<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.16 -->
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-gruessing-ntp-ntpv5-requirements-04" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.11.1 -->
  <front>
    <title abbrev="NTPv5 use cases and requirements">NTPv5 use cases and requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-gruessing-ntp-ntpv5-requirements-04"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <street>Postbus 26444</street>
          <city>Hilversum</city>
          <code>1202 JJ</code>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2021" month="November" day="13"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol <xref target="RFC5905" format="default"/> presently referred to as NTP version 5
("NTPv5"). This document is non-exhaustive and does not in its current version
represent working group consensus.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905" format="default"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but also fallen victim to vulnerabilities that have made it used
for distributed denial of service (DDoS) amplification attacks.</t>
      <section anchor="notational-conventions" numbered="true" toc="default">
        <name>Notational Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/>
when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp" numbered="true" toc="default">
      <name>Use cases and existing deployments of NTP</name>
      <t>There are several common scenarios for existing NTPv4 deployments; publicly
accessible NTP services such as the NTP Pool <xref target="ntppool" format="default"/> are used to offer clock
synchronisation for end users and embedded devices, ISP provided servers to
synchronise devices such as customer-premises equipment where reduced accuracy
may be tolerable. Depending on the network and path these deployments may be
affected by variable latency as well as throttling or blocking by providers.</t>
      <t>Data centres and cloud computing providers also have deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require PTP <xref target="IEEE-1588-2008" format="default"/>. As these
deployments are less likely to be constrained by network latency or power the
potential for higher levels of accuracy and precision within the bounds of the
protocol are possible.</t>
    </section>
    <section anchor="requirements" numbered="true" toc="default">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in both
local networks and also over public internet connections where packet loss,
delay, and even filtering may occur. It should be able to provide enough
information for both basic time information as well as synchronisation.</t>
      <section anchor="resource-management" numbered="true" toc="default">
        <name>Resource management</name>
        <t>Historically there have been many documented instances of NTP servers taking a
large increase in unauthorised traffic <xref target="ntp-misuse" format="default"/> and the design of NTPv5
must ensure the risk of these can be minimised to the fullest extent.</t>
        <t>Servers SHOULD have a new identifier that peers use as reference, this SHOULD
NOT be a FQDN, an IP address or identifier tied to a public certificate. Servers
SHOULD be able to migrate and change their identifiers as stratum topologies or
network configuration changes occur.</t>
        <t>The protocol MUST have the capability for servers to notify clients that the
service is unavailable, and clients MUST have clearly defined behaviours
honouring this signalling. In addition servers SHOULD be able to communicate to
clients that they should reduce their query interval rate when the server is
under high bandwidth or has reduced capacity.</t>
        <t>Clients SHOULD re-establish connections with servers at an interval to prevent
attempting to maintain connectivity to a dead host and give network operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol SHOULD have provisions for deployments where Network Address
Translation occurs, and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
      </section>
      <section anchor="algorithms" numbered="true" toc="default">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection
and clustering SHOULD have agility, allowing for implementations to develop and
deploy new algorithms independantly. Signalling of algorithm use or preference
SHOULD NOT be transmitted by servers.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and to consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol allows will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales" numbered="true" toc="default">
        <name>Timescales</name>
        <t>The protocol SHOULD adopt a linear, monotonic timescale as the basis for
communicating time. The format should meet sufficient scale and precision with
resolution either meeting or exceeding NTPv4, and have a rollover date
sufficiently far enough into the future that the protocol's complete
obsolescence is most likely to occur first.</t>
        <t>The timescale in addition to any other time sensitive information MUST be
sufficient to calculate representations of both UTC and TAI. Through extensions
the protocol SHOULD support additional timescale representations outside of the
main specification, and all transmissions of time data SHALL indicate the
timescale in use.</t>
      </section>
      <section anchor="leap-seconds" numbered="true" toc="default">
        <name>Leap seconds</name>
        <t>Tranmission of UTC leap second information MUST be included in the protocol in
order for clients to generate a UTC representation but must be transmitted as
separate information to the timescale. The specification SHOULD also be capable
of transmitting upcoming leap seconds greater than 1 calendar day in advance.</t>
        <t>Leap second smearing SHOULD NOT be applied to timestamps transmitted by the
server, however this should not prevent implementers from applying leap second
smearing between the client and any clock it is training.</t>
      </section>
      <section anchor="backwards-compatibility-to-nts-and-ntpv4" numbered="true" toc="default">
        <name>Backwards compatibility to NTS and NTPv4</name>
        <t>The support for compatibility with other protocols should not prevent addressing
issues that have previous caused issues in deployments or cause ossification of
the protocol.</t>
        <t>Protocol ossification MUST be addressed to prevent existing NTPv4
deployments which incorrectly respond to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <t>The model for backward compatibility is servers that support multiple versions
NTP and send a response in the same version as the request. This does not
preclude servers from acting as a client in one version of NTP and
a server in another.</t>
        <section anchor="dependent-specifications" numbered="true" toc="default">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905" format="default"/> Section 6) for
representing time, notably for media and packet timestamp measurements. Any
changes to the data formats should consider the potential implementation
complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility" numbered="true" toc="default">
        <name>Extensibility</name>
        <t>The protocol MUST have the capability to be extended, and that implementations
MUST ignore unknown extensions. Unknown extensions received by a server from a
lower stratum server SHALL not be added to response messages sent by the server
receiving these extensions.</t>
      </section>
      <section anchor="security" numbered="true" toc="default">
        <name>Security</name>
        <t>Data authentication and optional data confidentiality MUST be integrated into
the protocol, and downgrade attacks by an in-path attacker must be mitigated.</t>
        <t>Cryptographic agility must be available, allowing for the protocol to update to
the use of more secure cryptographic primitives as they are developed and as
attacks and vulnerabilities with incumbent primitives are discovered.
Intermediate devices such as hardware capable of performing timestamping of
packets SHOULD be able to include information to packets in flight without
requiring modification or removal of authentication or confidentiality on the
packet.</t>
        <t>Consideration must be given around how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication MUST NOT be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements" numbered="true" toc="default">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasence-detection" numbered="true" toc="default">
        <name>Server malfeasence detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime" format="default"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
    </section>
    <section anchor="threat-model" numbered="true" toc="default">
      <name>Threat model</name>
      <t>The assumptions that apply to all of the threats and risks within this section
are based on observations of the use cases defined earlier in this document, and
focus on external threats outside of the trust boundaries which may be in place
within a network. Internal threats and risks such as a trusted operator are out
of scope.</t>
      <section anchor="delay-based-attacks" numbered="true" toc="default">
        <name>Delay-based attacks</name>
        <t>The risk that an on-path attacker can delay packets between a client and server
exists in all time protocols operating on insecure networks and its mitigations
are limited within the protocol with a clock which is not yet synchronised.
Increased path diversity and protocol support for synchronisation across
multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="payload-manipulation" numbered="true" toc="default">
        <name>Payload manipulation</name>
        <t>Conversely on-path attackers who can manipulate timestamps could also speed up a
client's clock, also resulting into drift-related malfunctions and errors such
as incorrect expiration of public certificates on the affected hosts. An
attacker may also manipulate other data in flight to disrupt service and cause
de-synchronisation. In both cases having message authentication with a regular
key rotation interval should mitigate; however consideration should be made for
hardware based timestamping.</t>
      </section>
      <section anchor="denial-of-service-and-amplification" numbered="true" toc="default">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing with a private mode commands used in many NTP
implementations, leading to an attacker being able to orders of magnitude of
traffic to a victim IP address. Current mitigation uses a combination of
disabling the use of private mode commands, in addition to encouraging network
operators to implement BCP 38 <xref target="RFC2827" format="default"/>. Additional mitigations in future
protocol specification should reduce the amplification factor in
request/response payload sizes <xref target="drdos-amplification" format="default"/> through the use of
padding and consideration of payload data.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson">
              <organization/>
            </author>
            <author fullname="D. Senie" initials="D." surname="Senie">
              <organization/>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills">
              <organization/>
            </author>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin">
              <organization/>
            </author>
            <author fullname="J. Burbank" initials="J." surname="Burbank">
              <organization/>
            </author>
            <author fullname="W. Kasch" initials="W." surname="Kasch">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Marcus Dansarie">
	 </author>
            <date day="24" month="May" year="2021"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization while detecting servers that provide
   inaccurate time and providing cryptographic proof of their
   malfeasance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-05"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE-1588-2008">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold and Hal Murray for contributions to
this document, and would like to acknowledge Daniel Franke, Watson Ladd,
Miroslav Lichvar for their existing documents and ideas. The author would also
like to thank Angelo Moriondo, Franz Karl Achard, and Malcom McLean for
providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAA22j2EAA41abW/cOJL+zl/B9XzYmUW34+SSmcR7OJw3zuxkLnaysYPF
4XAI2BK7m2u1qBWldnqC/Pd9niKpl7YXmAHi6VZLZLFennqqSsvlUnWuq+y5
Prm+/bB/oftgdWGCDdrUpW7tP3vX2p2tu3CizGrV2v3vurX0RW12WLZszbpb
btrehuDqzbLuGv7bv1hOH1iePVel6ey5Uqbvtr49Vxr/LeWv1q4O5/rXU/3X
vEy6Hrf4FX/Dg998uzG1+810ztfn+tqWtq0gJ2T+0K8qZ++sfr9rvW3S/aFr
re3O9QcfulUf9LMfnz9/nn4rfIl9nj47e6Z//TVfc93hXP/iqr1tQ78b7uzr
rj1ww26bdkw/2Z1x1bn+B6U9dbZb//eGV04Lv1PKNe257to+dM/Ozl6dPVMF
tLHxXMnVa69Ma825flt3tq1tp+59e7dpfd/IRvymb90OR2t95wtfqTt7wNVy
fGR5SUOo0EGiz6byNQ50sEE17lz/H55ZaPxxdQlrLHTwLbSxDvh02KUPXesK
/ARpG8MPoV8Nn/FBzLiAsJWr7f8rVft2B93vbbTkx59fP3v69NX45eWzn4Yv
L16dvRi+vHz60/P45e3yUvQkPoPDbrYdzggXoUZmq5dt6cPS7JrKrV0RTZ60
rnX274vpz+Kylx8v/Y2+6DpT3OlLu7Y1vGO51Bf6pm/39iA3Xdt7/QEmbmzB
DeHbw8Km3dBjtl3XhPMnT0z7xe1P4XdPzCo8efri7MXp2U8vXz2TB3iGnQuI
mYeSIZx0sNix1fEW2djAC+2/383Wp/fuzjW2dEY25bcnWOpzXOpzXOqz2JtL
ZTEa76uHMvDqKX7lUvDErYUpo+foooJbQja/5uNJ0kf0cJJFu7+/P00bcbl4
59s3b94sn754+XIJD3/5UAD+rm/onqYtNQysDdzZFi7QXK8rDxvdHOpi2/oc
1oO7y+0pEGypr6wJfUQW0eRrj5jEXTcHnGM3kbz08P6Tp2enT5+evXpCCW5u
L08p3+nzFz+9+unHsxOllvAIGLRr4epK3W5dwHNFL6uXNhStWwF+qLEBEBcz
NFyIEIWvgwMIieS83yAat76vSr2yeo3FfQvZXS1LYWG3qalyg0grCkAbjtjk
83YeVxtYAbCmaQ1q47nC7XyY/jTc+vXrH1KIffuGqzZApOoAAde25YZYygR5
JK/zQn0fEf7kh1M9Py8+175e2i9bA59AOMjRSm95vaPwrgu66LEy7k4Lqtam
fTUNBIjWgl2iEsRcH06jlrGE/XzNP53//NEaaCso9SeIr9+UDvo5100F21pI
v/PYvKNwgYEJsVcWXmB1Q3SPQf4npW583xZWAFxEdSEgTYi/yMOSnmC0WowA
8Ebcdeo/sydvXLftV4ToJ2tnAZ7/sF0wuye/L6v9VzrXzpVlZZX6jmjc+rIX
gZWaKv353FBbw4NZ4JSgjrgWhfYECQP3KKCd6Fj3kNHVSo5DgNTwC+dL8YTB
C7geLeRr2H7Fhe2XzgLuy+RLDSBf1/ZeTQ+gVz0iqAoe/llVeGiPHOB2fGTf
VzWceeUq1zkb/Rm7QNQdJIMbUORSUebSMXlgKWyG/OJMRb8mjDiY5vtLgPAP
2szRWTCZfvHddxoeIVfxHCJ5D8EYQQxFq5Hn6FRl0CdXn25uTxbx//r6vXz+
+OZvn95+fHPJzze/XLx7N3zId9z88v7TO/yu0qfxydfvr67eXF/Gh3FVH126
uvjfk2iBk/cfbt++v754dxLD1wU1RAwSN9W1SniKQKAaYI0MHRLyf3n9QT/N
LsBECReIX5gOv31T91tbx83EgvErLIwc1TTWtFwEJoInN66DxRbcAvByX2vQ
EEtF6k8zvma/wCyMxdI2lT9Ee8MucEpRLeSm7MHC46B5pngYJhS2NnCvGELD
GoSL59OV/pzisDooI+jlVlUEpmT3QFjbUsqMWB+8oFVKHFAAt6cTUX9+DbhC
JkIWUCFngRCdRSTBiXBvm862g15LcTfZa6Hf3ggk7h2vpgyGdSdr2XzzIFgB
iPM72y5hNCRT/MLQaMSs96Ig4Gdf0JwFIM8UB7UzjC4sXDE2KnsKWtFANurI
R2SvE1+jnI3ptrwom49WiKsogzMX9JbVQe+hdC6oK/DCujhQvnsLg4sCEeVd
JXu0ekUd8TOeSiduGUiXpjMa1gOxi0qCMvtS+FwvNhxujhEvsRyl4gnpeWID
+sdgw5XHAaj/SBbgJ5m98GJWIPTfmLZzRV+ZNnovo2JUhgJ09bWcb7A1gSPn
lYRJ+gPc5OvXOZP49u1UX4SoRTXVIt2ngufpyt1Z7BqjkDkHqRwkVfSarZHV
yiTr7y2zg1UNUhHAxkR+sXUbyI0l97aSSMlWj6YcqErEYzneiglF7pXlMhhT
ssbHmJDI/DjBXKUugBqyW9xroWO5NZIFMyEChF1oD3Ev6sNWvhGSAYtCChpI
wSNwhnTUaHwxsSSTGKcTtufrOmbUkAwFjn+HHypIvICGK3OISAThEHyuwoPc
jV7rqZJT/babSpvMmvwLoUoqP5L4FMHiSisTIItksenvE2c/Cv6YIT7aEPP8
ztRmI3pU6hdgk0fRAlg8UP84ifi0ZD/ceBhojWAwKyO6dITAESOMBJNRFVku
7itaYSDQLTxWalUnGAVGgPQVASwxfWJYXR7xOTGm2iE0NLlPCgQscpf8RFBa
+MjO1W7nEgLyrnWPLMwHmbs7nP0mSZlyl5zPMI1rx0oOCVVcGT7SWN4n0Rki
+YO/20VkQfFxxSQn7vXz3y6vaWP99oM2ZdkyihjkkzVdoo7ZfwrbdjF/A/SS
WCqJNXGCndvAOSNEFFtTb+T4brp2EDNDn11PptH4ym/IMHyrcrTCR9du00cu
ndYJyfkiLxgCRNiA6IUKlDAhZTmIz42JgDDj1geAohPwEJ0xaDNNiQi1R8HO
oyRKn24e9yhAT4lwpV1HhLG47OCbQW09/F4CJbJWuAM8E98RLjW17OQwYW7R
ieqYgftaNMzMdSzpIYdcTEpJrf/sbXuIwb0HBojuSR5EG6nmBF0BTNmIcAjB
urx3JYKRmCfOEpMcdcemBzT8Ou2dhGztktwYfhC2c/wAFA4nMizGRlEEEQgh
nQLbs7tGIIsuAnDu8G9YaU9zia+VqAn01odY1m1IjLNLRNTzUDRPlo3M5aRQ
SNFp7gFS69bvZJUgrEngBjYDJIDRHvvPNLIEwYKcTHjtJNlEpMy9mIsYM+q2
NXWoopeKd6ZaMLrHxDuiTa4vbqHLlUt8QR5IFVi0rRLYZkZk2sYxnGTbgyaH
Rmx1biObfR9+GPxiPAoBOu4cUfOi2gC8uu0ucWmCA9PacDlzVEqz7utk1IEe
SUk+4P8Chq6i4VUMDuka8NkZOm3EMguyVX8vKxNZwP4FtnN17MnGbOUb6iul
dcG1iXTsVpFcGRa0AJ0homaniMdi7ZxBT41MX8gajQTdJaaV3DX5wbxgTRGW
S3nNXCBuiyLdguIwuiZ5C14+1AGI2Mz4GQajeFJ/B+SqGC1zTUR3keBPW5rS
S6Sodd8xeeQN6EIOhhk2OVJWJNoH4R5JtbaE0hrQlvWBC0ZAmT6Tz1SlmJl5
k9iPIV6lz4mmMOSs7VSkdzbSHxQpuShPqGCE0lrEKNtKKW6weMM8khgqPosu
abNpWRrdlw3PgOxuw+MhK5rCPmxImnYBIEDggDhEfiFP5vKDtENiWo0gK2iE
GxmAUnvDptkBeEDEASFFdJYWe0ADIXXwVS/xbx05iDyamLr9UkA/Q/kUbZ1S
eOuhUoIzu+Jq3IqmMG3iUATTTAy6yCSOYv6PQZCiQtGp/AqyWBZwMZ3tiKMj
Nxa4QTi3oUu+P6rJTRIU/RWI4+U0wtTYw3HSpZhyNkmKq6ns4semYhXQsXZK
TaHkFXADoYCfbl+LIm4v3lL10veNhEeQV3WPmDr3L7KQTC+D8A826juGUmbl
TDc6SBgkD10khlxlaAghSyjnLVlJxSYCoTomZKw00xdQJ7rpO2vYM0UAl3RU
rJgW5Ho8bDXe8JgCSTmrvhxbg8PhXa18S0yQWivTAa83lp0ZkixZf35+aekI
+zyCPhPUYxiWqedwuBgPM4UNEcfstLK5GJF2ZN6Bbt43cEZ+mBw5AFoBopGm
1vopPYSYTs8/RMfbEwCgzIkmddghpie5JVNX4kziyxS4M7smHCN8pnUWoLBF
sbe3qRmYopv5NVGTEY7JYAQEucXh6BBqEGcFJLOJXmVApTPVh5QvnZRrUoGS
+4mL/AUF1r1hE0smKp0b2cv17U2cQhAhYlhmZxerz+4XYI2BmZ3k0UMlSk/Q
T/3QsXvHe0BJWFFK7yXdAEPM+kRt/F2zih3cwK9n0YnDDQ362X3Zs5Mc0V5Z
uHlPSc1JFjMc4sG3gNnYxQ6NTxkyBQAKa8nIIeUjMRqFHY97qn/2LRWeN03R
OBPy+ziCGHsAXO7HWfSNyPtDVnMOAZSNto74PGv8J2jdedTRsexNtj8ypfS1
U3FC22Sj7/qqc3DJ3DcO0kSmhwS2wEzSSCxQheOb3TghSOmOuRSxMTT3Y5dF
MXcRaYado78XXdKnyR6NpX09rpoqZhI1M9QUnLCJK4qLf5f6YHz6ZgodgMSr
MZ2MZGYH/WVCisWRxwR1IywF/f3Xr2Ov/CYNAH78QVL4gHc5gy94OgBSrPl2
HJil7pv0NQagwE/D3Ag+clEfVC4tEwjOZDgmg+L6g7fMeZyKWfiLRDXtmRqF
8GXOSsqIA29ilosu8Hvr2NjWyt38RBilKzTn1EpWAEfmkKSv72r2hse8eqo/
PbgGRyks8rqg5mDa6BWqkjZZrtPTbzErEmtieMfQHnwSig6G+pRhUITi9KiK
e8X6mD2QiWiiHFgZ5TP1Ip1Mtl6o6sk4l8Q4km5pdbJHUEZrUE9jOu2s9CBK
Cc8ZYqXqDFrAHZwYxTGEHJ/RvJSGbbxKLpfSaCq8xIyv20PTeTzebFlvxmpn
uHPaQJjWP7O8Do31TZnK/G4szHZe+vEFmV4x26Zp3U4Y2L/h+TEHBZXPw6/H
A5xYfcAfdysaZ7okl3KhIB/lGeWVAgmj7mHTfAssu+cTk45k4vE5HiXYYpmm
Ygw+1u5ItOeYi+QHADDrym22sWwCp0sVgnQifTlJSm2cFsap05HbSAqd+0ls
0yfBaNApfA+GZO8BXtfKxBAkIhIIKYZiWPsWeD14GQmASkWQnI9vesQscKov
k78JzCYLSQQXAjAVmx6yBLkQMNe0BwV7sN8SCwk5Hz+D2tMv0smOzprnYhQw
d59TllBje/IogXP6Vs+GmmkEnqeu4hUEyMYVSWxa337hWR1zNGwj874CnphD
Ob7rYKo1e6msR0pUKGkqepk/pteKmPdSUR9mD5IWjk0v4fHTvejwX7/+4fG3
SNiarUA8y2FIEqIJJ8gaUx6CTuXmR/KQR7SEQsWaZNGI3Cjq+10zDvsjcRRD
VlVeo5PH0gtULtyFcXow6pgv/7BEtRz+aZRxbKANRdPsxYOh8cg2pIt5uJtO
8AXh1BrfAhcjyMrYJgsyL46Sn8oYg9V6pmBD9tJNZVCcJ6FNLuRP02tHk4XH
E2akMHF1nir17sRzGMpzd7nkyGEZFZDiI6pYmuZRt2QkR+jMJrpMKwbMyOTc
TKl5Sj9CO0Meo8Y5+sChx5GKZxpIGDwbqPC9h7EBF8RmFSHUltOJ0ADyqQkS
i4JEbOOw68DewjiWFMCNQ4c0MCydMK8uD57SitO64HhEaooWEa8G9rhFjLWe
hSKpfhyepIlZaggISeWoQYaQLO4np4t2+WAOlQc27Uztmj62OQUvKR4XOTYJ
3ceLXYZH7LROK0YKjfoSx+0bEI1oqz+mhuMi/g5KwbPIkIvNwtatO8BUJYhL
fBjalTKpalvfRs9TJowVBGHKtbl4eWSUEfLUdpjFSt+Y5FCNNAAuJkJNTpX4
LInImKkoqAtt33TD2w/SKWUlBQheHs+2OBiQnkiMbTaLmd0iiTqG9+RQrd1w
ysoXAHWbXpwYm+65f5UIy5+H+ndWpEyGd/IyB1n1kNdjHE7zeI7S/GbHzeRs
s5fu5I2X/XOZKuQ6E27CDhGZRWSW0sp+9G0Q3cfKjmR65erBbJMhFXimX/Om
pA2wmD3NQVyWAQrfx4wvFbg0BOQ8+4gqLyTnpnGEqUdIWVkRIM+pW5mWk5mZ
Te26XnBT5VmDTCzSCzOjiKf6dXo7aownChRzzfRckxw/IYGPnmhx3KFDTkVM
g33i4TxjHyYkwq7yieXVk/94qaWg4luZMk8f+2iTqBdPlnJ3HGXP+0APJlBH
hoxvubF0TiXok6E0aBKYBPcbdPH16yOvdCJnd6kfOCoERK2MzOn4HTvRVlqV
gSh5+u3F9YWeUbpw/E4fS08icS6TxcJ8ThbIZciDRS7CPNMSzhl3+R0rmRVE
It3H/l+WWF6BW0hnKL0eZoPC/iFvdfTqIMRhtgFrTO+XsYdA2S4KVnCVLTcj
VYs4AaXfRzIJeI/VrKnvwDz7jb5oa1/FEuEXGPwK7mkOqbtUxxe30kxGPaQS
R8uaUQJ9CTS0lf65xU6od/4OFoBDv4O5FurKIR9VZq/fIfHtTZuLIDd5p2hs
Bkh+LZEBY+9xdiACr5qf6gIle+X1lW8hd+kXIsJv+n9AiaAiAlkU/cpUCCB9
VbyzRt5BUJEK5ojL+xBKdr5z+9TB+RecpociNS8AAA==

-->

</rfc>
