<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-oiwa-secure-hybrid-network-02" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="SHNM Problem statement">Secure hybrid network monitoring - Problem statement</title>
    <seriesInfo name="Internet-Draft" value="draft-oiwa-secure-hybrid-network-02"/>
    <author fullname="Yutaka OIWA">
      <organization abbrev="AIST Japan">National Institute of Advanced Industrial Science and Technology (AIST)</organization>
      <address>
        <email>y.oiwa@aist.go.jp</email>
      </address>
    </author>
    <author fullname="Satoru Kanno">
      <organization abbrev="GMO CONNECT">GMO CONNECT Inc.</organization>
      <address>
        <email>kanno@gmo-connect.jp</email>
      </address>
    </author>
    <author fullname="Yumi Sakemi">
      <organization abbrev="GMO CONNECT">GMO CONNECT Inc.</organization>
      <address>
        <email>sakemi-yumi@gmo-connect.jp</email>
      </address>
    </author>
    <date year="2025" month="October" day="07"/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <keyword>Hybrid cloud</keyword>
    <keyword>Multi-cloud</keyword>
    <keyword>Security monitoring</keyword>
    <keyword>Telemetry</keyword>
    <abstract>
      <?line 57?>
<t>This document describes a problem statement regarding the challenges and requirements for ensuring and monitoring the security status of networks operating in complex environments, such as hybrid or mixed cloud systems.</t>
    </abstract>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Recently, virtualized resources such as cloud computing infrastructure rapidly replace traditional types of network/computing environments such as local servers or on-premises computer clusters. In such kind of infrastructure, information of physical resources such as servers, local network, network routers, etc. are hidden from users in trade with flexibility, service redundancy and costs as well. Cryptographic communications such as TLS, IPsec, etc. are typically used to protect communication into/out of such systems from eavesdropping and tampering.</t>
      <t>However, there are many use cases where service still depends on the security nature of underlying physical resources, instead of just encrypting the communication:</t>
      <ul spacing="normal">
        <li>
          <t>Traffic analysis on encrypted communication may reveal partial information of the payload;</t>
        </li>
        <li>
          <t>Juridical requirement (such as personal data protection) demands some specific property (such as governing laws, geological positions, operators) to be checked;</t>
        </li>
        <li>
          <t>Denial-of-service and several other attacks may not be prevented by encryption only.</t>
        </li>
      </ul>
      <t>For such high-security applications, we need some technical infrastructure for continuously checking the properties and statuses of underlying network and intermediate nodes. In a non-virtualized, self-managed setting, there are several existing technologies (e.g. NETCONF, path validation, etc.) for acquiring such statuses. However, these are not enough for virtualized, multi-stakeholder setting of modern cloud infrastructure.</t>
      <t>This document gives a first-stage problem analysis for ensuring and monitoring the security status of the network used under complex network environments such as hybrid cloud or mixed cloud settings.</t>
      <t>This document provides (1) a problem statement and gap analysis, and (2) a non-normative outline of potential solution directions. 
It does not define protocol requirements.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="background">
      <name>Background</name>
      <section anchor="multi-cloud-and-hybrid-cloud-systems">
        <name>Multi-cloud and Hybrid Cloud Systems</name>
        <t>Concepts of multi-cloud and hybrid clouds are defined in <xref target="ISO-IEC-5140"/>; in short, multi-cloud is a system where a single service is implemented using two-or-more independently operated cloud services. Hybrid cloud systems compose two or more computation environments having different nature of operation, security level or other aspects, at least one of which is typically a public cloud service. Often, subsystems on privately-operated cloud, on-premises, or edge networks are connected with public cloud infrastructure by network to construct a single hybrid cloud system.</t>
        <t>Hybrid cloud systems are, in general, constructed when the security or other provisions of public cloud systems are not sufficient for a part of information or a subsystem component (if not, a simple public or multi-cloud environment is sufficient). At the same time, there are often requirements where some benefits (scalability, costs, resilience, maintainability etc.) of public cloud systems are beneficial (if not, simple on-premises deployment is enough). This mixed, seemingly conflicting requirement makes it difficult to ensure the monitoring of security for hybrid cloud systems.</t>
      </section>
      <section anchor="security-implications-of-hybrid-clouds">
        <name>Security Implications of Hybrid Clouds</name>
        <t>Multi-cloud and hybrid cloud systems require system-internal communications flowing beyond the boundary of single cloud systems. In the simplest case, it can be implemented using authenticated TLS or HTTPS communications via public Internet infrastructure. For high-security systems, it is often implemented using dedicated channels of communications, such as VPNs, private peering, or even dedicated optical fiber channels. To maintain the security of whole systems, monitoring integrity of such dedicated channels is mandatory.</t>
        <t>Furthermore, with IP-based software systems, there is lot more dependency to ensure such secure communications. In other words, there are a lot more surfaces for attacks. For example, if a DNS record is either tampered or misconfigured, communication intended to go through a secure channel might be routed to public channels. If there is a misconfiguration for routing, the traffic might go public. Enumerating and collecting status of such dependency is undermined currently.</t>
      </section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>There is a lot of technology already available and useful for such purposes.</t>
      <ul spacing="normal">
        <li>
          <t>SAVNET (Source Address Validation in Intra-domain and Inter-domain Networks) <xref target="SAVNET-CHARTER"/> provides a way to ensure validity of incoming traffic and possibly blocking any rogue packets.</t>
        </li>
        <li>
          <t>SRv6 <xref target="RFC9819"/> provides control of intended routes for individual IPv6 packets between networks.</t>
        </li>
        <li>
          <t>RPKI <xref target="RFC6480"/> provides control and trust anchors for the security or inter-domain routing.</t>
        </li>
      </ul>
      <t>However, to ensure the security of the whole hybrid cloud infrastructure, we still have to address the following aspects, which seem to be lacking solutions currently.</t>
      <section anchor="the-nature-of-multiple-operatorsstakeholders">
        <name>The Nature of Multiple Operators/Stakeholders</name>
        <t>Hybrid cloud systems depend on a lot of resources which are not under the control of the application system operators. Public clouds (both IaaS and SaaS) are operated by external service providers. They have their own policy for their operations, and they have their own decisions for maintaining or replacing any of the providing hardware/software resources, provided that their service-level agreements (SLAs) are met.</t>
        <t>This makes it non-satisfactory to expose information of all intermediate network nodes to the final application operators. First, detailed information on design and implementation of the cloud infrastructure is confidential information and important properties of the cloud providers. Moreover, some extent of independence between application operators (users or cloud infrastructure) and cloud service providers are critical for maintaining cost effectiveness, maintainability, security etc. of the cloud services.</t>
      </section>
      <section anchor="determination-of-the-correct-states">
        <name>Determination of the "Correct" States</name>
        <t>In a small-scale, hand-crafted network, determining whether the current running state of the network is intended or not is a relatively simple question. However, in the complex multi-cloud systems, it is quite hard or even impossible problem to determine that, even if we had been possible to know all the details of the running state of the whole global network. To determine that, we also have to know about the design principle and hidden assumptions about the operation of each single network.</t>
      </section>
      <section anchor="shared-infrastructure-and-information-leakage">
        <name>Shared Infrastructure and Information Leakage</name>
        <t>The infrastructure of the cloud system is deeply shared among several clients. Although some information on the operational status at cloud service side is required to check the reliability of the user-side applications, exposing the raw operational parameters to some clients may reveal security-critical information of other clients. Before exposing the cloud-side status, it must be cooked and filtered so that information only relevant to a specific client is included.</t>
      </section>
      <section anchor="virtualized-infrastructure">
        <name>Virtualized Infrastructure</name>
        <t>Many cloud resources, not only computation nodes but also network routers, switches, VPN endpoints, etc., are virtualized and provided via infrastructure-as-code (IaC) systems. Unlike physical routers and switches, determination of virtual intermediate nodes in the traffic path does not mean its physical locations, physical properties, and security natures. (Imagine how we can analyze results of traceroute or ICMP ping via virtual private network.)</t>
        <t>If there are any virtual nodes, physical properties of its underlying infrastructure may have to be traced and checked to ensure security and integrity. This requires cooperation of virtual resource providers or cloud providers and integration with their infrastructure management systems.</t>
      </section>
      <section anchor="risks-beyond-network-layers">
        <name>Risks Beyond Network Layers</name>
        <t>Today, many network systems are managed via complex systems. This means any invasion to the IT-side assets of those management systems will cause severe risks to the network layers. These assets include (and are not limited to) software asset management, software vulnerability, ID management, etc.</t>
        <t>To correctly evaluate risks of the whole network operations, we must also care about the risks of these management systems as well.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The lack of comprehensive security monitoring in hybrid cloud environments creates several critical security risks that this document addresses:</t>
      <section anchor="invisible-attack-vectors">
        <name>Invisible Attack Vectors</name>
        <t>Current hybrid cloud deployments create numerous blind spots where malicious activities can occur undetected:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Traffic Misdirection</strong>: DNS tampering or routing misconfigurations can redirect secure traffic through compromised or unintended paths without detection</t>
          </li>
          <li>
            <t><strong>Virtual Infrastructure Exploitation</strong>: Attacks targeting hypervisors or virtual network components remain invisible to traditional network monitoring</t>
          </li>
          <li>
            <t><strong>Cross-Tenant Information Leakage</strong>: Shared infrastructure may enable side-channel attacks or resource-based information disclosure between different cloud tenants</t>
          </li>
        </ul>
      </section>
      <section anchor="compromised-trust-assumptions">
        <name>Compromised Trust Assumptions</name>
        <t>The multi-stakeholder nature of hybrid clouds breaks traditional security perimeters:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Fragmented Visibility</strong>: No single entity has complete visibility into the security posture, creating gaps that attackers can exploit</t>
          </li>
          <li>
            <t><strong>Unclear Responsibility Boundaries</strong>: Security incidents may go undetected when responsibilities are unclear between cloud providers and users</t>
          </li>
          <li>
            <t><strong>Supply Chain Vulnerabilities</strong>: Dependencies on multiple cloud providers increase the attack surface through potential compromise of any provider</t>
          </li>
        </ul>
      </section>
      <section anchor="persistent-security-degradation">
        <name>Persistent Security Degradation</name>
        <t>Without proper monitoring capabilities, security posture deteriorates over time:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Configuration Drift</strong>: Gradual misconfigurations accumulate, creating vulnerabilities that remain undetected</t>
          </li>
          <li>
            <t><strong>Stale Security Policies</strong>: Security rules become outdated as infrastructure evolves, but changes go unnoticed</t>
          </li>
          <li>
            <t><strong>Delayed Incident Response</strong>: Security incidents remain undetected for extended periods, allowing attackers to establish persistence</t>
          </li>
        </ul>
      </section>
      <section anchor="amplified-attack-impact">
        <name>Amplified Attack Impact</name>
        <t>The interconnected nature of hybrid clouds amplifies the impact of successful attacks:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Lateral Movement</strong>: Compromised components can serve as stepping stones to access other parts of the hybrid infrastructure</t>
          </li>
          <li>
            <t><strong>Cascading Failures</strong>: Security incidents in one cloud provider can propagate to other components of the hybrid system</t>
          </li>
          <li>
            <t><strong>Data Exfiltration</strong>: Sensitive data may traverse multiple untrusted networks without adequate monitoring</t>
          </li>
        </ul>
        <t>Any solution addressing these problems must carefully balance security monitoring requirements with the protection of sensitive infrastructure information and the preservation of multi-stakeholder operational independence.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC9232">
          <front>
            <title>Network Telemetry Framework</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="A. Wang" initials="A." surname="Wang"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9232"/>
          <seriesInfo name="DOI" value="10.17487/RFC9232"/>
        </reference>
        <reference anchor="RFC9819">
          <front>
            <title>Argument Signaling for BGP Services in Segment Routing over IPv6 (SRv6)</title>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="K. Raza" initials="K." surname="Raza"/>
            <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
            <author fullname="W. Lin" initials="W." surname="Lin"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>RFC 9252 defines procedures and messages for BGP overlay services for Segment Routing over IPv6 (SRv6), including Layer 3 Virtual Private Network (L3VPN), Ethernet VPN (EVPN), and global Internet routing. This document updates RFC 9252 and provides more detailed specifications for the signaling and processing of SRv6 Segment Identifier advertisements for BGP overlay service routes associated with SRv6 Endpoint Behaviors that support arguments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9819"/>
          <seriesInfo name="DOI" value="10.17487/RFC9819"/>
        </reference>
        <reference anchor="ISO-IEC-5140">
          <front>
            <title>Information technology - Cloud computing - Multi-cloud and hybrid cloud vocabulary</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="ISO/IEC" value="5140:2024"/>
        </reference>
        <reference anchor="SAVNET-CHARTER" target="https://datatracker.ietf.org/wg/savnet/about/">
          <front>
            <title>Source Address Validation in Intra-domain and Inter-domain Networks (SAVNET) Charter</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 196?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work is based on results obtained from a project JPNP23013 commissioned by the New Energy and Industrial Technology Development
Organization (NEDO).</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61b3XLjxrG+V5XeYY58I7kIabXeJLaSk0SWtF46q5+zkjfl
cqVODYEhORaIQTAAtbTL73KeJU+Wr7tnBgBJ++JULuwlQWCmf7/+ugfKsuzw
IHeFrRYXqmvn2ZeHB61tS3Ohjh5N3jVGLTezxhaqMu2La57VylW2dQ0eUJl6
aNysNCvlW92alanao8MDPZs1Zk3Pv7u73XtHjo8L12wulK3m7vDA1s2FapvO
t69fvfrq1evDg8LllV5BiKLR8zZz9kVnnsXJRJwsiJPR3b6braz31lXtpsZD
05unt1gDu1yo169e/y47f5W9+gMka4y+UN+YyjS6PDx4NhssUVyowwMFXaZV
axosm13TnnLtneiel64r5MptV7Y2G1xgK9l2MzCM/PBkoLdpmw0EbHVV/K8u
XQWJNsYfHkCYrl265oLvpf8pNe/KUrT+vmv1s1b3079fyk+uWejK/qRb6Hih
7vhfXUJkD2d1rVFuri6Lta5yU+BqAVM2Fjc85tbgmsL2kCdfVq50i406vpw+
Pp30SweP0VX1ra51JT+ZlbYlBD4l+/9VW9+eLtzpj/VemR81lO/U33RVuX1C
f3N7r67u7+5urp4gYX66s/vghtH2z7TiXxcrl+Wuqkze/poE33crCzGezcr+
RwXwvGS2wfI7YhweVK5ZYYe1uaBvFND9d6U+vL36/ZsvX8XPX73+4nX6/OX5
V/yMUtPH+2x6c5X97vyN3KpUTMJpXNBVqu09mKkrCkGVu1XdtZKMg9Bkhy8H
wavWLtezrtTN5kg2GMRfsMMFyXEGOeRayp838t2bxhpPCqaHwv0XigWXW+m3
x8uPdzdP2dW7yw9PNx+2NHp0XYOQvCyKxnivPurSFqKfrSgJG50VDpavWAnO
ynjhTpLeq2PZ4URdLXWDG4JOrW4WpsUey7at/cXZGRbWWDB/Ns2pNe38FGqe
vSzOvF4j08/0zHXtWXiYRD88yLJM6Zmnh4ABT0vrFcCoI+RShfF5Y2fGK63q
bVxTjVnohoBUtUuj8qUuS1Mt6Gao0Zh/drbhG72CR5WpfMcgSr8OMJWe9RFS
aPHOU3JXUXNXA7zY4bAHeb80n7DY2jau4tUnynf5Umkf/Y/NVvaTiYHgNx4C
+9Oo7MoWRWno22dsfVd0OXmDrnwwOZYsNxOF9dsOnvrJkC6eXejTTvlWLCJI
Gg0bYiWqII2ubVFu8GBdargexi1sgDBC7KGGZ/0qQ63SViXiuKRYXJvGk26u
ymoY1nosI8+aBgIBAXHDKVSSR58t7IxtxqJNlB3kF36ulxtvaYddJcOekyBC
kHeSCmPjaGv8btr8VGmqnDCtqdS8cSvVeZIXPiPljXqx7VLN4Ts7syVcPeHl
LYzTmKKrCiD5hkMjdx7aY/sXU5an6qrZ1K1bwKJLm5O+q66CvCR+L+nT+8eJ
mj4gjAbCwNCkGNwAUQrVOgphIEo7XgUitu4MqpA1eMEQMKKG0Wvji8bVdYzd
Vq8QkvjGEfXOvRhYaUJxjE1p45WueE+Va/LRC/8QtUX9KkskVm2qAu6sxvFf
aY4fSAKTmKbc0Ka7LiIvQkbNDv4Rnkfo5GSolIxDDRlzUZ5R5eewoUYUYkHe
PDxmii2brDQF79pg0xp4Q5V1K25ol1pvSqeLP9Lq30KBIkiZMl8dRw/BYp7D
nwAqOgJLncAUsBdM4d0KhqhNbklI3IFHYJG0wsLBzBUpWOoXWGBhqDDwjrXz
nF24KmjhGn9CDp8RLBmAoch4bSpokrl5Fr1B/vTkP6ziyINKty3Q07MFKtfS
EjVZoiIjzTbJ0GSFqtxwDLxFVrKYS7tYZsmZuq7LGKoThDMSB2uwnlzYWPYt
5CCkRLmFIzvXecQuyx/dGqxiA8YKWgqaDOIl5ifdYqmarExhAdrQB4DOCKHx
ucoGGEfpWM4zuEIvSEjTUiwNozqaCRnsJc5icSZxjs3p4lShQoFPvJ0gMpDt
61ToJCtPWDudU3jQApJsQYdTNcwkL3uSA0zlusWSHx3Ju+Lij8efzdKVUD4K
TdZYQdOmCjA9NjF7bFzmFiAvVOLmtvEtLbkwqdylbPl/1DC6HJ3BGMROSkUs
/rQX9kdcZruiiaKw2a4ukHttC/LI+cneqk2iL3SdFJvwlePXJyEoEr1TwMTS
VoxGNfK1Yhjwruw4+gvkOKcwizEFWXDYlTxWmDk9RknucjcCBKnCqLyfqStX
UVYxjpME1/SUpLFoZRT6FUUNi1dHt989Ph1N5F91d8+fP9z8z3fTDzfX9Pnx
3eX79+nDQbjj8d39d++v+0/9k1f3t7c3d9fyMK6q0aWDo9vL74/EMkf3D0/T
+7vL90dczEbG5jLDMMN5BqAglND+IBInCj719dXDv/7v/I36+ef/Agt+fX7+
1S+/hC9fnv/hDb6gRFSyG2FK+Iro2RwAQ4xuaBVUMhSU2ra6JJ8hUpbupVKU
n6cHB5//QJb5x4X60yyvz9/8OVwghUcXo81GF9lmu1d2HhYj7rm0Z5tkzdH1
LUuP5b38fvQ92n1w8U9/4YDMzr/8y58ljtTXQOsFmEhVhLjabgpCRyvdw6OU
droV8ZebuuVEXf1GI+HZyxLT7M6ffx52L7/88ke6CGc07WS0kCVIES4ROAC+
Im3LngzgFktYsJLy0nkGkxeXuSZbuYbCSpgCk9JQ3AYwwKsQdA7BItIXghkH
IMV6DCC0nvBFKeIj2FnqNe1d2PkckiK0eyYSCDiheMK4EkhdMhmVokl1m5i4
bvETsBZxzM++gLQtSc2ejAGTullJXG6oxKm6n7cU9b6bRQUgY93YNTQuN9lY
98mQBU9IEFMsTN80aNaVu1Y8wtxztOtW1UVdj2CMdMaD8lPvsOWugYX97TO8
FpoNhsJzl0m/IMmC3B7Xi2RFhm7PgEiQO7JSvzRDrO+IyllyFNdUZmmB7fcs
jX5I9pR4qJiV2TmtMmH9KP7iZhQmgwgeRAj5sN/05FRdtqKFJjZjV2ZIFRy5
ctwBBhJM3GcGs8wtrh17RISO7QDz/glxXFygGQ6yCS1wi//CPYFE/JZtZO2c
ClVSMqg4bJuQVKXbRL2EYUAnrqRcaCnUcS98vyHvzbEbU4sht12BeSB/W04a
m8NuFDxMEQzbZkAQqLWI/iaH7YknKY0AsDRfm656/kgrDJGMIew35x/RLEHk
8D3jQkVEfKuVmpfuhSSdmY2jJgfyzwhVdbNh6SUPxgITk+QgYAsj66nhmZBJ
cl1xVdwBNxrCUNXPOZfRt1HMvXt6enjcFmhtE1LEQeU2k1NEvMecO4jGQlCL
w5G4K0ZhiiBCvtSAiZINPJagnyt8fLjDt4BFaGW4+xPUAYUZLObqlkn9HKW/
SUsjsFyK5a3cJ4h0penlHgQNuWoRb2NZ9ohNEQvfU88TmpGuoUwkuJ8I8k0f
spn23HrM2xfdDHaTnLU0ZWilQsR6g268j2Zh6jIdHxuJY0Dgi5naEAZ0vypW
mWuaLTBaSYsl7jOfNHkHDpvjgeu7RwRsjpU4MS0vLA23CTTYUz7aBUQpJrud
PMnOvf7CQZKGWwedRBejYZHFkjs7nmDIaCAgSnLZdN4bRw+3la1ID3o6Nkk0
5eDuWtZexBVP1U0FrhgmWDLfKEsjaNJ3CsG7yfTYlHuFFZMOCN8wAxCISEcM
j5HUB8IcpSWzU/vRT0912Rhd4N+1toDcUjpf9CTzrmRdWIC6a4gxhFFZGGqq
4//A/PJE/TAekf6jb1S0etHDYOO2MUS9reBhJkVpeFFQu+/tDMg8K530xjRw
adyio5EEuv02afBh/Xv1Qxg9D7akDrtBZ8I7hJjhWJAABeuyuLGjA4cHrBAW
RcS0LwYJH2lG2OXDw9+mvAsNvvfswkMjOuzBpxw8UTbZ5gB2aLcQWlsTplF1
GWIIfRccGZWA7dHfSxw/ge1x46KDS+n5OeJSSkBic8LeqBKGLqfUYu/YBPrt
0PxMUd92l7gjVyiqvvdxLnP22Hfs/lcplKQCMcAUzf18UsSKVEh6ahl6Ja/S
18H4JdLwNB06VQ8DCgEqMnMElFo/srce8eFEqEyknTT6+RRKZ6TvwdO0HNTe
BLMujQWjQ2tWO+ywic6mi5FJh6a73fNQYfLAAem5WDWYQzRhnhwjPk7hWAq6
uNRNQfh+loB+MDEMwtKuug0bBkUyofN60ZhA144f3196scDKtP3IJHEemhR4
6OIB61R6ODg/cb+xNSikvnU8hQpMm6dR9BxHnyXDDl028NVbmstMYBqYouQm
bLADmczbhYBPqvSjOeVezm85Qee2CION4aJhKbR0WkYqceo2WnDg/lsUOcdJ
yhSXIqUKfDyhukn4sVdNdSwTcxoA7pH3RIrHsGfqBZB+B2gg7GMrcIhZK4PG
LqexToWE36HWg9aO5+cjPVOfGVL82rRcmUY2PrpyDQ2EjqQqcWrzoNGvEAEZ
UX0gEMprkeV03GyK/kChCAuSsGgUpOjT9gIuqumqKtZLsz1Yox46YjgUJ0jg
ItiYksdYqBOhA/hnB44KkQejxsDH4kRu2PxsMUmQaOxNGZZ4H0UIV6J+Woho
jsoYTrRJuHVO4LvUwBEKgPQc7n+u3AsnCQkiIZ7ibK/iAvSL0s36QxmmmNs7
Y0ddepfQXnaiE8CwF6cNaG2VM0ZzCyEnONr7blWH4Vx6IuEXiWI01QZpC6IU
sYOBmfhYfpRwQg76JHtv9LNemDjs20rPcQQKfNPozQAC4VHZQYMtL9JkOqe+
EbVfXZbtkpkfJ+MWWowUITAXEgZMHCeXR2bRjqF/YpbIw3jxjCltbEuDqJS+
GT81HvwzLMYpcaNfRrujb0cHTcdotD7LG9QYnsHE5MxSjm+BrDDwZICvzZxY
92hn1k7kE5U5sldES+iYxLlnI13k3JYt023vpFaMDcjHmigYhIxEIfozG9le
EjIvOyRkDIiPg8PUcVRwG0vFTIw/qFeUyLzbcGYlNWOGeOTI3jmJ9Gh44CR8
Qs8GtlTUzvIRMaHahGFyeLDLbDLWRWo4x0GYaZ/l2FEdT/XVSd/2fleV9tkM
zuVkezmTSRIU2zAZdt5zJhNxKLJcPj5J8/SVQTdNA5O0IR3IhuhK1/oqNQnH
WqMzRYh9PF3pBcHDEjjwYrhJ51OAn5goAPsEeBp0aqwSId306vZB8dkn2Seq
EHvhmPgnDPexZeLmDz6Nd7OOe0XlEtn64enVFg5QFkQAmxkRThwXTvaGbWo6
eQsnX9w9h7lOyGOq+iMci0LG0BtU1VSKB4U2rSwLcIMtZGpHcDpK40nR1oDn
g/XPHjnKg5bQIan3ehMI8ZMr9GYip8gxwIczrnhGR/6IhSuFprA0BIxnD9hq
rT2/SSM0a/oUEMp7E7y9JM62Kyw04wMHOsdmgEWMsNxhpShZyXIzAfZp3ZD/
6pjMFYl6aVdWuu2TfhLBDwy2n/Q/rbuS5qeRoEyvR7dRQou1YARmHoAKoFLZ
UVyKqKOCGQUeknAkAQMgg0nO8qRiN1xiv4XiOwrhSKsf3F1hcQoXHU6zqLxR
6xRmTHVjlohYOmLzu+/SERaMurjRnD5HH09taqp5sSCklYKXhOSPDquk2TP+
IsThtKJxM9GQS57IqI+GuLycjgTqNZKkH5tGQRQPNxzqJ7opAp3apWEveJ/N
Lf2miXhaznfCHJdDVE75lufz4f2Ezz+PbyjcWp9OFz///IKnQumtC9VPXnbG
MrI+ahc/Hcc+EVXjPIhd4GgSzFyuqxJ/JNz1nNMUBSIfvxlE0oUitk1rbj7B
KFbqEwl7GV4gkFezuC3b1MQpvBNISagYAjLN5QmjuPu3yTGUbIN3h3ZfSRXR
rhoQyuzJVFSU93AskiuQsj3wisdoLwrZLI7I4msQ3HQKMIYh4pANFLB/6Rh7
Y2/TnyBJzLQslE+Hvr3pn3gkctkzzcgEd0/2+8Oo8cncDEFIph6YKOUBRYsw
qxRfbxu9CGPgj2RgRhayzZ2LTJaawZYqjg/Y2hJjiPfyu0Lj6QsYlgxXOCHI
3Qtdh/wTI1LZoLA0EigiyndASDrY/WCQMlVa/2sZuSNT2GVxE2LoRSKFCzdI
HjlQaobL8OshMFcX9oiu2VfLuOcUkR67mqj11ZJC8OMAfIM017GR5bpdiZvq
cqcbJmlhCy9jKrFBHACnHOxfKOizkacFKFpxpRAzD1jTem6ok0GuqQDLEJLu
+nvIWCEWQzDNdZ2UmOx4TTiadQ1jKjXwfJaVAuZqNPO9buy8JUt8g70pg3fh
RwPaYBcsNwiI9diWEhsh1XtHBie06JN7PR9ohLQdDU1XEgk2OXULULvQ8tbB
dm6btSvXpDbxZUpsejeTgwflGC1O2PLaUA0nYi5BFmPS/EoI7kgur8Z8ihhK
BqWDAJ3miSkNiKohr1Er/JJfCWO/5iZ4+pIOvOYWi4SCNF3V/FZq7BDhrP5U
99dAQYdVZKxpeYkwY0dj4WniHdAt+fk9LEjV9BYhQABBmg+hagDRlMn8YiS/
gtEaeS/Qt/iZ9dO8STzR1U2baEiQ0m71Pxxn2ueaR3hv0f4TW/8V29uKT9bH
GccyUejrBZVkCBHawV7qsQhCYIL36X28m0/U9DWphj0SPeF3gPh1PQId/Eov
g5o+7buKh9r9IKevnLoA2SZZhoXq8OASyZ3eHwp0JLSnPs1QvFAyYmP0pvtG
zXRJr/nv5UrjM+bAxQevF8rBa1RmewK4NfGTRw15N3UHu7Vo2L0Pp3vhbGZ6
eXe5QwC3X9Ki8lI5uVeHl6ji68kzRKYsdZnTxKY0BRctLPPzBejWjHrz/z6a
g7Oao1/S2nEWJkXaVX1HN6M5H2Upvc7Kb4T9SOTo24e7h9dfvDr/gg/R5K9J
ZM5NdrgzL+oGqLXYhLlN+guLwV9VXNPY2NVyAnU/+NsDdXx3c31/wjr9G/Gh
6ONxMwAA

-->

</rfc>
