<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-04"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Alston Networks</organization>
      <address>
        <email>alston.networks@gmail.com</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
      <organization>Independent</organization>
      <address>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>

<t>Documents describing protocols that are only intended to be used within
"limited domains" often do not clearly define how the boundary of the limited
domain is implemented and enforced, or require that operators of these limited
domains perfectly filter at all of the boundary nodes of the domain to
protect the rest of the global Internet from these protocols and vice-versa.</t>
      <t>This document discusses some design principles and offers mechanisms to
allow protocols that are designed to operate in a limited domain "fail-closed"
rather than "fail-open", thereby making these protocols safer to deploy on the
Internet.</t>
      <t>These mechanism are not applicable to all protocols intended for use in a
limited domain, but if implemented on certain classes of protocols, they  can
significantly reduce the risks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides examples of
limited domains, as well as Examples of Limited Domain Solutions, including
Service Function Chaining (SFC <xref target="RFC7665"/> ), Segment Routing, "Creative uses
of IPv6 features" (including Extension headers, e.g., for in situ Operations,
Administration, and maintenance <xref target="RFC9378"/>).</t>
      <t>In order to provide context, this document will quote extensively from
<xref target="RFC8799"/>, but it is assumed that the reader will actually read <xref target="RFC8799"/>
in its entirety.</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>In addition, <xref target="RFC8799"/> Section 6, notes:</t>
      <ul empty="true">
        <li>
          <t>Today, where limited domains exist, they are essentially created by careful
configuration of boundary routers and firewalls. If a domain is characterized
by one or more address prefixes, address assignment to hosts must also be
carefully managed. This is an error-prone method, and a combination of
configuration errors and default routing can lead to unwanted traffic
escaping the domain. Our basic assumption is therefore that it should be
possible for domains to be created and managed automatically, with minimal
human configuration. We now discuss requirements for automating domain
creation and management.</t>
        </li>
      </ul>
      <t>This document discusses some of the mechanisms which protocol designers can
use to limit the scope of their protocols to a single link. If the protocol is
intended to be used in across multiple links, but should not be forwarded
beyond a single administrative domain, then the protocol designer should
consider making the protocol "fail-closed" rather than "fail-open", as
described below.</t>
      <t>This is primarily targeted towards protocols which are intended to primarily be
used within a single layer-2 broadcast domain, or for protocols which provide a
transport type service (similar to MPLS or SRv6) and are not intended to remain
within a single administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="some-types-of-limited-domain-protocols">
      <name>Some types of limited domain protocols</name>
      <t><xref target="RFC8799"/> Section 3 discusses some examples of Limited Domains, based mainly
on the network type (e.g. Home, Sensor Networks, Data Centers, etc).</t>
      <t>This section instead classifies the types of limited domain protocols based
more on their intended use, and technology.</t>
      <t>Broadly speaking, there are two types of limited domain protocols:</t>
      <ul spacing="normal">
        <li>
          <t>Layer-2 type limited domain protocols: These are protocols that are
intended to be used within a single LAN segment.</t>
        </li>
        <li>
          <t>Transport type service (for example MPLS and SRv6): These protocols are
intended to provide a transport service, and are intended to remain
within a single administrative domain such as a Enterprise or a Service
Provider network.</t>
        </li>
      </ul>
    </section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-closed".
Fail-closed protocols are those that require explicit interface or device-wide
configuration to enable them to be accepted or processed when received on an
interface.  A classic example of a fail-closed protocol is MPLS (<xref target="RFC3031"/>):
In order to allow MPLS to transit an interface, the operator must enable the
MPLS protocol on that interface and on the device itself.  This ensures that
outside MPLS traffic does not leak in.</t>
      <t>Fail-open protocols are those that require explicit configuration in order to
ensure that they do not leak out of a domain, for example, through the
application of filters.  An example of a fail-open protocol is SRv6 - in order
to ensure that SRv6 traffic does not leak out of a network, the operator must
explicitly filter this traffic, and, in order to ensure that SRv6 traffic does
not leak in, the operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently riskier than fail-closed protocols, as they
rely on perfect configuration of filters on all interfaces at the boundary of a
domain, and, if the filters are removed for any reason (for example, during
troubleshooting), there is a risk of inbound or outbound leaks.  In addition,
some devices or interfaces may have limitations in the size and complexity of
filters that can be applied, and so adding new filter entries to limit leaks of
a new protocol may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering.  In order for the protocol to be accepted and processed when
received on an interface, the operator must explicitly enable the protocol on
that interface and on the device itself.  In addition, there is less risk of
operational mistakes, as it does not rely on filters that may be limited in
number and complexity. Finally, fail-closed protocols do not require that
operators of networks outside of the limited domain implement filters to
protect their networks from the limited domain traffic.</t>
    </section>
    <section anchor="ip-hop-limit-limiting">
      <name>IP Hop-Limit Limiting</name>
      <t>Some limited domain protocols are intended to only be used within a single IP
subnet. In these cases, it may be possible to use the IP Hop-Limit to ensure
that the protocol does not leak out of the subnet.</t>
      <t>By specifying that the IP Hop-Limit of packets carrying the protocol be set to
a value of 1, it is possible to ensure that the protocol does not leak out of
the subnet. This is because routers will decrement the Hop-Limit of packets by
1 when forwarding them, and discard the packet when it reaches zero.</t>
      <t>The approach of setting the IP Hop-Limit to 1 ensures that the protocol does
leave the subnet. This is different from requiring the received IP Hop-Limit
has a value of 255, as used in <xref target="RFC3682"/>, which ensures that traffic cannot
be spoofed from outside the subnet.</t>
      <t>Which option to choose (if either) depends on the specific requirements of the
protocol.</t>
    </section>
    <section anchor="ipv4-multicast-addressing">
      <name>IPv4 Multicast Addressing</name>
      <t>Some protocols (e.g OSPF) use addresses from the IP Local Network Control
Block <xref target="RFC5771"/>, (224.0.0/24). In addition to providing a discovery
mechanism, this traffic is not forwarded off-link, providing a simple and
effective way to limit the scope of the protocol.</t>
      <t>In some (rare) cases, IPv4 "Link Local" addresses (<xref target="RFC3927"/> may be an
appropriate mechanism to limit the scope of the protocol, but this
such a niche case that it is not discussed further here.</t>
    </section>
    <section anchor="ipv6-link-local-addresses">
      <name>IPv6 Link Local Addresses</name>
      <t>Link-Local IPv6 Unicast Addresses (<xref target="RFC4291"/> Section 2.5.6) are used for
communication between nodes on a single link. They are not routable and are not
forwarded by routers. In cases where a limited-domain protocol is intended to
be used only within a single link, the use of IPv6 Link-Local addresses can be
an effective way to limit the scope of the protocol.</t>
    </section>
    <section anchor="making-a-layer-3-type-limited-domain-protocol-fail-closed">
      <name>Making a layer-3 type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
layer-2 protocol identifier, usually an EtherType. This mechanism is used by
MPLS.  In modern router and hosts, if such a protocol identifier is not enabled
on an interface, then the Ethernet chip-set will ignore the frame, and the node
will not see or process it. Thus, it is necessary to specifically enable the
layer-2 protocol identifier on all relevant interfaces inside the limited
domain, and the protocol will be blocked at the domain boundary where the
protocol has not been so enabled. This is a simple and effective mechanism to
ensure that the protocol does not leak out of the limited domain if and when an
operator makes a mistake in configuring filters based on identifiers appearing
deeper in the frame such as IP addresses or IP protocol or header options.</t>
      <t>This layer-2 protocol identifier technique only works for transport-type
limited domain protocols (i.e., protocols running at layer 3).  Higher layer
protocols cannot necessarily be protected in this way, and so cryptographically
enforced mechanisms may need to be used instead (e.g., as done used by ANIMA in
<xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
    </section>
    <section anchor="ethernet-protocol-identification">
      <name>Ethernet Protocol Identification</name>
      <t>Figure 1 shows the general format of Ethernet frames. The relevant protocol
identification field occurs after the destination and source MAC addresses and
any tags (such a VLAN tags). The alternatives for protocol identification are
discussed in Section 3 of <xref target="RFC9542"/>.</t>
      <figure anchor="fig1">
        <name>Ethernet Frame Format</name>
        <artwork><![CDATA[
+-----------+-----------+- - - - +----------+--------- - - -+-------+
|Destination|  Source   |Optional| Protocol |  Body of      |Trailer|
|MAC Address|MAC Address|  Tags  |Identifier|   Frame        |       |
+-----------+-----------+ - - - -+----------+--------- - - -+-------|
]]></artwork>
      </figure>
      <t>This document considers EtherType protocol identification. An EtherType is an
unsigned 16-bit field in an Ethernet frame with a value in the range of 0x0600
to 0xFFFF, and so it is a somewhat limited resource; however, there exists a
special Extended EtherType (0x88B7) that can be suffixed by an Organizationally
Unique Identifier (OUI) followed by a further 16-bits identifying the protocol
relative to that OUI as discussed in Section 3 of <xref target="RFC9542"/>. These alternatives
of a direct EtherType or use of the Extended EtherType for the case of the IANA
OUI are illustrated in Figure 2. The following subsections discuss the factors
which may influence the choice between these alternatives when use of such
layer 2 protocol identification, to make the isolation of a limited domain more
robust, is warranted.</t>
      <figure anchor="fig2">
        <name>EtherType Based Protocol Identification</name>
        <artwork><![CDATA[
  01234567 01234567
+--------+--------+
|    EtherType    |
+--------+--------+
Specific EtherType

  01234567 01234567 01234567 01234567 01234567 01234567 01234567
+--------+--------+--------+--------+--------+--------+--------+
|  0x88  |  0xB7  |  0x00  |  0x00  |  0x5E  | Protocol Number |
+--------+--------+--------+--------+--------+--------+--------+
Extended EtherType|         IANA OUI         |IANA Protocol Number
]]></artwork>
      </figure>
      <t>Because specific EtherTypes are a limited resource, an Extended EtherType
<bcp14>SHOULD</bcp14> be used unless there is a strong reason why it will not work
satisfactorily and a specific EtherType is required.</t>
      <section anchor="extended-ethertype-protocol-identification">
        <name>Extended EtherType Protocol Identification</name>
        <t>The main advantage of using an Extended EtherType with an IANA Protocol Number,
as shown in Figure 2, is that such a number can be allocated by IANA with
Expert Review based on an Internet Draft and is thus relatively easy to obtain.
The main disadvantage is that the protocol identification is 5 bytes longer
than a specific dedicated EtherType.</t>
      </section>
      <section anchor="specific-ethertype-protocol-identification">
        <name>Specific EtherType Protocol Identification</name>
        <t>The primary disadvantage of using a specific EtherType, as opposed to an
Extended EtherType, is that assignment of such an EtherType is significantly
more difficult than assignment of an Extended EtherType IANA protocol number.
As discussed in <xref target="RFC9542"/>, a specific EtherType can only be assigned by the
IEEE Registration Authority under the following policy: "Since EtherTypes are a
fairly scarce resource, the IEEE RAC has let us know that they will not assign
a new EtherType to a new IETF protocol specification until the IESG has
approved the protocol specification for publication as an RFC.  In exceptional
cases, the IEEE RA is willing to consider "early allocation" of an EtherType
for an IETF protocol that is still under development as long as the request
comes from and has been vetted by the IESG." (<xref target="RFC9542"/> Appendix B.1, citing
<xref target="IESG_EtherType"/>)</t>
        <t>During development and testing, a protocol can use a "Local Experimental
Ethertype" (0x88b5 and 0x88b6 - <xref target="IANA_EtherType"/>).  Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.
However, there is always a risk of some implementation using a Local
Experimental EtherType not getting updated causing conflicts with a later
different use of that experimental EtherType.</t>
        <t>The primary advantage of using a specific EtherType is the saving of 5 bytes
relative to the use of the Extended EtherType with a protocol number under the
IANA OUI.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Protocols are designated as "limited domain" because something unexpected might
happen if they leak outside of a domain with unified management. For example,
VLAN or VPN or overlay identifiers may be misinterpreted resulting in the
delivery of data to or the acceptance of data from unauthorized network nodes
violating intended security constraints. The use of a layer-2 protocol
identifier to provide a "fail closed" barrier at the domain border can
significantly improve security by eliminating the opportunity for such
misinterpretation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC3682">
          <front>
            <title>The Generalized TTL Security Mechanism (GTSM)</title>
            <author fullname="V. Gill" initials="V." surname="Gill"/>
            <author fullname="J. Heasley" initials="J." surname="Heasley"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <date month="February" year="2004"/>
            <abstract>
              <t>The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to protect a protocol stack from CPU-utilization based attacks has been proposed in many settings (see for example, RFC 2461). This document generalizes these techniques for use by other protocols such as BGP (RFC 1771), Multicast Source Discovery Protocol (MSDP), Bidirectional Forwarding Detection, and Label Distribution Protocol (LDP) (RFC 3036). While the Generalized TTL Security Mechanism (GTSM) is most effective in protecting directly connected protocol peers, it can also provide a lower level of protection to multi-hop sessions. GTSM is not directly applicable to protocols employing flooding mechanisms (e.g., multicast), and use of multi-hop GTSM should be considered on a case-by-case basis. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3682"/>
          <seriesInfo name="DOI" value="10.17487/RFC3682"/>
        </reference>
        <reference anchor="RFC3927">
          <front>
            <title>Dynamic Configuration of IPv4 Link-Local Addresses</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="E. Guttman" initials="E." surname="Guttman"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>To participate in wide-area IP networking, a host needs to be configured with IP addresses for its interfaces, either manually by the user or automatically from a source on the network such as a Dynamic Host Configuration Protocol (DHCP) server. Unfortunately, such address configuration information may not always be available. It is therefore beneficial for a host to be able to depend on a useful subset of IP networking functions even when no address configuration is available. This document describes how a host may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.</t>
              <t>IPv4 Link-Local addresses are not suitable for communication with devices not directly connected to the same physical (or logical) link, and are only used where stable, routable addresses are not available (such as on ad hoc or isolated networks). This document does not recommend that IPv4 Link-Local addresses and routable addresses be configured simultaneously on the same interface. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3927"/>
          <seriesInfo name="DOI" value="10.17487/RFC3927"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC5771">
          <front>
            <title>IANA Guidelines for IPv4 Multicast Address Assignments</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>This document provides guidance for the Internet Assigned Numbers Authority (IANA) in assigning IPv4 multicast addresses. It obsoletes RFC 3171 and RFC 3138 and updates RFC 2780. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="51"/>
          <seriesInfo name="RFC" value="5771"/>
          <seriesInfo name="DOI" value="10.17487/RFC5771"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May" day="01"/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 373?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much thanks to Deborah Brungard and Brian Carpenter, for their review and
comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've
had numerous discussions with many many people on this, and I'm sure that I've
forgotten some of them. Apologies if you were one of them.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01-02:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add Donald Eastlake as an author.</t>
            </li>
            <li>
              <t>Substantial re-write and expansion of material concerning specific and
Extended EtherType protocol identification.</t>
            </li>
            <li>
              <t>Add initial Security Considerations text.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>00-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deborah pointed out that "this only works for transport-type limited domain
protocols (e.g., SRv6)" could be read as SRv6 fails-closed.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51b63LbyJX+30/RS/+INEPSknxXkklkWZ5Rxbe1PDOVSqVS
INAkUQIBBhfRzNgPkLfYZ9m82H7fOd24UJQ9s57EJkGg+1y/c2tMJhNTp3Xm
Tu3oKpq7g/LQvkpXae0S+6JYRWlejUw0m5XuBndUuKOcZPr7JAm/J0WcRyss
kZTRvJ5srptVVKaTNK+j0kUTPrX70OTooYmj2i2KcntqqzoxVTNbpVWVFvmH
7RprXV58eGlMui5PbV02VX1ydPTs6MRwRVBymdeuzF09MpuivF6URbPuXbVn
uMv+jF/SfGG/568jc+22uDfByv6uyQuSa0xVR3nyjygrcmy7dZWpQH79j382
Re2qU5sXZp2e2r/VRTy2VVHWpZtX+LRd8cPfjYmaelmUp8baCf5vLdg7tT9P
7V9EDHJJxfNzVJYu718vykWUp/+KarB9ar8vikXmxvbVq3P51UFU2andyGN/
VqlOQfhwp7OpPcuqush7O53lSek2/evDnfQH+8bVFF/V3y2Sn7iN/PTnBS9P
42I13PU//57an7Z5fO162/7n32Ua9y8Pdz1Pq7jo7+Vu5NY/x/zh9h5XkGGZ
Vss86vN21ZSuWg5/+co+lTwyvfaP3MXTi6m9iKo6iwZMvSjyKEuGvwz3u8wT
t3b4K6/7uyYPHP7rbWbyolzhmRtHY3n/8vzpk2fPTk2az3euPzh6cBw+Pn56
Ej4+O3niPz48eRZuePTkSfj45PHjR2HlZ88edh/D1WcPnjwNHx89lHUvL66+
/8dFvXSluJ3Q7wGBP9mrGl66AmcW9tLepxbTGT7ESJnoxwRPnNqTo5MHk6NH
k6NjuVi5MnUVWdWbrP3ZzU7tH5Z1va5O79/fbDbT1NXzKZa5H82Kpr4vXl3d
x2OL+1Ugo7rvSERNIr4zZODszdldDOCnjmb73i3Sqi63X6d9Didwv57sKI+U
bMDXIlcqU+fc5OnRySRvVjNX3r4w/bisV9m93cuTY3A1mUxsNAOtUQx8elHE
jSxqE1fFZTojqK3LAoBUZJWtl1FtAYtQULaFIde0xMTWhZ0521T4uEnrZZqb
kcdgG4DbFnPcjK/AuNrGmYtKrJC4eZo7uyw2WNpZqCJPonKLm+W7X8ToIjat
bLpaZ6IbLA0ktY72HLtkDLHa0v2zSUGcUFmsXRnVRVn5xard5SqLO+YurkHH
PM2A05bMZVnYvaUmLyCMcNXTUgOpIRY8Llfh83W4Y5EVsyhrod/Oy2LlKegk
SeJv0thNbqCIaGrMhyXYS7z4bQJYaaoK21bFylEZ0DYeT/M4hQT0+WKOEFnZ
lYuXQIhqVZEqMABp7lGZrqHaUuE4aNBGdqgqO5oDQyZxVkCdI4PbYNNcJfyC
Z/PRmAyVbra1q0gC3y5/Er65FeAqK7b0aNxiglCEYT7REi800jai9TpL42iW
OT5OfXSrthYHrdPehAEzZGBsZ01t0/nAVrB9DE8mf3EWiWChrXZhYWdrbQyM
p5TSOSjIaRmlS5rYqY7T6rqaqses0iTJnDH3qOaywD2EZ2N++cVD7efPPR3y
6bjIY7cWI7nlHGNScpPSytzHaCUKLuY7fIHIqLIbB4Hg34vuvp0kyl4VWUNq
8ADMJWsS6MdcuZLmZl82uZBqz5e4l5o7uHp5boVuYjroPhzbK7cQM3wPbMQ9
Yzs6R5bDqEGpVwabXr67eWznuMh4N7IH7VYgDUpicmWXLkpgoWPrpovpWJQG
+qq0buxbsUCh0pwlK5BCCOKFsdg2OcEyEYSmxDGefP58CPlf5nD2RK3Ly43S
rd3Hmnrsu9EmhbQkuYJghaobR3eHR/ZV5U2mJsLAOPBson6jrk0mdClgZAOL
3MpF21vBEJ6AmtgUCFRvp0NTuHIq9AdjmjgyPWO+s2egerXC1ahcKLmpd1cY
b9Qap8Be3+6DWUATYrdYij4UExXgQwCUrV2mi6Vfy0sBBM5BfgvUB1gJSTA/
H/LHgg6NpaoYUi/TouqMR8RQFZMYrNOXAAAtuk2tABf+B7AsmhkIg3iQRTuq
EeutXJR7tnqE8wFx9hyKiXmBnM0gVA91+LYu8Ffl4qZMIVDsiNXIwriHWXzS
w75IcA3pQgWioyhJKooYbvIRK0iUApdeZK14aW1UXdjJUyDeFlw4sRngsoRW
3xQ1oGlL17L7NHyCbJ35g6rYe6SPJKkbwDFDH6JYz/jFOA/UWWbCAHyrItsS
n6iKsqHTY00kLLhUHcpiYCYXuERcvY4W8IdIlIxFlkjlIeSyLMoxVnLV2sUq
n3QQZNvAhkIF6EcYRoyu1C42aUVwRuaYcReVYBsfPSlUkfpfHHnTtD61b6Mx
LrikkjWQ39KfwDStrnbryjt0G1TDBt7GmLkS7gKPuLRq4iW+VxW4uHbCExbT
eL1CIUdrdx8ZT1KCOVBini4AWBIE4TPAcBjTAjTkdlg19ixEgcsDsygGYFxD
hNRHZEWglFhrUbpwqVAFJaYKa/vM5XEfED4USQTL2jCy7qiFgQFG4uMUVQ6m
W0uPCc6q7hi/zZuMmOCZFVCl3Hb1JZY/h+dssAi1R9TpUi1gCnNCmN2/HB15
xiDu6JirAvt74wTXMOSPjtHJX+lSU5FyUdVeGch0mSiSNqUyY/qQQ5dJByPB
WCdq0yuk4EWiMSGiNyMjDRzdYlIeVL7gXlGT1cIr9YRwTsMRxTf5JpKswNu6
uEUcrQPUqQym9m1DSKroDAwKa9lDMBoKmhch0wTCVsuiQd0mvK0L8M/shVYT
tKcZctCTBjhhnMVBwYKM4ErlI3+2RAS4GhZT7x1wOUVZAKPZBHDq4584Sbsk
2GmNWbYm/d3efOBriadPaXsp5maZwudaW/dZZVlJ7kQ4JgrRdjVqxPB8v0pa
9tPSgq4DEjOaen4t5scnemHP7CswmPHFJWQMm8pqJsPyfKUx3CuCoWUmGthE
SBUSM3PbQizIbzlE3TZzBAH5kIrAn1/ZQBVVynygy3u7mweps70zdY4q46sr
+qxDvh7UkNKfUvZeGESRFzgx04JcVD3pqRIIA30RdY/CEHvVWE/S0daVkxM7
K4soAUrXLecwG5rO7hYhv4oMRJVX66KEXlngVj6fPKig6yySZOz1u1dXXOjq
/c3jQ/VYn9P3qSydmOQuaXs1MmWGfV7kN4Q6SF4WfcHIKZhaSRVhrwGJbLdV
dvT6x6sPkLD8a9+8lc/vL/77x8v3Fy/4+eqHs1ev2g/G33H1w9sfX73oPnVP
nr99/frizQt9GFft4JIZvT7760jBafT23YfLt2/OXo1oosM0lGJQE6YgSkCm
oEDfDPDM8/N3//s/xw8RJ/4LgeLk+JiBQr88PX7yEF8QGXx6LPW3fmVEMBqt
xTmQ6xHLEKC0YoDhbpiKlw7S/OZvlMzfT+0fZvH6+OF3/gIZHlwMMhtcFJnd
vnLrYRXinkt7tmmlObi+I+khvWd/HXwPcu9d/MOfMrYVJsdP//SdoQldEcuk
jyMJxDDjaW3+jpx9FxPdnaUXQSii3/FLtjVa9LZJkDiOpHf2ByzEMiuv4C+h
NTq2L6I6sucsWaVqquPDgAyVp4apB8OYVLFIO3x1+VXelDAjoVvJSsvOLaWU
oF0h91rmRVYsWME8J0rAzpDhCNj5ol/NeVN8fVNkNd/YVx5zhPs777TaDvDJ
7E7vYm8g2AWQV2dvIKWFj2rf2A93AFYvmVPEIt8CWYGIXpdmZ+8WDm0Hh37h
cQt4/1+wsxWzWXhsZC8UJph1M55bX72bd7p/GUxK8PFlCC0s/VDQ6QWNQoaP
eGaYAkF4M6/V1oKIRNalEqx6cYo7DwLa1PQWHgoJmioqnw6FLlzIuxXzULgJ
L4mTrtcGXJhh8gZpofKUts/Srbymo5hNExadEptiJ8UYgQ/7xA7Ck94OUo92
l6llZS3Mxa2iC+a28z3kM+SKFRyI77Mb/vnz4emgyaAtNbmLhQs1n0rp2u6p
xU5b5Ei22zFj5NF2R3G/qC8XRXTNPUU+LEhdNgcr4vyACXZZ5DGDhJYZiKfH
V2tJ4bSgZnFkJXB2ZvHrVTXUSNrJwCgJbVdkGzq5sh9IUgmHbGJQMNVLJOEL
rbt9cy+UJFrXVlRZvkdXA+qpKbqpnbSEGbGZjjD5eb9IWhK95+zRmOlVir4h
LGHcLygOPu4L5ct7m5469trHrd36S3xBgWlOFNbuZFpdpyHH3GfemgJIilCy
PobYfdf7dn3olSH+JA0jb56VjYb1uAjSBF2rVDR5D0uQTEBfceNbVlEuLbMK
Sx8MbCNp2NVAclk0cBakKgXLlsMQaVgPCpPcMs2FAEIBtKmfKV+aT7/QNr5l
TkeqbFH2OVlFW5TnNz4QaQNS8zVECBS64oq9nhGKzMCTaNljqJix82Upilru
jWIgd5ugS+hH+z2hGhJKuV4kt7VWTYp8uRIqx6D727r0ICE9GWkzjIMfBlem
pINlmbZtpBJSu6X8B1XLDtKSpSHUmiHUfgX2OrPuELAPfubXg9+gfdJahPR7
vFGYIvSRo4ztTHaV1ObTukOAYPoDVVLwsy4jQZTWsdiOCUztyzTX2nyvg+0q
QDG6P3wK420bkLvY23hrxxUdmYMZU1p2K4WR0h3NO0kLLt8hy1xPJEPVPJWe
ZiQVvjNL3M1fpM64K+O6fMeTFNIEls4fcye2/jh4aOXbtkPYeKnUGgaktThq
2pZ7V33vw3DxVd0XOerWN+C2Wo37FQY7cNITxdeuZg5UlttbdfuM6WEt0zN7
E2WNqOh47CcCfQ52wuCXKTU9Stv+1sxJb7ZtwklzPnGxb2Dzkb2Uz7bmWBMf
39XwXKwUhFij4KISJY/ozSktM4qhG/svVxY6dyN+IQtEtokNwHkdJLKrmONB
6nGbYwNub5zdx2eScjop5kxjVfcI+7SA0t/QLCX3bRVw8uiReHJo+2iC9vjp
CQc22p4YUueDLzAaijBU6roo5gxBpCB438B8fpZlinXIQGNEICjnAPFMM+JD
q+ctqoBRbbt30HZTszRBON4Bbx7a12xSSaflTNujnRN2Xsea0L69evfyUFzE
N1Jdz88hp1dFDIzztSKbIgiamXmeFfG1ioanMyiag5OTh9Oj6dH9k4eH0z6G
dhWMdq5pMwXHRabt740HKU+Y0rR9NI6cJ2y3jQcLVYJdMvBxcyYXLGo20fbu
XqDtSQoUSsQ+KIE+hwFBRHqjV9hLOR/1xOJz9WcnT1Cne5xBCSBWjaqJk+1u
rvx1GrR1SMaNlmA2h1UolrUtXi+KbiI0b0oNw9pZuacT0Y7goHB4ieHViV6V
u37MBzbRssSzNv1h0vTR9LFOeMQJoAfDmWGThxx6BnNwcHN/RCHfbap+COMC
CVFwAYnIvdac6XQ7G05yRA9+GBHtTEf2DyeBnyFUaH9qt/sohkPJ08rDDLkn
m07DmmcZDgN+u0FBF6+1Oxv5jueDQffhFhPzfsH8Nm+3WsmM6tc8JmOBwo8+
aC6RhZL+2TgTWq6dxHh2i3V3OYYcdJwc9c47eQjtDDj1EIgIwJpP86IVFF6G
KaAoVAYtkol7I96zY7BizcwSsy+fU5gTcnh6JV6m6wmjo06RF7nOPZDrl9Eq
dI3Y5AJBRu7hBpVzvZIdAiFXTRVCau54maUEhBYQVSTRq5q/ILlQoyCxczdR
XvdT/DRvYX544KejtV1R6GVPhCjK3Lfun/Fp6x11gj7AW8YqTdsd4StItDfH
6qFiz4j7uLRbVP+KvGc3Z5zL8hLpAYBdJs40GCT4jJjRM5R7dIuQYGqzkpV+
K9nKD34ZphKH0FeG8kj03faoEJA6b8WO+N7l+KU/+eEDaxWamF/SqHQe6TEe
OzTPZa0SOm0T+rC5M3U9SKduOu5dKJtcDrjw5AE3tg8QDu0P6YKoLVdMd7Mm
Da1h6hAlTKM1/5DIuOGE1ld9cbld18WijNZLtV4TjqP1B2ZS4LndIZZ2cf2s
nycNOOwMM/uzN5evz1iRaD/62TM2/7lp+P5IT8Lc69w0tPnspRepBghUkjLw
RibHOYA2ixcuh51kVo+C0rTaZUTJlcSNzrmClEw6WBtm5DKYTxw3NJu5Nkzk
oFkdhrQqqQYysa/Pznsmw1yBtWodLaA6j1g/sYfLK4dKQUQzzaVHWg3GU3aH
EvZpu8jMM1Bt8x7c6fmhRw+ROE6NHK38dtL9GX62+t+3+37X38L3b2WlTy86
bj9Ze6W84vrbtValnzrV4PfnRSLtE/nz6UOJCOLKT7oSBeQTgsFnaz9QSPbT
ZestuGZfij/6P5/Cv19mz+7w8AX2PplfTu09QMaxHnH946g1Et35pVjP6PPu
BDlMSKvecdg79DZl26+7S6b/psn9OcXjx5NZWnsrS/M2SLZ2qsPyUDF4mAJa
LCQpOPp49PjoiC3Co48v8ad1W3/OS5LOTf9cEqQt6vs9D6S6GwZobTrI2Qs8
YvzhGT3ixpSnI/7g6OPTp8+fHA76RFUz5+EIcWpceds7yi148aMiXqdYe/D2
x8tD2Dpbzv65NtNUgVRBiLfqWLb4dKAgZ3RABhYbHmPadY2/ec/4+zQMYHou
Z7SniyInrnuc+qOXPiLtEUXoMEn+7G/j+Wgj5LDDkGWNDD+UIg9RJ+r0yjt5
Q5Xmx14tCxqJopi9FaM1IPE1zecwgdwf1EQRxzZSyI3rW4xpwPRMEHs017B7
IlPszySGbJDrp1WRtV3TW+dnOWIzZTFreFxHIkZZynETjz3WHh2fPHj46PGT
9sPQabsPpnXtTri3nXzn/qtQoLbP3Lnvb/pw16a/6UPgiM7iPzx/4j8cHe1+
eHTBDy1+vtH+3J3s/3ZKbhtvAFI97C8O1GKsXNmhJqDkyQAlRVPPJbu6IzAT
N5/7VlB1S2PaiItuIdNYQPAW0caP10N60eTSI+310OFtBU8Pag9+s9y250KZ
9TDZMhXoqtS1UilJkv7htgFK+9YHLfrevX0IcGc2QgcXL4kSphaRQnVTSZ62
jzWP8bndJ/yxac839GBk3J6jDdW82k3o3QNe4nBcTlblFubiI3Ld2r53N6nb
dJlx1B11tfIOl54X5QYNBZGFY5uQrFQzxayWgystp0Cujtl0XydtJ5nBPY9A
Ww0ryKA0jrk43ukpAxJKlYWuahRV3Pb9L6tCTwxthzR2CtmjfklWi/Vail5W
vLm5rbROA72zgEUoTHdC/uC8vR5QYO8wjXl8TzkfLLLfTESRrURV41NzthP7
epngeL9100hC01v3VUNh8Xd5cXER3uxRVZ3Jmz0cFKFS9OlvF7/WRZbGW77t
mDI07Xq3mUcpX4Jh4zZ2PR+XeCl7IQtkoZnB+GBt17m8JxMmsK37Kp1+sNSx
IkfseImvN3ayactt4aCBTWR+x6vvuZu20W7cTqk8fEyS8WbWznIjObgJ4Wp3
wn3kMEmyHOP7eT2mJCqmen6WPddwpG6kLwV5ByVIBn23QKfDxB2OtEUHS6op
EdVEgvwtK9Z6/EodyU9CBb2QtLOTFlqs0j+JKq3mb1xdt0oXsUxHvj+npmPP
1mwJpx/t8+nx2MY6Wfnll+H7bSjRjHmhBfeAGjlmU+l7Fb0uDS1Pur92pN0w
QaSUz0CKsiwL4JFmmrNHspB85Egcuw9eTmOBaO3bkBL1T1W2+t1R4rgzA9Li
xTT0164hDVVOzQ/DPJmhJkOF3J/aSmu3nW15o/PwInyaPp+9rWjZCz+baNaJ
wB3jpZzmLZDwpXFdhRJAjuebbubQJqiRTCT3rD8dIuCvhD9//NdW0Q1vwb0e
qndyb/eVFNmTvQNYHYqYkH2wnckDbOHlhHPvLJE//9gd7+ne8dIzxtXue0aj
dvZEnbA1C8HmlI50OFbpYskZDG3bz/O3bf8pzC3bA+LCQJPr+aHeeWKWhe14
30hBjws/vZN/OGzImK732k2+fb9Kq/7ZSIAhByegUMs6k7gslTdbQETCU3IM
tQq4OrmWN4XCj2KmTa4vXvL8ensGTxrl5iaVDF6W97ppX/8gHAHf8YPvg3hN
RrfaV6bfvuofDpNjUzacA56hAEj17cJBc1Gm8bffOIOv0D07ggBEjprMo3ZO
xwBc1hA/fqYXSw3TF6GW1zKVoCHtWs2wYtdept4ZxaFjx47ALIqvuchZzNiT
uUSO11VIetVgXfLHkbzAynT2NaM7A/a19MJfOLAYLe3zsskXHE0Sr56XKfDk
PCrXcshxHGrFlG9vSubFxhBnHNwHVJzxnYHVcGVCzpb9Moed1RI3Syh84/Rs
RxfydZhVrNP49/bydzcO5p3Q11xZNG1qIPWlnrtnR0r+WrtCjiJp109bB5e/
W9muXyvLgfpFUdcu75+WX00RIHiGkuc/4EjbogFpcu6yu0UONi/Zq8CN++X5
DUqvyZG8Of0Nm0G7b4f7oKtGPpW7rlAxwxP4WgjkOdnAfnwD+uM60nfyQMCK
YMlb5J3EUpqkLdRR/vtLozu7OC2Bciwb696BVpav6BHQwNnR5OhYOQt2si5S
fVVTZnGQ8Ei098Vu8E7tLYQPx6rTsZ7tHIFZfUVD392L/GEyemrlhzhT838l
jSgeo0IAAA==

-->

</rfc>
