<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-11" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-11"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="17"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 92?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 96?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to implement SAV at three levels: access-network SAV, intra-domain SAV, and inter-domain SAV (the "domain" used and discussed in this document means the Autonomous System (AS)). The multi-fence architecture helps enhance the effectiveness of SAV across the whole Internet by preventing or mitigating source address spoofing at multiple levels.</t>
      <t>Access-network SAV mechanisms (such as SAVI <xref target="RFC7039"/>, IP Source Guard (IPSG) <xref target="IPSG"/>, and Cable Source-Verify <xref target="cable-verify"/>) can ensure that a host must use the source IP address assigned to the host. Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block source-spoofed data packets from access networks as close to the source as possible. Intra-domain SAV and inter-domain SAV perform SAV at the granularity of IP prefixes, which is less granular than the access network SAV (i.e., IP address), as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. Intra-domain SAV rules can be generated by the AS itself. Intra-domain SAV for an AS aims at achieving two goals: i) blocking source-spoofed packets originated from its host networks or customer networks using a source address of other networks; and ii) blocking source-spoofed packets coming from other ASes using a source address of this AS.</t>
      <t><xref target="intra-domain"/> illustrates the goals and function of intra-domain SAV with two cases. Case i shows that the host network or customer network of AS X originates source-spoofed packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed packets can be blocked by host-facing routers or customer-facing routers of AS X (i.e., Goal i). Case ii shows that AS X receives source-spoofed packets using a source address of AS X from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS border routers of AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The host network or customer network of AS X originates    
        packets spoofing source addresses of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed packets can be blocked by AS X                 
                                                                   
                                    Spoofed packets                
                                    using source addresses         
  +-------------------------------+ of other networks     +------+ 
  | Host/Customer Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives packets spoofing source addresses of AS X   
         from other ASes (e.g., AS Y)                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed packets can be blocked by AS X                
                                                                   
           Spoofed packets                                         
           using source addresses                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>The scope of intra-domain SAV includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and VPN forwarding.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec <xref target="RFC4301"/>, GRE <xref target="RFC2784"/>, SRv6 <xref target="RFC9256"/>, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In the following, this document provides gap analysis of existing intra-domain SAV mechanisms, concludes main problems of existing intra-domain SAV mechanisms, and proposes requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
        <t>AS Border Router: An intra-domain router facing an external AS.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among routers.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Intra-domain SAV Mechanisms</name>
      <t>This section introduces existing intra-domain SAV mechanisms, including BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering or BCP38 <xref target="RFC2827"/> requires that network operators manually configure ACL rules on intra-domain routers to block or permit data packets using specific source addresses. This mechanism can be used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to prevent the corresponding host/customer network from spoofing source prefixes of other networks <xref target="manrs-antispoofing"/>. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is also typically used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a looser validation method. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but it is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot determine whether the source address is spoofed or not. In addition, the packet using a spoofed source address will still be forwarded if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help identify and block source-spoofed data packets.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the key problems of current intra-domain SAV on host-facing or customer-facing routers and SAV on AS border routers, respectively.</t>
      <section anchor="sav-on-host-facing-or-customer-facing-routers">
        <name>SAV on Host-facing or Customer-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source. ACL-based ingress filtering and strict uRPF are commonly used for this purpose.</t>
        <t>ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t><xref target="multi-home"/> shows asymmetric routing in a multi-homing scenario. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 2001:db8::/32 <xref target="RFC6890"/> and is attached to two intra-domain routers, i.e., Router 1 and Router 2. For the load balance purpose of traffic flowing to Network 1, Network 1 expects the incoming traffic destined for the sub-prefix 2001:db8:8000::/33 to come only from Router 1 and the incoming traffic destined for the other sub-prefix 2001:db8::/33 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 2001:db8:8000::/33 from Network 1, while Router 2 only learns the route to the other sub-prefix 2001:db8::/33 from Network 1. Then, Router 1 and Router 2 distribute the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. The FIBs of Router 1 and Router 2 are shown in the figure.</t>
          <t>Although Network 1 does not expect traffic destined for 2001:db8::/33 to come from Router 1, it may send traffic with source addresses of prefix 2001:db8::/33 to Router 1 for load balance of traffic originated from Network 1. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Arrows in the figure indicate the flowing direction of traffic. In addition to the traffic engineering mentioned above, other factors may also cause the similar asymmetric routing between host-facing/customer-facing routers and host/customer networks.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in multi-homing scenario</name>
            <artwork><![CDATA[
 +---------------------------------------------------------+
 |                                                      AS |
 |                     +----------+                        |
 |                     | Router 3 |                        |
 |                     +----------+                        |
 |                       /      \                          |
 |                      /        \                         |
 |                     /          \                        |
 |             +----------+     +----------+               |
 |             | Router 1 |     | Router 2 |               |
 |             +-----+#+--+     +-+#+------+               |
 |                   /\           /                        |
 |Traffic with        \          / Traffic with            |
 |source IP addresses  \        /  destination IP addresses|
 |of 2001:db8::/33      \      \/  of 2001:db8::/33        |
 |                  +----------------+                     |
 |                  |  Host/Customer |                     |
 |                  |    Network 1   |                     |
 |                  |(2001:db8::/32) |                     |
 |                  +----------------+                     |
 |                                                         |
 +---------------------------------------------------------+

 FIB of Router 1                 FIB of Router 2
 Dest               Next_hop     Dest               Next_hop
 2001:db8:8000::/33 Network 1    2001:db8:8000::/33 Router 3
 2001:db8::/33      Router 3     2001:db8::/33      Network 1

 The legitimate traffic originated from Network 1 with source IP 
 addresses of 2001:db8::/33 will be improperly blocked by Router 1 
 if Router 1 uses strict uRPF.
]]></artwork>
          </figure>
          <t>If Router 1 uses strict uRPF on interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 2001:db8:8000::/33 from Network 1. Therefore, when Network 1 sends packets with source addresses of 2001:db8::/33 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 uses strict uRPF on its interface '#' and receives packets with source addresses of prefix 2001:db8:8000::/33 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addresses of prefix 2001:db8::/33.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>For special business purposes, a host/customer network will originate data packets using a source address that is not distributed through intra-domain routing protocol. In other words, the IP address/prefix is hidden from intra-domain routing protocol and intra-domain routers. In this scenario, strict uRPF on host-facing or customer-facing routers will improperly block data packets from the host/customer network using source addresses in a hidden prefix.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       | Host/Customer |               |   
                       |       |   Network 2   |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in Network 2 with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>The Content Delivery Networks (CDN) and Direct Server Return (DSR) scenario is a representative example of hidden prefix. In this scenario, the edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from intra-domain routing protocol and intra-domain routers in the local AS.</t>
          <t>While this is an inter-domain scenario, we note that DSR response packets may also be improperly blocked by strict uRPF when edge server is located in the host/customer network. For example, in <xref target="hidden"/>, assume edge server is located in Host/Customer Network 2 and Router 5 only learns the route to P2 from Network 2. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 uses strict uRPF on interface '#', the SAV rule is that Router 5 only accepts packets with source addresses of P2 from Network 2. As a result, DSR response packets will be blocked by strict uRPF on interface '#'. In addition, loose uRPF on this interface will also improperly block DSR response packets if prefix P3 is not in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="sav-on-as-border-routers">
        <name>SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes. ACL-based ingress filtering and loose uRPF are commonly used for this purpose.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>By configuring ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. However, the operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>As for loose uRPF, it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, existing intra-domain SAV mechanisms have significant limitations on automatic update or accurate validation.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. It may mistakenly consider a valid incoming interface as invalid, resulting in improper block problems; or it may mistakenly consider an invalid incoming interface as valid, resulting in improper permit problems.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by loose uRPF.</t>
      <t>In summary, uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB or RIB information to determine SAV rules. A router cannot see the asymmetric route between itself and another router/network from its own perspective. As a result, strict uRPF has improper block problems in the scenario of asymmetric route. The network operator has a comprehensive perspective so he/she can configure the correct SAV rules. However, manual configuration has limitations on automatic update.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the following five requirements and related discussions that should be considered when designing the new intra-domain SAV mechanism.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that data packets with spoofed source addresses can be effectively blocked. When the network changes, the new mechanisms <bcp14>MUST</bcp14> efficiently update SAV rules to guarantee the accuracy of SAV.</t>
        <t>The key to overcoming the improper block problems of uRPF is to combine perspectives of multiple routers, allowing each router to form a more comprehensive perspective. To this end, the new SAV mechanism can allow routers to exchange and update the necessary information (i.e., SAV-specific information) that will affect the accuracy of SAV. By integrating SAV-specific information of multiple routers, routers can determine accurate SAV rules in the scenario of forwarding or routing asymmetry. To improve compatibility with the current intra-domain network, it is recommended that existing routing protocols can be used to implement the SAV function.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically generate and update SAV rules based on SAV-specific information or/and routing information received from other routers, instead of purely relying on manual update. While manual configuration may still be required in some special cases (such as in the hidden prefix scenario where only the operator knows the hidden prefix), automation can reduce considerable operational overhead in general.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Since routers scheduled to adopt the new mechanism may not be able to be upgraded simultaneously, the new intra-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to provide incremental protection under incremental deployment. Specifically, it <bcp14>SHOULD</bcp14> specify the scope of deployment and provide clear incremental benefits so that network operators can decide which routers to deploy SAV on first by evaluating the effectiveness of blocking spoofing traffic. In addition, it <bcp14>SHOULD</bcp14> outperform the current ones in the same incremental deployment scenario.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> adapt to prefix changes, route changes, and topology changes in an intra-domain network, and update SAV rules in a timely manner. It <bcp14>MUST</bcp14> consider how to update SAV rules proactively or reactively so as to minimize improper blocks during convergence. It is also important to reduce the complexity and overhead of SAV implementation. To this end, routers <bcp14>MUST NOT</bcp14> signal too much information. Only information that cannot be learned from local routing information and is necessary for SAV should be signaled.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be considered in the new intra-domain SAV mechanism. These security tools can help protect the SAV rule generation process. <xref target="sec-security"/> details the security scope and considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms should not introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols.</t>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms should ensure integrity and authentication of protocol messages that deliver the required SAV information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security solutions to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 391?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8092XYbx5Xv+Ioa6cFihIWkJFtiHCcQKVH0SBRD0Hac2Cen
0SgCHTW64K5uUhSpnPmNeZtvmU+ZL5m71NYbCErKnME5EtFLVd26dfe6tzAY
DHpFUqRyT0xUmcdSjGezXGotfozSZBYVicpEkomjrMijwUwtI7g4lsWlyt9p
cRitxDiL0iud6L44ydU0lUsxKaJCLmVW9EWUzcSp/K1Mcrqhe9F0msuLvWp/
k/GPxy/Omu17MxVn0RJgm+XReTFIZHE+0NFFJuF70MFgxS0H2rYc7Oz01FSr
VBZS7/XKFcwEv+CfvV4M/89VfrUHMztXPV1Ol4nWMNOzqxUMdvTi7GWvl6zy
PVHkpS52t7efbe/2olxGe+JUlUWSzXuIgHmuytWeAb/3Tl7BzRld93pRWSxU
vtcTg56AYfSeOBiK1wlc8IwOoowvVT6PsuQDYXpPnGnofFFG4ocsuZC5Toor
eEfCLFOARuGSZH8qzEtDOSuHcQYvxPDennguk38gbHCtSsAP3NpfJFkUAPH9
UPxUOiC+T6JsBS343h0g+Ydp+KdY5rAanwDI66H4c5I5SF5HWbyQAAnfrILy
14XK5vMSXikBadFU5VEBy+fB+S3J0vhP+H34YR6n0fQTAHozFK9giLkD6Q00
+A2RY2/fEagFNlv+9plgHQ/FoQygOga6MTeq8ACUlzLxw8/hpQyIZUH3h7Fa
3j5sL1P5Evq7ACbpIW+4KyFOX+7vPt39xnx99M32Y/P1ye7Otvn6+NH2jvn6
bPfJ17bZN0/p3TgCJh0ALSXnV3gthJE8+/jAyJ/Bj/ScJMfRiZNGExmXOZOg
EIa3BF0AFqCHRMeKLonDxe727s5ge4cHifK5LGA9imKl90ajy8vLYYzvI05G
8Uhmo1KPdLlaqbwYgcjRo2muotkUQBgQzCOGXBsYRrvbXz/bGWiGl+czXBTL
FIY7OpkcVuemsvNkDu2AkA5e7Z+IlzIqSpiTnaERu4dllM82nt3O13ebXTHj
ienLpAA+06M0ymBWBYruYvfZ19sjrc6LSxBxo1ymMtJytLM72P37k0d/h6+x
mQNR2mheJjM5wkY6nkOPs0W8erprEQDr/c32o2dm6b9++oxoYxlluR5EWZHo
lVLngIwKkt6Mj08n4mi5Skl6s9Y5xHE6MEINquv9aB1GaPwhNB2BtFIrbSYR
AoQcluhikMu4Atup1EmaAFSos2RuVNYZKKTzJBYv3scLYHMpBuL54YkjU1rc
gwM1ASlSJHOaUMdUjo8mZ9W1fbZuJgjjcK4uRqtymiYx9axh0QyQqBctkIOC
gRxIA+RgOl85Kh4gec9mSg+WDsR7PRi3NxwOe73BYCCiqYYu4qLXO1skWgAF
lbg8AtTtBaAPSFjMwQKIjAUg1LmQ7wE+pPVQPwtmFREZZr7wpsVSImiJXoL9
AD3GeTKFfouFFOdlNouIGlJh9Ltmg2ImYb3MW3lgXAiQV6KADjPASyqSJcLJ
j8yElslslspe7z7ZH2pWxgTE9X1AClkU6mOv120HPQDNviVgotA1yAqgHhoS
4JHZDCcdzWG2uqjP15KYiIoiit/poRiLZZkWyQAa4nt5vEgAcJQLICXTVM7W
WGPj8G0Eabwl/mbk8K/iMtKIrpXS0EmhEFRmKjRLAADAWi6lSOWFTEG9RHEM
3Q8ytujwnX516egOYp0IK7grHiD+7/GNe6LE8Wh1QPiUGq/gvaJCN0sZZbxs
47JQmVqqEiQ7SCAw+h6MJ1tbQ3EGDztRs5DpSguZAcXAI+xHnp/DM9BQGSIJ
6I8mGedK8ziXCzABmXFhimJ6BbiBmWdEorB0lvThqnvNGCBAo8EaENO4gbaA
ksUDXcYLAQsB949obVAk/tqvi3vxANXFlri+xr8fPzKi27Th9XWoPD9+3AIy
yQATGtFSLADGSCyURlDhP1gLmr2ZEoxqZxWBmTvPmDLwDWwDBgYiUGSwSDmu
CNOEyKyVD8IzmkMbwN4sAYTnuJZqJcngQTxDq/kC7GJGucrTGRBRgYyC7ycx
oA8HNLwqgMAbY8DjmVyl6gpxRmSQS+At2aTGdmIEzQWdyRlPbZqq+J2Z/oBW
Eu4D+0RiBfwnUVTkatkAAlYsThUiT4X4Q44CgkpgAYYNx6UdHEAOGk+e56SY
51FWphFpByBUWBQgxfPkvQSpdrlIgGAAXynCY9/Ehc2obRVQ5r5kKIf9YG23
+ggoNHA9g3WHhjuQRk4qikc1r0uQQnW5fg5f4IFQZtRArtdXAREB/eNdTYtb
R0HLws0U9J2pwhFCrNKUDWeUa1OYnQQ69DQ2niCUDYznJaCJGGAq0cxFQmTy
JNEyAdrTMj1vaYnSGprBK1ECfIpsA+JFXiCfA2rFXEUoFJMtpiAvFhwRWfpR
eTIHixnHJVKCIZkBHTHBUIDNQgFT+ZulJpFSFzaAYAWw+xd/z2S1ASBg5eFT
AoL7QKytGYhE8niCq399Ha7Rx48iSdMSVX5htCvhg0ABbcy6soUWBBiVC8Jf
HBFd7cMfkQi9UJeapZOVNY6EW7CDXcPK/MXjVndNelM0AgmYPlm46BbdRoxe
RyrTFuGeKQuBH5xHMY4L4q5Avgrm0HhkhjVceqjQHtmymKmght4Do1OCEP6E
CVPz+uo/kMM5DAvPft76VBxQn9hDCzbgNrDtDIZbO2Gcca/3z3/+s8fz3iP1
/il0AB+yiPFjAXQauooU2UIHtmmP4drbACWdHwfHZoRDw3T28RmfjfqY1OD7
lD6Y9hpIDvp4OFj/edixIg/tY+jjRrwCuhjtW2I4rhHDTXvX392Yx5vB0f4J
4fj/8DHsAnRaFQ4bUb4hOD+VdcLhFjgMG38Ov3g4Pp1fvjS73MIVG/VxC1es
68ORm1+t8PNwPbFyH5bsv22n9BuW3DebwdH+2QAOFO3Xe+J+hRw4cPKHe2Nw
UN5H6H6S3eVsi0Z0AOjn3ke0RYE+YvArWm2MJIvTkmIO4D0cnQzAO4xWGsxk
NMF0LDOwrBXYbuDoi2MKWqKxCwNfgqOF8SbTA44+BW4IHolphO4qGDfzVE2B
4nOO8YuCPDE0f348OQ4agFYbNGA4K7NMpujSaRmT04fRUHD6Dk9f0CWGQeFy
cnrxNV1jhBSuZREPt/bY9iavlI3vIEZCRhtgBTWtSKMr+N/b8QSLjQ7YuR2d
XDw28UUYrGLxTwjDzhQ3aN0jtKlsgM4Dc0WIsDcnrycw8lSmA8ZVgDwcxsh2
at94A0c94kmdg8GvLuFevxYZcBGlzeJJVX+7j46IoQ56bMNFm3eAkzBRE92M
KZ2XFH5QGaPw/n1xJnMwu1Wq5leAUujstMRYIZIweicY+oiMbcRWXjW2tYxW
tO2Sy5QDeItk5fyfhpX3gN25LYLS0QYuD9v+5HqBASofaLT2yPGmcAyIUw+F
glHfSXbEZJzgdhdGMl4Fhu0pvQpaJ6tiy3Rh3opqT0N7Djrcr5nEn9Zp3SjE
mMtEPGejc+Mu5XsM/ABHg78DRIgBQfDMxXNUN7xaAZsBrsu0CBwWqx7IvUnl
PCmSJbB6U+hj8MGqsMQMkl6JWSnZMwb3HYPn0nuvITQnSEvFHcGxirQVlhX1
WNwFGvgOTgfQBQa1j+zOD+0DLqRI/A1BbwGYH5jJXS/WE4d3goCGDT3PRLRU
3kGCEZGNwq1h3AKcl9FcsiZ4J68wlDTT4t6bHyZn9/r8Vxy/pe+nL/78w9Hp
iwP8Pnk1fv3afemZNyav3v7w+sB/8y3337558+L4gBvDXVG51bv3ZvzzPRYJ
996enB29PR6/vtcMZiKiMdQkmf+ARxHhke5ZVqcA6PP9k//+r53H4vr631AF
7Ow8AzebL57ufPMYLi4XMuPRVAbLxJew3lc9EBIyykmWgM4DVZMU4I5TmAf9
R+A8mUvA5O/+hpj5dU98O41XO4+/MzdwwpWbFmeVm4Sz5p1GY0Ziy62WYRw2
K/drmK7CO/65cm3xHtz89o9pkkkx2Hn6x++QesQLK9kbYZ43PhTLoX0v6j+a
mJeWsUlt4H0AqTfUFF4pwtI+esqa/enuN7/SEsK9p4/pHm6Q/orbDmK8/9ro
RGhFAv08SYFiTAiau7m+Nv0ARRj9Y1jfecUu4LqMshIo4krYfTmJY5iwmGqV
idpHRWFIlg/VgKixZ60IqMsVDMkC2hwmrOVeGsvJ6SBSumG0ZE2UZI1CGTWi
AjABE7snaRirHCBbKd54aW9Cnk/dWbJR1xaf9Pq6uU/58SOFOgERCYs2DmwD
IyqYPK9DOxKaQZJWxeRXpmU9ZomO0GRqkfR9YXcZaFjsrOkOXmY+MApj8IDf
vgcUmM3FP9yzm573Rt/xTDOwGlYru7fobOt+QGS0y4CrT3k1vNOTLK08BLIE
663AleLIIA6OYZwioHwQkfgtIoFHr9hVY4VBW3ZiUuRJXIjy9OSl5yqH/+Jq
hTt9nSvwLyDDoTE+tHGFibACIDFSv8LdmGAxvWDHyLJfipdHzymEjnuG0CIM
2pP34XT+V7puEtrocJMTALq5qliFvC26sJTPmkzS6KDSMRugOlTTrhyKt8go
l4mW/eBdWF3QS959pxV7rXADpbZgtKsQwbThWV7d/i0Waob7obUuGY9IWuz8
8FoBdJ+NulzOwS9JXTRchphCgcG2SzDNRNsQzIw4BF4t+p/I7MuIiJVRwWhy
/O8Q3yII0Lcy3qln7+try7wopRD7+1GeJwDEYR7NpDgen4kFWgtAwUZ/oNVv
Xcy26JEZtS+mZWFEHbqJEcqFIhk4YVoolZIlUrF2OgXoecuAOFwU4NjQ5dHx
5Ojghd3ySmGCTHM4GbIzUfMAm2YaZUpbv4DQKHNXpluAJhVvfzjDznmbOewQ
5zgDAw69Otw1lqQYWvpOtDO9FXq8RU07BGTjYvatpjpTOhgcTO/GXfYE39Eq
qbjts26kVfZQm2Rh5ow76gIcb1gvk3N169YpEhpYX2Hqp7GywHevm1fS7O8Z
GYNGfeicgyNCG30Ni0tlmwpvhNm0aPBgH52oFScIpFfGdTcvv6p23+61apiO
wnXRZkeDiby6a9ay0wkY8LqJFcX/oZlk5KusypH6jmVoXIItkWBKhYF9CUTj
UytYc7lZ0A55Xt0iH641cnGJKjqStn6XS1KLpQkWsXe1KnOMweBSNa0NZ/da
swPIXXEQio1D0gFsPSA+C7WiCI27R1EZNFSgD+gM3NWKZgPO84NSQgFwSM3E
6TuX2pvT7o6xqx2Fo7BX6G0DMyqfrUHaDVzwmBIB/JAwxOwqi5ZgfluTtC8W
yXzhZTfQIOq4hYxmTlUmGfovlPfAu9nSztGkPRN6cZhKHh9HA4NlQblqd9Np
zbh5sOWO+MswhU1hLCAWlzA/oycImDhC1VZFkBPA1o4ksa+vlqD6YWwXawUQ
F8kMJJFZSBYzwK9j/67Nve6BnqEcoQWQPjhMvJva0iktuHuVbDUDBYltCkmS
A9V3+007ZF12MJcxGHD3/KhA61pbstvd3t7Zm02f7u2NHu2S5YOpj+wUYoeY
+LUweTeXqtVFA9KivVMWPQAIJc/zxe5QvDRWXKpg7cEOoBwowy8EmMlIPOcI
K47k5hROT75HiaiN5WMsDtsYtDkgznEkrFo5HdSn+HR7exvn+QjHiMm2QE4m
qVIBfrMh2AlrG2j9GLvEVSQ2ZDYL8EZvpjLKTbIZ4Rf7WT8Z6jtAGdiBYBzY
wbp73WAO1a5JNWcdC40uH9DwtLS2je8zjMJhOpVRD4a/0JPkTKwmdSH+gSkL
FatUO7/x7QS4HhbhaDI4mrBNBHY1aaZ20FAmcuQpCZmHpHUKhjyO7QnN7TEw
xbUTQPtaV0iJXG4UpVoiTZleOAraZsF2EJGbEg5bYaKAeepKMlizMSVSUVCW
zDzARdIqdKC7iuK1cX2PmQCp2HGeo/iqoBSFOjrgTAOWpWdJLl0WjgG5Yn9a
crTTkRnMRrIWxqAlvIJqcwo6pG9oFp0ZDipdsVPNQpxIL1kmmIbWMkc7p8CC
Ga2z0FrFKbr4uIN46779mh393ro9znUfYJebrsYBPJ27n52Nb+zSPuoG7V8z
shAj/vNLV9N1jUf2S3frzsYj/7WzdaNxY65rJt9ofOP5+aZ6Y7cBY8fID+8/
9CPTxUYjmxmH8xy1vOAan4UCy3yCxiPR9oJt3MjgxRSDX3xbI0xZJ4RvYWMQ
ElUpGI79CzRuf6Frzg0ubafQ9sZwq5rf08E8XY1FID7F3Ro/qNhmW3dq/Flz
3vBz83kCsEfBsFBn1z/V57s9cYCh2OrnWL4v/r5QK7pY87zXZjmFS9P23ArE
Xhu5OWlZaeyfu85hpmiiBBuxt2rtipUA7NGrmgrV0Zw/5fdMg7wkh90e+onu
iiKbgXM7dDkx3kNxCTGtDkqre4L5MEdrhqnEEsRX97/iyJPbi03M5lHVJuag
qq7tJLfYULdax5XoEsUHPM7RTLvLGHUDrV8NFgSToBWqLw9OXFfIwgWqJmzA
pFcGRqchWtFZ6CpKyXBp5N5tbHd2OxbWXSZza+PpAGmyadaOnV3uM1jnaiav
X5+OzLUO05mjZvfFK3bOT+iVXg+9UZMJIKbYI4Z8jDeKW9QdDjTDaNm1LdDd
yH4hOjZhT+8bzTZzdsg6ZkOXkgmYTbyiHFnXStvoA2fzr+vTVnw0HHgTU8Dw
p9szqxHZhhG/dkJvFrDYtPomojsWmQIi1TiLscHdp1sXrckEFJXkyEAXUhpi
+IRuYPC5zGIZetLNLh5ckpfFpShXccRK6cZUcfANs34nj+rDa5lfAD4S3jEC
gtmiJ5iScXiy4TxCVDz8NFSEn7uYCF+2iy8wETvyW59IvBFMX5ayRIexvcbj
aXbRYa7f0kfYRafBv76PXgsGcOqbmn/4bs+gG/jor7bfGxGuQqcbZRLlqY+A
t0oM59f6cN7U4y57nOGos9dGcPg+OvBx03y19UN9rHn25fp46Dmnay639uFw
+qQTp5vBcf/z4KAP+68Hk1PBuQOoHMi0uTNOW1zUO/cBtsfJo+aD2/qok0/D
d9+gj3rdSSN4sFEf3k3ZFU1i27QPUHknu1vV+3fp4/PwEYgEOZvLdg26to87
ybGQ9qpWTWX0LMAsEWivLSbCBGSKz0KDwaZOk0XVu827exL4dk/W+HbGgjJ+
3avQnkKI9w+O+QAImGLo0aH7uq8yyow6kCkeq3PlD1N6AM04x/uA4rxiwig4
lUWZZ+IB9Lbld9ESDkfDoJpPzLiQrtwCt5are2lNw7SxzJmpjOW8BGnAb6zQ
usJSj3bTqa9rZgriUdgez+VSFbyX9kpdSni935UkUu30i9jqNtxuk+LQzfmJ
NnwIT4k22+2+ptmj7pJ2hk3dfSuSXDC9k+BCv4B803aWs2B25KKhF2YWvc+p
CYwZOkpA63LZxcr4cnu93W64O/Gke9frZLfqV+4OxU/1eTjn2Z7UQSmA1nEx
BFBdXe8d82YHjJ4z/a+hxo3IxgiHk0dcEdvJ5XcMrTy5Y2ilBW+VnaXWadYS
7eoEVIe4lpMU5JopIwf862siEa2gJOfe5/LZSC6j0McZn5gcf5+cU6neaKTW
fOHcmjtk37p8GTtHzJa6aKmqHxJ8U3BdZwMAxWceZKHo7cpGaqQcuMhnwHGP
7TEYbSlR1fAUusEXvvCrEh0ITwUIZotTuC1TJ6CWzRJ1KHxwEtJ9ze6oPuu5
1LaTndHJbs3OqT6rOQgdNcC1Zw/JNQH0m88vnd5a+OymV7Gy7X5Q3YTCu+bZ
w1qrYOOvaYhV3KnaWF3mWs3pCFvdtlsXQBW0um2brrVVBXttzaqtNtjVa5nX
Btt5Nffp08dqnUoLjbTj8LZ9v/ZWQbNWamxr1W3N2yfub9AK/zqlXu2Z/ket
b6+rraxGaraqPqm2Qp9lp+GzNL2Zu8xr0DKvu3zqcmOzz8OgnNnJ+JZi5jUi
Ho38574uB0WqS+/rVyU02RAYzl9T4mFL9VuTvzHxsKvwY6teWM/njNT1UcXu
bs0xhLmiAsI8e5yMTYb0OYvWMgElg3V8oCcoYdEWdeBpT7n0B2g1tXI0UyvS
X3RUkvb5RTVVS0lG2iTvWA1F1qKO4hxrloyd6ZJkQDXyUUv2lCZMhU+TZUKH
BdljdeJoFU0TfLXvdligU1qS28w5WkMqGwtNIK4aV1y1Z0pSvW1C+ynNo25N
CrVJHf1Ic6U66A8+YWeTAjWY5AVm7swzRAmeUEcz9on/PnvTpHdiMN1WhPrK
DJOB22kp5OC+crUZZ+XWcktN+l+pfTFbdyJrS94rpfbNyyiHGchGvqyBis6d
aJbHEQao3LmSLsxJcq5xMBWb20olTK4cyVi5LXnE1aThu6UDc01nW+qtW5gQ
Zpd7ywUZ2EPDTG/ZEAeuka15Wz4Jt5ZuGybG8jhLILboncy4zlAn1GNn6TnX
odHTvvFlzP52DUEWG78nVK0ZKrP9dYy2dqwa6hHfQWGSrR/zWGdqCsobOa1Z
B8nPKMeQZNEfVmT6vkFVWj/RpCWLwJdjT68C4WXORQAvfRnlIH0sJaBH5Um/
ni6OAAVyCo+4ZuM88M/z//mP/wwrpQDTp/Cnlj/q6118IbgYW4llANEWhCot
SZcByGetEb+7yA71MKpUYSIuUbADLmxFRs3xDR1alNQddLNBOrnkXNa6ZKBe
I3RogOSByzWGzAJ4AJdiIUd6wSVGvrjWFdnFRYgqpz3bJKBXNt2ilxzkag08
qrdjedlexRycS1Gvs8GKH109YgMk3EXtfFROaODjSswxnQQb6TFQvGU6c/Wb
wIPwlin9IH1iAi0ZgNetgIbk84+tQvHHlnL0c31jOsFRm1NL8ezW+kkojhHK
FRYXbaAPORQi8GB4r14aUpvK5bHq8EIl5gjJkAMBOy1CljgdeSSogBRHNQlk
auSnuBJcphFhQQsnYNtTJZHy+JSQ0EJcf86DMfBclY4PL5pAXEtJbd8tYGAw
0NwlzgjPD25RPXVsNOQRHyTJ1V3wLgpJm/O/qJeDVMq/rDDmtO8piqKAH+kV
Zzm6IonI0reMAIv+dBM6bzPi2qVOHq+VDFh0VKmQtDGOEhbP24MswsoYbo4l
dyDAK+LVBBsrp2oEz7d4uTn2RivYjtfnFAeSc3NqUld37YiywON0vKxvnv7R
JlGD831U7qwHK2evCI2WRxHZAAYb0b7iu7W2zzOgLatV0GNGPOeMaZsJU61a
CA8cqJxrbKOz9ohKU+c3dtL2B1qtjQSQEwTIlVhQVTHK1ldHuVOkupcpH5EI
dsl//pEtMA5Djr4uKNOF8cZWoJAoJp5emcOijPYxKkXwJkarSqIaCltwahQD
Wd9UH2yzuegMT3+Esd2AaDUWBW8ZUnzQ+5BAMe8yPt+y1hDPqDUYBXhwRVkq
OpXDrlOHk8DoT1nF/ARkZKy+oyxmDQfvH1D0lH48ZJP19keY2P0SGPsiIrHB
ninS04SKIy0/aSzkKlNTcYcvNcUq4droBktLdF7CHCtwZ1haAfwaZVKVGtMT
b1esgSaxHZpDs9A+dvNHfjE2ATsB4cOZQw7MyRAoEjaxo+mfCffKSARzGptv
aE/KooHjlM+n8SNMYYnO0dazGq3pnrE4irE9bw8GQtYfAY2UfZ7kms7slmAC
lCwCaduyfui3PyPXlae3FMeEs4Qh7RHNoazCE76cOIyWsgN7gbNEtPgSt5n2
VQa0OsdTyzcXNdEsWhXN6lUjvP0ludNt5axZh3ztrN+s17+Ct0eQOMdrAXoP
AGo0hkWPrKWBOkG6K/SkaPlAwYDF+6FZAjrjWFjsUWTPKbM7T+Y4fTolnCQC
G90o5N/b31MIo1K0E1T5vYiaardUZU9CopgIrGKhFNtfgfQFhx4lWMU/QuI1
PtBU8g6olc7sWLVJcVPt6W0Ce0CWN64ZDDosAyjn2L3pfjni0JpavZ5/an+0
gc5d0IEsCGz1JNvEPkfXCJOIqx0iU9JZAEZ+VLc8/cle+DymUwevr9Elsd18
RAsjSlKW+a5zFiCIFSfg2RuytZ+3AUsekkPNfrUT9oocCJtwnbYrwduW5uwn
JyIwlGoHuyhTnDWZNQnHW1Gdljqos2v3QMLfLLDtYKSUfnCAztLnMw/TCA1e
a+BQTMhU3Nni+ioe68diNmyklt3S5sxNGTrblZa18GdJsD4wdvaky6BYIgnO
bbRzxmkrbkefTAg+n9OxQb+y4uxUUfQ4Syj3hRG9xB+pCcwTKxFwZTwDBWou
UG32dzbIzgdXQ/NxHEvwFOMEf8KgNeWD1c1KJTp0HjdcnP07DWXVP+cGsIVP
4UqMK5HMA/87L43pwL9S0bq2fDn0PKBVWjL5Vw/EAp42vy7CxxHKK2UqsH2E
u/Ugf2Kxo/HxuJ29EsDJx/oPBVRO8sekDjw0ivpAv8n8KA1KODGO0RRMMSuE
fwCu9wbfxV824F99MB5+SUYNewMmD2xPfB8hdb2JQFz3xfMoB3o4zCUIoz6o
XEDOYaT64t9VkbyL0mhVzhIxyZM8WvbFOCsWCsaZ4DaYlkVf/FzCuPBP/BW1
Z18czWEVX5dgtC/kBTRIL6JcYa4VzLcvvlcyFa+iFHQYkPM4+UeZiZ+o3Rug
oQgenuLffKaR3F8nYp8qug9lXogDRXHlPv2A2HtcxNdJiS+Bg8tfv1eLTLz9
6nmecBl4SklfagovAA//BVDOPzy2z6Ce4UxO8g9Xc3h/BtD9DA8/oI//Z+iM
XrqMaBjo7XswWzT+dhKBh8NCE3FQZtMox7GmCOJkFdHhEj+X4iV0MSnkCrt7
CSiGqeGJtPx7OVOgJ6CP3v8CUa39CCZwAAA=

-->

</rfc>
