fullname="Joeri de Ruiter" initials="J." surname="de Ruiter">
              <organization/>
            </author>
            <author fullname="Caspar Schutijser" initials="C." surname="Schutijser">
              <organization/>
            </author>
            <date month="December" year="2021"/>
          </front>
          <seriesInfo name="Proceedings of the 17th International Conference on emerging Networking EXperiments and" value="Technologies"/>
          <seriesInfo name="DOI" value="10.1145/3485983.3494839"/>
        </reference>
        <reference anchor="ANDERSEN2001">
          <front>
            <title>Resilient overlay networks</title>
            <author fullname="David Andersen" initials="D." surname="Andersen">
              <organization/>
            </author>
            <author fullname="Hari Balakrishnan" initials="H." surname="Balakrishnan">
              <organization/>
            </author>
            <author fullname="Frans Kaashoek" initials="F." surname="Kaashoek">
              <organization/>
            </author>
            <author fullname="Robert Morris" initials="R." surname="Morris">
              <organization/>
            </author>
            <date month="October" year="2001"/>
          </front>
          <seriesInfo name="Proceedings of the eighteenth ACM symposium on Operating systems" value="principles"/>
          <seriesInfo name="DOI" value="10.1145/502034.502048"/>
        </reference>
        <reference anchor="KATZ2012">
          <front>
            <title>LIFEGUARD: practical repair of persistent route failures</title>
            <author fullname="Ethan Katz-Bassett" initials="E." surname="Katz-Bassett">
              <organization/>
            </author>
            <author fullname="Colin Scott" initials="C." surname="Scott">
              <organization/>
            </author>
            <author fullname="David R. Choffnes" initials="D." surname="Choffnes">
              <organization/>
            </author>
            <author fullname="Ítalo Cunha" initials="Í." surname="Cunha">
              <organization/>
            </author>
            <author fullname="Vytautas Valancius" initials="V." surname="Valancius">
              <organization/>
            </author>
            <author fullname="Nick Feamster" initials="N." surname="Feamster">
              <organization/>
            </author>
            <author fullname="Harsha V. Madhyastha" initials="H." surname="Madhyastha">
              <organization/>
            </author>
            <author fullname="Thomas Anderson" initials="T." surname="Anderson">
              <organization/>
            </author>
            <author fullname="Arvind Krishnamurthy" initials="A." surname="Krishnamurthy">
              <organization/>
            </author>
            <date month="September" year="2012"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 42, pp. 395-406"/>
          <seriesInfo name="DOI" value="10.1145/2377677.2377756"/>
        </reference>
        <reference anchor="KUSHMAN2007">
          <front>
            <title>Can you hear me now?!: it must be BGP</title>
            <author fullname="Nate Kushman" initials="N." surname="Kushman">
              <organization/>
            </author>
            <author fullname="Srikanth Kandula" initials="S." surname="Kandula">
              <organization/>
            </author>
            <author fullname="Dina Katabi" initials="D." surname="Katabi">
              <organization/>
            </author>
            <date month="March" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 37, pp. 75-84"/>
          <seriesInfo name="DOI" value="10.1145/1232919.1232927"/>
        </reference>
        <reference anchor="PERRIG2017" target="https://doi.org/10.1007/978-3-319-67080-5">
          <front>
            <title>SCION: A Secure Internet Architecture</title>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="P." surname="Szalachowski" fullname="Pawel Szalachowski">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="R." surname="Reischuk" fullname="Raphael Reischuk">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-319-67079-9"/>
        </reference>
        <reference anchor="KING2022" target="https://datatracker.ietf.org/doc/draft-king-irtf-challenges-in-routing/">
          <front>
            <title>Challenges for the Internet Routing Systems Introduced by Semantic Routing</title>
            <author initials="D." surname="King" fullname="Daniel King">
              <organization>Lancaster University</organization>
            </author>
            <author initials="A." surname="Farrel" fullname="Adrian Farrel">
              <organization>Old Dog consulting</organization>
            </author>
            <author initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
              <organization>Orange</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="HITZ2021" target="https://perma.cc/4H3Q-WZNG">
          <front>
            <title>Demonstrating the reliability and resilience of Secure Swiss Finance Network</title>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="LEGNER2020" target="https://www.usenix.org/conference/usenixsecurity20/presentation/legner">
          <front>
            <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
            <author initials="M." surname="Legner" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="T." surname="Klenze" fullname="Tobias Klenze">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
          <front>
            <title>The Complete Guide to SCION</title>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <author initials="P." surname="Mueller" fullname="Peter Mueller">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks go to Cyrill Kraehenbuehl and Juan A. Garcia-Pardo for reviewing this document. We are also indebted to Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter Mueller, for writing the book "The Complete Guide to SCION" (see <xref target="CHUAT22"/>), which provides the background information needed to write this informational draft.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8V92XYbyZXgO74iRvVQJAVA3LSxXPawSEqirYUmJZfbZR86
ASSANBOZcC6kUKLm9D9Mv8zbPMxn9NP4T/pL5q6xZCYoVpV7mpaLRCIylhs3
7n5vDAaDXpVUaXxgHlwcnb57a95dx8V1Et886EWjURFf2y9OB8cPeuOoimd5
sTowSTbNe2U9WiRlmeRZtVpCH6fn71/0epN8nEUL+Dgpomk1mMRX8FYxWEZZ
MRuUY2g9yGWUwfZOD4bY60VFHMn7N3lxNSvyenlgzg7fnr/sXcUreDaBrzPo
J4urwTF23LuOszo+6Bkjrb9/CX/zRL6HPpJsZl7iN/B0ESXpgaEZ/PekqKbD
vJjB46gYzw/MvKqW5cGjR5OoiqoiGl/FxTCJudEj+Eev4TBJNa9HB4aWEJVl
Pk6iCv58FK7pEiAFrVNYdFm53ptvDbm7YZJ3vP/oy6AbzqtF2utFdTXPC4DC
wBjYlPLAHA3NJDa/wxdhGvDDm3GUF0kWN76CFR6Yk/evzJ/quEjGc34aM7jG
9MZQJrGo43k6j+K6jIv/Drs/jKv5j0N4xRv67dCc12WVzLI8TfzB3ybjPI1a
X945fEbvDAv7zrpRD4fmLC6KZOaPeDgpkigLvrhztIjaD5fUPhwpy4sFbNk1
4Fqvh3hvPxpz/uJof/fJvv65vbcnfz7e3Xkmfz7Zf7atfz7b0z+f7W4/1j/3
95/In8+395/rn7s7T7XBzlN67eLo1YejV4fnx7vbOzsH5vjd6XBne7izs//4
0c6zJ0/2tp8O8ff+zg40fn343bs/nL7/0+729nbYdm//6fbj50P4tb/7DFq+
PD998eL07c7z588bDXee7DzfH8Kv3T3s8uLw1bt30J/XbHvnyaO/Dcf5Av4N
8avh9t4QfuEE/uXo1ckfYKp7Ya+7j/f2d548H+7uP3uyvbONLU+h1b5rtf90
d/dRGWfVEJ8Pd/e2t3H4o3fvzk7OOzt8/PTpzpB+P3uKMHv3/tXJ2+9Ozl9S
+6eNZW0/efx8Z29Iv3d3of2bd+enr1/D0nZ3GrPIJmU5xOcw3f09hNbvXp+8
/dNJ2HRn+/mjo4sXj3f2nzzj1gD0HWx9fHL+4fQ9zmJ3p7kLzx4/fwaz2H++
/2wPAXb4FlpfnLwFMDbaPt7e3d7bH+KvfZrDIe7rzm4DDntPnz55+nSIv58+
foLtPly8enOIHTZAsLO7t/t85/mQfu8iyACy56cvCVh0MAK2AOfJXMTjuogt
ETaHQDyTKh5X8PQBvQIEFN7ALriHqJjFHgWc5AmRVEKb7aePnj99Ntgb7O08
Hzx5uv1se/CY3gLyksQlHjOehzGnF9/BBILWT58PntO3lvzRz0B+dxOGu2jD
WvLQ7PNsaC5+jNJoPM9vyquk0fNZdBOn3Q3u1/05UNA4Kcfz+qrR9Xm0BOqb
tr++X8evh+ZoXkdVo9fXEexeVjW+6+jyd6dvATl2dwPkOJpHaRpns7g0QBVN
NffQ4zyvK2TBF6uyihclflHkk3ocT8xoBci0iLIqGWuzAH/oSHbgTxd/BmFD
mCUy/AEy98HYTmuQZIOCR3j0ZXw5Hprf6VwciI6jLAG4B98QgF5H2TiCxRXm
QwbsoCiTarUWEV9ERRGn3YjY+I46f5dOzHE+AyaclXVaucEbXQO3/200/nsd
A8wbvR/NiwR4JwzQbsFjFBEACZ69IjYBBMrf3ON4AWMDwGkbcW9hkkk0SlJY
p4myCXwu4UOcjWOTT5U+XNyARGheJFmEz9/GFcpz4fbudG4vsN5FNByPH+2/
2vv94Ps/vX3ZsWO05ouheZVUP/b8xV5EIKCk/nNa4mEWLaNVpFiIvObk5Vsi
x9vSpxK6k7PTI8B62MgVnGPAssqclgDEGP6cwMAEgmPAQXOWRhktGf6Mqvng
8CbyCCPTQrfabRmmsdybm5shyFJZ8pHwGPZ5GhcIy0f8tERwAqR3tx8tAdBw
SFnYTONZpuJbCBsPNRhOb4bmtde6hXcNAriOkrT6fQ/nBM7Xj3Gz3/f5KInK
1pf37Rfm+/2qLJu9vgExvfHFfXuE03EB0AMsb8GAT0e+nHe0uG/3bQbzkwEM
Et3h+wZZffAeMO0oXyzTuIrNyzoBob3KDXHikNOuo5SdnHZ7b2ew/Xj32bPB
9j04rbZ+Otj7MuX8pdylo8s28lpsuKrL5nf36xMI/HcRrLhF4a+TSeObe3f4
KqrLedyaJvfZ+pLpbgW7eZ1nsLXY91XsMRBY32wSj+piDb0Pad966reW/nX0
CTLNG3g9bS3iLEbu1vzufqD5hcJXrzcYDEw0QgY0rnq9975sMQciM4rjzJT1
eByX5bRO4fMqB54UX8dMqRd5WZl8WSULZIJjE39cgqxKNLQk7pWUMFHosLoB
LXdibkAdNyCUAGsrsWWJBD6vC4Mae1ytAHXqykQpnIJ6NqchgLOlk8ENHk/Q
fhY1aKzUvykJ2mZWR8BhqxjEo1maj6IUOCbIhcJC+6G8hGvK8sosi2QRFUm6
4hWO6iSteHLKEWj28wQmEV2D7qocGTjUIskmQ4OgyuKP1WAGLL/gGdFKBxlz
Y7J7qOjOZMVsXIyj1M7sKEdpLe3TUKcl6OHUy7sMGHrYsXRZbpooASkPEDua
TIBflbi6MgYol3VcDmWUG1gkbESajIHSrcwEyM8MgT8t8gWBA2S1EoAB3eRT
4IfhmoPljvD1aQSyEa84WNOyyOH4AdxR+MPdkeVMoQP8PtEl8QorNDIYq9rD
slCcjbPJoMoH8Cvc3qE5RUQoc2gRjVIYZYES2mAJsoARaRM2r7rB/ZsDGpZD
xF/ANxBW6wUSxAnI8HVZxqWgapVcC2aO4nmCM5rrxgTrwsnOgFQABhMGDFLA
99SoTQhRNgHMndbZJMKBAOVg6ss8g7/LPqxwnNYTnB62QooeoxDOS17kE+gq
ksFhF+ol9ocfBH4D+hbFcLNEEWhoDkuZJSwuSgG7J4SHS5L0qVcQZmA3J5Gg
u4UAdIlzgZUQbgNF8BfBnU7iZZqvsDlCEOnBIplM0rjX+8qqEziIpQ5uWMAb
+o3IlhctOCOCTRB0+ZLHAtTI0zS/Ye0kMiXwugrxc1wkS3pDZ/V1idZE6DmN
eWaEfTIeQGGKJLNqzkcQEnamgO8KJJGwfYhzytih36t4RXCJlxWTKAcAU44B
2Yokl/HWwbHMF7Rd4wJFB1BPYGoVbDl+D+MqUnUQUDqOOBwLu24LAfRffWW+
n6/k3YF54+D46aub+epzr3eRoLSPWJXQ/Olotegb4lGS1TACrBq2BtbYh0OE
KBqVJeJlBvtf47lAbAB5aBHzeuXNvC75PbQ58yoKJMcVU24mNth5itD1ET4y
oJJf4S5aYpACa1CGACsufQIIyggRA1wV7oTSob7Jx/AXCerEIUrAooLoVgT6
Zt/cxNGVIbLUJDJIM2crVugWSyYk3+Oe8QmDTqawqdBphueXQB9ZVStfCsFl
qPIUKgddopYlLKkCCRI3r5IDEM0AWYG4RVUF6y9xw+G0we9lnk8BMH1zejZQ
kj1P/gaN6OkEdJAoHeTTQYnHchzzImCrRqDaMdCYOpSwRS+AXC5wCSN4H83x
yF8dOe0DmGLz6VNgv/z8uQ+PfCslP/GskfzAWh3xI07i0ycxu37+TJQVN2Ae
XceM0hkcjAIRJcmSKiFLbZMvgVwB+GV506HH1JFlee9xtwGOLfAs89nv83Et
ABZFPIsKwrSAZXlIBQcxSVEEQPLhgWwSV8CVSoIRnIbhbNiXFW7v7TEExIhs
P6DtOAAGWpDpARxzENbwN4DW2l8F1GRl5b+dKVU6bRhM+alnFnXDqSWIgH+I
nAhROkYDA2IJEfuvS4eayHNpA4DITJOUoYhehPJrAMbf66RwhBTYSIzSF6Ae
0CPA+QqxF18m5oFGownhXYy9g6hUWtkK2scfQbjKZrwJQCJwCxtoKNg/JfME
jIKEGLSumhC6b+YxCnjjyIkQBTytVTpP8IQTs+cjEOG2zZBUZYoPsPPAUIWP
gvQH56yoVAabFhHIszXzcj7SecEUHfCOYKIgCYknAGAUE8eHZYoYBOc8Qjkk
JTLJvaxEzBVTTRo7wqG8XCRRKwqiHAPUj1gFNBEJSbvL4rghd3lCbTQu8lKk
H9BVrewzyRHFARokjIvlhI0YbCoSYiRjKE+8gW5xpTD3FVJBkAkcAOaw1jE8
ATDQeOheK2jXGf44TRbqpwXQGhIoZalXcOwGJbDHMYAZcLbBAkUOYLaXFxPk
O7lZxDSqkIoBbi8AMZ40UFZkNBF9Sbynt1iaQGDMcgDxAYgv5kxkABLcApgG
Mt6GbkkLahPEwgiV9k2vuyngFG0bsUx5T7eT5X7eEOAOGXDAgoXiwm419YVb
VTHYuhnCcX7BFCCnzZIthHdPSAg2JP0yxkfIHlc+MYqWKPMTHg7ofE9BI6M3
WEP7kTkK9HbK5JUWEUxe2DZLnkBfPMrKC8Bhw1NDNukciGyR33wdTKJ0pOA6
KaqaVTNm/R5PRYqUzUqzcZq/3+TV43kTCHjdCVbgftPu+uIDTDxDZnwNvQP2
bW29Bea8tYUuFY/+A2Z54inOXPCSbOisPCH7GMUilY4YYUFUxZXDaTCzaAlT
jNJVqaotroKM4yTDfWUuxoDnVpJlsZlZocrL2ndphVLQhpPCCs3C/cwW9b81
OLywp54oXu6EGCag+E2gSHnAMK9A4Aak7au8n8esA4PgJGMUUTAGc+w+NCq4
dVJZ0dobZRmt0jxCkWtcrJZOBINmcIzxwAWqjxLgCqA9RhluniBuwN7ArhKN
gWUjGc+qtp8Dliy7TdiOYiWrsWS1Q9UgALrsxBlaNYhRgKqNTQtBpO/g4E4Q
fOcxkrgJun9L3inRtPxDoXARrYGIGosvqRoQHHkDxQapCRIbZDTCD8jo8o9/
R6MLMHfnBVSGP87r1Jq/FzF6bUDFIBqFoiUSAqaN4hIY5zOcQG4JP2Oi8Evg
GRGwcTj9ZDzxUAABixT/fUgNmfM5NaWPW75AdZ3YFxEYUlcIniR/5CJJKE4D
NpTeNEWYSNC8ulCzOskw3jaQcV+gitQBOPciphGVbuhuEOGATZ/C2DmveBTh
CUTlALUx3EDRQ9mRkpSMac6OAAAAihiTGjLPb4AyF9I/sqFSnC+O7xjHjhDo
IHqVQoaipLTOipLHZoz7yhxe53wcz5JqCvgBWEWyI4YcfP7snXzQ6JDvXCco
RMPpWuZlxBIcknwg9bQsQR89B1+HVgfRxCbJhA40UEJQj7AL2sl4opwTZF6x
GuHsmOXJ9LxF0npAAFCtl6Xn+GOEe9iiHiSzM95EE+AvjPrYNXZYtMSqGHSn
MQV0kKpp6VmnQWkEatyUrCdi7kBNNipQLJtEMBaKcyck9kwBHVKyJSyQaQCR
rtbIYGRAY/1djBHaF9N8Vhyq6AoXdA0nEGEJXdWleuYYAjpzmPQ8y9N8BiT2
DbCYnA4YgoZmxHKmtbLIipj3J6A0E0qeXpyVnuYJYmrYkG0FljkdCBA8kw3a
UNCeQjtnpWkS4kBML2ZMHevS0UY8VoB4i6ReBIyiz7Dhed/McyLNCBlabI4H
nMhHgojBwiRyVkUMERtR0ke/MFFXOIB0xmGBqmzDunNg9kq2449oN4YBLO8J
xXd8FfXsfJyn5WBQkRaaIAay0IwTIlkACA3QJkOqCR9xNHapWO7QALWpjEUL
OJUMNiJ0KPKGRyFhU0r8EY0MrAFivBGS7Aff43tvAFfYJx+ZC2cjP5P5/uZB
6/ypcpaTMDmmDWehG+WuZIRmVKGcQoyZRioISPcMJBMlv7vDHcV7mKfQ5kSt
VkROdcCoZEMGG2yA7rAKh0f1OkprkI2TYTxkE4g9iNB3AxmR/d7EyUxNK2VV
bpItiMkngJxfsNYewXOYc14XJLIBEvgSOp8jJwakK0UuoDWFUGg1LqMOCGuI
wl1TcOwM9z1wHLTtp9YKRxILW1CBfrFrguEk77Or3emyJJ8qfwVGzG6I0gqu
+Q3jhFXYQh4IDUc5ieQxM/NxmiM3YaCQsdceCpl1+D6LTMD8UHdHQI2QOhMN
FnmA9MIK1rlAOb5CqanktQPJgf0uE3jFMqysvGFc+L0yOFXe5Egr00ZgmUvU
JwYR+eJV+r3hONDLgJi3UZX54C4KPYKfeAJhPoCgGwiOTY/HBgczojk2dEdS
JX6MRVQw3rzclMRHRDIAekVAOJjBRqLYdgP4U8UkqJDYod4CNVTi1mPcgeG4
g7euz3MR7zju1WxQ/KwoLlbfXdajNCnnbIQts2gJdLqyFkUgLtkVkzsmNKDO
jWOrNSNg0QSDHJuWTrPpFkAYjF8268DJyNEQDG8Ukz5ZVLNqLkZTtOPO7QCk
R4PICMwe5f1lnmRiKg+0sRkQjIiJFE4ULbYgS/fxKJEIaX0+ALgKpR2EJko6
MDMQw34jgyCWuVHKOEXLCralbvFckjYAChaqs6SM3USrwFZBozgBRPa/L9KI
dN23XpdgFZa9L/wJdeETj70G/wMRBy0rxHpigDR6kpxinWTLGn1HyN2tdWiy
AHWCgoBytIR581PnXVGqeXvCHNqfLMv/Y6SD12wv156dWBG8TGcqZaegd5Kw
n+ukFDNW54ESLPcGJmMEqyK0KEXxjQfUQQ7HgGTcB5ssRHSdUuS9JLtOfiNH
AFViwnzF39LHf9n2qVjAzQ+/i1eo4pFP5y8bX13Fq02a6A/HTlKC50z04agW
dFB4q0RXRNfL2/zmN6wFAr0F2UlMQpaSr6HHCNqWXEZmRPI+MUqKsALSEcjv
xUSMMex3IWVPhASUcKbIBotkycIASqQ8shzl05P3L/rWpmgJYluGcAq1I26e
Db1zM9gRFaYpdFjzSos9vsW/QzlBLto0VgOcknHFFOyHbp8X7BZoSJsMH2fn
U/7+Bfdspw+x7xlLIlIfxwbmCziGe4JPieOjdHlvv74gj3CHIFqX8OJttMCg
wl4wITRWGtJPxf/eNjkjSiG9S/AoBcaIJQfNTeIUzeWr//jXf1tr/1VaBJoR
9ERePTTMJGR3Roo9T2K0SnneE/KmICSBJWSVlb/yYhZlQCI82eTwgsRsWAMl
hpRsB4WdBSqDk1aBniyJaLNnrWBrywU6HLMF22ycXhxvbm2B7JNBt3q6UbJb
jAA6/gmEluRKSnV8smZcHJtohgbpnE11rAJSuEGR55UbHUG0tfWevjmHb5Bo
TJNZLfu88f78iCZCnm7oFTbJGr7ZY819b22RKxHnsLWlpiw1kflKFe0xaRs4
cwKvaunz2J8ijLlaoqkKhd7ITAGPJwzpmsUIWi9qaG7NZA6reKr/8a//qyT/
JmCkg7D4CDAITay97igt64JkL+L25CIg4dWRmrJeIvmQWc4xSinHQ8HCPKAC
muFxHrhh3tYTIZxiGgwqDrQ6ux/f6FgKrMCWzYyeYBLzCsp5siztS+zr5YVY
/CpyEkEaoEFWBKcYbWLIdKdpzc5kNSypp5Z2BIijjwflN/jYDurZyv2jIuqB
Nw9S0RBPxFjMISB8SKL2RFFFjm0IC2E27B2iiQIni4CQEK3QDYVBdUB1LHQv
oW87QWsitEfNlIUAgPI4JjJDsO5LgI0nhCHSLllvTsmcCXxlXFkZDDq4ERaC
jEaELzS9lE2DVcsdl6UrlWRoUIao59aqlxh2KYYair8iNjWFWcyBkCCMWHF5
DSJ0qY5p9kogCcDUNJoG+mGIQojphE4sPewbQrhqAAQwnegzMjXErArRI4yG
MYd61vHR1hbhOtl3iBDa3QPybyxJGMp7rVHgfTEwioID/9IYPUt5Zm193BWR
ED32qLuZLM8GMsTQUQOSSBvDgJBXi2kajS1WA0AtR0zzaDZBA15kbUYDkA+q
HMSe4OzZpXiAgVWI7CHWhWAV/jSB71FEgs8xP38Wi8ka1u0MbcpvLfZAf/8D
fiiccXj3D7Y5MHf/YJSttPkBCP9f1rbyOto4CH42XTP+tWY2B+H7TDURSEEv
B15H7WkcyPvm4WAweGjsHOznTX39gJd0dN5cEnYiM7g9Ory4/fbbb+Vl/qzT
OfCmseHPdrN7KmFv8PvbTfj/Af2Dnw0dxb6waXuBn0cbjYXwJP5sgSLDyRy/
/VYn6/fyyO2NuVXg4HT/HPRiNkxjLptuRdiJ+7kNQJcHvbhJe3ggveTBe34v
PKDXixvvz+FGS8uuXh7dHl6Mbr1e/EnbbqgXaBn547u/HzXnEk5aP909l0f2
E/fSaGg/ClxCeN76nfi9wKQ/3pqB/sDH1e2XennkTftec+la7iO/pcIlHE5/
OuAin2QmMOv4dh10g16g5fjWX+3k1jbnPgcHA/zX3IYvz6XRTqH7o6wJT/Wu
6+WL5FI6wf+smYtHUN0QO519rCfgvTu+c41exyCJTmxOTuPndu3zM+KVqGUM
DDPMw4sDk/fOPP52QNjXO1KufwAk51v+iI2B9jAb+nRgvgq9qJhY8u2DNdzr
wWeWXGwynijVYikibz7yfhWEiDWWWAMA5K4B6Thk7UBdED4NzXdoRuZWZCZD
gQMkpTKeacwqj41y4wiEdbRVbJwdfVeCiiOhoRi1a2dKNjcQLQy04bh9itBT
1UeYulrRMtRPyniBQVoxmhA5uiiQwje8UdwyaJxNFEGiRU5udZGbgvb0lM2A
EgE1SaaUvFWRrCymAVwP2R5BRUTVgEIR8lkRLeesTWmYJkmoFAM98QVYPxw9
R/WTRRIWB0EgIrmSgOHaia5N6hcpg/N8aaZJnE5gCa9elKRCnpCdrKx4b4Ko
dwnDh8fei2jAKWJcghdi4U2UQUEhKxQaTmYACqOAF6OiWK2bZ1KozWAeR5O4
0BBAjWbAP1U354YD7C+Jg+HLCqcG6PPiwmrI2gNJg6ItBmH6Yb4G73ascOGg
UqsWYcwwrp+DXO4AAvsjSqdreNahKl6iPrszNC+SAlWbiCwKaP1CGbN0dmVW
yhHr+mZSF+ripSMkOEiz3jIbAHI+PtBo0yznUQmS6C6DADqns8Bm61I0d0XK
3CpJrBADCuZoisFBSfFl1wyb51NGUnqXVEaaipxm0U+KeJaU5LJm/NFvWRVA
dZteCpUutIPXaHq6Uku3Z2kKQCGYMY+WoMqXbbjw8AoYgcTe0By3G4LGWnvN
2BYfjSnMg/eZtdm7t9qGpJYaDErm0BKtSmOJiEa070s/hFkaKQSHMdqEHeEp
pXl+VS+3CEf6tOxRxfa0FpQ3Ru41LxTbe5efqkUlnLPNstFOhxgCYjEI9B9U
y27IcV92xBXogSBvQ1ZX5TxOU1V9Hg5aPyEj7mrQu2VP1olD6zXSWMAr8eHG
dw7z8aHf769vqddzDynkrWZXXx7r/utyLR+u4fJdP+skgi6Are9XeumY7HX7
kd9XsGaBmp6Q7jFuG4M8XDfy4KG+Ibv8mhBd9urX8vDIoTG2/LljdH23duVW
SLK4H0pILuTDQ3SVkr4yKvEAic1qNAR7MtMkHuf1EpPCkHjQoRc3BFnGKMam
I4JvaOslAJUbaQwgHsFfwWh9GOrXpqop2imaZTllNFIYfGsM4O/OEC7zY898
kgE1TSo/3a6ZR9I3I0xyNPvPBqOkooxN8v/60QMwVCKRK7xkbxhJwsSu93ap
C3498RLBmD1ZkpjmFC4vrpqEQ7jqUpxSndGO8NyRtr4L/CJXFsd02ZwAYPJ/
rzV5hRyDNTsZQQ48u97H9JfrJ33s8s3hkU6DoxElvgzlTon1cJN0zjDKr6P9
mgb71Q9X9muzN6ANFCshgDwwPx7ZND3z6SvikgOXufeZBZKtLcZXIyk5aOBn
v4GwCvtU/clbW2N0aU9R0IldA6Oh0n5k9YD8IU2zqJuElaDttgOqoaFdulXv
iI1fKeIJOt04WoZt8LR7jNeHFxjEjc5dmuxqGXuYy/iIUdkUqs74S0hBEca0
9ypoUi6dBG0h2G9AeYrNpQS3sQ9Surm0pmfCq8AdovZSNpOyid1chgC/bMhr
vkxLkRxJSQ5cFANRhEEsUmcdYmoRj2MYTZ3VGHEQzViwROGKMqaTfKLOFg5z
8iegvZGHUTw++KYfsyzgYVih4KXaJCpyBRySZDYfcSyqswt7Ggt2ASIJdkAZ
BSQYrggb0wQ9tlZSVWA4Jxh/paDEiKVllBScdeeZoAm0Ps5eskKDouBySSH3
RKKAsnDINmgi7G8vY5auoyzL62ysqpMVaKhrv2fcEvURTsi9YubQGWnHeDzH
6Gu04TiAkAsQPwsW7yKC7/HbC+y2sGnf4Zb0GbISHcLSVaVRCk4MrqQD3qcK
3Tea7zKKOXEEQzLk4K6sPM1SsUib4cIy9bCJd03g2nHiL81VDPoHLTbGkO5l
wp4Ir63vAqRUVH4QtKAwAUpvI+aIpBm9omFyNOlf7TngRvwdk/tdNEwDt29Q
XbmO0mTiSs7YQH3xaxGKShQgte/oJ2X3mT+JTTjRl981aEFUeMQq4r2LJzMv
HtUdDSKUVVRSBmlIVMRf3qRK5FnTwxa+YvKiS38gdihElonZ0HxPxEwcn6Rf
UHJaM7NHOCMFx2PqF9tsWiGsNl7VbHCe4enF4BRI5ruLsxd9c3G+qTmenm48
jUYFCBv6wlnfvDl7fbGp3Bn4lMzBseShuWwS8Mu+Y5nIsZv8mqNjJ75z10+X
eIFUNjV/oDh5nhhGy/qyyDSO2I83dSGVlAvPr157r/KWNoxhfP59DT4CZCyw
9APTL8sH1VErS+uzD9vGQSEGTWLERMwP4xBAIp7xRx0lZu8UZ1Rwln4EeEMB
EDjYvF4QL2VKCIDWQEcyQWAwuYRKsvGjdPa3iNPQcYURsaMbG8PinGJdMPEy
HIKMEZzjMTqNKzLdweRQUiEsvhjb2k82kaSWPBJXJM+GVHqJgxwSzqYfT0n1
EsZsqFWjRkGMiJKUC1lyR/wp0MICKTFjMu0mZgxQ7NBRnl1zTC6/f4y2j0Qi
SxEnMAMfa42W5sGbDxfvH/T5t3n7jv4+P/n9h9Pzk2P8++LV4evX9o+etLh4
9e7D62P3l3vz6N2bNydvj/lleGqCR70Hbw7/5QFj0IN3Z+9h9YevH9g4Spvu
H9mUmIQzYOOK2FoviGf97ujs//7vnX3Yh/92/uJod2cHEzz4w7Odp/vwAWmn
xD2jy5g/IuPpoYUlojxCRDTAy6SiNNeIA/qBTMXk79z6ASHzlwPzq9F4ubP/
a3mACw4eKsyChwSz9pPWywzEjkcdw1hoBs8bkA7ne/gvwWeFu/cQhXXjx/CB
dA5I8lkKevhlJjik1RIWv5hDUIggwOj+2toahLCHQWMXrBUkQ3oUP+Lo3vEA
R29K8n6gUSjzn/3u1GwcnQ3g96aLGgokp5zs5myCFrm/O8AGC9ZMiPIisoQx
Nn1rbSQ9Yoq8zVp4XciRGXfGPvm5kwH0XeqSA3+DcKhBmGBEJd4ogEOWcwgS
LCwoTMdcU/yj0TEl6LCdt5GO2crAJE6GVEaq6wzOWsAHtCIoiBRAcUxJI2aK
Yi6y8TwvXFm6u2FHgJZNg8+EPYStyJjSVKCI+WocOsn9eIKfr16oFoZtzdHh
2nY4s7rIwvYoLXrtmRHjlMKwDcQ0tUczs+Ck4VWgmLOCBG9/jZ4MEFv7LD3a
lI5pTYgvcTu4zTgUhax0VsgRqy/vhTgBJJuS37TuI+eZ4OOEFhtswv4HMeEo
rLnAgGAnvA3T5f3iXVTFUYAvpu2IPpOSBvR2kWerwL0l4bQT1StAFNHuOQhR
4yl9gRJnLrblqrE0W4RnOk3RfGwZrQtLMx8uvgPNMCrngNGYliO6tDjhNNiK
LB/JlYTCgVaECWuYTkZGFjtO1hiGdtknZNTfIM8GU/SXDNB8tPH+3YsPmxiE
XuSAy17yKLIqDc8SyVp3gKUCMbzbnGmQWzEC2grtYtmWLEOxJ2kpBtRjQSBD
BwEsAUCNZVFGnG3Dp8wBqcynFcUt83Q2ufQJRvGYD/SEttEXZP+y8ZW0JXM8
ACTJgEM7Izy+ywhD33G6gxQSjyfNAwWNd8RCZWHAxwG/2qW/9jy0DOHmoe5Q
XtBUF0lSnXhph9d5JRjqdESYIM1haMkc8xggcZttyhKQFBphJV6fo7Ow4cZ6
0iLvfdnHTC5mgDJRQmu8pAXO83RCMWcY5c2C4IZSLXqNwR5otphTXIqqitJ2
pXAvCLfqFFkghwmTsRUlUzQOsUeGGDUONDTvXIydqHNpbJ2IQrPIcEmhiRb6
vvhO3t4GeUVDX8Z+Oz9A7Y4f2vFmo3ua1lvOiaYRf81rLQfI7e0AD0jpPBAD
c2Q98a6Vc808tO+dHvs9DUDCd0xc3wvWhC4oPjPiCqHRhY1oL29zI5HZMRp3
bC/86h67pDYwdd86N6CXlwWavtmkh738gU/L7+u8qBc6FjlCdGrooiKG7c1l
OBx+YdN0LraXJlzuuQ8NuHxxNx92oEbXbqIfrkajmgAABrq9sPV5+OFt13vm
yDtstML2s/Z7P3eeP399+APLUOTkeZoLIB1kkij/k+fZ9bN2nvADlJUzDHzy
alvdNV449MO7x1vzd+NT672Ha0ZofLrTxdoY75/U9Dr81G4aTL37afslnADs
CEjS/mSCpx0veXt32/20a3o6lYet6T1cD9Tbxm/vm39C8+vGb+8br3kI2Q44
rwOywBEYI/4dfmo38F8MINwB73XA/olTta5olu3EDa1aWqzprZ78Z6P17pAp
zSeRKaHt9xyLbzWSKFQ/+iwki/OO3xIpmQUMCsYB8RckGdLXNKfhJjdXiZRj
w35FjjxA1wWRe66bqHTe08IupcWl954N7bFWfVbsVKNDCR75aPxxmRQ2Hkge
ooVMDAtisrzU9y4xCQE0vcrVxmLZlozvWqiR8gNWcVSokiiTgm8u7RIusaaH
NZklU1fszVb/9EQ2hFFEabcwq41AbU2mvp/IBRnCaIt8QkL2JkcQUT5+Nzw9
kPcpSkEz0q6JE200QgFLy402rUSPtxeQn2Lp8oi4SwFvs1OEc4JFlB2gRQX4
Ows1PEXMrWHbhVUteU/8tt7GqG3k2IZtikTrMLzs9U69+MFolFOcQrhVQdjn
dRI5cxDloLlgD1H3+tYrp861TvVB3yzFhIJBqNaEIoI4CasOXF5sRbqSdEfG
u9OpRP6xL5jM8dihZMzgghrdoaGK/ICS1kxhBemKPaYTVu8SVlbjUkpRQI+w
FFY0YCwtWoXVVS32ywcEnFXtmgWM/BgROCJ9rbGHyfVUWCfBgsOeQUnzbVj5
J/V5osjBuE7GeYeNhEcu2dA3EPqD46zF5EpGf2+vA78AJQIjabKFcoAgsX2F
rH4udXUjolKB5Zx9ikW0TCaUUoZbHEkap9ROgCVSfSIgk0kxpsOoJs+x2lgk
e1nND03ljH3rEpbRwkS0l8bplCaV5eJQIv9YqQ4yBDHREvK419lVhvZVdrj7
udbTuJIahErLUaPQI+brJL3eYcUFXxBgxAWWnA5qE10ZccU3SllariQv4o6j
rZcz6pkJ8iXahD2fMWblc77XmnNBA3KZI29YKqUc+Yjqn3Ct8pUPrAnZn8MW
BkVS4p9MfxTPkiyzydRxi7XIY3tIDgGqKUJVJ0h0382vzmDCGl6+sbNJb/tT
IGTEysbo2QcwbOxuApOpeEnSLxlzJZZh2LSPEhMRjziTXBdRTKAkmcFmFNdL
rsvhExyN7I+vcw12BiQ8jylwY8VhFpE5iir0FOQYmk7lq6TiPs5w3UkLKqDT
8YEjYEcJ05zRkR1bqx6bgSjQGzNYFwkBCBfEph+fHiDc0f6JlVwrF7hGHBYd
Jg4hPExxlZwC4opfh8QV01pd7dMI/vLgQHVI/uNf/82WTEZbI3B7tRHRKihQ
gjy1FA7DFXMmdcz+fyshXNcpBu64Uv1RmA9g0mRURJQ0b73XSD6XS72aIKLa
erRpRDQmnk/HOk/QPGFt0F4zz6vtQtktuKh/ooX9oCwKrW2DIpVyqp5HfAff
itJZDkubL5RCAplXo7Qtcodde8ZSFK28aQY1SYBxRVyVppR5WXHVFlxEyzZT
cuv9xu8oLZmDkVzmMA9RcsZzZaNJLrPc//7SfJfnwK8yj45BTw+gSfzA5SgQ
h7VSDE+bLX70WWrKAdW8oVKJfvk5XHfusTOusorimMQF+PjmToPZIADK6ySQ
cN905vwBbBiUB+hNzV8A6pf4pX/DiAeK5CfoNT3zyIEAZKnNyaXASSz2MUGe
461aS5fZknd6Rqz7Qazu6GnC+qpSgJHTQkiGyyThve9BV2SPSMuWy+pHMdds
Z6svJSYXktcgOeq2PojYnvmqJr98Zug57YjX06A2GzVvQ7g4PmpNqoJLHvEO
X+kVOmumb/SDnAU+RZwJ8A2n5l9jEdSyFffVb8WfNcK0vIY5hSh6GgY29dKg
KdLxJzhVQ+D9cl9q2N9PcKVSCdVG4gCRcqmf6AGtwx1g9wZ3fxoXhZSLKW2E
LeyxphK1QkAx7BplRAxObKNPp3jHPa0L5exbXSAMCxXQ/6TkOdoTVRhJjO9z
GCjFoBKttR00QifvKFgQnoONLKdKF1J9PPxS7Qjq9Y01qsErk0V4OUkK0Zo3
D7icQbBhIph4yCocVT6Q3GQu6+XAf+1yuLanoBe/W/IHXyJl+2JXGtgaqOzw
Mn5uvtw7bMGGfVdYMBDRBQtAt14M4DdKLJAiyfuDbxtL9mrhYc/Ea2iNrRWR
DEqoR3XEO2Ky7XDKMYKaytUcVnW29lRx4h5eGhJPghhbruaOOoYkjuJ2X5JH
x56US3Wd+Ul3tvcWKW5thM30GgfddsZQS21f3n0R3zWjlH2ECCjvFLKCyGd0
ogXSOqKoCbdsffA1gdbhum0VEI4AsMHH3708I5sFxRgOqPJ7lZSB7cJeRWW7
8OFnjWNw5NQJ+P8lthtDPyWd1ttdTiAtG9vIZdl88IXMycui+9I+6gBWzy65
TqEXPW379gLiNyqtbWRslRFS/DtJNo3Y6saZcipKfbRTkOgCN4swGl8yeVGS
6ZLY6aacUrRMMepIoHgpNiQUSlmI8qa/ARLtFL7dpIqdyA3wAtG+tWnodJsB
6v71BW5PmBAkJGfD8X+X0SKwzCHSl74oWC7NufxinvPgrkTnJal/WFS1pFgS
WEOFUjMIGRhYAjJ6RNzECxVNWnbBStNLoHdK2KG4XP6TRIlpNI5tGDnVpfHS
DDaJqE8kgUIAz+hwV3/mFCRp6WZlK23lXObSpwU2qLzkd8iq4IVCc8ZSEAJ2
eCGWdw6fxjhNS/ZB6JRyrXiRkoTjWAElCM3DRj7K2NJ/45zygTk4WjPZwtxp
uhBrXIsYHFYjMqcodVxqk8u+FKPkpTnjoONdHEvRwaE4yINqRFNmPZGgqGpK
AhLcjJHqrFCQSCFlAi79kgnlpTVm6ZbCJAzdH9AYnQQxuWy3WaY5SAzBLDai
zpo2h7JTTvlOY5+24+Qxs12kOlb+fOVVTwCQ5CWMToRDYuP1ELRBXVbQZT98
zt4GqwyS/cOZDVgalIQlPrFkiG5KySUnN2Bl2YvY2s2Q+XOpZ29E3VXW9P1v
+hyjloSautRLpRH9blBEFLTpEjhsqodg7Sxn7ctZ7RElNu09LAHKhhDiqqyE
VMSbsEIn3aXSD/Phnb+gfaOJlIhdUaDWcjyyYVpzUlmU7yFFtLldGCOK9d37
znjFMYCKzKxT5x5jUL6HJtcrTvZI09qpihy8Z+mYp5BQwUyybKnZCNvN4AxR
/Ww+qu6uBH2Na7LnQEmILhAhoXRVKqruE81vEIOwXHefDzeTWjVfW4O1K15J
72uHQ/MqLihjyrzwuOZN7lXQoENAzpvgMW+iLzCYP/rV7alLujmu6z3VRDqG
gq/g3ZcCDEFrNRi5aqxt/kHW2pdUyk8kDeq+zf25qPaUpQAmaGpf0TMQ2d2/
Z6AW/AzJgzz8cstvWOY062rS2BgArICDcIVX1ieaI3KT1/zPZtfsSL2mO1PT
aXTymv/14eDh1/AEjs5dsRa37+rqYFdCoOjNW9rzO1PlH7KDHUMb6A0gFwc7
9wn9uJX/Sx/3iADRN8wXAkboZ8j1kTiIqyNohDdSY7weGap8tOeV3bJNOt7d
MOa3xmwODPzvGy1otG8O6AH/D5q8giZdA/8Vev2a/8TSR3SEEF2aTe5cI6zu
z0919n61hCD44aH5lcQ/PDHmcY+xiH5uBR3kg46LW/F1j3FH2429D8a9cdtj
hNFmtPOdzdx8bk3wIWwmgODe0E3YPehpBmPiyE+hWZId7KFBEz+EzVAaMb89
2OGl4oe/Hew0ezNrAScdvDrYdx3M+UPQwVqQ+nUvbk3wIexgHax7D13s1UMT
fAg7WLcLvWCw5gevg3X7Ax38yi+68at2iS/uYN3O3YOccgd2Tx/7e/rY62Dt
RskurNlt18HajfI66Nhtr4N1G3Xb2mD/g9fBuo1ymPjQX2CLwq/dqNuAqnaO
vW6L3KtBKJhHMd3mPPE35wm96sN3zRZ0NesAdKPZOnCGzdYCLWzWARr675BO
VZPCXzc/9L82jw2S+b9+ie37RHw935fvjWFRxtzF+OXH8aVHX2ILg78CKwJW
1r+LgShb+CvR+y8Mzj+3dxzCe/ewnlzeu4e19PLePdxFMPVnPUe9veMg+j2s
Z7a3d5zHoIe1bPjW3Idm3rFU3osvEs07lup6uJNq3rHU+0NyHQVSSL70u591
QXKtNCCQ3KHu97j7Hep+r6OHLnHAUVC7Kvvh3pC8B/W/Y6nd0b8tGD72F/lY
FtkdChxIzPda3r1W8IVJds3DRuriCZI43dO1Or+v7LPG2tbzMZKXCkpdyJXR
kpkUBBh6oXJohUH3gpit2FRwQsZRvpSxaa8OYwwpTFCjiWycoJ/SSjdd2ZJ5
zovdaX5HowEW9GAjQKcDOoh6vRGzkJTnkLsrFvEkoeqY7n29/+lMMkAFKmKn
CE2aGEhiM0U5NhUnz2ZE6/Mo+a4KLb6CsKLBrzmznS8u5S/VUiumEgyhoIC/
0DrnmWutnwjLEchqsO7UEs3RBYYKpV6iomR3jjC2CVCHit1wiOFUbSmcoalx
oZ5BIrK3MlJdKxcA2NdXyznFSWhWozoNvHn1OVahRB/D3+tkfBXeCWHjcBZc
M8E52v1aer0eFXjtwAkNcAwK1YjbE8MZbCBMq2ijc5UfhqZe65+xyKwxJuKW
44tFKr6DRSK0mp4NLOSBt4x4riWgQPYCe6mhFDiJNDHQFvZB61jbZmzCwj5J
RWV9NGpT6vpo4BLZiKSIjHVSNECId09HV1LblQfn+BDfSEknTq+ZC0o//IC7
NbgQB+2Fvv+Xja9sX92+LbLaNqt4NryuuOtiFebiZuE+Z7aMTvBcyJYHewoG
FItelKR9NwSH95OnehRXGJDl+XzHeO+ojbrpJEo2mXXeuVm6Pq0uB4/I5BY6
ynSqzgpsaZ71ZdC1s37d4M5BJEhePHJMwnFQDmZz9Wu8QRswJYs218Zi964G
rLRCB7zisX54j9DSTqwwnxxWAC86XOTW7inObncwOlyhmT0kYjzGINigLhld
rKUEUi96l1Kmu17bDlckw5BR1U4yPLHsVwle9asnihMKr3BG2raI8a4Q8bTy
B764HX1J4rdjX70WjQFynZATpu/ixiVEp9NvroEN8v54dUkVamwRg+A2CvUl
iLPGnpoEXb4JujTdHeWR3D601ABSqcZEcVcY8neTTKr5Jrnfj2nKlPmC96uU
LlLRg7UXdMwWaZYf0InEGD+YJOXf8MoVeiBenH4QaL70r7O3QKZogUgudsec
CZzTiUAPIUIIbLP00zibIQOzi+gb9CJDy76pK1jsj154nH8jp7ikiPvdUNwS
RZy5+H5ZZmHvqiFHtJwemhXJFyujm4ixXcF22S2JJjiAnbMQBltUi7qBk2av
7l7iHruTA1vXZJMlSnV4h33u9au5DpoXhFd/UWpLRyFgG90AXROTUvzPJIb9
YxUEmbCwA5NshJ/YEu/i30zpXqikHcIBR+AjVVCRS2ELOYLsBVJnZaOgIGUM
yOz1BPPJK+kqwZXunVfDHYj+YlkFJdU85KV0BbzjraDASxuugkTViW6e3MI1
Z6lYmC05usE3mm5ShXLLrilboFH8TMpVMFXld72KbXRdn1yaw7H3HDcX7NcB
5hE0Y7aCYAvVEJQJ3NHULxdHdUbXONLXvyWhBHrTLa2Jy/K1Q00Rm5hFcuW/
enxnpUXMdmgstNQsJekJYzcospvLs9irmoGBxKgVcDoRdkQ5acuCdQMECof7
t1m69EylDb+xBbMopJ+yorBShETgeHIwBv5PUZTvd666chCCxSt8bOF/bVqa
DS6G0cjJakJhs9GnXJG2hod3bDRBO+tzrhUV+O4AtQ1Rz+IbkpfhoMXXnaIC
I84d65L5YuZFxfO1qUXyrL0VdHWf3kmWkySeWoI8lnqmHXLjmEOaeDzcrmZV
T5os+XYxHjhN4xTzT25YYOW7N1sRgs5THCwMy+9nrrpqx2wUY9qhrXpZlTs5
QykDVqD+XqKXmCO4uXYParOspBJbmdojJiF6pB3buxikvgnRU43wJ5+1dRaT
st33I1HKqh5hfVKuao8kWGR7W9UUtat4thKVz1bes1XnJSYQGRZOZ0rwpElT
BKqHhjBDb2QdAIuV2MU3ZsJUGC9DMy/kRrhe70NGxYEa6X2u/jR5xN0Fcsi+
Qd+O6irHEC/VBEtWJpu36mLxalu0h932c8AdqpiCUVEuRv8Cb6WVqJHWVRZk
MkBLwlhirUZAS68Y4bzr0JwCAx2+bs2bRrbVkW7yAew71bjU+kUiZVgFdwGa
YdkAgB+uBb/pekZGQ/8qXsrAsQmMAz+bhlMc9TpbJ6a6jAhNlXgDOIn96yXx
ZuPi6M3ZJuaiaFMELYgRksNySl8npavWTbaqVIRoZ1WA5QKzXrjoJbosEKiw
hB57S6HILI65yYtqkEYrEU5h8WXfOy54xbOl50CZ4skIE0Ws2c1muaiYiLQZ
0D24LZhNWMn4Cg8pgHo81wS6lMqXVhomifKigMDOgC47z8ZADSKpXIoRTk4A
DiWJ0UrTze2lF+UVW3X8HQ8lDn/bKJpzXe9sGMMY2DK8uB40BbmDNc6uk4KT
iYRVkOFQE2q403mORHJTL1cNxdZShTPvRhirJhBm6XshL/HeEmMKR7KzAtLq
Qu+DZihLefU2KdY7YhfRx2RRL5AowIqpIKneUCIwpUpUpRK2PsuQ4TGzIdTA
3DCqrYbJYYiUJTEeioJiktkCZ0owzUaUjuKE82kxSxQY63RTjmy5jtwBHYpF
x//06fDt8cn5xcnb3e3tnc+f+1hE9fD9n3a3d3bl04eLV28O8eun+ADB9OnT
q1NsQlVWe1760zHGyEruE5cQ5li5L+Q+uVuIG3F4osm48pRNhsI1j8Py45JU
YO+PYSzuqsveVTzZqjGoPvkXIuhFSDagkQU47x4h5aWYQ0nRWS4Y7o74Xb/S
OLFmNjpvuujDJONoMFHXfRlNrwYgzMb91HfQmiAhpWrybhdMNkivY6wDJiF1
Yblo0UVDMd4F28m01s7J06SSymMfVr5mKUjPHGqy8ThCYsZ7VQLqS12B7lhr
fL/C/GYrSle5DXxvTHvT2ogdvPnFjqlv9pstkdDx9aDZissYe6mYDQCNFeBY
JXcwsPGKfjMLRK2wzL0xRPwZlu6gnr84evJsb/vz502y4VlSPSn71lKTOVIH
p2KUVJjcG9wEwnNXKyQRO+BvZNaJzP5gtEK5m26oeMIfiNdR5YXSZc5tvDk8
2nTXVuw8sS/ypRYkN9AEWUHVBt5MSpC+F3TLBcaIklo9VnrJZdsJJEyO6Ri5
CEqLYpQphsvmFCIK+1YGFUs+Kp1mDJG05VLUck3xs/49SVbJaep6zJ7X38vE
dBG7+wKFsYYi0gV/Qg6kRwN/eQKk19lPLSQrl+d4CVgYNKsmXu9WHQR+WOVE
ZP++De8mmKvfqenegL23BWN4WyZdGyEyCjsYBVZbW43tkWuKsSuSH4i/cq8J
3bC8xojSdzfbaf2Dm2jFkuzW1qmVA707sVpmZd5dvB6gJKYi7KRpmsHkDzzn
NBqWHvXatnReIgDW4MAAlQIljal0JO6ts91oKlMksGzAcEhrZm8fBc7rwrr6
b/dO2FQSaWqkVTQXE/EIcdGcQcceUokGZYxwzkGCj9Hhhg5U1Zfc5DVBw1/B
YZgYQHcXuHQzja52CFHmOkHMHdBqP0EfXgICSc/2XgX3ntu2YNIhPozJVTgV
k1eYBSF56WIBFfdcFN4IyYv2L7qS1IyWYeb+OOoGsCrPPbD1vbWNWcNlFNyi
0Gl/FGVOp9KNWDajJNRMWKAOyhCTVZitl8Jo1QLaWiWy53jyDbOwm4SwUqWo
tS9p3SEG+zuepkK2ISMkIYo2Aa1pGNYU2GjfgkJogew74826pKO+l2OAygly
n9o6MZyiFbXJQO8d8ufWF4SxlBXWlywcTQwT+KuO5knM6hWjG0Y679yquM5L
jZiAhoKCxK8Glz0wNjDAF7XpeDXFbS9rJfdiAlSrnvBtPfe/+LNTExi29pzr
yVAV3oZBj6iYPcQduUj2oAVDkJiVcBq2VJm21e89Zqs3q4xcmt377r1wTmZy
cVlBbM19rn0ySb164essRhPkXCplnnWtSSqa2V7Duma6D3q7myB9hxZFpjC9
vajWKl6lBkW4XKVFtPLLA8QZ6TdY+iJmqV75kNIk3SS3cMnUCVmml2O4tYVa
iqxn4/TtC0QOIrhYD2G8RoexVOxQJFBKQeSjd+dFoGhXRNYxrjSXVTeIJVG7
X4Q+TSs8gmqZjKXkIujzL0q+MCX2qTKmvVrd9s3J+8NNt+Jlzhy94UV05bUA
AjSVVy80t6hJ5eSnTUzlp0W0er12CoCLvWs/9r7o3brA6CD8rvux9wW8SWu5
9UIWH1ID9/hh+KZ+0TnqbWPU285RMX/il7x7a+ZT481ZspO8xw+DRAr7xcNO
YN12DX3bNbTpmvlPfD2Y/EP7emPydv7h5Nvzv10/gduuCbSXYHvwES3owX1h
e3DTfej1EOxYAw7hY38Otx1zsN2u7+FhuyXDod3zmh46Zis9mDdAHW5/SQ+/
eA4hxH9aDw+xArqc1J/Xg/nFc/hn9aCr+JXb6J89B/Nf1oNbhT3g4c/DXzwH
85/XA736az30P6cH84vn8At7UID//FW4v3/uHH5hDx7O/MxVBN/9rDn8k3uw
q/iVOwO/ZA7mv6SHcBWDDlHtJ8+hs9V/bg+tVXT9PPzFczD/uT3caxWDO7La
3BzWtXj4hT4a2oxLcgFFRJNcjqx9tsMyq9XGGh3ZIvVkpsZr7PJCYjl7PQ6G
Hxf1GK+f0qp5ni2c1FfnAybPTV1quJ+tCxZzZZVIemdLJIVZq7/Vd3i2Ejrc
AJI3gZEmVLWTC5aM0dxuCBDzeFHGKVXoowrtK3qMZno3dkO1o/AuMpdTW9Cd
nckuhOAGf0QHM4Bv09WC4vhgd9eY3PMd+dAE3ZZ8U+GVm+Idfn3y8u3JOTwi
Z5Ut7MOec7FzBr2ROV4LxC44IGTQukoPy1mi46nc1HwWFyAeVD10eTvpWKpD
cfQ2viz3SKkNsIxh4EouXhLzBW18OY8olF4swXqZaXC3YczXgAZmRvU1UpHk
sBKY5tHgzrCyTROSW9EzLdo5cV6HUOePQiugVyUEO7RX1so7vd65OKHQqOA5
njpuMvcMdFQ+D+tmUQhDA3fJhTsq1TB0l8ku4vo9egUtRpvHZTU4PRtgOHTy
0SyiioO53CVpiAYSq6AONK30LOfKuZ0oKjcIvZZXABCSS9a66rVvb5Hv9HSr
hYlsGy5ZRuvUs1eKnD+eOY5sSe5GPJko15vXDp35MbyMS/DCNw3JXrx60Zdh
Xr0g4ywVKSfHDNm75EvAH/cGl6aikTnO1DcaRny3HNYBl+ygDt91v9tmKjcC
uIG0ZHmeDRqG7TDMXnrqAjl1kZQd/h9v1uLwKQN/gwK1q9cvj4seG4mwWnON
tLtzGokp3TpNUyT/RQOklGnnrvHugmb4DBOvgvlIFEU7ZsEP7XBh9zK2Gt0C
bJIoCqQCnCAK+3Hke0WUEuvZQt4GqyRXi/WaKy2L7BK4/huHJGL4XHDHdwDE
1oXfLpfkDYWQaYzf62gUp+aCYt8I5Hy5N15ziANyAhFeAJ3mK7b8HU5y68aO
yKc/kEq2BCyPaHFxVCC/KWZ5MEUqr8jomVTB5QZUpKogXyIuWi4m5tQEr5i7
t1af+g9dBU3MDKBbNAmU1J5Nv3eDKeyvr7b6ZZGUFB5NbxOt5bt4IrqEJbyP
mngWnFIMu6NpC5zIdc3Je5EGpwFRHGNNzeC6CwosebbzdBtjud4Hvm4bj5CU
47qkQGiu4UUeOw5ckSBdKmFN24UvCieBSVNAGmV31BRtjWF9mE4nFKRzTVL1
fJrDoPACENwt8wPIcnmWL5B7XtBt5uVfNr6aWAQZROVmnxpqkJs5+ci3u5sz
JOeN5snHJZeQp3esSBY2QvM7Pt7E65KlNjclIwoB4WVKWGam0QdY3vwMnRjR
sqxT9bp8Lzzexp74YIgpA4a2Ds+lmwImJmKwfMaFvxrRHbrXJGiS34XQGrAr
1d0FaYJO9cTe5V3aK55DeHqnzXwKIYs5eu7eSnuCuI0nOvzQvPrZXl4PcKXv
Bu4RS0mhI29It0Y54mMPWD6tCHY4IHvo8EbcMwr3TyMu9JsvLTj11Nk68STa
YvVQLdiX0i2nmK2i9QG7j6rG85LTCS9GIPhYDtFX/nAkZVAHRDE6gw29ECXx
a6tUSAlt8mrjJcnzAKAOFgmHSGmBz6EXTM0ECBO8YI+FKEi+GIfx+LXxI72a
YRIXNp/cu4ChQfQDOBfO5T9AJ5OSMnt5rXebAJEEoK8TDpsrpdqAqhg4FZ19
StmDsP2SrI8ptxJk6EmYgYufXPI6L+/EeKjQKphJvv3cy+QirsCT4Fr/SQZL
J/d1WcfiPOPSsxiKT/UFYTwEfU3RQTg7OBPchauJWZc1xdZbjE0ym0RCDkhF
NvFghgmOMV3EQ8N2AA0HJz2lT6Ep3YGtXrHoupC6mkXcwkG5sAqUIYx4H+xy
pcqBwzKO1pGCpyQX43UPnPs+xgg7uvXZ0gZ3vFV2sxBAyo+VGVHx+PjsCfUZ
F6SK59PpANBqUM6xmiPfQlRy1fCiwuuPF5T2IXUkuQxk9xHL5QJlFlKaka5l
S5yxL3DyBl33DTI26tWg/k3wRuWhOZPClfZu5KhqTFnbSpwoJmBo4OP2tnk5
WlpX9Q1FRUcsIWH4ovnhbJ/yP0mT1JuZj0/OP5y+Jx16Z5PGJXnd3vbrFzhV
bU64j9S7p/h7FEvp+he6yRzINm7YO06R8oNGR7GHEFqM1MYSU6YtTBGgYJil
ermPQmCDpPKa77UhrKGbjix8pnq5nJpIIqnTL7c1e/jDZW1Le124d8THlEzD
gefr2H3Iw4Ddf8aLGta03Tj949kmctEVSYkLTALB9OqIrkSmWQvjKC3eoDaE
BOZrrx6v0QsrGriPZiU98TBU6clYkXkwSmaSBvIAzTxxqumpRHz/eKYcoqRz
WsC0X+9q3oiaJ2y5dD2KeFhEPokwns1nn/5tTnz5H1AlUWFAJi/LDqhu0Ben
fwRZyPP1EwFUaoG2m+hvFlbS08WZhGxwSDSJtqorj5IBmmeodobEt1FauJNa
JFAFC+tivQQbm8CZdJEUWUVUpPTxCLEso5hkfjOfTqWshPH0B4ysmEeUhu6h
lcCeS/8SkaYUENY5hYkCa8nTfLaSbnB3PNtPx3UlInuoGQNf0JLppSbvuNq/
tI2uVjUnyIGwR1CxifgJH8CUyo7MLJ6E7J6Z0QbblEhyBdURiBI939TqMxIu
zhbO1sUMXvoJdU6iH2A54TBnC1p6yqlAKGRwEqGDXgIE2sbjcLSfy9Lqy5kC
FM1AKdEUyk6QBABQfi3ZRzwOlRvmHFcLZLnbhIoGkDXORkEulnHFt1raa/tY
OD7BuBUr1p/iGESdUxGSNcvpU5e2AITmhBNHxfRm90ltiI16wBRSTEUsWNqj
ZozK/g6UHPj9g1ynxCqIai7AM/gJTkN0Frn6jTt1BaUr0JHOMKzIYqtcTobF
WpKZLdNC24F47s1Khk1XNj6fxMEaZICCyAQeC3sFotROKcMri/wl9ZXsjCkU
HC2KICSk9q55m/zGJrmSbmUKL0QKMhI90BFPYsXKbZIkFIFUhYF4NiPSahi2
UgMF+uqtVMr0KC2UQkOtkSTYHi+vFrkTWWLe8j45jPrU2KjPVrdqbOnXpazX
v0YNQ3xhG4H0Ywggx7mxwKHFYQDiWtwJmDdXLvfD/SRejvrS1IJ4gWw77E2o
mDBmMcqL0pFGVCOHM7PFoi/qFCVpH+qlT45zgaxxdkonM4AZxeDRHXSJJ/Cj
pGHTyrvugJL67JQ85mcWCL5g9lVJd/xIXrIYleUABtIWZ3jD/D4cnz0CVUdl
fMmUD5Iphdl6yZhW61cNlsm9KJisXWLI6V3K5XrTkpePSLcCKO8jriHJyWg2
D8p6+cah3KbjIwCnyawuGnXiAgVXE3gdzC2ddjp034wx4bGyEc94RJaY/9tQ
uwckTk/pijlvbPVU+NaSl7AOVM83Lk5fbmJ5oGRmzwW6DMLvnW2FrhXhewag
F+fPsDKsPnKR757BFDrrstxybiE7JdQuGxhzDunNppBHlzBaC7RwAMVU6BGQ
PGMbmEggKg/1mbAfnZ0w0XYGWBCevg6F7MqdPmctx9k4dx2HLBcD1rzhOzV9
kmJVOlHRscjAfSXCJysaujrFa6WYc+Halthb7cRaAmxGPN4SoxRUqL2M/DVa
FGM0FgBSnHo6cCT5SI7xTgLGK9ILc35nQySsTuNZNF4BPgw4f9PKsooUfQSK
VVCjmvyhmqvpH5/Iu/R0wbZdubAkVg+wVx4gVlEZMZFdXJ5jp229a+Rm6Ubq
5QX+5Sj+pKyZTwrQfcHO51n1Tpwt0Uoun9Un0NYSEiqON9Er31YOcdSS1Dez
ggGEE+bLmcnYHFFFrySb4O0RKyy8hlpvixlz7RupmjUGbF3IrVG4MjTpK+pb
cR5nCYJllE30nrdCLhCfAqgysibosDA7FJuzhS2fxSjNt6bGlHVYSQUBCvWO
8WqrMRduHFe53NK6u73zVIe/weGDFz0IIU2mogsoBKNKM4rwWhLLx2Y5mTpI
zSiyxMb7exdjBrrUiLQbSWQA2Vbpx9CbjCZc8AEXriMpURESTLmFzqGH3iKr
o1IURRGnCYlnelbk6JR5WjPythkCjU/am8t2ruw1KKYko/LA3kQbSn02kZ3x
G74HKT4dUDmwGV2WgvenMpc2G+fvX15sSo9944GI6/vVAG5Uw0eqDtqT6Dpd
RitJQ3MnUrJDpYiHUE+qiapq8AtCqti8FWDBhv9wcfHi7V825lW1LA8ePYIT
tYiG4/Gjsw+PXw8OX5+92aRkGitjiLVaAEjpR1p7ahqr/4TPPwa5kLrsGI8m
Gw17Lzz8BlZV1SI/sZlAwkQ87Z8tKx0mZ7m/lGiRXrXuymed+p2LgV90sf8J
dG3GfLgkRkx50k6tQBKIWq7gdUIFNWwugSXHgfjn3c8T3BLLewOzptpfwT2y
CBLKlPSsIu526Cp3oMcyNMm4EjIQqR+tmcrsO+7R7BtJcEPjUuxNSlAvaUSa
DeBBv+tckF8YJ0jklJ06FNrgyFFwT60AS7RjmxDnCZ5lw77GyIlmOTx8QH80
dKCBGJ5Nz5pKcOqoQg5OjhmLAYnLcQIcHv6bZ4Mg/AN249Gm25NeI0FGid91
HKpY3q1Izp0ZmVmajyI1FlsSD6CtRiS20Plj9fZ1NHJn7ObmhicHKuQwL1BD
PbX3eNPF1xjllP8Yc+4SD4OcRq+GJmYWeKYOLzimiopmFDWxN8uBfDiy/qBz
RD1xGWdcrWXFAh4Wc6MAm6hMpDIwmn5pTzEZS+7LY2kpEcXrJh7Jcfhw2jcN
h5AlScQK60ycgF79MxgExrAsW12ICdbkEyj7HpGp55CVOmf0ntBqPLB2O4hs
YEZ5vtSXnWXN11is6oNyhjk9fHtIaeHOJ9zrHamdsM+GRhVNJBpFq2ixVjhW
rMKuhj1bupjKH5GFQdUJSzKte9Arzip98smiWUVjdyIQknQgQGtQzwBFUnkV
gaFj1bQaGXKaYOUuAWTq6QlqdlZEpjK6p1HCZ7j6oopmPVd+uwW3lkQm0QVW
acOqRCzQkn3TeYn8cj82K66y9+suIizxmU7cC6EbX65uXLCCAWvxfC0kq0v4
hrgb7QyJp+KRk0ipic2/pOMimY4a8RKq31R4FGbAlgruSfqRnfaLYPjRhkAH
jtmbrrLAmmWZeSz3F+pVhmw8nCGNXuUy1XIMk7VxSYqrKLfbkggWgZ1VNRiW
Cq75po3GPPxiCyQ6ASIMBgMyzSJGHI6xujaQQQ7R7H060FvVvn0wBQjEGN/6
BkmPEPQZXgtojlYFdvy74h//Bw7L6B//PmfHym9rNLsMQbtGP9vgDDCe3EWY
cJrEzgHg1vq9VGNFYGPF85E4hF5HNRlQjuYg+vbNm6i4AsR6HQNawhE9joAR
m++AAGb64VVUl/MYv7yIFnWcmldJ9SPj5BldeP/mH/8O9L5gG84NSokaz5nn
V+YBUrkjCh0EsL+syXYr6tsDjTw9evXh8P3uLiCC2q6sSEAdAVBBlqyzSRBg
JwY8rLyOlawZAl4DpJ1c8OL/AQHKp/em8gAA

-->

</rfc>
