<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-15" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-15"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="07"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 87?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 91?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. Network operators can implement SAV mechanisms at multiple levels: access-network SAV, intra-domain SAV, and inter-domain SAV (see <xref target="RFC5210"/>). Access-network SAV (e.g., SAVI <xref target="RFC7039"/>, IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/>, and Cable Source-Verify <xref target="cable-verify"/>) is typically deployed on switches inside the access network to prevent a host from using the source address of another host. When access-network SAV is not universally deployed, intra-domain SAV on routers can help block spoofing traffic as close to the source as possible.</t>
      <t>The "domain" used in this document means the Autonomous System (AS). For example, an AS that consists of multiple IGP instances is a single domain. If an Internet Service Provider (ISP) consists of multiple ASes, each AS is a single domain.</t>
      <t>This document focuses only on the analysis of intra-domain SAV. Unlike inter-domain SAV which requires information (e.g., Border Gateway Protocol (BGP) data) provided by other ASes to determine SAV rules, intra-domain SAV for an AS determines SAV rules solely by the AS itself without cooperation with other ASes. Intra-domain SAV for an AS aims at achieving two goals: i) blocking spoofed data packets originated from customer networks or host networks of the AS that use a source address of other networks; and ii) blocking spoofed data packets coming from external ASes that use a source address of the local AS.</t>
      <t><xref target="intra-domain"/> illustrates the goals of intra-domain SAV with two cases. Case i shows that the customer network or host network of AS X originates spoofed data packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed data packets can be blocked (i.e., Goal i). Case ii shows that AS X receives spoofed data packets using a source address of AS X from an external AS. If AS X deploys intra-domain SAV, the spoofed data packets can be blocked (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>Two Goals of intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The customer network or host network of AS X originates    
        spoofed data packets using a source address of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed data packets can be blocked                 
                                                                   
                                    Spoofed data packets                
                                    using a source address         
  +-------------------------------+ of other networks     +------+ 
  | Customer/Host Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives spoofed data packets using a source address of 
         AS X from an external AS                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed data packets can be blocked                
                                                                   
           Spoofed data packets                                         
           using a source address                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>This document clarifies that the scope of SAV is to check the validity of the source address of data packets in IP-encapsulated scenarios including:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including global routing table forwarding and VPN forwarding scenarios.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec <xref target="RFC4301"/>, GRE <xref target="RFC2784"/>, SRv6 <xref target="RFC9256"/>, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>SAV does not check non-IP packets in MPLS label-based forwarding and other non-IP-based forwarding scenarios.</t>
      <t>In the following, this document provides a gap analysis of existing intra-domain SAV mechanisms, concludes key problems to solve, and proposes basic requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Host-facing Router: An intra-domain router that is connected to hosts or switches through a layer-2 connection.</t>
        <t>Host Network: An intra-domain user network that only originates traffic and consists of hosts or/and switches. It sends traffic to other networks through the host-facing router.</t>
        <t>Customer-facing Router: An intra-domain router that is connected to customer networks through a layer-3 connection (e.g., the static route).</t>
        <t>Customer Network: An intra-domain user network that only originates traffic and consists of hosts and routers. It sends traffic to other networks through the customer-facing router. Different from host network, routers within the customer network run routing protocols.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among intra-domain routers.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Intra-domain SAV Mechanisms</name>
      <t>This section introduces existing intra-domain SAV mechanisms, including BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering or BCP38 <xref target="RFC2827"/> requires that network operators manually configure ACL rules on routers to block or permit data packets with specific source addresses. This mechanism can be used on interfaces of customer-facing or host-facing routers facing a customer network or host network to prevent the corresponding network from spoofing source prefixes of other networks. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is also typically used on interfaces of customer-facing or host-facing routers facing a customer network or host network. Routers deploying strict uRPF accept a data packet only when i) the local Forwarding Information Base (FIB) contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a looser validation method. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>. EFP-uRPF <xref target="RFC8704"/> is another SAV mechanism which can be used on AS border routers as well. This document does not analyze EFP-uRPF because it is an inter-domain SAV mechanism with a different goal from those described in <xref target="sec-intro"/>.</t>
        </li>
      </ul>
      <t>In summary, ACL-based ingress filtering and uRPF are the two most commonly used intra-domain SAV mechanisms. This document provides a gap analysis of these two mechanisms in <xref target="sec-gap"/>.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the key problems of current intra-domain SAV on customer-facing or host-facing routers and intra-domain SAV on AS border routers, respectively.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV on Customer-facing or Host-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of customer-facing routers or host-facing routers facing a customer network or host network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source. ACL-based ingress filtering and strict uRPF are commonly used for this purpose.</t>
        <t>ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. <xref target="multi-home"/> shows an example of asymmetric routing in a multi-homing scenario. The customer network (e.g., a campus network or an enterprise network) owns prefix 2001:db8::/55 <xref target="RFC6890"/> and is connected to two routers of the AS, i.e., Router 1 and Router 2. Router 1, Router 2, and Router 3 of the AS exchange routing information through the intra-domain routing protocol. For load balancing of traffic flowing to the customer network, the customer network expects the incoming traffic destined for prefix 2001:db8::/56 to come from Router 1 and the incoming traffic destined for prefix 2001:db8:0:100::/56 to come from Router 2. To this end, it requires that only Router 1 advertises the route information of prefix 2001:db8::/56 and only Router 2 advertises the routing information of prefix 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> shows the FIB entries associated with the two prefixes for Router 1 and Router 2.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in a multi-homing scenario</name>
            <artwork><![CDATA[
 +----------------------------------------------------------+
 |                                                       AS |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +----------+       +----------+               |
 |                    /\           /                        |
 |Traffic with         \          / Traffic with            |
 |source IP addresses   \        /  destination IP addresses|
 |of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  |
 |                   +----------------+                     |
 |                   |    Customer    |                     |
 |                   |    Network     |                     |
 |                   |(2001:db8::/55) |                     |
 |                   +----------------+                     |
 |                                                          |
 +----------------------------------------------------------+

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8::/56       Customer   2001:db8:0:100::/56 Customer
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8::/56       Router 3

 The legitimate traffic originated from customer network with 
 source IP addresses in 2001:db8:0:100::/56 will be improperly blocked 
 by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>While the customer network does not expect traffic destined for prefix 2001:db8:0:100::/56 to come from Router 1, it can send traffic with source addresses of prefix 2001:db8:0:100::/56 to Router 1. As a result, there is asymmetric routing of data packets between the customer network and Router 1. Arrows in the figure indicate the flowing direction of traffic. If Router 1 adopts strict uRPF, by checking the FIB entry that matches prefix 2001:db8:0:100::/56, the SAV rule is that Router 1 only accepts data packets with source addresses of 2001:db8:0:100::/56 from Router 3. Therefore, when customer network sends data packets with source addresses of 2001:db8:0:100::/56 to Router 1, strict uRPF on Router 1 will improperly block these legitimate data packets. Similarly, if Router 2 adopts strict uRPF, it will improperly block legitimate data packets from customer network that use a source address of prefix 2001:db8::/56.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>In the hidden prefix scenario, the host originates data packets using a source address that is not advertised through the intra-domain routing protocol. The Content Delivery Networks (CDN) and Direct Server Return (DSR) technology is a representative example of hidden prefix scenario. The edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from the intra-domain routing protocol and intra-domain routers in the AS. While this is an inter-domain scenario, DSR response packets will be improperly blocked by strict uRPF when edge server is located in a customer network or a host network.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----------+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       |     Host      |               |   
                       |       |    Network    |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in the host network with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>For example, in <xref target="hidden"/>, assume the edge server is located in the host network and Router 5 only learns prefix P2 from the interface connected to the host network. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 adopts strict uRPF, the SAV rule is that Router 5 only accepts packets with source addresses of P2 from the host network. As a result, DSR response packets will be blocked by strict uRPF on Router 5. If Router 5 adopts loose uRPF which does not check the default route, loose uRPF at this interface will also improperly block DSR response packets when prefix P3 only matches the default route in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes. ACL-based ingress filtering and loose uRPF are commonly used for this purpose.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 +------+ Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |    Network    | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>By configuring ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. However, the operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>As for loose uRPF, it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, existing intra-domain SAV mechanisms have significant limitations on automatic update or accurate validation.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. As analyzed in <xref target="subsec-gap-1"/>, it may mistakenly consider a valid incoming interface as invalid, resulting in legitimate data packets being blocked (i.e., improper block problem).</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. As analyzed in <xref target="subsec-gap-2"/>, any spoofed data packet using a source address covered by the FIB will be accepted by loose uRPF (i.e., improper permit problem).</t>
      <t>In summary, strict uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB information to determine SAV rules, which may not match the incoming interfaces of legitimate data packets from the source in the case of asymmetric routing and hidden prefix. As a result, strict uRPF will improperly block legitimate data packets. The network operator has a comprehensive perspective so it can configure the correct SAV rules. However, manual configuration has limitations in automatic update.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>To address the problems of current intra-domain SAV mechanisms, this section lists five basic requirements for technical improvements and related discussions that should be considered when designing the new intra-domain SAV mechanism.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy upon existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the two goals described in <xref target="sec-intro"/> to block those spoofing traffic from customer networks, host networks, and external ASes. Meanwhile, it <bcp14>MUST</bcp14> avoid blocking legitimate data packets, especially when there are asymmetric routes or network changes. Intra-domain SAV on a customer-facing router or host-facing router can generate an allowlist SAV rule at the interface facing the customer network or host network. The allowlist contains the source IP address space of traffic originated from the corresponding customer network or host network. Intra-domain SAV on an AS border router can generate a blocklist SAV rule at the interface facing an external AS. The blocklist contains the source IP address space of traffic originated from the local AS. To overcome the improper block problems, routers may need to use more information (e.g., SAV-specific information) other than the local FIB information to determine SAV decisions. By integrating more information, routers may learn the asymmetric routing or hidden prefix, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically generate and update SAV rules on routers, rather than relying entirely on manual updates like ACL-based ingress filtering. Although some necessary configurations may be needed to improve the accuracy of SAV, automation helps reduces operational overhead in SAV rule generation.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> specify the deployment scope (i.e., which routers the mechanism is used on) and <bcp14>MUST</bcp14> provide incremental benefits when incrementally deployed within the specified deployment scope. That is, it <bcp14>MUST NOT</bcp14> be effective only when fully deployed. In the incremental deployment scenario, it <bcp14>MUST</bcp14> be able to fulfill or partially fulfill the goals described in <xref target="sec-intro"/> and <bcp14>MUST</bcp14> avoid improper blocks.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> update SAV rules in time when prefix changes, route changes, or topology changes occur in an AS. Two considerations must be taken into account if SAV-specific information is designed and used by the new intra-domain SAV mechanism. First, the mechanism <bcp14>MUST</bcp14> allow routers to exchange the updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> require routers to signal too much SAV-specific information for the SAV function, because this may greatly increase the burden on the control plane of routers and even compromise the performance of the current protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or protocols. <xref target="sec-security"/> details the security scope and security considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms can ensure integrity and authentication of protocol messages that deliver the required SAV-specific information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security mechanisms to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 378?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA80923YbN5Lv/RVY+yHSmqQuvsTWZjIjS7asrC1rJCeZzCRn
DtgEyY6bDaYvkhVZc/Y39m2/ZT9lv2TrAqDR3WiKsj17luckJrtxqSoU6oYq
aDgcRmVSpmpPnOsqj5XYn0xyVRTiB5kmE1kmOhNJJo6zMpfDiV5I+HGiykud
vy/EkVyK/UymV0VSDMRprsepWojzUpZqobJyIGQ2EWfqtyrJ6UERyfE4Vxd7
zfHO9384efGu2z+a6DiTC4BtkstpOUxUOR0W8iJT8N0bYLjknsPC9hzuPI70
uNCpKlWxF1VLwAS/4D97UQz/n+n8ag8wm+qoqMaLpCgA03dXS5js+MW7l1GU
LPM9UeZVUe5ubz/b3o1kruSeONNVmWSzCAkwy3W13DPgR+/VFTyc0O8oklU5
1/leJIaRgGmKPXE4Eq8T+MEYHcqMf+p8JrPkd6L0nnhXwODzSorvs+RC5UVS
XkEbBVimAI3GJcn+VJpGIzWpRnEGDWJotyeeq+RXhA1+6wroA48O5kkmPSC+
G4kfKwfEd4nMltCDn90Bkl9Nxz/FKofV+ARAXo/En5PMQfJaZvFcAST8sAnK
X+c6m80qaFIB0eRY57KE5avB+S3J0vhP+H30+yxO5fgTAHozEq9gipkD6Q10
+A2JYx/fEag5dlv89plgnYzEkfKgOgG+MQ+a8ACUlyqpp59BowyYZU7PR7Fe
3D5tlOl8AeNdwCaJcG+4X0KcvTzYfbr7tfn68OvtR+br492dbfP10cPtHfP1
2e7jJ7bb109t26emWyxhvw6BrZLpFf4WwgihA3xhRNHwB3pPQuT41AmmcxVX
OXOjEGabCfoBBIERkiLW9JM2u9jd3t0Zbu/wJDKfqRKWpiyXxd7W1uXl5SjG
9kierXhLZVtVsVVUy6XOyy2QPsXWONdyMgYQhgTzFkNeGBi2drefPNsZFgwv
4zOal4sUpjs+PT9q4qazaTKDfsBTh68OTsVLJcsKcLIYGgl8VMl8sjZ2O0/u
hl05YcSKy6SELVdspTIDrEqU4uXusyfbW4Welpcg7bZylSpZqK2d3eHu3x8/
/Dt8jQ0OxHRbsyqZqC3sVMQzGHEyj5dPdy0BYL2/3n74zCz9k6fPiE2ypCiH
uYobpDlTRZImILhRMajc6IV3IPWnSSxefIjnsJeUGIrnR6eOAYhsh4f6HLZq
mcwIpB6ynRyfv2tS7dkqqiGMo5m+2FpW4zSJaeQCyGGAROVjgRyWDORQGSCH
49nS8ccQGWcy0cVw4UC8F8G80Wg0iqLhcCjkuIAh4jKK3s2TQsDaVKjBBOi0
C6AuMIeYgZqVRs0KPRXqA8CHXOQrQcFMKKTZJhe1/l4oBC0pFqCkYcQ4T8Yw
bjlXYlplE4nTyVQYJVqw1p6oaZKZVmNZwCrknh4XIBpECcNmQJ1UJAuEll8Z
tBbJZJKqKLpPql5PqphAub4PpCHlrW+iqN/k2AAluikAXRga9qIEguCUAJXK
Joi6nAHORdnGulhqPaX3ZSnj98XIGitCLxVJ6AKET4bDpgQvamuPQNBPLKq0
TOC1SNWFSkEGyziGsYeZGQl6DJqkpydINWIM76nYKJQSfzNS8pfNkdjvjCU2
1Gg2GuDXY2qKm+aXQVsgiA0UKJu4GGoigEQkQopMa9Lg19f4+uaG4QiJ0etr
X+re3BB5y6slrmB6BaRdpvqKh7ayAVUQ8CAxARNBWMBLDQwD9AEKSjHXsBLT
XC9EhVYDtW8tDLCtzDS8yKk1mCGg7gOURaCgnajY6miA1qU6AgtGGBCdl3Wu
0qUYpzp+X3OC2aBCQpNUFwpB9wEsxFKD9QekGQnchErc4wnuATYK1xSa+ztz
oWTGG2O/KnWmF7oCrQTSE2zXjf1zWOSXwKrqg0Qew/UQ++fQHDgLpCds4ZKo
4bjsGEQasjJYEkhx3PBIRHjDYIzEMdKOJSNQCuRffpEA5KcsIXLgjPPTzfDg
++cKNrSS8RyBCA3eljtT+FIAIDoDyuuM194TPu0lGIGBmCbvVZf3L+cJTGvE
RiGcPYHbm1n+OdjLAP8RCOVLeYUIlTrWqdgAMb+JslpuWjk4EWMAh/gHccJF
nIBxny9AStFseZUiqh0OQbHBS+DaF3UHgT4CIAqD04ICjcpCpVMBO2AOjAVU
ZcGBUOMzD4ZRx4vxJpMJCxOgfKIuiA8vtZhpiQIl2WQmxcfEp4AeYiuWILMU
LmGezMAgK+E5bStYklIvYN7Mul6a95H3YGoxIFaDNcS17mxCBt/2+jeWWrfC
AwYEviNY1AfkQ5D6vA6rJkOAYFxqC3rh+tpfnZsbkaRphdqvNIqGyBNiMiY9
UjAG8QeUP4B/RCKKub40MGD/NpnaVMKhgUB/qelbhPFlMXY7/Whv0ogso4qA
XiBZEyQqcMpYMeXh3UYyUrAnjjQq1E2LYgNHmglsJwWy8c6QU2daQZjXW8R/
Gg6IRBT94x//iBgV8Ck/cY3gQ7Yafj5rvewgEUO4twbqvR8H0brE6R3gMz5r
jXEeAu5TBuohszfGg+Hqz4OeNXlgX8MYH8WB4ZGtV8gYJy3G+Bge+tuP5vV6
cIQ/Phz/Hz5m6wCnftber7HpkwK3gGF29OdsmBqGT9wwX3q/rLMt1hrolm2x
agzHb5a5m58Hq7mVx7B8/02Y1en1T9BqLTjCnzXgQDl/vSfuNxiC/fs/3HsH
mvuoT7nfu2nboHEqwUdJlKfaixjsMOxtfASw/8BDATsfX5KvixEBY3N0N0Bj
jTGefTpUWSyXRZWSlVXEKoM5Nb6M0wpdzD1wZMUJxb/QFwPT7hLcMHxRtxGz
VI9hZ+QcFRYl+V11UzKvfjg98R+5qUA7DjuAvKuyTKXo7IGjTO4gBtXAHTw6
e0E/MZoGP8/PLp7Qbwy0wW9VxqPNPbbecRZjuXtRAEMb8pZEKq/g/4CWoRHB
8hwEMzy7eGQCUjCDeY0mF7jrQPqJVuygMfUznQ1hFI+yb05fn8PwY5UO2VVt
UcMIf+rXbeETJzpmHKY6TfUlvB20HLE7h0iavv4AXSZcSBjhvbpyARDkLXAL
LhT70vAYHERo0xMGmVYYxAOCM5Hu3xfvyM3QqZ5dMdHOKgxyofWDTgdSSRq3
lRm8GZRZyCW59LlKOfI0T8CpBSWo0GNuM/cGuOHT5MMmweqWHFmUbXZyy6Yy
VhsF2GPHJW4e8mvB5amh0DDre3akJipO8DAEIzmof4fQGQc6o6agiLImUX1E
EnQVgIFjZGUYFA078lVcRKGcQ/vZHKYmFhzu2g4wo5nQKvzuVAB3bTfShOyl
1paic/aBGL5DbAHZwhcWGCJHobJJ3Q9gblknFmAk7dwjB6MNIFtj5XPo1PXv
2nR66NHJus8k6krgkZgH3/Sg+ecREZ+amMudCRi3aGWIKA6T6VTlFH5A08T3
BwYuwIM+YJKFHb28ypwQXpowAjLwMUYmwYEXz9Gm4D3oyUTYQVVaemrGCjLy
N1M1S8pkATRpbToUOXltpyRmEgxVVRRfAkLGMUbJvdiED80pSojyjuBYkykI
y5JGLO8CDXwfFkvY7bhux3V0hsHywzXUCsD8nYW1GwUPmUxwZGDCPcDZNhI+
EXKh2yLYck5EktI/G8YzwFklZ4qDcCiR8Ty1EPfefH/+7t6A/xUnb+n72Ys/
f3989uIQv5+/2n/92n2JTIvzV2+/f31Yf6t7Hrx98+bFySF3hqei8Si692b/
p3ss+++9PX13/PZk//W9bhgQqQ7EHZvIF4hhpL4sIivNKXT4/OD0v/9r55G4
vv4XVN47O89ubsyPpztfP4Ifl3OV8Wy0D/knLP5VBHpAyZzURZqCcbxMSjCh
BhiyxKAAhjtzBZT8178hZX7ZE9+M4+XOo2/NA0S48dDSrPGQaNZ90unMRAw8
CkzjqNl43qJ0E979nxq/Ld29h9/8McVY33Dn6R+/Re4RL6yO74Th3tTxfD5w
qJW+tTULI0oTczqhijVthtr2g6V9+JRtsqe7X/9CSwjPnj6iZ3hC+gsehoj9
g9fG0IFepLOnSQocQ2Zaboa5vjbjAEe4kCnJgaxzgLGQWUWBcXsap3AOE9D0
IuLInRQLh1lYPjTtYCNVjARoi5WRIEI53K13VpnzB2dYkG5oS3YT1WkKesCc
f8rbw0DeAQNJfJ0DWEvNpz+2EWkLF+k3GLBBpMLhugwRTFhiJaSIYUtpQIop
GkYOHKgxh6rbeDR9aEfwgFs+SfAwQ18GBPhAFBWITlnwtDhYR8bDdmebzY+p
im8+AK7mCPMP9+zR6r2tbxnTDEy85dKeYDrjeuCxywLWgVaVUmT4tCNZWMlm
tD8uAkdgcXK0EUqPh0HY4TdJooua2OVhPUBHguK8zJO4FNXZ6ct6fzj61+dQ
/zfsNTJmWmECGcQ+HoR4MLXEoy1vJWv5jAH8eh1e1u6Lp0XFc4zcbLw8fk5H
MyUeV8J4zJzw5IKJV2v5r4q2aW9j813+B9hnumHd84ns3HK/MIYSTA/iwpre
3lRd/2Ak3uJmuUwKNfDawsKD8qmjMrSYrzUepLXWko6NwF7Fd3nz/Lmc68lI
7LeHZCoj17FvyssI0BnCAvCfSLpczWBJUu8cwqMUCg22Vjw0k8JG1ya0eaBp
OfhEObCQxMdMCiaTEw2O8AEZgV6xiSjUO//62u7rm5uRePHydOjo/tTtIXO0
2lBWBseW2O7iAHLnUqWpkffOvnGePvnVv6t66rGKJaJn5GfWPfrzYECxAdvI
Gfh4xsNLAEwBgzSspevrOj3gZkQRgKJaLGR+NVipRnGn8L7N+bQaj4oWuN+B
2Avat+Yst1ezt9FfEVyACQozRW1oOOihNcEOFoqfH2ksEXzbMkHAzafsMbNF
G6EIEn05ES509r2mWDSpCZ3uHV4YoAuyRLguVHplwhkd8wp6tp1emLgbKyCc
q7FBe7iDiGsUlYU5IWKiNQ8FA0e4vXkKq3WExf5LmCJGmqnVx7S+vTbAg/ZY
WQQWGjhTwSYg2rIWcahQXkLeTEwY3crwDX2Vqxarsz6AmZdVjvErXMyu2nem
pNX/IJI16zI2wEjishpHupR6SXEt94xiWWgxwBgwWIbevKdHQLDXkyKQlNvR
tDUGzmWtzVX3xNitbkOgaNXozcJ+1UJlRZW7/BRwcWOKAddTwhSTq0wuwL61
RuBAzJPZXLhjfWBE1ChzJSdOMSUZugQUmuEDfGVxNKnERF6cppEQx1FSb1lQ
9hofWbGQou5e/gHSL8OMNb2gQA7mQYyrEmUrAWMkbYNAhdXu1qCj7JriagGK
NjfBICsNkskEOI0XEqGDDX1f7NdtbT5ztN/tz4kuzvyBXYkpOYg8nR9ZnYtE
QjFe4lYw+eI6Q8WKoh+jkvI9ydFaCdArtqRKEDlllWdFm/2vrymLZTiHvQlO
ER+Dk6KlxJoenIkfXUc/pDwKHz+bWBqIARi2KnwhgJOxaw+8bF9soile2K2x
u729szcZP93b23r8mHQy5jmyL9gO8qHCcDLJZmsA89OROUtMscMp8/xjd+Qe
uwa7A7/FQy/tw4ZdPFLUxqgfhOvEY/ygGScvpRo2A5ghMmPpPnXxvSmH4u1i
tck5CIfn1AdUKoWZ3hhAdkhmHSOyAnR9QhFSGI/5rkGpuw+4vbezvd0/7C7J
FRKcKpsMmD99d5wkbA3DBLZEmRRGd9PyNggPpAui5OI9dt7QUO1VDAzmo7P+
Ggf3lvUXgOdzPHuTRaHjhCS1c/6Qh51/jeTt4VvO+7j1GH7VCX206shy5Qc2
w8fe3h5IvceZ/b0/1juvF7p/1txiy/z7c1/fVb233Lf+7r29t7zvvd3bvQPY
riBAu/fHmrU+th/tdsD8snPbz5aP61aohe1tU9Vpo9iP13tLBFuY3kaR1sex
lPP0c925oV79ZtgbpEJIHJjuP0PvnhZ9eHd2bZhZe3rTM3cMZR/cqbfN+Ll7
742GQt68W+/Pw3vNz8fPlIoRyWhYUbc9Wp/m691IHGK4rvU5UR/Kv8/1Er6u
eh21tBZ/vMUNsZV9Hc7XOYHp3OKGXtPbKDiyk70iCJd9DTRCU887vrOWwW15
tbw7IxHakKBIQzA5l6E+drPnghHGa30vDTavXbWRS5ipNbHNlgmY4v1mLWbP
/DhPUhW2vFwUh02wL2Ij7ZBZhL4Nnv26Ifk4oRO4Xm2z6Joi4JZgRgKdgZId
CZ4dxpcCjk0roccmRwQp4BkmOEeeo61jHChzegLuHsbImYTWwp2AzRe7zBnG
kXJlPeNPL2F2b4UHuOKUGWMDlNagumLr0cZi+0nCFrQ7YU2M2ekmJaORA6dF
6DgnQP8Q4f31fEiuEUCkczVgt6xDRT7l//T5vIUe9O0J3kvtjWTCbd5u9qEY
ifNkkaQSmlO0wTOnu4tjnerOFD2D9wiJlTnvIWt/xG73K3bGT6mFS29quOje
GY1NOPEzM9ZJ97QJJhS6tT7F5C7eAQrPA53Rsc+hSrEQ56ou+t44ODzhbKND
2iFUjwLUOSM3Xmwcnp9tcm0YR4oS3tWAX4GFZhT+8nz4MPoMhJqAO1vw8Bwo
AdOeVpAED8wk+FCkUGskwXIly1UssWyMB3U5C3jgYEJSNpaeq4UuFSXIv9KX
CpoPegubGoPCcAYpExS8heDd8KyNEhgphSBYEZ8UoZh7zTVBmqzQUS0NRZu/
QfYmbYLBUtk6WjPOn/v02zsrEkpFI8fWM7gom9V/Qw9klumKKqhqP7w7xMYl
aRWfE+gN1+3wA8OJpw/b03cosklvMMnj6HRNPHxSPPg0Uvifu9ihX3aIL4CI
nfltXdW1FkxflrNEj2e3wsnuDtHjG94yhj9Er3e5eowoQAFEfV0XA9tGhtyw
j/5qx/0o/FXodZ1NwQWN4e0tSjFsjeGc90eh5f3o4Ghvr7XgqMfoocfHbtPg
h8ZY8e7LjfGg3jl9uNw6hqPp416argfHapreOgZ9OFji6x9jIt6ZpgHv685j
gFo+fXh3XNrs04kUrTEG/0uZzCH41h/DC4N88hhi43R389Ph+Dx6eCIhbFNs
3jbGneRY0PbhmtWmIelM66bbH/L6mY9MXaNvN9i0e7Ktol7jym3Q2jd5zJky
ntlVBwOM4WgCAa8atjEADqY3W96AqR8AaBSc06E6D0T3ARRFtVi1CEGKeF7z
Y/Y5UyXz+uDrdLdh3ZrUmuZ5V2tMU/PvA+Hq2choU79Vyl4kwA/IAm+a17UX
xw46QMYHiKvcgbXsdrPIpw83fTf/cdCTXOWjP2766Le6yz4pm/RqBERWWvY9
5nztXD8O4uQlKLEr1CrvQZAmaioBALapB34XSlJPCm/9CRxK6Ou42GHw5zV7
wzYjuvnpao25/Zy2OsD52KSSh7JUwDwxVwwEE1J2OwkpXzgj5Q55oy7BxJJG
5nly4Yru/VsHEL4xODuTIYDSczLel+BDqW115GtQh1S9Df/IoBTMGaoX+6v7
X5HjZDP92jltvZcG3J7a4jPZWpkt5HCe+jutpama7yJXTHG6s3W629KMzXct
k7Kn+rj17gEZs3VZ7c+99r3/7mPUsMse3A/bh/jUvHvQ6uWdT3ZVd8MAb83V
p+BbZqrfq/ZZwj6KB5XXyyNEsFuwV4N6oW7NXh18uggG8OqcOHrnja4AtmFw
f/pcQVQCPBKm4W3HkuFeXrcgN4Z69dt/9o371+uF/4ZPALu2cbNX+OSvaw03
e6GVu9Oxcrv2713wGgbwusunLTfW+zzw6qidjHfnQmuJeLQHn9e1IShSXT7c
oCmhXSB7RXGCTZAK5iZjpl5fycJmu5yfLzBp66NGbDWYlIf3GYECwjRwRMZm
D9ZJftYIAiWDtWSgJyjDz5YjgAJBJeLdidTJgEZrCMdGmrrqKmMKeKqWcig5
76XWUGSQFjLGinUbf3RnR6AauSydRgbNNofh02SRIAbuzp1YLuU4waYDP7ma
luQ2A5LWkEqXfPuIC9E1V46ZytPaNqHE3u59qyZF2eRa3hCuJvkbVm+ssSJ6
nSIpQPIC7O1kliFJ8O42wphTJAkol+5o8iEx/GpLFOvCAZOy2msp5CpNuOKJ
01hbyZgmQawq6gyu/szPQKIoZYLNKpkDBqqTYGqgoisvuiVaRAGqqm7k13I4
33X2ULHJoFR84wppjGkcSLxtZtneLX+W6wpDuapuYXyYvdu1MDMVR1h1gGaP
g2HXwPyB09s6azXvPf3xOY8z6/088hvacwjIArhRvlcZF8MVdB2a7C2B5xIr
ejswfpU5XO87ABwrbNC63qhFbkNbrL726mJsZVNNVeYWrzaC83z928hQTiFL
orutybRdRYhdvu7vKnSZSt85GFXP1JVkKCs61TjjK98AbyPd5KjNVpVG0eQo
dCXrLdTO00bEPXln7mKrGtmU+f/8x3/6BUGNrNaeS+DYl0X+wPnJoWxmijbd
tJWnv17owBafY2FXOPuYJHwz5brhwzeO2u5yEs3noW05Q9pEonsEs4HMKPBs
Fd7ZEg6BjjhnatSloq6aLC69cvBaD4dkaa22jGhNukKcS17O2tdjnKjLcE2u
d5EG+eHeAbZarwDGL8st/YqalG4smCIF7nR3Kd9toPgmFrCJ4oquBTdKFqyC
Kp24ssgJ7SNTyEHKzgSaMsC4H1ZTVLNv1V196SnXva/uLaiw28Dc3E/VEmuJ
1lDPdGsDjeNqG0xmL9+/11+RVVexce1W547N8GWFg+ZVhZzB3ooIvFEyu8Qz
bhLtDN2FTjwjqWdngEliriewxZm1ydfaoWywtotTg5Ej2VNNFC4matd5sOWG
XFgHCc2NDl4ZIo8QzFnqVKsiZ9SDuqJITzjVUWtYFhzfS9rv1im1C0pvhyBI
pa770SIFL996lGhfS4g4192/BM7uLkq07FARUmobARNU6UV9+QgpE8WBbVRX
VM8VuNK0camG937ThPBAkmR+7fBtGq2+jUc8p4CcmuUca2tD0ISVovUsIG4v
DGoZQzRy8MoQFFxO7H9PYn99qYUmBnolWC/UsDNXV0jVFxoAmLImIshpKtsG
wZ3gd88PsEVadC/tCg8CtHOK17zO0K9aIBZ4HTHYMW1PAik6VsQAzAJBCcwW
zcBhp/lCYvQ/+IaJPs8jcJ8KE/tH2HpmUY6zmBUY9D2k8Cz9iYy1qc9MeWXC
6ra/uVfN2Hjmxl57fQTeReUGsddGISvjOtGgpkgWDSsH3BhwmCY2uO+98UPl
3l0+Zregxm2BhSKActlqnYB3iIz9Qsq6Jn9a+TO4QLcPWmMCmzFlh/bYE4aa
onWGqbEyL1m32Ic46K2K0lGIlVirfo8X9yWePR3oDBgB1j2+w04KVRHWjmOz
atOIhfpnqIqTKipdih3QHW/aNUaO3QKmYpTcLYRQU61ohYbZtFfsIduwdYQh
BNzeRe183GYovUzygjOB2wQgVejfc+KK3yj9xESI+oEKFK2eK0B4EpwNmc5Y
kP6ciBUwVanBzcf7O3qns1cz0A3RVRaztLaOD1muKGBAOEk8ziSOlQXjMq5y
lNPmOj9UgrlOxTKVGWk7v8IbL0thXwCcHNMdeI7gyIxyJGODzWn/mizgRvdn
NdbgwqKmi7s/x92rgqFA+xcaLqoUBRrFthI2v1CyVoXRdXQoHTRZZQ62KVjp
/AcyKEfdgmu2mp3kBjWmTFJjGdipWbBRnbR91OJouyxr2Ov135w4aI7BrkwN
ShSZdGRXzdqEp339ZefOssBho0f2mEpSC85ZR1PA/hkM/JMXqAhjr1DQZJcu
UKXNbKRwwvm87sA9yVdslEF9BRwFVlCWUQg2Syg7mFd7gX9jxFOX9pZB9L1r
jUrl5KwtEDTjqdk/41Cz7QQXewFOUZzgvfrBvFjWU0udFL7LYzcH9c8AZb7H
gbaKxz0Hd5rKBhH4SJ/UDit5DN5QgAf8xLxask17OddpT7avvW/fcZK3rM27
jjCxnP96Bd8yp660qXSt48TBm/jJAT/eP9kPc2kCROlcteoO/G32BcaTaAyU
seZPn6CEAI/1fQb+B6Zv8N/yit5gW7TF3rvi7QuZVqRF8ciWvW2g9Z74TiKf
vZEgJwfiucyBIY5yBZbCANQgUOdIgib+d10m72Uql9UkEed5ksvFQOxnYKHB
POfonhQK9MFPFcwL/4m/osgfiOMZLOPrCmy8ubqADumFzDWmowO+A/GdVql4
JVOQhMDP+8mvVSZ+pH5vgIkkvDzDf/NJgfz+OhEHdAHbkcpLcajJTBzQ34L6
gKv4Oqmw0TjJ+Ot3ep6Jt189zxPsdKZTys7RY2gAW/kvQHL+G1IHDOo7xOQ0
//1qBu0nAN1P8PJ3VNp/hsGo0aWkaWC07yRsXXFUMXg4LXQRh1U2ljnONUYQ
z8FAQZf6p0q8hCHOS7XE4V4CiQE1vBWW/x7LGPgJ+CP6X9zQmozxbQAA

-->

</rfc>
