<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 2.7.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-individual-mjoras-sadcdn-00" category="info" consensus="true" submissionType="IETF" number="1" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SADCDN">Securing Ancillary Data for Communicating with Devices in the Network</title>

    <author fullname="Matt Joras">
      <organization>Meta</organization>
      <address>
        <email>matt.joras@gmail.com</email>
      </address>
    </author>

    <date year="2023" month="June" day="27"/>

    <area>AREA</area>
    <workgroup>WG Working Group</workgroup>
    <keyword>next generation</keyword> <keyword>unicorn</keyword> <keyword>sparkling distributed ledger</keyword>

    <abstract>


<?line 57?>

<t>There is increasing need for application endpoints to communicate with devices in the network without exposing that information to on path observers.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-individual-mjoras-sadcdn/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:WG@example.com"/>),
        which is archived at <eref target="https://example.com/WG"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>


  </front>

  <middle>


<?line 62?>

<section anchor="introduction"><name>Introduction</name>

<t>In modern mobile networks it is extremely common for policies to be applied to network flows by devices in the network. These policies are usually implemented by network vendors and enabled by mobile network operators (MNOs) to achieve certain outcomes. The two most prominent examples of this are traffic policing and packet prioritization.</t>

<t>Traffic policing in this context is a modification applied to the flow of packets to limit the achievable throughput by the flow to a given bandwidth (e.g. 2Mbps).</t>

<t>Packet prioritization policies are meant to prioritize certain kinds of data in the device queues over others. For example, an operator may want to employ a policy which gives queue priority to low latency video conferencing traffic over long form video playback traffic, to ensure lower latency for the more latency-sensitive user experience.</t>

<t>While these goals seem straightforward, and at first glance it seems like the network device can achieve them in isolation, without content endpoint cooperation there are issues that inevitably arise and pathologies which are detrimental to user experience.</t>

</section>
<section anchor="traffic-policing"><name>Traffic Policing</name>
<t>The goal of these policing policies are variable, but usually are motivated by limiting data usage. One goal that’s fairly common is for the operator to limit the total possible data used by customers on an “Unlimited” data plan. With these plans there are no “hard” limits (i.e. where network access ceases), rather the MNO will apply policing policies to flows such that the amount of data reaching the customer’s device is effectively capped. These policies will often be targeted at flows known to carry certain kinds of data, such as video. The detection method varies, but typically the flows are identified based on the SNI in the TLS ClientHello, or similar.</t>

<t>Modern video playback typically employs adaptive bitrate (ABR) schemes to dynamically adjust the video quality (and thus the data rate) in response to changing network conditions. Ideally the ABR scheme should adapt the quality and converge on a bitrate sustainable by the network policer. In practice this is extremely difficult to achieve while maintaining a good user experience, due to the myriad complexities and interactions involved, such as the transport congestion control behavior, changing radio signal strength, etc.</t>

<t>The end goal of limiting a customer’s aggregate data usage can instead be achieved through having a content endpoint mediate the amount of data served to a given user. This capability is already present in data-heavy applications such as streaming video. For example, if a content endpoint limits a given user’s video bitrate to ~2Mbps and also limits the number of outstanding videos being streamed to that user, the overall effect on aggregate data usage is the same as if the network itself employs a policer configured to a 2Mbps data rate. Networks are able to achieve better efficiencies while still maintaining data usage limits by having the content producing endpoints limiting the data sent, rather than relying on a network device to impose an artificial limit.</t>

</section>
<section anchor="packet-prioritization"><name>Packet Prioritization</name>
<t>For packet prioritization there is a different problem. While the network device may be able to make inferences about what kinds of content different packets and flows carry, it has become increasingly difficult as traffic is encrypted more holistically. Newly endemic protocols like QUIC are being used for a diverse range of traffic types, and this makes heuristics such as “all low latency traffic looks like WebRTC or RTP” untenable. Additionally, if multiple application flows are being multiplexed over a single encrypted transport, such as QUIC, the network device may want to make different prioritization decisions depending on the application contained within any given packet. 
Information Disparity
In both situations, there is an information disparity between devices in the network and the content endpoints. In both of these situations better outcomes can be achieved by explicit communication and cooperation.</t>

<t>In the case of a data-limiting policy, it would be advantageous for the network device to explicitly communicate the desired limits to the content endpoint so that it can “self-regulate”, and in exchange for the in-network policer to be disabled. For prioritization, it would be advantageous for the endpoint to communicate the content type of different packets so that they can be prioritized correctly.</t>

</section>
<section anchor="out-of-band-vs-inband-communication"><name>Out of Band vs. Inband Communication</name>
<t>There are generally two ways to resolve this information disparity between the content endpoints and the network: communicating additional information out of band, or inband.</t>

<t>Out of band communication involves the content endpoint and the MNO exchanging information in a separate context from the flow in question. There are various ways this could occur in practice, such as facilities provided by 3GPP, emerging API standards like CAMARA, or bespoke Internet API endpoints maintained by the MNO and accessed by a content endpoint. Regardless of which method is used, there are a few issues with using this form on information exchange that makes them undesirable.</t>

<t>The core issue though is one of association. Suppose there’s a flow that exists between an end user device and a content endpoint server on the Internet. The endpoint server has relatively little information about this user initially, mostly its basics such as the 5-tuple associated with the flow, of which the most identifying information is the IP address. In order to exchange information with the MNO about this, it has to be able to query the defined API and exchange this information. In practical terms this may range in difficulty from challenging to simply impossible. Further, the API endpoint being communicated with is often not the same entity as a network device which is applying the relevant policies. Thus even after communication is established and information is exchanged, the MNO API endpoint has the further responsibility of taking action on that information, which involves further communication within its network.</t>

<t>Inband communication, as the name suggests, is any mechanism by which devices in the network and the content endpoints can communicate directly. This is, in a sense, merely an extension of how all Internet Protocols as we know them today function. And indeed there are even examples of where such communication is done inband to facilitate cooperation, such as ECN marking. However to date all these systems stop short of what one might think of as a “communication channel” for exchanging rich information between the network device and a content endpoint. Such a communication mechanism has benefits over the out of band alternative, mostly in the form of simplicity for both parties. If the communication channel is established between the network device and the content endpoint directly then the relevant information can be exchanged, and acted upon, directly.</t>

<t>To use a concrete example, consider the case of traffic policing. Suppose that there is a content provider who, in cooperation with certain MNOs, is willing to limit the aggregate video data served to a given user, and in exchange the MNO disables the network policer for that user’s flows. The network device would identify these flows and, inband with the flow’s packets, establish a communication channel with the flows’ destination content endpoint. The network device would communicate the desired limits to the content endpoint, and the content endpoint would acknowledge the limits. The network device would then simply disable (or significantly modify) the policing configuration it otherwise would have applied.
Securing Information Exchange
A major challenge with this inband approach in particular is how to ensure the privacy and integrity of the data being exchanged. The benefits of integrity protection are self-evident – a bad actor on the path should not be able to modify the communication such that it alters the behavior of the network or the content endpoint. Privacy is similarly important. It is not acceptable that an on-path observer should be privy to the information being exchanged between the network device and the content endpoint. Allowing this would enable a whole host of privacy vulnerabilities which are all too commonplace on the Internet today. The solution to both these problems is to encrypt the communication using a standard cryptographic protocol. Utilizing standardized cryptography also solves problems of trust and authenticity, by allowing the parties to utilize existing authentication features of cryptographic protocols.</t>

</section>
<section anchor="proposed-solution-sketch"><name>Proposed Solution Sketch</name>
<t>This proposed solution sketch first focuses on solving this problem for UDP-based protocols, such as QUIC. This is partially because of QUIC’s increasing ubiquity on the Internet for serving content of this kind, but also because the solution itself involves utilizing QUIC.</t>

<t>Recall that the desired goal here is for a network device to be able to, inband with a new flow of QUIC packets, establish a communication channel with the content endpoint to which those QUIC packets are destined. The key mechanism to achieve this is for the network device to establish its own QUIC connection with the same content endpoint by appending its own QUIC packets to some part of the UDP/IP packet of the original flow.</t>

<t>There are broadly two ways this could be done. One which seems relatively straightforward would be for the network device to modify the packet by adding on a UDP option or (newly defined) IP header, the value of which is a QUIC packet. There are issues with this approach though. Either a UDP option or an IP header could be “bleached” by other devices in the network, or not supported by the operating systems for the mobile device or content endpoint.</t>

<t>Another option which avoids this issue would be for the network device to modify the UDP payload of the UDP/IP packet. To achieve this the network device could encapsulate the original UDP payload within another layer, similar to what was proposed with SPUD. In this way each UDP payload would effectively contain two payloads: the original UDP payload and the payload of a QUIC packet for the channel between the network device and the content endpoint. The content endpoint would have to be able to recognize this type of packet, of course.</t>

<t>In either case, it is important to note the distinct advantages of coupling the packets, versus the network device sending its own packets. The most important property is that it allows guaranteeing that the end-to-end flow and the inband flow arrive at the same content endpoint. If the network device sent its own packets instead, there would have to be some mechanism ensuring that the packets are routed to the same endpoint. Another useful property is that it allows the network device to have a much simpler QUIC implementation, as it does not have to make any decisions about when and if it can send packets on its own. It makes that decision only on forwarding a UDP/IP packet.</t>

<t>Using this scheme a network device can initiate its own QUIC connection with the content endpoint as part of an existing UDP flow. This QUIC connection is cryptographically independent from the end-to-end UDP flow, and once established can be used as a secure communication channel between the network device and the content endpoint. Another way to think about this is that the QUIC packets used for network device to content endpoint communication are simply encrypted packet metadata associated with the end user’s flow.</t>

<t>TODO diagram.</t>

<t>In the above we can see a visualization of this idea, assuming that the end-to-end flow is a QUIC connection. These form two completely independent cryptographic contexts. Thus, only the content endpoint can securely communicate with both the network device and the mobile device. This can be used by the network device to, for example, communicate the policer configuration to the content endpoint, which can then influence the video playback to self-regulate and avoid the policing. We can also use a similar scheme to establish a channel between the mobile device and the packet core device.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>



<?line 153?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA51b25IbR3J9768ojx5MOgBQpGTvelbWLjRDSePgZTwzDFrh
8EOhuwC02OiC+gIQUsihf/CTI+wIf4s/RV/iczKr+gKA3F29kDNAd1VeT57M
qplOp8knn3ySfGJuysZVpWum15VdNualrd5lfl+aB7fZFrZxCR+6c6XdONOs
89os88KZZeU3JuMb08ZnfnrwbcVHptvKNz71xWyTmcablWtM3diqcdkM6+ge
stbSVxvbGCx4oet8Edf4cvrF3lfvVpVvt/hZPsJyFzMR5WtfmbzMm9wWpnZN
u50YvGh8WRxM6Zzs6rK8gbDYJK/qxiwKn74zfolfXZHVFOQ1H79o8qZwF/Ja
zfcWzqRrW65c9geTucI1zlzYxaJyuwuTL7lPZeQdil2vfdVwrXl5MB67VSb1
MGbZmNSWXItiuGxiFm0jS9vKLdvClL7hZnnZVD5rUzxXVb4Sse49LSNSmn1e
FHwNShrbNh7WylNbQO6srfJypdpTLux9MFjctGUQX0117cu/hYXLtGgzaDL9
9NMLA+tdTOnXuoFOZbBSIf6lBC/swhV19w2cZP4C94QVVYgaTlgcsBZXaLwv
xLbQHRbCD/w0bauKhtq5qs59+QfoAgEzn3K1C25r3HuLAHSqyQMDrwkRyR1q
866yGwbqtFqml2bdNNv68smTVd6s28Us9ZsnqV34J8OnsM53iBQ6p3JYKXUi
C+TIKzVCcLLZqrDWZPkSP1BSDVda6EpM3BkOgsLn1ILK4Zl03ZkO8f1o9n5T
iEL/+vLFxLgmnc1mj6kUsk9i6dJc3LtUXTovU3jdVgdzbRsrr135zaYt4fmG
D+yhn7l2uzx1nZNeuYYOuUg0VLne/Prq+tVFgpfcyleHSzy69EkSDHwZXJqX
Wb7Ls9YW0833vrL1tLZZmpUIlKRuF5u8plrNYYs3bp4/fG3MJ8YWtccOeNVt
Hf4pm4uJubiZf4X/GFs3dw9fXyRlu1m46tI8TTKIcGmeffrss+mn/zB99rsE
OVLDXm19aZqqdQnk/SxB3NhLM797Pk+62Lo0b78xb/Eb9f6GnyTv3AFfZ5eJ
mSJp3zeAl9JVsIwv+RHN5Cv5sd4Cxwq+meV1U+VIQURl4bKVq5KdK1uHRUy3
D35WNcf7GfgzL/jAn2I4IrLwsa3SdR90g++eyFoahZfmzf3zuyd3z29f4zPN
kPMvvZg/PL9/SBKkOUCF6uEFYwAWhfrrpW0a8890kXzhq5Ut8x9FcXzpGisf
O5UWYdfMxJ9/WvETkTkpJR7zHRRPGA39b8l0OjV2ATPZtEmSByCZAByAA26p
aQ4BVkaj3W4LiUWEO9y/9UAxSe+0C1OnQZqNg7TUIJXvPPDQvd96WbpZswpE
gTSL8O/WYg2/qF1FjJgFKTd5lhUu0bIl6Cm+T25Ks/EZ6hj+WzApw3bYXkoM
YqVyGwfspJxYnrpsPVTJXUR+UU3rRxR2Wfh9DSz7gDIz4JKrXb+Qwl8rIJ3T
uxvkh6BhtyRiLwPYG1tmMKBdFPr1WGzjtwxrPvfo5avX9WMKZdN17nbATlc1
FoLAilDG1SKFwXtYBBCMArzJS0JWiLCalU8qN8WDk5fLPA0yw/4UZGvTd46v
5r5CZdXAgs0fjh8W/bGSFLr3YlpLy+fLGBQDKwoKwoLcX3cQUxf5JlRn1Yg2
wK9IuNV6y0p56N+k2sgmGM0sIOg+zxAVj9xsNTPPXi629WMIeXtO+LFPNs6W
UnO7h3ozIt0zMVFGxA0OVn+bH1rX0n4IQa3wMPbXfW2awHidq5B2B7MP+7BS
edRkFQOfr3OUBSpS66JRkoNYBJoSHko8CTx2zKZS6o4YPbpMxCg8PpGyrE+i
jh0WsEB8aiLbA1+hNtblG2Flhjx123h+pR9OCcU5cYBFlYpBmxzfoO4mb9e5
eIYhvvIAflbpjSFO5Kt1g/X2tsomEkHIYeVaq8LibaYdH67h7XduBADBtKzC
MaLx9YaWz2tfiPcmHUxERhWxBh+owQUpBKmsoFVNRwUswQ4NooqcKIfsGuFY
r/ArRoQ6g69lDqWBOQouCbOdmgDMIxj/NqQA4VGsoVnVpz/cMoq5HTZnaCv9
i6gg0ehhcBtwQbJB6hTDr63tys3ATsMeVOjXX/4LpNvmVY9eZOHBm134jTKr
8VQJCFvnzK6wtu6YtjXIJGKZMAsv/PrLf78p5VWX/frL/+jDCKtyZt4SyIOS
+KAeWLz0fHGNAOA78jrAKp9B+r08FP1tUwAnEAOVxNWPJwbSkipTSkCbslyC
xuGMHaGTQnDdCquyATc2vkUoxJxFkUIgSSlxnXZitRBrLADgcSnjnEbEdqDI
x+Atkvhl44S7o2dB7+I0skWGdyXbIpY6W4GgncWPiUpqa81OhWZEmZM6BRxC
FGYSGq7WwADtCKw+gp6GT05qBVilzyw9p/Fu7l/dRJB6eHFvrgC2ZfOtKwov
/KuGI8AfEbovtR4eo0S3nUIUNsvsVgBgkSOxUb0fzb+6e2zqFEmpLsgOICHh
LZt9DwPL9rryD4hrwtgjZhlYT634KX7Bao8pbOXqLVmfGI/sWSmFxgcyHG0S
rANsvclcZwpIEYRgp9UWmUoq38VNuSfeBy6CkDOaOyXAL+kdqS2hoMQNxeGu
wm6oEqQ8eRo62xFRIPXP07ZohrV3L5AIUlVydSmfSFS49Ag6JujRXKyBmwOQ
gIKyZryHrk7Lf87O20pkkFnsfLFjtxgjSPK4QtZt0WdSzRX4I6OImFh59oZr
u0MVmfRGrWyWewTBqmR3DFXKVbPWrkOIHXG0Q68Oeuw4a+xqVbkVrdhjkuB1
XtaNgyaLWLpZ57VwG4qiSx0j9gZtMBc7k7nC7rJhlacdZ9ruIU0tSBH9TJpR
IM2zA1uzmssjrLjEdO3s7jCkpXVnQOqPwIVUIRlHpRut3hlhA5ANxRGbaLDH
6ILA/yH8Q2sfWqL4ogSaND9UEhUMYYj4jjKATDpp3UW0SJNsIxtNFNARzUiC
gFgS1ef8keteNUcp0FWnAF2MQxRXLPscj0EvxCJfgRwEq6sWXbrOYjOpIKTU
rA//hWsaxjkzg3EeqikeQmRC5mFiDGQNtkEehigRoA6m3wqN56d9P9FFZocl
9PmgdkgLXxz4iKT9EbngdGWD6sfaD0WIoynnRbKulPVAGm9HpDFhgJzlwqHw
Cd3tZwIQHQbaoE5GpnQsCDnhorfjxoIM5YHaEQUW5Dh7BkBXRqJdBtsE7sxY
0wIhFWhCkrW2DCn2AYN2bYReRJLAYYhveOiwZV0TGghOhPZYsZ2+37MwoKvf
kPSHSV7gcP/y5uZKgkIjWNiEdITYiy2ag3c4FyEtCvuxpa6VHwq+Uv3arF1b
yaZ9poJJMOSHPDiuUXj/Lkjw1i3uHq5Y5e4ebsk6WlqKtp2ZeaZFhIpIbm+g
e45EH3WsfXlVJeJD71lfdzLxEfu5gZ06CO6RmaaYfMjdsQUQXw9jZRRPmUvz
WtBK5yghkgUjBwIzGJBPEIOEOCdfOwRo0qiYGfS+fe98nXPwAchkR7xAywJ9
mlZxcTII4nLUcWfxLSb43rnyQ827etKdwGYtxVT261hxv3GEjdiwxvFoV0MA
DCidpGHNYI4g3aQU+I7xz6TTFwnAibiX1SrQAYb2W5IaeyEN3CfbwScAIt/2
vPkUMaIIgWbHYYa2g3VOyIwg789awdQBzHOdACOqicJTgHfLsEbITkLhx2Y6
qe3kycvpEUEJYwk4R6YEWr7GYfQX6NkJdzSjGSrAPJWafAI5USOZMAe39T00
fVNVqFIAD4Lq61ZK+1fUcScxwaZ9OMEExj50LYQO74Tv7T3y5hDmxDWJUGBk
H43Ss6HYBWkw5+UwpMhQOqQYre5VdgosRDoX2aHW6/6Lo+AMlK0+HwxRDDY5
wds6Qen3ZD6jskEreiTOVORopZuA4JkfWiV+0k0E27GFoJvVajqSYRj4NG0p
fMdse9Ra2pRsijUb0E46Ipn32Te3t2CIIH8i3/z2xghnQWcXcPdq/nJ+Nxer
LMjk8VE8NJLHe9PH+q8rR+2FI0kXqJ+f0q6ZuQPBqbKCnSKMrR166JagG4tN
hC/hJWbp9rHpl2ljG2aJ2hlvjB8jXJduEs1ah2Tq0JaS21JElCGnPs4TDEcQ
oLY5O2VFm7r2IBLqjPt2KxRDxFLiHIZW3ANEv27qLlStjEu1TQiQI2Y5AyIy
8YzFIBpaO8njh1j9wYNsaGzhXTmbGiiuDEPsInuHkzMWSU4LOaeklKANg3LM
jf9+2rRSPoPKoQR1gTnp/aRDJXSFoWc9nMS5Lnlzy+RDfmu58FWmINc5Z/hO
t5lEUKdFR3rCzDYQK6RIdQhQvZT4Y2DKjLX3/BhPhv0fJy2u2tSRphwCl2GT
EYnUQRMTqxWF01xu2GpttjrsDbMWwHRbMSSUIAzzI5COAQoHmzLAZO4gJ4OR
1dOW7HHrU36rdmch5+AkEmVEgmMF6EYaDBpghCNdsMtG6P8IwPBdzUlZXq85
6ZDSNHJbtJ5mn/hipNE6RMtSdY6dfh76NpIBK+cp2uZqVI/n/ZOoTUTTuNZY
1sB/GK1x+k4ycArLkxjBcspctyu2zYybWsjTxlGjvN4QiXTnv5bsSCEc1tIs
D0VQG1eJUoX2sgYAA1qZnYSA7qgQllkDKsh6Oyy97Qg3NNg7GTgpSjU+Q0wu
2zLVyJ2LpzI57e5AUdw8nPnrHE6S+sTvGRFNa5xM2bQ2aBnq6FZfO55fvUJa
yNHYzHzr926nqcvTPVEicL5D3XDoWzd+q+fjKodtBEE3HBszx8p3iqawEUjS
WDi6p3QF+b0eA/fDDQ2TPkCHPOAoQ86DK0GbCh3Zo48JbadKYEgTxv7Skg8o
gC3oLUHcHkIHh+V4TjCBTFJn7kKLt+xCmZE3yxBUZ3Q+Tsg/o99Z2hFjkd+W
Y1gYmi7eUOjzW6s0Mand0vVdUKMsymhc7Ykes3H9FIWnuXkW7BRJ+fEZ07BW
KpmMvfRgCLCTZfZrL8kzHPMLRsZxK4/DJJk5rg0gPDhR6kYlOrD5yJTplIpH
hAuMuz43NQy8OkxsdDTPplLr8zFMCyWLVTHkSOhBSTND/o3qqiwZ6Pekj4aT
mI0hM3q5xttsVkB0+/5xnAAfFPO39TyTD0eiLgtNAGNy8C6P6XIfkUPiNpTV
4AnzSCbbq1KOGUtGt5w5Hh7Lkt25QRxuBZRr9MxuzzMgXXttd9057yzpbl0M
O+jnIRqSOQDve+wbC76LphYaoViwRdxaASVNcPAEWzE413p2Gc7hRMgq39n0
0A1+V1UskHHEpeygy0g1UQ9Gy8FrHM2EIwUiv3SZbieBBkD9T87BrWSz74ik
nKeHQTppxnAqJbY8A0v9qQtsKcCnOREHz1H87tS6OhsJM47ZRHnemtIDisCZ
kNP8/kZOkikW+4RtE46EbSMHrOV0dBkgaqGt6O4QQ3NcGUa2/C1IiipbIKW6
tkIjSOdNMDCAquD8rJbSEL27awv2tIvYaPVHjVIkvQ8neHr76Ijja5lXv6MH
buNtCCkg4RROJ45yVCHxJVOqM67Tfsh2rZyRB/2qstv1YLY3M28ayPqjzqT1
UW3s+8cPOuCulZ11EgjO8yxIMqFl2jZS9CbS4/W2c7H4yRGrbOe0PRIR45th
Qudsg5TRSehZkWud31aeBSUz99FQ90DMdJ0IA9vGbzsz1vJtOKNe+lSukPFz
aNW5OOgmGP/m+naqB2/dxuMBYEf2VD2ZYyxcalutgXxEsHxwi6Zd5D+0kvZH
jueGDO4AYhKH8dIGB8N6VChuiFs0wyAJ4/6OQredU0XSJLlzqbK0cIIawV2O
gmI51mnu6WCsh4pxyeKz++6Gh8yHf0vhOikc2DI2luQMw4XDqT1DJyLkOzck
9YPDinik95GJXyekIOy+1L0gUBnQtRNSOrITSRdy8hTGt6M1Bvddag7nGSMR
LhFaT9ALh4OG8KGvcpBceIP2nCWDMdkCNSYbDcn6cQ/ng2DWemNAjabXLgZT
gaP7Gv288MOGGVSEICU1zeKU2lIF47fa0lXmUSkHB6H1fsxGf+1sFnvgnS1a
148LhPgNjDQcaw1HOnplKZZYncXMzPNcmsNjEVAnul1726C5QODidb3ZsIj3
dM93fDLhYhGqyVarpp9iBS5KkAwdTn+ZRu5tBdP56rSMJMm81F2DtKEm7Hye
1TFIOW366/xC9bf2UCA2zsYVrHqUCmeWTENNS+22lhH1OBSHe3TnD6pLYQ90
b6jmmrLAlr0dgK948f72zbWMWrSIoo2lP8ZLqxTDGxp67CEhH57iddEPyRZL
+MAeowjrLBqx5zfRgYcPk1zhleOJFJonD8L6YzR+GLGrQBM96Gur2umRhtOo
ZgM1CVcWO3okFxJ9ZOVSNtOmH/aHQ8N2W/TlNoAwj+Xas46vjzArvKJK6iyv
257+RPN10DFeJIPSxaxaW+ER57qLnOHIYdr4qQvHlZ1JQ+3Qz6qKd07sYN51
avGb5Qdkb44Fj1cT4pD4xC0Cwn2ZEGI+EnpYYCovt4UDrwzDuI4VhgxAEeZl
/o9Y53wOaw9iNqQS0uZgLYnV7sJoP8bCWpl3yoyjMnKuyElWf4QYj5GdHpjl
y3gCRTd3milPoNWEcMchOESOK+kfUejtWJYKpZBjWEmSN/2oPdzPOSENelmE
k+bG/fnaenp0Unf1UoZmgSoy5aU6KvM6Xo9FccgY9RZuf0+9P1gZBGhcU/tY
z6uLwwlMGJPIYbeMq2r2jB8a3/y2LiPEE6FRIo7TscHYPsYV3x5Ri+4E/jTG
ztyaHJ2qsmfUDrs/5w5QuXGNlXb03OA/HmF0cw8SldfXHJlYWH3Tn89CAV6X
ciEMGSO7nHcg4wF4pLdoWi1jvW43HwWRnjX0Lo9X+GTwxlqhV6wad+T4cSMR
ztnCdHyiQX82DlV2OvzoTFgMEtuyD7l6RA26O019PB1dS+u8Nxn++cvkZC5z
fJOnuzR/fjyjbIP7ymAFTTLIWBn+9OX4cqA3owNrbe1IVEZzlpl5G+7vsiHR
yWAkAgERRuTank2QMXPqS7hEoRzCBcslCRu+K17zK/U+AR++JtnUe4N6bsc+
gH8cUpuLl2/uH/hXKfzfvHotP989R/DcPb/mz/ffzl+86H5IwhP3375+8+K6
/6l/8+r1y5fPX13ry/jUjD5KLl7Ov7tQALl4fftw8/rV/MVFd1U+Q7NJVNfb
91KM5OLfttLrpXWCfiat8oWTaeRXV7f/979PPzc//fQ3d19fPXv69B9//jn8
8vunv/scvxDnI1wVh/ArbHdI2ItYOf1lswdSlzeWbauVP1YDBLM2wp5/92+0
zL9fmi8W6fbp51+GD6jw6MNos9GHYrPTT05eViOe+ejMNp01R58fWXos7/y7
0e/R7oMPv/gjGJEz06e//+OXGkM68EOtvgpTaxvjhxgWv5VHb+av5qePjfzJ
s4LS65PhFmf8MxVmE1eZd8NPvlEnP13q3UCX/dPFEq5xFz+HzQdjUizy/4bc
HUeeOQAA

-->

</rfc>

