<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-14" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-14"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="03"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 87?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 91?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. Network operators can implement SAV mechanisms at multiple levels: access-network SAV, intra-domain SAV, and inter-domain SAV (see <xref target="RFC5210"/>). Access-network SAV (e.g., SAVI <xref target="RFC7039"/>, IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/>, and Cable Source-Verify <xref target="cable-verify"/>) is typically deployed on switches inside the access network to prevent a host from using the source address of another host. When access-network SAV is not universally deployed, intra-domain SAV on routers can help block spoofing traffic as close to the source as possible.</t>
      <t>The "domain" used in this document means the Autonomous System (AS). For example, an AS that consists of multiple IGP instances is a single domain. If an Internet Service Provider (ISP) consists of multiple ASes, each AS is a single domain.</t>
      <t>This document focuses only on the analysis of intra-domain SAV. Unlike inter-domain SAV which requires information (e.g., Border Gateway Protocol (BGP) data) provided by other ASes to determine SAV rules, intra-domain SAV for an AS determines SAV rules solely by the AS itself without communication with other ASes. Intra-domain SAV for an AS aims at achieving two goals: i) blocking spoofed data packets originated from customer networks or host networks of the AS that use a source address of other networks; and ii) blocking spoofed data packets coming from external ASes that use a source address of the local AS.</t>
      <t><xref target="intra-domain"/> illustrates the goals of intra-domain SAV with two cases. Case i shows that the customer network or host network of AS X originates spoofed data packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed data packets can be blocked (i.e., Goal i). Case ii shows that AS X receives spoofed data packets using a source address of AS X from an external AS. If AS X deploys intra-domain SAV, the spoofed data packets can be blocked (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>Two Goals of intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The customer network or host network of AS X originates    
        spoofed data packets using a source address of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed data packets can be blocked                 
                                                                   
                                    Spoofed data packets                
                                    using a source address         
  +-------------------------------+ of other networks     +------+ 
  | Customer/Host Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives spoofed data packets using a source address of 
         AS X from an external AS                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed data packets can be blocked                
                                                                   
           Spoofed data packets                                         
           using a source address                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>This document clarifies that the scope of SAV is to check the validity of the source address of data packets in IP-encapsulated scenarios including:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including global routing table forwarding and VPN forwarding scenarios.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec <xref target="RFC4301"/>, GRE <xref target="RFC2784"/>, SRv6 <xref target="RFC9256"/>, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>SAV does not check non-IP packets in MPLS label-based forwarding and other non-IP-based forwarding scenarios.</t>
      <t>In the following, this document provides a gap analysis of existing intra-domain SAV mechanisms, concludes key problems to solve, and proposes basic requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Host-facing Router: An intra-domain router that is connected to hosts or switches through a layer-2 connection.</t>
        <t>Host Network: An intra-domain user network that only originates traffic and consists of hosts or/and switches. It sends traffic to other networks through the host-facing router.</t>
        <t>Customer-facing Router: An intra-domain router that is connected to customer networks through a layer-3 connection (e.g., the static route).</t>
        <t>Customer Network: An intra-domain user network that only originates traffic and consists of hosts and routers. It sends traffic to other networks through the customer-facing router. Different from host network, routers within the customer network run routing protocols.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among intra-domain routers.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Intra-domain SAV Mechanisms</name>
      <t>This section introduces existing intra-domain SAV mechanisms, including BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering or BCP38 <xref target="RFC2827"/> requires that network operators manually configure ACL rules on routers to block or permit data packets with specific source addresses. This mechanism can be used on interfaces of customer-facing or host-facing routers facing a customer network or host network to prevent the corresponding network from spoofing source prefixes of other networks. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is also typically used on interfaces of customer-facing or host-facing routers facing a customer network or host network. Routers deploying strict uRPF accept a data packet only when i) the local Forwarding Information Base (FIB) contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a looser validation method. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>. EFP-uRPF <xref target="RFC8704"/> is another SAV mechanism which can be used on AS border routers as well. This document does not analyze EFP-uRPF because it is an inter-domain SAV mechanism with a different goal from those described in <xref target="sec-intro"/>.</t>
        </li>
      </ul>
      <t>In summary, ACL-based ingress filtering and uRPF are the two most commonly used intra-domain SAV mechanisms. This document provides a gap analysis of these two mechanisms in <xref target="sec-gap"/>.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the key problems of current intra-domain SAV on customer-facing or host-facing routers and intra-domain SAV on AS border routers, respectively.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV on Customer-facing or Host-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of customer-facing routers or host-facing routers facing a customer network or host network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source. ACL-based ingress filtering and strict uRPF are commonly used for this purpose.</t>
        <t>ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. For example, <xref target="multi-home"/> shows asymmetric routing in a multi-homing scenario. In the figure, the customer network (e.g., a campus network or an enterprise network) owns prefix 2001:db8::/32 <xref target="RFC6890"/> and is connected to two routers of the AS, i.e., Router 1 and Router 2. For quality of service and backup reasons, although the customer network is connected to two routers, it expects the incoming traffic destined for prefix 2001:db8:0:1::/64 to come preferentially from Router 2. To this end, only Router 2 advertises the routing information of prefix 2001:db8:0:1::/64 in the AS. <xref target="multi-home"/> shows the FIB entries associated with prefix 2001:db8:0:1::/64 for Router 1 and Router 2 (other prefixes in the FIB are omitted for brevity).</t>
          <t>While the customer network does not expect traffic destined for prefix 2001:db8:0:1::/64 to come from Router 1, it can send traffic with source addresses of prefix 2001:db8:0:1::/64 to Router 1. As a result, there is asymmetric routing of data packets between the customer network and Router 1. Arrows in the figure indicate the flowing direction of traffic. In addition to the example, other factors (e.g., load balancing) can lead to similar asymmetric routing.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in a multi-homing scenario</name>
            <artwork><![CDATA[
 +---------------------------------------------------------+
 |                                                      AS |
 |                     +----------+                        |
 |                     | Router 3 |                        |
 |                     +----------+                        |
 |                       /      \                          |
 |                      /        \                         |
 |                     /          \                        |
 |             +----------+     +----------+               |
 |             | Router 1 |     | Router 2 |               |
 |             +----------+     +----------+               |
 |                   /\           /                        |
 |Traffic with        \          / Traffic with            |
 |source IP addresses  \        /  destination IP addresses|
 |of 2001:db8:0:1::/64  \      \/  of 2001:db8:0:1::/64    |
 |                  +----------------+                     |
 |                  |    Customer    |                     |
 |                  |    Network     |                     |
 |                  |(2001:db8::/32) |                     |
 |                  +----------------+                     |
 |                                                         |
 +---------------------------------------------------------+

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0:1::/64   Router 3   2001:db8:0:1::/64   Customer
                                                    Network

 The legitimate traffic originated from customer network with 
 source IP addresses in 2001:db8:0:1::/64 will be improperly blocked 
 by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>If Router 1 uses strict uRPF, by checking the FIB entry that matches prefix 2001:db8:0:1::/64, the SAV rule is that Router 1 only accepts data packets with source addresses of 2001:db8:0:1::/64 from Router 3. Therefore, when customer network sends data packets with source addresses of 2001:db8:0:1::/64 to Router 1, strict uRPF on Router 1 will improperly block these legitimate data packets.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>In the hidden prefix scenario, the host originates data packets using a source address that is not advertised through the intra-domain routing protocol. The Content Delivery Networks (CDN) and Direct Server Return (DSR) technology is a representative example of hidden prefix scenario. The edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from the intra-domain routing protocol and intra-domain routers in the AS. While this is an inter-domain scenario, DSR response packets will be improperly blocked by strict uRPF when edge server is located in a customer network or a host network.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----------+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       |     Host      |               |   
                       |       |    Network    |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in the host network with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>For example, in <xref target="hidden"/>, assume the edge server is located in the host network and Router 5 only learns prefix P2 from the interface connected to the host network. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 adopts strict uRPF, the SAV rule is that Router 5 only accepts packets with source addresses of P2 from the host network. As a result, DSR response packets will be blocked by strict uRPF on Router 5. In addition, loose uRPF at this interface will also improperly block DSR response packets if prefix P3 only matches the default route in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes. ACL-based ingress filtering and loose uRPF are commonly used for this purpose.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 +------+ Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |    Network    | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>By configuring ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. However, the operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>As for loose uRPF, it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, existing intra-domain SAV mechanisms have significant limitations on automatic update or accurate validation.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. As analyzed in <xref target="subsec-gap-1"/>, it may mistakenly consider a valid incoming interface as invalid, resulting in legitimate data packets being blocked (i.e., improper block problem).</t>
      <t>In summary, strict uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB information to determine SAV rules, which may not match the incoming interfaces of legitimate data packets from the source in the case of asymmetric routing. As a result, strict uRPF will improperly block legitimate data packets. The network operator has a comprehensive perspective so it can configure the correct SAV rules. However, manual configuration has limitations on automatic update.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. As analyzed in <xref target="subsec-gap-2"/>, any spoofed data packet using a source address covered by the FIB will be accepted by loose uRPF (i.e., improper permit problem).</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>To address the problems of current intra-domain SAV mechanisms, this section lists five basic requirements for technical improvements and related discussions that should be considered when designing the new intra-domain SAV mechanism.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy upon existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the two goals described in <xref target="sec-intro"/> to block those spoofing traffic from customer networks, host networks, and external ASes. Meanwhile, it <bcp14>MUST</bcp14> avoid blocking legitimate data packets, especially when there are asymmetric routes or network changes. Intra-domain SAV on a customer-facing router or host-facing router can generate an allowlist SAV rule at the interface facing the customer network or host network. The allowlist contains the source IP address space of traffic originated from the corresponding customer network or host network. Intra-domain SAV on an AS border router can generate a blocklist SAV rule at the interface facing an external AS. The blocklist contains the source IP address space of traffic originated from the local AS. To overcome the improper block problems, routers may need to use more information (e.g., SAV-specific information provided by other routers inside the same AS) other than the local FIB information to determine SAV decisions. By integrating more information, routers can learn asymmetric forwarding or routing behaviors, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically generate and update SAV rules on routers, rather than relying entirely on manual updates like ACL-based ingress filtering. Although some necessary configurations may be needed to improve the accuracy of SAV, automation helps reduces operational overhead in SAV rule generation.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> specify the deployment scope (i.e., which routers the mechanism is used on) and <bcp14>MUST</bcp14> provide incremental benefits when incrementally deployed within the specified deployment scope. That is, it <bcp14>MUST NOT</bcp14> be effective only when fully deployed. In the incremental deployment scenario, it <bcp14>MUST</bcp14> be able to fulfill or partially fulfill the goals described in <xref target="sec-intro"/> and <bcp14>MUST</bcp14> avoid improper blocks.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> update SAV rules in time when prefix changes, route changes, or topology changes occur in an AS. Two considerations must be taken into account if SAV-specific information is designed and used by the new intra-domain SAV mechanism. First, the mechanism <bcp14>MUST</bcp14> allow routers to exchange the updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> require routers to signal too much SAV-specific information for the SAV function, because this may greatly increase the burden on the control plane of routers and even compromise the performance of the current protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or protocols. <xref target="sec-security"/> details the security scope and security considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms can ensure integrity and authentication of protocol messages that deliver the required SAV-specific information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security mechanisms to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 379?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA80923YbN5Lv/Aqs/RBpzYskX2JrM5mRJVtW1pY1kpJMZpIz
B2yCJOJmg+mLZEXWnP2Nfdtv2U/ZL9m6AGj0jaJkz57lOYnJblyqCoW6oQoa
DAa9XOex2hVnpkgjJfYmk1RlmfhBxnoic20SoRNxlOSpHEzMQsKPY5VfmvRD
Jg7lUuwlMr7KdNYXJ6kZx2ohznKZq4VK8r6QyUScqt8KndKDrCfH41Rd7FbH
O9v74fjVebN/b2KiRC4Atkkqp/lAq3w6yORFouB7MMBgyT0Hmes52H7SM+PM
xCpX2W6vWAIm+AX/2e1F8P+ZSa92AbOp6WXFeKGzDDA9v1rCZEevzl/3enqZ
7oo8LbJ8Z2vrxdZOT6ZK7opTU+Q6mfWQALPUFMtdC37vg7qChxP63evJIp+b
dLcnBj0B02S74mAo3mr4wRgdyIR/mnQmE/07UXpXnGcw+LyQ4vtEX6g00/kV
tFGAZQzQGFyS5E+5bTRUk2IYJdAggna74qXSvyJs8NsUQB94tD/XiQyA+G4o
fiw8EN9pmSyhBz+7AyS/2o5/ilQKq3EPQN4OxZ914iF5K5NorgASflgF5a9z
k8xmBTQpgGhybFKZw/KV4Pymkzj6E34f/j6LYjm+B0DvhuINTDHzIL2DDr8h
cdzjOwI1x26L3z4TrOOhOFQBVMfAN/ZBFR6A8lLpcvoZNEqAWeb0fBiZxe3T
9hKTLmC8C9gkPdwb/pcQp6/3d57vfG2/Pv5664n9+nRne8t+ffJ4a9t+fbHz
9Jnr9vVz1/a57RZJ2K8DYCs9vcLfQlghtI8vrCga/EDvSYgcnXjBdKaiImVu
FMJuM0E/gCAwgs4iQz9ps4udrZ3twdY2TyLTmcphafJ8me2ORpeXl8MI2yN5
RtFIJaMiG2XFcmnSfATSJxuNUyMnYwBhQDCPGPLMwjDa2Xr2YnuQMbyMz3Ce
L2KY7ujk7LCKm0mmegb9gKcO3uyfiNdK5gXg5DC0EviwkOlkbey2n90Nu3zC
iGWXOoctl41imQBWOUrxfOfFs61RZqb5JUi7UapiJTM12t4Z7Pz96eO/w9fI
4kBMN5oVeqJG2CmLZjDiZB4tn+84AsB6f731+IVd+mfPXxCbJDrLB6mKKqQ5
VZmONQhuVAwqtXrhHKT+VEfi1cdoDntJiYF4eXjiGYDIdnBgzmCr5npGIHWQ
7fjo7LxKtRerqIYwDmfmYrQsxrGOaOQMyGGBROXjgBzkDORAWSAH49nS88cA
GWcyMdlg4UF80IN5e8PhsNcbDAZCjjMYIsp7vfO5zgSsTYEaTIBOuwDqAnOI
GahZadWsMFOhPgJ8yEWhEhTMhELabXJR6u+FQtB0tgAlDSNGqR7DuPlciWmR
TCROJ2NhlWjGWnuipjqxrcYyg1VIAz0uQDSIHIZNgDqx0AuEll9ZtBZ6MolV
r/eQVL2ZFBGBcv0QSEPK29z0et0mxwYo0U0B6MLQsBclEASnBKhUMkHU5Qxw
zvI61tnSmCm9z3MZfciGzlgRZqlIQmcgfBIcNiZ4UVsHBIJ+YlHEuYbXIlYX
KgYZLKMIxh4kdiTo0a+Snp4g1YgxgqdiI1NK/M1KyV82h2KvMZbYUMPZsI9f
j6gpbppf+nWBIDZQoGziYqiJABKRCMkSY0iDX1/j65sbhqNNjF5fh1L35obI
m18tcQXjKyDtMjZXPLSTDaiCgAeJCZgIwgGeG2AYoA9QUIq5gZWYpmYhCrQa
qH1tYYBtZWLgRUqtwQwBdd9CWQQK2omCrY4KaE2qI7BghAHReVnnKl6KcWyi
DyUn2A0qJDSJTaYQ9BDATCwNWH9AmqHATajEA57gAWCjcE2hebgzF0omvDH2
itwkZmEK0EogPcF23dg7g0V+DayqPkrkMVwPsXcGzYGzQHrCFs6JGp7LjkCk
ISuDJYEUxw2PRIQ3DMZQHCHtWDICpUD+pRcaID9hCZECZ5ydbLYPvnemYEMr
Gc0RiLbB63JnCl8yAMQkQHmT8NoHwqe+BEMwEGP9QTV5/3KuYVorNjLh7Qnc
3szyL8FeBvgPQShfyitEKDeRicUGiPlNlNVy08nBiRgDOMQ/iBMu4gSM+3QB
UopmS4sYUW1wCIoNXgLfPis7CPQRAFEYnBYUaJRnKp4K2AFzYCyg6mJRJFYH
0NMAimHDjwmmk5rFCdBeqwvixEsjZkaiSNGbzKb4mDgVEER8xRKklsJFTPUM
TLIcntPGgkXJzQLmTZzzZXgnBQ+mDgdiNlhFXO3GNmTwXa9/Y7l1KzxAB3xH
sKiPyIkg93klVk2GAMG41BY0w/V1uD43N0LHcYH6L7eqhsjTxmZMeqRgBAIQ
KL8P/wgtsrm5tDBg/zqZ6lTCoYFAfynpm7Xjy4LsdvrR7qQRWUplLZqBpE0r
UYFTxoopD+829FDBrjg0qFI3HYoVHGkmsJ4USMc7Q06daQVh3mAR/2k4IBK9
3j/+8Y8eowJe5T3XCD5kreHns9bLDdJjCHfXQL3z4yFalzidA3zGZ60xztqA
u89AHWQOxng0WP151LEmj9xrGOOT2Lc8MnqDjHFcY4xP7UN/+8m+Xg+O9k8I
x/+Hj906wKmftfdLbLqkwC1g2B39ORumhOGeG+ZL75d1tsVaA92yLVaN4fnN
MXf182g1t/IYju+/aWd1ev0TtFoLjvbPGnCgnL/eFQ8rDMEe/h8enIPmPuxS
7g9u6lZoFEvwUrQKVHsWgQuHva2XABYg+Chg6eNL8nYxJmBtjuYGqKwxRrRP
BiqJ5DIrYrKyskglMKfBl1FcoJO5C66sOKYIGHpjYNpdgiOGL8o2YhabMeyM
lOPCIifPq2xK5tUPJ8fhIz8VaMdBA5DzIklUjO4euMrkEGJYDRzCw9NX9BPj
afDz7PTiGf3GUBv8Vnk03Nxl+x1nsbZ7EAewtCF/ScTyCv4PaFkaESwvQTDD
s4snNiQFM9jXaHKBww6knxjFLhpTPzHJAEYJKPvu5O0ZDD9W8YCd1Ro1rPCn
fs0WIXF6R4zD1MSxuYS3/ZorducgSdXb76PThAsJI3xQVz4EgrwFjsGFYm8a
HoOLCG06AiHTAsN4QHAm0sOH4pwcDROb2RUT7bTAMBdaP+h2IJWkdVyZwath
mYVcklOfqphjT3MNbi0oQYU+c525N8ARn+qPmwSrX3JkUbbZyTGbykhtZGCP
HeW4ecizBaenhMLArB/YlZqoSONxCMZyUP8OoDMOdEpNQRElVaKGiGh0FYCB
I2RlGBQNO/JVfEwhn0P72RymJhYc7LgOMKOd0Cn85lQAd2k30oTsp5aWonf3
gRihS+wAGeELBwyRI1PJpOwHMNesEwcwknYekIPRBpCdsfI5dGr6d3U6PQ7o
5BxoEnU58EjEg28G0PzziIhPbdTlzgSMarSyRBQHejpVKQUg0DQJ/YG+D/Gg
D6iTdkcvLRIvhJc2kIAMfISxySU0fIk2Be/BQCbCDiriPFAzTpCRvxmrmc71
AmhS23QoctLSTtF2EgxWFRRhAkJGEcbJg+hECM0JSoj8juA4k6kVliWNmN8F
Gvg+yJaw23Hdjsr4DIMVBmyoFYD5OwtrPwoeMyk+DejbgA9wtouFT4RcmLoI
dpzTI0kZng7jKeCskDPFYTiUyHiimokH774/O3/Q53/F8Xv6fvrqz98fnb46
wO9nb/bevvVferbF2Zv33789KL+VPfffv3v36viAO8NTUXnUe/Bu76cHLPsf
vD85P3p/vPf2QTMQiFQH4o5t7AvEMFJfZj0nzSl4+HL/5L//a/uJuL7+F1Te
29svbm7sj+fbXz+BH5dzlfBstA/5Jyz+VQ/0gJIpqYs4BuN4qXMwofoYtMSg
AAY8UwWU/Ne/IWV+2RXfjKPl9pNv7QNEuPLQ0azykGjWfNLozERsedQyjadm
5XmN0lV4936q/HZ0Dx5+88cYo32D7ed//Ba5R7xyOr4RhntXRvT5yKFU+s7W
zKwo1fZ8QmVr2gyl7QdL+/g522TPd77+hZYQnj1/Qs/wjPQXPA4Re/tvraED
vUhnT3UMHENmWmqHub624wBH+KApyYGkcYSxkElBoXF3HqdwDhvSDGLiyJ0U
DYdZWD5U7WArVawEqIuVoSBCedydd1bYEwhvWJBuqEt2G9WpCnrAnH/K28NA
wREDSXyTAlhLw+c/rhFpCx/rtxiwQaTaw3UJIqhZYmlSxLClDCDFFG1HDhyo
MQer63hUfWhP8Ba3fKLxOMNctgjwvsgKEJ0y42lxsIaMh+3ONlsYUxXffARc
7SHmHx64w9UHo28Z0wRMvOXSnWF647ofsMsC1oFWlZJk+LxDL5xks9ofF4Ej
sDg52gh5wMMg7PCbJNFFTdzysB6gQ0Fxlqc6ykVxevK63B+e/uVJ1P8New2t
mZbZQAaxTwAhHk0t8XArWMlSPmMAv1yH16X7EmhR8RIjNxuvj17S4UyOB5Yw
HjMnPLlg4pVa/qusbtq72HyT/wH2malY93wmO3fcL6yhBNODuHCmdzBV0z8Y
ive4WS51pvpBW1h4UD5lVIYW863Bo7TaWtLBEdir+C6tnkDnczMZir36kExl
5Dr2TXkZATpLWAD+nqRL1QyWJA7OIQJKodBgayVAU2cuujahzQNN8/495cBC
Eh8zKZhMXjR4wrfICPSKbUSh3PnX125f39wMxavXJwNP9+d+D9nD1YqysjjW
xHYTB5A7lyqOrbz39o339Mmv/l2VU49VJBE9Kz+T5uFfAAOKDdhG3sDHMx5e
AmAKGKRiLV1flwkCN0OKAGTFYiHTq/5KNYo7hfdtyufVeFS0wP2OJ3i0b+1p
bqdmr6O/IrgAE2R2itLQ8NBDa4IdLJQwQ9JaIvi2ZoKAm0/5Y3aLVkIRJPpS
Ilzb6feaYtEmJzS6N3ihjy7IEuG6UPGVDWc0zCvoWXd6YeJmrIBwLsYW7cE2
Im5QVGb2hIiJVj0UbDnE7cxUWK0jHPZfwhSx0kytPqYN7bU+HrVHyiGwMMCZ
CjYB0Za1iEeFMhPSamrC8FaGr+irVNVYnfUBzLwsUoxf4WI21b43JZ3+B5Fs
WJexAUYSl9U40iU3S4pr+WcUy0KLAcaAwRL05gM9AoK9nBSBpOyOqq3R9y5r
aa76J9Zu9RsCRatBbxb2qxEqyYrUZ6iAixtRDLicEqaYXCVyAfatMwL7Yq5n
c2tOw/4DRkSNMldy4hWTTtAloNAMH+Arh6NNJiby4jSVlDiOkgbLgrLX+siK
hRR1DzIQkH4J5qyZBQVyMBNiXOQoWwkYK2krBMqcdncGHeXXZFcLULSpDQY5
aaAnE+A0XkiEDjb0Q7FXtnUZzb29Zn9OdfHmD+xKTMpB5On8yOlcJBKK8Ry3
gs0YNwkqVhT9GJWUH0iOlkqAXrEllYPIyYs0yersX0mjub6mpJbBHDYqeEh8
Jt6CMrGjbxpGlEmpUziZPKZ+exzJRtZAKMDERRaKBNTx7OgDZ7sXm2iYZ26j
7Gxtbe9Oxs93d0ePd0hDY94je4b1kB+qDy+hXO4GbAU6QGf5KbY5hZ5/7DBJ
foP9ao86MpsKhI3GsEbFEmgpM+BDwCDGDJZa2M2jswIYcovUR1QCmTWcrMHi
Qny81FbE1DHf2t0G7J89oagmzEkNaNE1yRlinRKjc8NCSiWTPtvX7h1YQMBt
uc6sWixXuDSxgQad89stgvkNrczjrGOALMWTJpllJtIkl8hm6RwYsW5dH7HB
Rpj3PwMbHEWfsQE6HADrIGAVMWL741zHqn2ZvAnG63HPFQhJvk3Li2IJw7Z+
QI4ENHzOFeSFwd2QoKlwd3PwkvYVIKtbt2f9JM6darRiH9AW50hTXDYdbmKU
0+jcMvmmfEoEYia1lhXuK8aw4vk7SeOlC68bWvwYXrEyIDYSt1UsE7QTNolo
MSoJPB7SCx3LtAXFIWe83JqAsCI1obfqrHbVB8y5T12dA3g6T3E7O39y6/C4
G7R/zsxCjPifn7u6ruo8cl+6e3d2HpVfO3s3OjdwXYF8o/OnUqx8qj7YacD4
ZWe2GId4jloa+M7nodiwn6DzSLQ1cJ2tmCnPnjHB6+eyb8WUCFthZ9jRTVnk
ev8MndsbdOHc2KXtHNremR758zb34C6dXWbTnTtvVCyNzTt1/iyc1/x8+jwB
2COdCUvpN0TtU3290xMHGJKsfY7Vx/zvc7OEr6te91oZxgs80fraLfu9cpLs
sgOaeNAVnDI6dXxb+i/vq55o20qgIJsAe7+mPBt0h5c9DCqHriTsOq91fVZP
aUC5lJ4Wf6Hb+MYUn6NgOSlUGEzaRyAoo8QF9pxpdsVOtYthdtkjbM77c0lt
z078hGRacrgxazsEaTF9Wiy/wJB6jPEiMHTAAlN9dmUaq8Qn4/edLbCw+l0L
xAtbX1UboAoYK4SBozoPxRt2DU+Ioj7ZpuIwBicGLv0hzBNYJ/nQpTtQINFZ
9JNKUkDjfDg8xCcyY/EcHUIcqBgLQ67KIuSN/YNjzn05ILOP6iOANKfkVIqN
g7PTTa5V4riFZlMV8Muw8ImCMdYOpBSHVvQZCDWZKfK5VGrddjC4aAHIloaZ
BIfoM7VGSiZXVlxFEsuYeFB/go7hbxsgcZHdVC1Mzu7MG3OpoHm/s9CmMigM
Z5GyIapbCN4MFjovNfConM+is7YIcMk1rTRZIYxqooi2VYXsVdq0hu5k7aDH
GuT+062YVqQ3ikrGZ6AYKbcyfEMPZJKYgip6/LFGyxAbl+QqhZxAb7iKhB9Y
Tjx5XJ++QZFNeoMpB4cna+IRkuLR/UgRfu5iL3zZIb4AIm7m92WV0VowfVnO
Eh2W9wr3pzlEh+1+yxjhEJ3W/+oxei0UQNTXtQWxbc+SG/bRX924n0S4Cp2e
jU3/pzGCvUUJb7UxvGv1pMs4Zzjq22stOMoxOujxqdm09UNjrHj35cZ4VO6c
LlxuHcPT9GknTdeDYzVNbx2DPuzMhvrHGl93pmmLkX3nMUAtnzy+Oy519mk4
8muMwf9SXm0bfOuPETir9x5DbJzsbN4fjs+jRyAS2m2KzdvGuJMca7V9uIKy
akh607rq3bU5d8xHtsoutBtcEjjZVr1O48pvUD0tv9edsdLrs4aj9fjeVGxj
ABxMb7a8AdPQ06uc3NARLw9E9elZVixWLUIrRYJQ8FP25WIl0/Lg5WSnYt3a
RI/qEUdtTFuDHgLhq6vIaFO/FcoVtvMDssCr5nXfH9Rx1Bkg4+OsVe7AWna7
XeSTx5tUoOmxlxODPmzFeV7l+z6t+r63OqIhKav0qkT5V1r2HeZ86bg+rWXi
BYkylPmss2AZaVTKEms4uq1Q6GlpNTPyYQbURE0lYGCN8uCIpownPbXZyW2J
D2Bj2Lr11hyHnUaOwxdOcrhDKqLPWXCEkWmqL3wdd1jIjvCNwWOZDACU8nw1
CV3jrpyRxsGqD50Fu/aJRak1DaVc6q8efkXej0seq6dJddah354tEbLYWskS
5DWehNulpm6q73o+P/9ke3SyU1Nv1Xc1u7CjoLX27hFZpGWl5s+dRnr47lOv
Ylw9ethu5OFT++5RrVdw+NPUvxUrujZXl5au2Zphr9tObAKogl63HdW09qpQ
r61btdca5ysteK060vE1lRWr+f5ztaLSwiPtNLzt7Ke9V9CtlRvbenUbce6N
/zfohf+2n7U0Ddxqr/ZDlqZJW+2Fpup2w1RtGrF3wWvQgtddPnW5sd7nUVCa
62W8j+KvJeLRqHtZlhugSPUpVv2qhPb3gazId3cn7K3prpj81ZUFv1mvEOc7
Mer6qBIgbc3zwktyQAFhZjEi4xLSyrwxZ8mAksHyJNATlDTmMtxBgaASCS7a
aSTVopmGYyNNfcGONQUCVUtpeZxOVmoosiozGWERtAsi+qwGn/5DI4Nmm8Pw
sV5oxMBf4xLJpRxrbNoP83VpSW6zAmkNqRomtI+4ttlwMZItZixtEzpVaF7i
abNebfreDeFq84lh9cYGi2zXqbsBJC/AaNazBEmCF4IRxpx1R0D5DDqbYocx
VFf1Vuai2yzITkshVbHmIhrOjKzl99ki2yIra3S6kwlbcg8p4WlWyBQwUI2c
RQsV3aLQrPohClChbiVlk2PyvnOAissvpHoOX5thTeOWXM5q4ubdUjK5VK0t
/dEvTAhzcGUTJjviCA3bvuVcFHaNaku6CRIh084jnJDzOFk7TE2+oT2HgCyA
G+UHlXB9VUZ3bMnOqmqu2qG3fesc2aPQjuM32I3YoHZjTo3clrabtRT4rEpb
PFMrmameBIs0Dna+veqqCPPpVPo///GfYbVFmFzXdccWn1IhpXB+cq2qeYJV
h6WLDN7JtOLHVfZi1UxrOmvNAa2cE7Wegnaef54HJUpuf5EUlegWAOPAXsnw
YBDeuWx4ge4nZ86VVXe+MCfKg8raUv+0yZBSXHcLL1j2oMLG1UiVm4mFRFBl
wRnD4c1mlHB4QdQgvbKa/3f46sCrtmtZus4wqQ6nrElD9mnU9YyvQr+rzutV
QbLJ6cnVmmDUi8fqsr2qM7iKgdzu4NBZrVdCERZ25mFNRkw171Nc+Dvdf8nV
8Yrv8gATKCroammrU8EIKOKJL6ybEP1sKQDpNhscSgDjblhtWcae027lxZlc
Ob26t6DSYAtzVWgUS6xGWUMbU90/jeOz423NDd/g1l3TU9ZBcfVP457G9uvu
+tXL7rhcuhYAeKdkconn0iTJGboLowObqEMggAViC9xdeV9p4dXEENun9fLG
1kCR7KhHaS9HqVcKsKGGXFgG9uydAEEhG4/QmjzbqHdEzigH9WV1gQQuI82w
LDh+mT7bUulSL0m8HYJWKjW9jRopePnWo0T9YjvEuez+JXD2txmiIYcCkDKs
CZhWDZ6V11eQxlQcjEadTBVBLddiVq5lCN8378IsMzP8Ra2ZXKA7smlbgNhJ
wlLV23R8efmLeEnBOjVLOQ5XB7dEzCZGp0m4W4I7fUzq7bSxAitWG1toVtpK
NHjrJRUo6Lx2/J604/pSDlUROi1YoVIxQ1fX5JQl9ACmLOkIcp0KhbGYAb8H
boIrC6K7UFc4GKCGXWFGhpyTKLwCF4y7uqOB3DJWxDDMMq0Sm828vsfO8CW4
6J7wnQZdjknLDR5M7B9hq9pFOUoiVnjQ94Cit/RnGdamPjPxlY26u/72Ji9r
C9hbYt2FBXj7kR/EXVRkEk7wokHtJkBr0wM3BhymaP5wRVH5JoykB7fH2N2F
GroGFooMylcrdQjeWjEOS/fKKvBpEc7g4+AhaJUJXFaUGzpgTxhqisYT1nPI
1NXK2Ie5vxp1hWL1FGKlV6sY48V9jedL+yYBRoB1j+6wk9rq1kq/slonaCVD
+bOtbpBq+HwaHdAd73a1RpHbArZGkbwxhNBQdWKBhty0W0zqzFpTGGHA7Z2V
RupthtVrnWZcwlInAKnO8GYNd8sNp5jYAFI3UC1lkmcKEJ60zoZMZy3OcE7E
CpgqNwaIA/umczp3GQDdSVwkEQts5w2SpYsCBoSTxCNL4liZMS7jIkX/2V4g
h0ozNbFYxjIh7RjWFOP1HOwygednuwPPERyJVaZknLD5HV7MBNzo/5TDGlyY
lXTxN7b480OMFLq/CnBRxCjQKPSl2VxDyVpklbqfNhNXpmDLglXPf5SBCqsc
uHaruUluUGlKHVtLwk3Ngo0qc92jGke7ZVnDvi//zsF+dQx2fUpQer0zW4zk
6ier8NQvXGzcktVyFhmQPaKyx4yLrdAacH96Af/MAirCKCjFsxmkC1RpMxdI
nHDOrj9U1+mKjdIvLx2juAvKMorQJpoygHm1F/h3LQJ16e61w4BEqVGpgJm1
BYJmPTv3pwNKtp3gYi/AiYo03uXemvvKemppdBa6SG5zUP8EUOabA2irBNyz
f6epXGSFj+1J7bCSRyefAgHgV6bFkm3gy7mJOzJ63R3vnpOCZa3eroPXd/Nf
TOB7zdSVsZcJlmHk1tvfyWE/2jvea+dSDURpXO7pixpdhgXGHWgMlLH2z22g
hAAP90MC/gqmaPDfj+q9w7Zoi33w5cIXMi5Ii+KJLnvnQOtd8Z1EPnsnQU72
xUuZAkMcpgoshT6oQaDOoQRN/O8m1x9kLJfFRIuzVKdy0Rd7CVhoMM8ZujOZ
An3wUwHzwn/iryjy++JoBsv4tgAbb64uoEN8IVODKeeAb198Z1Qs3sgYJCHw
857+tUjEj9TvHTCRhJen+G86yZDf32qxT1d+Hao0FweGzMQ+/f2hj7iKb3WB
jcY64a/fmXki3n/1MtXY6dTElIFjxtAAtvJfgOT8d4v2GdRzxOQk/f1qBu0n
AN1P8PJ3VNp/hsGo0aWkaWC078B5yMRhweDhtNBFHBTJWKY41xhBPAMDBV3w
nwrxGoY4y9USh3sNJAbU8B5S/hsgWJEM/NH7XwkzPnxlbAAA

-->

</rfc>
