<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-05"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="May" day="25"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements can target either collaborating parties or non-collaborating ones. Sometimes these measurements are viewed as unwelcome or aggressive. This document proposes some simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests some simple techniques to allow any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or to stop the probing.</li>
      </ul>
      <t>Note: it is expected that only researchers with good intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a probe description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a probe description file (see <xref target="file"/>) as defined in <xref target="iana"/>: "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:user@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the probe description file must be made available at "https://example.net/.well-known/probing.txt". The probe description file must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:user@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probe/Measurement description
    Description: This is a one-line string description of the
    measurement, with no line break.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>An alternative to URI inclusion is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8::dead, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the probe description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the probe description URI is "https://[2001:db8::dead]/.well-known/probing.txt". In this case, there might be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the probe description file (see <xref target="file"/>).</t>
      <t>As an example, the UK National Cyber Security Centre <xref target="NCSC"/> uses a similar attribution. They scan for vulnerabilities across internet-connected systems in the UK and publish information on their scanning (<xref target="NCSC_SCAN_INFO"/>), providing the address of the webpage in reverse DNS.</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the measurement allows for it, a probe description URI should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part. Note that if the probe is destined to a listened-to/well-known UDP port, the inclusion of the probe description URI may produce undefined results;</li>
        <li>for a <xref target="RFC9293"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC9293"/> (2nd paragraph). However, it may change the way the packet is processed, i.e., SYN packets containing data might be discarded;</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in a PadN option. Indeed, the probe attribution URI can only be added to IPv6 packets in some extension headers used for the probing. However, inserting the probe description URI in PadN options could bias the measurement itself: as per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that a PadN option should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. If a PadN option does not respect the recommendation, it is suggested that one may consider dropping such packets. For example, the Linux Kernel follows these recommendations and discards such packets since its version 3.5;</li>
      </ul>
      <t>The probe description URI must start at the first octet of the payload and must be terminated by an octet of 0x00, i.e., it must be null terminated. If the probe description URI cannot be placed at the beginning of the payload, then it must be preceded by an octet of 0x00. Inserting the probe description URI could obviously bias the measurement itself if the probe packet becomes larger than the path MTU.</t>
      <t>Note: the above techniques produce a valid and legitimate packet for all the nodes forwarding the probe, except maybe for a hop-by-hop options header with a PadN option containing the probe description URI. As for the receiver, it may or may not process the packet, depending on where the probe description URI is included (e.g., TCP SYN flag with the probe description URI included in data, destination options header with a PadN option containing the probe description URI). As a consequence, a response may not be received. The choice of the probe description URI location is important and highly depends on the context, which is why multiple possibilities are proposed in this document.</t>
      <t>For the record, the in-band probe attribution was used in <xref target="I-D.draft-vyncke-v6ops-james"/>.</t>
    </section>
    <section anchor="operational-and-technical-considerations">
      <name>Operational and Technical Considerations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on will or context. This section describes the upsides and downsides of each technique, so that probe owners or probe makers can freely decide what works best for their cases.</t>
      <t>The advantages of using the out-of-band technique are that the probing measurement is not impacted by the probe attribution but also that it is easy to setup, i.e., by running a web server on a probe device to describe the measurements. Unfortunately, there are some disadvantages too. In some cases, using the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on, the probe source IP address cannot be known (e.g., RIPE Atlas <xref target="RIPE_ATLAS"/> probes are sent from IP addresses not owned by the probe owner), dynamic source addresses, etc.</t>
      <t>The primary advantage of using the in-band technique is that it covers the cases where the out-of-band technique is not feasible (as described above). The primary disadvantage is that it potentially biases the measurements, since packets with the Probe Description URI might be discarded.</t>
      <t>Having both the out-of-band and in-band techniques combined also has a big advantage, i.e., it could be used as an indirect means of "authenticating" the Probe Description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). While the out-of-band technique alone is less prone to spoofing, the combination with the in-band technique offers a more complete solution.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing measurement experiences over the global Internet obviously requires ethical consideration, especially when transit/destination unsolicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the unsolicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>It is expected that only researchers with good intentions will use these techniques, which will simplify and reduce the time to identify probes across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  Therefore, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party. In that case, not only this third party would be wrongly accused, but it might also be exposed to unwanted solicitations (e.g., angry emails or phone calls, if the malevolent actor used someone else's email address or phone number). As a consequence, the recipient of this information cannot trust it without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <seriesInfo name="DOI" value="10.17487/RFC9116"/>
            <seriesInfo name="RFC" value="9116"/>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8615"/>
            <seriesInfo name="RFC" value="8615"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC4443"/>
            <seriesInfo name="RFC" value="4443"/>
            <seriesInfo name="STD" value="89"/>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0792"/>
            <seriesInfo name="RFC" value="792"/>
            <seriesInfo name="STD" value="5"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0768"/>
            <seriesInfo name="RFC" value="768"/>
            <seriesInfo name="STD" value="6"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9293"/>
            <seriesInfo name="RFC" value="9293"/>
            <seriesInfo name="STD" value="7"/>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP).  TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet.  Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion.  This document collects and brings those changes together with the protocol specification from RFC 793.  This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements.  It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state.  The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J. P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp'ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="RIPE_ATLAS" target="https://atlas.ripe.net/">
          <front>
            <title>RIPE Atlas</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC" target="https://www.ncsc.gov.uk/">
          <front>
            <title>The National Cyber Security Centre</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC_SCAN_INFO" target="https://www.ncsc.gov.uk/information/ncsc-scanning-information">
          <front>
            <title>NCSC Scanning information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-vyncke-v6ops-james">
          <front>
            <title>Just Another Measurement of Extension header Survivability (JAMES)</title>
            <seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-03"/>
            <author fullname="Éric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Raphaël Léas" initials="R." surname="Léas">
              <organization>Université de Liège</organization>
            </author>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>Université de Liège</organization>
            </author>
            <date day="9" month="January" year="2023"/>
            <abstract>
              <t>   In 2016, RFC7872 has measured the drop of packets with IPv6 extension
   headers.  This document presents a slightly different methodology
   with more recent results.  It is still work in progress.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful review and comments received from Jen Linkova, Prapanch Ramamoorthy, Warren Kumari, and Andrew Shaw.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
