<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pan-ipsecme-anti-replay-notification-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Anti-Replay Notification in IKEv2">IKEv2 Support for Anti-Replay Status Notification</title>
    <seriesInfo name="Internet-Draft" value="draft-pan-ipsecme-anti-replay-notification-00"/>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="Q." surname="He" fullname="Qi He">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>archibald.heqi@huawei.com</email>
      </address>
    </author>
    <author initials="P." surname="Wouters" fullname="Paul Wouters">
      <organization abbrev="Aiven">Aiven</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>paul.wouters@aiven.io</email>
      </address>
    </author>
    <date year="2024" month="March" day="03"/>
    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>

<t>RFC 4302 and RFC 4303 specify that, during Security Association (SA) establishment, IPsec implementation should notify the peer if it will not provide anti-replay protection, to avoid having the peer do unnecessary sequence number monitoring and SA setup.</t>
      <t>This document defines the ANTI_REPLAY_STATUS Notify Message Status Type Payload in the Internet Key Exchange Protocol Version 2 (IKEv2) to inform the peers of their own anti-replay status when creating the IPsec SAs, to fulfill the above requirement.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-pan-ipsecme-anti-replay-notification/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsec Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IPsec Authentication Header (AH) <xref target="RFC4302"/> and Encapsulating Security Payload (ESP) <xref target="RFC4303"/> are used to provide security for IP communications. Both AH and ESP support the anti-replay function to prevent an attacker from resending the packets received by the IPsec peer before. Each IPsec packet is sent with a unique sequence number, which the IPsec receiver checks to see whether the sequence number is duplicated.</t>
      <t>RFC 4302 and RFC 4303 specify the details of sequence number generation and verification. When anti-replay is enabled on the receiver, the sender must monitor the sequence number counter and increment the counter with every message sent. The sender must ensure that the counter does not cycle, and trigger the creation and use of a new IPsec SA before the counter is about to cycle. When anti-replay is disabled on the receiver, the sender does not need to monitor or reset the counter. The sender only increments the counter and rolls it over back to zero when it reaches the maximum value.</t>
      <t>It is specified in both RFC 4302 and RFC 4303 that, during SA establishment, IPsec implementation should notify the peer if it will not provide anti-replay protection, to avoid having the peer do unnecessary sequence number monitoring and SA setup. However, currently, IKEv2 <xref target="RFC7296"/> does not have the notification of anti-replay status when negotiating the creation of an IPsec SA. As a result, IPsec implementations must always assume that the peer has anti-replay enabled. Even though anti-replay is disabled on both ends, they still have to monitor the sequence numbers.</t>
      <t>This document adds a notification in IKEv2 to inform the peers of their own anti-replay status when creating the IPsec SAs, which can finally avoid unnecessary sequence number monitoring.</t>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>When anti-replay is enabled on the peer, the IPsec implementation needs to monitor the sequence number of outbound packets, and trigger a rekey to generate and use a new Child SA when the sequence number counter is about to cycle.
In high-performance scenarios, high-speed traffic causes the 32-bit sequence number to be consumed quickly, resulting in frequent rekeying of Child SAs. For this reason, IPsec defines the Extended Sequence Number (ESN) function, extending the available space for sequence numbers from 32 to 64 bits.
Although ESN is good to avoid the sequence number running out in a short period, there is a prerequisite for using ESN - RFC 4302 and RFC 4303 both require ESN to be used in conjunction with the anti-replay function. That is, ESN can only be used if the anti-replay feature is enabled.</t>
        <t>In the high-performance scenario, operators may choose to disable the anti-replay function for the considerations of QoS, performance, and others. For example, the high-level QoS packets arriving first may cause a large number of low-level QoS packets being dropped, when the disordered packets exceed the window size of anti-replay. Disabling anti-replay brings a new problem: IPsec peers cannot successfully negotiate using ESN. The final result is that neither peer of IPsec enables anti-replay, but neither can use ESN, leaving the Child SAs forced to rekey frequently due to the rapid exhaustion of the 32-bit sequence number.</t>
        <t>The solution to this problem can be approached in two ways.
One option is to support the continued use of the ESN when anti-replay is disabled. Because IPsec packets carry only the low-order 32 bits of the sequence number, the ESN has a need for the receiver to manage the anti-replay window in order to determine the correct value for the high-order 32 bits. To use ESN when anti-replay is disabled, the IPsec implementation needs to create and maintain a separate window for ESN as well.</t>
        <t>The other option is to add a notification of anti-replay status in IKEv2. Section 3.4.3 of both RFC 4302 and RFC 4303 specify that the IPsec receiver should notify the sender during SA establishment that the receiver will not provide anti-replay protection. Adding the anti-replay status notification in IKEv2 can fulfill this requirement. When anti-replay is disabled on both peers, neither peer needs to monitor the sequence number counter, thus avoiding frequent rekey of Child SAs.</t>
        <t>Although the first option could support using ESN when anti-replay is enabled at one peer and disabled at the other, this would require an update to RFC 4302 and RFC 4303. Therefore, this document considers the second option, given that it is only an extension of IKEv2 to fulfill a requirement already defined in RFC 4302 and RFC 4303.</t>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="notifying-the-anti-replay-status">
      <name>Notifying the Anti-replay Status</name>
      <t>When creating a Child SA, the ANTI_REPLAY_STATUS notify payload can be used by the initiator and the responder to inform each other of their own anti-replay status (enabled or disabled) regarding this SA.</t>
      <t>The initiator includes the ANTI_REPLAY_STATUS notify payload in the IKE_AUTH exchange request for creating the initial Child SA or the CREATE_CHILD_SA exchange request for creating the subsequent Child SAs.</t>
      <t>A responder that does not support the anti-replay status notification processes the request as normal, and does not include the new Notify in the response. As per regular IKEv2 processing, a responder that does not recognize this new Notify, <bcp14>MUST</bcp14> ignore the notify. As required in RFC 4302 and RFC 4303, this responder should assume the anti-replay is enabled in the initiator. The absence of the Notify in the response indicates to the initiator that the responder doesn't support the anti-replay status notification. The initiator continues the IKEv2 negotiation as usual, and also assumes the anti-replay is enabled in the responder.</t>
      <t>A responder that supports the anti-replay status notification can understand whether the initiator provides the anti-replay protection for this Child SA, and includes the ANTI_REPLAY_STATUS notify payload in the response to inform its anti-replay status about this Child SA.</t>
      <t>The IKE_AUTH message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2,
    TSi, TSr,
    N(ANTI_REPLAY_STATUS)}  -->
                             <--  HDR, SK {IDr, [CERT,] AUTH,
                                      SAr2, TSi, TSr,
                                      N(ANTI_REPLAY_STATUS)}
]]></artwork>
      <t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SK {SA, Ni, [KEi,]
    TSi, TSr,
    N(ANTI_REPLAY_STATUS)}  -->
                             <--  HDR, SK {SA, Nr, [KEr,]
                                      TSi, TSr,
                                      N(ANTI_REPLAY_STATUS)}
]]></artwork>
      <t>After the Child SA is successfully established and the initiator and responder mutually notify each other of their own anti-replay status, the IPsec implementation can choose not to monitor the sequence number counter if the peer's anti-replay is disabled.</t>
    </section>
    <section anchor="antireplaystatus-notify-payload-format">
      <name>ANTI_REPLAY_STATUS Notify Payload Format</name>
      <t>The ANTI_REPLAY_STATUS Notify Message type notification is used by the initiator and responder to indicate their own anti-replay status to each other when creating the Child SAs.</t>
      <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-+-------------+-------------------------------+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+---------------+-+-------------+-------------------------------+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+---------------+---------------+-------------------------------+
|                            Status                             |
+---------------------------------------------------------------+
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Protocol ID (1 octet) - this field <bcp14>MUST</bcp14> contain either (2) to indicate AH or (3) to indicate ESP.</t>
        </li>
        <li>
          <t>SPI Size (1 octet) - <bcp14>MUST</bcp14> be 0.</t>
        </li>
        <li>
          <t>Notify Message Type (2 octets) - <bcp14>MUST</bcp14> be set to the value <tt>TBD1</tt>.</t>
        </li>
        <li>
          <t>Status (4 octets) - this field <bcp14>MUST</bcp14> be 0 to indicate the anti-replay is enabled or 1 to indicate the anti-replay is disabled.</t>
        </li>
      </ul>
      <t>The Critical bit <bcp14>MUST</bcp14> be 0. A non-zero value <bcp14>MUST</bcp14> be ignored.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines a new Notify Message Type in the "IKEv2 Notify Message Types - Status Types" registry.  IANA is requested to assign the codepoint in this registry.</t>
      <artwork><![CDATA[
NOTIFY messages: status types            Value
----------------------------------------------------------
ANTI_REPLAY_STATUS                       TBD1
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
      </references>
    </references>
    <?line 210?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Va63LbNhb+rxm/A9b9UbuRNL5t22i6bRVbWXuSOI6ltJPp
dFKIhCRsKIAFSCtq032WfZZ9sj3n4EJSpmy3zf4oxzMWQVwOzuU73wHZ6/V2
OoUsMjFgF89GN0dsXOa5NgWbacOGqpC9a5FnfM3GBS9Kyy51IWcy4YXUaqfD
p1MjbgaNjvUeTCo37U4HGsRcm/WA2SLd6ex0Up0ovoR1U8NnRS/nqidzK5Kl
6HGcztB0PVWbrndwsNOx5XQprYXbYp2j2KPJU5gNph+wo4Ojk97BMfzhCjI3
A1aY0hZHBwePD0AIbgQfsLFISiOL9U5npc27udFlDtNcjUenL0bse2iSas7+
ic07nXdiDZ1SeK4KYZQoemcoLk5vC67StzzTStAyYqeTy8FOh7FCJwO2FhZ/
W1CmETNbNayXtXuQqSwW2gzwZw/0BQ++77MrrrCvU9D3QoYGbeYDdl7yFTRN
RLJQOtNz6SYOxnCPsUUsucwGbCWzTPJlH1QMD75d0PN+opckDkgnigHb3cW7
RKci/gYVhd9GzEHhVa9SFcY/9EK/6rNzUcn8SvrbPyQxN8lCTnmW9hfi548u
cZT5qg/mLsGuthL8ipdZvZXkH8oboeoSxwYvcA6j+is36luOD/tSfyRhlTZL
cP8bQb51/fT0i6PHn5O/SDXbfHZyfHBU+31M/UCc0vVw0lKcfStFMevD9kgh
vR7sDYTlCfk2jGY4FQMXZ/7mmNlcJHK2ZsWCF12WQhBBoIRoYkNrdSJd3O+N
h/tMQIRMM2kXS6Gg/8UVrMrkMs8ENriOdqHLLGUU5TixYLkQhskZkwU5Lj5i
udE3MhWsBgzYVogEJ+lCwDF+o2XKFvwGZYrzpJqVSolEWMvNmlnxcylUIpgq
l1N4vNRKFpq2gRsdD6FHUeZ9VMFkIS2MT0oUlqViJpWwNPPwcnLx9np09Xz4
5u14Mpy8HjvQW7MXuM5cBLCcAECBQ60zzVOEQhwccIQ9E2s2ep8suIIBV7AZ
neiMfQcOhHo5YnsEnPu4N2fnuCvL9AxvpGF6pRpKsW7h1UIolgDYFUEbTvnj
oSVlzcpshrrFJ3yqbwR44M+lNGSYfnCIpUzTTODdJyi20WmZONzf6bj5hoBd
MCKg/bngKWh1b3i+z3791Xvjb7+Rbkcq4bktMydSdJqgnb3R+KoadIyDjGCl
FSnKG+xvwzDMThdXECnLZan88rbPnuhiwYbnbsHxFbM+mdE+a2qalYp24uYW
N2hhDposCp68gx3MjF6CSqxQaXQnfFJYaE0ExFvKpuuaYsnZpgLEEn024ski
tNMoBp5kcY2VBPk4uKQEP9z0xi6YTcLIala/lmHJQiTvLEprhUDrQh9DHTc9
Gn22zDNUiUj7DwllAb5dACyQV21ONxdKGGdcHA6yxGQM2IleVlcrLC4UhDxo
RztvDzvoemEV+scSMnIIvdZNEADCf1xSqsS5JfUMT0iRYDeI6aWPOVRwn002
lhHKluBIiFiNCVINwYzQkqyTTHRpqcLI+dzr1QWP3za4ISqHMyVWMZK8uRuz
ggIgnMoCLUUTtysplfZ+LUUJlXBBEDQGf+iajf00Nq5Vtq70ZhsS4naMzsDa
gK8afWsKLorT/yKMdsABT2D34HNu6JK/l8tyyW54VgpyqQvn0eRCUhC0TTHy
2l2tmS2Gf+G0wM71SpCdAIYMCJutu542E3JhYgbkipaDZZ1/1EksedIWyFZA
kQtZoXb0QhoTXa8PuRa8EbygzLZo0Dr359mKr6GvtZDGqiggJSy4bQjiQxfw
C/AQuulyvrjLc8nk4HGW3BY3gnZxe9Z3xbdtya88TXFLqq14+Pgp0AFtAiqF
rM4zCBfnJw9zChKf0uInmLhBH0vK+KR9bH8AMOImujWxNvwfY97eo0ZUAWAN
4A34qE9PTSBDF4ECBufxQC4injkwO13IjByc1HUXFt+GNsABxRZyvujlwhAR
xWE2gZ0aqUEUegYogfAFRRPYFVQOaztYOT7qTSGYN9eD6acIVwo9NmXASpJ3
GGbO2dGW4BYzQ6MKtz9sBF2EvQAPeEoak5ituUUkcEquk7jR+wLREgYEAS6d
AMBELvcjQ+gyQR2DE/EbSJVoSYA/DoOQiGy6t6MPx+S3n58w2CV6/DDzIQXz
ozbnWqcVQrWp3oA70t5A67BpjqgIZAa0LXVKzgPpB+2CHIYInJWFE6m0OBBX
6m1BZYpez/qoo1M8MS5YDAzwr0CSKNluo1CYeTjmgy7NgjFF+SfONbs9FIKy
dKIHzKGs4hxwq0d1mc7RhzVoeAnTJAutLWGNR6XtNG/mIwjdChKG8RAJTvNK
j7ustpoLII269X4k3nOMzW4lXAY5IMORkRRyYyRlmJk0yG1QOu6iLONmXo/Y
TK9aJpgKHJ0aneci7VbRCDvTBgQWMcJBnoQiCp6upEr1iln5i9jIKn12Rjpx
KazSyBTxy/rgzx12DWoc1qIBMXXZMkEghEIBbBnSkqj8yhEOQk8fmmhOSjBK
SKKnlGRALDe7s3Qj43TZtKy6o+egymDyLstElbFjXKMZE8eFHK4FGAAR05I8
gdgUzyGgxPsFWCAkz+2A43MRuJnOylATEHZ49ZBg4M08hwZkRa6UWwFZgtQK
w18q0H7uMpbj6LWqAzwOQKsUkUQS9kCgrO7ghVDICOc/9SoCbWMgMVF44TTo
SuQdiDWIMmH+W4VFWJRSviOUISRijYHJhitk0pth5N0Mdu1Ww4gTkBOWAKZ+
k8CGksIxxDgzxUpDPnAaHWx8pwIekhkpt7t8tuQSHjuIFDmnPOeFRmFwNdj4
SmRZtDZFeNNsQEE2GUg7VQu8pI9lLPU77p/0j7H3HTS4fnjSVuPdpryhEGhn
ztVEcYoHEmOgj2mV0G7vr52EEVuK5waUW6sjg3vLHFIMIUy3CRAPYjqehKBb
gHyUMQltGzSgyQHQ0DHlFoRVCM3e4gnpOgRqlS3bnDIwN9C2Vp47o2Xj9rwZ
yKW6Tjcrmj+kV0S2HE+ocZ+t3kFwaqig9DNEZhxylvWagfvUb6PL5tJxdczA
hMAEDrAesRbrfTiy6GA/XjceFAkQSuna0yOCt3YhI+9l19Vwy55zNS8BOEJs
oS3w0Nyy3Revx5PdrvvPLl/S7+vRq9cX16Mz/D0+Hz5/Hn90fI/x+cvXz8+q
X9XI05cvXowuz9xgaGWNps7ui+GbXZfCd19eTS5eXg6f77qTt0axYYSnOxLd
CthTgWa0nVTYxMip08GT06v//ufwBEq7v4EGjg4PH0Nt526+PPziBG7QWzxh
QLW7W6yFOpAsBDfE2kDdCWSkgmfIzi3GOVQsaO1+p/PZD6iZHwfsq2mSH558
7Rtww43GoLNGI+nsdsutwU6JLU0ty0RtNto3NN2Ud/imcR/0Xmv86psMU0Xv
8Mtvvu5UTuQOTQMQDWtR585PYykVyzgeA7y77STW42fuzxV98iYq6k/sJOCM
RBrpaiUCUJtr5VObrzTxACRkiXtKzb1Y25kICvt4ps+Nh1lwPqjaQ3xUAkiV
ZGW6/Vh5YzPhCPnZ6O3w9eQcqaA7PiYctO6lXaPmdUtlVZ3nAfb0ejScjN6e
nl88P3uLmeXemWw5tR5tN0C2rj4Eonj8se30tS3NQHZCvulVEaTg2AuIeeai
LM7s9ebOVoDJ+uN3qWrmtIKOSXIspMS8BB7ucdAvBRvrukOUVuEhqeq5QmZN
5qtW6TKKUDlX4fTPWYlW87C6HUO7IXeGVX3ajyc0Ylv68ZuLzuMYOAerYKL0
zK9dEXCf0omwDRy5csEaiwgioQ7Up7/Lfk6YatZAe21wWNB7PNzCU1ULIVkG
uwI0aq8B+wAVREnb/c+LfXumNr+jqgPH0tvcxtF6tRtPp27PWHEqz3pB2Aqh
/PH1H4jwaLgKj5Det2zGn8nUF444E3EiHJHHKA8ZMeGWynCXk6YCKgp6Yfhv
uLAgDwrYdl0HzdMLoz977XTOz667bPyM/XpxJrvsh9PR9aT7o/sPGbD7I77C
ZOyHizMDzbg16D2UR13XPhnDoMnY+NvLvdv63v+NsV7va9dh6/VVr8dYTRZT
yUKL3jM8XuOhOepuinX/1S54sIqz7SaA//VMjBFyiVZ+NpLBsv8nC9JShpYy
Yan7r49ut+Gs8NAS0zEapn7SEis85KOenTT5SgV2y7Io6ezaY8jDGcsd5TXi
oT9Ywyz4sLosHPJhafSp3VYG9h3r2/72PLwLfkofNQRPv/9tO34HtFG02jsY
3wbbc5nxboYHHWvavf1qocmInL1bXeSwpe2ope0Yxh9A7yN2zE7Y39nn7Av2
JXv8e9p2Oo82gu9R79HG/d3Xo53OB3YJlWS0DPtw+gEgYTQeXX83OgM5P0SJ
Q5fnQs2h1PfXh48jRfw84uJs7x8H+x/Y+OqCjZGc4W2QYsMt6OuL7VLcfd+q
izsu/8XHXVeLFL/3elSByWesphS2d8h0Uohin/Uc7M+kAI8kpopcDA/H/KnL
XvimxDv+8ByLgr3jZutofNXHRSpF11agaaGqOqAubWrfO3K9bb07vbN2/NOd
FP40eXJ2+JNbx5dSJ7VxmxvBFTdjdutrNgNRcU/f6rg1ZlUj8WOWDE8ra7tk
Q4AX1aM35E7y8MxVAWntZORieDlkp433DNu/JuL16qWhQE8Edx11bulhQUG1
z4zsLn1EZgsDhYgTwh/RQUpxZ+ZAsEFcf2CbilxLVUSaEAdXAAZF/8XTN4FZ
2EEEQ1q9dn2HKvkz9ABS422Qb7/QY6ogcCqPHxO1qP3Jmc86yTulV2DsOZ1Z
1Z7B+vQNBP7+H2kuh00PKwAA

-->

</rfc>
