<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-general-sav-capabilities-02" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="10"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. Invalid packets - those with unauthorized source addresses or arriving on incorrect interfaces, are typically dropped. Only validated packets will be processed or forwarded.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations.</t>
      <t>One of them is the deployable scenario limitation. ACL rules can be configured for filtering unauthorized source addresses at specific interfaces <xref target="RFC3704"/>. However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and typically requires expert maintenance. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms <xref target="RFC3704"/> and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing <xref target="RFC8704"/>, which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice of uRPF-based mechanism is just to silently drop the spoofed packets. We don't know who is victim and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS attacks etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the non-validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, dedicated SAV rules are needed instead of just using those derived from other functions, e.g., FIB or ACL.</t>
      <t>Note that the general SAV capabilities described in this document are decoupled with vendor implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. And also how to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Validation mode: The mode that describes the typical SAV application for a specific scenario. Each validation mode has its own rule syntax and validation logic.</t>
        <t>SAV rule: The entry mapping the incoming interfaces with specific source addresses/prefixes. The SAV rule expressions and semantics might be different between validation modes.</t>
        <t>Traffic handling policy: The policy applied to the SAV-validated 'invalid' packets.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mode">
      <name>Validation Modes</name>
      <t>This section describes four validation modes (IBA-SAV in <xref target="IBA-SAV"/>, IBB-SAV in <xref target="IBB-SAV"/>, PBA-SAV in <xref target="PBA-SAV"/>, PBB-SAV in <xref target="PBB-SAV"/>). These modes take effect in different scales and need corresponding SAV rules to validate spoofing packets. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
      <section anchor="IBA-SAV">
        <name>IBA-SAV: Interface-based prefix allowlist SAV</name>
        <t>IBA-SAV is an interface-scale mode, which means it takes effect on a specific interface. The interface enabling IBA-SAV is maintaining an interface-based prefix allowlist. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying IBA-SAV on an interface requires the complete knowledge of legitimate source prefixes connected to the interface. IBA-SAV is more suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. This mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>FIB-based strict uRPF belongs to this mode. However, to overcome the limitation of asymmetric routing, additional native source prefix-based SAV rule expression is suggested. This is essential for new SAV mechanisms or architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET architecture <xref target="I-D.ietf-savnet-intra-domain-architecture"/> <xref target="I-D.ietf-savnet-inter-domain-architecture"/>, etc.</t>
        <t>The scope of legitimate source prefixes for IBA-SAV should ideally be as narrow and precise as possible. However, in practice due to scenario limitations, a broader scope may still be acceptable for IBA-SAV, as long as no legitimate source prefix is omitted in the list. FIB-based loose uRPF is an extreme example of this.</t>
        <t>IBA-SAV is the most efficient one if applicable. However, in some cases, it may be difficult for an interface getting all the legitimate source prefixes. If any legitimate prefix is not included in the allowlist, packets with this source addresses arriving at the interface will be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes. We need more modes to cover those scenarios.</t>
      </section>
      <section anchor="IBB-SAV">
        <name>IBB-SAV: Interface-based prefix blocklist SAV</name>
        <t>IBB-SAV is also an interface-scale mode, which means it takes effect on a specific interface. The interface enabling IBB-SAV is maintaining an interface-based prefix blocklist--SAV rule 2. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete knowledge of the illegitimate source prefixes on the interface. IBB-SAV is suitable for proactive and reactive filtering -- Invalid source prefixes are typically preemptively added to a blocklist, enabling proactive filtering; Reactive filtering is commonly deployed by the security systems to dynamically block spoofing traffic with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes on WAN interface. Or operators can configure the specific source prefixes to block from the interface, which is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability.</t>
      </section>
      <section anchor="PBA-SAV">
        <name>PBA-SAV: Prefix-based interface allowlist SAV</name>
        <t>PBA-SAV is a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling PBA-SAV will record the protected source prefixes and maintain an interface allowlist for each source prefix. If a source prefix has an interface allowlist, the packet with this source prefix is considered valid only when its incoming interface is in the interface allowlist. Otherwise, the packet is considered invalid.</t>
        <t>Applying PBA-SAV in a router requires the complete knowledge of legitimate incoming interfaces for a specific source prefix. PBA-SAV focuses on validating/protecting the interested source prefixes, it is applicable to the scenario where multiple interfaces are availalbe to provide potential connection to a(or a group) specific source prefix(es) , e.g. remote AS source prefixes are connected in via the provider interfaces. PBA-SAV provides a convenient and effective way to control which interfaces are allowed to accept the specific source prefix, rather than to achieve similar effect by configuring IBB-SAV on all other interfaces to block this source prefix.</t>
        <t>Operators can configure the interface allowlist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Inter-domain SAVNET architectures.</t>
      </section>
      <section anchor="PBB-SAV">
        <name>PBB-SAV: Prefix-based interface blocklist SAV</name>
        <t>PBB-SAV is also a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling PBB-SAV will maintain an interface blocklist for a specific source prefix. If a source prefix has an interface blocklist, the packet with this source prefix is considered invalid when its incoming interface is in the interface blocklist. Otherwise, the packet is considered valid.</t>
        <t>Applying PBB-SAV in a router does not requires the complete knowledge of illegitimate incoming interfaces for a specific source prefix. PBB-SAV focuses on preventing specific source prefix spoofing from specific directions, it is applicable to the scenario where multiple interfaces are facing specific source prefix spoofing attack, e.g. traffic coming in a network from open connected interfaces with its internal prefix as source address. PBB-SAV provides a convenient and effective way to control a group of interfaces not to accept the specific source prefix, rather than to achieve similar effect by configuring IBB-SAV on each interface to block this source prefix, or PBA-SAV for the specific source prefix but with a very long interface allowlist.</t>
        <t>Operators can configure the interface blocklist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Intra-domain SAVNET architectures.</t>
      </section>
    </section>
    <section anchor="sec-procedure">
      <name>Validation Procedure</name>
      <t>IBA-SAV and IBB-SAV are working on interface-level, they must not be enabled on same interface at same time. If they are enabled on same interface, IBB-SAV should be ignored, or be merged into IBA-SAV by removing the prefix listed in IBB-SAV from the allowlist of IBA-SAV. PBA-SAV and PBB-SAV are working on router-level, they are also mutual exclusive with each othter, that is, they must not be enabled for a specific source prefix at same time. If so, PBB-SAV should be ignored, or be merged into PBA-SAV by removing the interface listed in PBB-SAV from the allowlist of PBA-SAV. Further more, IBA-SAV are most preferred mode, which means while an interface has enabled IBA-SAV, the traffic for this interface don't need go through all other modes (IBB-SAV, PBA-SAV or PBB-SAV) , no matter whether they are configured. While the validation result on interface-level for IBB-SAV is valid, the  traffic still need go through PBA-SAV or PBB-SAV if applicable. <xref target="modes"/> shows a comparison of different validation modes for dealing with source address validation.</t>
      <figure anchor="modes">
        <name>A comparison of different validation modes</name>
        <artwork><![CDATA[
  +-----------------------------------------------------------------+
  + Mode | Scale     | SAV rule                | validation result  +
  +-----------------------------------------------------------------+
  + IBA  | interface | interface-based         | invalid if         +
  +      |           | source prefix allowlist | not matched        +
  + IBB  | interface | interface-based         | invalid if         +
  +      |           | source prefix blocklist | matched            +
  + PBA  | router    | prefix-based            | invalid if         +
  +      |           | interface allowlist     | not matched        +
  + PBB  | router    | prefix-based            | invalid if         +
  +      |           | interface blocklist     | matched            +
  +-----------------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The general validation procedure is listed as below. The final validity state, either "valid" or "invalid",  will be returned after the procedure.</t>
      <t>1) A packet arrives at the router, the source address and the incoming interface of the packet will be copied as the input for following validation process, and the initial validity state is set as 'valid'.</t>
      <t>2) If IBA-SAV is enabled on the incoming interface, the packet will be only validated based on interface-base prefix allowlist SAV rule, procedure returns with corresponding validity state. Otherwise--IBA-SAV is not enabled on the incoming interface, perform following validation process.</t>
      <t>3) If IBB-SAV is enabled on the incoming interface, the packet will be validated based on interface-base prefix blocklist SAV rule. If validation result is invalid, precedure returns. If the validation result is valid or IBB-SAV is not enabled, go through router-level validation procedures as below.</t>
      <t>4) Similarly, if applicable, PBA-SAV and PBB-SAV validation procedure will be gone through based on prefix-based interface allowlist SAV rule and prefix-based interface blocklist SAV rule respectively, in which the precedure will return in case the validation result is invalid. Note, for a specific source prefix, there should be only one router-level mode enabled.</t>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state for the incoming packet. For the packet with invalid state, traffic handling policies should be executed for the packet. Simply silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies for validated packets just like FlowSpec <xref target="RFC8955"/> <xref target="RFC8956"/>.</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. Normally the "Permit" policy is configured together with the traffic monitor policies, e.g. sample.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified server (e.g., scrubbing center) for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies, which are optional and can be taken together with any other policies (traffic control policies and traffix monitor policies). Some examples of the traffic monitor policies are:</t>
      <ul spacing="normal">
        <li>
          <t>"Count": Count the number of 'invalid' packets for each validation rule.</t>
        </li>
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and report them to remote servers (e.g., security analysis center) for further threat awareness and analysis.</t>
        </li>
      </ul>
      <t>The recommended default traffic handling policy combination is: "discard" for traffic control policy plus "count" for traffic monitor policy. The default combination could be modified per system level, per interface level, or configured based on rule level under different validation modes.</t>
    </section>
    <section anchor="sec-relationship">
      <name>Relationship with Traditional SAV Mechanisms</name>
      <t>The FIB-based SAV mechanisms (strict uPRF and loose uRPF, both belongs SAV IBA-SAV -- interface based prefix allowlist) should be upgraded to the new capabilities defined in this document. By doing this, the asysmetic routing scenario limitation to strict uRPF can be overcome and new traffic handling policies can be supported, and meanwhile, the router system might not be suffering significant performance impact by doing validation based on the new SAV mechanism only, rather than on both of them.</t>
      <t>Specially, in the network operation scenario for SAV on an open-connected interface, operator may want combine the loose uRPF and SAV IBB-SAV -- loose uRPF allows only announced prefixes as source coming, and additionally SAV IBB-SAV blocks specific source prefixes (e.g. inner prefixes). From data plane point view, there are 2 options to address it:</t>
      <t>1) Unified IBA-SAV. Maintain a prefix allowlist for the interface by deducting the source prefixes in the IBB-SAV from the prefix allowlist (prefixes in FIB) in the loose uRPF.</t>
      <t>2) Separate validation. Go through traditional loose uRPF validation first, and then go throught the IBB-SAV validation.</t>
      <t>These two options differ in aspects such as memory space organization and table lookup procedures. Option 1 is preferred if memory space in data plane is allowed.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities, the generation of SAV rules is not included. There may be some security considerations for SAV generation, it is not in the scope of this document.</t>
      <t>The "Sample" policy requires a mechanism for sampling control, sampling data encapsulation and transportation etc. The security considerations about this should be described together with the dedicated mechanism document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="sec-acknownledgements">
      <name>Acknowledgements</name>
      <t>The authors appreciate the valuable comments from all members of the IETF SAVNET Working Group. We extend a special thanks to Aijun Wang for his guidance and suggestion. We extend a special thanks to Mingxing Liu and Changwang Lin for their feedback and contributions from vendor implemention point of view.</t>
    </section>
    <section anchor="sec-contributors">
      <name>Contributors</name>
      <t>-
  Mingxing Liu</t>
      <t>Huawei Technologies</t>
      <t>China</t>
      <t>Email: liumingxing7@huawei.com</t>
      <t>-
  Changwang Lin</t>
      <t>New H3C Technologies</t>
      <t>China</t>
      <t>email: linchangwang.04414@h3c.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="July" year="2025"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-07"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="April" year="2025"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="31" month="August" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-02"/>
        </reference>
      </references>
    </references>
    <?line 248?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vc63bcRnL+P0/RoX5YXM+MLVmObWaza14kW+dQEkPS1tnk
5AcG6JmBhQFgNECKlulnybPkyfJVVd+AwZCUvdmc+KzXHAy6u7quX1VXz2w2
m7R5W+gD9Z0udZMU6qLqmlSrwyxrtDHqx6TIs6TNq1IdJ3WyyIu8zbWZJItF
o6+iYYc/9l/IqrRMNpg4a5JlO8t1u5yZ5KrU7WwlY+jjLI3GzD5/OqkWpip0
q83BpKuxMP1B/zmYpPj/VdXcHKi8XFYT0y02uTEg7PKmxjIvn1++mEzyujlQ
bdOZ9unnn3+D+ZJGJwfqvOravFxNrqvm3aqpuvpACS2Td/oGDzOML1vdEHUn
RO9kknTtumoOJmo2UVjRHKhXc/V9l2AWpWRnrzDlz/jXP66aVVLmvzC7DtS/
r6tytcJXaVeq02RRNUkL+hVe1JskLw7UmsZtfv72l1VaJIu5zrp5WuLrNG+x
zSOd/5TzvGnVlS3t/Hidl0lE0ts5HumIpLc6/znHpP5xnyQer15V4LiO6Ejp
5Ws79NuUXtrwO/O02nwMPSdzdZp7Yk6SUj72ibg0mAVbVz+U+ZVuDCYPpLQV
6Vv5bWtf+h1MeT0nrQw8eQ0yvhvjBsSGTatLna7LqqhWUMGIKdDSVQlK1vzW
x3LiVCTjiTjN3ecHKUkgo8hJOh+rIpOyajZY4gqGMyF78Z+UOn9x/MVXnz+z
f34d/fnNl1+GP/+Z/nw5O5mL6eZZU9Vmtkgastv+d2LWOQhIZlkFustZ0kCN
Wp22XaN3vKyb8Zfn8/lkMpvNVLIwmDFtJ5drzQ6m6QqIqFoq/T43ZNDKiLdK
rLe6Ct7qMQbsqw1kC26bjZkquAKV6QZcyNSyqTaqate6AefoedImCqt1TANe
1vPVfKpevDzCjg0GdOdnL6bqeg1p8ERl1WKyLCevlBU3+Nvkq5JmrhpH1TIv
sEmQOVfYQaOXtBKtqXkKU200xLvJW6bYqEYXNBtsANPVRXWTLGCmJtVl0uSV
UUmJ7+CdlnmqsKusIA7UMJgUmgueXVaqgkGlNC+WMb3Zp3iUGwW33G102SqS
VpV1KRiKd9Uq8uOxTxZOMXvqIim1qmGxNUQFNsIfVtdEbb6pC82z0lS94UTz
Wt6SJdpYlI6TeckjTVrVmuTbI9VqwybPskJPJo/IVTPpLOcPj4xOWfeq28nk
4h59SOELMk2qxpTViGFE9kCNTF1VS2JuJXRh6AxCgDQyhegBoZq5eguzVOBK
kr7TmK0hxcKOaGLF2r1MUrsZbUdNZZf9xewbdp7rvCjUQjvKdTbHdvmDfcOo
Gd6vINzrvF2rrpRAlf8C2vozk6k0QpjdS15C2RvavCfQ2kV7U0OVC1JkmHlN
y74p8cmT4Vd3BNZNldIiGS0Czb5OGtgDZPWCFIZ3FDSFNhnpUBDL1PG3rzWx
iQcThtJjqva6UuQ1YuWeq8nkTem4vVG5KPWIFUWj5urw+NQqIukFNpVW5TJf
wQOIHXsDvofNEDrtNCfDDJxVHz5YV3t7y6YCXYMK0KKg7yEOBOq5zN9v+RHh
DfGX/XpJtECZDQQoLLzBAqYDBVmnyfIKxJgZkI4SX2Y0O9xyNRWX4mXf6J+7
HHvCApi8ZTa34BtWmKuLtsmhOeQIeVhRkRLKx0bEYmeK3CZJNhJgxBGeg91g
V9dVQyq2uFGbChuDA9vAjeWYyVrbZwbKjjgIQYe5I+NeEHcM6C2xR7iZZQ5N
xTR10og/BdPtqCDTRQdbLQzcVyl+cOiQ+3u2MkvqGg6XdYoklZgbEEuvMa00
L2/ya96kixgsMENu7oqUsDORVzcdhRSj4vCpNl3R5rN1taEJk5QsbarimCkf
oK+lTsWQdJvOAakQ4UaIgqQHSrVJbsSeEpXlyyXUioNCKksGB7Z05lzq9y0o
qredG6AFZJMpTQhkSv4gcnN2uazSwj/RXevwIUz2mEUB4Mj6tKkyzdZYkftZ
FFX6joyvLIFvUp3Z6RxfoatgFDN2kyAZwHaWECkRu2K8Axm+uaLAVkyDRwnK
AFJ7umqipbWIWvTHm3c/GqdEWMvvZknNng4vb8v4scCJIJYrEwlpn2I3uCF4
JCggqRywWwHCSd3GQ/8NOwWVdg1LkGwHI2vCTbmIiLTXbtGbIk39E7Ik3huA
ftla1y+io/gXfD5iHXxpVX7SqnclYvn1uqLxVzCNfMN8sE+C2GGnXcPb2QD0
iJdPi05ce9K2mFiiP3weXsicQAFji4zjn0amtNZFvewKNrRMJ7xpjnonJ9WF
n4YUXxjYVBBGmnTGqyYAtQ0ZMdBiUpPWYjE2bDCiKryYJRKOeGQXtHsuGTPl
ZrqNfUCDEwvNbnYh0CVU22I0DztJNaGnvLEYtoGotMkX96E2t7046oKcGMhk
GgIkr7dmnpMvwGbAqXfwh0J8PKOL+x43ImeOPDDb7W6ACi39sf+y8Vtx+JDM
7SaeE1YdXJM3JhC5CwNLICLo4R9YE7ZArqzK2RakmaujmwBhab67WDu9Q692
wBYLLhw2F6SeIAJrcr8pdIRQcQjhxRZGjAGTBw1DHK01vqLss9VJRrSwgXdG
dkTO9aN173XV6qBLO7XNSTITvx7rq6g8zLomnWPjBeLOsILnuAVjxxWnqRx9
el8ZnxF48xQtQgQT/ZhyLHdIEhGP2GzUxfdvfjg9IdYTrgEPxRItNHQkD3cD
WEjIhIDB7sTFggGaaYmtmrGk5dEjdalpQ1RbuJlMBgZwwH6b7YY53LdsB6Vo
SQs5eCRjju1wNFfPoVBbBrkmXIH4WF2XTDgiEJj6nnUtepdqH+RD3f6ENA7n
4HJdO5vYhgdGRBroGUDjzyReE1fjJJ4AJr3A0mXF18BuCFjAcPlqzRE1mP5C
t9dal8Pdcco77m1kA/J3HMZdMhd8wCe5ZFefeG/AgjsXJEySNOo0KVddstIS
ZAhHU8nQqL1XP1xc7k3lv+r1G/77/Pm//fDy/PkJ/X3x/eHpqf9jYt8QtQx/
hZHHb169ev76RAbjqeo9muy9OvzbnmD2vTdnly/fvD483Rs3OexVfLVuwGja
aGImPTM9Oj777/968gxo9Z8AV58+efINMLl8+PrJVwTQr5HgymoMiOQjOHgz
AUeRQtAsCJRkPPCABWWSHE2gaxRXwcg//Qdx5j8P1J8Xaf3k2V/sA9pw76Hj
We8h82z7ydZgYeLIo5FlPDd7zwec7tN7+LfeZ8f36OGf/wrN02r25Ou//mVC
9YnI0F9xpJMaBensrYRzI6A9svklDGdLwdXjl0eHMzIasPrDB/uB0oqXR0fx
8yP3/Cx+/yy8fxa/f+be32ertKgbfid5B8uE1XGBoBd7k8LWcijKKK4iACSW
GZlc8IqMfcWyQg0ljrLpGiCfoyMvOB7gyWCBRJsc0xQ3U5t8tFS7d6EU31MN
h9UauZIkUHUFh0LBE1CysHUlZICpD+m2SsHFkKUq9Ar+fkO0ehIVG7/lsz0T
IDdn4bPNZaD01XVBaQxt/cMjJ5eJl5bpFYFmzD/es8O5G50QDm2Z58YxvSpj
3+7Hi+8MaRcjONpFtB6n6viX88V47XHKbXlnK0/TVIWEeDMXyykhNqEshYTT
5IARLv2eCoy4zg0RyI9g94eE5GICaWNxVcwXGhgzVxTuIQZKLoASVnogniGF
NusNLj3iVMySiqsL8E2cPVU2CQEQymZhiiiUuUxcwJLLrUl5KpJLt4AWciLd
dgt1eMGZbgKIb1rADSoklywqXtpmsZqiUy7plSs2yp7d+k6zGZN5oxluGQwR
vGZfpzAVMlcTlSkWmqo9RvZrSYmqT22/Rhxnm5SZjRUOsiyn7wFGSs6p+8RF
hZ5BZCcZmG610obLmMwY/I9wAUJ9Imldqa+HRSIuWoYDgSCX5y/OZrzHXoXl
6PCcJQ4/uOOwgh1mVF357GVcSMHY188ve0v25rrncIOj5oNPN4iUkK/6evcd
yk5MckptU7WccmFbogAOTZoGONWWs1OyxMgZRqLPo7KALQyOVEUpjKtFUyVU
SBICCWgjqREPQMWouvX1L0sax35SPKao2rkhUgBAyLbt+5e4rBfVFcWP6vct
ITH8NyFH4aA2eBgZO9ehqHjoLQ5OB55hGRXs+rzgal+KJamy1vImLerM065o
BWnHTmulW/YGhHmY8J1CgxvCuuVNL8b4/cuBR1p0kZP1jnkaFdoBrCXt2ao3
u5q+TcwCjT5L31AI1Y2roZEBvsCGLA+nW8OwVgI4skxo61x1dXW88FbfI9J3
7tAcHzBmRXNg3SuKEHCQ7AHXiLjs/CB2w0rHNaSHMPGtJLXiyC1EqUAFJGh9
dCgK2MB9dGfgZlb0AveRC9xHPnBT4vcPit5HHxe9PfmzmXe3T2X63xvEbcyO
w7gL4iGQ+dqtDdt3RG1WmOIOd2YLMb2I7dnggzXZHjQmkcMjcm2Nth9C/X42
80djw1X6R1p4rDdcncUHWJEAhyTwcxqEElb1C/0LssGtxXNjS61cKKRjJjnA
YESl066hUxhzg9C3Ya3NbspkY+mRqraP9a5idncmbUPGliZbROxqFEDEHeAI
XDmv5ao6ldT/4ig4GvisP+Tpt7L+HqEsQQIFIxJ+e/g6lvCbRpEvosYGKYb5
YzZbbe5v2c9ESSyzyp9B+EmdJZLSIHQVyEbHT3mkNMQexKKXMaTCO1rAv8Oz
3HGsJl7mzKUHZzEACgY+TA9cGjY5i9IDe7J1l3MhTvl0yvF+6PplGuEQ+dQs
byS3tBUX+73Xb0cD+wLxElIx9RnVli2BB84/9QNi2CjZq6YCVG+whMEBAKCS
1Pgs0/45+CD6hfg5zEFCeYJrXSNnWHyOMghmcSrkfF+Pgv5KI8lNlGs7cX5k
YjNWTxsW+PoMdWty0VGMzRUNytVnVojBcDEro++hUBnx5CY+zLQR3SPCaz4b
4XNIAl0RheRck6sERlcseJwN+cCcrUX24VySPe1j3hM33u3v2NpjbfaVeCsw
cUN1ZwCIMb8ep27qKk+c+grqCHQGZtkvyeowGDkYw0PSa4nc5BWuAf8YXNDx
RuG8y2DTpDI2eDAKvsN9TRX83ZqBSiJMsPV+564saEDIcN4wxgSVlNYk54vI
8C5x2zSgmm/u8LK7zHaXrk1FspKyRudtcZfSCBHk7PvL+ZX8OiGRf3Ds8gV6
iraImhJs78vjjHPYR3c67CEsdPWxydkQFv7fee2j4LXHnXHYxN0e5CEuOQJG
H+2SraP8aH/s13yYPx7xxkdb3ngIXO9yyz3U+nsc89HQMVvj4XLO6KgAAW3x
x74UtOEP+2n89ZD1xbSt+3VK61mAbfeqVABzpRqtoAkyZKFbdOgKj8MsNnDs
d3hnG0tYbGFxPpD7h7hmhjpBde9wylwjDEG7uYMsBqo2EefuBy6njAGWhzr6
h7mE/yeO/s68hR19fO5yRt2JGZfy+Oyldp9DkZ40zMmUTIX02/dJuvy7AFsK
OfWCjWF/tt3HNVHgZZNsetG1lSfwJJq9LY+lBXaOCcc5tsC3iPpiwE983Ohm
JaZW+Wrg4oaR0pWDe1aNSAwCjtysPn0KkZ9yQZkmwCRiyNk4Q2zYi7khgAhB
cdO1HQxdv0+LjjuwWIfZRABfbNdraJEZ5+NdCrrNUlOFE60HsexsB8v6yitc
O7uTa2eOa/3+Jq9UjS1DEum6abh6NUQJcj7Vi7gUgh0vfEmV+wCsMxbfkZto
jHRkcYVsVYUKnIeN/gjxSKZzTGCPxM8IcZfUTcuJLyKJdYtWvKEblrqdiWai
KDqklPa7EYuxpWGPnmyRiYb7HUlFeUj+NpHDGu6HD7yx21s+a5awQY2euZEz
jHCiuHWcutVHtrPNBv7kt99+myj16eyP/vMpzcIHwepXdcHAkf75NRQiBv/8
OsJi9enfkRYoGK0SNCn624LjQIvDc5CC+0dmsd/HdA/M1tvNr2zurk20NwuU
5B9BSwiFvw7pCLOcCV8seORZemdcvfk/hpax3Eu+2cmXM+HL/yYtgSfyzS6+
/B20jmzpw4F6ZIv4dOPwX/cOH2y4e7dS/HQNaNH3PrCTm7FOHL6UTkGvJZcC
iHBDuCbbAoAAceTs6/b4+R65mz3Lxb2p8pXyRgNdEAZJlq14xrAgXMSTfXU4
cgHkngsf3CU52k214y5IWtW5bEuG1Z3grGVF2kQzDBlC3eJhmZxrMn0OcOWU
yDbqE2mAwn6e7lN0jU7VIsgyTvF0jN6qf3PEtloPjzXGuynIIU4jqYoEbGbR
7zvpbyhKG2ezaAvcc37/NmzV906egkNfWA4d/TEOPZg5/dIEMYcB0HaAYGRg
wywdA/e453Do+DhbRO0F7Ihr0zg8x0Bw1AxNsL7J5Nm+upCcikB+L45PR2Hn
qGE7pq0oP3CEeL7V4zWdba1yJ+T3V4D4bVI0yT6Z9tIiOAu0Y9KEyfQKnZ7s
5rMrISvqqp3el5NxWh/ALdsUMaAnAT6es3LiFMj1Q37v+iHPXCe0zYO4JfJ2
criU+khf0adxcWpFh9B+M8FxLP25sFV10W05Xx6Wi1xksl535+3FaKf6vU67
1uYEYb45qRI1iPeuK3BrKh3dk8Jea0jDYCdmKQdxTdzFSS00Pm3e2Voed+fZ
5hUT17jvuY2RW5S5fW+Om7GL/J1WL6CZFxC7bWP55ssvuYfE3rq9vbUnfd4T
hbb2UJmROohfkhMsm2TTmXRJ/V069G5WZYgtboyPLnSSXrp2Bx8Ft3WY7mGq
vTNqaW73Dkjc1E3nN8g3jgtuKmMLDaLzdfvhYYqw27bp4q/OaLruwaXDICs5
3kmkd3tTIZy5OgqUSlqvd93ftFVGW70iy/M0ar+ViIDo/l9brSQdsmXPwH1H
guOkLZsZ7qwQJp3kJgVvwKUTulPj2CCFPfIn/vTSFiTpzg43R+reJYJ+Z5TM
fU5GyP06mP459czzQaXqanBMLaqu5OZ/Ry03rtv7R4uau6vq2uyzvDFHvvLN
X7uYaO/ZbEnL3c6RdDbIi0WVIWZIA398bC47cE4KbGaGYB/n9s+e1rhSp7hI
vrjYUO+Hu02VNt1iQRTCfjG/7MkWrzRxqHS53KW/dM0li92SDBe8q9o2vdl7
Xt60BppBbT6Sb3vLerzTTsMFmfdbi+/Dw1WhzclfDN5FLFF5wPw8prv/YCL/
VxS+2yxAEWbY6m8PZ7WxgXdOcy94cZosqVtXUuy1JCXeSuSmCg0gIfhLLI2m
+5w0cEMitKd5IrtwFc71SCTg8Y0h24uEuLTFFUR7TfcD4WgA/S12diO4XZdP
SzTfGC0zvtUkLUw7riGRrS2sXkCHD9ReZk1Vws2Y4G5UXcDN7PFPLPTf68nE
3sRzFMQr+WttCNiiymSr0h6ibFWtjk/63MOqiX2SBz2MUAQCdHzjc3fuxLDg
nEq5dKCwzmuRImzQt3WSl3kVXdJlpNBEQ26ZzTtv9T52/adn58OrwfA5FbdW
SFMqDXTYfDaLAdhol/J+BAu6egWSQ88vNY4OLiFJuXh4H4IbzwXp0HN7fwu8
3+g2urU70grJHZJRa+3gHpfth7++AwrYEf6Ks2RlVAVkp9nDW1Yb5P6LLY+a
jsTK5OWrkq8+lf2L39LhToXNIZgL2uLY1RMbh9X+UQiNIWnZW/R0IYhcr5To
+6HUuntGSY5xZBih2ZsOicbarKc+UjBu42AhpmIbkqNr5WVmNebIaUz8LWmJ
RQfD+8GShtiAJjBVWB+amTEqnpszALO7F4ndFnZRkqO3D+GxXwx/HQNCgA3m
+tpBeIolT2004ZDm4mveHiguIfxQikvwBflX/oB3O0cO6NubDp2U8K9h2KL2
kHQrua3TgK25H8dDYO37vnvQc12KBBe6TtjdRwVT9V3IEtvIuUQSi3RzmTd0
umxrFGWUYrY9YnsV2Uu+q0KXLh07xe3xESVna6FXfIOo0yBZqLmsEv3kjqzJ
oQukvevqKHcFauaJ1RPCN6GEj8y1Nx9lD0Hm3B3AnSH0MxSPwB0b2o4t4hU/
OrjIGx0Ut/deN7UHZxaobV1DdN3E7vchbC8zdzj7QJv2qPHWGqZ2h80P+UEW
igcOK7go6Q/Zk8jL8Hmggwg2rE7DE2ajLrFjZBiRfJqkNOQy5RH/tMHlevdm
EsDe1p5S+ogRrrttY/lwiTaQGl/dVC8PXx8OBOh+agb443Z4LdtKgHvfiQ9a
rtbTLKIUh6nvNpB0VCZL+HEZnttKp/zaiFyFIhfc+rpCx6orgKc1oYUECrog
fGVRI/0cmjspfWsP8r6jQ3Nuq9bvAc4zV35ICvb/79g9HeY/daV6S78hRrKj
Xa46+kku1w4pSTGb/N0z0c+jvad1T/OOhx7jq9V1wk9K58lyoD2tswWBdoba
pCP5orNaStsbXhjm8hA7WmyWfK2w+NiNJMYJe9Po0e2EfpwrJmqCz6O/AYbn
9me0lHrufoar29ihX/V/Eoyn7W2Nhr1GvP3+i+PexL15/c97lakbO//82bMn
z75df5H6qRHyiDOTyf8AMrBfwapPAAA=

-->

</rfc>
