<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-intarea-vulnerabilities-forged-icmp-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Cross-Layer Problem Statement">Problem Statement for Cross-Layer Vulnerabilities due to Forged ICMP Errors</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-intarea-vulnerabilities-forged-icmp-00"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Feng" fullname="Xuewei Feng">
      <organization>Tsinghua University</organization>
      <address>
        <email>fengxw06@126.com</email>
      </address>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhaoxi Li">
      <organization>Tsinghua University</organization>
      <address>
        <email>li-zx24@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="June" day="30"/>
    <area>Internet Area</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>cross-layer</keyword>
    <keyword>TCP/IP</keyword>
    <keyword>vulnerabilities</keyword>
    <keyword>ICMP</keyword>
    <keyword>security</keyword>
    <abstract>
      <?line 144?>

<t>ICMP error messages are vital for network reliability, providing feedback on issues such as unreachable hosts or fragmentation requirements. They help devices adapt dynamically, support troubleshooting, and enable essential functions like Path MTU Discovery. However, off-path attackers on the Internet may forge ICMP error messages to bypass legitimate validation mechanisms, causing the victim's TCP/IP stack to misinterpret network conditions and exposing critical vulnerabilities. This document analyzes how such forged ICMP errors can be exploited by off-path attackers to induce cross-layer interactions within the victim's TCP/IP stack, leading to four classes of vulnerabilities: information leakage, desynchronization of shared variables, semantic gaps, and identity deception. These ICMP-based attacks allow off-path attackers to manipulate network traffic, disrupt communication flows, and compromise both infrastructure and user privacy, without being on the direct communication path. The document concludes with proposed countermeasures and recommendations for protocol evolution.</t>
    </abstract>
  </front>
  <middle>
    <?line 148?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>ICMP error messages are a fundamental part of the Internet control architecture<xref target="RFC792"/>. They serve as feedback mechanisms that inform endpoints and intermediate devices about various network issues, such as unreachable destinations, routing failures, and packet fragmentation requirements<xref target="RFC1122"/>. By enabling dynamic adjustments in response to network conditions, ICMP error messages help maintain the reliability, efficiency, and robustness of end-to-end communication. Without this feedback channel, many essential protocols and diagnostic tools, including Path MTU Discovery and traceroute, would be significantly impaired.</t>
      <t>ICMP error messages pose inherent challenges in validation. This issue is especially pronounced when the ICMP error includes a payload from a stateless protocol, such as UDP and ICMP. In such cases, the receiving host often lacks sufficient context to determine whether the error message corresponds to a legitimate packet it previously sent. Since UDP does not maintain per-flow state at the transport layer, the absence of session semantics makes it difficult to verify the authenticity and relevance of the ICMP error, thereby opening a door to potential abuse.</t>
      <t>The difficulty in validating ICMP errors creates a powerful attack vector for off-path adversaries. By forging ICMP error messages that appear to target legitimate traffic, attackers can deceive the recipient into misinterpreting the network state. These forged messages can trigger complex cross-layer interactions within the TCP/IP stack-especially when they reference stateless protocols-causing the system to react in unintended ways. Such manipulation can lead to serious vulnerabilities, including information leakage, denial of service, or misrouting of traffic. Crucially, these attacks do not require the adversary to intercept or observe the actual traffic, enabling stealthy exploitation of protocol semantics from remote positions on the Internet.</t>
      <t>These ICMP-based attacks enable multiple exploitation scenarios:</t>
      <ol spacing="normal" type="1"><li>
          <t>Information leakage, where attackers observe system responses to ICMP error messages to infer internal state such as TCP sequence numbers or IP Identification (IPID) values;</t>
        </li>
        <li>
          <t>Ambiguity on shared variables, where ICMP messages create inconsistencies in shared variables like MTU between layers, causing fragmentation errors or dropped packets;</t>
        </li>
        <li>
          <t>Semantic gaps in legitimacy checking, where stateless protocols accept ICMP control messages without sufficient validation mechanisms to verify the legitimacy of diverse protocol data;</t>
        </li>
        <li>
          <t>Identity deception due to lack of data source verification, where ICMP packets impersonate legitimate network devices without proper authentication, tricking targets into accepting malicious routing or control information.</t>
        </li>
      </ol>
      <t>The effectiveness of these attacks stems from the implicit trust protocols place in cross-layer communications and the difficulty of validating control message authenticity across protocol boundaries<xref target="ACM2025TCPIP"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>This document focuses on vulnerabilities that can be exploited by off-path attackers-adversaries who are not positioned on the direct communication path between a client and a server. Unlike on-path attackers who can intercept, modify, or drop packets in transit, off-path attackers operate from external network locations and lack the ability to directly eavesdrop on or manipulate legitimate traffic flows. However, they retain the capability to inject spoofed packets into the network, making them a significant threat to protocol security.</t>
      <t>The off-path threat model represents a realistic and prevalent attack scenario in modern networks. Off-path attackers can operate from anywhere on the Internet, including compromised hosts, botnets, or even legitimate network positions that are simply not on the target communication path. This positioning makes detection more challenging and expands the potential attack surface significantly compared to on-path attacks, which require the attacker to be strategically positioned between communicating endpoints.</t>
      <figure>
        <name>Off-Path Attack Model</name>
        <artwork><![CDATA[
      Off-Path Threat model:

      +---------+        +-------------+        +---------+
      | Server  |--------+  Internet   +--------+ Client  |
      +---------+        +------+------+        +---------+
                                |
                                | Spoofed ICMP
                                |
                           +----+----+
                           |Off-Path |
                           |Attacker |
                           +---------+
]]></artwork>
      </figure>
      <t>In this threat model, the attacker leverages the ability to send spoofed IP packets-particularly ICMP messages-to trigger cross-layer vulnerabilities within the target's network stack. By forging source IP addresses, the attacker can impersonate trusted entities such as routers, servers, or network infrastructure components. These spoofed packets appear legitimate at the network layer and can successfully traverse network paths to reach their intended targets.</t>
      <t>The fundamental assumption underlying many protocol designs is that packets arriving from the network layer carry implicit trust regarding their origin and legitimacy. However, protocol implementations <bcp14>SHOULD NOT</bcp14> blindly trust such packets. This assumption becomes a critical vulnerability in the off-path attack model, where malicious packets can be crafted to exploit cross-layer interactions without requiring the attacker to compromise the direct communication path<xref target="RFC5927"/>. The resulting attacks can violate protocol semantics, disrupt ongoing communications, or manipulate system behavior while remaining difficult to detect and attribute.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Four types of vulnerabilities-Information Leakage, Ambiguity or Desynchronization on shared variables, Semantic Gaps, and Identity Deception-can emerge from cross-layer interactions within the TCP/IP protocol suite. These vulnerabilities stem from fundamental flaws in architectural assumptions, shared state management, and the lack of guarantees for cross-layer validation.Protocol designers <bcp14>SHOULD</bcp14> carefully evaluate cross-layer interactions to minimize such risks.</t>
      <section anchor="information-leakage">
        <name>Information Leakage</name>
        <t>This vulnerability arises when observable fields in one protocol layer expose information that is semantically or cryptographically bound to another layer. Specifically, when a protocol assigns values to a field based on internal or high-layer state-such as counters or identifiers-that field may serve as an unintentional side channel. If this field is externally observable, an entity without access to internal state can correlate changes in its value to infer sensitive information, undermining the isolation between protocol layers.</t>
        <t>The underlying cause of this vulnerability lies in the lack of entropy separation across protocol layers. When the state generation logic of a lower-layer protocol is influenced by, or derived from, upper-layer state-either directly or indirectly-observable behavior at the lower layer may unintentionally reveal sensitive upper-layer information. This creates a channel through which confidential state can be inferred by external observers. Furthermore, if protocol behavior permits external stimuli (such as control-plane messages) to affect the internal assignment policies of protocol fields, the risk of information leakage is significantly amplified. Fields originally designed for operational purposes at the network layer may, under such conditions, become conduits for exposing transport-layer state, thereby undermining confidentiality and weakening protocol-layer security guarantees such as sequence number randomization<xref target="RFC4086"/>.</t>
        <t>A notable instance of this phenomenon is the coupling between the IP Identification (IPID) field and the TCP sequence number space. Although the IPID field was originally introduced to support IP-layer fragmentation and reassembly, certain implementations assign its value in ways that are indirectly influenced by active TCP session states. In some systems, off-path attackers can manipulate this assignment logic-e.g., by sending crafted ICMP errors-to trigger changes in the IPID generation behavior. By observing variations in IPID values, attackers can infer whether their injected TCP packets contain correct or incorrect sequence numbers, thereby learning the valid sequence number and enabling off-path TCP session hijacking <xref target="CCS2020IPID"/>.</t>
        <figure>
          <name>IPID-Based Connection Inference Attack</name>
          <artwork><![CDATA[
    Attacker                Victim Server              Victim Client
    --------                -------------              -------------
       |                         |                         |
       |---(1) ICMP "Frag.------>|  (Action: Clear DF      |
       |      Needed"            |   Flag, Use Hash-based  |
       |      (src=attacker)     |   IPID)                 |
       |                         |                         |
       |---(2) Probe Request---->|                         |
       |<--(3) Probe Reply-------|                         |
       |      (IPID=x)           |                         |
       |                         |                         |
       |                         |<--------(4) SYN---------|
       |                         |                         |
       |                         |---(5) SYN/ACK---------->|
       |                         |      (IPID=x+1)         |
       |                         |   (Shared IPID          |
       |                         |    increments)          |
       |                         |                         |
       |---(6) Probe Request---->|                         |
       |<--(7) Probe Reply-------|                         |
       |      (IPID=x+2)         |                         |
       | (Attacker observes      |                         |
       |  IPID jump)             |                         |
]]></artwork>
        </figure>
      </section>
      <section anchor="ambiguity-on-shared-variables">
        <name>Ambiguity on Shared Variables</name>
        <t>Protocols within the same stack frequently operate on shared global variables, such as metrics related to path properties, endpoint capabilities, or buffer dimensions. When these variables are updated asynchronously or within layer-specific contexts, state inconsistencies may arise. These shared variables are often used by multiple layers to make decisions, leading to potential conflicts or discrepancies if updates are not properly synchronized. State desynchronization occurs when one layer updates a shared variable in response to a specific event, while other dependent layers are either unaware of the update or unable to reflect the change immediately.</t>
        <t>This type of vulnerability is characterized by temporal or contextual divergence in the interpretation of shared data. Such divergence can occur when network or transport layers rely on outdated or inconsistent information due to the asynchronous nature of updates across layers. For instance, a network-layer parameter such as Maximum Transmission Unit (MTU), which is updated in response to a control-plane input or a network change, may not immediately be propagated to the transport layer. As a result, the transport layer may continue to operate under the assumption of an outdated MTU, which can lead to improper handling of data fragments or errors in packet transmission.</t>
        <t>A concrete example of this vulnerability can be seen in the interaction between the TCP and IP layers concerning Path MTU Discovery (PMTUD). When an attacker sends a forged ICMP fragmentation-needed packet to manipulate the Path MTU (PMTU), the newly updated PMTU may not be immediately propagated to the transport layer, which continues to operate under the assumption of the previous, higher MTU value. This desynchronization can cause TCP to generate packets that exceed the updated MTU, resulting in unintended fragmentation at points where fragmentation is prohibited, or packet drops in environments where fragmentation is not supported.</t>
        <t>Such cross-layer inconsistencies disrupt data transmission, violate TCP's non-fragmentation assumptions, and introduce operational errors including communication delays and packet loss. Implementations <bcp14>SHOULD</bcp14> ensure that updates to shared variables are properly synchronized across protocol layers. More critically, this vulnerability enables attackers to exploit IP fragmentation mechanisms to inject malicious packets and potentially hijack TCP connections <xref target="NDSS2022MTU"/>. The lack of proper synchronization between layers in handling shared path properties like MTU creates significant security vulnerabilities within the protocol stack, exposing systems to both denial-of-service and session hijacking attacks.</t>
        <figure>
          <name>IP Fragment Injection Attack</name>
          <artwork><![CDATA[
   Attacker                Victim Server              Victim Client
   --------                -------------              -------------
      |                         |                         |
      |---(1) Infer TCP-------->|                         |
      |      Connection         |                         |
      |                         |                         |
      |---(2) Trigger IP------->|                         |
      |      Fragmentation      |                         |
      |                         |                         |
      |-----------(3) Forge & Inject IP Fragment--------->|
      |                         |                         |
      |                         |<--(4) Legitimate--------|
      |                         |      IP Fragments       |
      |                         |                         |
      |                         |   (5) Mis-reassemble    |
      |                         |       Packet            |
      |                         |   (Forged + Legitimate) |
      |                         |                         |
]]></artwork>
        </figure>
      </section>
      <section anchor="semantic-gaps-to-check-the-legitimacy-of-diverse-protocol-data">
        <name>Semantic Gaps to Check the Legitimacy of Diverse Protocol Data</name>
        <t>Protocols often depend on implicit assumptions about the structure and statefulness of adjacent protocol layers. When a protocol receives cross-layer input containing data attributed to another protocol, it may attempt validation based on limited semantic knowledge or incomplete contextual information. If the incoming data originates from a stateless or loosely specified layer, or lacks integrity guarantees, the receiving protocol faces significant challenges in determining data legitimacy. This fundamental limitation creates vulnerabilities when protocol validation processes prove inadequate for ensuring the authenticity and integrity of cross-layer communications.</t>
        <t>This semantic validation gap becomes particularly exploitable when protocols rely on partial data representations, such as fixed-length headers or truncated payloads, for legitimacy assessment. Protocols often implement basic checksums or header-based validation mechanisms without considering the full operational context or semantic meaning of the data. This creates opportunities for attackers to craft malicious packets that conform syntactically to expected formats while semantically violating intended operational contexts. Such carefully crafted malformed packets can trigger unintended state transitions, erroneous control decisions, or inconsistent processing behaviors that diverge from correct protocol logic.</t>
        <t>A concrete illustration of this vulnerability emerges in the handling of forged ICMP redirect messages targeting stateless protocols such as UDP. ICMP redirect messages are legitimate network control packets used by routers to inform hosts about more optimal routing paths. However, stateless protocols like UDP cannot maintain session state or establish trust relationships for their connections, making direct validation of ICMP control messages impossible. Attackers exploit this validation gap by crafting and injecting malicious ICMP redirect messages with spoofed source addresses, deceiving target hosts into redirecting their traffic through attacker-controlled gateways <xref target="USENIXSECURITY2023ICMP"/>. This enables sophisticated man-in-the-middle attacks where adversaries can intercept, modify, or redirect network traffic without being positioned on the original communication path. The fundamental vulnerability stems from the absence of stateful correlation mechanisms and authenticity validation across protocol layer boundaries, allowing forged control messages to manipulate legitimate network behavior.</t>
        <figure>
          <name>ICMP Redirect Traffic Hijacking Attack</name>
          <artwork><![CDATA[
    Attacker      Neighbor Host      Victim           Destination
    --------      -------------      ------           -----------
       |                |               |                  |
       |--(1) Detects-->|               |                  |
       |    Neighbor    |               |                  |
       |    Host        |               |                  |
       |                |               |                  |
       |-------(2) Forge UDP Datagrams-------------------->|
       |                |               |                  |
       |                |               |---(3) Establish->|
       |                |               |   UDP Socket     |
       |                |               |                  |
       |-------(4) Forge ICMP Redirect-------------------->|
       |                |               |                  |
       |                |        (5) Check Passed          |
       |                |               |                  |
       |                |<-----(6) Redirected Traffic------|
       |                |               |                  |
       |                |--(7) Discard--|                  |
       |                |    Traffic X  |                  |
       |                |               |                  |
       |                |               |      (8)   No Response
       |                |               |            Received
]]></artwork>
        </figure>
      </section>
      <section anchor="identity-deception-due-to-lack-of-data-source-verification">
        <name>Identity Deception Due to Lack of Data Source Verification</name>
        <t>Cross-layer interactions often rely on implicit trust assumptions regarding the provenance and authenticity of received data, particularly when control messages or routing information traverses protocol layer boundaries. Protocol implementations typically operate under the assumption that data originating from lower layers-including control messages, routing updates, and error notifications-carries inherent legitimacy, provided it conforms to expected syntactic formats and protocol specifications. However, this fundamental trust assumption creates a critical vulnerability when protocols accept cross-layer input without implementing robust mechanisms to verify the authentic origin or validate the association with established communication contexts. Under such circumstances, protocols become susceptible to identity deception attacks, where malicious entities can successfully impersonate legitimate network components or communication peers.</t>
        <t>This vulnerability emerges from the systematic absence of cryptographic authentication frameworks and contextual validation mechanisms that would otherwise establish secure bindings between data sources and trusted communication relationships. The lack of comprehensive identity verification enables malicious actors to exploit these authentication gaps by injecting carefully crafted ICMP packets and other spoofed control messages into legitimate communication flows, effectively masquerading as authoritative network infrastructure components such as routers, gateways, or access points. The severity of this vulnerability is further amplified when underlying network infrastructure-including forwarding engines, hardware accelerators, and intermediate processing nodes-fails to enforce stringent access control policies or implement comprehensive provenance verification before relaying control messages to higher protocol layers. Consequently, maliciously crafted ICMP packets can propagate through the network stack unchecked, systematically undermining the integrity and trustworthiness of the entire communication system.</t>
        <t>The propagation of these unverified ICMP control messages can trigger cascading security failures, including unauthorized reconfiguration of forwarding behaviors, systematic disruption of established communication flows, illegitimate privilege escalation within protocol stacks, and ultimately comprehensive compromise of network reliability and security. These attacks leverage the inherent trust protocols place in ICMP control messages, exploiting the fundamental assumption that such messages originate from legitimate network infrastructure.</t>
        <t>A concrete manifestation of this vulnerability can be observed in sophisticated attacks against Wi-Fi networks, where adversaries deploy malicious terminals to impersonate legitimate Access Points (APs) while simultaneously injecting forged ICMP redirect messages. In this attack scenario, the malicious entity exploits the implicit trust that Wi-Fi-enabled devices place in both wireless control frames and ICMP network control messages. By strategically crafting and transmitting spoofed ICMP redirect packets alongside fraudulent wireless association messages, attackers can systematically deceive target devices into redirecting their network traffic through attacker-controlled infrastructure. This multi-vector approach enables sophisticated man-in-the-middle attacks that combine wireless protocol exploitation with ICMP-based traffic manipulation, allowing adversaries to intercept, modify, or redirect victim communications while maintaining the appearance of legitimate network operation <xref target="SP2023MITM"/>. The effectiveness of these attacks stems from the fundamental vulnerability in cross-layer trust assumptions and the absence of robust authentication mechanisms for verifying the identity of ICMP message sources.</t>
        <figure>
          <name>Wireless Network Routing Cache Poisoning</name>
          <artwork><![CDATA[
    Attacker      Victim Supplicant       AP           Server
    --------      -----------------       --           ------
       |                 |                |              |
       |                 |                |              |
       |-(1.1) Ping----->|                |              |
       |  (src=Server)   |                |              |
       |                 |-(1.2) Ping---->|------------->|
       |                 |    Reply       |              |
       |                 | (Action: Create|              |
       |                 |  Routing Cache)|              |
       |                 |                |              |
       |-(1.3) UDP Port->|                |              |
       |    Probe        |                |              |
       |<-(1.4) ICMP-----|                |              |
       |    Port         |                |              |
       |    Unreachable  |                |              |
       | (Attacker finds |                |              |
       |  open port)     |                |              |
       |                 |                |              |
       |                 |                |              |
       |-(2.1) ICMP----->|                |              |
       |    Redirect     |                |              |
       | (src=AP, with   |                |              |
       |  forged UDP for |                |              |
       |  check evasion) |                |              |
       |                 |                |              |
       |         (2.2) Action: Routing Cache is Poisoned,|
       |               Attacker becomes the next-hop.    |
       |                 |                |              |
       |                 |                |              |
       |<-(3.1) Redirect-|                |              |
       |    Traffic      |                |              |
       | ("I like you,   |                |              |
       |  server Bob!")  |                |              |
       |                 |                |              |
       |-(3.2) Falsified>|------------------------------>|
       |    Traffic      |                |              |
       | ("I hate you,   |                |              |
       |  server Bob!")  |                |              |
       |                 |                |              |
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="mitigation-directions">
      <name>Mitigation Directions</name>
      <t>The vulnerabilities arising from cross-layer interactions can be mitigated according to the following directions:</t>
      <t>First, enhancing data provenance validation across protocol layers is crucial. By introducing robust mechanisms to authenticate the source of control messages and routing information, implementations <bcp14>SHOULD</bcp14> prevent unauthorized entities from injecting malicious data into the network. This may involve integrating cryptographic signatures or contextual authentication protocols that verify the identity of the sender and the legitimacy of the message. For example, each control message can be signed with a cryptographic key, and the recipient protocol layer would validate the signature before processing the message. This ensures that the data originates from a trusted source and has not been tampered with in transit.</t>
      <t>Second, enforcing stronger access control and provenance checks at lower protocol layers is essential. The underlying infrastructure, such as routers, access points, and hardware accelerators, should be designed to perform rigorous checks on all control messages before passing them to higher layers. This includes verifying the authenticity of the source and ensuring that the message belongs to a valid communication context. By placing these checks at the network layer or physical layer, we can prevent malicious control messages from propagating up to higher layers, where they could potentially cause misconfigurations or elevate an attacker's privileges.</t>
      <t>Finally, introducing more granular trust models for cross-layer communications can reduce reliance on implicit trust. Instead of assuming that data from lower layers is always trustworthy, protocols can establish explicit trust relationships that govern interactions between layers. This could involve using a combination of contextual information, such as previous successful communication sessions, coupled with cryptographic mechanisms that ensure data integrity. For instance, transport layer protocols could require secure key exchange with the network layer before accepting control messages. This approach ensures that only trusted entities can send sensitive control information and prevents malicious actors from exploiting the cross-layer trust assumptions.</t>
      <t>These directions provide a framework for securing cross-layer interactions by ensuring that data flows between layers are properly validated and authenticated, reducing the risk of identity deception and unauthorized control. By implementing these strategies, we can significantly enhance the overall security of protocol stacks and protect against attacks that exploit cross-layer vulnerabilities.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document identifies security vulnerabilities in cross-layer interactions within the TCP/IP protocol suite. The vulnerabilities described-information leakage, shared variable desynchronization, semantic gaps, and identity deception-represent significant threats to network security that require careful consideration in protocol design and implementation.</t>
      <t>The security implications of these vulnerabilities extend beyond individual protocol layers to affect the overall integrity and trustworthiness of network communications. Implementers and protocol designers <bcp14>SHOULD</bcp14> consider the mitigation strategies outlined in this document when developing new protocols or updating existing ones.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC5927">
          <front>
            <title>ICMP Attacks against TCP</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document discusses the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP). Additionally, this document describes a number of widely implemented modifications to TCP's handling of ICMP error messages that help to mitigate these issues. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5927"/>
          <seriesInfo name="DOI" value="10.17487/RFC5927"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="ACM2025TCPIP" target="https://cacm.acm.org/research/exploiting-cross-layer-vulnerabilities-off-path-attacks-on-the-tcp-ip-protocol-suite/">
          <front>
            <title>Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="J." surname="Wu" fullname="Jianping Wu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="CCS2020IPID" target="https://dl.acm.org/doi/abs/10.1145/3372297.3417884">
          <front>
            <title>Off-path TCP exploits of the mixed IPID assignment</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="C." surname="Fu" fullname="Chuanpu Fu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="NDSS2022MTU" target="https://www.ndss-symposium.org/ndss-paper/auto-draft-185/">
          <front>
            <title>PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="B." surname="Liu" fullname="Baojun Liu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="X." surname="Zheng" fullname="Xiaofeng Zheng">
              <organization>Tsinghua University, Qi An Xin Group</organization>
            </author>
            <author initials="Q." surname="Yang" fullname="Qiushi Yang">
              <organization>Qi An Xin Group</organization>
            </author>
            <author initials="H." surname="Duan" fullname="Haixin Duan">
              <organization>Tsinghua University, Qi An Xin Group</organization>
            </author>
            <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
              <organization>UC Riverside</organization>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="SP2023MITM" target="https://ieeexplore.ieee.org/document/10179441">
          <front>
            <title>Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="Y." surname="Yang" fullname="Yuxiang Yang">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <date year="2023" month="May"/>
          </front>
        </reference>
        <reference anchor="USENIXSECURITY2023ICMP" target="https://www.usenix.org/conference/usenixsecurity22/presentation/feng">
          <front>
            <title>Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
              <organization>UC Riverside</organization>
            </author>
            <author initials="G." surname="Zhao" fullname="Gang Zhao">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="X." surname="Kuang" fullname="Xiaohui Kuang">
              <organization>Beijing University of Posts and Telecommunications</organization>
            </author>
            <author initials="C." surname="Fu" fullname="Chuanpu Fu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 401?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank the IETF community, particularly members of the ICMP and Security Working Groups, for their valuable feedback and insights during the development of this proposal. Special thanks to the contributors who provided research findings that form the foundation of this analysis.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA919/XIbx5Xv/3iKXrlqLV4BkEjJkc3reEOTUswbSWZEKraz
tbXVmGkAbQ1mkOkZkrCsPMt9lvtk93x1T/dgQIqR4t1aVSUmh5j+OH0+f+ec
xmQyGblGl/l/6qIqzaFq6taM7Lqmn1xz8OjRV48ORpluDpUt59XItbOVdc5W
ZbNZw+dPn108H+naaPixbExdmkYdwa+jq0X05Fm5sKUxtS0X6kK7t+p5VWdm
NMqrrNQrGCav9byZXLcTWzY42uSyLUpT65ktbGONm8yremHyic1W68mjR6NR
Y5sC3jurq1lhVuq80Y1ZmbJR8EF1XFfOTV7ojanVX9KBVN4a1VS4ABhPnR6/
PFPP6rqq3UjPZrW5PEze3hp/VOgSdmbK0durw5FSE5XRxwv8OP1+cXz28PSM
fuxtgp7hjPSDM1lb22Yz+kzlMPihOnh08MXk0dPJo301mdAzZZ2a26KAhdpS
6bapVrqxmS6KjZpt1PWqOKjnmbJzVVaNWthLWBZ8alnVh6MJvOIO1Z+m6scW
5mMy/8nwb7D5Q3Xh4DiWrVZvSnizdrAW9a/qr8uqXCxaXWZtqV7oWVXrpqo3
Ct4yK22LQ3XdvjV/aOTlqcnbaVb66X6cquemXIQJf2zNlbH+2a5pu7Hn8MHr
q0e/+8P+we+mWbXy4/55ql7YMOqfLf/2Udv4W2Ef7e/ax1+T+f661NX1LXN2
Axd28sv1wZM/4G9u2p8AjjsD4antDI4TzukzYAWeBUVJHVerVVsyW8hkt0kR
flCmtqaZ/wH/bwpv0h/CXCCxh+pXeqbUxdLwdJmfTq3r6tLmwGmXumg1MD2c
hclnOnurQD0gVexi2aD80PwNjJCbS1NUaxK7ag6PgF1hmHXldDEdjcqqRna9
NCgnr58fP/3qQH764quDp/Lj/v4BPR2NUL2kLzx59OXv8Mej45coGyBYp2f4
u1KgIxYGVNKyadbu8OHDTGerKf4Ptv2wNs7oOls+NNfrogLJKxeTSEi3VEs1
n0/WullOdNPAduFBOYHtTZpsPbHrCeyoqbKqmLjWNuYhz8/a596zMMNNOudQ
fQ9TnMEU6oinUFVJFGRdgVqGplDnOMU9msLLMf48GZQmpW7kxu41Ly43vTDe
JTHJSH+CP523ZTzWHw1qUvVSO9jTjgV4tfPxC/g/VpdrJPcPHzderHEP4Mnx
8Tn88uj07PRkmMPyIvBXXtmHeuYe7j+a7u8/+eLh48dPDw6+ejp9/GT/6Zdf
PkkY5HvhLTxpJfzoWFiMWtlrNEEwp9JgUhclStInP/1j+Fu5btXz2yh2Z575
rVgjPbFHk/1H8OTVyTke2cHLizfDJ3Z1dTUtc5BJt1mBSrItnx49Wuu1qR+i
QZ2w57H/5RepZJ/BuCdof9GynulSZ+jivDaX1rG8g9g+r/UCj0yjcg2irRca
lGWDJ/5fIsm/6an4F77V1c8oZfZOb/1odYUWH0T1dkKMcfdHJbxUqj/WVbvu
UaZ1S6t+0uk4N73ynbbX8IcTEI+PmvqvS7uBvf/ZpuO8OVaveYDcpBx8MHmE
WuL8DH5+/PL04uUwA1tjSGPUZoo/iu7JWmQ5UD77T7968mQ/YdqXugQHmozX
yuY52HAxaerKAg+2jaqrBfi/R2eH6gpIrn44O3JqZcC3IEe4NrmtTda4/3km
6Kf2Gs5nscUgtwrQR5uucOyPJ4++gCdvzp+9Ov3x/Nnxm9enFz/hc6T9bh3W
OlPaazp9cObmpjZlZh7yUx9DHBw8XKPbI7ro4dwfT2yHyAF5ZZqrqn6rLkDt
zW0GRCvtui1YhV1aTSqu0YX9xUdHr4UpvIL7n8cbHyrA/vN/1KSydHVXXbds
Layxx4HfGvszGpQofAH/4Kxy4Cig531hCiNuekbH5D6Bef+EbA3a7MvRaAIh
KzhFTa2zZjQixjEYVoN2cU4vIPCGsF4Ra1GIXgof1qaw7CjDfByDIDFC7AGn
Zp1r4X3XZkvwk1Rb1kZnSwpRlkQlGG6emOLa/K0FnsUHborBzkYtTbHGgMVm
uJRcrxuVb4AWHE2PYfT1uqob1YB6h5HdsqrQzI/pCExJs8FOYESLO2jLjI4C
gr23RpFkgcOgTqzLKiDfZqq+q64gPKrHyocXoouBtt77D4HdSm8UARxqiHBN
BcH+GjxEVZgFOB8rRAYgSrM573ZlgBqldSs3VplunQ/PYK/w4c+djzIcTo+j
rcCHwalBZTThIEC35Jb3RFu+Rp8JRspAvyCR+mAG0hXcI2+Q4CVdbH6B5S6r
Kz6reQSx0JYcLK9UM+MdYfjjbDNEH1ijLfM2MzG4omjNWuiOBs2Wu/c5BmJp
YiUYbF61tcoKIKEh5/uyH5+F2BPICe+9BbqPgVvcpsyWdVXaX/hP8KpbAh9j
kFxb5AkguYPYG7giUwu9dswvoDDgCQhybjKzxleJCx2f72SmHQzhTTPwH1Bs
mAorr51NOKeGFTcsz7q6BTZOdIOaw2CyCvgDCBQctlGzCkaGTdYaJLTNmhZk
ET8CVqQGqbOXOgMZ8E7CzCDdhElF+aez4EppS935A/9kRQs0o2EEBzC4ihbP
bWW0g1mZuWpSaKZkBnakEHyYrcxlVRBcMWWtwp4M4iYgL3UFbIF/3K1jNEpn
rkkbFLDSuvHxVpA3AkVgKkQJgA2JHu/eMUTx/r1oDCDNpUGFE3RRJ2gwnG6E
a0A75OsKmNMJUEK7zS0eWlA4M6QrMk3VunCUrNjGg5oNCAn6h+kzBretpaBj
rm2BVOQDXiOjNDfoPtoTIiy4qW83rMdwHFF9oAh/bl1Dn0WEEUZew3wEkG7r
hfGgdiLFutKI24o8JirdILNacFk2vOa6msGMJbyNpwKkm0AMZphbOwabqh+E
FwlUCieA9C9NMUbB2ET62DMPHwHQflGCZYANNhU8HMPekDdx59uqml5Bu2WQ
yiD3V1Vb5KimMCS3sHwQ72Kj7GqtgbD5VA3zHrI7TLREB63BlRYFOEKGCNtp
a1GbdPQYXgLFTWYJ0YVNlCAsGQgNOefEst1E1suXhoPfFJXO4eSrFfzqEJwu
kKSeDh1PvTk5ow3iQFOQAP5DBhoIyMKnlRl7iaRBYwqH0sDUBWkm18rhscSY
6wYZIzfI4LY0uEoYoaZhEmLAx2vmpZzUmI4tl3CtbWC1IB4gEAUKW9lM1Tns
0dCS88pw6B04CwL2CSo33i2oSZoWzq10ZLjJRvCWwA9BH5nUtaFcRVDSEO3o
t3gmYP4t7q4taFPACHa+4bfBs0W2ylCBs7YqzKWWAdNDoflqg1ZsDf44EFHD
0oEQMOS6aoQ7NbC8QbYhhemn3cSMgYBCbCdBETR81OBG1PO2ELsAC80a9Hfg
f53JyNFjA+WCVvlbdiXSESNnAhWXXq+NpkVywBEfT7AvnSFCq50TmxjPMnZN
bAFnk7oT3vfw2oMOyxs/cQjCWnDcpraLBfAQGqvCXH+QwY/t/CQSIC81G1ih
xEkDsuEmsZPkNq4xKyQF6l7cEahhnLhELPxKb4Ck5ygyqzhQwpWjf4HvgZ0g
rd5zKmKls8O9KJE5iElrNBNjdGSBmF7ZI7fxYUzVMVhty55qQ7T03kNekZiI
1mcGFnbYsB8FNEQnBAevZmzU6FNg9WD6cNzBNgA9dNEsN95LC65PsNCdMJEC
AmNToVxXTvzHnns7JcYfdn7Es16BPNh1YdI5XQZ/BuK6w9FoH5XXABWvUP5i
11q2KOfqLRqpoR3OtcWgmgkFPqzoF68/Ebd1QFxiprJdzWiSGuG/U/Ly5t4n
uo9A7h6lT4z736PRwVQdrWZ20VJEVw54jrx2WlUnEyT5yDuwbAt7KDPLNqT/
PoceaMpmIGyGtDZITRQEpI6BqBZYew6+2dp4/wHX+hiYPHZjcT6vE7INGDOT
vaVoiJc8IFTAT8RltBvvX4Vdec8ysiiDAUxPFUdLAP7LKTA1HR/C6xoW/2Qq
RxE73D7PW1AQOafPKgdxABwjzSDHlpyCEARNPcxUlXgSkWr0Ss17dX5X6OsC
BwXDIQODaiOqiZJ1rC2ZTvh4BRTISHUEia8D6SKVwfKDnhTofszxivOUKgJk
dxFIJB1sAUdvOI0fndMaKIL8lWjaFF9gjyi1VRg1dbaqd8A9m0kjd8cEvi/4
42id3r2LU3nglIJX/5l6HXms6oUuFy0MyXt+C7ocSA5exL2Xb84v7o35v+rV
9/Tz62d/fnP6+tkJ/nz+3dGLF+GHkXzi/Lvv37w46X7q3jz+/uXLZ69O+GV4
qpJHo3svj366xy7rve/PLk6/f3X04p4iA5REvTVx2cyoYAJRu7kROGoQOc84
c//t8dn/+7/7T9S7d/8CDvnB/v5X79/LL1/uP30Cv6Dp4tmqUiwZafrNSGw1
5v+LAkR7jRAKBgBw5BBqlwrZFwj5v/4dKfMfh+rrWbbef/KNPMANJw89zZKH
RLPtJ1svMxEHHg1ME6iZPO9ROl3v0U/J757u0cOv/61Az3Oy/+W/fTPCmPBi
iQpTvaxyUyDPxIczhx8o4i/7xpndoA9DIyaRewUHU9GZo831Bs/kt8bKQUVr
lRWW4ZIcPXe0VfVUvSlJmVdlHwPA+XCZwYxD6FOBWG7GXpF3Sqtkb9g2w5gT
qChUYqQhwJVnY+dVWlHFsk9Kkz1pCuPI7ae9AW8afWkczYxuQR1jFNtuJOMR
ERom7lkIFoGho0ls+TMSEGx2Ne8MFCvOyK3E+O+teHAUAHWBGjwihkAHvPNX
GCUXRRqIIx9dIe/AmgRBR68bnheWAkiKsyFO0QWdGjvh3jFBmuPbdelXBlv9
fpv2eIIJ/SF6ZbPTc5Vip7GDb3LGOccI48CHHJ09kLMcMk6dG8auPpprNAYb
4lmZT9z+YVDHujAImykMmDDqy9haVzCkD28p5GG4UFOwtzRx4CPkaus5Gp00
nsb9kUcDR5UyPrlGFvyvxKsVaoq6RaS5gd1zMVQkil7Sor3BGgNGAzzw97//
XZDvkBW5iDgBnE3+64OJ//dAqf6jHY8fyLu/gj+Fog0/RZ8OAFT0ygN1zBpB
/XrrvA+GH0fz7v736+2fUOcid1Kj9hEDPgjLvXFlv4YTuHG0X4/84d8+qZAD
D/ndIee/fv95r/6GzcXn70ejUzHosSoYp/xWoOKS2DnRiA5hK6+qToP3OEHI
Eb0mXQNnJt79BNWYD3gj96tvnaJYlyX1cxdH1NnbJMwXrxZWoPO8RlDM9bZA
FiTyacknNJjXaHhCH+0QAlYTqI3cy5omwJUpfozyCxLnUyzgivbVtrgukZIS
1CZYHdo9YdWakCnwqt28RYkG8WZvP+g1OD7n43TU3cZy0EaBurjYouFjAFg7
1644JICnBs6ElVq5iQIJg6oJUTlWmmEDdc3QWHCr05Vn8IFN39WuzULXuVgn
WGMFB47eG9rVEM9EFjGsAscxIV5zqvOsFEbmOVEFZ6DTkjWKwo52OUNwnbCj
wdTNRgln9XwEz/tsl7rYxNNCnKUMy2VYaYvfdDNkQ0UHpMY94hIr8ihFcaP/
REA2Vg0KOo9xPUIGaH0k/sH1XdqK/JBtpKJLl1TlohLzGoU8454nI/DBzCw1
DFqjPSpwVoQjCUCPwUO2jezSNVxtiR75ZwPVw6PnmIrC0umhRNQkhjheeIgj
QhFqdbKdlBqCFkI0/8eQlAox8omPkSdIM1gXJh6Jw+8AvnUkxpJFrwH6ioyI
SEPHIjkv9BX5q1H+JZFUVEC8JQZjYC9ACXx7HGJTH9hDtAheb2MMp5EStdqh
7mepqKNTJuIFMmxY5RiqfG1uSDoS2Fnalf1FAKLaureOo9iBo5N4JJU+OCNH
gQT4KAxWcbGtNUVORAGd2lGXF0HJWJPAiJyAcoHDyQ2i/W/WTbWo9XrpC8Ux
/CYUHhxAhOtpzCkYe5ORN0aoIq1HdxNzQaITOItBfFqjYgCvKjvEDKZd2sVS
KEZHNvEWRdJ/hDtZAcwwqKL184CY/Q7JNh3wV9wmwnHwls/7TNWplBnzm5g/
kUgGdx+oiVyihNu9EtJkXAIk2iF9KASUryDBx5kkaYOVmrT9DiQEk4+O5mVy
FmM2LCvWDAS+uEqAYu+Npgfq7VRkkBCzM6GKOmWZQhDAmO0NAjBrJBy4GzxX
H3eRqdQPPpnE+10YHJpR1AocaBxNw49XppYT7CwSTjsvCPzE6JiDTgNG0XDy
Cba+Xof3+OSNJS4L8SKlrvxvk4jlg3IVr4CWIByPPJHwQYFR46XBUwtnEM8d
42VsErscinAPOnlVu1hKcIHFVMyRCSsQlANnXTMeECJlAZaRoM/bGreIgdAY
my86pMvvaI3s0HTcCePbVVtYdb+TC0LQJutCg7x7B3GPBI2APmYkz6pdfTDE
Omia2X6EmVl9SEYPlBL+cSDrQBojicI0Oi/wdg7bYhXE/gpRXJRlzummtbAN
5lvbGjWSG3bo4PBEJiTbGKWQ2TuhRy1SCEcOtSYhmxczVJdji8UsPj2fqLuC
TXIWLtTsyzgCAMTGwh9ED9xX8PccPBI2ruR3YBsCYZVHGEIT62KBb5cRxIAZ
ZAz2VVK5EgMbVbumfIpXARTn78oasD7ztm0g6QDONYTQU3VUoDpbLGW40xN5
9UonJ2elVII9NV/cdHomBEkzA5zkxOqY1QxtQWZqwmf6DikzYaQX4TOYIeuQ
hk7QU8WB2SaUWN6YpGTxcB3npJEl2OVyg+AVCmbknTXi8nqRID02MdPFdIyT
YWDGpUvsq0aZ1SQC61R9IGakHL0wU6zF0o+DkpPF9IAX6SW2kf2MKVuMKEdO
8QriW7AkJETwrCvOcJMRyhpWmP6Xfu6pkwYQ6TpYHHJ1tngm1K5xOjFqRfCH
sLQ/a05SvHsX9UAQu3ucJATfvX9/obqrAHQM/ImRDS48lH/9QRJA5YY/+bj/
190gwe6/hJdhoPv7e8wQ97B8f8qjfwMv3z/KuEnqGCmrTp73X+b/vDIGAs57
/ZmfF3oxVm/Ahn+n3VKynFsv33d19nvPJnvhL6wDdi/7o/d8sEexiKFci3GN
3/OtL38NLz/uXl6DBed/H/Iy/4c03O+v4/19+MtDH/mol7/2DHX/yZ46/+lV
YLB/+sw45xc058Oj4z91nP3Nh88spHyw3xHzA1++f87xFOmru76M6kjyc9Ep
fkL2/N3HsOfTT8KeDw4imn7Iy/eDWhTP0N3hZT6HnyHcTcX+ppdTRBMHmHxL
Wua4Au+WsflT3x8gShshTohNkzoE4YS/eLBgNDoLyeEoznd6ZaRkeF6TXSFn
XrIYHeiwKKoZQkxRQax4ViuDGXCnOLIiR4TsD6fLuUbG4/JdHogegwmctfM5
hREr9PfB3HaBDAINoQoC3Y52nWvOuwo2wkVliNvwhrjx00nE66vZcK3NULUF
Rh8Upwdks197gbNyqVzr2MMJJSwcdnH17lss5MysY983qkjuciToyIJDz2Xs
uXUgaWstRR9z2Znrco5EOyyYCygQuu4EMA0VLGfg+HqwoZS1dYP299WvAYUP
eJJhuqkZCw7GOEJu1gi+lo3fMi5Sor+21FdMI2ImnhF32HLBD+G488LHOeyK
gcMphbMF5+rQld6sTR8p26CPDa8gLgPB6C98AOA8gpPLcIQcMBY4UdXIgmRC
ODtk6vtF3VgjItVe0VuUvEM6Mhl9qINFfmnxIXE6iVjVNsyQ4soJbzVJSCYF
KgSJRnyrSk3wehUdPgf2Pp5/TqNyAAJOp1+RD96BLCss0Qxy+FJfQ/C5wpaf
0snlDdjm0aj7Ly/e7PlkG9DUy9EWG6TRqi3XLbmpuqsSpgMck+Qgn0YniRE1
sq1eeC0wULgJgQ3nXRHWHQ99gobGddiSCedVEQeaTMYAgiOmEZ0D7NNvMy7d
sysp3YHV5+Ikc6WQD5BIKqVyCotQuXa1iShJcSEWv2PpB4SyGFDvAnIEX3AY
DsbMyPhiEimik06o7ZlnLpzDsMc/UMR8nxpW90RJwjwBZsdoCGkbt2Mk8d+k
JJc2bK5KQ62ovYUm2RtLyH8FZ+s5Bv8QDn+WSPLthz/uEBk6Xfchx0uZZikg
HhP+CB/DVVA05rtTtjQioX2EtSGFYR6J+EwIxyiYNdeZMXmku4SHurxDWija
C6gRpaGOAM6mpH/lWxKWdoY1J2TrhPJYVEFsZspLC2tmBtwxBBJa4nqwAKMR
qa0UuU6Nmk+AEH/HHDwOeRMgCWYagSV6+4mReWlyYHghQYWCnEQlDFEiJwc/
YOPizoUCVjtVp8N5LzD7LeX+gZpeEyKWMWSKB83iTkD0JVUwSHKMS2q3RJUL
U13ajuMzXqc9CepVMEoVy3YOjbbuLT+slqNv4sQsOHEOQvGoud1nvDzwKxqr
z9dpDSgyUdBpQrGe79WVj3qgNK6iCYjZDanpLgXEDVcBxhMkhyo1sPGIK50n
1Xwilc5EiG0IQlJ5HfTwKZCHTwQ8fEyQE2AHQoTgtLvQ7/Z3+T+Rj3+HeT92
zRATXQhYdnp25zWn1yP8RmsO4f3jPb7jSf0r0J3kMbqxYTv4/qh5d3/iawYa
XoQSiD7ccOu80ardh8/7MWuG/yFQ8dK6SUCFzd3mPWP9fvd55VquBxHF9j5y
v/24OZBT+KK7u0Oi5SR3jkrsGMvfSeW9SArST6QgPSSXT8C0xuE0R4gcJ1HG
1FeKRAZVegM5Pxf3ZlJoOkf1y+XeOgc9SQmgwQRflLvlli5qJojdAXTaBWum
Egb0A0K9QpIh7trILDcnw8cgukqK9kMauLArKp4NfbBvy+qqMPnC+PAH7Xtj
4qAsydadzsUThk+GhUkuA+3SVpcbDFtUlUPfUuJTk3tPEv9G9SDomi16SZ9+
x1uXPtNZzwCm/Xu+5y0sL67kIU8zrm8gioi7KbZ1y4wu46RwRFZ4llEJFzXD
I1V0bv5GZQmUKkOnKFTS9DvVuj0Dv+yu7/exdTixaP6FXocKoqSQzXfmoC5I
Vt+FvfR5zX0ZXT2tL7Dx4egcbz2aIG3BNVhCJCbVAcD8ZUaetrQ3wju45agJ
hBq43Yp6BftSFpJVyJmI8aDQgpTR2DyNoPLDnSe+ToCc5twEImNtSOLl+lbI
qu4IuDK69C1bWMdEQEKSha7IU8er1qxUqiSeJaWqBjxGrlOvuNEYfL4GQ0Wu
62B/lNNJLE1O4JmkJoR9e45YJFgZ2I3vcuuqYXzyDNaEo0dlfXHbXhQCMZQm
Jeh85BgQlAb34xtGIjSsj40I53PKlFNvsn8BY6RGSRJjnRbE5F8ahduiaKlA
OMSK2/49lT2F5F8MAMSBsr8RJ2oYo0pDbpTb7oKK2m6nu0bAgGWgcNuTyJPZ
A4tSkylFKMgHfOsF2w2qxq7WOFYR+oioVjIqMRxaKbn/2GoLx5k02ib5WYI/
HEq9dctQ4MjFLW5p18zKnNyMQphQoC97j0QOCDzcI2bxli5nQb9Mg+PvQsjF
R9jTU8Klvgid4660tWrHGdAdBb5eVQpoo+rZPJgIqZRnklMfgh+sq/D0vQ6+
vsRL9kT2iPd3Iv5BufJ374YvAOI4z7oQebpqvaQeBM1iuPNqJ+6AjJpUdjeM
BEL0bpPoXf2w3dniSwt23gMR279U0nqNaXFztng4ofyqp5KpoDK2cdH5D8b2
UavZmO/VoOJdlucthkuBrgGJDBUAu3Lhr4xdLGdA1++wdZ7+SfzZ/TvpLnIY
SIQPRKFbEel2MLrt7/YfDDjEccoNo9ETqlp1AxHdjS8n+77rzPh/Ha3+gZdv
+vAte+aw8MCHhaj60F9f1HrlJgP/bsjLftplS7T6zKvZu86MOzmvQsD1iQn2
xBMsuQzsv4RgGJVyLHaGnmB+p5f/oZm5WgDz037jWLvDOjON4z/1zJzYRnxf
1/lgPvuWmf0Fbz/+M6XqA1++/yWmuV9VQEXOKv1js7/muDZHbaxUHNQn99T5
nX8XgMUkvN+ug1cnnFF6IRArqgWQKHIK/hL1io9Gx7sqwzkG8YFQryMkjvaT
7hCO8UqqJNwydrAQCeQ5MzlO4zGKwbZsGtp4cQKTanHpprnBYHYR1VbdX7NZ
+wLzm5Iy7KvHwXtonYlKe90kzg+ky+8uOhLAX65foysbwEkNJ4F3eNQ1l0XL
hTtdmOjvkcNEZgieXBIvhUgqRE7c5+kBbV8az+Fy3L3aC/X7BxxXHQ933/Ri
Z7k2YRup8R5ZOAwkC9+etPvChMBAvuuoCl0Qxh9XlXH9IvvAwbk3vSuYosjw
TVTKa+sMYmrKPbtxtA+p63WtI6GSHP/2RWhxi2faaBSa0bZ6wW65jqFrROPU
f+KgGl9tvzMCDJ4ppy00df12TmrSUNG74wGzQCtDfb9y41pAuHZcb4EiwvdL
EdJ2hZ1PXXxFWRejZpbqV11I6kSXV8jlDNLAl242CczSrBE1WpklltIgqOSP
Jb4JIwQe3ZFovGsoyXzJnRMpFejGkNkmir+2YYTkfg2654CQRh+CbUeDGGpF
hz14y124EgMmWmn3txZOlxQLNpLQBaWEw12a23sYt1sgfcRGgZN0j0gPMZHW
oUoQRT0AMJCioD6BrsaehT/q+hheVqQhQT1dib2gbmsUuiU8oOIaXFRh6E7O
Li/bXT4XASplleN3aOAXEtBpokqky5EQ5qLGdt5fwCBCj0EdAWspE0W2K2Gj
mZkjJoHMuBlS8rgASddvIdnH6BxIrdm4Y8RdfISaIlQXhPC7d/8UCEBbEhqI
2fZOyMmgbXXuBAQ1iBmMgynP7tIV0lR1nyV5YGns8YvqahUcGk2mk9/FFmGS
+7A0eH507iEV213+1/FHWwqfY74br1Us53bRdshXxD8BVIuJ4KsC5OO7rYFI
HH4ZSXeTG3bHwu+owoCcnVWxZS85LOyJpRMrLgpJeSnqA4VVDNwNKxljucdB
qvI8AuI7tOUExSHYefHNIPHHqvu2CMF9B3uISYOTroh8LklViK+zbaFS8U6x
SoQg5kj3G8BKqRuSQlOqz0rRoXCXqNw9/4OdPLfhTorxAEaUG9jtJtL1nODQ
rCB2WNwj1hJnXNty/+jM7XnIGdubwCswLK2dJbgRTKXmD27mSC/W4ERNzzfY
dF+gMHDDER0M7XvChiwP9zSFk6dqhCtbMxbqWYCMuAu3JG4Bst1qv9307p1I
4EepqWkYHI6uUug2HgxgUYF9x85GmLzNW7pcJCwsdtI6/ky7S3p6LFzPx3Cl
3/kOwLKP/t0EXPZ4lzFKKnadyF2Eeg1Chj35d0UuJbmxmtFlkn733UWw8V1w
5KxGF8j5pcfX8kWYX8zq8S14w2go3yDcvwWLOdvj4iHpRpca+OavAWEP2RX1
7l13xb8v47nbLV67UdXeBV7bgabvJYtcWYkeet5b5J4ils/RRLCH3lP0sL2/
8Uu8UdBlO7BRX6PTrlFMMaXK/47OooieK3huw0UjPHQAGN3dhnAbunBDB8OH
vzq5vz/d31NnQDFBwe4wK/UDMRH2PnLBuI6Dbh3f/JqQ76YmE3pCzRN3nzXq
mqLA904Ufi3B/jEoD7P3zzqcx3uEkJ5hW+mdDkdJX8mdZ/0ap33CbWYMEt5t
ViyMvfus+H9vohuk7/Jq18wyt1gtfJdZ8eZbhcntvaFP/nOE7iNendw/mO5H
Z3NHlggo4x0XTJJ+dMaXrN/tVe9DIRejhr7LqxT34M0WmNLd+40PBygNGskr
iETaMTwGN9JhjnG8c9bAlb4ihUO762ayrNbTT7/gu78Kov4Y2SnkRe42q4eq
77rg+/dOOYG/qdrx3V6Vq53Ut9XsX+7t/WZC9xhZ4TmEFxQA96zTbamkjyHT
En2z/+ZkSksUf/CesP+unlRyWGzgd8pnqJfgfwrScMJuPn5DDKEQ/aIzbGkL
kPzOS24k2FzxuFRGn1W1b1wjr7TybnYeZjwcjZ7b2jXY0rfE/jVfKRfDRLek
7+kCroxvuqZgy7cZ7IS+I1eWo38p5SDEs4eu8LcPbOVGxrvu3cLmEgzLEogl
gNREw6GCE9p0/8JKHzZp3NNlVVx6pEmu000wZixDpB4w12tl6znuHbRBgVSU
Boi9dqKKIQQ/XJ2UVLFSpM1E4t4y6WGCk9TSlBNf9et7mPhiELJmureBt2bT
3dPUXRbfSz0xDJ5kJ8LOPYgYQZjJMqVQhr9RhHbvy+4GCkc9WO7LfGBhS+2k
UwnbrTSiHX4z3TWq2FSDiFo+FsCUi75qCN1N3UdMJX/kWZ2rD7ERiFNfA4we
vr2CA8MIFU5D7vE2NJ2g0WPZ0SAo7Jb+yyzCXS7YfWpqKiQDUlU1lefxciu5
ZLgvOv40dDiKVYTievCWv9jCf0tFGkf2M5uRrPIlFaGsVc7Ss9vMEFTCbYh8
y8Vgmor0BQI9MqOLz2D7ihpsulpuHOXnfA+aETyZxb6T6C1yEF8FiJeylVvk
8Jhbg/fdZnQIcecPt6CtsH0vQmy52xC/bQLvSux6+D53HdaKIfdzvuVlnChI
qgQEESwxQSyAAN3pt30xWg/owG0D/2M7F0GuBBf0s9iI1eFXA+RUi45AQzgv
6Zjs5XmRx3XB98MEHH0T5wzp+rmQ/EK4J7lGMa4ypHkW2OpYptYq7XvyRbdE
b69p+TJ8LUhTwFmHy9E7afPNhVEusg/5c6Uk3riPl/14DZIqw372T9ravJng
bEO/qbff+xrRjLbmL8aVhCFek26upYma1rDN8SLD3fXz2/Am3yTZoXmReqVb
ybeuDSUgkm5BDXdyDdxfH+5QpjzbVnZRLqROwPcboa3wfRKd9+Ez/kp3KVni
ek4ZkInd4e7gHV+J9mFuxnRHv6ku6TT0hitPKzc09XSSNPnNhPu4BpLhmBSJ
/QshH3s/ceafVZpHn+nbI1hfpdd5sfPF1hSlBdV5SCAl3+EhCQMpe6D7KyV5
kMCzQ5d89r8Jjr6b6+jVEaXvsHZe9Mq7z/Dpe8m+r8yq6sxDWRETG0cNx/g5
Gubcr3VrKP+X9/1b3sOtgm5312IPLb373ZZbI4b7/SeDX+7Sv1hhqxH5A783
bhLaKAYuOXfx93SFvdOxeQUhifjQ1SDtw1F+jv0Cnj5xhCWVGcZlc+DtlAeu
+3TBG+9KdDg2FeWjczBbeRt9RVd0P0Z00Z3n1Vvzr1HRR9zR0jURk6DGxTzb
N34KLdjP6MKnTrjw4gD8noF8+wsfKIMvX3zPGfyrSDtXcrkG5euvMQdCX6RH
MoIgNn6JGbL5URaapLix791n/UfvMSLke7xM/vt7cwidzb33fCasMJy40AQE
ULyhS25TO3128dxTiL5XMy4cAznkL7GJvswKCRZE7wegL66bvulYmnA4b0QX
pNJtpf4L2bjoAAi8hE3kXWuSUIhIFu7Io68ERH/3nL+yiVfsfFhJug+b0Sr5
4oNQxoUSgHfFEjpJlTF8fSj6sByQtmXXXsAJRfw6SmeB8P8f+4XjZ+OEAAA=

-->

</rfc>
