<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-repository-problem-statement-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="RPKI Repository Problem Statement and Analysis">RPKI Repository Problem Statement and Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-repository-problem-statement-00"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Su" fullname="Yingying Su">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>suyy@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="September" day="27"/>
    <area>General [REPLACE]</area>
    <workgroup>sidrops</workgroup>
    <abstract>
      <?line 89?>

<t>With the widespread deployment of Route Origin Authorization (ROA) and Route Origin Validation (ROV), Resource Public Key Infrastructure (RPKI) is vital for securing inter-domain routing. RPKI uses cryptographic certificates to verify the authenticity and authorization of IP address and AS number allocations and the certificates are stored in the RPKI Repository. This document conducts the data-driven analysis of the RPKI Repository, including a survey of worldwide AS administrators and a measurement and analysis of the existing RPKI Repository. This document finds that the current RPKI Repository architecture is sensitive to failures and lacks of scalability. An attack or downtime of any repository Publication Point (PP) will prevent RPs from obtaining complete RPKI object views. Furthermore, since the current RPKI Repository is not tamper-resistant, RPKI authorities can easily manipulate RPKI objects without consent from subordinate INR holders.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To establish a trustworthy mapping between AS numbers and IP prefixes, RPKI arranges the Certificate Authorities (CAs) in a hierarchy that mirrors IP address allocation, and five RIRs are trust anchors. Each CA in RPKI holds a Resource Certificate (RC) issued by its parent authority, which attests to a binding of the entity's public key to a set of allocated Internet Number Resources (INRs, such as IP address blocks and AS numbers). CAs can issue subordinate RCs to reallocate their resources or issue ROAs (leaf nodes) to authorize ASes to originate specific IP prefixes.</t>
      <t>As shown in <xref target="repo-arc"/>, each CA in RPKI will upload the objects it signs, such as manifests, CRLs, RCs, and ROAs, to the repository Publication Point (PP) it specifies. These PPs naturally form a tree structure that mirrors the RPKI certificate tree and collectively form the global RPKI Repository. Relying Parties (RPs), as entities that help ASes request RPKI data, periodically traverse RCs from five root RCs (held by RIRs) and access the PPs specified in their Subject Information Access (SIA) fields to fetch all RPKI objects, and then validate them. Finally, the ASes served by the RPs can use the verified ROAs to guide routers to perform ROV.</t>
      <figure anchor="repo-arc">
        <name>The RPKI certificate tree and RPKI Repository structure.</name>
        <artwork><![CDATA[
           +-------+ 
           |  RC A |                   +-----------------+          
           |       |                   |        PP       |
           |  SIA--+------------------>| RC B,RC C,ROA A |-----+
           +-------+                   +-----------------+     |
          /    |    \                                          |
         /     |     \                                         |
        /      |      \                                        |
 +----+\/+ +-+\/+--+ +\/+----+                                 |
 |  RC B | | ROA A | |  RC C |         +-----------------+     |
 |       | |       | |       |         |        PP       |     |
 |  SIA  | |       | |  SIA--+-------->|       RC D      |-----|             
 +----|--+ +-------+ +-------+         +-----------------+     | 
    | |                  |                                     |
    | |                  |             +-----------------+     |
    | +------------------|------------>|        PP       |     |      
    |                    |             |       ROA B     |-----|
 +-+\/+--+           +-+\/+--+         +-----------------+     | 
 | ROA B |           |  RC D |         +-----------------+     | 
 |       |           |       |         |        PP       |     |    
 |       |           |  SIA--+-------->|       ....      |-----+
 +-------+           +-------+         +-----------------+     |   
                                                       +-----+\/+-+
                                                       |    RP    |
                                                       +----------+
]]></artwork>
      </figure>
      <t>With the increasing deployment of RPKI, in June 2024, ROAs cover 42.40% of active IPv4 addresses and 57.97% of active IPv6 addresses. The number of independent repository instances has grown to 63. This document provides measurements and analysis of the reliability, scalability, and security of the RPKI Repository architecture. The measurement includes a survey with the AS administrators of 2,500 randomly selected ROA-deployed ASes and a measurement of the RPKI Repository deployment status. The survey mainly focuses on the future consideration of adopting delegated RPKI and considerations regarding malicious behavior from RPKI authorities. We have observed that the current RPKI Repository lacks the ability to provide reliable services to RPs. RPKI allows certificates issued by a CA to be stored only at the PP operated by that CA, which means that any failure of a PP can hinder RPs from obtaining complete RPKI data. Then, as delegated RPKI becomes more popular, an increasing number of CAs choose to maintain their own repository instances. However, some of these repositories lack robust, secure, and reliable infrastructure. Furthermore, the proliferation of repositories will affect the scalability of RPKI, as RPs need to traverse all PPs to refresh their local caches. Additionally, with the rising deployment rates of ROA and ROV, RPKI plays an increasingly important role in the inter-domain routing. Consequently, AS administrators are more concerned about RPKI security, especially the potential malicious behavior of RPKI authorities.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>It is assumed that the reader is familiar with the terms and concepts described in "A Profile for Resource Certificate Repository Structure" <xref target="RFC6481"/>, "The RPKI Repository Delta Protocol (RRDP)" <xref target="RFC8182"/>, and "An Infrastructure to Support Secure Internet Routing" <xref target="RFC6480"/>.</t>
      </section>
    </section>
    <section anchor="reliability-analysis">
      <name>Reliability Analysis</name>
      <t>Although the current RPKI Repository is globally distributed, each CA only stores the RPKI objects it issues in the unique PP it runs. If any PP fails (malfunctions or is attacked), RPs will not be able to fetch the RPKI objects issued by its CA, and the integrity of the global RPKI object view cannot be guaranteed.</t>
      <t>As of August, 2024, there are 42,950 RCs and 303,918 ROAs in RPKI Repository. For each RC, we extracts the SIA field that records the URI of its HTTPS-based RRDP file (Since all PPs now support RRDP and serve RPs through RRDP files, the analysis of the RPKI Repository focuses primarily on RRDP Repository). The result shows that there are currently 63 independent repository instances (SIA fields of RCs held by the same entity may share the same PP, therefore, the number of repositories is much lower than that of RCs).</t>
      <t>Next, the measurement focuses on the ASes where the repositories are located, their IP addresses, and whether they utilize CDNs. We uses 2,000 globally distributed DNS resolvers to resolve repositories' domain names, with the aim of finding the CNAME and all IP address records for each repository. Then, we use the IP-to-AS mapping information maintained by RIPE NCC <xref target="routing-history"/> to obtain the AS where each PP is located.</t>
      <t>Typically, CDN service providers will display their information in the domain name and CNAME record, such as including "cdn.cloudflare.net" or specify the CDN in the X-Via-CDN field, cache status field, or Server field in the HTTPS headers. In addition, if CDN acceleration is used, the latency of requesting HTTPS services from different geographic locations around the world will be relatively low. Therefore, it can determine whether the PP services are hosted on CDNs from the following aspects: (1) Whether the domain name and CNAME record contain information about CDN service providers; (2) The number of IP addresses returned by DNS resolvers and the geographical distribution of these IP addresses; (3) Whether the HTTPS request headers contain information about mainstream CDN providers; (4) The latency of accessing RRDP files from different geographic locations around the world.</t>
      <t>Measurement results show that although RRDP enables the use of Content Distribution Networks (CDNs) infrastructure for resilient service, only 9 out of 63 repositories are hosted in CDNs, with 8 being hosted on Cloudflare AS13335 and 1 on Amazon AS16509. It also shows that out of 63 repositories, 60 of them are hosted in a single AS. It means that the accessibility of these repositories is highly dependent on the reachability of a single AS. Worse still, among the repositories whose corresponding ASes have deployed ROAs, there are 14 of them carry the ROA of the ASes in which they are located. It means that once the repository goes down and the RPs cannot fetch its ROAs, the route of the AS that the repository locates in may be downgraded by ROV adopters. Then, even if the repository is restored, those ROV adopters still cannot access the repository, in which case the access of the repository depends on the reachability of the AS it locates in, while the reachability of the AS also depends on the access of the repository.</t>
      <t>Real-world incidents of repository breakdowns do occur at times. On 6 April 2020, the repository maintained by RIPE NCC suffered a sudden increase in connection to service <xref target="RIPE-downtime"/>, resulting in it appearing as down to many RPs for 7 hours (RIPE's services are already hosted on CDNs). On 15 May 2020, the Japan operated repository was out of service for 10 hours due to hardware failure <xref target="service-outage"/>, and between 26 Jan 2022 and 2 Feb 2022, due to full disk space, all ROAs in its repository again became invalid <xref target="disk-outage"/>. During 10 July 2024 to 12 July 2024, we also found that RPKI data synchronized through Routinator <xref target="routinator"/> once again had missing parts from RIPE NCC.</t>
    </section>
    <section anchor="scalability-analysis">
      <name>Scalability Analysis</name>
      <t>In current RPKI infrastructure, refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, RPKI Repository has grown from 5 repositories run by five RIRs to more than 60 repositories and is expected to increase dramatically with the further deployment of ROA.</t>
      <t>On the one hand, with a deeper understanding of RPKI, ROA deployers prefer to adopt delegated RPKI to flexibly control their RPKI objects. In the survey, 45.3% of the AS administrators using hosted RPKI say they have plans to run their own repositories for flexible certificate signing and control. The result shows that delegated RPKI will emerge as a trend, and the number of independent repositories will inevitably increase. The work <xref target="beyond-limits"/> predicts that when ROA is fully deployed, the number of repositories will reach 10K and there will be 140K active RPs, the RPKI snapshot download would easily exceed 1 hour (on the premise that each repository is well accessible). Since RPs are required to check the updates of all repositories when refreshing their local caches, the increasing number of repositories will result in higher refresh costs. It may prevent RPs from obtaining routing information in a timely manner, and also prohibits the release of use cases such as temporary ROAs to enable ISPs to perform tactical traffic engineering to ease congestion.</t>
      <t>On the other hand, RPKI Repository is designed without a strict admission mechanism, allowing entities to apply for RC from RIRs or other RPKI CA entities, register as delegated CAs, and then operate repositories with a small fee and identity verification. Therefore, some repositories for unwanted purposes (measurement, attack experiments, etc.) are gradually emerging. Furthermore, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs. For example, a malicious CA can create a large number of descendant RCs and operate numerous repositories to make RPs endlessly retrieve repositories, thus exhausting and paralyzing RPs. Although the most popular RP software, Routinator <xref target="routinator"/>, has set the default value for the maximum searchable RPKI-tree depth to 32 in its latest version 0.14.1, and the RPKI-client has set the default value to 12, neither has provided a value for RPKI-tree width (as it is difficult to set a reasonable threshold). Similarly, it is also challenging for RP softwares to clearly limit the maximum number of accessible repositories. In addition, a series of recent academic works have emerged that exploit repository vulnerabilities to cause repository downtime, thereby preventing it from providing normal services to RPs <xref target="behind-the-scenes"/>. There are also works <xref target="beyond-limits"/><xref target="stalloris"/> that manipulate malicious repositories to attack RPs, thus obstructing the synchronization of RPKI data.</t>
      <t>In addition, with the increasing rate of ROV deployment, more and more RPs will connect to RPKI Repository. It will undoubtedly increase the burden on the repositories. In summary, as RPKI deployment progresses further, RPs will need to access more repositories, and repositories will need to serve more RPs. This increase in the number of bidirectional connections will threaten the scalability of the RPKI system.</t>
    </section>
    <section anchor="security-analysis">
      <name>Security Analysis</name>
      <t>In current RPKI infrastructure, RPKI authority (CA and its corresponding repository manager) uploads the RCs and ROAs it signs for subordinate INR holders to the repository it specified. It means that RPKI authorities control the signing and management of RPKI objects in their repositories and have significant unilateral power. The disproportionate division of power between RPKI authorities and INR holders will poses three issues:</t>
      <t>(1) Since the current RPKI Repository is not tamper resistant, authorities can unilaterally undermine any RPKI objects without consent from subordinate INR holders. Malicious or breached authorities can perform arbitrary operation on INR holders' certificates, such as deletion, corruption, modification, or revocation (see <xref target="RFC8211"/> for more details). These operations often involve diminishing the set of INRs associated with the affected INR holders. A malicious RPKI authority can also compromise RPs, for example, showing incomplete or inaccurate RPKI object views to RPs.</t>
      <t>(2) INR holders and RPs can only rely on RPKI authorities without the ability to verify that their security requirements are being met. Specifically, INR holders cannot know if their RPKI objects are securely stored in the authorities' repositories and can be publicly seen and fetched by all RPs; RPs cannot verify the integrity and accuracy of the RPKI objects they synchronize from RPKI Repository.</t>
      <t>(3) The history of RPKI objects is not easily auditable. A complete longitudinal view of RPKI objects is necessary to defend against malicious manipulation of the RPKI Repository and to resolve conflicts between authorities and INR holders. Although RPs can periodically fetch RPKI objects to keep track of their historical versions, it is costly, without any guarantee of completeness. Since RPKI lacks a trustworthy historical RPKI object record, it is also challenging, if not impossible, to hold authorities accountable even if attacks are detected after the fact.</t>
      <t>In the survey, 44.1% of the AS administrators explicitly expressed concerns about malicious RPKI authorities (11.5% of them chose "not sure"). Two administrators provided additional feedback, indicating that they consider the threat from the RPKI authorities to be the most serious problem. One of them said they had lost all their ROAs due to administrative/human reasons. It can be seen that threats from RPKI authorities are also widely recognized in the industry.</t>
    </section>
    <section anchor="summary-problems-of-the-current-rpki-repository">
      <name>Summary: Problems of the current RPKI Repository</name>
      <t>Based on the measurement and analysis described in the previous section, this section summarizes the main problems of the current RPKI Repository and the key reason behind these issues: the binding of the repository PP with the CA.</t>
      <section anchor="p1-every-rpki-object-is-a-singleton-in-rpki-repository">
        <name>P1: Every RPKI object is a singleton in RPKI Repository.</name>
        <t>Although the current RPKI Repository is globally distributed, RPKI does not provide distributed storage for RPKI objects. The binding of PP and CA causes each RPKI objects to be stored only in the PP run by the CA that issued the object, instead of being stored in multiple repository nodes. Therefore, the current RPKI Repository cannot guarantee that RP can obtain complete RPKI data when some repository nodes fail. Even worse, the singleton nature of RPKI objects also introduces unwanted interdependence between the accessibility of a CA’s PP and the reachability of the AS that the PP locates. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect PPs to remain accessible during any incident when corresponding ASes become unreachable.</t>
      </section>
      <section anchor="p2-rpki-repository-is-costly-in-rp-refreshing">
        <name>P2: RPKI Repository is costly in RP refreshing.</name>
        <t>Refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, the binding of the repository PP to the CA causes the number of repository instances to increase dramatically with the further deployment of ROA (as the number of CAs that hold RCs increase). Furthermore, as AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, CAs are more willing to maintain the repository PP themselves to achieve more flexible certificate signing and management. The growth in the number of repository instances increases the cost of RP refreshes, the growth in the number of RPs brings burdens to repositories, and both will threaten the scalability of RPKI.</t>
      </section>
      <section anchor="p3-unilateral-reliance-on-authority">
        <name>P3: Unilateral reliance on authority.</name>
        <t>The current RPKI authority (CA) not only operates a certificate engine but also operates a publication repository to store all RPKI objects it signs. It means that although the RPKI authority issues certificates to subordinate INR holders, the management of these certificates (especially their storage and distribution) is entirely controlled by the RPKI authority. The current RPKI Repository architecture exacerbates the power imbalance between the RPKI CA and subordinate INR holders and may also lead to RPs being deceived by receiving inaccurate or incomplete RPKI data from malicious RPKI authorities. However, INR holders and RPs have no choice but to rely unilaterally on the RPKI authority. This unilateral reliance prevents RPKI from proactively defending against the threats from malicious RPKI authorities. Moreover, it is also challenging to provide a complete and trustworthy longitudinal view of RPKI objects for post-incident audits, as the RPKI data is entirely controlled by the CA that signed it.</t>
      </section>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>This section will outline the ethical considerations regarding the RPKI Repository measurement and the worldwide survey. First, we strictly limited the rate and number of DNS resolving packets (sending 130,000 packets over 24 hours) to avoid causing much burden on the Internet. For IP-to-AS mapping, we used open-source data provided by RIPE NCC. We conducted access experiments on the RPKI Repository from six globally distributed probes (India, Dubai, Silicon Valley, Frankfurt, Beijing, and São Paulo), with each RPKI repository being accessed fewer than 10 times to avoid DDoS attacks on the repositories. For the survey, we obtained the contact information of AS administrators from open-source WHOIS mailing lists and provided an option for administrators to opt out of the survey. We did not disclose any additional information about the participating administrators or their feedback and ensured that their responses would be used solely for research.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8211">
          <front>
            <title>Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document analyzes actions by or against a Certification Authority (CA) or an independent repository manager in the RPKI that can adversely affect the Internet Number Resources (INRs) associated with that CA or its subordinate CAs. The analysis is done from the perspective of an affected INR holder. The analysis is based on examination of the data items in the RPKI repository, as controlled by a CA (or an independent repository manager) and fetched by Relying Parties (RPs). The analysis does not purport to be comprehensive; it does represent an orderly way to analyze a number of ways that errors by or attacks against a CA or repository manager can affect the RPKI and routing decisions based on RPKI data.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8211"/>
          <seriesInfo name="DOI" value="10.17487/RFC8211"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="routing-history" target="https://stat.ripe.net/docs/02.data-api/routing-history.html">
          <front>
            <title>routing history</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="service-outage" target="https://www.nic.ad.jp/en/topics/2020/20200521-01.html">
          <front>
            <title>Service outage Roaweb and rpki repository (resolved)</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="disk-outage" target="https://www.nic.ad.jp/en/topics/2022/20220202-01.html">
          <front>
            <title>Service outage Disk full caused lost roa validity</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="routinator" target="https://github.com/NLnetLabs/routinator">
          <front>
            <title>Routinator</title>
            <author>
              <organization>NLnet Labs</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="beyond-limits" target="https://dl.acm.org/doi/abs/10.1145/3603269.3604861">
          <front>
            <title>Beyond Limits How to Disable Validators in Secure Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="stalloris" target="https://www.usenix.org/system/files/sec22fall_hlavacek.pdf">
          <front>
            <title>Stalloris RPKI Downgrade Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="rpkiller" target="https://arxiv.org/pdf/2203.00993">
          <front>
            <title>rpkiller Threat Analysis from an RPKI Relying Party Perspective</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="behind-the-scenes" target="https://dl.acm.org/doi/pdf/10.1145/3548606.3560645">
          <front>
            <title>Behind the Scenes of RPKI</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RIPE-downtime" target="https://www.ripe.net/ support/service-announcements/rsync-rpki-repository-downtime">
          <front>
            <title>Rsync rpki repository</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Vc63LcRnb+zyq9AyLXlsl4ZsghKa2l3XiXJuWYXl0YUrbj
7G5t9QA9M7AwwCwupLiSU3mN/EtV3iR5kzxJvu+cbqCBGVLyblVCl0UOBug+
ffpcvnNpjMfjBztVbfLkTyYrcvs0qsvGPthJ16X8WdWHBwdPDg4f7MSmfhql
+byIPolOlzZ+g+ea2SqtqrTI69s1Hj1/9vqrBzumtOZp9I82t6XJot9fPrt4
fnL67I8Pdm4WT6MqTcpiXT3YebCTFHFuVngsKc28Hmfp2H05Ltdv0nFp10WV
1kV5O16XxSyzqzHorO3K5vX44IAj1Gmd4fnLi9+dR5ft7dGF3h5d+dsjLC86
yU12W6WY2sxmpb3++c9lJscKbM6pTVMvi/Lpg50xeFI9jc4m0fP0wU4U6ZLO
TO4+FyWeeV2l+WLZmOjbPL22Jea75Xcxfj+NvrTpj/haLhRNXpe4drpMc8Mr
dmXSDDtRZGli8t/WbqCJTZpJnLfTP59wT/KOgOdpe0Eo+JdlkS8WjcnjBpSZ
WVEarvkjqMB2N5WNXj8/i3bt29iu6+jb3+1hVH+fzBjQmqUxZv7tXxZxZmZD
Qn+YRFdNR+YPmPIW/7uL/9ekVs3t7W/552RALf/Li3JlauzXUz5x+dXp4+PP
p/7vz6efHwbXD9rrh1PeQz0Jny6LpgbJ42VacS1yLYpqUy4stGpZ1+vq6f4+
5XtSpms7yW29D/2o9g8OJ4mpzdis0/3BIJNlvcrcQKoI7obI3aDftZLKD9FY
eXx5fvEsenl6GullTIHHDw8Oj/m5suV1GtsxRjMLewetNzc3kzyNJyaZ/Lje
t/l+XaxTEIxBDuSfg0eH0/HBdJPKKx0+0uGjy8Lc2JmoGvU+6vQ+2i1tVWTX
Ntm7ZynfnFy8PD8drOOAn5O0evNXL+JQ/sFIhx+ziDNMFc2bLItiAxFMoqyo
auyHia4NNNfp+89ZwWEnNhT/OxawSOtlM5vExWr/5XMIDdSl2u+e6pF8Obi8
lRYZhVpXDeiZ8vPM3hZ5AlO9SuvqDpKSbGLi1QSjQYLTfRI0PZhMp8eP9o8e
HxwdPn4ywe/jzx9Pox55X8rYMFwcO/q6uIHRI18NbHL0HblI0iuYETA/bkob
vbT1TVG+GVJ6JDJcmywryvQuKrnz2Kg8fSuUVrcVTP7+PM1stV/Z+PBwjuf/
tMzMtYntm8k6mfepvfLjqxc5K27yRWkSG53UtaFv3LKZkO4ss3dtpSnfptdC
DCbbh+gdTeB5nxz15/WDRK+XcLN1652ieVmsoETeqWViVS9MWcOvweOsbUxj
tI2umYXtTMb10o6rGF77IzeWVLYb+wj7efB4cvQI/x4/Gm4sx48wfnQl40fF
XMjcRgwN0zgBN+t0dZ/WtlYSNny9Lsp631stk+cw9rE4cOhCdZvHG4DCT9An
9JL3bhihj7CimwuBvxuPI8h+XZq45ufvoanCg5s0sdUam5dEiV1nxa0gDbIE
+mmjV2W6gIifyHzpX+BCijzavXx1sicmsneT0wp3x3d7I2x8VTQl7NJFM4Mf
jn5nb6PzfF4aENLENbVml6zfiyAy1ymEOIKjgsWHQlFg0ry2JdgDn5h7dzJR
mYK2VFFc3q7rApK+XmL02JZ1Ok+BDPEVtBXQJp3fyirJL6wrpccWwk1vQVju
+UVkkgQWvlKYdRXlzWoGyaZixXKbfsPhejMBYEZ0cDCzoJJfD5DcBNqB9cGB
NsLcGIYFq6/kXnGnSQllyDG80x7Qs2WcEcaPsyYhZwwErbwGO3ErrE6WcB9J
tUlWaZ5yo8U8yVqjlTW4vQORw4nsWzzBYT9A+RyaQ7Kh6cKGpix5eYhcTRkv
09rqBuN5GDZ8gyVyV+bAN7iupGUwTkJFFRsAnjTD/kxgRSIjdotYqVUO3GXy
21AXVKp0Cy8KCEu0e3GxB5GG44NIXyttzhgVsxpSxEXCPa0zWzv+FrMfQSmk
z95Uk+irpsTKyhW2c4ToAIp770qxuLwAM8xqDUHFqlIGL/VIb3RCVqcUVRhD
7EKa3UYrk6frJjN9CirQjdsbkY9KuE2yEdQUZUJHaaPzl5fRssgSGNCJV+pV
miSZ5adPoFp1WVC0wBBeeV1EFvSASdUSUiDxE4SlXpKG9Zq8mMFpWYheK++6
L9AGMHCevrWVX0tZIt6wKrSnnfx70yCL3D09qfaoBQagD/EW5OBWxWWVliXl
MVSzVrFGMuecAnJ5fqkaJcTieozBsS/PTLyMTk84tpBDNuDGzsKEJO1entKi
VA1UcoZNAm/XRvbP7wh06QYmY0k5A4vEXJhoBvEmU7xWQO7q20/xsFqvN1A3
ua+yYiHdAjDJOe0UkcpLtRmeKnAEewYWVg3n6i1/hoffDIxNtYfA6USFRejv
bf/lqdAJW+0mJpVpGZXtbFAXfQwGGnNn1swhnzDwe0K4s3m0E2ohCzHcHIke
mewLd34SUYgwULWEDpL1795R+8bY159+GkGc+3sietfAhxi1kl6u0xqatMgD
NlAD5uT7KDq9fE4RO61UCEj4iKRxgA+rOodWyknu66VFvHUBjceaGoT7UDYG
PiL7llbae52eTLamNjDr+gApigsAHEErfjTev8iKGbzVhr0MoY5oBOwPHCHW
LNKUWmc+lzZb6zaU9s8NWKFD0RuMItiStEhABxcAS84YXbdfTIIoSlnA7vDS
LoYSMafqqFc2cUwJI51khueQ908QmatGrd65DwzB1hN9avfqHM4dt1PBaK9t
zU3Lsp6xGnlfmGtI4aRxBQsKgQLdI5leVkgopJqonFb5ZmjMz+KlSZzILCZc
NHRl9Pa0RrgAdgjfgSnE7P1r++Pwj/58Ntafz6Le5fdAcafRCX9v/PhHup/P
ui+Ho/R+R1u+A7P9leGz4CnG3pht/MV7EvflCP+cjsAA0ql03LG0j19Dj4b9
ls4/bBnijp9whP1gpR8/RDDCfhSM8PFDcARZ4Wd/2P8Mf/EXV6i/t3NkcwSV
gS/x+33kuOyunQY7eh8nu/3f9lc0/KuThHAESMHGCH3J+MJ/B9LO3F3yRV/u
PFPeCytaYjfF5M4lOel+v02gt8n4lrs+eoQPSOj7LTeM3w+0xP0M+dqy4y6y
32/9RBn4Uq/obMJQL1sh5cNr9zL0vRs4nPS928uPELOoJ2ebVH+EnDlu3DHK
HbI2wU8UcOMzL17jITc+XrwG5vPn/OigwvjP/upBZG2Xwp33fyMlnieh23n3
NPrEQyGN1//h4et7YcQwcmixyOThT72AHDFHyUABIGIQkGMEhoDRN01uJTs6
Up8ZF/Ch0fHh5PjgF4JLBa0AyV0fe7Tpwq1Hv5w8+eXgnsfdPYKgfNyLmwCH
7driHxAQYLE0Z5BDvLkErlmUBIdw04+PhuHiuiyumV4I489qawBa2ix14d8o
jAUVZmg+oL69Iy7uxZu6hjDg1aCZHPAx843n9Wa8jBkOR48ODiJEO0mxAv6q
LOGf4pOx7ohNFNhsBtd3EBhsJJPqjeO0I4fZDcGWsSQ1Ck0izBtBqgwGwcOy
TVSYpFjXKh2ZXUj4oQGaYNXgZkLLhSklolkBo8Vp0VRMr5nrFIGCQMlhmDqJ
vrfY1WuCdwfbPhjtawwvWRbdNMFsuvVuYzPrs/gC6AABXRaHkcxN1c+ndIGb
YXSB+2dtgqUgoxw9sH3Fmmv12BLXT098YIddyR3WZtbAZR2EgXySCJR5QAZr
H8oQEJTLhuUC5Ad8n1ncTRkHgdG6YGBfUmxDRe5USqK7ZVFUkgvhznNOh8qp
SNv0bML8s4WSQzcKzYTUEuq0NzOu4D4ANs8QN49UZayqT7sHaS/1Nkh2kKXY
tQyBWSdsvQkkvjPzOQMH3h3oaWefTCUMzS1Fp+iiFwYQDEYkgJ3D3izdohnK
sk4RL7nQkyRJObmGEK2ilunQIJYiK5wWLlcjx+9cqmKdmduqvwOQmnTFvKzh
o4XwwlnbbRnGU2ZgEJblNanYklXDVst+Q+FiRv6wAzOmbmR+b64QIUvopWEc
2VvUjAKx3C366DjY00ZJ63wCZftzk3rz+dzki8YsJOVDI8KsxE1RIlh7+OLb
q9cPR/o7evlK/r589k/fnl8+O+PfV1+fPH/e/rHj7rj6+tW3z8+6v7onT1+9
ePHs5Zk+jKtR79LOwxcnPzxUEXv46uL1+auXJ88fKmNDLyDZHFFiYfa6tNQd
U+3AJsdlOtO49MvTi//6j+lx9O7d311+dXo4nT756Sf34fPpL4/x4UYVMHdW
QD+Crbc7Zr22ppS8k5S81swkVyKLmrqAkNvJzs7f/56c+ePT6NezeD09/sJd
4IJ7Fz3PeheFZ5tXNh5WJm65tGWalpu96wNO9+k9+aH32fM9uPjr32QpAMJ4
+vlvvthxEvQaWp7mRVYsbnnlvGbm0sDQrkILzyqAZQoJ5nIFvQZPWw3Ezq0q
72RYy6YhDPbv4QkbFlixkhT+1rxc4DSuvBV6iE12xWzmlDoUFdx8ZrPacPi6
iIss2r28PLvYcw+y8s0HRQpP8mF5AYJ3pRUZX6Zrc3VagFx0BBz89JNqHLM4
Ho4EDRcPdk4yZmgXyw/lhDU7BCFNaDPSWQOJ7/JlIr7i0ILcU5AsEwdYeQvV
5CksEX0WviqbHEbyXDPhuES3VkW7MCfzJo/V60sS0CXQbcIqzIWz3UxVz+im
M9tldjYp6CVO6VF92YP6uwiBWJgFC/Lo9K5uLpgqIKka3qDNJuLZk2YhXkpB
LH2QFTNxfDh68uhA0lqc8+jgaPRk+rmi3DTfzLZ9hbUKVy9P4SxYx5ACl7KV
0baksVTAS/jpMtGvvr08F3zLyu7r1xdX45lhlZxyFYkI715J6t87rby48YU9
vUlRaXmt6ax6WYpUtM9X6k4/UM9pEd+6TFemZGkAXlcG6W7aU6gIWWmyWsxZ
V4BxXHOCiMcfH30Ys++2fFH3CV77DKI4dbPymW94KcjpUuy3/+biwu3XvAUN
HbjpoQUse8V0LwAevgXJudKtc+6pOLzEjukoIYoeIGHB2jey3F5WOHXFN5eF
HzlA0eXYrUtT4lnSLM4igtJnzIGfnr1UuCtTHY4OAPq36W109vIqcp0fpcMv
8qFHyKeRwxBs6akC5GLSFZc8d6UFqZ68PHnxTIMHyFdQEvAiOvdiXfYqcfR3
N7ZNnJ5fjOtiDHDiazlpkMz1yNK61LDrr3n3btC1A7/KOsDMo1CCHWW1EECr
U3kG65a9vl1rZnpEFnpc7wF/6UwNGEgY5rYkpMzNE7BLWKFMUQ50hYKu4Pkw
TvJJnBVNMgfAlmL7Q5o6TW6r7JIeN/w/j79LzZgXRNRHCjBd9OWv4XE2zkAy
1E64Z8UkQCmMFNrgMLhBqRaq0rnMwgx75nEyOMQmG5VjlvXy+FbVQTL7pF6H
bGMgCTeSFFBaPMjCtjXsoNaMnXJ2Vwq8yteZhFTGlSOgWyIYXh3hIRjYJLYW
f29DyedetgRQbZZFVUtIJaqgNEngWTAokyKz9GlUT6Pd6V70fTDUfZtHfCDS
FG66ouOt8vKraPdwb5B4CFUYw8KTO0Hu66L3Sx3/TNaprgthNFIKR8SMR/31
6Pb4Sozb+XsWwtVjFmtWsqZwLce6lkAMtBoj1fXWP/xVEiDg5EVgJ9UpKMh1
oa4HKDKVzenq1eXRajD+xJr46FnIJd+5FO1SEvYGcaKYI5a2s1QSGLqBI4Ux
T9hyxoHhejYMs5OwVCXMGcXPIcPSFdiJX6vVsD7To6OjR7KzU353sjJ/4a+r
6eNHB0+gjFxjVYSOcDsBo+jxgdv+1YAYE0lIyNlkwCBVIBZb96sLbLfE2lD5
ZbpYZpLacd7WeauShjMIi3uzfV8wFoZNyDK4plXhPEI/zF4yOwBVAs/XhboN
cYGSl2kzUK5S2qIAxE5+ubEpS1dsQ3DswIcMgdVrekRcYeA8h4wofOdDgCEW
ha2kHaNVPFfLI9ZTMElE1RKmNbxu/jDQ6LJHhcv65AI3ZlZmkOY1dV2vvtOU
l9hidYLs7KAlHgyV0lZooojzk4vh08p2T29QI+2GGHUMio1zs+7GYmM63fnq
rn13a4ZJ7pYoyanM3ne/SPdg6LtIUId8aU02VhcBd5kmkiUI0Ri4isnekK/c
v6iIgRgli5aumHN5lUePoxOA0Ex6VUfDhd6BJapGrFciedUksW2+RZIrMJ65
lYiEAMNbfYRaYUcdAzc1YopfyC0N5tX9qLRJogzxjiTqYIt+CV1uStbWMdan
Vd+rmYxR7O3Au+3JKqePoheQsW6R35g13GWbRQzWfIPJnWHxtHPq6YGbO2kk
hAI4Tm44rc8vvnvXb1f2oanvszl8jElzacuT64fRV3YmH0d+TOnbZbMwsI2h
oZXauwuBqGABmWZBBzWzMT1xmkspHjQErcaIaaMz7aYD8d80maz/mBNND7vP
gixF9ubO6ZigJSFiKyKCnBzAOenCnbaDt8WV/ABIKdZDaVuaJJJTGSBgbcra
uT4vRSrCn0RXQS4xjLgBvnpxdt81jXwu0UPrIJnIrdPY8IKcIWSofDpSpAtc
7dndXkTcrJMuxesi4yANO4zkukKIrO5Rf2RE7dScrsGJEl1oG0pOP9X3nGA/
TJl9u9a6A25uFSspDYGIdoa0McZc87jDetGrE+XuK7UiRc7Ufp44P2xwO8xM
GTXMgsuZG9f7pIlcug7nbMpKeoIIlgo1p8MkOHmX2bfpDGQRNpVF5qB/n4Hn
SooWPkbR8aPJ0S9C49dPszZVABQ0taohxa36QkQYuUZkzdYUOrlJrXWk9fo2
pSVJ5EBTWiT5rlB7sFgB4kBg5cLSRklzEdnqveIHCmhtKh0WlT2v5JnfYKWA
YAwq1Wtvh1ZhD5JUsxsgivlP2SSm65osu22hwb1hucwsvgf24Hee5tK24cX0
mJe1PAiLO+oyF1Vu1uBKLVZZurxuigZex7U18oiLJWyjhYx2ne8C0VB/13E1
CGpJ+o1lUcFBrszCUGvqhcaehrXU3LeoQcxzXoF6Vq4Lb4ifbD6wC4Myw2hY
aL2fVyIONGVAfLZsyxcx5LJS3ASpvKff1J+DGUTBRvyv9oPmthy5jEAlxbMl
8Gft4Ukmug/qCOIJTKo2QK4tyxqmvG3bpxT0R+dXF73mqZpbShZAueZs9LP5
AgJoxTPwMSOgky2eJHASGg4xLmo6tiQ7E0tVsknbv2pY3IagijrLeTwgS2Ad
aPZqpCU/Tto1xBV0+tpdx2YJ5yAuJZWpk8u0pyftMzT8CxgK9meHFbnTk7Az
zTn24aaK8atWFJy5q84LaqLv0W40jcB6obUU3jYsS5PfMLuZROumxFdMrwWJ
rJFvY6YtL1Op3wC91vFkT2SbKLcRUy7WREpPGzU5cCuaAdCnPvvU5CpVQ5/x
Y6HiNtwiZ2u0NZj5ZC6oIhgpARO6gqwkU98aVj5HLGu3JSrwnVkFaguYaRDb
0vJ1OsM6AIwcS2s+c+s5j5tsyTGGnnZl3qiO40GEqFXGxm5IjR3k1ciDhs5w
aRpNpXB4AAlAhL/oalk1DPPyK551coVYOv+qmNfEaKO7ActIHDjbeiW7YeeG
Kg801Sjsk2HN23TVrHAX2w1Ex8jpsXR4wPTSFxfR0aFHacwAgBCBG9CAg8n0
eDIdBaETno01pL57ckFpoyi3qdPByicbCLs7AjtKbtIElOwaV0mQHEMac0SB
4dROWr1CrQSgHExZkSVid1cpWMbEnj4qtghLzTKxFQs3U8tQ2cgYxqlkKope
qseoTkA6897b20FqjX3VIh5ihmMpHcYIA1cwVpqeEKevjtchVChWVqS9TPd1
k/Gor2BJJ2xyCK4Xurn4w8XPs9Z8i5l2nffKaHEPNNvZsIVBPPTgrBLR9us2
JBcGKukb3hyBgj+zxRys9CN35wI65RsqjrMozjPjhmKmcNhD4A6qt1X8oIvB
YeqO6zdb+o5EdQVBfhdgypFiVgqw/NGWlVyop2wZVGjgHbUtPE+KZgZLGYAd
mXbWlAwd2yB6IB5Vs1oZBubGHW0LMC42aOFyhA4Bh7Uu14DgYmehuG9YtDVi
6O79c1rd8Qt1nU1hgNvHWDNISqnxrsmC4NeNWsvxOOvQb79vosNXcuqvjYh8
09PPCYd6HQS3PI+h7q2uBgmlXnifI04s91zrvqtJOkOucadr4NfDWdsPpGzp
2Q+a8zfyS5vnY7qooQfNlbqwB64rVHrQv+EKxVDIKPTleLTJU+oV3wCwZj1K
cTaLFGXBqh63reaF67RySiP3tXH7Br1ySiZYvh46EgjAzbauivtUdpP586uf
d5goCg4TDc8RdauBNkn4Jsl+zZH8tQeKohetzcEuzyREsMnG3B5PmhIAVYCn
+nrhWh6O+Gmvraur6RCtqe2hSDZr/XtVJC3wksoMDLLLhEe7QCuu2n84ncJc
Ug5FNRNbswK+589+tLTQi9SSkpLIHzsrkWWbKHBHeHg6h30QRZwKfuzKdtLm
ZJM+i04CwzxQNfJGHWaxglBJzCNGeh7CKgaVGgq0LWYs1+eGKTmz7Uiah2ci
Rod7PZnTvlLdF8nGl9bVkIfS6iWh7nfptSckNS+bll2rZRn2HNGZadZ+ZWsg
BXdYSKuAIUUuufqGBXNN0A5SAHpaUjoxfBNEW3cLCP50U6e5SISnehZL+jKt
JqIlaeMaBuWUSvWrMDEdnALt+hfcKRnwPO7bYE+mJBmCrFfQLhm4twc7UG8W
k2hNXEV100ypWrso2TSJxPyW0tQKQYbAK61Z6YSFkhaKbaNYujKqXM0U8dxy
EQspRQVy2aKIrv612TCbJ2EhG/ZhnklmwZu7eyxdgLa97PXOK2kOrc/MInpj
7ZqhJ890erlQhklQ6lBy5aEnY2vfACghJUxb20rCETzngLmqLmWAObUbtX/Y
MZgo1C9fbN6OdqXWy41j46CiVzmYRjb0+RPL6zwET/vKhKI0lXZWY8WUmHnt
6o1zBOMT5897+TCECPfkw4h2eYRZki1rgT6Jb0Gs2tLkVgMlZ9Gm08kjP/yK
baiwUQ+5RAasD2lEb4rhnF240XZmMmpOZlgfyyWJ2GyxqmpEbtsuZFmFIp+u
urxBlbYGtoEbYwBS716yw7y9bUmuTJr4/J97qYXJ2kwjoYrLoQeLSK/t/rKB
Vri4R1M2zpqIEXGUk85qe1t0gOaxMDG0cbHQbHjbSJpA4HxNBvBNgetT/xqf
tnxzh/fnU19KF5KDwnee2e613bkU27XwrFLMycAgbT85CA1aKxee4bH1xxHV
RqtsMlX2ufczuKKoBzmC5PunZ8PDmxedYz098V2tF9On0TMofg+0iCa6immt
ebKNmOJv78TTSILlTEq/71UPm35oMPgmFR9cdyns1/2lXmgzmORIpJPI1Rz6
5m/Qwe42Ds+60oByRiXR9d9J5k1GGEn3Ft/QwEBD3HDnOFcsnq2zHr/lyG8v
e3Ufl5yf7MyrA+gKK7QzaLMhXtOs/ayYm1mKYRPubc7ot3Lzd5sqp3PthosT
BWsTVVWXXJO+YZ9Jj23rpbZW63lo4H/+7d8rvzP31FrbejRudUXani+xedX4
Jk2fxG0BkoaP/XFZY/f+BEyQeonWcbred9G/ICOSaHGOHs6Xb5W3WzoA9KwB
GOMmJorw2nS4+Qax1pGqGgVJcV85/n8pnn3QWLhQstOpO+oZYVvj31Alk2xZ
fwoe09Bz2vT2DIb94HuDFC0e3XTUUvm8v8AWARQstSN7NCwwMc3n01xhgYlU
tUcPGHC63H14jGTISrjNyur2MRmylAyrDPDBqlgXeqvVY4ETvNzIfWzdD88v
5SzFUFfuhdBXYe4alNhyRs2oXIrIqc8wgzMr8PQHcyxk6+SB74a/OHrKV9/5
jICcj6HSFx3wdW7m9dBu9nIre+I+xKK7hDc3K2SnFlmwAte2FNy2Dt5oEHCQ
qada8myDE/dtFmaYSjGhKxwQ6VrJh2/GuSMH4DpxexkX9fO9AXb7x1oYNTpv
yQ0J++/kvT5Mq0q051I8WfgugJBalbKPeqkMAmqQNNP1EAJJsiZdwdeboYfw
tSPp2b4jeaXifqublNHVuhyvutsEkVfq3mFQyt8axLdhuwTxW5ykoMm7IXlg
FLfF9ZLGyhmVFGxAoRSJDkjWJ0gBFfkd3GRn6hY5d8luR49Pdhv/kgsNLcUK
uOiyA/LVh5f0AtJbyJruKCMExwNNhyzEVwdB24dDYmIziEc9bv2mBNd68Kdl
iOzD/WLokZerY6a1OwbyrNaW0tPesUq1CwHAFusDeCDHbjiedc/deRxzW0w+
xPu1b/uUNztphMi3a5Q8OHFjXY3VV14cYBRh5NOdIe1aZrUFJ35jwbvdym3x
9OhAWt/9F3KW+PBY25z0tTHXRZqIJ5YEELN4/aS9P1GjJcRhW7rvWZeiYD52
x4JkV9rYMmgrk5Z894Ys277KJCig9qQ9PEwhyc307fYmfgY88joerNqMorNm
ZtIRsB7EuJA3l2WMv78CAn5DnDDyb/VUJ3P13/9ZRBemyYo9VzHpUH7YZifG
Qkm2TEy1Jx+mB9ps1/Hz7Ky4atMEW6sfX7nCo08O3FiHxt1eS3syI6agrUAw
6BCNaDtCwPzvv351zv1JBUBkaeVOZXexPmvnMiB1bDAczwus27bbjkLZuQRL
o1ME7+OM+QXi2iB1sNlLLeabb8uJ07VmEoZHskvnZXzaQWhVbN4dXtP3IK2Z
6a5cX8rMyR1k3727h7dI+XYyqLFs0fAvz9xLtU5engy+j959wqs/tZagPetI
5AaDLc+EGVTM97+ScK/E21gAAA==

-->

</rfc>
