<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-guo-intarea-savax-protocol-00" category="std">

  <front>
    <title abbrev="SAVA-X-Protocol">Communication Protocol Between the AD Control Server and the AD Edge Router of Inter-Domain Source Address Validation Architecture</title>

    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Wang" fullname="Xiaoliang Wang">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization abbrev="Tsinghua University">Institute for Network Sciences and Cyberspace, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>guoyangf19@mails.tsinghua.edu.cn</email>
      </address>
    </author>

    <date year="2021" month="October" day="23"/>

    <area>Internet Area</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Because the Internet forwards packets according to the IP destination
address, packet forwarding typically takes place without inspection
of the source address and malicious attacks have been launched using
spoofed source addresses. The inter-domain source address validation
architecture is an effort to enhance the Internet by using
state machine to generate consistent tags. When communicating between
two end hosts at different ADs of IPv6 network, tags will be added to
the packets to identify the authenticity of the IPv6 source address.</t>

<t>This memo focus on the data plane of the SAVA-X mechanism.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The Inter-Domain Source Address Validation Architecture (SAVA-X) mechanism
establishes a trust alliance among Address Domains (AD), maintains a
one-to-one state machine among ADs, generates a consistent tag, and
deploys the tag to the ADs' border router (AER). The AER of the
source AD adds a tag to identify the identity of the AD to the
packet originating from one AD and sinking in another AD. The AER of
the destination AD verifies the source address by validating the
correctness of the tag to determine whether it is a packet with a
forged source address.</t>

<t>In the process of packet forwarding, if the source address and the
destination address of this packet both are addresses in the trust
alliance, however the tag is not added or incorrectly added, AER of
the destination AD determines that the source address is forged and
directly discards this packet. The destination AD forwards the
packet directly for packets whose source address is an address
outside the trust alliance.</t>

<t>This document mainly studies the relevant specifications of the
data plane of the inter-domain source address validation
architecture mechanism between ADs, which will protect IPv6 networks
from being forged source address. You could see <xref target="RFC8200"/> for more 
details about IPv6. It stipulates the state machine,
tag generation and update, tag processing in AER, and packet signature
Its promotion and application can realize the standardization of 
the data plane in the SAVA-X to facilitate the related equipment
developed by different manufacturers and organizations to cooperate
to accomplish the inter-domain source address validation jointly.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119, BCP 14
<xref target="RFC2119"/> and indicate requirement levels for compliant CoAP
implementations.</t>

</section>
<section anchor="terminology-and-abbreviation" title="Terminology and Abbreviation">

<texttable>
      <ttcol align='left'>Abbreviation</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AD</c>
      <c>Address Domain, the unit of a trust alliance, which is an address set consisting of all IPv6 addresses corresponding to an IPv6 address prefix.</c>
      <c>TA</c>
      <c>Trust Alliance, the IPv6 network that uses the SAVA-X mechanism.</c>
      <c>ACS</c>
      <c>AD Control Server, the server that matains state machine with other ACS and distribute information to AER.</c>
      <c>AER</c>
      <c>AD border router, which is placed at the boundary of an AD of STA.</c>
      <c>ADID</c>
      <c>The identity of an AD.</c>
      <c>ADID_Rec</c>
      <c>The record of a number of an AD.</c>
      <c>ARI_Rec</c>
      <c>The record with relavent information of an AD or STA.</c>
      <c>API_Rec</c>
      <c>The record of prefix of an AD or STA.</c>
      <c>SM</c>
      <c>State Machine, which is maintained by a pair of ACS to generate tags.</c>
      <c>SMI_Rec</c>
      <c>The record of the state machine information.</c>
      <c>Tag</c>
      <c>The authentic identification of source address of a packet.</c>
</texttable>

</section>
<section anchor="pkt-format" title="Communication Protocol Format">
<t>Every AD should be placed at least one ACS, which is mainly responsible
for maintaining the relationship between ADs of the trust alliance,
establishing connections with other ACS, maintaining the synchronous
state machine, and sending the generated tags to the AER.</t>

<figure><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |    Version    |    Alliance   | I Type| S Type|   Operation   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                           Total Length                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                        Number of Records                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Transaction Number                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Acknowledge Number                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                              Data                             ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="hanging">
  <t hangText="Version:">
  8-bit, the current version=0b1 of SAVA-X.</t>
  <t hangText="Alliance:">
  8-bit, the sub-trust alliance number.</t>
  <t hangText="I Type:">
  4-bit, Information type, 0 for G_REF_INFO, 1 for AD_REG_INFO, 2
for AD_PREFIX_INFO, 3 for STATE_MACHINE_INFO, 4 for DIAGNOSIS_INFO,
5 for RUNNING_STATE_INFO, 6 for STRATEGY_INFO, 7 for ALIVE_INFO, 8
for TAG_INFO, 9 for ALLI_TAG_INFO, 10 for AD_V_TAG_INFO and others
are unassigned.</t>
  <t hangText="S Type:">
  4-bit, Session type, 1 for ANNOUNCEMENT or DEPLOYMENT, 2 for
REQUEST, 3 for REQUEST_ALL, 4 for ACK, 5 for NAK, 6 for AACK, 7 for
ANAK, 8 for RACK, 9 for RNAK and others are unassigned.</t>
  <t hangText="Operation:">
  8-bit, the first 3 bits means for whether RENEW Type or not. First
bit: 0 for non-RENEW packet, 1 for RENEW packet. Second bit: 0 for
the first non-RENEW packet, 1 for the first RENEW packet. Third
bit: 0 for the last non-RENEW packet, 1 for the last RENEW packet.</t>
  <t hangText="Total Length:">
  32-bit, the length of this packet: from Version to Data.</t>
  <t hangText="Number of Records:">
  32-bit, he records in Data.</t>
  <t hangText="Transaction Number:">
  32-bit, this is the identification of a publication, query or
response, and the value should increase monotonically. And
different I Types MUST have its own Transaction Number.</t>
  <t hangText="Acknowledge Number:">
  32-bit, it is only be filled when S Type is ACK, NAK, AACK, ANAK,
RACK or RNAK. Otherwise it is should be filled as 0.</t>
  <t hangText="Data:">
  Variable-length field. I Type and S Type specifies data jointly.</t>
</list></t>

<t>When S Type is ANNOUNCEMENT:</t>

<t><list style="symbols">
  <t>If I Type = AD_REG_INFO, Data field SHOULD be one or more ARI_Rec.</t>
  <t>If I Type = AD_PREFIX_INFO, Data field SHOULD be one or more
API_Rec.</t>
  <t>If I Type = STATE_MACHINE_INFO, Data field SHOULD be one or more
SMI_Rec.</t>
  <t>If I Type = TAG_INFO, ALLI_TAG_INFO or AD_V_TAG_INFO, Data field
SHOULD be one or more TAG_Rec.</t>
</list></t>

<t>When S Type is REQUEST or REQUEST_ALL:</t>

<t><list style="symbols">
  <t>If I Type = REG_INFO, Data field SHOULD be one or more ADID_Rec.</t>
  <t>If I Type = AD_PREFIX_INFO, Data field SHOULD be none or one or
more ADID_Rec.</t>
  <t>If I Type = STATE_MACHINE_INFO, Data field SHOULD be none or one
or more ADID_Rec.</t>
  <t>If I Type = DIAGNOSE_INFO, Data field SHOULD be a 32-bit diagnose
reqeust code.</t>
  <t>If I Type = ALIVE_INFO, Data field SHOULD be none.</t>
</list></t>

<t>When S Type is ACK, AACK or RACK:</t>

<t><list style="symbols">
  <t>If I Type = REG_INFO, Data field SHOULD be one or more ARI_Rec.</t>
  <t>If I Type = AD_PREFIX_INFO, Data field SHOULD be one or more
API_Rec.</t>
  <t>If I Type = STATE_MACHINE_INFO, Data field SHOULD be one or more
SMI_Rec.</t>
  <t>If I Type = DIAGNOSE_INFO, Data field SHOULD be one 32-bit diagnose
response code.</t>
  <t>If I Type = ALIVE_INFO, Data field SHOULD be none.</t>
</list></t>

<t>When S Type is NAK, ANAK or RNAK, Data field SHOULD be one 32-bit
error code:</t>

<t><list style="symbols">
  <t>1 for parameters are wrong which means the packet cannot resolve
correctly.</t>
  <t>2 for member AD(s) in request packet does not exist in the
designative sub-trust alliance.</t>
  <t>3 for algorithm for State Machine set by source ACS cannot
support by the destination ACS.</t>
</list></t>

</section>
<section anchor="acs-acs-communication-protocol" title="ACS-ACS Communication Protocol">
<t>Since the blockchain is adopted in SAVA-X to maintain the information
of the trust alliance, ACS can query the address domain information
of relevant ADes of the trust alliance and the AD prefix information
corresponding to the address domain from the blockchain.</t>

<section anchor="announcement-query-and-response-of-state-machine-information" title="Announcement, Query and Response of State Machine Information">
<t>State machine information record (SMI_Rec) represents the packet
format used when state machine is negotiated between different
ordered pairs of ADs. When an ordered pair of ADs is negotiating the
state machine, ACS of AD with smaller ADID initiates the 
communication and ACS of AD with larger ADID uses SMI_Rec determines
the information to be used, such as initial state, tag generation
algorithm, state transition interval, etc. Compared to ARI_Rec and
API_Rec,SMI_Rec also needs an Expiring Time in addition to the Effecting Time. Expiration Time stands when the negotiated state machine is no longer valid.</t>

<figure><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+
 |     Action    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Source ADID_Rec                         |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                     Destination ADID_Rec                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       State Mathine ID                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |        Algorithm            |             IS Length           |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                        Initial State                          ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                      Transition Interval                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                        Effecting Time                         |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                        Expiring Time                          |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="hanging">
  <t hangText="Action:">
  8-bit, 1 for add or update this SMI_Rec.</t>
  <t hangText="Source ADID_Rec:">
  Variable-length field. Refer to ADID_Rec <xref target="SAVA-X-Control"/>.</t>
  <t hangText="Destination ADID_Rec:">
  Variable-length field. Refer to ADID_Rec in <xref target="SAVA-X-Control"/>.</t>
  <t hangText="State Mathine ID:">
  32-bit, the ID used to identify the state machine, which is unique
to a specific ordered AD pair and grows monotonically in use. It is
used to distinguish the sequence before and after the generation of
multiple state machines.</t>
  <t hangText="Algorithm:">
  16-bit, algorithm used in A-Box. 1 for KISS-99 32-bit, 2 for
KISS-99 64-bit Joint, 3 for OTP-2289 MD5 and others are unassigned.</t>
  <t hangText="IS Length:">
  16-bit, the length of Initial State field.</t>
  <t hangText="Initial State:">
  Variable-length field, the length of this filed is determined by IS
Length.</t>
  <t hangText="Transition Interval:">
  32-bit, the milliseconds of interval of state transition.</t>
  <t hangText="Effecting Time:">
  64-bit, when this field is 0, it means this State Machine should be
enabled after the last State Machine expired.</t>
  <t hangText="Expiring Time:">
  64-bit, the end of this State Machine.</t>
</list></t>

<section anchor="state-machine-information-announcement" title="State Machine Information Announcement">
<t>State machine information announcement (SM_INFO-Announce) is sent
from source ACS to destination ACS. Source ACS fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>SM_INFO</c>
      <c>S Type</c>
      <c>ANNOUNCEMENT</c>
      <c>Operation</c>
      <c>NULL: source ACS updates part of the state machines information to destination ACS. RENEW: source ACS updates all the state machines information to destination ACS.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>The number of SMI_Recs in Data field.</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out where I Type is SM_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>One or more SMI_Recs.</c>
</texttable>

<t>All SMI_Recs in Data field should have an unique SM_ID. When Action 
is ADD and SM_ID bigger than current used SM_ID, ACS should add the 
state machine defined in SMI_Rec. When Action is ADD and SM_ID equals 
to current used SM_ID, ACS should modify the state machine defined in 
SMI_Rec. Only Transition Interval and Expiring Time can be modified. 
Other SMI_Rec should be discarded and destination ACS should send a 
NAK message to source ACS.</t>

<t>When receiving a non-RENEW packet, if it cannot resolve this message, 
destination ACS should send a NAK message to source ACS. When 
destination ACS can resolve the packet correctly, it SHOULD:</t>

<t><list style="numbers">
  <t>Compare the Transaction Number in this packet with Transaction 
Number received from the same ACS before. Otherwise, destination ACS 
would discard this packet and send a SM_INFO-Request to request the 
lastest information of state machine. SM_INFO-Request is defined at 
<xref target="SM_INFO-Request"/>. If bigger, destination ACS WOULD:</t>
  <t>Accept every SMI_Rec and process them as following: 
  - If the SM_ID in SMI_Rec equals to current used SM_ID,
 destination ACS would update the current used SM_ID.
  - If the SM_ID in SMI_Rec bigger than current used SM_ID,
 destination ACS would add this state machine to its following
 used state machine list.</t>
  <t>And then destination ACS will send an SM_INFO-AACK message to source ACS.</t>
</list></t>

<t>When receiving a RENEW packet, if it cannot resolve this message, 
destination ACS should send a SM_INFO-ANAK message to source ACS. 
When destination ACS can resolve the packet correctly, it SHOULD:</t>

<t><list style="numbers">
  <t>Compare the Transaction Number in this packet with Transaction 
Number received from the same ACS before. Otherwise, destination ACS 
would discard this packet and send a SM_INFO-Request to request the 
lastest information of state machine. If bigger, destination ACS 
WOULD:</t>
  <t>Accept every SMI_Rec and process them as following: 
  - If the SM_ID in SMI_Rec equals to current used SM_ID,
 destination ACS would update the current used SM_ID. 
  - If the SM_ID in SMI_Rec bigger than current used SM_ID, 
 destination ACS would add this state machine to its following 
 used state machine list. Especially, state machines will be 
 removed right now when they are not listed in the SMI_Recs but 
 they are in using.</t>
  <t>And then destination ACS will send an SM_INFO-AACK message to
source ACS.</t>
</list></t>

<t>There are two types of reply of SM_INFO-Annouce message. That is 
SM_INFO-AACK representing affirmative acknowledgement and 
SM_INFO-ANAK representing negative acknowledgement. These are sent 
from destination ACS to source ACS. The mainly part of packet is 
filled by destination ACS as follows:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>SM_INFO</c>
      <c>S Type</c>
      <c>AACK if it is affirmative acknowledgement or ANAK if it is negative acknowledgement.</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out where I Type is SM_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>The Transaction Number of the response corresponding request.</c>
      <c>Data</c>
      <c>S Type = AACK: None. S Type = ANAK: a 32-bit error code defined in <xref target="pkt-format"/>.</c>
</texttable>

<t>Nothing needs to do when source ACS receives an SM_INFO-AACK message
while it should regenerate a new state machine and announces to
destination ACS when source ACS receives an SM_INFO-ANAK message.</t>

</section>
<section anchor="SM_INFO-Request" title="State Machine Information Request">
<t>State machine information request (SM_INFO-Request) is sent from
source ACS to destination ACS. Source ACS fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>SM_INFO</c>
      <c>S Type</c>
      <c>REQUEST</c>
      <c>Operation</c>
      <c>NULL: announce all state machine information to source ACS.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out where I Type is SM_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>None</c>
</texttable>

<t>When source ACS receives a SM_INFO-Request message, it would send a
SM_INFO-RNAK message to destination ACS if some fields are wrong. 
Otherwise, source ACS would send an SM_INFO-RACK message to 
destination ACS and process this SM_INFO-Request message. Source ACS 
should compare the Transaction Number in this message with 
Transaction Number received from the same destination ACS before. 
Otherwise, source ACS would discard this packet. If bigger, source 
ACS would send an SM_INFO-RACK message to destination ACS.</t>

<t>There are two types of reply of SM_INFO-Request message, i.e. 
SM_INFO-RACK representing affirmative acknowledgement and 
SM_INFO-RNAK representing negative acknowledgement. These are sent 
from source ACS to destination ACS. The mainly part of packet is 
filled by source ACS as follows:
I Type is SM_INFO. S Type is RACK if it is affirmative 
acknowledgement or RNAK if it is negative acknowledgement. Operation 
is NULL. When S Type is RACK, Data field is a few of SMI_Recs. When S 
Type is RNAK, Data field is a 32-bit error code.</t>

<t>When receiving a SM_INFO-RACK message, if it cannot resolve this 
message, destination ACS should send a SM_INFO-Request message to 
source ACS to acquire another state machine. When destination ACS can 
resolve the message correctly, it SHOULD:</t>

<t><list style="numbers">
  <t>Compare the Transaction Number in this packet with Transaction 
Number received from the same source ACS before. Otherwise, 
destination ACS would discard this packet and send a SM_INFO-Request 
to request the lastest information of state machine. If bigger, destination ACS WOULD:</t>
  <t>Accept every SMI_Rec and process them as following: 
  - If the SM_ID in SMI_Rec equals to current used SM_ID, destination ACS would update the current used SM_ID. 
  - If the SM_ID in SMI_Rec bigger than current used SM_ID, destination ACS would add this state machine to its following used state machine list.</t>
  <t>And then destination ACS will send an SM_INFO-AACK message to source ACS.</t>
</list></t>

<t>When receiving a SM_INFO-RNAK message, if it cannot resolve this 
message, destination ACS should send a SM_INFO-Request message to 
source ACS to acquire new state machine. When destination ACS can 
resolve the message correctly, it SHOULD compare the Transaction 
Number in this packet with Transaction Number received from the same 
source ACS before. Otherwise, destination ACS would discard this 
packet and send a SM_INFO-Request to request the lastest information 
of state machine. If bigger, destination ACS WOULD send a new correct 
SM_INFO-Request message to source ACS.</t>

</section>
</section>
<section anchor="request-and-response-of-diagnose-information" title="Request and Response of Diagnose Information">

<t>Sent by destination ACS, request of diagnose information
(DIAG_INFO-Request) is used to require the source ACS to check its
configuration and source AERs' settings. Source ACS will response
with its result. Destination ACS fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>DIAG_INFO</c>
      <c>S Type</c>
      <c>REQUEST</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out where I Type is DIAG_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>a 32-bit error code defined below.</c>
</texttable>

<t>Response of diagnose information (DIAG_INFO-Response) replys from
source ACS to destination ACS.</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>DIAG_INFO</c>
      <c>S Type</c>
      <c>ACK</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out where I Type is DIAG_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>The Transaction Number of the response corresponding request.</c>
      <c>Data</c>
      <c>a 32-bit error code defined below.</c>
</texttable>

<t>Before it sends the DIAG_INFO-Request message, the destination ACS 
should check its own configuration and gurantee they are correct.</t>

<t>If it receives a DIAG_INFO-Request message, the source ACS would 
check the communication with its own AER whether correct or not.</t>

<t><list style="numbers">
  <t>If it's wrong, source ACS would reply a DIAG_INFO-Response message
in which its Data filed is filled with 2 for fault cannot be repaired 
and alarm to administrator to deal with this problem.</t>
  <t>If it's right, source ACS would RENEW all the registration 
information, prefix information and state machine information to its 
all AERs. After that, source ACS will reply a DIAG_INFO-Response 
message in which its Data filed is filled with 1 for all runs 
correctly after repairing.</t>
</list></t>

</section>
</section>
<section anchor="acs-aer-communication-protocol" title="ACS-AER Communication Protocol">
<t>ACS would periodically deploy AD registration information, AD prefix 
information, and state machine information of relevant ADes to its 
all AERs to guarantee all information are latest. And ACS also would 
deploy the tag information to its all AERs periodically.</t>

<section anchor="deployment-request-and-response-of-ad-registration-information" title="Deployment, Request and Response of AD Registration information">

<section anchor="deployment-of-ad-registration-information" title="Deployment of AD Registration Information">
<t>After connecting with AER, ACS deploys the AD Registration 
Information (REG_INFO-Deploy) to AER peroidically. I Type is 
REG_INFO. S Type is Announcement. Operation is NULL when some ADes' 
information are joined, left or updated and Operation is RENEW when 
all ADes' information are deployed. Acknowledgement is 0. Data field 
is one or more ARI_Rec.</t>

<t>It should be noted that when there are two ARI_Recs in Data fields 
responding to the same AD, one may effect right now and the other 
effects after passing Effecting Time. When AER receives this message, 
all of them should be restored in the trust alliance list and AER 
MUST process them orderly. Since the protocol processes the records 
in sequence, it is required that the ARI_Rec effecting at the current 
time for the same member AD should appear in front of another 
updating ARI_Rec.</t>

<t>When receiving a non-RENEW packet, if it cannot resolve this message, 
AER could send a REG_INFO-Request message to acquire the latest AD 
registration information.</t>

<t>When AER can resolve this message correctly, it SHOULD:</t>

<t><list style="numbers">
  <t>Compare the Transaction Number in this packet with Transaction 
Number received from the same ACS before. If bigger, AER WOULD accept 
every ARI_Rec and process them as follows. Otherwise, AER would 
discard this packet and send a REG_INFO-RequestAll message to acquire 
the lastest information of AD registration information.</t>
  <t>Process every ARI_Rec:
  - If Action is ADD and the record does not exist in its maintained 
 trust alliance list, AER would add this record to its trust 
 alliance list.
  - If Action is ADD and the record exists in its maintained trust 
 alliance list but ACS Address is changed, AER would add this 
 record to its trust alliance list and delete original record 
 after passing Effecting Time in this ARI_Rec.
  - If Action is ADD and the record exists in its maintained trust 
 alliance list and ACS Address is not changed, AER would do 
 nothing.
  - If Action is DEL and the record exists in its maintained trust 
 alliance list, AER would remove this record from its trust 
 alliance list after passing Effecting Time in this ARI_Rec.</t>
  <t>If a change is made in step 2, the update should take effect after 
passing the Effecting Time, which acts on the data plane. If the 
Effecting Time is earlier than the current time or is all 0, it will 
take effect immediately.</t>
</list></t>

<t>AER acts as following when receiving a RENEW packet. When ACS 
initiates RENEW, it would send a RENEW meesge with which the first 
bit of Operation field is 1. The second bit of Operation field 
identifies the begin of a procedure of RENEW and the third bit of 
Operation field identifies the end of a procedure of RENEW. ACS MUST 
NOT send a RENEW packet with which the first bit of Operation field 
is 0 in RENEWing. AER MUST process this procedure of RENEW after 
received all RENEW packets.
When AER can resolve this packet correctly, it SHOULD:</t>

<t><list style="numbers">
  <t>Compare the Transaction Number in this packet with Transaction 
  Number received from the same ACS before. If bigger, AER would 
  accept every ARI_Rec and process them as follows. Otherwise, AER 
  would discard this packet and send a REG_INFO-RequestAll message to 
  acquire the lastest information of AD registration information.</t>
  <t>Process every ARI_Rec:
- If the record does not exist in its maintained trust alliance list, 
  AER would add this record to its trust alliance list.
- If the record exists in its maintained trust alliance list but ACS 
  Address is changed, AER would add this record to its trust alliance 
  list and delete original record after passing Effecting Time in this ARI_Rec.
- If the record exists in its maintained trust alliance list and ACS 
  Address is not changed, AER would do nothing.
- If there are some records in the original trust alliance list that 
  do not appear in the Data field during this RENEW process, they 
  will be deleted immediately.</t>
  <t>If a change is made in step 2, the update should take effect after 
  passing the Effecting Time, which acts on the data plane. If the 
  Effecting Time is earlier than the current time or is all 0, it 
  will take effect immediately.</t>
</list></t>

</section>
<section anchor="request-of-ad-registration-information" title="Request of AD Registration Information">
<t>The request is sent by AER to ACS. There are two types of request of 
AD Registration Information message. When querying the information of 
all member ADs of the trust alliance, the type is REG_INFO-RequestAll 
and REG_INFO-Request is used when querying the information of partial 
member ADs of the trust alliance.</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>REG_INFO</c>
      <c>S Type</c>
      <c>REQUEST: for querying partial member ADs and S Type is REQUEST_ALL: for querying all member ADs.</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>S Type = REQUEST: the number of ADID_Recs in Data field. S Type = REQUEST_ALL: 0.</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. AER would maintain a global Transaction Number for packets sent out to ACS where I Type is REG_INFO and AER would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>S Type = REQUEST: one or more ADID_Recs. S Type = REQUEST_ALL: None.</c>
</texttable>

<t>When processing REG_INFO-Request(ALL) message, ACS would reply 
REG_INFO-NAK to AER if it holds some fields are wrong. For example, 
AER requests one ARI_Rec that does not exist. Otherwise, REG_INFO-ACK 
message will be replyed. ACS WOULD process as follows:</t>

<t><list style="numbers">
  <t>ACS SHOULD compare the Transaction Number in this packet with 
Transaction Number received from the same AER before. If bigger, ACS 
would process as step 2. Otherwise, AER WOULD discard this packet and 
send a REG_INFO-NAK message to AER.</t>
  <t>ACS processes every ADID_Rec. If the AD exists in its maintained 
trust alliance list, ACS would mark this record as "Reply". Otherwise 
ACS would mark this record as "Negative Reply". Especially, all 
records would be marked with "Reply" when Operation field is 
REQUEST_ALL.</t>
  <t>If any case in step 2 is marked with "Negative Reply", ACS would 
construct a REG_INFO-NAK message to reply to the AER. Otherwise, a 
REG_INFO-ACK message is constructed to reply the AD registration 
information of all members marked with "Reply" to the AER.</t>
</list></t>

</section>
<section anchor="reponse-of-ad-registration-information" title="Reponse of AD Registration Information">
<t>AD registration information response includs two types. That is 
REG_INFO-ACK and REG_INFO-NAK. ACS will reply to AER according to the 
request of registration information sent by AER to ACS.</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>REG_INFO</c>
      <c>S Type</c>
      <c>ACK: representing affirmative acknowledgement. NAK: representing negative acknowledgement.</c>
      <c>Operation</c>
      <c>NULL: REG_INFO-Request message. RENEW: REG_INFO-RequestAll.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>S Type = ACK: the number of ARI_Recs in Data field. S Type = REQUEST_ALL: 0.</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out to AER where I Type is REG_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>The Transaction Number of the response corresponding request.</c>
      <c>Data</c>
      <c>S Type = ACK: one or more ARI_Recs. S Type = NAK: a 32-bit error code defined at <xref target="pkt-format"/>. There is no boundary identification between these ARI_Recs, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

<t>It should be noted that when there are two ARI_Recs in Data fields 
responding to the same AD, one may effect right now and the other 
effects after passing Effecting Time. When AER receives this message, 
all of them should be restored in the trust alliance list and AER 
MUST process them orderly. Since the protocol processes the records 
in sequence, it is required that the ARI_Rec effecting at the current 
time for the same member AD should appear in front of another 
updating ARI_Rec.</t>

<t>When receiving a non-RENEW REG_INFO-ACK message, if it holds that 
some fields are wrong, AER could send a REG_INFO-RequestAll message 
to acquire the latest AD registration information. Otherwise, AER 
would act as follows.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number received from the same ACS before. If bigger, AER 
would process them as follows. Otherwise, AER would discard this 
packet and send a REG_INFO-RequestAll message to acquire the lastest 
information of AD registration information.</t>
  <t>AER WOULD processes every ARI_Rec:
- If Action is ADD and the record does not exist in its maintained 
trust alliance list, AER would add this record to its trust alliance 
list.
  - If Action is ADD and the record exists in its maintained trust 
  alliance list but ACS Address is changed, AER would add this record 
  to its trust alliance list and delete original record after 
  passing 
  Effecting Time in this ARI_Rec.
  - If Action is ADD and the record exists in its maintained trust 
  alliance list and ACS Address is not changed, AER would do nothing.
  - If Action is DEL and the record exists in its maintained trust 
  alliance list, AER would remove this record from its trust 
  alliance 
  list after passing Effecting Time in this ARI_Rec.</t>
  <t>If a change is made in step 2, the update should take effect after 
passing the Effecting Time, which acts on the data plane. If the 
Effecting Time is earlier than the current time or is all 0, it will 
take effect immediately.</t>
</list></t>

<t>AER acts as following when receiving a RENEW REG_INFO-ACK message. 
When ACS initiates RENEW, it would send a RENEW meesge with which the 
first bit of Operation field is 1. The second bit of Operation field 
identifies the begin of a procedure of RENEW and the third bit of 
Operation field identifies the end of a procedure of RENEW. ACS MUST 
NOT send a RENEW packet with which the first bit of Operation field 
is 0 in RENEWing. AER MUST process this procedure of RENEW after 
received all RENEW packets.
When AER can resolve this packet correctly, it SHOULD:</t>

<t><list style="numbers">
  <t>Compare the Transaction Number in this packet with Transaction 
Number received from the same ACS before. If bigger, AER would accept 
every ARI_Rec and process them as step 2. Otherwise, AER would 
discard this packet and send a REG_INFO-RequestAll message to acquire 
the lastest information of AD registration information.</t>
  <t>Process every ARI_Rec:
  - If the record does not exist in its maintained trust alliance 
  list, AER would add this record to its trust alliance list.
  - If the record exists in its maintained trust alliance list but 
  ACS Address is changed, AER would add this record to its trust 
  alliance list and delete original record after passing Effecting 
  Time in this ARI_Rec.
  - If the record exists in its maintained trust alliance list and 
  ACS Address is not changed, AER would do nothing.
  -If there are some records in the original trust alliance list that 
  do not appear in the Data field during this RENEW process, they 
  will be deleted immediately.</t>
  <t>If a change is made in step 2, the update should take effect after 
passing the Effecting Time, which acts on the data plane. If the 
Effecting Time is earlier than the current time or is all 0, it will 
take effect immediately.</t>
</list></t>

<t>When AER receives an REG_INFO-NAK message, it could send a 
REG_INFO-RequestAll message to ACS to acquire the latest AD 
registration information.</t>

</section>
</section>
<section anchor="deployment-request-and-reply-of-ad-prefix-information" title="Deployment, Request and Reply of AD Prefix Information">

<section anchor="deployment-of-ad-prefix-information" title="Deployment of AD Prefix Information">
<t>AD prefix information deployment (PFX_INFO-Deploy) is sent from ACS 
to AER. ACS fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>AD_PREFIX_INFO</c>
      <c>S Type</c>
      <c>DEPLOYMENT</c>
      <c>Operation</c>
      <c>NULL: to publish partial update information of member ADs' prefix. RENEW: to publish all member ADs' prefix.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>The number of API_Recs in Data field.</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out to AER where I Type is AD_PREFIX_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>One or more API_Recs. There is no boundary identification between these API_Recs, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

<t>It should be noted that when there are two ARI_Recs in Data fields 
responding to the same AD, one may effect right now and the other is 
update message for ADD or DEL effecting after the Effecting Time. For 
example, if the current time is 5 and there are two records 
corresponding to the prefix P, in which the Effecting Time of record 
R1 is 1, the action is ADD, the Effecting Time of record R2 is 7 and 
the action is DEL, then it indicates that the prefix P is currently 
valid effective from time 1 and becomes invalid at time 7. When ACS 
or AER receives this message, all of them should be restored in the 
database and ACS should send them all when deploying. Since the 
protocol processes the records in sequence, it is required that the 
API_Rec effecting at the current time for the same member AD should 
appear in front of another updating API_Rec.</t>

<t>When receiving a non-RENEW PFX_INFO-Deploy message, if it holds that 
some fields are wrong, for example, it requires to delete a API_Rec 
that does not exist or to add some prefix that is conflict with other 
member ADs, AER could send a request message to acquire the latest AD 
prefix information. Otherwise, AER would act as follows.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number received from the same ACS before. If bigger, AER 
WOULD process them as step 2. Otherwise, AER would discard this 
packet and send a PFX_INFO-RequestAll message to acquire the lastest 
information of AD prefix information.</t>
  <t>AER processes every API_Rec:
  - If Action is ADD and the record does not exist in its maintained 
  prefix list, AER would add this record to its prefix list.
  - If Action is ADD and the record exists in its maintained prefix 
  list, AER would do nothing.
  - If Action is DEL and the record exists in its maintained prefix 
  list, AER would remove this record from its prefix list after 
  Effecting Time.</t>
  <t>If a change is made in step 2, the update should take effect after 
the Effecting Time, which acts on the data plane. If the Effecting 
Time is earlier than the current time or is all 0, it will take 
effect immediately.</t>
</list></t>

<t>AER acts as following when receiving a RENEW PFX_INFO-Deploy message. 
When ACS initiates RENEW, it would send a RENEW meesge with which the 
first bit of Operation field is 1. The second bit of Operation field 
identifies the begin of a procedure of RENEW and the third bit of 
Operation field identifies the end of a procedure of RENEW. ACS MUST 
NOT send a RENEW packet with which the first bit of Operation field 
is 0 in RENEWing. AER SHOULD uniformly process all packets in this 
RENEW process after receiving all RENEW packets.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number received from the same ACS before. If bigger, AER 
WOULD process as step 2. Otherwise, AER would discard this message 
and send a PFX_INFO-RequestAll message to acquire the lastest 
information of AD prefix information.</t>
  <t>AER processes every API_Rec:
  - If the record does not exist in its maintained prefix list, AER 
  would add this record to its trust alliance list.
  - If the record exists in its maintained prefix list, AER would do 
  nothing.
  - If there are some records in the original prefix list that do not 
  appear in the Data field during this RENEW process, these records 
  will be deleted immediately.</t>
  <t>If a change is made in step 2, the update should take effect after 
passing the Effecting Time, which acts on the data plane. If the 
Effecting Time is earlier than the current time or is all 0, it will 
take effect immediately.</t>
</list></t>

</section>
<section anchor="request-of-ad-prefix-information" title="Request of AD Prefix Information">
<t>AD prefix information request (PFX_INFO-RequestAll) is sent from AER to 
ACS to query some member ADs', including itself, all latest AD prefix 
information. 
AER fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>AD_PREFIX_INFO</c>
      <c>S Type</c>
      <c>REQUEST_ALL: querying from ACS the latest AD prefix information of all member ADs.</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. AER would maintain a global Transaction Number for packets sent out to ACS where I Type is AD_PREFIX_INFO and AER would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>None</c>
</texttable>

<t>When receiving a PFX_INFO-RequestAll message, if it holds that some 
fields are wrong, ACS could send a PFX_INFO-NAK. Otherwise, ACS would 
act as follows. The specific construction methods of PFX_INFO-ACK and 
PFX_INFO-NAK are described in <xref target="PFX_INFO-Response"/>.</t>

<t><list style="numbers">
  <t>ACS SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is PFX_INFO received from the same 
AER before. If bigger, ACS WOULD process them as step 2. Otherwise, 
ACS would discard this packet and send a PFX_INFO-NAK message.</t>
  <t>ACS processes every ADID_Rec. If AD exists in the maintained trust 
alliance list, ACS would mark this record as "Reply". Otherwise, ACS 
wourld mark this rocord as "Negative Reply". Particularly, all 
records are marked with "Reply" when S Type is REQUEST_ALL.</t>
  <t>If any case in step 2 is marked with "Negative Reply", ACS would 
construct a PFX_INFO-NAK message to reply to the AER. Otherwise, a 
PFX_INFO-ACK message is constructed to reply the AD prefix 
information of all members marked with "Reply" to the AER.</t>
</list></t>

</section>
<section anchor="PFX_INFO-Response" title="Response of AD Prefix Information">
<t>AD prefix information response includs two types. That is 
PFX_INFO-ACK and PFX_INFO-NAK. According to the request sent by AER, 
if some fields are wrong, ACS will reply NAK, in which the error 
code is "parameter error". If a non-existent member AD is queried, 
the error code is "the requested member AD does not exist", which 
defined as before will not be repeated. The following mainly 
introduces PFX_INFO-ACK response. ACS fills in the following values 
for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>AD_PREFIX_INFO</c>
      <c>S Type</c>
      <c>ACK: representing affirmative acknowledgement. NAK: representing negative acknowledgement.</c>
      <c>Operation</c>
      <c>RENEW: replying the latest AD prefix information to AER.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>S Type = ACK: the number of API_Rec in Data field. S Type = NAK: 0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out to AER where I Type is AD_PREFIX_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>The Transaction Number of the response corresponding request.</c>
      <c>Data</c>
      <c>S Type = ACK: One or more latest requested API_Rec. S Type = NAK: a 32-bit error code defined in <xref target="pkt-format"/>. There is no boundary identification between these API_Recs, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

<t>When receiving a non-RENEW PFX_INFO-ACK message which is the 
positive reply to the request of AD prefix sent from ACS to AER, if 
it holds that some fields are wrong, AER could send a request 
message to acquire the latest AD prefix information. Otherwise, AER 
would act as follows.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is PFX_INFO received from the same 
ACS before. If bigger, AER would process them as follows. Otherwise, 
AER would discard this packet and send REG_INFO-RequestAll and 
PFX_INFO-RequestAll messages to acquire the lastest information.</t>
  <t>AER processes every API_Rec:
  - If Action is ADD and the record does not exist in its maintained 
  prefix list, AER would add this record to its prefix list.
  - If Action is ADD and the record exists in its maintained prefix 
  list, AER would do nothing.
  - If Action is DEL and the record exists in its maintained prefix 
  list, AER would remove this record from its prefix list after 
  Effecting Time.</t>
  <t>If a change is made in step 2, the update should take effect 
after the Effecting Time, which acts on the data plane. If the 
Effecting Time is earlier than the current time or is all 0, it will 
take effect immediately.</t>
</list></t>

<t>AER acts as following when receiving a RENEW PFX_INFO-ACK message. 
When ACS initiates RENEW process, it would send a RENEW meesge with 
which the first bit of Operation field is 1. The second bit of 
Operation field identifies the begin of a procedure of RENEW and the 
third bit of Operation field identifies the end of a procedure of 
RENEW. ACS MUST NOT send a RENEW packet with which the first bit of 
Operation field is 0 in RENEW process. AER SHOULD uniformly process 
all packets in this RENEW process after receiving all RENEW packets.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is PFX_INFO received from the same 
ACS before. If bigger, AER WOULD process as step 2. Otherwise, AER 
would discard this message and send REG_INFO-RequestAll and 
PFX_INFO-RequestAll messages to acquire the lastest information.</t>
  <t>AER processes every API_Rec. All Action in API_Recs is ADD during 
RENEW process.
  - If the record does not exist in its maintained prefix list, AER 
  would add this record to its trust alliance list.
  - If the record exists in its maintained prefix list, AER would do 
  nothing.
  - If there are some records in the original prefix list that do 
  not appear in the Data field during this RENEW process, these 
  records will be deleted immediately.</t>
  <t>If a change is made in step 2, the update message should take 
effect after the Effecting Time, which acts on the data plane. If 
the Effecting Time is earlier than current time or is all 0, it will 
take effect immediately.</t>
</list></t>

<t>When AER receives an PFX_INFO-NAK message, it could send 
REG_INFO-RequestAll and PFX_INFO-RequestAll messages to ACS to 
acquire the latest AD registration information and AD prefix 
information.</t>

</section>
</section>
<section anchor="deployment-request-and-response-of-state-machine-information" title="Deployment, Request and Response of State Machine Information">

<section anchor="deployment-of-state-machine-information" title="Deployment of State Machine Information">
<t>State machine information deployment (SM_INFO-Deploy) is sent from 
ACS to AER. ACS fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>SM_INFO</c>
      <c>S Type</c>
      <c>DEPLOYMENT</c>
      <c>Operation</c>
      <c>NULL: to publish the partial update of state machine maintained by the pair of this AD and another AD and Operation is RENEW: to publish wholesome update of state machine maintained by the pair of this AD and another AD.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>The number of SMI_Recs in Data field</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent out to AER where I Type is SM_INFO and ACS would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>One or more SMI_Recs. There is no boundary identification between these ARI_Recs, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

<t>It should be noted that state machine is responding to a ordered AD 
pair. The state machine information mastered by ACS includes the 
state machine information from this AD to another member AD, and the 
state machine information from another member AD to this AD. When 
ACS deployment is partially updated, only some changed or newly 
added state machines are deployed. When ACS deploys the update of 
RENEW message, it is necessary to deploy all existing and updated 
information. For the same ordered AD pair, there cannot be two or 
more SMI_Recs using the same SM_ID in Data field. In addition, there 
are two actions for SMI_Rec: one is to add a SM whose SM_ID is 
bigger than current using state machine. The second is to modify an 
existing state machine whose SM_ID equals to current using state 
machine. Both of them are using Action ADD. Here we requires only 
Transition Interval and Expiring Time can be updated.</t>

<t>When receiving a non-RENEW SM_INFO-Deploy message sent from ACS to 
AER, if it holds that some fields are wrong, for example, Action is 
DEL or SM_ID is smaller than current state machine in using, AER 
could send a request message to acquire the latest information. 
Otherwise, AER would act as follows.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is SM_INFO received from the same 
ACS before. If bigger, AER WOULD process them as step 2. Otherwise, 
AER would discard this packet and send REG_INFO-RequestAll and 
request messages to acquire the lastest information.</t>
  <t>AER processes every SMI_Rec:
  - If SM_ID equals to the current using state machine, AER should 
  update the state machine in use.
  - If SM_ID bigger than the current using state machine, AER should 
  add this state machine to its list.</t>
  <t>If a change is made in step 2, the update message should take 
effect after the Effecting Time, which acts on the data plane. If 
the Effecting Time is earlier than the current time or is all 0, it 
will take effect immediately.</t>
</list></t>

<t>AER acts as following when receiving a RENEW SM_INFO-Deploy message. 
When ACS initiates RENEW process, it would send a RENEW meesge with 
which the first bit of Operation field is 1. The second bit of 
Operation field identifies the begin of a procedure of RENEW and the 
third bit of Operation field identifies the end of a procedure of 
RENEW. ACS MUST NOT send a RENEW packet with which the first bit of 
Operation field is 0 in RENEW process. AER SHOULD uniformly process 
all packets in this RENEW process after receiving all RENEW packets.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is SM_INFO received from the same 
ACS before. If bigger, AER WOULD process as step 2. Otherwise, AER
would discard this message and send a request messages to acquire the lastest information.</t>
  <t>AER processes every SMI_Rec.
  - If SM_ID equals to the current using state machine, AER should 
  update the state machine in use.
  - If SM_ID bigger than the current using state machine, AER should 
  add this state machine to its list.
  - If there are some records of state machines in use that do not 
  appear in the Data field during this RENEW process, these state 
  machines will be deleted immediately.</t>
  <t>If a change is made in step 2, the update message should take 
effect after the Effecting Time, which acts on the data plane. If 
the Effecting Time is earlier than current time or is all 0, it will 
take effect immediately.</t>
</list></t>

</section>
<section anchor="request-of-state-machine-information" title="Request of State Machine Information">
<t>State machine information request (SM_INFO-Request) is sent from AER 
to ACS. AER fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>SM_INFO</c>
      <c>S Type</c>
      <c>REQUEST: querying the state machines maintained by the pair of this AD to another member AD and vice versa. These member ADs are specified by ADID_Rec defined in Data field. REQUEST_ALL: querying all state machines maintained by this AD with other member ADs.</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>S Type = REQUEST: the number of ADID_Rec in Data field. S Type = REQUEST_ALL: 0.</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. AER would maintain a global Transaction Number for packets sent out to ACS where I Type is SM_INFO and AER would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>S Type = REQUEST: One or more ADID_Recs. S Type = REQUEST_ALL: none. There is no boundary identification between these ADID_Recs, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

<t>For example, let this AD is AD1. When any ADID_Rec including in Data 
field, defined as AD2, it means that AER will request the SM(AD1, 
AD2) and SM(AD2, AD1). When ACS replies, it will reply these two 
state machines both.</t>

<t>When receiving a SM_INFO-Request(All) message, if it holds that some 
fields are wrong, ACS could send a PFX_INFO-NAK. Otherwise, ACS 
would act as follows. The specific construction methods of 
SM_INFO-ACK and SM_INFO-NAK are described in secion 3.2.3.3.</t>

<t><list style="numbers">
  <t>ACS SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is SM_INFO received from the same 
AER before. If bigger, ACS WOULD process them as step 2. Otherwise, 
ACS would discard this packet and send a SM_INFO-NAK message.</t>
  <t>ACS processes every ADID_Rec. If AD exists in the maintained 
trust alliance list, ACS would mark this record as "Reply". 
Otherwise, ACS wourld mark this rocord as "Negative Reply". 
Particularly, all records are marked with "Reply" when S Type is 
REQUEST_ALL.</t>
  <t>If any case in step 2 is marked with "Negative Reply", ACS would 
construct a SM_INFO-NAK message to reply to the AER. Otherwise, a 
SM_INFO-ACK message is constructed to reply the state machine 
information of all members marked with "Reply" to the AER.</t>
</list></t>

</section>
<section anchor="response-of-state-machine-information" title="Response of State Machine Information">
<t>State machine information response includs two types. That is 
SM_INFO-ACK and SM_INFO-NAK. Both of them are sent from ACS to AER. 
ACS fills in the following values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>SM_INFO</c>
      <c>S Type</c>
      <c>ACK: representing affirmative acknowledgement. NAK: representing negative acknowledgement.</c>
      <c>Operation</c>
      <c>RENEW: replying the latest state machine information to AER.</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>S Type = ACK: the number of SMI_Recs in Data field. S Type = NAK: 0.</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent to AER where I Type is SM_INFO and would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>The Transaction Number of the response corresponding request.</c>
      <c>Data</c>
      <c>S Type = ACK: one or more latest requested SMI_Rec. S Type = NAK: a 32-bit error code defined in <xref target="pkt-format"/>. There is no boundary identification between these ADID_Recs, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

<t>When receiving a non-RENEW SM_INFO-ACK message which is the positive 
reply to the request of AD prefix sent from ACS to AER, if it holds 
that some fields are wrong, AER could send a request message to 
acquire the latest state machine information. Otherwise, AER would 
act as follows.
1. AER SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is PFX_INFO received from the same 
ACS before. If bigger, AER WOULD process them as step 2. Otherwise, 
AER would discard this packet and send a SM_INFO-RequestAll message 
to acquire the lastest information.
2. AER processes every SMI_Rec:
  - If SM_ID equals to the current using state machine, AER should 
  update the state machine in use.
  - If SM_ID bigger than the current using state machine, AER should 
  add this state machine to its list.
3. If a change is made in step 2, the update should take effect 
after the Effecting Time, which acts on the data plane. If the 
Effecting Time is earlier than the current time or is all 0, it will 
take effect immediately.</t>

<t>AER acts as following when receiving a RENEW SM_INFO-ACK message. 
When ACS initiates RENEW process, it would send a RENEW meesge with 
which the first bit of Operation field is 1. The second bit of 
Operation field identifies the begin of a procedure of RENEW and the 
third bit of Operation field identifies the end of a procedure of 
RENEW. ACS MUST NOT send a RENEW packet with which the first bit of 
Operation field is 0 in RENEW process. AER SHOULD uniformly process 
all packets in this RENEW process after receiving all RENEW packets.</t>

<t><list style="numbers">
  <t>AER SHOULD compare the Transaction Number in this packet with 
Transaction Number whose I Type is SM_INFO received from the same 
ACS before. If bigger, AER WOULD process as step 2. Otherwise, AER 
would discard this message and send a SM_INFO-RequestAll message to 
acquire the lastest information.</t>
  <t>AER processes every API_Rec. All Action in API_Recs is ADD during 
RENEW process.
  - If SM_ID equals to the current using state machine, AER should 
  update the state machine in use.
  - If SM_ID bigger than the current using state machine, AER should 
  add this state machine to its list.
  - If there are some records of state machines in use that do not 
  appear in the Data field during this RENEW process, these state 
  machines will be deleted immediately.</t>
  <t>If a change is made in step 2, the update message should take 
effect after the Effecting Time, which acts on the data plane. If 
the Effecting Time is earlier than current time or is all 0, it will 
take effect immediately.</t>
</list></t>

<t>When AER receives an SM_INFO-NAK message, it could send a 
SM_INFO-RequestAll message to ACS to acquire the latest state 
machine information.</t>

</section>
</section>
<section anchor="request-and-response-of-keep-alive-information" title="Request and Response of Keep-alive Information">
<t>In SAVA-X, ACS will periodically send Keep-alive request to query 
the availability of AER in SAVA-X mechanism.
### Request of Keep-alive Information
Keep-alive information request (ALIVE_INFO-Request) is sent by ACS 
to test the viability of AER. AER would reply to ACS when receiving 
a ALIVE_INFO-Request message. ACS considers that AER has gone wrong 
if it does not receive a response from AER within 60 seconds and ACS 
notifies the AD administrator of the failure information by email. 
ACS would keep sending ALIVE_INFO-Request to the fault AER at the 
same time. The filling values of each field in ACS request are as 
follows:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>ALIVE_INFO</c>
      <c>S Type</c>
      <c>REQUEST</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. ACS would maintain a global Transaction Number for packets sent to AER where I Type is ALIVE_INFO and would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>None</c>
</texttable>

<t>ACS considers that AER has gone wrong if it does not receive a 
response from AER within 60 seconds and ACS notifies the AD 
administrator of the failure information by email. ACS would 
consider that AER has recovered from failure when AER reply to the 
request correctly. ACS performs the following steps to update AER:</t>

<t><list style="numbers">
  <t>Keep time synchronization between AER and ACS.</t>
  <t>Deploy AD registration information, AD prefix information and 
state machine information to AER by the way of RENEW message.</t>
</list></t>

<section anchor="response-of-keep-alive-information" title="Response of Keep-alive Information">
<t>Keep-alive information response (ALIVE_INFO-Response) is sent by AER 
to reply the ALIVE_INFO-Request message.</t>

<t>In response to ALIVE_INFO-Request, AER fills in the following values 
for each field in the response:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>ALIVE_INFO</c>
      <c>S Type</c>
      <c>ACK</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>0</c>
      <c>Transaction Number</c>
      <c>The last Transaction Number add 1. AER would maintain a global Transaction Number for packets sent to ACS where I Type is ALIVE_INFO and would keep it increasing monotonic.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>None</c>
</texttable>

</section>
</section>
</section>
<section anchor="deployment-of-tag-information" title="Deployment of Tag Information">

<t>Tag information deployment (TAG_INFO-Deploy) is sent from ACS to AER 
and AER would add, verify and remove the tag to packet. When using 
sub trust alliance level tags and AD_V tags, the primary address 
domain ACS needs to distribute these two tags to the ACS of the 
boundary address domain first, and then the boundary address domain 
ACS will distribute these tags to their respective address domains' 
AERs. The sub trust alliance tag is used in the data plane to cross 
different address domain levels. The AD_V tag is used in the data 
plane when it is sent from the current address domain to the 
boundary address domain. Standard TAG_INFO is used in the data plane 
at the same level and under the same direct parent address field. 
The three types of tags use the same message format as follows.</t>

<figure><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+
 |     Action    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Source ADID_Rec                         |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                     Destination ADID_Rec                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |     Tag Len   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                             TAG                               ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                      Transition Interval                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="hanging">
  <t hangText="Action:">
  8-bit filed. 1 for add (ADD=1) and 2 for delete (DEL=2).</t>
  <t hangText="Source ADID_Rec:">
  Variable-length field. Refer to ADID_Rec in <xref target="SAVA-X-Control"/>.</t>
  <t hangText="Destination ADID_Rec:">
  Variable-length field. Refer to ADID_Rec.</t>
  <t hangText="Tag Len:">
  The length of TAG. The equation for calculation is (Tag Len + 1) * 
8 bits. The length of TAG MUST be multiple times of 8 bits. The 
maximum length is 128 bits and the minimum length is 32 bits. So the 
minimum of Tag Len is 0011.</t>
  <t hangText="TAG:">
  Variable-length field. The actual Tag or packet signature.</t>
  <t hangText="Transition Interval:">
  32-bit, the milliseconds of interval of state transition.</t>
</list></t>

<t>When ACS announce tag to ACS or AER, it fills in the following 
values for each field:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Alliance</c>
      <c>The sub-trust alliance number.</c>
      <c>I Type</c>
      <c>TAG_INFO, ALLI_TAG_INFO or AD_V_TAG_INFO</c>
      <c>S Type</c>
      <c>ANNOUNCEMENT</c>
      <c>Operation</c>
      <c>NULL</c>
      <c>Total Length</c>
      <c>The length of this message.</c>
      <c>Number of Records</c>
      <c>The number of TAG_Rec in Data field.</c>
      <c>Transaction Number</c>
      <c>ACS would maintain a global Transaction Number for packets sent to ACS or AER where I Type is TAG_INFO and would keep it increasing monotonic. Acknowledgement Number is 0.</c>
      <c>Acknowledgement Number</c>
      <c>0</c>
      <c>Data</c>
      <c>One or more TAG_Recs. There is no boundary identification between these records, which requires that the implementation of the protocol can process each record sequentially until the end of this message.</c>
</texttable>

</section>
<section anchor="security-consideration" title="Security Consideration">

<t>This present memo doesnot find any security problem.</t>

</section>
<section anchor="iana-consideration" title="IANA Consideration">

<t>There are two tcp ports, 23160 and 23161, are used in implementing 
SAVA-X mechanism. Port 23160 is used for the communication between 
ACS and ACS. Port 23161 is used for the communication between ACS 
and AER.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Much of the content of this document is the expansion of the IETF 
<xref target="RFC5210"/> in inter-domain level. Thanks to the effort of pioneers.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC5210" target='https://www.rfc-editor.org/info/rfc5210'>
<front>
<title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
<author initials='J.' surname='Wu' fullname='J. Wu'><organization /></author>
<author initials='J.' surname='Bi' fullname='J. Bi'><organization /></author>
<author initials='X.' surname='Li' fullname='X. Li'><organization /></author>
<author initials='G.' surname='Ren' fullname='G. Ren'><organization /></author>
<author initials='K.' surname='Xu' fullname='K. Xu'><organization /></author>
<author initials='M.' surname='Williams' fullname='M. Williams'><organization /></author>
<date year='2008' month='June' />
<abstract><t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an  Experimental Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5210'/>
<seriesInfo name='DOI' value='10.17487/RFC5210'/>
</reference>



<reference  anchor="RFC8200" target='https://www.rfc-editor.org/info/rfc8200'>
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author initials='S.' surname='Deering' fullname='S. Deering'><organization /></author>
<author initials='R.' surname='Hinden' fullname='R. Hinden'><organization /></author>
<date year='2017' month='July' />
<abstract><t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t></abstract>
</front>
<seriesInfo name='STD' value='86'/>
<seriesInfo name='RFC' value='8200'/>
<seriesInfo name='DOI' value='10.17487/RFC8200'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="SAVA-X-Control" >
  <front>
    <title>Control Plane of Inter-Domain Source Address Validation Architecture</title>
    <author initials="." surname="Computer Science" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
    </author>
    <author initials="." surname="Computer Science" fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
    </author>
    <author initials="." surname="Institute for Network Sciences and Cyberspace" fullname="Yangfei Guo">
      <organization>Tsinghua University</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source:
H4sIAE9wdWEAA+1dW3PbRrJ+V5X+w5TzEPssyZLkxHFUtVXLiLKjE1vWSoqT
PLlAcijhGAS4AChZa2d/++nbDGaAAUnd5ayUSkKCwFx6+vp1z6Db7a6vra+V
cZnobbWTTafzNB5FZZyl6iDPymyUJeonXZ5rnaryVKv+AO5KyxwuH+n8TOcq
Ssfml93xiVaH2byEy9lE7aXwoTvIplGcqqNsno/grvE410Wh3kdJPOZ++vno
NC71qJznen0tGg5zfbatjvrv+93fu2YQOMpxNkqjKYxznEeTsnsyz7pxWka5
jrpFdBZ96s7k5u7GBtwdlXDr1sbWZndzo7v1fH3tG+Vd8y9gB0UJk/kQJVkK
Fy90gdfiWb6tynxelFsbGz9ubMEIocNtnlyqSxi+jtbXzk9ql9RvWf4xTk/U
6zybz9bXPp5XN3QHOIH1NSD0tirKMfYzysZw97aaF92oGMXx+tos3lbw940a
RSlc1irK8+hCPY0nKkoSHN8zleXqNCpO1alG2n2jVFcBBeRTkeVlrieF+Xox
5W8K75EJKnvXNvU11pNonpQF3GJv4OcsRaJ5eZrl2/gT/nXNB6V4dX7R6vd5
dTHLT4izZsQWR6NYpyPdUccFTPd0Hqlf0xjYqIjLi+oZwwQLbypg2BoI+E++
52IOZOJrHfVzFI9j+D6I4Uo8KqunRtDGNrB0/H/wmHM5G8PQNzc2Nl5+516d
A6/D/TuncRpV1zWwdLKtPs0/6n+UMsaeHs97o7SVLL/HUZbAmE7Ub5Hb81+Y
Pucw0U9m2hsvtp7/Y5J9wp96o2zaSqg/4OaJjtXreVaj0l5agKYCOqkJMP4+
qCWQMUOygjTRzsUQ6DCLWkiovjoagpa7QIJs/vgPvFD0Gvy2vpZm+RR06Zkm
oTx8tbO1ufmj+fz91uaG+fwSdBh8jtOJ94ToWlHsItnWJrC2P0iiVF9ZqxPB
a3rDWYs4LZoyUFv8hesU0DzdG28+LMH1fi7FpMsHoZaKh2/DUNl3u12VZqX+
sLd79PrDPnyi6/zjMInMv3gB742GwMERcvBPehShqUGDbs0ZzOM8yseFghF/
1GAbotEoy9FcoZWgWw/AcMC0U1p7MBHMDx15wrRAT1zMwMFIkgtVRh+BHrME
yKDOY+CNeYkUnAHPUCPAa9h2wSwmTRL9psBmozibw7eyhB4KMIJnWg3RSUmi
eTo61WOwmCR8xSzLJvDVb0YXPXUMjcfEzGNm5lpPZ5aZ0eZX3KxiHIXSE5hV
iRTQ6WkEa+sTbXhhR1DCAsGYoQWQILj/RKc6x2ujLC1AeegUmolOYEi/ncIM
RpUXBvQasvMFPto59jRWp1mBS1CqcTyZgNmHh/uDgiTz4OyFSpnhOtQi0BU8
hSHNCWhQAsfgIM06wljiMTQQTy5o8Cih+BX1lxLyU6M+ZXrIN8enQIapnmaw
uCNYiYz9QyBYhGvKugKvsHKBW0dApbiY9pjnpvF4nDBfItHybDyXdce29VXU
jHrKfT2rOltfA7aMhklcnKLssSOH7lNMKxZNMyCxaZY7K9TT/uBZR+Hnkr6D
nIBH2C2zLvxP+cspLQyA182yYj/+ynaQa8Ej1bMkuyiIKnDVCA88/K0agkCB
bsrZeX7a3z18xhwKn4SSwElChgGuBE2HW/EWkb9UCwh3c0fgUbI0Znl8QqIK
I5/k2VThtLBR4C5gWfJagegRqBDwK+EXdyTMQY6045Ogq+JJrIuQwIIgGElC
8cdxgPbIYclS/FlGKTMZa5j+FAl7fqqp97gkeTOaBBUFLgjI3klDqokx95gR
IRYYSfsNJdRRcatuoQG60zM/0kBjowRhwXAguaNRkGY0FeQxUBnCZB2Q2HON
kZKZJzQCpBWZBBsRp0IQUIp0sbOI1pZESG1QA4F5QAdCH+a7WBofx8WIFLkz
EV7bWh9W47tsY5tBu2ZUyDmoo1D/kSUcCM8cfJaxrohjBbDSJBDbzacoLih2
0EdRzseGoXKd6LMIfkPbAHzG8WlhxaKpc66k1q3SMDqXxfr8NB6dsiLF+BJu
9hQtzI9kaKhJnIJsqf7I5ujnJfCL1urzZ3HF/vyTaDnNoHdkuhIdPLDGaAmx
j57ag0mX8WyekF6hpXbVTwc4BBhKNA9xK7DwfIYuAVkAIwYi0sBWpIsMExfx
CSw6eWh7sJhw8zSzzUSzWWKwAAxBIahN4n9rM4p0jML0b/4d6C7MWq2FiIPo
fxDuSTSKk5jGL8sKH8dK/2sez3DtkQRnOslmcHF44di3aZTO4WEcaM5SCmSG
pfq3MAK0PcrgMdS+MIyMHJTpDLX+JdhB/V8GNyYXPWOCPuoLBUsMYvDk7a9H
x086/H+1/44+H+7+89e9w90Bfj76uf/mjf3Ad6yvwbd3v76RG/BT9ejOu7dv
d/cH/PTb/h9PeF2evDs43nu333/zhMkXFwR7sGigtoHJDWVCs1wj+aICpXeU
x0P4Ag8Bbyn0/zvqp50DtQmRBvEbXgJ+w07idIzriisApM81NZ4g6UlvKKYd
CtxO1j+AcAG+0k1M7h4b7WPSQlmSnVxQq32Kp+LIGPEv3hX1RQ1olDP+Br93
vb+/bXdDf3gjKKQvNSPdoXUFL6lE1qvbdSO0nh4C0SuNXUZxyBhGIVmudDhp
YvAZU+PeQgPuLSAjehJ/6uG4jvswrmPquW97tj6T6AdW0vNCxLfhDdEEd46+
NJE1bqtglI1agZCNHBLfBSGTKKZ654jWYkwh6RCDEBvroYOWoQboEfXhA/Xp
OR4O4cgvHysxMKCSUN7JqYjIRMCHo+O+tDXYwyU6rnkfdGN1x4dDPZK7wJBA
t7x06Xw6ZLzQvf9wr3k7TRS1xhkyrDuxalQ5jYqaOKAm6h3y+jWeoF6P3n5R
R0Tbt6JfK3oYd5B1E/ojMQ0aSe769OTIc2PB/hs63J0ID+M4OuGnrD9uPDyj
jqGdmhojUopF/8IC2oLmvqLO1OdvZh/LLvf85/raLjDZBdKjOCU7BUqm4oBE
R8Dj5CXuHNVoAraaBaaIh+jPk0ETWonDx5oeVcdpPHONq3X+fOl1nHZsAWQ2
5ZiwqPF6p9FTcQHBX56lEBvWAi/Wr4UWwYZ7zZKNOVQy3jgICNKPQ+4N1fzb
DFzbClx7XjWyCTc8V9+p79UL9YN6qX68zDVp5m/da/4j7XzB/7xHcAG4wnw3
+ou+76nji5kGUZD/K/VuZvwLhRx68+Np+TvOyihRb3R6Asve8ndn49m3iuqQ
pLm43/Ec51FaRCQXZmj3Op7+6GOanScac0B3OZ7/tIxH/gbokC76+8/NjWd9
TeRqe31tW73sDuOSjfhonpMje8Y//31juEkGlJwBUjdGAOtPFvNhtwZasMHk
WJcklJ75jp/Zc809/NYBDYIq+fWHw91XH/b2X73rgJbBK30wyLuv5dIWEkGu
HsCde7/LD8/pKljI490Pb/s7P+/t78ov39Evg73+6/13R3tHfBWb+Z5+OPx1
f39v//UHfpQfeSGNHcKl13/IxR+43zd7781tL81gjvtmfD/KTW/2PlQXNzfM
kN/bqxwdoIGg3BW6zPM0KjDQ0WOi2VGDZkcYIFl6CXX299/9ur+zC076MfoI
g92DN+/+wG9ALLyDEHWIAHaPjg2V5OsHGKYhT3/nl44QZL//i6FAny7/YJrp
008vuQ36iad7CNed+YQmYxVznW8mcQ4881zBBYTpQFVQkwZVOdzd3/2NCIGT
S7Oyp17hEzgceGRbuCbN0i7fyq6FoY57rQf0AxM9dp6jFKMdRFsj1R1+c8en
cT6uDQTvTaIljdENXlsUyTk2hKj0fKsiU8Kmxcd2thkVMzYSHANUItRYwwZ4
LVpHj7Ag+1BTU9fGERNkUoF3rp8HXt18aOLwjvrXHP00JrH4XeLa4OMQzM61
ceHidAQhewEeEPhDZZYy7N5T/ZSoW4XXrEUKRcEtIenINNl5GrAxPXwU1FVD
2XtTYtAuQ+dwiIucwJ3Ie6n4FPgrMTpxPosDSQFJFXxVwv499Q759TwutDRa
+afSLMS/G0RmpDeN4n2Ux+A+6q6s7iTWybgn0yRaySgET4KpE2zhxv+/1Qbr
qINtSpuovYlp8e++LiWLQ30qifphsOg8G6hHgpteoBVP9y5riHTHQbitkMZe
pT2JWhrtVVrXU8Kqrn/dXqi9IAXwbu6lQWlRosrXpwGaX4bgEn1ejeKpNMX/
w0ktbnRl0jsNY6tLRyu2dmGbkcggiHd0kmaFZkXxL40uBCagmzRwLG/rMIMy
sSOyq8RuXXORvkKpWGVFsKngmrDyvuFFYYWKjoNo0KWjgmg7zwn1G2tZwU2B
+PNoiskG9jzOc8x0cezPDkWVSkR8GFMaMKksOaP52ZQGzW2LgW5N1rM/eFo8
QwuJ+COE+qaRcaY5M6I/xUUp+DGZKs1AdXwWcoipA/bAouQky+PydMqOpgvl
EPw3vDC4CcI2PGgqcZrPZpjMHXIKzcuG7BwJ4AmfuvhYGFcBxzI2SeBhko0+
jk4RbUYIcpzNSsZmKyzcABeCT1un3aa964imDFgcAMrWCvQjuHa9EZs16Q90
C9Li1u4JLua10gBDA92Sq+RPmukFBAPyzqEbhI476p80cOzx0LA+hkDeGu25
vR+1oWQGTXsqYvkMLsDwC+jGZUrCoqYMvor3UQPegNv0SVbGBAIZXMr6RUBF
hEb1mLA+ImF/YJL0sBLur/Kj26TNdtZgKFxIupvBrGIKq0FCsTeAScY0Gp4G
LoDLaoSy+08nUX5iHiaMWUjiZAk5L1ODgUEDIFU6wPkgzlEhPSdMIU4dVVkl
TGaKYHWEhiV6hjE1R8kI8Dw7SpejHtXZRDlVGxidzmlIUcodM8QoKTKglh4T
Sr/7aRbnSLPjeEq5I+Cz2AwXZ7ALyzIqzR09foAnRI9QSqrgdcb7naVtLnum
EtBmQDlK/3wlgJ8HwPRHpQHw7gjgMUUYBspv+7ub8Qy8jPWiId0ZfUSVlazK
BndOn761fm5vXt97R0009c4AuT3RMUyo1r8bBOQCFLB/x5UG2xMNFr7xzgBm
X8O10ufLsnZW/Lu7eXmq/WuaFwIddXSNnWOwTuhhc6kFQzhVkAC+i68rF8ES
h3qC+d2s0mKfP/sFuX/+yfhGQONdrmGwqi1t13VXAyhj/2LcqDarOTc2NQhe
C3iqvNcAglJTuWOdJvQ40W9Cn+Ykz84LH6XCoUJ/VAATE5Jreh9z+n5uajsK
jCHQlx3qCYaRVLkyKaXcyqmMwXIqCN3nSRnPktrAC8HgRX/S7Ddf8OyrmIKG
gFU03Z+yTz1hhF/2jo66P/5oiWXBYfPDC0KZ1f8iuGSQ4nfHB92trZc/qreD
75cgvFZje4PysUtfsfLycymcc72dVYJQ6CRGcA0rs4wnSYnvvSOcG4+oAjd9
NdpgnmkMAUdBKDG50cZjpDx2zZ2kRn1NSO29ELBe/DsaIYa08GGDAEcTk6Ik
+oGfQQxx5DrF6bssQqix/4RGhSX095SXNxJ8GAtyDcW8NiQG+qY9wPHCo0XR
TuTchzEPwQJd8/QzAkWpCQrFnPiW6in9SNY6cfAz4qe2aHGSJUl2jvMkDJmz
BRpGw2Te5oqeV0TyL1iAO9duEY+t3sFrApx/2aQyDIk1vxwvzGbhrTbvzFOk
Igq55OKveN3JSH9R+7++ebPtTpy1MsL5eRmsuSjq8VCDTpRGCDaKRUOXb5Dq
OpxMBJGjJnJTCKujE033NhIN9EBVKyPGxiYaROqpmwZoz50hnweSxmjJNns0
xXMSFAtNROokyYYw5MBTbg0ocp/CmsVz3IZmQCyyiFVOrmr/o9YzAvM5P4E8
Z3U/V+5UyQXieenyywatPM32yzsHOTS04MIXYLgW6hhNQCkO3FNHNopGOZCw
XqKq9TXENwdcEk2/q2F8csJ1WKlN55JBoJ85rJf2kaIcv/uB51hPSI0iECS+
gtdro08wbRAkKyppXNLnNBsHTbLbKSgZ0+07TM2EPGDs3PfXEHQaau4gBqUI
zVBOxkINVUZG6ou57rguAuY+LMEB1lpfQ5BSWB4lphK1CtfM9UjHZziUKJD5
iyfIRj706ElSR/ml3M1RtI+BV6b5PFfCmr4qANTAnWSLGGclpblpERG6PSBK
UujpVbi7t9msI1MDqGsxtyKasnJi58fJlnUa5F9fY/GTRfL6NKVRQBFjXw4F
mwWqGJiWeRr1iC4a9Xce1/UazZAjwZwYlQprUmt3gCOKCDiLWXP0vwlBt0BT
jUZ6VipNFWsWTMKiZin5h3FOEdOyNm2bNlERwk41mCRclRQaOQtLmWyyqo2H
aWndfx14sre40yUKZVG3rGDieiEo+ualM21ugtr0bwRnrEQ5fk7JYBxe2uwJ
C96ZJ1K7mpTtuYTM3ri82oEsEFwZx6PgXklwF8ggEPYrlMIlvS6z6zcgh2qJ
IO5SdIxhb6fuVZr9e9xCrqcZslEen5xiKcy5RbsvKHREucIm2dzzdMURGs5L
acTeTSE2DK93fUVALdeUwTE5gyQ+5xnVVlHsl+tZcsEerBPIjLT1ftUxlrrH
BbkrTm82x0OqZTKJZQezimruIjKh8yxqCu/ZVJ8EH6SdUAUPmVxaiajqBKmp
G/StpRDaxBsinDQHqVLB/Sy1dqxsFPccXRF5WTljunIBaakwru/c3ErLYJB2
/SBo4y8d4ByH7YxEsE7FgJuWFSXfc4KjI1tGgFUZaj8jj8xehBXcrgpFquy/
Gyt8/uxsD/iTI6v9rDxlAcKcHQa5maRVqyhZTF3RpizAmJ3GCRVziWXPtd07
AU6+Pq9vsCXFw1hHQaqmoaBWGYLjL6wAzRgb+vmbupe6OC3NTz2tPWQhGrL/
1TbevxREI8VaLeCMWUFCT1q3v9RU66O6WB0PQRn/Yn3woDQ0PETrdUPn546X
XRnPw5qbXRe9GPchTQVydsqELEjAHq0zHLefSjwPa3FFU8h9z7KiZX0ynviA
qLGOGa3myJsRkCcfqttt8+TrozVe/WIqBBx6z/+WB9bXVidcQ5lcxhNr8kWP
5uB1dkU37PDabtgSrbmyG+a043lgDTHtuVWprS7S+lrASTpczUlyFCUhjqgr
BXjyu/aK+Og4hAkYSgcGtk/Bapvn6sV/9FzD6IcD9xB/LQrg19fsTasF8DVe
Y6H3lzga0e5kew5FLVBtDfLX19ww33Rwj3G+M61AuB9waK4S7hNI7Ab81w73
7y/Yv484/3oR/n2CbCFjfV+y2vDfb0ROW+23lbxlIrpYQL3ZrIDIBQTUnpKy
OiIXElCq3L2kiJrukPZCPdfwNhevxlAQCZmb6tW5AylY9wtzoXGUniak0bHz
g2dNsbtfUvwUS+ab0ZGp7pATKXhpPA4bnerRR5Q6rIpNJ/HJ3DnxxNy6e1h8
i4Xe6GAUnitIkmYiaAhCkUFQhOHSPAE5HdQo+2AjL0u/FWOvv1wQZQlwG2HU
IlRkqIEJ6ISG9TVXSEKMrjw+53ufscddrIQC3DdLgQ16ZKd7BfFWZUU8tJEq
3xBS0ykf2qUaarbyDAI7XJxI2ahZ2v/Z1LT4JS21rtIIYnI41Nwjr8PBHJaM
oxETg3anEZCT5+1+sCobB4bno5m9zMbmmY3M4tTTUL4tGJAIRN8c/vojlLWx
WCUwmFQ0Qr8SSklZnNnUiqPi3U10cLLxuIa41FjhqHFOBGImUT4lX2k8jVM8
oCcqs5xlH/iXGmIfJs+GiZ7iRLaqaVDOJzANTrGaoqRcn3DLElNWGqkT2OHD
tnMRGofzpqPsyLaCBErZXFQbClvXVoJal1OtSFEpssVW52mh7JGB2AENgYnL
2Su7OQuYom1zVkUwUGhxNpYyUz6SEatRPcp5dKs2R9UIuph6jS1YDXLSuUHz
SAQKr3prk6M+RA+RAwgCLHDLjBEUGTtt68JTBZsrZzty52x8vgE9znuz2vw/
mPphC10MiF41E3rA8xuZecxxPriZEJeazqTDybnHY9bbwVpWx7iabaVd7v2Z
nGyF88xiM09HyYPBlidcUMctwHSxGEFiTGIBM/Wwft/6y0/rgzvGcRdVoidl
VQ7O5U9eeyyl51xSRMtCLdbbYxJgkVXdumCZa89FcwgwCu+fJUVcOnVZeBbw
mKTWJowdQFAerBXLFRyf1Tb/cd0ChMvY8zS6wFNwUfdWGWmzpZAxm/U1vqEQ
sZ1FfBZhfTMXl8HBClrTUa8LQaKxDZ06M4MRghKt8t01ZwdjcLbr0PT6Gh1w
4EEWVI6OvFJt3jQvETA32kMo+WAHMgqm6NycdCBhi9CYGFh2vmk7UfnBYA/4
0oWptmdXEGHt/lhbSTib6YiiW/AZWcIMGra+RsyGLbsrf1Nlc0iwkQsGWJEL
BJQm+ueoloJamAPyT1h3sI22a+5X5jg4/AOpzXECcBwuB90RQ2LA4Hxy2uEy
UKzwIAVyYIwiX4z01SmPBa4B4vM+zxbUb4GB48UAT+NAhu1NaNuias0i1Uos
Alu36dyZ6sw8qT1piqdLCou2SatixvgpOUTefba32uBoTEVgUK0NU7kMskC/
OtEWD2w8MWfz1sZrynOao26qojE4BaU2hzAn5ikZxQItaXm6kvdbmr2JhJzZ
49oGKDDOpIGUawNCYxrsvrn+mNxOuQzK4xQS3oW8clnSPie5j2TSfNrhmG4E
AZupLTmBlCFpUdd4or2xiNwdwoLcYXMLs9ktFaF5zOrHp/cMkl3fDYNDAaOQ
xAbNdq0K2RQ8UpqdP94ZQ945nhRcjS6eTvUYN0eLP4jEpXG4GD47C231nMZo
U/RYbVynWxopZXlyqnVh8qs8+dIeArW+NuTTXCvHyeatNjm/V9iDpkL3wSjk
9CQx2UPQeOYMJdRtYzzlGZEIDpmEJUs8bsq06ZyoZXr325QNP6EWGZ8gHwOs
y7tjf+quIapPvX1C4PXRmb7YBIoXSUHNjeGQsTE94T9r35Af3KHgnrd2E3wX
1bFqCSy/wAYb06mMHb66FcZGVsq4LbHDPBjXEbqKJV5gh21ua1WbG7S2dDzO
aha3bmvrA1iixcMWlfpfzaouHBO2s8ymXlLlX2t+xmbW5tduNyuLafqVmIwi
TuccOYqmzMxCXVPQQefkZPxiARs1EBJYxYygIdgU2YhUhKTDcB6JglQcM0nH
NUtxU1ZRqRuwi40d85e2jHbCi2zjN06CbBnEcXyqbQ7MFP0NL2jhEaKQQpVw
NY7tAcxxex9VoRMpbzoOyNCxpmo4aLZBZdtxy3zNHr/WVHKMXzYCQJO2O182
DqzHwW3IiAIuHsudpj3MhJqJtG0Ky+2UzPid0TuHCFZn1tFBdf6j/gLcVlX0
UXXcmoy/9DaLmgMA6rtFVf1BnsHGdbaRWhV39RQNS0ojU2PWywI6N5j3a1Iw
dH5g0UYxqrCuyi+dl27UpeYp3P+sAlrq6YgKqOxiNYfAmozYnGaIyrXUW77C
jPSnCN/UYOAb0SiMEhrPiGyF7zl4HpHtHotQKtjeWAUaJeGTtvrA+Fm17QyS
rltSwLHAV7xM/SVON+QpOrunnGGyqWo4gjydNidwfa3uBtZqY/ng+C2edoUd
ihdnznQ01gs0fKt7AaFaECdxsp/0XonKRYJJPTnEpXniHpjqZj2Cj+ybwkTz
rLsTKSLNb/yQc4O4YkMmSyN9sgUIhG3IzVZKKu8hvYB4o3C8BvYjnHZrA+v4
CcIsBcM4R2+idTFYmpwj/d3Fjlwxc4ut0B81jZt6FGqHF6w9uWZeJsKqvggS
qfZ+AfYqWjMtfuKkPWaoEsqg/5I5Zn+NV+HupPKm61lzOmS3lsMTtdN4zR+y
g/VSWkcUcHru2azTLphVC5d7ivbHrFarXDfovNuhDSu3x0oEvKwb2O1Q7fDB
+dZcgGCS51Y8gBso0hAGXOwBPJxSDZ/wgaSc6zgs3X2FL2fxd19JzMAHF9pX
8dTOCh9Wb+kuqo5NMCUZKuedcf5bncykbfYLESFjM6nUTewGp75KMhJqDh8S
Fxerc+ljIvIxEdlIRIZsb8dzcgXRCPq67KwtzE26yJy8Dy6UoGzH4RoQoSBT
6HNUSKJxc+GOO3Jz2wHRupu7Wu5xaQnzirlHF+9sOEbLEc/K+274zT76ed0c
5HXyjw7yeLO5x2tlHp3s4dXyjk1ELgSs3Vbm8Rp5xxvPOF4z3xhAph8zjjeU
cQxZDHvQC21EvU7+EXcHLkjDPeYf/6L5x2tmHy9RAdSCOD2cAqDl5T/XSDwa
hXh5U+sb2uukHiktd2mz2ihAuqRZbep+bGSxSb1OAjIwyxUN6H9dBvLrsJLN
cDRKg6AnNegFRQ7oF9Ybta2bKxdvLq0fl2MFoJUDrpvfW6FsPHRr8LUkUiTN
p+EevPrdLwR3T1oR/N+89fhK2/ruDrf033OkHPiyevdgGG6ECdI74opTm6oU
/q8ZgSoT+a15j7VBJJ02/JylvfOmT7CV14E8rBNsW4DH2trc8nm2hjJXwv0O
HnE/F/cjXEOkweg+fmnogF/r+cZFxuyh4HVYENOr4OiZBGs8aWp36Ol707kz
uQquC75NSfTbQafaGdXsn9MtEugfblJEwnYucuPvzuJHDynP9oM4Cv7TQAd6
OmVGxi00pcs0ZpjkN/GsKVtNr88xFATfnV1o7HeT+hlC11M6HZvvjIRYP3jV
o7ge7ZDraoAreNHAOkPMKxrxdE8zYE8cWjrn4wjQWlBAU+Gt4BMsRlxXwlvt
e47aEdcV8Nb1tQWIa4W3HrhbfhYgrjUzeRXQdeIWGNAeT6NYMuMDR2ZAxF6N
OgPFux1RW1MfwlOlJClxr2kSj0r3He9uxVAA981X34rS9CNaorEHjfH6FRcr
RZdLIV7LG9eDeAMEtthuA9U9uPG9JdL9imGmc/d1sUy7NbQZ494cSLmgk0Xg
pDNNB+et2babC6muHEq54fE1Qikak0n0XQ9wbFGYj5jjfWGOonznaYz6BQ95
M/VcsPDGjTe6F0NfB1uwW8btKgegyIer5i+l4au05wNT8ZdR6A1lXu3RuC3c
sMV+yP62hhpfEStzFbB4RDRxghKvhpEVbgXAI1i2uFB/dVDJnt0bkJU6qsR1
bVxdCR/4jbzEBw5s0pGCPJwx8JpOJhzJVE5p6FCJntTuPtjjp9pRKq+AzBbA
WxzOd8gDK+CVUPKbdkNw1/0eQHR71e0hiOlma9z9I4Jdn2eBfQiEiMTp6L80
6nLwYD/XAbLtUpGpa7ycct5awMVOj3ldoC3H5Z0v5WnGb5CzLZt61vU1tzM5
TKMY5fHQnGfuTJLr+uTVh7dTqH5+Ssfm2eU1vbcfQbighn3lsM+t+F6SVPTI
VZ2Mvkr9ule7jjMIlFNcs3bdqd3P/Yey9ur1AwS/R/ME7Eqjfh3XtLV0PbiT
51bq1UNUX6le3WP4FevVQwbmypXq3qFATbuqPn/TFLB2Y7tKzXpDxn110q9X
pxsT7tSfo0S0nVHeqVe903nJHgrLxbm4gmMi9hNQDSCs6BPRT0/EvUKgjSQC
e66wPHgC7WCMmVeOjp1qX2zOGTWsQfWg7yA/MT4WHvkkJcKFed0pjb86cEzj
8UOsQyuvQY7FRj4o82w8xxcpeMQ167FKjgwU/0P0Pm6vxL/hhUjGjJjGOMUL
PRtJQN5ygb9Ar231/TTjez578U6za8e3Utzv5ulk0SsJNnj8JYr9m69a+ZqT
fqukIFwDZl8XLfmXDF9HeaZ9c5h7IZ3Il5/kZ8YiXxW0XNNbXaGG3PRS7Xls
zSaskEu484rxK/iby+rbViklZ7d1BYczVItS89ubwUfRhk49Zhn++7IMEFO0
pOcfEgZ1tSzDimXNFRC4PNVAL9paBXFvSzUsTQuslmpAx9dJNlwp1SB4vpNs
uEqqITAhN9VgiLsk38AbwOoZh4eTb7hRQ7BqIiL4ilJjRx+ADYAf8cxV0Yqp
U3vGalgg91reKJhB+O9OXkh710heYAv2UIGbS14YZnMNh00FX8NwhLLaDcNx
K1W+IaioXuUbrvH1sJIWiRKvGeHXy2yN5OCsJXfBZUgrHi3d+vLFcIXwgtvb
X8joVgqb96EEC4VtLufqhcJ3/ObFcH1wMGPiFfdS2OcXCdffOONqluGFPBHn
NuLrD+SlnFyjJV+bx117/YJZSjSpm5vq9cYLku27kj0I5UEiJrf4IkkX4Kje
LncFTOKhH0BQO7m/UH5xbsRb8vVY6geBF8VLblU3U/RMcuZf9t4R3dYG3Wh/
UDwy5nLsW5jcIsIdx51e0kzjWYZRqG0pumVt5yhH8itzQ1I+wx4rrBNJa8v+
IXrDhj4nKBl4vP7Gs6J2hL2NYtyD/SvpN86Wa9qQwTSuOLIXFZZS9RUaU3J+
yJlOx/ac/Vru/JVbU+ssHy5eR9ye6v0cmHQgeN/jdX4netWMfZGci6rupSjk
MfZq2gWSSMU3izUbCWmVDwWJC1P/iu8GE09d2sfAIvyKOhxN7Y1gTrDGbU6z
cTy5UPRSNUson1Hc3kIv36ueAIKYjn7KjC5FCAjmx/eJIw2ec0/9jJM/15V8
Z5xrIA0Xy1lGIBZgOWnpdj/N6L0d7EmhkA8NV4yXHRzh2/DK56tjgRSGt2Wu
l5Q2V9DJ+hqCJ7SIskTFFDixvkJ1eWQaGdf/CvXKtXKQ+61SroeTxvJcP5pc
nMa+LqpYI/X1okgjxTaCqouRixwFJJanb0v7lfsmywD76F6tI1cxXLarxW+w
lFjz6wm1lmJ0+G6/JQe6XgqjC+ucR5TuEaV7mGq1FaRbDaNrGKkb0Zx1hfbX
0ZyLIbV6kFvIMNXNFQMbn01VfTzCasF64CtBSLYuuPY+3UBNMO80xyO+H3QF
bwBAsocee6d41zh3OT4TilxJs5zFMBTQB0VEJqxwC6VZaLjeU0JnqTV0ayTc
4CtcaIycsWTEPEpne+Ht1xqvejL3HRzLeXulyx4addvncr+7zLncaSbh8mXB
K9PwvaNXoFW8o71Bo1tOpv9uCtCCVaoON9mtB8JXUq/dUU4JYX+wRap0qmH5
eWa0fFwSWb2o/OjtU+iHwrLB1jM++x4vbeG7MTefOUgP1u2Ak1gpaFuPWjA2
UoOvCliP8nTJa+3Nwem4EePWq9JbCndWq0qv3rpuSlbN92BNOnjy2MDz3lbv
Ofxzd8Xoy73Nu61Fd6l0c6Xo1ztG3Qde+JnVS9HX15rF6JcsRa8fnn4b5egB
wq9Uje6y+SrF6L4Hfd2C9GZJ+hVdu1Wq0BdIdAAfDZUl9kQUviaP8GGUUy98
NfXtl1SHE4KNmup7PLJohfTgg6yizhZVURvM4M6rqB+M07dCCqS1itrWUCMG
fuUqautbyUkul62i9t6LF8hxtEp26xmZjYzHV1c+dxMJj4ZbvOSo88ckxxWT
HP8dBcgBbfKY2XjMbHxlmY0Vy48X6s6Aobr7MuO/msZ9TI483ORIsOY4gAeE
DhZeLEft5wrX6otCpwq3lQv/AgFMN0rQsfXC+z0YdP99v/u7s50btGyc4RGW
6G7ToJ2nLbBpDm6RozDPojiJhnESl3x4Mb520bQNs0OGiItpr5FVahuYcz2Y
T+q/2Xu/25JSkvpB8udKg8Kexf7wXEi/em0bw/OurQe1ppqdVeae8dG0AEuY
OyjwKajbE4zTyNVXtI8+do50FLYhn1+WyWbC0DoA8V5siEkvnLcjw7OVucX8
0HgKXgbVmmc2rpzAYqDtdSkHRNEQJScGTnECW1xjqktrTlO06CSaJzwve0wn
mZ+STnc9JlOdJA4cAwOp0BjS5QRvC3OiOuOt8NULL+9sD7ydZCCF9/BOzLkd
hMMhwg2AHMFTcpjLlktGq1yY44tXk4y6XGCJ7aUlo47z4sj9gaPxPaO6WBqT
ae68sgYOZlCV0dn3cAgmr3PsvqhBmWgjyXERAwkNmpd1oDpkW1VcpKNToFz8
bx+EIeFkYrCjJRVXC3ajdFoOXJD3tS5BD00a+zy6qMKGKv3QRJkvrerlUV/X
80Vf2ZvqAef4lgUam6ranfZxOo3bOytUIdTP8jA3mpYfgF6DyBS/PSiVds1M
etsBYHeh0urbqo6jk/reK7zUtonquP96yesWRLT4+Elvh3wHK0C4St3ZTw7/
RrTfgkkkueS5vIgMOKexOxIiLizvPBHVOfjwnr51BIqNpwj0RvIClPW1cYar
xCpW6zGfV43aJB7OOVaS1DQ1aTJNcHdmQBuLHptGpUkK7u3ODJactnvFZUHv
tNl51XGck+zJYep+G8W3DBOaZHSTNEjJGDcwVKeiV5EFVfvnGdMkhpiAoofa
MIm40oGhbLDJ9TVu9NwcGe/ygRtL1jqwhqWFUD1M5eEPY2V4bcGUgMvKCkpg
zqDtIelYOztBxjHaLtzi4o5IkjnA8MiEp7nWnPyjhccl4VDUntBu3x0AclGv
vVf0t6Gaf5uBa1uBa8+rRjbhhufqO/W9eqF+UC/Vj5e5Js38rVv7R65/of8K
QoHf2+6/7D9e+82/o2yej6oUS8tddzWegcYdMpFsYlk0pNsZD6pYMFy30P5/
WilL/fZfL/wdnr8bfghtDrpt+oPyJLYHp2ZbvaRMInhHuFFtk2w0Wven/cHg
75tc4rRFV+XVBk8Hu2/+vvWMhL3Gy9Te+yiH8DzRXXFCTKminmh66YFb5/f5
M6MK3Z0Mz2NL5BzKEFNequ2esd7AWvSg7xTB4rNiR3yRQWhMo0YJFqmYPU9P
DWv+TQEZ/ge040uEr8UkeI0xED4E1QihdTxLOJgm9ek+g2jPp3g6n5qnEe/f
4jssSI+Bjn/L8y1p48hYDHOPeC04SMTPNzY3eeL914uohUMBv2yOPho8bX0y
VcQnQHSIgbiVJmNSq5x67shgweCa8A1GExsOtoBmaVtxoDaw/7j1cG4stbiB
/O4TQtlanHV6y8o9l4gYYwxRxZs3ex+sbaY36Xx4by+4nvv+/rtf93d2zXur
btyFP/aKNXAEzULaFi//JlAJu3YNT95SZ0U/XrU48cjeV9q3LbS40r5tQefv
swZCfeFQ5UiDF4mA545AGVWMwi8dpWojrBzLCH9B+GUS0yEBiPvKwzAYUAdT
jujVXn+/H2rPfWVTOZqpWZaXQISt55svNtgcwKfNjmyCZW/UUoKltIEVqwNo
RJowTqx57c8om07naX0JOEwwKEj1/OaKzzPEKqGXzLjGPAVefTsfmbo1RLhK
iQZpFcbZaG52hdMKfZqhNquWem/3+BX08vnz4aud77c2N/78k4iBWrDrxhFU
RZd+tEGVnkxwPtDKDFrToJFohKCh1BCEa33t/wEo2sqqjfwAAA==

-->

</rfc>

