<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC0791 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.0791.xml">
<!ENTITY RFC0792 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.0792.xml">
<!ENTITY RFC1191 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1191.xml">
<!ENTITY RFC6864 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6864.xml">
<!ENTITY RFC8900 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8900.xml">
<!ENTITY RFC4821 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4821.xml">
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC4443 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml">
<!ENTITY RFC7296 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY RFC4963 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4963.xml">
<!ENTITY I-D.ietf-intarea-tunnels SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-intarea-tunnels.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-liu-ipsecme-ikev2-mtu-dect-02" category="std">

  <front>
    <title abbrev="Downstream Fragmentation Notification">IKEv2 IPv4 Downstream Fragmentation Notification Extension</title>

    <author initials="D." surname="Liu" fullname="Daiying Liu" role="editor">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Liu" fullname="Renwang Liu">
      <organization>Ericsson</organization>
      <address>
        <email>renwang.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Zhang" fullname="Congjie Zhang">
      <organization>Ericsson</organization>
      <address>
        <email>congjie.zhang@ericsson.com</email>
      </address>
    </author>

    <date year="2022" month="May" day="13"/>

    <area>Security</area>
    <workgroup>IPsecme</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines the IKEv2 IPv4 Downstream Fragmentation Notification Extension which enables a receiving security gateway to notify the sending receiving gateway that downstream fragmentation is ongoing.
The sending gateway MAY take action to avoid such fragmentation to occur.</t>



    </abstract>


  </front>

  <middle>


<section anchor="sec1" title="Introduction">

<t>This document considers two security gateways interconnecting two security domains using IPsec/ESP over an untrusted IPv4 network.</t>

<t>As per <xref target="RFC0791"/>, IPv4 packets crossing the untrusted network may be non fragmentable (by setting their Don’t Fragment bit to 1), to prevent the fragmentation by any downstream node.
In that case, when an incoming packet is larger than the accepted Maximum Transmission Unit (MTU), the packet is dropped and an ICMPv4 message Packet Too Big (PTB) <xref target="RFC0792"/> is returned to the sending address.
The ICMPv4 PTB message is a Destination Unreachable message with Code equal to 4 and was augmented by <xref target="RFC1191"/> to indicate the acceptable MTU.
Unfortunately, one cannot rely on such procedure as in practice some downstream router do not check the MTU and as such do not send ICMPv4 messages.
In addition, when ICMv4 message are sent these message are unprotected, and may be blocked by firewalls or ignored.
This results in IPv4 packets being dropped without the security gateways being aware of it which is also designated as black holing.</t>

<t>To prevent this situation, IPv4 packets are often fragmentable with their DF bit set to 0.
In this case, as described in <xref target="RFC0792"/>, when a packet size exceeds its MTU, the node fragments the incoming packet in multiple fragments.
The inconvenient is that the receiving security gateway will have to re-assembled the multiple fragments to rebuilt an ESP packet before being able to apply the IPsec decapsulation.
Fragments reassembling comes requires additional resources which under heavy load results in service degradations. 
Firstly, fragment reassemble requires the security gateway to handle states for undefinite time. 
Then, as detailed in <xref target="RFC4963"/>, <xref target="RFC6864"/> or <xref target="RFC8900"/>, the 16-bit IPv4 identification field that is not large enough to prevent duplication making fragmentation not sufficiently robust at high data rates.
Such service degradation could be avoided by being able to indicate the sending gateway to send packets of a smaller size.</t>

<t>This document defines IKEv2 IPv4 Downstream Fragmentation Notification Extension so a receiving security gateway can notify the sending receiving gateway that downstream fragmentation is ongoing.
Similarly to  ICMPv4 PTB <xref target="RFC0792"/>, the notification carries an indication of an acceptable MTU value, so the sending gateway reduces the MTU of its packets.
This includes indicating the MTU to the source host of the inner packet, fragmenting the inner IPv4 packet, performing source fragmentation.</t>

<t>This mechanism follows the <xref target="RFC8900"/> that recommends each layer handles fragmentation at their layer and to reduce the reliance on IP fragmentation to the greatest degree possible.
This document does not describes a Path MTU Discovery (PMTUD)  procedure <xref target="RFC1191"/> nor an Execute Packetization Layer PMTUD (PLMTUD) <xref target="RFC4821"/> procedure.</t>

</section>
<section anchor="sec2" title="Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="ipv4-downstream-fragmentation-support-negotiation" title="IPv4 Downstream Fragmentation Support Negotiation">

<t>During an IKEv2 negotiation, the initiator and the responder indicate their support for notifying an IPv4 Downstream Fragmentation by exchanging the IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED notifications. 
This notification MUST be sent in the IKE_AUTH exchange (in case of multiple IKE_AUTH exchanges - in the first IKE_AUTH message from initiator and in the last IKE_AUTH message from responder). 
If both the initiator and the responder send this notification during the IKE_AUTH exchange, peers may notify each other when IPv4 Downstream Fragmentation is observed. 
Upon receiving such notifications, the peers may take the necessary actions to prevent such fragmentation to occur.</t>

<figure><artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SA, KEi, Ni -->
                         <-- HDR, SA, KEr, Nr
HDR, SK {IDi, AUTH,
     SA, TSi, TSr,
     N(IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED)} -->
                         <-- HDR, SK {IDr, AUTH,
                             SA, TSi, TSr,
                             N(IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED)}
]]></artwork></figure>

</section>
<section anchor="ipv4-downstream-fragmentation-notification" title="IPv4 Downstream Fragmentation Notification">

<t><xref target="sec:notifier"/> indicates how the receiving security gateway detects downstream fragmentation, the MTU to be used and notifies the sending security gateway with IP4_DOWNSTREAM_FRAGMENTATION notification.
<xref target="sec:notified"/> details how the sending security gateway reduces its MTU upon receiving a IP4_DOWNSTREAM_FRAGMENTATION notification.</t>

<section anchor="sec:notifier" title="Sending Downstream Fragmentation Notification">

<t>As defined in <xref target="RFC0792"/> IPv4 fragmentation can be handled by any node, that is the host as well as any router on path.
<xref target="fig:ip4_header"/> shows the IPv4 Header as described in <xref target="RFC0791"/> section 3.1 to illustrate the different fields involved.</t>

<t>A sending gateway supporting the IPv4 Downstream Fragmentation extension and performing fragmentation at the source, SHOULD set the DF bit to 1 on each ESP fragment to avoid any further (Downstream) fragmentation.
As a result, a received IPv4 ESP packet with its DF bit set to 0 is a suspected of being fragmented by a downstream router.
The receiving security gateway records the corresponding Total Length field as a potential ongoing MTU on any initial fragment. 
An initial fragment is an ESP packets with the More Fragments (MF) bit is set to 1, and Fragment Offset set to 0.</t>

<figure title="IPv4 Header" anchor="fig:ip4_header"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version|  IHL  |Type of Service|          Total Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Identification        |Flags|      Fragment Offset    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Time to Live |    Protocol   |         Header Checksum       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Source Address                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Destination Address                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Options                    |    Padding    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Based on internal heuristics, the receiving security gateway MAY decide to inform the sending security gateway that more than expected refragmentation operations are observed.
Such heuristics include, for example, a threshold for number of initial fragment received, a threshold for a certain rate of initial fragments. 
Such thresholds are also expected to be combined with a timer or a counter of already sent IP4_DOWNSTREAM_FRAGMENTATION notifications to avoid overloading the sending gateways with such notifications.
It is expected that the time between two such notifications increases with the number of notifications.
The receiving security gateway determines a recommended MTU value to be used by the sending gateway.
The recommended MTU SHOULD be one of the potential ongoing MTU observed from IPv4 ESP packets that have been correctly authenticated.
The recommended MTU SHOULD be greater than some minimal values. 
<xref target="RFC0791"/> specifies the IPv4 minimum MTU is 68 octets, but greater values are likely to be more realistic.
Once the appropriated MTU has been selected, the receiving security gateway sends the sending gateway a IP4_DOWNSTREAM_FRAGMENTATION notification to the sending gateway as described below:</t>

<figure><artwork><![CDATA[
Receiving Security Gateway                 Sending Security Gateway
-------------------------------------------------------------------
HDR SK { N(IP4_DOWNSTREAM_FRAGMENTATION)} -->
]]></artwork></figure>

</section>
<section anchor="sec:notified" title="Handling Downstream Fragmentation Notification">

<t>Upon receiving a IP4_DOWNSTREAM_FRAGMENTATION notification, the sending node checks the proposed MTU is greater than a minimum acceptable value as well as as lower than the one currently in use with the SAs associated to the IKEv2_SA.
If such criteria are not met, the notification is ignored, otherwise the sending security gateway SHOULD try to reduce its message MTU using one or a combination of the actions described below:</t>

<t><list style="numbers">
  <t>The security gateway SHOULD request the hosts to update their MTU, so the resulting ESP packet does not exceed the recommended MTU of the IP4_DOWNSTREAM_FRAGMENTATION notification.
The resulting MTU of the inner packet is designated as inner MTU <xref target="I-D.ietf-intarea-tunnels"/>.
For each incoming inner packet, the security gateway checks the packet length with the inner MTU.
When the packet length exceeds the inner MTU, the security gateway SHOULD discard the packet and send back a ICMPv4 PTB <xref target="RFC1191"/> (resp. an ICMPv6 PTB <xref target="RFC4443"/>) if the sender’s IP address is an IPv4 (resp. IPv6) address. 
The expectation is that the sender will adjust its packet size to the inner MTU.</t>
  <t>If the inner packets have their DF bit set to 0, the security gateway MAY perform inner fragmentation. 
Note that this assumes the destination node of the inner packet will be able to perform the defragmentation operation which is only mandated by <xref target="RFC0791"/> for IPv4 packets up to 576 bytes. 
As a result, the security gateway should be aware that  fragmentation may not be handled by the destination node.</t>
  <t>The sending security gateway MAY perform the outer fragmentation so that fragments fit the recommended MTU of the IP4_DOWNSTREAM_FRAGMENTATION notification.
When doing so, the security gateway SHOULD set the DF bit to 1, so the receiving security gateway knows fragmentation is performed by the host and does not continue to send IP4_DOWNSTREAM_FRAGMENTATION notification.
Note that setting the DF bit to 1 exposes the communication to potential black holing.
Note also that this action does not prevent the receiving security gateway to perform refragmentation and as such has limited impact in term of performance gain.</t>
</list></t>

<t>The sending security gateway MAY perform a PMTUD to further verify the MTU value to be used.
As network configuration are dynamic, the MTU may change over time, and the sending security gateway SHOULD consider moving back to the initial value of the MTU.
Such time is expected to be configured, and might be further defined by PMTUD mechanisms that are outside the scope of this document.</t>

</section>
</section>
<section anchor="payload-description" title="Payload Description">

<t><xref target="fig:notify"/> illustrates the Notify Payload packet format as described in Section 3.10 of <xref target="RFC7296"/> with a 4 bytes path allowed MTU value as notification data.
This format is used for both the IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED and IP4_DOWNSTREAM_FRAGMENTATION notifications.</t>

<figure title="Notify Message Format" anchor="fig:notify"><artwork><![CDATA[
1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields Next Payload, Critical Bit, RESERVED and Payload Length are defined in <xref target="RFC7296"/>. Specific fields defined in this document are:</t>

<t><list style="hanging">
  <t hangText="Protocol ID (1 octet):">
  set to zero.
SPI Size (1 octet):</t>
  <t>set to zero.
Notify Message Type (2 octets):</t>
  <t>Specifies the type of notification message. It is set to TBD1 by IANA for the IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED notification or to TBD2 by IANA for the IP4_DOWNSTREAM_FRAGMENTATION notification.
Notification Data:</t>
  <t>Specifies the data associated to the notification message. It is empty for the IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED notification or a 4 octets that contains the MTU value for the IP4_DOWNSTREAM_FRAGMENTATION notification - as represented in <xref target="fig:mtu_data"/>.</t>
</list></t>

<figure title="Notification Data for IP4_DOWNSTREAM_FRAGMENTATION" anchor="fig:mtu_data"><artwork><![CDATA[
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                          MTU Value                            |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>IANA is requested to allocate two values in the “IKEv2 Notify Message Types - Status Types” registry
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>

<figure><artwork><![CDATA[
+=======+========================================+
| Value |    NOTIFY MESSAGES - STATUS TYPES      |
+=======+========================================+
| TBD1  | IP4_DOWNSTREAM_FRAGMENTATION_SUPPORTED |
| TBD2  | IP4_DOWNSTREAM_FRAGMENTATION           |
+-------+----------------------------------------+
]]></artwork></figure>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This document defines an IKEv2 extension that informs a sending gateway that fragmentation is observed.
In addition, an observed MTU value is reported to the sending security gateway. 
These pieces of information are inferred from a valid ESP packet that is authenticated, and the information is transferred from one security gateway to the other security gateway using the protected IKEv2 channel.</t>

<t>On the other hand, ESP does not provides any protection to the IPv4 header and as such to fragmentation procedure nor related pieces of information defined in <xref target="RFC0791"/>, <xref target="RFC8900"/>. 
In our case, this includes information such as the DF bit and MF bit of the Flags field as well as the Total Length field from which the MTU is inferred.
This is not surprising as fragmentation in the case of IPv4 MAY be performed by any node.<vspace />
Similarly, ICMPv4 PTB messages are not protected either. 
As a result, the security considerations related to MTU discovery <xref target="RFC0791"/>, <xref target="RFC8900"/>, <xref target="RFC4963"/>, <xref target="RFC6864"/>, <xref target="RFC1191"/> apply here.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The authors would like to thank Paul Wouters for his reviews and valuable comments and suggestions.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC0791;
&RFC0792;
&RFC1191;
&RFC6864;
&RFC8900;
&RFC4821;
&RFC2119;
&RFC8174;
&RFC4443;
&RFC7296;


    </references>

    <references title='Informative References'>

&RFC4963;
&I-D.ietf-intarea-tunnels;


    </references>



  </back>

<!-- ##markdown-source:
H4sIALyFfmIAA81b6XIbR5L+jwi+Qw31Y6gwAIkURwdjZ2cpkbIY5rUEaYf3
j6LRXQBq2Aemq5sQTFHPss+yT7ZfZlb1AYAQJdERA4dtorsqMyvvo9Dr9TY6
hSlivaeOfjm82VFH5ze76iCbpbbIdZCo93kwTnRaBIXJUnWaFWZkQvly+KnQ
qcVfG51gOMz1zd7DNm50oixMgwQ4ozwYFb3YlD0ztTpMdM9c65udXlKUvUiH
Re/5zkbHTPM9VeSlLXaeP39DTwJg2FMDHZa5KeYbndkY5J8zgI3O9Qxf0kLn
qS56B4RgowPEe8oW0UZnozM1exsdpYos3FNzbelvm+UgemTrB/Ok8R0Iy2KS
5byPPj3/h1ImxaqDvjo2Zf1QDncQmLlJx+1XWQ5aD3MTWkuc8I/zjESgI1Nk
ef1UJ4GJ99QkwOuoDzb9l3Y7+2GWrKHmxIyDMi6WKUqNjpff3kOUQx/xrn4i
ux5EwsVKhlzodBY8kCEOdy5bHnz2d331PxNsWET9LkvH/zR68eV65KFs6v9B
mxbQ0z+9Xk8FQ+h7EBb0/XJirIJul6T3KtIjk2qrion+AdtSs4kJJ0qnwTAG
sAAcCbW5Ib2yTv/VOCj0LJhDpVVKQOaM0+o0omX1hmrdJAB5NR2jFh04A86d
YUOfjlQD8ttP9n9XRXCtFY5NG4A2uMlMpGwJStvA8C4LQWbf8ysxURRr+vaE
rDTPolKg3D7BebbvlvkIKVgT6RycnGVLh7aQO2wdi1L4CyKztSrKIMrUqtLS
K/YRzw4H5yq70bkKUlWm7Fh0JMKBy5hl+TVTu2/VFItub/9y8f7d81dvtu/u
urJqGoTXurAqzDPLcIndNSQHRCXg1VBDJGnNFAhRbQ3nILAo3E6TQyfSvxaV
OqihKYhx20+79L8pPCs9JSRt5gJOkM6bkkyzSIP4o1RkHAZWd6FBOqWzmhSa
S0iFfhJ0HORjnBGLU4YfhKGe0hlOgk8mKRN1mQepTYxlVbxKQdjWyeUVEYbV
NZwoz6ZTbAtS+lcdvTshPiXa2mCs1bmsu8wy9daM1db55dunNV937u4IRK6L
Ei47oiM31TeIohxwnC46yIBQQTdkFQfagp/ClqsUvAgnzGu/aGaKCZxApJX+
VxnEhGSXqZ0F2F4yU4EbHBW6trdJ3rTMgAwYpW7whyGDDaDpKh0hdpTArON5
F4ajwfQUVojzxHN8F6OY5lmoozIHBFJYfCfbCXHKLNFNAeZZCW3GE7JkFU50
eM2IgU2YawWgW0BMWuC2FfmDbYa44cSPNQ2BIH7SVtYpq1uPyxS0FjAlHXUZ
o9PiYZxBiMyhkclheXEMP5ErM06zXEd9Z7UQFWIEn7FlKkNNsvRqQtLAQZ2c
Fw1a1gYzIicbKeic+EASdGwzOFYLrAHJC+wYxkChJlksDgt0NE0Ge6wpykBY
0SJJwMPNtq2TNcWZ5Xs2RdgqKcJzb1iAKYYF7KAlzM0QpODETZX2ZueNxJo/
oHufQq0jcAfoIVGxIrLZigQJF0uWmqoEbDXTuLHSWQStTXFaQwc2VgyfgKwJ
FDMTx8gqbjSdK9e9wFqd4PARb1xGJcuGpYkLMm9yoI6yoYb+ay8y4h9Fg+k0
lhjEDhdMCoMp9IKlALLfV3Ch84KatuPMmh79q4SC2UqDYa34mpV5iIeiCWWK
eKAmOriZqzgLoqbaWZ3fkGVFepwHEaO0fQWkJrcF2ag/VY1c10hXaSQdCQ4S
YQspJB5ZhTMzDQjwhjyDSTShgDhSpxUFEgivFP+AUuy+efmClEJU5OXrl7vw
LpmPLq/fPH9Obwn79sseKR2rKsJe2kgKRkjDIhEwBE32z/4byUFWjifNWBGV
09jvSoJr4m47dLDzKEcATXoDaeXZENFLAfTEABYYh1SDDgt5DcjjrOArJFaC
IHgHjv/iHdqq0PKei4lEkYkD8xYJYw+UTeBaIF0ymP79WdUPZFRwIWvTKDjw
R8+jBiYxEFbMh25GsbbPEH/QoDoM8tyQMaSelfSUGJUuBCN1E8QlnJLNVvIa
ProMnYLTanas1rPeu284k7iET6uQueSGdvi4zJYIhwttARBxVykEJqBq+/J7
5W3D9XYpr4IJsYdz4FqsI1tyBCUagTw1FszN4jibyQGaViNSgHCyBADgXCn2
wzDm5CHYau2CYMQ/wr/LIgpy7N+IQc5zxiZI8SWjKLac0dKaMSQO6yjYHjRy
IUoFIYr+ksJmWmzVhwpKV84DBBli6oGxIeWic2RF+H7wVDVyhVYqgjDLvvcT
1LXwOZX5Q4g65pMwBAA6Fkiyfff1Dm2voPYl974Qjydu+Bj1TUkZACfhOy4J
1+paI1ZkOZi6eXI1uNzsyv/V6Rn/fXH431dHF4cH9Pfgw/7xcfVHx60YfDi7
Oj6o/6p3vjs7OTk8PZDNeKpajzqbKDI2JQHZPDu/PDo73T/eJHdatJhLMRwC
GWqpAuD+JCvotOLy23fn//e/27uOITtgKBjidGj7FXnimXhuYMtS2Kh8hZjn
HcQyHeQEBW4J5jg1BZIQ9vJ2AtNHFAJPO66gWeuOBuV0imRRneoxTNy1QjY6
B/A+5DFT59PS+nXXGZCh75lTVVZQO804Bjb9KzTaOhQUoMSFedBrKYPbRmpC
Va432qPz3Y8HZ7+dDi4vDvdPPr6/2P8ZsrncJ0l8HFydn59dXB4etHyVlRAo
kan2YKwwQ5dvmtSXwx/3ry4/eKyoiUzKSRW5lCr/WFpmVc+DGFE4r1f4FHaU
Z8kCw9yGOLh3fcXOp3SEo5EaZpIDrmU9h65i6byRiHPlMcnzUSFLObWLMOyt
gA4AJVFfKyiKKUOKxMi4QeoVSGlGMorTLZG4Oq1CymU7BxlsAgfgd6SIt83s
4Wt1/JcvXygV9qy573PhWcWV/49+NjofDi66arDfVb8cmq46NarX+8+6Z7P0
+Y9eTzW25NiSeyC/qNujAwAh6XQdDFp2OTD0n9w/O916mCE8vXswMYw6b6O+
77OKpPs+DyfVCfAhLqvdtt3o3N4iPuyJiumcCnfnfywSgtnXyg6kxSgs7b0p
U7eZa8BllNa1FBxC28psVlQ1sNp1TGjZRn/hNBFOI3l7fZZ7UflsyhVyqmwb
YvBNZEAMT9TAoXpYMstxupaDa1dJbrxUioqM2/ZMOS44LAlS5DtJVIp2qwKD
OMBpHmLdTCP6UasknfseBaBMkcYwH0dmvGemux9RkkWsFxQbXeuTkH/g5/cX
zJShWC2NwBf9ba4c4rik1qqrHSIzGiHSwjtxFUQZ6k0W33DnAYdfynddJKzj
2To111VtQNrWyE5XJY4uZYUpS0rD7QE8dt0CatwRb9ixU6Vc1ZtVn5SYOCpz
dvpbNVFPF7JglmngattuVbP4XmWjCmfNJ11c6FhIb8yWdsoNHQquUp55RE70
yx0o11xYY8yUcVNmSEfHXy4u0tLLDCmSOtbpGFRJzUqagxS5oLIA71xdJIVI
yvyQSBtXlFF420+XHvOJmh0IWzVs1Al1IurewtbJ+6fMDeoBCUO2JcerGq1n
oxG9aTR4nG8E65Y/2yue7ax49oL3b+PdC7Wr/qZeqlfqtXrzLc82Oj/1fvCf
jc7nXxH2oUifUXB+OFbq8+V8ygnWQEr5zzXJLZH5z+fHoaKCd9TuZngs7+Ng
bN2qRck8JhWXJuFi4RgmpBjfeZ4VWZjFhKWi0rmqd9R6tWXyJ/Gi/RlIEbwv
re57Fv25VDQb6F+h40+k4mwqyegqrPSfc2oKwnE8GhVs7bd76kk7gimeif99
sxG8NjnKvg0oJ6FMnCfMMJqJhl8E70KXbK9xmTQ4i3RoItcaoyizPs/gUJyQ
X+MRjf7kHHmu25EpQ8ySjF/a2r5GcL27mkbf4elyiag/BQkKLYotxQQin2Tw
1Vw7lsmQQvxo2QH7ILS8KVChzpFApdw4XLWZS0SmqNopBHNfvzqdZH9hlgw5
nWEHH3CXNVeCJyvTQugLYkStaC7l5YOzLlsHY+q+UA/ZZwoLiYSLL8ulFU0D
OLbUZPvOO1GKExQzjYKOx5FLu0kO1H/WjfhVM30R0VdCMeXVlK/4+bB0wmiK
59uCzYR6OF91zhpLa7fLcYaaR1uu33dPIHdKJzX1Qori5hI8cxgSWzhlCKnz
THcrCByVEdFXyZC+mxtZ8vQMBzcJaOGDsoa100pIpy4emCzeAddOkCHAl69R
2xagsauGZVFhEHisnrG51tK6BQVsjlgTs0WB4LPU9Q2D6TTPprnh0RQBn9B8
ik5rdexGal9xEZZbmKsauN9QUyyOUCsQzfR7qONstldlPBcVTf5ajfrZbVuK
Vg7s4sLHK/O5Sv5KRetLblfLooT6QMXMd9ZQEXv3q+8u47othvNIj4e3IktS
i8w6pYDGtZQ4qPSx0dAXq20WXlZBXs1ZPc+ayzyX+Q28Lqy7diYDqh2szULR
RqcR3GH8ONjvc5uL3RLUAaSYgBWd+tQJdeiXBhE0HJBRb1faVTNj9frg5Yy2
yOeN/jpVKb75xpUzX6Bg5yKenZx+NeWQmbt4zFWqu91Xl6smdg41jfWoR+8r
WXb75TSqG6Y8hXUjEym0iJxGaVW172V26+235Z0cod9S81+28DWANGcpfLOi
NeyWt7T89vYfR72DvtHFqIdchG7E9YoSr2N7d0czVgrvVIJWs+T2lGbloLOp
skJBLCVBpVYVAUDxG/Url9f6IXdr+T0InZwiY8Mgj5rAqE7jDuuQxvvB8sjM
jUW2qPDsV5dOXjZW7O7uvri7e6rMqNJTnf/V0kjHXSpx1SQHBQcIf798Wl06
kaGuC/GVIVSBXkDKOD2I/kkD1HqoJiN/Z3hNvm10doBnWdzWjeRX3T24h3+U
Ubp2hQO1NEiDz9OeYsM+oUxcMIwaOT+7rFU6yIejEa+b6Hp0AuCeNLS+scHz
lATSDFr3a1xwprSxdSmjnBKOv716iaWFRPNWE2QlF5BI+jk0Xxrh0y70blzL
faHptYoLLKEX3rHc49uajGdnzC2xNkp2K6CkvkYxMsVjORA2viiTEep661rR
oGr4vHtTkeuUWnhLM2136pp/0iKEpVauMsxo+itZp9xQ+oaD1frauCPXaq7B
GjOrfecpScq0kffUuenCxSCGy3VGwxik41gR3rxqt/6epZf9YiHWvKNF2V9s
EkOKbxJouMy/kKqTwB0EnjOPUTT1/dD1QToXuGEvSPGdRNQx/srCqrxf2on+
biJEhIq3dNZKRhPN0yAxYd2DTzgg8HSOb0tSVdOt5mBfi/r+1ibSZWYiu/HK
GUpZKCQ65RffKMUh1U+tysoVhEJzdTPNjCds0J4Dvv8NxRTuVLcHnM/m2rgs
LFfgdIgwmzoCGlPlvp+NnAdzvl10wJnHtB6CULNA5nc0Aqka1aKSpzLY85ud
G2VZF0sd8EHd9H5OhNzewjm+2nnzkobSUvfuiivkZjsNoZEFNiu7YHH+GBSB
v4TgkBorlR9522q0+cAJb/At5mvrDuo3NEv/LXql6lR/Kiqhqc/vPit1cTg4
vPgVTGj2B/2SdrP00XpiVU/y6ECwDs6P1IAyiZoKp2EnLo3mtu6f3Zn7hg+o
+HLPq1YBdkB3zFZ/vjwKFY/dH/SXwqQ3uCCF92xrm9XdGTemaqpVV72Dq8Tx
Y/XWIJmp9IuMbEGv2CUvzvPEMfTVQHoaoUfSWLh0P4brpKZWbW1Lu+Mp3uz5
BPMPnWfkfr2yrVu0Sv22dlwPRTYMWk2Xws0dWn7KFYHIhJsTmsu3B9vkv4/2
T/fZX33nZRSqJgXczjeBW5GNtBV2xfH4ruRyrb3utDqZImT+4PkoNAjTJbpR
2sU/dminAN98bNWjoJJrZENWZoSsgGQBSVF+pONyiVnPyv4d/PcPe4s1IIiZ
vzIzvxvEQ6l4bJ/lJdbyWi0PLDXY/bohLu2J2NA7l9ZJuKcX/NhY32sR/ac0
Ra6lzTLfSHX3sDblltsKJ0K3uwbIo0srXzcBc2yQWs03OlvBTWBirkGpjVwU
U7v37NlsNuubIA36WT5+Bgs045QLrWfyK8JpkAcJ9caXH/Q/TYokfrL4uLeN
4r9qdsiVU/7hglz1xpnrjulPf5eP//9XP6ymokasKKdnl0fvf1cnh4PB/s+H
Azo9OH41UJe/n+NrpRHfhYcdKfA80Ld8dnt2vrZnUVvl89Panm7j81PdsK37
x8tKtfrOd3VFsr6vIXdVeJLGVx0Wb5g36+/lK3QLv5QB/GqIUftP1m26S7L8
26TF4sf1i6xWU0MX7GQGJlm4r7PwXee5H5MEhMREzY6jv37TmovUhVcTHvWi
6AdaTYjUSl1VsXKXgsukpbdl9SO26rc/jtFUPqU6lgvZZ2kDCDVRukx2o3pG
qRdpuSTkIDWmEdzncePVZplMJWxLQvUFaLrznOuYo+pqjq668rRd/9BCrojz
rU7ItszdD3eKhbvuNTymKLDNngPReiJ/ulKVbyzUN1t8i55erbj7wlKRfpgP
zIxdhFbdvLfuNxn5NDcsj2Cp+SL899dkmZ/UExjqdlPG3+TqK9X44UF3xW/n
bNX0rwWvDcl3feMtbBlsJSJIkk4XVXfa7xdJd83vYrrtDq/8moivWfvCfD+k
5lSso7FcYPc5t/xMGxLhfiBN7UT5gvQa+XUZq9+4Tyc/4JGfq90YPbMsY7J2
DjDSmyvkqS3HY2oQSnH7/79ES6wwPwAA

-->

</rfc>

