<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-04"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="May" day="18"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Sometimes these measurements are viewed as unwelcome or aggressive. This document proposes some simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests some simple techniques allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or to stop the probing.</li>
      </ul>
      <t>Note: it is expected that only researchers with no bad intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a probe description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a probe description file (see <xref target="file"/>) as defined in <xref target="iana"/>: "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:user@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the probe description file must be made available at "https://example.net/.well-known/probing.txt". The probe description file must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:user@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probe/Measurement description
    Description: This is a one-line string description of the
    measurement, with no line break.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>An alternative to URI inclusion is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8::dead, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the probe description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the probe description URI is "https://[2001:db8::dead]/.well-known/probing.txt". In this case, there might be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the probe description file (see <xref target="file"/>).</t>
      <t>As an example, the UK National Cyber Security Centre <xref target="NCSC"/> uses a similar attribution. They scan for vulnerabilities across internet-connected systems in the UK and publish information on their scanning (<xref target="NCSC_SCAN_INFO"/>), providing the address of the webpage in reverse DNS.</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the measurement allows for it, a probe description URI should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part. Note that if the probe is destined to a listened-to/well-known UDP port, the inclusion of the probe description URI may produce undefined results;</li>
        <li>for a <xref target="RFC9293"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC9293"/> (2nd paragraph). However, it may change the way the packet is processed, i.e., SYN packets containing data might be discarded;</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in a PadN option. Indeed, the probe attribution URI can only be added to IPv6 packets in some extension headers used for the probing. However, inserting the probe description URI in PadN options could bias the measurement itself: as per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that a PadN option should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. If a PadN option does not respect the recommendation, it is suggested that one may consider dropping such packets. For example, the Linux Kernel follows these recommendations and discards such packets since its version 3.5;</li>
        <li>etc.</li>
      </ul>
      <t>The probe description URI should start at the first octet of the payload and should be terminated by an octet of 0x00, i.e., it must be null terminated. If the probe description URI cannot be placed at the beginning of the payload, then it should be preceded by an octet of 0x00. Inserting the probe description URI could obviously bias the measurement itself if the probe packet becomes larger than the path MTU.</t>
      <t>Note: the above techniques produce a valid and legitimate packet for all the nodes forwarding the probe, except maybe for a hop-by-hop options header with a PadN option containing the probe description URI. As for the receiver, it may or may not process the packet, depending on where the probe description URI is included (e.g., TCP SYN flag with the probe description URI included in data, destination options header with a PadN option containing the probe description URI). As a consequence, a response may not be received. The choice of the probe description URI location is important and highly depends on the context, which is why multiple possibilities are proposed in this document.</t>
      <t>For the record, the in-band probe attribution was used in <xref target="I-D.draft-vyncke-v6ops-james"/>.</t>
    </section>
    <section anchor="operational-and-technical-considerations">
      <name>Operational and Technical Considerations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on will or context. This section describes the upsides and downsides of each technique, so that probe owners or probe makers can freely decide what works best for their cases.</t>
      <t>The advantages of using the out-of-band technique are that the probing measurement is not impacted by the probe attribution but also that it is easy to setup, i.e., by running a web server on a probe device to describe the measurements. Unfortunately, there are some disadvantages too. In some cases, using the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on, the probe source IP address cannot be known (e.g., RIPE Atlas <xref target="RIPE_ATLAS"/> probes are sent from IP addresses not owned by the probe owner), dynamic source addresses, etc.</t>
      <t>The advantage of using the in-band technique is to cover the cases where the out-of-band technique is not possible, as listed above. The disadvantage is to potentially bias the measurements, since packets with the Probe Description URI might be discarded depending on the context.</t>
      <t>Having both the out-of-band and in-band techniques combined also has a big advantage, i.e., it could be used as an indirect means of "authenticating" the Probe Description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). While the out-of-band technique alone is less prone to spoofing, the combination with the in-band technique offers a more complete solution.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing some measurement experiences over the global Internet obviously require some ethical considerations when transit/destination non-solicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the non-solicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>While it is expected that only researchers with no bad intentions will use these techniques, they will simplify and shorten the time to identify a probing across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  As a result, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party.  As a consequence, the recipient of this information cannot trust this information without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <seriesInfo name="DOI" value="10.17487/RFC9116"/>
            <seriesInfo name="RFC" value="9116"/>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8615"/>
            <seriesInfo name="RFC" value="8615"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC4443"/>
            <seriesInfo name="RFC" value="4443"/>
            <seriesInfo name="STD" value="89"/>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0792"/>
            <seriesInfo name="RFC" value="792"/>
            <seriesInfo name="STD" value="5"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0768"/>
            <seriesInfo name="RFC" value="768"/>
            <seriesInfo name="STD" value="6"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9293"/>
            <seriesInfo name="RFC" value="9293"/>
            <seriesInfo name="STD" value="7"/>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP).  TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet.  Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion.  This document collects and brings those changes together with the protocol specification from RFC 793.  This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements.  It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state.  The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J. P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp'ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="RIPE_ATLAS" target="https://atlas.ripe.net/">
          <front>
            <title>RIPE Atlas</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC" target="https://www.ncsc.gov.uk/">
          <front>
            <title>The National Cyber Security Centre</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC_SCAN_INFO" target="https://www.ncsc.gov.uk/information/ncsc-scanning-information">
          <front>
            <title>NCSC Scanning information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-vyncke-v6ops-james">
          <front>
            <title>Just Another Measurement of Extension header Survivability (JAMES)</title>
            <seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-03"/>
            <author fullname="Éric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Raphaël Léas" initials="R." surname="Léas">
              <organization>Université de Liège</organization>
            </author>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>Université de Liège</organization>
            </author>
            <date day="9" month="January" year="2023"/>
            <abstract>
              <t>   In 2016, RFC7872 has measured the drop of packets with IPv6 extension
   headers.  This document presents a slightly different methodology
   with more recent results.  It is still work in progress.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful review and comments received from Jen Linkova, Prapanch Ramamoorthy, Warren Kumari, and Andrew Shaw.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
