<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC8724 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8724.xml">
<!ENTITY RFC4443 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml">
<!ENTITY RFC8152 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8949 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY RFC8610 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-pelov-icmpv6-sec-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Secure ICMPv6 Messages for Network Segment Characterization</title>

    <author initials="A." surname="Pelov" fullname="Alexander Pelov">
      <organization abbrev="IMT Atlantique">IMT Atlantique</organization>
      <address>
        <postal>
          <street>2bis rue de la Chataigneraie</street>
          <city>Cesson-Sévigné</city>
          <code>35536</code>
          <country>France</country>
        </postal>
        <email>alexander.pelov@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2025" month="July" day="24"/>

    
    
    

    <abstract>


<?line 38?>

<t>This document proposes a new ICMPv6 message type, ICMPv6-SEC, designed to convey cryptographically verifiable information using COSE objects and CBOR-encoded certificates. The purpose is to signal segment-specific network characteristics, including high RTT, congestion, policy constraints, and traffic treatment expectations. These messages can describe either the segment beyond the current hop (forward segment) or the local segment on which the source resides. Certificates may be embedded or referenced via DNS using cryptographic hashes. The mechanism is optimized for high-speed environments by allowing the use of static, signed descriptors for destination prefixes.</t>



    </abstract>



  </front>

  <middle>


<?line 42?>

<section anchor="introduction"><name>Introduction</name>

<t>ICMPv6 messages are a fundamental mechanism for communicating control and error information in IPv6 networks. However, existing ICMPv6 message types lack authentication and integrity protection. In high-latency, high-cost, or policy-constrained environments, this deficiency can lead to suboptimal or insecure behavior.</t>

<t>This document introduces ICMPv6-SEC, a new message type that carries a signed COSE object describing network segment characteristics. The signed message may include RTT metrics, availability windows, congestion indicators, traffic marking requirements, or access policies. Certificates for validation can be embedded or referenced via a cryptographic hash.</t>

<t>ICMPv6-SEC messages can describe either:</t>

<t><list style="symbols">
  <t>The forward segment, i.e., a destination prefix or path region beyond the router issuing the message.</t>
  <t>The local segment, i.e., the link or network on which the sender resides.</t>
</list></t>

<t>The format allows for efficient signaling in high-throughput environments by enabling pre-signed, reusable descriptors.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t><list style="symbols">
  <t>ICMPv6-SEC: The new secure ICMPv6 message type.</t>
  <t>COSE: CBOR Object Signing and Encryption (RFC 8152).</t>
  <t>CBOR: Concise Binary Object Representation (RFC 8949).</t>
  <t>High-RTT Link: A link with round-trip times exceeding conventional internet norms, often seconds or more.</t>
  <t>DiffServ: Differentiated Services Code Points for QoS.</t>
  <t>SCHC: Static Context Header Compression (RFC 8724).</t>
  <t>Forward Segment: A portion of the path toward the packet's destination.</t>
  <t>Local Segment: The network segment or link on which the sender is located.</t>
  <t>Segment Descriptor: A COSE-signed object describing characteristics of a network region.</t>
</list></t>

</section>
<section anchor="message-format"><name>Message Format</name>

<t>The ICMPv6-SEC message contains:</t>

<t><list style="symbols">
  <t>Type: TBD (IANA-assigned)</t>
  <t>Code: Usage context (e.g., RTT alert, policy signal)</t>
  <t>Checksum: Standard ICMPv6 checksum</t>
  <t>Payload:  <list style="symbols">
      <t>CBOR-encoded COSE_Sign1 object (segment descriptor)</t>
      <t>Optional CBOR certificate</t>
      <t>Optional SHA-256 certificate hash</t>
      <t>Timestamp (UTC)</t>
      <t>Validity duration (seconds)</t>
    </list></t>
</list></t>

<section anchor="segment-descriptor-structure-cddl"><name>Segment Descriptor Structure (CDDL)</name>

<figure><sourcecode type="cddl"><![CDATA[
SegmentDescriptor = {
  scope: "local" / "forward" / "bidirectional" / "pathset",
  prefix: bstr .size 16..32,        ; IPv6 prefix or null for local
  rtt: float32 / null,
  congestion: float32 / null,       ; 0.0 - 1.0 scale
  availability: [tstr, tstr] / null,
  energy-cost: float32 / null,
  marking-required: text / null,    ; e.g., "DSCP=AF42", "SCHC context_id=0xFF123AFF rule=3"
  valid-from: tstr,
  valid-to: tstr
}

ICMPv6-SEC = {
  type: uint,
  code: uint,
  cose: COSE_Sign1,
  cert: bstr / null,
  cert-hash: bstr / null,
  timestamp: tstr,
  valid-for: uint
}
]]></sourcecode></figure>

</section>
</section>
<section anchor="protocol-semantics"><name>Protocol Semantics</name>

<t>Routers MAY emit ICMPv6-SEC messages:</t>

<t><list style="symbols">
  <t>Upon detecting misconfigured or non-compliant traffic.</t>
  <t>Proactively, in scheduled intervals.</t>
  <t>In response to discovery probes (see Section 11).</t>
</list></t>

<t>Messages SHOULD include a valid-for duration and timestamp to support caching and prevent replay.</t>

</section>
<section anchor="certificate-handling"><name>Certificate Handling</name>

<t>Certificates used in COSE validation MAY be:</t>

<t><list style="symbols">
  <t>Embedded directly in the message.</t>
  <t>Referenced via a SHA-256 hash, resolvable through DNS (e.g., a new RR type).</t>
</list></t>

<t>Validation MUST ensure the signature covers the SegmentDescriptor and was created within the claimed validity interval.</t>

</section>
<section anchor="host-processing"><name>Host Processing</name>

<t>Receiving hosts MUST:</t>

<t><list style="symbols">
  <t>Verify the COSE signature.</t>
  <t>Check certificate validity and freshness.</t>
  <t>Match the descriptor scope and prefix to applicable flows.</t>
</list></t>

<t>Hosts SHOULD cache descriptors during their validity window. If multiple descriptors apply to the same prefix with conflicting values, hosts MAY:</t>

<t><list style="symbols">
  <t>Use the most recently received valid descriptor.</t>
  <t>Apply local policies to prefer descriptors from known routers.</t>
</list></t>

</section>
<section anchor="use-cases"><name>Use Cases</name>

<section anchor="forward-segment-signaling"><name>Forward Segment Signaling</name>

<t>A router detects traffic targeting a high-latency or policy-restricted segment. It sends an ICMPv6-SEC message describing the destination prefix and the segment's properties:</t>

<t><list style="symbols">
  <t>Expected RTT and variability</t>
  <t>Required DSCP for admission</t>
  <t>Congestion likelihood</t>
  <t>Availability windows for scheduled access</t>
</list></t>

<t>This allows the source to modify behavior preemptively—e.g., adjust timers, enable SCHC, change DSCP.</t>

</section>
<section anchor="local-segment-signaling"><name>Local Segment Signaling</name>

<t>Upon receiving unmarked or misbehaving traffic, a router informs the sender about its own segment characteristics. This may include:</t>

<t><list style="symbols">
  <t>Policy zones (e.g., quarantine, guest LAN)</t>
  <t>MTU or RTT constraints</t>
  <t>Energy-saving schedule (e.g., LPWAN or time-slot radio)</t>
</list></t>

<t>Sources adapt stack behavior, fall back to compressed protocols, or prioritize retransmission paths accordingly.</t>

</section>
</section>
<section anchor="optimizations"><name>Optimizations</name>

<section anchor="message-rate-limiting"><name>Message Rate Limiting</name>

<t>Routers may:</t>

<t><list style="symbols">
  <t>Emit ICMPv6-SEC no more than once per source/prefix/interval</t>
  <t>Embed timestamp + validity duration in message</t>
  <t>Cache descriptor transmission for repeated flows</t>
</list></t>

</section>
<section anchor="stateless-or-semi-stateful-generation"><name>Stateless or Semi-Stateful Generation</name>

<t>Routers MAY use pre-signed descriptors for common segments, eliminating signing on the data path. Stateless ICMPv6-SEC emissions remove per-flow computation burden.</t>

</section>
<section anchor="certificate-minimization"><name>Certificate Minimization</name>

<t>Compact CBOR-encoded certificates and DNSSEC-pinned hashes are RECOMMENDED to reduce overhead.</t>

</section>
<section anchor="static-signed-descriptions-of-prefixes"><name>Static Signed Descriptions of Prefixes</name>

<t>For routers operating at high throughput, dynamic message signing can impose untenable computational demands. To address this, static signed segment descriptors can be pre-generated and associated with specific IPv6 prefixes (e.g., 2025:0711::/48). These descriptors can then be reused across all relevant flows without recalculating signatures in real-time. This approach enables highly efficient signaling while maintaining cryptographic integrity and temporal validity through timestamped metadata.</t>

<t>Key benefits of this method include:</t>

<t><list style="symbols">
  <t>Scalability, by limiting cryptographic operations to a per-prefix basis;</t>
  <t>Efficiency, as it introduces negligible overhead into the data path;</t>
  <t>Security, through deterministic signature validation and replay protection using embedded validity intervals.</t>
</list></t>

</section>
</section>
<section anchor="segment-scope-and-interpretation"><name>Segment Scope and Interpretation</name>

<t>Each segment descriptor includes a <spanx style="verb">scope</spanx> field:</t>

<t><list style="symbols">
  <t>"local": The message describes the segment on which the sender resides</t>
  <t>"forward": The message describes the segment reachable through a next-hop or destination prefix</t>
  <t>"bidirectional": Characteristics apply in both directions (e.g., satellite relay)</t>
  <t>"pathset": The descriptor includes complex path behavior</t>
</list></t>

<t>Hosts can adjust behavior based on <spanx style="verb">scope</spanx>—e.g., ignore local metrics for routing but honor forward metrics for preemptive tuning.</t>

</section>
<section anchor="interaction-with-transport-and-application-stacks"><name>Interaction with Transport and Application Stacks</name>

<t>ICMPv6-SEC feedback may inform:</t>

<t><list style="symbols">
  <t>TCP/QUIC Congestion Control: RTT inputs for BBR/CUBIC, ECN calibration</t>
  <t>FEC/SCTP/QUIC Streaming: Adjust bitrate, redundancy, or loss recovery</t>
  <t>MPTCP/Multipath QUIC: Path selection based on segment scoring</t>
  <t>IoT/Embedded Systems: Activate SCHC, reduce keep-alives, etc.</t>
</list></t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t><list style="symbols">
  <t>Authenticity: COSE signatures ensure the source of the signal is verifiable.</t>
  <t>Replay Protection: Valid-from/to timestamps prevent stale reuse.</t>
  <t>Rate Control: Rate limiting and segment caching mitigate signal storms.</t>
  <t>Trust Anchor Management: Certificates should be anchored in DNSSEC or distributed securely.</t>
</list></t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>Hosts encountering invalid ICMPv6-SEC messages MUST:</t>

<t><list style="symbols">
  <t>Discard messages failing signature or validity checks.</t>
  <t>Ignore descriptors referencing unreachable or unverifiable certificates.</t>
  <t>Log or notify operators when encountering repeated failures.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t><list style="symbols">
  <t>A new ICMPv6 message type is required for ICMPv6-SEC.</t>
  <t>A new DNS RR type may be needed to host CBOR-encoded certificates.</t>
</list></t>

</section>
<section anchor="future-extensions-and-open-issues"><name>Future Extensions and Open Issues</name>

<section anchor="discovery-mechanism"><name>Discovery Mechanism</name>

<t>A host may benefit from querying a router for segment descriptors before sending data. Defining an ICMPv6-SEC echo-request/response mechanism would support proactive policy discovery.</t>

</section>
<section anchor="certificate-revocation-and-update"><name>Certificate Revocation and Update</name>

<t>Mechanisms for revalidating or revoking stale descriptors should be specified. These might include TTLs, revocation flags, or integration with DNSSEC freshness mechanisms.</t>

</section>
<section anchor="multi-segment-composition"><name>Multi-Segment Composition</name>

<t>Describing multiple consecutive segments in one message (via <spanx style="verb">scope: pathset</spanx>) could enable richer end-to-end context awareness.</t>

</section>
<section anchor="host-processing-behavior"><name>Host Processing Behavior</name>

<t>Clarifying host behavior when receiving conflicting or overlapping descriptors (e.g., caching, priority rules) will help ensure deterministic reactions.</t>

</section>
<section anchor="trust-bootstrap"><name>Trust Bootstrap</name>

<t>Mechanisms to securely distribute initial trust anchors for certificate validation remain an open area. DANE-based models or explicit OS provisioning could be defined.</t>

</section>
<section anchor="legacy-interoperability"><name>Legacy Interoperability</name>

<t>Backward-compatible signaling options (e.g., signed Redirects or DHCP hints) may help inform endpoints without ICMPv6-SEC support.</t>

</section>
<section anchor="routing-and-sdn-interfaces"><name>Routing and SDN Interfaces</name>

<t>Defining controller interfaces (e.g., YANG modules) for injecting or updating segment descriptors in routers may improve operational scalability.</t>

</section>
</section>
<section anchor="relevance-to-the-tiptop-working-group"><name>Relevance to the TIPTOP Working Group</name>

<t>The TIPTOP (Taking IP To Other Planets) Working Group at the IETF focuses on enabling IP networking to operate across interplanetary distances. This includes coping with extreme delay, high error rates, intermittent connectivity, and significant asymmetry in network paths. ICMPv6-SEC aligns directly with TIPTOP's goals by offering a cryptographically verifiable signaling mechanism capable of conveying segment characteristics crucial for deep-space communication scenarios.</t>

<t>ICMPv6-SEC contributes to TIPTOP by enabling:</t>

<t><list style="symbols">
  <t>Segment-based control-plane signaling that informs endpoints about high-delay links, expected RTT, admission control policies, and availability.</t>
  <t>Resilient and reusable communication of policy and operational constraints through static, long-lived, signed segment descriptors.</t>
  <t>Low-interaction overhead using unidirectional signaling that does not rely on full protocol negotiation.</t>
</list></t>

<t>This mechanism supports scenarios such as:</t>

<t><list style="symbols">
  <t>Signaling when a destination prefix lies beyond a deep-space relay.</t>
  <t>Informing mobile or orbital systems of local LAN constraints (e.g., power, duty-cycle, or congestion sensitivity).</t>
  <t>Notifying endpoints that specific packet markings or behaviors are required to gain access to scheduled or policy-restricted interplanetary links.</t>
</list></t>

<t>By supporting both "local" and "forward" segment scopes, and providing deterministic, verifiable metadata, ICMPv6-SEC integrates naturally into TIPTOP architectures.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

&RFC8724;
&RFC4443;
&RFC8152;
&RFC8949;
&RFC8610;


    </references>




  </back>

<!-- ##markdown-source:
H4sIAEH5gWgAA41a7XLbRpb9z6focn7EriFpW3Y8E6ZStTQlxaq1ZI0oZyq1
uzUBgSaJGEQjaIAys7WpfYh9iXmOeZN9kj3n3m4AlBTX5ocj4qNx+/a55557
uyeTyajJm8LOzNKmbW3NxeLyev/GXFrvk431Zu1qc2WbO1d/wiObnS0bs9gm
dZI2ts5/S5rclaPMpWWywyBZnaybSWULt5/k6a7av5l4m05evBjlVT0zTd36
5uTFi29fnIzSpJkZ32Qj3652ufcY5/ZQYYyLs9vz0ajKZyNj/GFX27Wfma8P
1n/NC65u7l1p6jxt+t+p21XJ8ELj0vhjlLTN1tUcmf9Nwv+NyUuMOJ+aa1re
XdU5zQv7OSkzW9+76+oNjL28NfOmSMom/7W13b1ktart/g9vw2Zrm1n3G6aY
k1XuTd1ak1lTJPRxk+Sb0tZJ3r+Y5s1hZhZYHFdOlv/8xx5P/PMf/W2XweBX
33zz6s3gWls2Nd46r5My7YeyuyQvZiaJs5vKqv1LvmsmSWfxdF2PRqWrd1jn
vaXBN+eLv/z55HX48/Xr16/i1ZffnMQ/v339bfzzzcsXs9EoL9f9IKPRZDKB
i+AFLNRodLvFzAGhVsBV1a5yHshLTGnvIh53ikfTACLjcHGyPFuM4S5PN2VY
Z8y13NuDSetD1bhNnVTbPE2K4mD2wOo6T1aFNZ0prjStz8uNWXxYnhm3+sWm
Db5aZmbx9sPNxJb0ZmZSWzd4F3C1fmput9ZUbU0LDazGN/n1pDBeY2PiK5vy
cRivQZN2weKbPPVjGJAWbcYPb/PN1tzc3o5pOIKNNo1N5Yo8PfASHZSXDd6h
Vfix5sDATtKIq+xnfKyRqahpMGoXAzdNSvomrfOVNTZvtgAw/omGmpU9OI6K
Swj8mpe2rjJP4Z27pM7ic8+Ac3mocGk/TQPn3cG5Wx3StXVqTY2VyOikxcBl
ZpccDC3YrWxGf2I4BLDFB1P82ueJOb1ahpU4WjizTfw2+nxn4ccy9zt63VVN
vst/w+tkJ3qRbsdPW+7z2pW00JvVAeAu3B0HppUtvOPWiD04LB2bgBp1Eb5a
K9dlXIZS4VHB0PwzTFDE7vIsKyzg+5W5QEi5rE2F/UbHGAWGwKOJWbdlltAU
uK03n98ARe3akv6RSTsOVsga27rG/SFE89JccPAAJ7jjnbuzwPMYy09IYYRH
YsSDQ9JPhnwHC+RTGIyfAKDspgaPMNIaK1OYYkLqxwJrVqaHsf5KnW/GXDHF
5KTD5D1fj+FgxjDcleZ8X9BX2ESiEgQvKwY/yOS8ZpqV3Sb73NXT+wyQB+di
EsNAVz4YThJfTRp8qq5z4YuwpIN4jhFAL8WAjBC+F5iKszBE/ArBq/FqGai4
zmzDgNyDPZNVXtCRgFjm7vwwjPFWRq8DVuMucndJ/YmW1PbXNq9tcB18kqSY
rFcv5w8iiJDZJ0We6SLStV8OqOSRQJpGmNKZX2QJEPREfHGPCcBcUzvlOjyM
EcFI0mxhyYZXB+RSuxY+Rtj6NkZi+Po0fOeIWeJXhHLy8hNHjit3TDpWcnIk
HYJITEbcaNyr4+xaMdkEoqYNeQB7s4Vxm23VNg+Yw5ZIFnwW85soKMb4Vusl
hwxIYyp8cGvrXV66wm0O9F7v6ZnMkMD1R/pqCGP6gZidSeIxHxS5S3yUBjBm
z0pZUHr2KZKqYa59Jq/hBbzmyjQHu73FotSHOMCNhe2e/DN4EZlZXnzH+RPR
7+FjaBz19V3OJYRgyCbAeWUQtMCI/ZyCXANV7UknjhmPRFJjaQz1AXG8BnVw
mlh5z2XbuVrmdpqv10tbQw7xLwK1yQHszPBizjBfINOaa8dcJ4v2V7fki8vF
OzhwKYTNSTb2c2PegVWw7gvIPEzP91ODKpGpnQfYBrXKyVVQjXwQ9E/oCFIb
J0/p7/STbb72Q2BzpPcCzG4cXcljEoGxitJHoAlOI7QxU5lMeOO0ww4t47oH
fD1CWfcoivYnnQkaaoq/INc5d+B/pMHwMN4l1yQUuxLjIrdv356apxfzq/kk
8WrIMwJLlOTH7iV6/qmdbhCZRA1UY910UkUjS17b2vSTb3eyakh/cHAAfBru
4KHr5FC4JIMN1L1HYovu+Pe/E/ovozueRlf3QfdMXvxQBSBK1Axk2vHd5bv5
5OSbN8MHhBDlqVsCvEl20D0fbxc67o+kWtJ61tYhdAKon9HXXz2ykphtDTHA
+H66OD19jwd///13k0IvjMLTg4e/N//JuiV1dP8TYb8n5rl5EvhW/l7BhFqT
c7hL0HrbPBnjXSXdmaGENlMPKWRevplOX52Mo7r/TlVDz85lWxQSW/I9jFE3
gPQaC9G8OsH4vD+W8immsAd3u6FfTF/ATy/xr8dY9PcwHc7MvzWwCxSOf/9j
MLRFMbM5iKh47MshO05CdsxQLhJ1g49/ZxSBT06Xi+vv5+evT57gB1kiYvTv
efb9i8/n5y9PXs3Pz1FOFfb7V08wuOTPybp2gKZY111rnF4Z/ddRhtRFaiRE
kLga9U129MvjFxGrgJVrAFlYloFLcXFCyD2400T43TdqTXbgh2AVkCQxfg25
5lJHQtqxPEv9aHQjydWby/lPEAR580jMa6x/rBwTveg9EAsKbnhsnW8AWVEQ
JepJVs5FjqGjYCFt4atgINRtxYGlC1Z8azO4VYVkDXM9H4N+BBvjI0hDkHwZ
x4dIFZG5AsMjhCxbDBJPL1+CqEddi2H57sPH96edzkp6H/QhKAVQF6wiKiuy
OgRMuo1pEmhneoIlVZEclBmHUsq8w1PM6qPRkcBCZcDpqHAcKC16dWXFf2dR
bWlYFpSF97XMzX0VFqmHa0/14F2xF/0QhIdUPoFVVd3e3Ajk6J4fB3Z8XN4i
ejz5pQkiNRG2ESd7ufiQZ+iSuwQajwUjjGJ2D1anRQJnZjpZcl1cTHXaO4Qo
V56qVNx1Y1Ob76VmxS0vFolffmRhfZAxxXudadOYDY6It/sebVvDI9sSn+Cz
l0kTsmfP88qRcWlJZFj4pAJIU3HjmioPFr8TmwKMCIgjhUYQBeWZ170FKtpR
+azNri2avDrWdfKdAz8oHkchF20QkcTogRkSTBiytRBAwTXznzTivC7Wjr4E
ZrA2GK8WR0bPDz5IH8zlkyqHYy1ACyrR98elKpjMfCrdXRkEdhCi/Ooi8dZL
pronhURTJhoA8yjMlRR8315I6o2VeSVHJeGgDMS6SdPNdrUB3NiI7GED5THh
MRA1YY3vVxBJqBfCiFBj7AQRO4HCzqTbgW+KACnpwjoPOUeiT9OGYXKQTJdk
oa8oeqarzIr8ky3yrXMZXf5IHScv9zynxVkoUkNlMeh6YH12LmMQxIKWM7K7
Sknzf//7f0KAZ7+0QAJJjDWhFBhWJO6YOg/mieVTWbgj5TlcNuHxuovGtmTW
VArHZNUC+lgXk7QS6y/pKfihPk1WuGVyrD1h9IWyOPfDQlgW41qV32+uJLnr
DH9t8SYSU2nHZoOIaMz7+RVV4eXtRxrIdRt0tbikqgi8Gh1dHsd7f/23+ZW0
n+CziS8c4ijJcgd1tRTfYzmypGrY0gHPRPePzRqrZFa8Jj1BLRRsJg0PZlAt
uqsaD+cNxVONsj4pfYCL1Aee6+5qlj0FU8lXoih3oeOt4RVV9w2p7T1uNkqW
ISnDZyF3HCfm0klpxO4FShLkCwOYBzg912h4Hvk4pp5B8vtTz2FdegSth0gj
1u8xoDma3Fr6BZWmBGFQFbWosmzBLgTlLLTERK6s28L8QOGmjf4jwcGGWl8e
P+ikscvlOlwR8gVcVGrTy4fq1mk+QqJLxO3TgSEDl9lgvYfpO+Q8emxC42V5
21Dirto6s1oRfXWU9y/zsls65H7dIfjjNq+wC3Izvjyp8pKT016kdPZuzhYf
Li/Prk7PTokvUE6LJWQi3qI0nXbeBJcu1TMxJ8sEUMNdh77iaHTOxQguJdmp
c5JGW8N9f2JsskOZ7NhDCpiLDmQDJ99JP7oFZpRVBk4BjWTUixkjGdkzyxgM
0q8bh15obHo9LLR8bDZxmTcKAzIi3INi0aV5pytM1/ce1B09NZy8OPlm9uLP
L1/OZs9f/+VZbFbf/xKblfwcGy3CvLXzwrm4Utg9pakgVj5J8gITJkXaFj2o
RHx4BgRUTzFh2AQKQ0Knlt0G6vXiY+TbxzpEqOULdv9yKZcftqb7JqqkLbC9
q+HpLjCjwOuiVnqKTUKcAyH/apktSvio8dqUIMVazCk7YtklZheS05hdqSJw
zD1rAnKILgokCY6QVVeJz/13ZJF17M0iKcA/R23W0m6KfJMTOhHHvO2OY/M7
6WKkbS3mxClSP7D5JeliIE0HOpo+Uk0+6DmHln/XxnwgRYOi6ZJgpwUv+ADm
14R4PuOiPgRv9CQ7wz+LkvzZrHNbZOLaUHfPwu7CkUqxfqhEvtR25ECxbP//
DAVMIr8OSwDq/s8oD11lHt194BeOmwGzwf6rtoVUqgLyK4dI7J7tos+TUQEi
BhYWgSm5ayeo1Y95TcpB+1m7ZTG5RrHNaA2KppM9wBqVSBm93UkfYIL5ToVt
aKFrHkIMEwSrlptPeKjrOQ+f6uWUaVoG4zRswVh6ga4SBrpllpOakCCZa5kg
t5fUB/6ovF9bm4lCUGFDbaQ9scX1879+vFgMBeNCN2hmImDyEsyqdr19e/N8
8fHtBQTc2eIKLinyVciTE3N+tni+XNyG0ZbctEOQbGZmHryWNyTTseSPMksk
MKU945nktHqmdrqmSZdSoXAhONzMXPNPD07U+XeejzjDArDmYWHubp93xevy
4MFV3OpmSc/MqPoz5LBP1lYTzGLPasY26VTjTyOebiDm6yiAIJ7j7pLuSh/V
f/6oYFWpHNqvYccUlNdvy2r9LBRx3VHETHtx0rZ5TjaKbOq7Uh8/i5AvZAjO
qV8v/uo4k6joRG7oGvDWhk/FXdyGIlk2JnhUwczLdItFuUxKxLR2gY86Bx5Z
qMiYshJ5UvsIKh0knnNWSoC3pFduAAQxeSYbfX0/QqOKYoRZvNZdCq0RH9u2
6erv09ynGi/xvAbqmaNcaNyg6NUurDRsNCaHGTjuImlh0VMVBmjLwQ760Y64
tMk32kJqWAVpMuJ4d8zmR1PqdSesJEg0kudX88fQ9Uf7/0RObBJKIPYemnbv
sbUSuilxC7pEzOs5AVbqX9jll7xz3or3zj5DVKn0JIA+VJjThfdtqLBPu0bX
ZdziZW0tH9DPSpbXev3XFg9qZR2qMqk0H5FdK7vm6jDZ8HmRDZCR6zxsCR1p
YwBPmqaIjeddE67fcb4TiMZ+WRX7ebF537Xqpg9k843du8HO8ccqY3d91M00
kLiNqb7c6Gbk3sk2p8bmcFp9uAS5aLPu3ALEWNP1AG9v3/uxjBS+vy6SjZZt
Kr2SnvdDtHXdpH7qXqck5DnpDi85quVcpcNp35bomkAsURGq4qNYvDCqUep2
MHzKBt/PoYUfUunPz3jWpshiaY/8xTMXlptpDkDLuo2UBCnOauOL9t3rtpm3
Xa5dFAnba7Hv1qdaCa2+DTDsRuEul7OAKBDoDNwf5EAgv3GsgA/SJ/fP4E4o
7a0tqsjdx9qOjKBnTcRsZci3zrF1nVRHuGCDNtDdgAPhRfgdNCvnwAJlhmLx
fpNQF7jmKSWij7RSsvxiHMyvziaa8nYI3kJKVvuZ+R6R9mFJjO9zxqz6JkCO
pxNKGwq093aTAPwiIoSxQh9p9BaigApEuuEwgivZ1wWuOhZWWjjdWNVcYsjp
u8U1SguA5pkwgPhTFQaxUOkuZyxgBnEcIlTtuwnKiHG3PL1SQ9dJStrpeCCc
HCmsRoXej7b9NL/6gf7RpV1L5PxiO4y0VYjYx+gn77qKqo929Kjt6wxmyr40
ERK/0QJNG2LM8rcX17cfrs3fnJ55+AEDVrovGe48vU3kzsU1C9MPckDpukhK
S88dvcaCmEPyZCBmkrY8HubKfpMeQ4RdUWl+uWCpjRWkeKeSsblBTkTS1Njc
GkheiRmhFQQqj2jALxAleh4mHM/hyHKOS4KjaURQuLKkc/dSG4nUYIFORONu
4g87KloR6XH/VmhjOkQAMLYBuLotBpW14q2vvdk41ESsAh030TWNfPGkWw/b
PhmkSaU5fR0Oyw0hcH+7Oa3blOGq56KgDX0FhA2PL1FyplgGEIk/PmEi2JSo
FzYIaz44WaEFbjg1p9Ec8DyRlRqYL8d8YgOzjyHtX0qPWhZJduKpXAeN4nHf
Be4OWsXWuq7TcOtSVajH33SHlq3hyMfxpOG+kD750DAuBg3OrsaLR84K1BQT
yuts/IWei0qqu0k+KHC6qlyLZhgyqAjveypzLOnZLSX9Mnly7zc2P1nsOx7A
0MMD2t3t8BFIyPfLiksofRPtwS8HHRLy8WON/IK7FuEAUDLEjRSfulnIpRRg
ulWuCtPVqIg4Fy1R6GGtF9/Pr46cGuitcnc8A5e1zWGSHtLCijgYHMDylG0a
kHIs5ErkqbQcOgSJu7rOlR4DifvQQuYx4WrnrxOdAPRG8pKe22K267YLHt0m
uUdAAlQ4/+0hOlyqYFbv8TwAcdWfCBjUdVUErmQ5lYfDND0eUkDsOQ2PzHYK
iihhiSC8Ie2eEKVJDYHAGkwkuhmN/g/SyT4IJy4AAA==

-->

</rfc>

