<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-flowspec-sav-06" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGP FlowSpec for SAV">BGP Flow Specification for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-flowspec-sav-06"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 71?>

<t>BGP FlowSpec reuses BGP route to distribute infrastructure and propagates traffic flow information with filtering actions. This document proposes some extensions to BGP FlowSpec for disseminating SAV rules.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is an efficient method for preventing source address spoofing-based attacks. SAV rules indicate the valid/invalid incoming interfaces of a specific source IP address or source IP prefix. The rules can be deployed on edge routers, border routers, or aggregation routers for checking the validity of intra-domain and inter-domain packets. For invalid packets, filtering actions can be taken such as block, rate-limit, redirect, and sampling <xref target="I-D.huang-savnet-sav-table"/>.</t>
      <t>There are many mechanisms that can distributedly generate SAV rules on routers (<xref target="RFC2827"/>, <xref target="RFC3704"/>, <xref target="RFC5210"/>, <xref target="RFC8704"/>, and <xref target="manrs-antispoofing"/>). To facilitate flexible SAV management and improve validation accuracy, centralized SAV rule dissemination is also needed <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>, which can be a complementary to existing distributed SAV mechanisms.</t>
      <t>BGP FlowSpec is a convenient and flexible tool for traffic filtering/controlling (<xref target="RFC8955"/>, <xref target="RFC8956"/>). It propagates traffic flow information for different traffic control purposes through the BGP protocol extension. Existing BGP FlowSpec has supported source prefix matching and various traffic filtering actions but does not support binding valid/invalid incoming interfaces to source prefixes. With some extensions, BGP FlowSpec can be used for SAV rule dissemination.</t>
      <t>This document defines a new flow specification component named Incoming-Interface-Set. SAV rules can be disseminated through BGP FlowSpec by carrying the new flow specification component together with Source Prefix component (or Source Prefix Group component). Traffic filtering actions of existing BGP FlowSpec can also be carried to specify the actions for the packets failing source address validation. 
This document also defines a new action which indicates where to install the SAV rules in the data-plane.</t>
      <t>BGP FlowSpec with the new extensions can be used to disseminate SAV rules to remote routers, which acts as a supplement of existing SAV mechanisms and help improve SAV accuracy.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation</t>
        <t>SAV Rule: The rule that indicates the valid/invalid incoming interfaces of a specific source IP address or source IP prefix.</t>
        <t>Group Identifier: An ID value that identifies a set of interfaces on the target routers (e.g., all the interfaces connected to customer ASes).</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="bgp-flowspec-for-sav">
      <name>BGP FlowSpec for SAV</name>
      <t>A SAV rule typically has a format of &lt;source prefix, interface set, validity indicator&gt;. Source prefix is for matching specific packets. Interface set represents a set of physical interfaces from which the packets arrive. Validity indicator indicates whether the packets matching the source prefix and arrival interface are valid or invalid. So, validity indicator has a value of either valid or invalid.</t>
      <t>For example, the rule &lt;P1, [intf1, intf2], valid&gt; means the source prefix P1 must arrive the router at interface Intf1 or Intf2, otherwise, P1 is invalid. For the packets with invalid source addresses/prefixes, the filtering actions, such as block, rate-limit, and redirect, can be taken <xref target="I-D.huang-savnet-sav-table"/>.</t>
      <t>SAV rules can be disseminated to Edge/Border/Aggregation routers (i.e., target routers) through BGP FlowSpec, as shown in the figure below. The controller is used to set up BGP connection with the routers in a SAV-deployed AS or domain.</t>
      <artwork><![CDATA[
                      +------------+
                      | Controller |
                      +------------+
                        /   |    \
                       / FS | FS  \ FS
                      /     |      \
+-------------+      +--------------+      +---------+
| Provider or |      | SAV-deployed |      |         |
| Customer or |------# AS/Domain    #------| Subnets |
| Peer AS     |      |              |      |         |
+-------------+      +--------------+      +---------+
]]></artwork>
      <t>Existing BGP FlowSpec has supported source prefix matching and various traffic filtering actions. There are also some proposals that group source prefixes by AS numbers (<xref target="I-D.wang-idr-flowspec-dip-origin-as-filter"/>) or community values for good scalability and efficiency. An AS number or a community value can represent a set of source prefixes. For simplicity, the term of Source Prefix Group component will be used to represent such source prefix groups in BGP FlowSpec.</t>
      <t>However, existing BGP FlowSpec does not support binding valid/invalid incoming interfaces to source prefixes. Besides, BGP FlowSpec rules are mostly installed in ACL table/firewall table. In contrast, SAV rules may be installed in differect positions of data-plane, such as ACL/firewall, FIB, or independent SAV table. Some extensions are needed by BGP FlowSpec for efficient SAV rule dissemination.</t>
    </section>
    <section anchor="extensions-to-bgp-flowspec">
      <name>Extensions to BGP FlowSpec</name>
      <section anchor="incoming-interface-set-component">
        <name>Incoming-Interface-Set Component</name>
        <section anchor="interface-set">
          <name>Interface Set</name>
          <t>To facilitate scalability, the interface set in SAV rules can be grouped. For example, the interfaces can be grouped as:</t>
          <ul spacing="normal">
            <li>
              <t>Subnet interface set that contains the interfaces connecting a target subnet.</t>
            </li>
            <li>
              <t>All customer AS interfaces set or the customer AS interfaces set of a customer AS.</t>
            </li>
            <li>
              <t>All lateral peer AS interfaces set or the lateral peer AS interfaces set of a lateral peer AS.</t>
            </li>
            <li>
              <t>All transit provider AS interfaces set or the transit provider AS interfaces set of a transit provider AS.</t>
            </li>
          </ul>
          <t>These interface set can be identified by a Group Identifier for easy management. A Group Identifier can have either local meaning or global meaning. On the one hand, it can be a local interface property on the target routers, and the meaning of it depends on the configurations of network administrator. On the other hand, a global meaning Group Identifier field carries AS number, which represents all the interfaces connected to the neighboring AS with the AS number.</t>
          <t>Any interface may be associated with one or more Group Identifiers.</t>
        </section>
        <section anchor="incoming-interface-set-encoding">
          <name>Incoming-Interface-Set Encoding</name>
          <t>The new flow specification component is encoded in the BGP Flowspec NLRI. It appears together with Source Prefix component or Source Prefix Group component.</t>
          <t>The following new component type is defined:</t>
          <ul spacing="normal">
            <li>
              <t>Type TBD1: Incoming-Interface-Set</t>
            </li>
            <li>
              <t>Encoding: &lt;type (1 octet), [numeric_op, value]+&gt;</t>
            </li>
          </ul>
          <t>The new component contains a set of {numeric_op, value} pairs that are used to match the Incoming-Interface-Set (i.e., the valid or invalid interfaces of a specific source prefix).</t>
          <t>The numeric operator (numeric_op) is encoded as (see RFC8955 sec. 4.2.1.1):</t>
          <artwork><![CDATA[
    0   1   2   3   4   5   6   7
  +---+---+---+---+---+---+---+---+
  | e | a |  len  | 0 |lt |gt |eq |
  +---+---+---+---+---+---+---+---+
]]></artwork>
          <t>The value field is encoded as:</t>
          <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V|R|     Group Identifier (variable, 6, 14, 30, or 62 bits)    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <t>The length of the value field can be 1, 2, 4, or 8 octets, which depends on the len in numeric_op. 
Particularly, the most two significant bits in the value field are two flags:</t>
          <ul spacing="normal">
            <li>
              <t>Flag V (1 bit): The most significant bit in the value field. If unset, it means the interface set is invalid for the source prefix. If set, the identified interface set is valid for the source prefix.</t>
            </li>
            <li>
              <t>Flag G (1 bit): The second most significant bit in the value field. If unset, the Group Identifier has a local meaning. If set, the Group Identifier has a global meaning, i.e., the Group Identifier field stores an AS number.</t>
            </li>
          </ul>
          <t>Zero Group Identifier (i.e., Group Identifier equaling 0) is a reserved value and does not need to be configured. A NLRI may carry one zero Group Identifier and several non-zero Group Identifiers. The zero Group Identifier means any other interfaces on the target router except the interfaces indicated by non-zero Group Identifiers in the same NLRI. If a NLRI only contains a zero Group Identifier and has no non-zero Group Identifiers, the zero Group Identifier will represent all interfaces on the target router. A NLRI <bcp14>MUST</bcp14> not contain more than one zero Group Identifiers, otherwise, the whole NLRI will be ignored.</t>
          <t>The bits lt, gt, and eq can be combined to match a specific Group Identifier or a range of Group Identifiers (e.g., greater than Group ID1 and less than Group ID2). For a range of Group Identifiers, their corresponding flags (i.e., V and R) <bcp14>MUST</bcp14> be the same. Otherwise, the whole NLRI will be ignored.</t>
          <t>If a receiving BGP speaker cannot support this new flow specification component type, it <bcp14>MUST</bcp14> discard the NLRI value field that contains such unknown components (section 10 of <xref target="RFC8955"/>). 
A NLRI value field <bcp14>MUST</bcp14> only contain a Source Prefix component (or Source Prefix Group component) and an Incoming-Interface-Set component. If the NLRI value does not satisfy this principle, the receiving BGP speaker <bcp14>SHOULD</bcp14> discard the NLRI value field (see Section <xref target="usages"/>). 
Since the NLRI field encoding (Section 4 of <xref target="RFC8955"/>) is defined in the form of a 2-tuple &lt;length, NLRI value&gt;, message decoding can skip over the unknown NLRI value and continue with subsequent remaining NLRIs.</t>
        </section>
        <section anchor="example">
          <name>Example</name>
          <t>Example: A Flow Specification NLRI encoding for "incoming interfaces {Group ID range [1, 20]} are valid for the packets from 203.0.113.0/24, and other local interfaces are invalid for the source prefix".</t>
          <artwork><![CDATA[
+========+================+========================+
| Length | Source         | Flags+Group Identifier |
+========+================+========================+
| 0c     | 02 18 cb 00 71 | TBD1 03 81 45 94 81 00 |
+--------+----------------+------------------------+
]]></artwork>
          <t>Decoded:</t>
          <artwork><![CDATA[
+=======+============+====================================+
| Value |                                                 |
+=======+============+====================================+
| 0x0c  | length     | 12 octets (if len<240, 1 octet)    |
+-------+------------+------------------------------------+
| 0x02  | type       | Type 2 - Source Prefix             |
+-------+------------+------------------------------------+
| 0x18  | length     | 24 bit                             |
+-------+------------+------------------------------------+
| 0xcb  | prefix     | 203                                |
+-------+------------+------------------------------------+
| 0x00  | prefix     | 0                                  |
+-------+------------+------------------------------------+
| 0x71  | prefix     | 113                                |
+-------+------------+------------------------------------+
| TBD1  | type       | Type TBD1 - Incoming-interface-set |
+-------+------------+------------------------------------+
| 0x03  | numeric_op | value size=1, >=                   |
+-------+------------+------------------------------------+
| 0x81  | value      | V=1, R=0, ID=1                     |
+-------+------------+------------------------------------+
| 0x45  | numeric_op | "AND", value size=1, <=            |
+-------+------------+------------------------------------+
| 0x94  | value      | V=1, R=0, ID=20                    |
+-------+------------+------------------------------------+
| 0x81  | numeric_op | end-of-list, value size=1, ==      |
+-------+------------+------------------------------------+
| 0x00  | value      | V=0, R=0, ID=0                     |
+-------+------------+------------------------------------+
]]></artwork>
          <t>This constitutes an NLRI with an NLRI length of 12 octets.</t>
        </section>
      </section>
      <section anchor="rule-position-extended-community">
        <name>Rule-Position Extended Community</name>
        <t>This document proposes a new BGP Route Target extended community called the "rule-position".  This document expands the definition of the Route Target extended community to allow a new value of high order octet (Type field) to be 0x07 for the transitive flowspec interface-set extended community, or 0x47 for the non-transitive flowspec interface-set extended community. These are in addition to the values specified in [RFC4360].</t>
        <t>The Rule-Position extended community is encoded as follows:</t>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | 0x07 or 0x47  |      TBD2     |    Autonomous System Number   :
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  :     AS Number (cont.)         |    Position   |    Reserved   |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The Position field indicates that where to install the SAV rule. Some values can be:</t>
        <ul spacing="normal">
          <li>
            <t>0: ACL</t>
          </li>
          <li>
            <t>1: FIB</t>
          </li>
          <li>
            <t>2: Independent SAV table</t>
          </li>
          <li>
            <t>Other values: reserved</t>
          </li>
        </ul>
        <t>Since FIB and Independent SAV table can only match address prefix and interface, the Rule-Position extended community with the Position field equaling 1 or 2 means the NLRI is specific for SAV rule dissemination, and the unrelated components (not Source Prefix (Group) or Incoming-Interface-Set) <bcp14>SHOULD NOT</bcp14> appear in the NLRI.</t>
      </section>
    </section>
    <section anchor="usages">
      <name>General Usages</name>
      <t>The Incoming-Interface-Set component can be used as a general flow specification instead of SAV-specific component. Other components can be combined with the new component for matching specific traffic.</t>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <section anchor="incoming-interface-set-component-1">
        <name>Incoming-Interface-Set Component</name>
        <t>This document requests a new entry in "Flow Spec component types registry" with the following values:</t>
        <artwork><![CDATA[
+=======+========================+===============+
| Type  | IPv4/IPv6 Name         | Reference     |
+=======+========================+===============+
| TBD1  | Incoming-Interface-set | This document |
+-------+------------------------+---------------+
]]></artwork>
      </section>
      <section anchor="rule-position-extended-community-1">
        <name>Rule-Position Extended Community</name>
        <t>This document requests a new subtype TBD2 within Transitive and Non-Transitive Extended Communities. This sub-type shall be named "rule-position", with a reference to this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
      <!-- Q: How to verify the routes with only src+interface in the inter-domain flowspec case? 
A: Only accept the FS routes with source prefixes originated from the same AS as the FS route, which is similar to draft-geng-idr-bgp-savnet-03. 
 Use case: A customer advertises SAV rules to its provider. The provider installs SAV rules for the source prefixes of the customer and helps block the forged source prefixes transiting the provider AS.  -->

</section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from Shunwan Zhuang, Susan Hares, Jeffrey Haas, Mingxing Liu, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.wang-idr-flowspec-dip-origin-as-filter" target="https://datatracker.ietf.org/doc/html/draft-wang-idr-flowspec-dip-origin-as-filter-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wang-idr-flowspec-dip-origin-as-filter.xml">
          <front>
            <title>Destination-IP-Origin-AS Filter for BGP Flow Specification</title>
            <author fullname="Haibo Wang" initials="H." surname="Wang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>BGP Flowspec mechanism (BGP-FS) [RFC8955] [RFC8956] propagates both traffic Flow Specifications and Traffic Filtering Actions by making use of the BGP NLRI and the BGP Extended Community encoding formats. This document specifies a new BGP-FS component type to support AS- level filtering. The match field is the origin AS number of the destination IP address that is encoded in the Flowspec NLRI. This function is applied in a single administrative domain.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-idr-flowspec-dip-origin-as-filter-11"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-12"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
      </references>
    </references>
    <?line 330?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vb63LbOLL+z6fAOn/sjShLsnNTJZlR4lx8KnG8tpNTO7Op
UxAFSVxTpEKQdpTY8yznWfbJ9usGwJsoO5NkPKWMCALdjb53A/J938vCLFJD
8ezVsXgZJZfidKmCcBoGMguTWEyTVJwmeRooMZpMUqW1+CCjcMJvPTkep+qi
XExrzZLRB2+SBLFcAPQkldPMn6l45oeT1J9iosZEX8sLv3ffS8Y6iVSm9NDL
lwBMX+h/Qw80qFmSroZCZxNP5+NFqDXwnq2WAHv44uyl54XLdCiyNNfZoNd7
1Bt4MlVyKE6SPAvjmXeZpOezNMmXmH9w4p2rFUYmQybQk3k2T9KhJ3xPiDDW
Q3HUFa9AJx4N6UcydgNJOpNx+IU3PhSvc3mpQgyrhQyjoaDdxTL+dc7j3SBZ
4F0QZqD9mQr/HTKIIMnjjLbzfB7GsoL2oCvehAXSAyDlxzrKMw0ogC/ex+GF
SjWAl/izhIQS/5rZSV01ybtB/GeIOOuKs6Sy97MQdNiROiW8ksgw2yxIiGfZ
vV8Depnzuz9JwNsusbVCwVss+IRPMVwn47c5MM7wKsjBMDlOUplBW0qK5rRs
8elXeup+mQWRHH8zX7w4SRdAdAE9FOKOOPQPuqHKpnUVDuNMpVMZKK0ymkez
LmVT0Sfh0k/ScBbGvtT+NIywiGafvHz+8NG9e+XX+0ModDzdgBn2EquMcKbS
nyTYVewv02QcqYWvM9jKQsXZxjUqvXENrYjCVhwyhUwzFWR5qopN5q2g26ay
FNxssvlMAj29Xcg41b6Ms1Avk2QKOdCoENYlvR0dnZyKw8UyYiqNQ3qVhxPF
s6z1Cn6AZtgF/Mj+Qwx6gz2/1zcwZTqDjMQ8y5Z6uLt7eXnZZfxdLN0FaclS
784I+G6VICOawcPBAyulvQe9ffv13qDfc7LjUa/b7Xqe7/tCjjUYGGSeV3ON
qcq10uwu4ZMyBZsRkxBTwzE9QfSpxFPO/BMyngjIailn5BTh5OQUflmQWolC
S8CSyzCbC6NVZCxAi1ENa56HWsAL58Q9hpQQdp0slFCfMxWTL9VEw5r/BlFa
LWAH5ETJWYo0jxRgmu0twskkUp4HRYOiJJOcUYqvd7SxiTS59jZGDbENeDsC
tMG/KNpSSPQtFMQ5YexLBBUMEWptoEgLxYnFH0utJkJmmQzOQVZBIRgzodgF
1s6VuCCku2HM/8cr+CQCWlqtSKZCCm1DnsN2eFwgBDXlIOiahp+JscpiC7CF
sRITtYySFQjC7tRkpox0U90RcEoTlZbPgCdns1TNDCvsOO86mKvgnMgrKIeH
IgKrxshKUTU5sQQHVAYevAQMt1U72FlXC0dyJs9VLHQezIXUYhwlwXlHwIEq
PwoXYYbvahKmsOQOo9QSZkhgvn7dbNPX16Qg4A4pLz6wrxXkGszhtPUCmjaX
GeMvdX4SrSh2KsJckWKFNdu/WwP82BG/WwO0X8kA7deHZpRI/fp13a9cX+9Q
dBMQehiF5PdgRupzCKIZK1bIGXsZw+AFrOXCSsFISgZBDotedUSgSB5R+AXy
dhRXDQaTSbcjnYhYqYmaWJ59g3e9vjZTv8G7Xl93xOU8hPisQCUiWOEq0xWZ
NTao2Yoq/DbbLWRCAqtZP5EOSDEMMHTsKFiVJUnEulr4Iqdeu1gCs49YR1hk
FNmccBDZPkIAh9k3+TPjgKZTqBEIcNMsArHMU+PHsjlUZDZnc6EtAHSWBJhR
+LaueOE4UNvjHBqv8+UySYkh1r6NcUMTMspgZrzxC5mGSa7Xt1tYE3gKFwtq
4iRzMMWYnBAm3e5+IKQaenKx/0vuvOGkO/UNWJHn5ANtut2ihsYYqzFgAhyx
IgnH6tIwXtfSfVKhJKaplIFN4N4Nzf6ho9k/VVnV3zoPWCDGKieZGs3jFeam
6cp5uFspyBIEbPgSE99sODk2UipnbZcFin33itL9cgYZ/kbxwbuqVhWhbbEJ
Y29EdkjbSiytK96Ag8H2gGfrc+FjwqgldJW+BHKpi4UR1WVjgFsLdzFN45l8
KwhBwpzJKGLE1eDHA0Aj/WUkY7Vm3sxLx/5KElDVKJOUOHFWwONFqhZJVolv
hkBQqymMSDYB44NqvK07HbatuYqWhaOl987DEs3enTviTKWgIImS2crzMGHo
5LzOUX4vTnLKGl1wNtGmZN1flw94nlG5wwklLdMQyb0Yxag3CV/uCHEvmUsq
s4G9wGskZ7LUMvap7qyLqGYFXZkPbxgjEBhpBah+4S9SMTpVesfx70R9yhHB
SRYa5VGMSmmmODwLlMGC6mAttt6+Pz3b6pj/i6N3/P3kxT/eH568OKDvp69H
b94UXzw74/T1u/dvDspv5crn796+fXF0YBZjVNSGvK23o39umTi99e747PDd
0ejNltHbmkUYLR/bPYPRtFWpvYnSASKZIumJZ8+P//P//X3E179RjtDvP7q+
tg8P+w/28QB7iQ22JEamYR7BypUnl0slKWFi7gZyiawggkJTaJgnl7EgS4No
//47cebjUDweB8v+/lM7QBuuDTqe1QaZZ+sja4sNE1uGWtAU3KyNNzhdp3f0
z9qz43tl8PEvcFlK+P2Hvzwl7Wnv6IzKQJOtlrCrCDyds92b6E1K/bgW0Dql
0pLWd8rE1lpmkj7tOsO2ITg0PrWIxIU5FqnuYRUmfBIWalbzwrSW85UmAqs2
M02ThXVYVX9N3v0CnvLDGmV1x8uxqLqwIJAG61kEaRzDrVLAWm1cT5mq0+bb
uGL5ajwIudKQ8a8v9zxK/NVnStAVK7eR0OPjPrIvIJ/2WQjTwUeL5ylcsYx1
C9nHfbGAL7EsMbDYFQl2pW4fhwSUiKAvAxQ1RNplqIEeEEJdEveyERs5/Dj/
Ww+QSu+6HMjsYi1ad24qV4jjZclSK3JuL1luSWcS8QJF3e4zruV2Ry3123bY
VXDUdfe905oIVVyMDdfTcEbl/lhhhikuXTINxoObLiiTaiPMEDDr/ovqv5QU
JwGSDNUvqtLRKQnLFBG03T/++IN7Iut/d/3K390Nk67E85K+qx+BJMQuw8Pf
vzZN2RUvTzEF/4h/4d8N03YtZcLAqmH377aQ1DJ617tCDplchFSxg2FXbrs1
ZhajBTuw7LmLwLTMQLsDtu8emBodf3fMKIDl45hMgZYdKw7aVYAl3PbRq+/d
Gwnd+6vrIVZfW/1zVst1jGk94dmkQtyPb9Y9VB+AE3G+GLNB2UL4m3qpqO6J
8cjmFnlMXpS9pokisyTBlhAJ5Jgq/xXvw3WdKNlEplbg5fZMEw77hCLGlCFm
rXAjZ6dD6pNQb9k4MVC3oMk3liiwYeQglfS7xMYery4RZh+beVWIZNevk0t1
odLOhprmJ9epz5SGpTRLU+NGufuT6CxauUrFZGyj528E+93dKTz1JSe29Egh
3Xg9qeG+S3+8kCuTBVaA2N5AkAloVVgUcmXVUwYK4CswdcTLw2cdEzthzSqm
jJxRWRJOG41R2oTt4EA51zKisnW5ufxGJvViY6eVs/T2Chse1uoGTbpTSXjw
Ejl8rZNV0e5OvU5gVQXH1uIb65CyAbqWO1RrjNpcsHPoeb71Xw0cprMH+cHb
6Q21CrsJFyI1Q6FuuRhR/l1WMNWVbGkmg7hpBtVslfcF1AjcSZGBLdVNkG+b
RdAbcwoM0FfIlttaJmxsxPItMwlTy7wuF226KVcrnqKwZC2VolmLGl2VelVp
csLrrc8jeHOJtM+mmsixsGNKFUly5EqjZFyOdMU7k75ATbEuniDLzMpmpFld
UkwxQKXU0G6rdE3+RuMFvimBM3ZalMfQJE6WZGH0UCI64kUSCSOiLiflziVp
vBFDnGzQ38KoUEUT2+3RZVBwTY5qmXFLQW4aLOFsPk44OgJWkaYVcMk/jOJV
hUfW2UmtkyDk1JNXEYOpHkrgj5pEcwP3zmY/8gLD5ONN3X9rzw3ZpqIVxtG6
zupLG3zF0ZuTQ27jmupZf2OP7rYWnT01gKZGwEQMI0IrncDVUhFppkU2gRv6
u6A7AOLs2UF/uGHrNMntHoUuw9hG1QIZZTuojCAEpC7B/yXLjonzH+8+LblU
Ii+8WhH4v64tvUaBE6Y2vaGw4QI5Z0/Mxw3ycYXDfL0yvLUtZULxjuOepUqQ
nXEFuV3SuVOVLOLitlbKHT9jW8ge9ruDbr/b3xmW5UEPnz4+A3z28NnH5x4+
9/F54Jns8saPR4mrwkdSAhuhFMP/e+IqysTVDB/1icuH2+Fw7npmeJQra6i1
HTmyey21Qb9lbNAyhj0SgD5e7mGz97DRB+KhePRnxpCd/+B/3tWHqxOT7695
qG1KwClZ6Yj7HdHf74i9Hmc09wdI5jJUnPj74yfQUDAcQpuRC5o6FS3Ybz19
vyMGHbHPVDw01lW0hRvemxQAXqXUSmjusUyzMMgjmUY2eaG0UcCpI5Wexeyj
4ow35zxSlQjuE2LuNJIzPaTTaTgrORMfyNSxaMf0gxlmA14LOLi2qchj7lOF
WaVL0kioigZH0fuvWSSDYSC8tozPa2BuBFJs5lV9MzDXBMHyO/ZEr9Z0yvSZ
asG+voENK+rRFAwrHNmGwIr8LFV86F8Lgb+pNGnRdANubVx9yiWfrvTMDQJB
ITm9UBO7Z0ojijqHknfbRnaZA+W8I45jHG35RIoD7JdWMvjom2oq7DROYr91
lql6N0AwSkQH4SYZuaXnj2Q8UMusmV24RiTneJsJcfLXEpWMDdYUOXi/3AGv
RLPNOyYBx8kNeIyc2wFwLVspl6Potj0XEuHGOgnOUmlSHgTVeLOIdK39SLAv
50lkdl/U1bCShEVvnBp7kwjqPbONQwQi684QpMeUY5TBuxJ31/bK7QIk7DNu
0a6Lw57fzFJF9YPZiZ110GfMER0q1cYHO6YquwkwbzSkjkcKNiNR4TKenaCz
nA8M/mTHMHWsCr1Acvxn+MX6g2JbhReuoQB+yHNTMFS7CXyCc/upLvIw9q5M
FwpmmKDJ/JmCqnOvF5Vc0ufxeUyd0wIepzKmEdrvEa+KqweUF43WgTLaqilQ
s/S7z5ZNoz/elN1VMtzDaXOTZTsGPNJ8qAwGLlEwBGHZym/lvD0cupF7nOKd
Wt58/Zpr1H6a78F4p0ChylVmvrK5sth2i/br/Kxk4EXnOjHdLSkGfpYv6dTB
JAydCj1PO3CCmtBjucVB1qbPw6VILuyhipNsZR/EWxJSGOOBCwydjzUiAMkm
pTueXMfRiqIMemF6GdTp5C9D+JaWa82MpdgxBeCttrbXV2eU1hZ/p2yn9/G6
cpKzdvpPh0yD3l631+338e/uYN8eQFaK6goKgnRjNrHVNant3Sf2r/iycaB4
4V2JNyaBu3KKXDaWKbfQd9d82tX3YuoFFnBvIPoPRTAWvZ540McAlWmityce
9sX+PfFon77gXaWV3Whftww0GtkHijP/YZ03Nfo2Etsk/ANr21VLRXDz39UP
4u19JpZduRzbMK8/sEk0HPmUXj0e7CPHd4WrxdvGpY0sq7OP8Q4IFZfEThu4
nh4Iv+HwGvv9QbxQi+Z+B/ucuN7C5x/EC10EqmW5pSsy0W+Q7w/ihZI38bYV
qD8dL6yuiRfO6K/Gy2beqlf8xi+jZOH/fCqEfgKf9whVWVjiwYQQHX5RT+C0
nz75S/j8kPdrUNn9fiB0J09gsocHT9o6Dz8DL7xoc79boyO6clPf9uMnPxcv
XPeN+x20avfP4nNtvyqe+MnUj0KdNXf95MnPwmvst7HfXrnfdmP+Mby29RJy
S1lnYZZnpmq2GTo8p3somzNF1Ojau195pPxjezpmjqCoT/bcnWw2L4YWPw4w
tw8p1zzhHyicmUJNOQjl2WhgzuMoX9misyXfHcZtdUXjpwfq81JSH4jvJlIG
aciyTaXbEKESk9QXtrQVN2Lm4Qx75+v1vHexzb6Gs9kdW/ZDhA+KtMoerdDN
FnecLOqeaB0797VgcCUUqoq/BxI3CbSyCR/dejFcsMcF9sjalk0mxabce3/v
fu+jOQFqSLWFVfUmr2mn60ZHt/n3zd1RC+HH2qPU7f3R5iSHURKsE43L3RBm
BtZM8TfKsyROFnRf4XSlM7UQR+aQX4jhT6JjyNhGpw7yNpUr3Z3SE9A/hcDs
84nrWAnb/f5pzdoCk22QV+6+opK+8e6wPf22WmiaIXzc2xvSITp96w/pAJ2+
DejMpeUInd69c9fUAGdYdOc8W3MCABdDrcsZLZfmtvNi79xW7tQVRmaq41sN
ojh1a7CmaCPyNbZBpdXLjjXUZdNn8/368tAyj1MVcXuu2pig2r6eTW9ztbVj
rs61dQx2RHnvU5RXVB1h9krBK/7BTCTec00vvt6xxb3Rgtt6EbW73qaVa+G1
NG5IV5Sc8BWW0Qe/4Eqls2EkXtl4s5VWu3NektF+x9NeLXKXJ9IUs16DzyQt
DwbOPzobHY3oDhrdP3Fnwfa3ZzKW1994r6Ieo1LqK+jMRUD6jQ8dzYqtonvQ
aGJpLJnRifNqq9xheYJpLeCG+vSmmpHTaU6jr8Th8cX+Lv65L46orVv6lhPF
P5GxRf2GavRWLDZpb+EX5+aNUL4ht7kpz7EO6juykoZMdD7ObDUxYJZDPGdl
JCZjPEJwrgytoQiV+10kgPkMTc+laXqaX7w0cpmOzbhAi2M2B+wKmdx6ok5b
npLLqeulRzpLMx7/zffFP4biNbQJEC6QydrfkXATXLujfng/nQZ3y6Mia/61
3/wVSUcgtfpFeKOheEcrZVAcHrw8rQFu3rYzV+jYZXHHqjg1QDCTugbBneYR
08JFGMEl0S9E6j/qH8+W7m5tbw/7hW9STB014Iq7OXKCfWchJZq1X5VQP95d
eDGHKcX1Fxusqgta22TmkLx2U8j9ysTeF3Ydy1nzjqP5LRrrjL3MXb18I4Tv
mzvxo4BalBH9wJN/VOF5b+lch7r359rlcRR72AsyW0/neXwJd/gb3z7uiFN4
6hj+LKV7c/+jptNUrfAo8UQ/dv9MBLwJ845QWWB/SjyWwbnn/RdDHxjfqkEA
AA==

-->

</rfc>
