<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nh-sr-hsfc-usecases-requirements-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="SR hSFC Usecases">Problem Statement, Use Cases, and Requirements of Hierarchical SFC with Segment Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-nh-sr-hsfc-usecases-requirements-00"/>
    <author initials="K." surname="Ni" fullname="Kangkang Ni" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>nikangkang@chinamobile.com</email>
      </address>
    </author>
    <author initials="H." surname="Huang" fullname="Hongyi Huang" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>hongyi.huang@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Zhang" fullname="Yige Zhang">
      <organization>China Mobile</organization>
      <address>
        <email>zhangyige@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>General</area>
    <workgroup>SPRING</workgroup>
    <keyword>keyword1</keyword>
    <keyword>keyword2</keyword>
    <keyword>keyword3</keyword>
    <abstract>
      <?line 48?>
<t>Hierarchical Service Function Chaining (hSFC) is a network service chaining method that utilizes a hierarchical structure to efficiently organize and manage service function chains, enhancing network performance and scalability. This document primarily describes the use case of hSFC, which is the security resource pool. It outlines the associated problem statement and requirements for the security resource pool. The document aims to assist in identifying candidate solution architectures and solutions.</t>
    </abstract>
  </front>
  <middle>
    <?line 51?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Service Function Chaining (SFC) <xref target="RFC7665"/> is a network service delivery and traffic processing technique that allows for the definition and execution of specific service chain routing policies, ensuring that data flows through a sequence of service functions in a predetermined order as it traverses the network. As network scales have grown, a new network architecture known as Hierarchical Service Function Chaining (hSFC) <xref target="RFC8459"/>has emerged. hSFC enables an organization to decompose large-scale networks into multiple administrative domains. This means that it can provide better network design, simplified control, and support for different functional groups within the network, thereby enhancing overall efficiency and management.</t>
      <t>To enhance network service security and offer a wide range of protective services to users, network operators have centrally constructed numerous security resource pools. Within these pools, various security network devices, such as firewalls, Web Application Firewalls (WAFs), Intrusion Prevention Systems (IPS), and more, are deployed to deliver diverse value-added services (i.e Service Function). The resource pool, managed as an independent domain, requires directing user traffic into the security resource pool and performing orchestration within the pool, which is suitable for the hSFC architecture. A security resource pool can select one or more resource pools based on the tenant's location, network topology, and resource usage to provide services to tenants. hSFC introduces a solution based on NSH (Network Service Header). However, this approach involves network configurations and additional NSH header in packet headers. In cases where SR (Segment Routing) networks are deployed, the NSH solution may not be the preferred choice.</t>
      <t>This document describes a use case involving the deployment of multiple resource pools  by  network service provider. Every resource pool is designed to offer tenants a wide range of security protection services. The document also analyzes the challenges and issues associated with this use case, discussing the requirements，seeking an SR-based hSFC solution.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>hSFC: Hierarchical Service Function Chaining</t>
        <t>NSH: Network Service Header</t>
        <t>PBR: Policy Based Routing</t>
        <t>SR: Segment Routing</t>
        <t>SFC: Service Function Chaining</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>To defend against network attacks, ensure the security of enterprise tenants' business applications against viruses, malware, and other security threats, and meet their customized security protection needs, network operators have established security resource pools in multiple regions. Typically, these security resource pools host various security network devices, including firewalls, Web Application Firewalls (WAF), Intrusion Prevention Systems (IPS), and more, to provide a variety of security-focused value-added services. In practical applications, the first step involves routing user traffic to the appropriate security resource pool based on user location. Then, customized security protection services are provided to customers according to their specific requirements. For example, some tenants may require the use of a firewall followed by IPS services, while others may need to use IPS first and then utilize firewall services. This necessitates orchestrating service chains for the overall security resource pool and the internal security network devices.</t>
      <t>SR is a novel network orchestration technology that guides packet paths by adding Segment Identifiers (Segment Routing) in the packet header. Each Segment Identifier corresponds to a node or service function within the network, creating an ordered path from source to destination, defining the packet's transmission route. SR service chain orchestration offers several advantages, including the flexibility to define and customized service chain paths based on specific application and business requirements, support for dynamic adjustment of service chain paths based on real-time application needs, and the ability to guide packets directly to the desired service functions, reducing unnecessary delays within the service chain. Furthermore, SR enables network administrators to manage service chains without altering the underlying network topology, simplifying network configuration.</t>
      <t>As a result, SR represents a user-friendly service chain orchestration method suitable for complex network environments that need to meet diverse application requirements. Given the complexity of internet architecture, the widespread deployment of SR, and the dynamic updates of security devices within a security resource pool, it is recommended to use SR-based service chaining for traffic steering within the security resource pool. This enables dynamic adjustment of service chains and reduces traffic bypass.</t>
      <section anchor="background">
        <name>Problem Statement</name>
        <t>This section provides an overview of the challenges that security resource pools face when attempting to deliver value-added security protection services for different uesrs.</t>
        <section anchor="dispersion-of-service-resources">
          <name>Dispersion Of Service Resources</name>
          <t>Due to varying geographical locations of different tenants and for the purpose of minimizing latency, facilitating network management, and maintenance, the security resource pool is physically deployed in a distributed manner.</t>
        </section>
        <section anchor="multi-tenant">
          <name>Multi-tenant</name>
          <t>In the existing Internet environment, tenants' network service requirements have become diverse, with different tenants facing various threats and demands. In the security resource pool，On one hand, some tenants may only require basic access control functionality, in which case, tenants would only need firewall services. On the other hand, other tenants may necessitate more complex and comprehensive security services. For instance, certain tenants may require initial use of Web Application Firewall services to isolate potential malicious websites and code, followed by additional security checks using firewall services. Different tenants have different needs, and the security resource pool needs to provide tenant-level customized security protection capabilities. Additionally, the network security device needs to differentiate between different tenants to provide them with distinct configuration.</t>
        </section>
        <section anchor="multi-vendor">
          <name>Multi-vendor</name>
          <t>In a security resource pool, security network devices are usually provided by different vendors,  they need to be orchestrated by unified external network communication. For example, in the security resource pool, firewalls are provided by Vendor A, and WAF is provided by Vendor B. If a customer subscribes to both firewall and WAF security value-added services, the traffic needs to pass through Vendor A's firewall first and then through Vendor B's WAF device. This implies that Vendor A's firewall needs to be aware of the next hop being Vendor B's WAF device, and there is an expectation for the traffic to flow directly from Vendor A's firewall device to Vendor B's WAF.</t>
        </section>
        <section anchor="dynamic-orchestration">
          <name>Dynamic Orchestration</name>
          <t>In a security resource pool, security network devices may encounter dynamic adjustments. For example, adding new security network devices to the pool may require existing service chains, such as NSH, to undergo state updates across multiple devices. The main issue in this situation is the presence of state (SPI, SI index tables) within the network devices. Therefore, when there are changes in business deployments, all network devices need to undergo state updates. This is unfavorable for flexible and agile deployments. In contrast, SR is friendly as it does not require the presence of specific states in the network.</t>
        </section>
      </section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>[REQ-1] Tenant-level Service Orchestration</t>
      <t>Different tenants have varying security protection needs. specifically, the types and order of security protection they require are differently. Therefore, it is imperative to cater to multiple tenants and support tenant-level service chain orchestration.</t>
      <t>[REQ-2] Tenant Information Carriage</t>
      <t>As the security resource pool needs to meet service chaining at the tenant level, it is essential for the packets to support carrying tenant information.</t>
      <t>[REQ-3] Dynamic Allocation Of Service Resources (Scalability)</t>
      <t>The security resource pool is in a constant state of dynamic adjustment, and with the evolution of business needs, there may be additions or removals of certain security network devices. When there are updates to the security network devices within the resource pool, it is essential to support their dynamic orchestration into the service chain.</t>
      <t>[REQ-4] Independent Resource Pool Orchestration
Service functions in different security resource pools support different protocols (i.e., some security network devices within certain resource pools do not support SR), and their suitable methods for service chaining may also vary. Achieving unified orchestration is challenging. Therefore, it is necessary for security resource pools to support independent orchestration, without interfering with each other.</t>
      <t>[REQ-5] Reliablity Of Service Function</t>
      <t>During service chain orchestration, it is necessary to support the retrieval of device information, including device operational status, identification details, etc. In the event of network equipment issues, bypassing the problematic equipment to avoid traffic disruption should be enabled.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8459">
          <front>
            <title>Hierarchical Service Function Chaining (hSFC)</title>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>Hierarchical Service Function Chaining (hSFC) is a network architecture allowing an organization to decompose a large-scale network into multiple domains of administration.</t>
              <t>The goals of hSFC are to make a large-scale network easier to design, simpler to control, and supportive of independent functional groups within large network operators.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8459"/>
          <seriesInfo name="DOI" value="10.17487/RFC8459"/>
        </reference>
      </references>
    </references>
    <?line 152?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51a23LcxhF93yr+w0R6sJTa3ZJoOXFYjm3qZrIikQpJx+Wk
VKlZYHYxEYCBZ4ClVir9QT4iH5Kn/FB+Iad7LgD2Qtsp2wkXO5ju6cvp0z07
m82OJq6Vdf53WZpanYjWdupokslWrYzdnAjX5ljRLSrtnDb1zabBovMXNy+P
JrqxvN61x48e/eHR8dGklPXqRKj6aHI0aXVbYukbaxalqsR1iy0rVbdT8b1T
4pl0yk0FBIsr9VOnLX/nhFmKM62stFmhM1mK65fPxK1uC3GtVrRCXJmu1fXq
aCIXC6vWJ+L6ShS0CrtmtOnRJDdZLSvIzq1ctrO6mDk7K9wym3VhzcwOZM4e
PTqamIUzpWqVOzmadE0u/V/3Bf11Io4fHR/PHtG/YjbjZ0I7sdRlqXKhayG7
1lSyJY3LjVhsxPuqPLbLTOilqE0rVnrtjSKtkifiO1XjiOXR5NbYdytrugbH
eHN1fvEdrXl3C8lCzMQ7tcGC/PHo0/Ho0+e8adcWxtJLM/pS1+5E/GkuLjR9
8pb4ExzzDv+Fh8auZK0/QGNTn4hnha6leG0WulT0rTXkOJXr1lj6rCqpyxNR
63dhl28zeqPiF+aZqcRI9NlcnHWSXBSln5l6tdH907F4PL5V+g7BBb8+L+j1
bwteTVJHQn+ci78WI6E/6pXqn9194iDoA63e4L09B6R/amPJy2t1Qp90vRx9
PprMEBxy4Vors/ZoMo5jZdc6U+JlV2ekA1SQukYgiwcUvQ8pnqSoVUshIVxY
ncVFlYKLc9EWshWI/1J/ULS+GIqA3C5rO6tEa4RaLnWmEd6Ix3B2xdlWyVrC
MFHCMurDopCRqoYRMpIZlWmU5YPWmd/BQZiEZXS7mYubAooj4TpOzsbqSloN
mblymdULaNkWSiDvBCUepTcddypuoXNBh6avkZWdxXbCKmc6CzmNMeVcnLcC
2V7qOmwjnTOZRvblkORhxUVYYdWGaS2g9J273+C7pLnUlSO7QYR2LeW0zvFc
Lzdkigyba057oETH9mKzt4oN7rxdwlduHmOh0nlOAUZAcl631uSdN/bH+5o+
fqKv7ogMDoyPH7+5evns97/73RefPu2PklyViEG7YS0QfOR6MlCmcBjsAy2L
Wv/UKR8/wChz25snV0uI82fC++o9zMWf4CvXqEzTbqOARJ4yBsOOJQUZR42D
jUkWSYClpFiylLbA4lUBrR18oyiGaN+t6HMMotBZ5cBgW8HjOcI2VxYOEbql
U+GELsRBMMBcnLreGIhKfF1gnQCk3tZTttRtWjB0mHhXYwXt/euS1Pviyydf
/OHTpwJvI9LsSuVzX4FULRclB8MIbiiscgUUaQwyoJR4Y8baRtXo9FhTdWWr
GzyWOQygCUYIWxCjFaVmyLVKydp5M8MuCEzy9BrBKhaqhe3SeZGBegUrOF01
JZwIi2aGoq70Zdd1TWNsy3GQ6+VSWcqD6BFYgwuT4+oL7wzsPqUPVqHM9WBh
1lTRyoQ72WaANpRhc8bQGxPeUTtRnNKU3jOkDxx4SwezQGUOG5yUHEhGCW9x
zgJdLGIwbmgAWBIVJARDBuGW6zKO7zESpqiR9jifO4AOsPYP6dwuPJuKNcBt
9FJvbNYG1u4Aa5K4gVW3kIpHP6iFOG3gg8yHw8v4lXjww+lL93DK2NARuwJb
UmuCHfx5vXFANiw6f3P90LusMlbhL0tJ25Rmg3NwbHH6w4mcIlCy7NRM5jm+
TmZ6oOdqJ74fehAcnXwafJbTKRBduoYsVRMYhkicRpgF8ON/M4YC8kHCHg7n
w9DLZwlVhWMH+ad8uOPcg3jz+qRS4TrdUoYl6OKsG+Y1EOGQTMoUp0qsE+C5
kMnW3PK6WKBIIfq8+BYJXbefOVEa77o+xloD7DOrzTSUnbBJ56i24vAxJ4dh
6rdzASx0qAdcx1NVSfIvrs/Eg4sgLfrtTElAIrx2Zm4RJ5YSkSpCA3GSbFSv
TblWPSgi4pd61XnL+iqFuNAhwUlGwVsS/DYye6fa8ABantdcsgEAlOxEsx9s
cfCHPYANY5LhgTdPx6rkhnnwQnm/WoX0toRIhcHBuGCOmUTPH2TPHvz5fJmJ
8ng1sCGh55ZHiY3vYE1wj52LF1w4x6FCejB4+vzyWBS8t4NJKdwiOJk6eX2b
Y5QOBAOW33wIhQzlFC0EdvK+QYvV0Z89zeHWh50cjTBF0rmsC5Wds7fnPP/9
9z+dUu/oK4T79dXMxxMHXHQGG/v+fXHDdZajmJ7QmpNfWA5pPfx7IvYHKH39
5ukVej/iBxvxlJVIjRsoD77b6efwmDS4UyjUHnWLr+CFDinn40dRVySoLXLi
3uvvr2/uTf3/i4tL/vvqxZ+/P7968Zz+vj47ffUq/TEJK67PLr9/9bz/q3/z
2eXr1y8unvuX8VSMHk3uvT798Z5Hg3uXb27OLy9OX90TjGPDsJaenS8ollGs
kQgtI+0kxju3k0+fvfnPvx4/Ad34DejG8ePHoBvhw5ePf/8EH5CTtZdmalQ2
/xHRsJkADJTkhKZynMkGmElVCGjuCiI9lM3zyeS3fyPLvD0RXy2y5vGTr8MD
OvDoYbTZ6CHbbPfJzsveiHse7RGTrDl6vmXpsb6nP44+R7sPHn71DXUPYvb4
y2++nnginqYPzEbAfhWh4oooVtuTxbYFHEZiq8bFDFmvvPe0i1XCfSYWKOHo
VBiPY7F3aee1RoknhlDJ8lZyHSfvEZPqdwZbVrINc5FKAY7xvbYC+d6aCi1c
vhdvaqXywwQIpRVVU7ti+PYWSiJcBgC64i5G3GwaP9GYBhZ06O3C0AF/lhvp
Oiu7nMDpF7OjX02OBrVXskrKOyxqNVsiFQmO9rEkLnoNde+Mf0M/+qIGvXFS
iG76WhuboREDCvyHKzPChDvH/bwkVXx+PzINrhxI6Z9xfKIXhCvh3Fyz/Huo
40JmGQCRi4UJ0ZS6umHpmIuX4ETqvUS3ADs6vJ1qHpXvsDa187CpTH4EI6Om
ErJRbeGSpBizN8QUx7nfiII1sHZe6m3KrSuOHKcb/dbDYqqJ2nBbS22/GzJH
HHDUpPYNbmxN7iCjtIwBmWjRoQCe+9IVenDsWvYZN2Kw3G9zYfV92qqDW1wk
WI1sC0d2IiYGrWMhPPfzBk122mVakREPSRrYC7G+3Q3A+8CuXGPq3A81oG7O
nHdn7LOvu8sIhAKH4Cac5i3QWiytqUSwHTceDssCM/ZjhMBJvJpgzjBJ7cLo
mDMFFB0mHI8TxtZjukUwwm6DldaIQdT4EYBwMpbqvfZzKK/NkqCe3DnKmqGk
YPuYcikRBpnOGyQoH2bIdNwyb2pZ0av5PyAtstA7xcGs5azVlRrJC+Adw1D2
J+K4CbaMvVa5idhCFNUOTphmKdSfobFgTKp9ukhLE7lSbkbt/EhZ5H9nKUs9
jsJJcZyRamI/lqDaQhOL8Swx5B1JgKfBP5BQ0VkdOkhbboZzxb6HCiOK0bej
1oVT75TyDmGNOsX6WQX65JQn5YSesyXgvs5horviK4xSR80kDWcQTUm4qlGu
Te1JJudwRC0uyrHTHrpxjKXf0cDfU3y/deANHmRUO+pafW2htsLhRDLf6myu
r/roiFEXrihGDUiAqehheQDwpjQ30hTaUK2izj7BcWoYdubPjKWhtqH8eb+O
QunQjBWSYiD9gpRxoZ/2jXGUuNg06Ili47JzoyQ+3l8gSWheVeefUi/pQpEM
ddHP5dYkTd2S4K0GjN18iOEsJf4klk3MUFVNGwpqnL2M2cQdhXo8bUO3Z/25
6GT3xXMNSLIMlpfL1ApdBV0cLXveMfaC2nC6rJRZWdn4hi2yB46LXkpqXWHa
WBSbzvI4kjpnuBhgSbuVsGidISNxXoIhXwZiVvTDvMC4JIVzTdO86V3jHvii
KTYu3I6l0RXHaE6AohcdtUHYv6aqFq3xmhjpzGt/NDn3kYZUcqzVeUylQbJO
eza+3fKPrgaYFy8oAVRM5qnvtXetRqaAuEhvA0VnA+QKKueeNh4+P5ryy5qH
TgVW76FW3MJFfoUEpBTJCLbjwHYwlcXuVAfDUMwPBOJet6YrQ0PIcLWHQl16
RX3b4dXxfw/1GVAsPySL8Mi1FX9bhUxwfgwbTtyLIBpJHY8Pi0zZljB4H5Xk
aweEbaCThzqB0RBNO0NBCsO2xHbwNvopnbFrbtUCWodZSgbGMx3x0sHkK6mN
woA2T3Ru2JUMDvN8Jxw4dPoo2areBzKAVw17E7/brFTEIn+G5KOH96RAk0an
6RShLxtE+qgQ9EKTttyHLLBcAch2I32oXwGADQlB6Za1ewpyn6Modjld2Z7f
VXYO8WpuXjrXMTqkJgYO6zX0+8POPONIxXihBrXdv9PV/qpDvQ9svucTVYUv
Y3s1anbuLGLTvlsdt1mQ9hfWS5z6AEC/yli3u+ApIIL6pdiWgX0s0v0ozmGI
XMfoi1sldfa1qt71sUD28YU6me7conafuUGjNu62tpY+xVIS7T0TyjeTs1gg
9+2ZpMMfkmYbsbrW8IIoTIMvKL/2Ckm5Y/k3FajR6j1oeesxIJarQV9N94o9
GeaWZJ9SIQnwwljssNoGPnI55If/bxATsKF2goLQJdwu1dlusEP3RzeUB/cM
TJ8hZAicqQaOuVN/+3RxfcajEGbdK+NvyRNplJk1CJM08In9LU+rqaj7QXSa
XgJUO++OcF/veXe4yuWtH1y/OQcpP+froveCmbV7uKe7HAmzasnNxq0PRQoB
ip6MfoaheCiVGrGeEhPaluWOrdJYYd+RYyQD6eulXBubmL9vIkvfN8qVLof3
CuEWhIqwdL7poJ/9xC7DX03nhqSbdjQhGVkoXaL7ocXYIB5JR2NtekJz19nj
t+JmWCgiIdwKWJDC/WUqksSDM8N5Uq4vJ+2mCSXUX8AfuONgII5H5uufqEO5
GTnXdxsAERXus2k8JSlJhnfeQ44a2+xRkbyjpZsngx1Hg8Fv4cc5dIMgrdXh
luD0rl+c9EjGbd5OFyTbwb2gYL3i+RCjgY8khh36duwWD5RBkY3/RQbvoHsl
+zN8/jYB02kZGf3edgBZ1/8U52G8AzlMwplw8yU4CfcJQo3CDlZ5TA53T4Cb
dbzHw+qUkYH5+LQldCL0D+SEJnOQXxmULm5GIg08OFsTP4wxIGLV9kXydtoP
EGZvl9v7ZeAHPwaN5x6PBwZ318PpSHLPk7eIrf5KPDpDvCEjbyXm9fZohlzQ
s5pDzWZUs19JeWcy+o7u8eehh/g5o0Sjb22fG4arKOX66mGqwTQcjnMRPyfx
Hevu79Hgb77OJIgBKc0KrdZ+4uT515ZRXeq0sWgPPPRjKi9uv2EGLhz+LGEk
a5rmTzxrWfajCqFoWsrtTiAB7NAv3sKJpaYrEkgc5Fm8gfRdt92pt9tyt08y
DjicBY2uQkJwznl2MgCA4XQzfOvvcULHgmztaAQahrwBFnIFD9M1imqz1Iby
LQlJSeMsoHTDkxJ/wzwNE5U0rvUTFfoB62AtDY7XRvc/KUMrYLvGzzMK7jWR
8n64k0daBesF3z1DvNMdu59IMDo9fR6q3fnpxem+BaO7UvqBVW38WpmNf1lH
8x6/1WlGv+WCBqtYPD+e1F21oKn1H+8tEaTq3qeo3DMq5TRtQDNxx0L/z/8A
zk2xdBwtAAA=

-->

</rfc>
