<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ls-ipsecme-ipcomp-exclude-transport-layer-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="IPComp excluding L4">IP Payload Compression excluding transport layer</title>
    <seriesInfo name="Internet-Draft" value="draft-ls-ipsecme-ipcomp-exclude-transport-layer-00"/>
    <author initials="C." surname="Li" fullname="Cheng Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author initials="H." surname="Shi" fullname="Hang Shi" role="editor">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>shihang9@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Zhang" fullname="Meng Zhang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>zhangmeng6@huawei.com</email>
      </address>
    </author>
    <author initials="X." surname="Ding" fullname="Xiaobo Ding">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>mirroryuri.ding@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="28"/>
    <area>Internet</area>
    <workgroup>IP Security Maintenance and Extensions</workgroup>
    <keyword>next generation</keyword>
    <abstract>
      <?line 68?>

<t>IP Payload Compression Protocol (IPComp) is used for compressing the IP payload in transmission to increase communication performance. The IPComp is applied to the payload of the IP datagram, starting with the first octet immediately after the IP header in IPv4, and the first octet after the excluded IPv6 Extension headers. However, transport layer information such as source port and destination port are useful in many network functions in transmission.</t>
      <t>This document defines extensions of IP payload compression protocol (IPComp) to support compressing the payload excluding the transport layer information, to enable network functions using transport layer information (e.g., ECMP) working together with the payload compression. This document also defines an extension of IPComp to indicate the payload is not compressed to solve the out-of-order problems between the compressed and uncompressed packets.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://VMatrix1900.github.io/ipcomp-exclude-transport-layer/draft-ls-6man-ipcomp-exclude-transport-layer.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ls-ipsecme-ipcomp-exclude-transport-layer/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IP Security Maintenance and Extensions Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/VMatrix1900/ipcomp-exclude-transport-layer"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IP Payload Compression Protocol (IPComp) <xref target="RFC3173"/> is defined to compress the IP payload in transmission in order to increase the communication performance between a pair of communicating nodes, provided the nodes have sufficient computation power and the communication is over slow or congested links.</t>
      <t>In IP version 4, the compression is applied to the payload of the IP datagram, starting at the first octet following the IP header, and continuing through the last octet of the datagram. In the IPv6 context, IPComp is viewed as an end-to-end payload, and is not applied to IPv6 extension headers such as hop-by-hop, routing, and fragmentation extension headers<xref target="RFC8200"/>.  The compression is applied starting at the first IP Header Option field that does not carry information that must be examined and processed by nodes along a packet's delivery path, if such an IP Header Option field exists, and continues to the ULP payload of the IP datagram. Therefore, the transport layer information such as source port and destination port is compressed. When IPComp is used, the Next Header field of IP header is set to 108, IPComp Datagram. The IPComp header contains the original Next Header and the Compress Parameter Index(CPI) is inserted between the IP header and the compressed payload.</t>
      <t>There are many network functions which needs the transport layer information to work. For example, flow-based ECMP, Carrier Grade Network Translation (CGNAT), Access Control List (ACL) may require source and destination port to identify the transport layer flow. Some Firewall (FW), Deep Packet Inspection (DPI) also need to inspect the transport layer information. If IPComp compressed those transport layer information, the nodes along the packet's delivery path can not obtain the source port and destination port. Therefore the IPComp is not compatible with the network functions requiring the transport layer information which makes it harder to deploy.</t>
      <t>This document defines an extension of IPComp to support compressing the payload excluding the first 4 bytes of transport layer header which contains source port and destination port. In this way, the IPComp can coexist with many network functions which requires these information. This document also defines an extension to explicitly indicate the payload is uncompressed to solve the out-of-order processing between the compressed and uncompressed packets.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document leverages the terms defined in <xref target="RFC3173"/>. The reader is assumed to be familiar with this terminology.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Currently, the IPComp will compress all the IP payload which includes the transport layer information. If a layer 4 load balancer is deployed along the IPComp packet delivery path, then the load balancer can not obtain the source port and destination port to identify a flow without decompressing it first. In other words, the network functions which requires the transport layer information would also need to act as the decompression node of IPComp. This incompatibility makes the deployment of IPComp harder.</t>
    </section>
    <section anchor="extensions-to-ipcomp">
      <name>Extensions to IPComp</name>
      <t>This section defines two extensions of IPComp. The first extension is used to indicate the first four bytes of transport layer header which contains the source port and destination is excluded from the compression. The second extension indicates that the payload is not compressed.</t>
      <section anchor="four-bytes-exclusion-extension">
        <name>Four-bytes Exclusion Extension</name>
        <t>This extension is used to indicate that the first four bytes of the transport layer header is excluded from the compression. The packet format using this extension is shown in <xref target="IPComp-exclusion-layout"/>(Demonstrated using IPv6 packet):</t>
        <figure anchor="IPComp-exclusion-layout">
          <name>Packet format when using Four-bytes Exclusion Extension</name>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class |           Flow Label                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Payload Length        |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                         Source Address                        +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                      Destination Address                      +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Next Header  |     Flags     |  Compression Parameter Index  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Source Port             |       Destination Port        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
//                                                             //
//                       Compressed Payload                    //
//                                                             //
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>To accomplish that there are two options to extend IPComp. The first option is to change the CPI field. Currently the CPI field identifies a particular compression algorithm. The defined CPI value can be found at <xref target="CPI-IANA"/>. We can define new CPI values to indicate the same compression algorithm with different compression range as shown in <xref target="iana-CPI-table"/>.</t>
        <table anchor="iana-CPI-table">
          <name>CPI with exclusion range Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Transform ID</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">RESERVED</td>
              <td align="left">
                <xref target="RFC2407"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">IPCOMP_OUI</td>
              <td align="left">
                <xref target="RFC2407"/></td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">IPCOMP_DEFLATE</td>
              <td align="left">
                <xref target="RFC2407"/></td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">IPCOMP_LZS</td>
              <td align="left">
                <xref target="RFC2407"/></td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">IPCOMP_LZJH</td>
              <td align="left">
                <xref target="RFC3051"/></td>
            </tr>
            <tr>
              <td align="left">TBD</td>
              <td align="left">IPCOMP_OUI with four bytes exclusion</td>
              <td align="left">This document</td>
            </tr>
            <tr>
              <td align="left">TBD</td>
              <td align="left">IPCOMP_DEFLATE with four bytes exclusion</td>
              <td align="left">This document</td>
            </tr>
            <tr>
              <td align="left">TBD</td>
              <td align="left">IPCOMP_LZS with four bytes exclusion</td>
              <td align="left">This document</td>
            </tr>
            <tr>
              <td align="left">TBD</td>
              <td align="left">IPCOMP_LZJH with four bytes exclusion</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
        <t>The second option is to change the Flags field. Currently, the Flags field is zero and ignored by the receiving node. We can introduce a bit to indicate whether the first four bytes is excluded from the compression range or not.</t>
        <t>Which option is more suitable will be determined based on the discussion in the working group.</t>
      </section>
      <section anchor="uncompressed-payload-extension">
        <name>Uncompressed Payload Extension</name>
        <t>Currently, if the total size of a compressed payload and the IPComp header is not smaller than the size of the original payload, the IP datagram will be sent in the original non-compressed form without the IPComp header. In the receiving node, the packet with the IPComp header will go through the decompression co-processor first while the packet without the IPComp header will be forwarded directly. Going through different packet process path will cause the out-of-order of packets within the same flow, reducing the transport performance.</t>
        <t>To solve the out-of-order packets within the same IPComp-enabled flow, we propose to add IPComp header no matter whether the packet within the IPComp-enabled flow is sent compressed or not. To indicate a packet is sent uncompressed, a new CPI value(TBD) is used. In this way, since all packets within the IPComp-enabled flow have IPComp header, they will go through the same process path and be processed in order. For uncompressed packet, the Next Header in the IPComp Header is copied into the Next Header in the IP header, and the IPComp Header is removed.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document require to add new CPI values in <eref target="https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml">IKEv2 Notification IPCOMP Transform IDs (Value 16387)</eref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security requirements and mechanisms described in <xref target="RFC3173"/> also apply to this document.</t>
      <t>This document does not introduce any new security considerations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2407">
          <front>
            <title>The Internet IP Security Domain of Interpretation for ISAKMP</title>
            <author fullname="D. Piper" initials="D." surname="Piper"/>
            <date month="November" year="1998"/>
            <abstract>
              <t>This document defines the Internet IP Security DOI (IPSEC DOI), which instantiates ISAKMP for use with IP when IP uses ISAKMP to negotiate security associations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2407"/>
          <seriesInfo name="DOI" value="10.17487/RFC2407"/>
        </reference>
        <reference anchor="RFC3051">
          <front>
            <title>IP Payload Compression Using ITU-T V.44 Packet Method</title>
            <author fullname="J. Heath" initials="J." surname="Heath"/>
            <author fullname="J. Border" initials="J." surname="Border"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document describes a compression method based on the data compression algorithm described in International Telecommunication Union (ITU-T) Recommendation V.44. This document defines the application of V.44 Packet Method to the Internet Protocol (IP) Payload Compression Protocol (RFC 2393). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3051"/>
          <seriesInfo name="DOI" value="10.17487/RFC3051"/>
        </reference>
        <reference anchor="RFC3173">
          <front>
            <title>IP Payload Compression Protocol (IPComp)</title>
            <author fullname="A. Shacham" initials="A." surname="Shacham"/>
            <author fullname="B. Monsour" initials="B." surname="Monsour"/>
            <author fullname="R. Pereira" initials="R." surname="Pereira"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This document describes a protocol intended to provide lossless compression for Internet Protocol datagrams in an Internet environment. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3173"/>
          <seriesInfo name="DOI" value="10.17487/RFC3173"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CPI-IANA" target="https://www.iana.org/assignments/isakmp-registry/isakmp-registry.xhtml#isakmp-registry-11">
          <front>
            <title>IPSEC IPCOMP Transform Identifiers</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="October"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1abW8buRH+vr+CVT7UQSXZsn15MVDgfLJ8dmsnqu1crlcU
BbVLSYR3lzpy17KS+H57nyG5b3qx7EuKAkUdIJK45HBmOPPMC7fT6QSZzGJx
xFrnQzbki1jxiPVVMtPCGKlSJu7DOI9kOmGZ5qmZKZ2xmC+EbgV8NNLizi6l
FbWpF4etIOSZmCi9OGImi4IgUmHKE2wUaT7OOrHpyJkRYSLwGWJ1x60WnXKb
jt2ms7cXmHyUSMtOtpiBxPng5pSxF4zHRmF7mUZiJvBfmrXa4Ob4B3wojW9X
N6etIM2TkdBHQQSGjoJQpUakJjdHECgXAfg/CLgWnORIM6FTkbWCudK3E63y
mVPMtQhzLbMFu+QSc1KehoLxNGKDe/wixkwruBULLIuOAtZhqbjP2ESkQvMM
T4M7kebYnLHnEmXMidz6CI5ItT8SARpPuIxJeNLi91Jk467SE3rAdTjFg2mW
zczR7i7NoyF5J7rFtF0a2B1pNTdi11LYpZUTmU3zEdb+dMkzLe97b/f2dh8/
HloWQ7Emq21ZW951NLtSbSG0W9rFq4SnW4yiO82SuBUEPM+mSpPGwYZMcab9
LruQ+OFsrT8VZI00AKl5Kj/Z4zhiZzmfC8luRDhNVawmUhjMEU6nYTf+fmon
dMEExkOVpxlZcn8qU17b7azLrqfVdmccu7mBp2ynFTmeiGSmdLW7mcop6Lx9
lIUaD5dd9gstKLm4JJmLoWeI/YmWJFj86qlb/9xlJ7K288+Sq5Eqxp6xdSK1
BlTAHbqEH4/vH6RKJ6B6Zx3q6rS/f7j32n892PuuV3ztvT7wX9/s7+0dBYFM
x/WV/eF55/z43TF9h5s5GDwfXg/6+L///nLIbsjqaA07J3CRYym0sbNLw8Of
xRW2v7e/3+ntOVpcTwQcovCH+XzelTzlzvUAZJMUes7MrjT8FlauxUQaiLj8
u3tPdv5iabTT6wXdbjcIOp0O4yMM8TALgg34PdQqU6GK2Y5D6ZdMGpYbETEI
xsJiJuH7VEBwNvNEZOoQ3yMvyxSGQgClEbQsyVMZ2rNlM6GtYoFfXXZjqdh4
gI34bBZL7IXFRL6grcbFblAen2ietBEluM6IjzkQwz4eS20ypsJMZEwmCRwF
mo4XDDghdEFgKniEX+D2fHh32LYAury4WuDxJKLJryqg9VRMl52pubgTur0c
7VhpPJht8nDKuGFG5RqYbWfRvhFgECbqlGIHtSBdj/OYGISGFogMGQUXNs7T
kCaaZUXjYG+mUB0CZk5WAqpjmQoD3ouwQPqrnVRYO+7ZynFD9SafWXaWT7sg
UIvxGH1E8jZRQ6QaxWKNILlZkyY0FLcjupNumw36l8OXbO4jWqbgLFPMLA9+
jWBkWHWlUOgvNcPTSjlON9b+rMVGZKWiQRZ0UlVpw5mnUfGdm6byrKPGHYRy
8AR9QtjEsBHEFSK1M2or6dihgGpgxsNbkRmcovXPREZRLILgBUNyoVWUW13R
EVvrfZrHfv7s8ezhgZh3Yluui423OS9+O3nqXuxFWe/JpcAcRKUmtdbm4thS
BXNvk4LuJHkUUbNjbMqhSZOPxzKUdFbEZJ4VbjEHF4WTNneHaAq+x0ys5syC
UzqBR4F2LNNbUuk5eTnDHCsUvL1+Gp7E74Ecnq1gxljFYKOGiw4iHMCAM6zL
3VMkZBNntzEvl/vtir26OH5PCLhDy2Gw7RpQ3kkxJ3NyxpxGnUx18FGw77b1
hluT0JITyzBWAtRUzTqjRQcfbWQbOcnqKI01p1DvD2WFgDU4ipoPD11mIX2D
ktdrENo6c7D8fmY3QOCM6cQxK1LCux/XetFAB/s8yUFgREjNE2vlxC6MLHTu
NVp4I+Oxom29v/2RvCJGYAfJGc+mbSbHXgvpJnbEPcKpaRwo6Hqz+XAxfMR0
bJjTAqyL9jbMfHq0gF4rIOmyj0heaxZCMdtt9o6KCy+RE8XFgyIUYitYIATp
7b0pbeykznox6FeQ9KhBHIooLSdgK25sUzhsgVMALtASFFbPUXjd7yCZspkF
qAhNLlvHy4q3muNXgGm1bMMedGpj5oZIOZ9KqDIVIjJbtQ7xaXWXnQJJyJhm
Mc5qDJ/ujDjtS0GozfqwQmR1KKvAH0R2W9rEL/Yxq//ju+Obl212HJINQgUE
5DGqChjqznH/4iXYXTAtfs0lWPenvPaACXxdIrlYyz9xh4pCJYKdgtacxwgC
px+x94kQM+icTB0KNzMROt5OSO02FpJWHLrbp9v0A0Aq42Q9EE6V2ZYBlDjv
XNCB7DonhIun1tXViMzLztzmBDXP8qZT2H8RsjGX0o8yWVg1E3cUT0hnvEEl
/BbSyAyBq4iRkZjFarExFduccDwv1XJweQhUQwVtcWaJWe82js/STbcr0UYb
cD7ni3Zdj3QiobLI5zT4qKd5m7bOBrNomM9T0zFKGO8RLELUV4uN+VgjhXo0
Gwu9Up+fj71A8akRU6j6XCyfbExZP58IDyyYWOVZMN1aBuYAVJdYi3oOJCzX
CFtjRK1Y8jKZxYSs2pW4eMGunFptCcguUHTn2NilhLdiQbAFfGtdfri+oXYW
fbJ37+33q8HfPpxfDU7o+/XZ8cVF+aWYcX32/sPFSfWtWomK9nLw7sQtxihb
Gro8/nvLBcPW++HN+ft3xxctm0c2D5r80kpKPSsNLWcubYENhlqOnLp+6A9Z
7xBa+wOV573eWySu7seb3utD/JgjtrnNVAqzcD+h+QVlFoLbeo7QL+QzmcG4
2jaATtWcUhQt7GkOXWrOrpHFWGUGQT/XGl/iptHPJVEqIheRXcqWnbUjL6ba
cGtosdDJ/fghsxRGPKakWbv0nLCDtFLio2fE2eJyppJNvRk3Kf0O8GwEGG7D
ibVD+BDm1iEJYGexxyKFctUXmV17A6Su4sHjuKryOGrGJY6YxN3KGisqtbGk
wlAPLDItoB7elC08RLvFpF1rixXwOuC2VlE1T11+TM+9sxsfNQucgpArRXXB
Q4HNFZAVbZPlqtLNG+Nongvj245UmqpfMdYqWa52HJ+QSqVRnVHPnXEJ9aOV
rwOkUzDRccwPaENLplSkU942RTQKgCVtrLGWKld9gojeb5x9FW2GFaYcPFiw
dufousf0mLrGcIKHh50TkeCswQ3BlqNkayi3xcujIPjtt98CtsdW/3prxvbX
jB3Q8h4eHQAdvmOv2Gv2hr19zljwp85X/gu+/OSK5C+Uy1IlzvqoTg37UmP0
lPDhgo9EvCrEl2/BQ0mtaHNciHSCsFjswRo1huXtTM2QWSfAp2/Nw+/7Aw9f
SeE/y8O1w4/jKLLB7b/Cw9P+vgkP/7eHx3g4qQWPRy3if0YP38IeVjCIkJFP
nOrwu9GbbbY9vq1Nel8eUpRsyOk/68dbn/QteNjd/aqj2N3dTKFfFWNFHHgm
hSfz8PV6oOj/+Yi92JBBuGvCP7eGjYyEyhefTDyeSrUekIpSLkwpTizNtEyc
fOOLUlI1y4r01eY30Zq01M2hrIcuAeji1iWj/eG5awl2WVkLNR8UBYKkQh1p
j85kmMdcNzq8PJ4ojcLBdwuLQpiI3PE4F7Y4oWpX5WAPEnz+XNymUoH80U1w
y1ABzKuVZiV/NnCo9Zu7GjqS47HQxT1CMUlbkXkj66Mr1g7xkdEFFRgJkAbR
puRAtbvcE3jUlbBEQzD0Jfhy1MGf+7/21xjALJsVYungenD10+DEm90X2xug
O+iHB5rUs5PcDfK/3n84Xztpvz7pZHB6cXwzWJl0UJ908cv1WkqHzUl/Oasm
0WW4m3Tzw0mTJ6vZWpZe2rldvdTcWaFQMLyRylYKJM3X8WBF3UxidT15ddNC
Cmcm47SUquXOvK78jTsbpJmGw1j3rUquTU7ooseyG7aXn9HCT0Ird7UzSZV2
9xuZbS+FQt4V12ylR0l/hwjLZyOZNXwJIGTr+LVV2LY6ywusNNWH8JuPtlKt
BEyoH2ty6fRmGyojwgXX2yK+bU9duT5FJE2YlxePNFLc9drXn1zR+aHepSsC
Q1V01ns50teQKuMxM/KT7RfwNZcI5f1C837Dl70m4XFsNcR9P8WTalx7lDdu
S3c+pdSG7MnLVa5KESJq/FigKVovKwyVt4HNY27XeulVf7spimViohrXjs1+
Sqg6vk2qtDeE+VTGYpn4Ws5KISHAnJoqEQ4TXOIYuuxHVb/wrHDZE/W7uta/
67nx3Kzp4kLjvitrGSmaWxQHqGXVhlpg46v9+/p7JjaObuoSbyBexHT7/kLk
95oLYnxmrz3gilG0pJBUMYT4zHZvKger6VGmNTU2iLubuLTxpoH3MHZT89zi
ErOcX29gt/G4EUF3AIPlSzxLnX6kIIQNcbxOB+s4tFf1DYF9G3adnVklNk6Z
3G0katezxXsG7tptTSN+9QazwV05SFehM2kp+hvZtWsat/JryWiRqDvX6GKU
n9D9nUEO5F7MNMv3AMU1nreFpdwF+/7j/K+Du332TlEO5V9cWH1d7MSwHZt6
sN6rgzevX/5zZ/u7YLfibr8zKwqM1QH3NthLK0n57uiqNDY8uYe6ftFAGkoE
hSlpkqV+ff0FE9u1pfv9hbsLr2ln9T6suMyvBSZ7nzSvmAgbHHaDfwOhmWVl
dCwAAA==

-->

</rfc>
