<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc ipr="trust200902" docName="draft-yuchaozhang-i2bgp-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="I2BGP">Desensitize Intra-domain Information for Inter-domain Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-yuchaozhang-i2bgp-01"/>
    <author initials="Y." surname="Zhang" fullname="Yuchao Zhang" role="editor">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>yczhang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="P." surname="Cong" fullname="Peizhuang Cong">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>congpeizhuang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="H." surname="Jiang" fullname="Haiyang Jiang">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>jianghaiyang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Wang" fullname="Lei Wang">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>lwang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Wang" fullname="Wendong Wang">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>wdwang@bupt.edu.cn</email>
      </address>
    </author>    
<date year="2022" month="December" day="3"/>
    <area>General [REPLACE]</area>
    <keyword>routing protocol</keyword>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Border Gateway Protocol (BGP) is a routing protocol for autonomous systems 
running on TCP. It is currently the only protocol capable of handling multiple 
connections between unrelated routing domains, such as the size of the Internet.
BGP is built on the experience of EGP.</t>
      <t>The main function of BGP system is to exchange network access information 
with other BGP systems. However, it cannot fully utilize the complete information 
in the domain to achieve the optimal decision. This document proposes I2BGP, 
which describes how to obtain desensitization information in the domain to 
optimize routing decisions.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="problems">
      <name>Introduction</name>
      <t>Border Gate way Protocol (BGP) early used to solve the problem of the  
interconnection between a large number of Internet ASs (autonomous systems).
Compared with the traditional dual-IP dual-wire technology, it is more efficient.
At present, the BGP protocol is widely deployed on the Internet, and there are 
many important enhancements to improve BGP performance in terms of refifining 
scheduling granularity, accelerating convergence time, anomalous behavior 
detection and so on.</t>
      <t>However, current BGP-like protocols follow the basic principle of taking hops - 
the number of Autonomous Systems (AS) on a path - as the metric for routing: 
the less hops, the higher the priority of the path, such as <xref target="RFC4271"/>. 
Such strategy regards all domains as indiscriminate blackbox and thus can not 
achieve the optimal inter-domain routing decisions due to the lack of 
intra-domain information.</t>
      <t>This document proposes I2BGP which is developed based on BGP-4. It uses a 
Desensitized Intra-domain information-aware Tactic (DIT) to assist inter-domain 
routing decisions, which can be embedded in BGP or applied independently as 
a control-plane strategy. DIT can make use of intra-domain information while 
protecting data privacy at the same time, thus solving the contradiction between 
data sharing and privacy protection.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>DIT:  The frame that the document proposed, which makes near-optimal 
inter-domain routing decisions with desensitized intra-domain information.</t>
      <t>AS/ASes:Autonomous Systems in the internet.</t>
      <t>I2BGP: The improved protocol which is based on BGP and has the ability 
of extracting intra-domain information to make optimal routing decisions.</t>
      <t>DRT: It represents uppercase mathematical symbol of delta.</t>
      <t>drt: It represents lower mathematical symbols of delta.</t>
      <t>o: The article uses it for the same OR operation, mainly in the formula of 
encryption and decryption.</t>
      <t>o+: The article uses it for the XOR operation, mainly in the formula of encryption 
and decryption.</t>
      <t>RIB: Routing Information Base.</t>
    </section>
    <section anchor="requirements-and-use-case-scenario">
      <name>Requirements 
and Use Case Scenario</name>
      <t>This section describes some essential requirements for I2GBP and the scenario 
about the problem hidden in BGP.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <section anchor="specification-of-requirements">
          <name>Specification of Requirements</name>
          <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        </section>
        <section anchor="supporting-information-export">
          <name>Supporting 
Information Export</name>
          <t>Data within a domain could be exported, mainly referring to the link 
performance status, e.g., delay, bandwidth, packet loss rate, hops, etc. The 
performance of an inter-domain transmission is jointly determined by the link 
performance of all passed domains, then, for different attributes, which can be 
summarized as bottleneck type (bandwidth) and cumulative type (delay, packet 
loss rate, hops), the calculation of combination will be different. In this document, 
I2BGP takes the number of hops as a typical example that ought to be 
calculated by addition.</t>
        </section>
        <section anchor="protecting-data-privacy">
          <name>Protecting Data Privacy</name>
          <t>Private information of domains should not be deduced from the exported 
information, because information like hops may involve intra-domain topology, 
which requires that the information cannot be directly disclosed to other ASes.</t>
        </section>
      </section>
      <section anchor="use-case-scenario">
        <name>Use Case Scenario</name>
        <t>BGP cannot use the information in the domain to make routing decisions, 
which often makes the final routing decision not optimal. Take the forwarding 
hops as an example, <xref target="Figure1"/> shows two paths between server 
s and client c: Path A has 4 AS-hops (s -&gt; a1 -&gt; a2 -&gt; a3 -&gt; c ) and 
Path B has 2 AS-hops(s -&gt; b -&gt; c ). For client c, Path B will be selected as 
the actually routing path according the principle of <xref target="RFC4271"/>, and Path A will be discarded. 
But in fact, there are additional hops in each domain, shown as the numbers in 
<xref target="Figure1"/>, which makes path A the real better path.</t>
        <figure anchor="Figure1">
          <name>Example of BGP-based inter-domain routing</name>
          <artwork><![CDATA[
                 +------+     +------+     +------+                                
    -------------|  2   |-----|  3   |-----|  2   |--------------|                 
    |            +------+     +------+     +------+              |                 
    |              AS a1        AS a2        AS a3               |                 
+---------+                                                 +---------+            
|Server s |                                                 |Cilent c |            
+---------+                                                 +---------+            
    |                         +------+                           |                 
    |-----------------------  |  15  |---------------------------|                 
                              +------+                                             
                                AS b         
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="overview-of-i2bgp">
      <name>Overview of I2BGP</name>
      <t>This section describes the model of I2BGP and how it exports the 
information from intra-domain without revealing data and finally makes the route 
decision. The principles of traditional BGP path selection do not include 
the consideration of intra-domain performance. This document introduces an additional 
attribute, Attr, for BGP to accomplish data carrying and spreading.</t>
      <t>According to the description of <xref target="RFC4271"/>, each domain is a confidential 
system with complete independence and autonomy. BGP runs at border 
routers of each domain and specifies the next hop when forwarding across. In order 
to fetch messages from each domain, I2BGP proposes the DIT technique. It masks 
the intra-domain topology and abstracts each domain into a characteristic 
topology graph with its border routers exclusively. Because there are direct and 
indirect connections among all border routers (nodes) with in the same AS 
we abstract these connections as edges between nodes.</t>
      <t>After taking the information out of the domain, in order to prevent the 
information in the domain from being leaked, DIT proposes a random obfuscation 
technology to ensure data security, which can ensure that information in the 
domain can be obtained while imitating information security issues. Finally, 
we spread the retrieved information to other domains through the new field Attr, 
and obtain the optimal route by comparing the final value.</t>
      <section anchor="homomorphic-encryption">
        <name>Homomorphic 
Encryption</name>
        <t>This document introduces homomorphic cryptography to export information 
without revealing data, and to ensure the validity of the final calculation results. 
Homomorphic Cryptography provide a potential solution to the contradiction of 
information exportation and privacy, it is a kind of cryptographic technique that 
performs arithmetic operations on the encrypted data and yields a result equivalent 
to the cyphertext result of some computation on the unencrypted original data. 
Its principle can be explained as follow:</t>
        <t>De(En(a) o En(b)) = a o+ b,</t>
        <t>where En() is the encryption operation, De() is the decryption operation, o and 
o+are correspond to the operations on the plaintext and cyphertext domains, 
respectively. When o+ represents addition, this encryption is an additive 
homomorphic encryption, and when o+ represents multiplication, this 
encryption is a multiplicative homomorphic encryption. The encryption 
function that satisfies both additive homomorphism and multiplicative 
homomorphism properties is called fully homomorphic encryption, and it 
alse can perform any times of additive and multiplicative operations </t>
        <t>Homomorphic encryption algorithms usually have high computational 
complexity. I2BGP select a algorithm which encrypt simple numbers 
and satisfy homomorphic additivity to avoid this problem.</t>
      </section>
      <section anchor="dit-overview">
        <name>DIT Overview</name>
        <t>In order to achieve the target, this document uses an abstract method to 
mask the intra-domain topology and reuses the exsiting fields of BGP header. </t>
        <t>During the route convergence process, cumulative calculations (e.g., addition, 
min() or max()) over multiple domains can inherently protect the 
privacy of all upstream domains data, i.e., mathematically speaking, on 
the basis of c = a + b, it could not infer the values of a and b when 
only c is known. This is one of the foundations for the privacy 
protection in DIT. However, the inherent data privacy protection 
brought by cumulative calculations is effective 
only after at least one such operation has already been conducted. 
In other words, the cumulative calculations can only achieve non-destination 
domain data protection. For example, as shown in the 
<xref target="Figure2"/>, for AS 3, the value of AS 1 or 
AS 2 cannot be inferred from the cumulative summation sent from AS 2. 
However, AS 2 is directly connected to the destination domain of the 
route (AS 1), the value of AS 1 is directly exposed to AS 2 due to the 
lack of protection from cumulative calculation. That is, for the 
destination domain of each route, information leakage 
risk still exists, which is caused by directly connected neighbor domains, 
we name it the Direct Connection issue.</t>
        <t>To solve Direct Connection issue, we propose a basic method 
named Random Number Confusion. In the path selection process, 
it is only necessary to select the optimal path by basic comparisons.
Just like giving random offsets to all nodes in 
the coordinate system will not change the relative positions. Therefore, 
for target domain, DIT adds a random number to the intra-domain data
when initially spreading the data to the adjacent domain. After arriving the
traget damain, the intra-domain data will be taken out and 
will not affect the comparison of the final results.</t>
        <t>After fetching the data, to carry the above intra-domain data, 
we add a new filed, Attr, to the BGP packet header, although 
which is not strictly required because we can also reuse existing 
fields, provided the re-definition of the field 
function is approved. And the quantified value of the 
destination-based cumulative path performance is embedded 
into this field and diffused to neighbor domains 
with the route update message.</t>
        <figure anchor="Figure2">
          <name>Inter-domain information security scenarios</name>
          <artwork><![CDATA[
+------------+        +------------+      +------------+
|            |        |            |      |            |
|     AS 1   |--------|   AS 2     |------|   AS 3     |
|            |        |            |      |            |
+------------+        +------------+      +------------+
            |          |                                
            |          |                                
           +------------+                               
           |            |                               
           |    AS 4    |                               
           |            |                               
           +------------+   
]]></artwork>
        </figure>
        <t>DIT does not constrain the intra-domain switching policy implemented 
by each domain. <xref target="Figure3"/> shows a typical process of inter-domain routing 
message diffusion, AS B runs a traditional routing protocol and AS C uses a 
central controller similar to an SDN controller. This document takes the number 
of hops as example. Suppose AS D updates the route of d0, then based on the intra-domain 
topology information, d1 sends this update message to AS B (b2) and AS C (c2), where the 
Attr value is 12 =  s<sub>d</sub> + 2. The router compares the Attr to decide whether to 
update the local RIB. When the received Attr is smaller than the local, the route entry will
be updated, otherwise it will not change. In the intra-domain, AS B or AS C exchange 
update messages using the intra-domain protocol. AS C (c3) sends this update to AS B (b3), 
where the Attr value is the number of hops of the optimal path from c3 to c2 (c3 -&gt; c1 -&gt; c2) 
plus the Attr value received by c2 (21 = 3 + 6 + 12). For AS B (b3), the received Attr is greater 
than the local, so the local RIB is not updated. Similarly, the Attr sent 
to AS C is 14 = 2 + 12, which is smaller than local value, then updates the 
corresponding route entry. AS B (b1) and AS C (c1) send update message to AS A (a1). 
Then, AS A updates the optimal path for reaching d0 in AS D based on the two messages 
received from AS B and AS C, in which Attr is 19 and 17, respectively. Take the example 
from a1 to d0, for a1, it will choose c1 as next hop because the corresponding path has a smaller Attr value.</t>
        <figure anchor="Figure3">
          <name>Diffusion example: diffusion of DIT update messages and RIB updates triggered by a new route</name>
          <artwork><![CDATA[
                        +-------------------+                                          
                      +---+-------6----------+                                         
                      /b1 |\            /|b2|\                                         
                    /-+---+ 5          2 +---+-\                                       
             (3) A /    |    \  +---+ /     |   \ (1) A                                
                 /-     +-------|-b3|-------+    -\                                    
                /         AS B  +-|-+              -\                                  
+---------+    /                  |(2) A             \    +-----------+                
+---+  +---+ /-                   |                   -\+---+   +---+ |                
|a0 ---|a1||-\                    |                     /d1 --2--d0 | |                
+---+  +---+  \                   |                   /-+---+   +---+ |                
|         |    -\            (2) B                   /    | sd = 10   |                
+---------+      \              +-|-+              /-     +-----------+                
   AS A     (3) B \      +------|c3----------+   /-(1) B      AS D                     
                   -\    |     /+---+\       |  /                                      
                     \ +---+  3       10  +---/-                                       
                      -|c1 | /   SDN   \  | c2|                                        
                       +---+------6------ +---+                                        
                         +-------------------+                                         
                                AS C

           Update Message                               RIB                         
|----------------------------------|     |------\---------------------------|       
| (1)A|   AS D(d1) -> AS B(b2)     -------- b2---- New Attr = Attr:maintain |       
|----------------------------------|     |------/---------------------------|       
|  Des|Next-hop AS-path|Attr|Des-AS|     |  Des|Next-hop AS-path|Attr|Des-AS|       
|--------------|-------|----|------|     |--------------|-------|----|------|       
|  d0 |   d1   |   1   | 12 |  D   |     |  d0 |   d1   |   1   | 12 |  D   |       
|----------------------------------|     |----------------------------------|       
|----------------------------------|     |------\---------------------------|       
| (1)B|   AS D(d1) -> AS C(c2)     -------- c2---- New Attr = Attr:maintain |       
|----------------------------------|     |------/---------------------------|       
|  Des|Next-hop AS-path|Attr|Des-AS|     |  Des|Next-hop AS-path|Attr|Des-AS|       
|--------------|-------|----|------|     |--------------|-------|----|------|       
|  d0 |   d1   |   1   | 12 |  D   |     |  d0 |   d1   |   1   | 12 |  D   |       
|----------------------------------|     |----------------------------------|       
|----------------------------------|     |------\---------------------------|       
| (2)A|   AS B(b3) -> AS C(c3)     -------- c3---- New Attr > Attr:update   |       
|----------------------------------|     |------/---------------------------|       
|  Des|Next-hop AS-path|Attr|Des-AS|     |  Des|Next-hop AS-path|Attr|Des-AS|       
|--------------|-------|----|------|     |--------------|-------|----|------|       
|  d0 |   b2   |   3   | 14 |  D   |     |  d0 | c2->b3 | 2->3  22->17  D   |       
|----------------------------------|     |----------------------------------|       
|----------------------------------|     |------\---------------------------|       
| (2)B|   AS C(c3) -> AS B(b3)     -------- b3----New Attr > Attr:maintain  |       
|----------------------------------|     |------/---------------------------|       
|  Des|Next-hop AS-path|Attr|Des-AS|     |  Des|Next-hop AS-path|Attr|Des-AS|       
|--------------|-------|----|------|     |--------------|-------|----|------|       
|  d0 |   c1   |   2   | 21 |  D   |     |  d0 |   b2   |   2   | 14 |  D   |       
|----------------------------------|     |----------------------------------|       
|----------------------------------|     |----------------------------------|       
| (3)A|   AS B(b1) -> AS A(a1)     ---|  | c1updated by intra-AS notification       
|----------------------------------|  |  |----------------------------------|       
|  Des|Next-hop AS-path|Attr|Des-AS|  |  |  Des|Next-hop AS-path|Attr|Des-AS|       
|--------------|-------|----|------|  |  |--------------|-------|----|------|       
|  d0 |   b2   |   3   | 19 |  D   |  |  |  d0 | c2->c3 |  2->3 18->17  D   |       
|----------------------------------|  |  |----------------------------------|       
|----------------------------------|  |  |------\---------------------------|       
| (3)B|   AS C(c1) -> AS A(a1)     |--|---- a1---- New Attr < Attr:update   |       
|----------------------------------|     |------/---------------------------|       
|  Des|Next-hop AS-path|Attr|Des-AS|     |  Des|Next-hop AS-path|Attr|Des-AS|       
|--------------|-------|----|------|     |--------------|-------|----|------|       
|  d0 |   c3   |   4   | 17 |  D   |     |  d0 | b1->c1 |  3->4 18->17  D   |       
|------------------------------------    ------------------------------------                                                                                                             
]]></artwork>
        </figure>
      </section>
      <section anchor="delta-trap">
        <name>Delta Trap</name>
        <t>While Random Number Confusion solves the destination 
direct connection issue, there is still a trap of information leakage. 
It can be drawed from a mathematical perspective. 
Suppose it is known that x1 + x2 = y1 and x1 + x2 + x3 = y2. 
Even if x1 and x2 are unknown, x3 can also be calculated by 
using the difference value(DRT) between y1 and y2, i.e., x3 = y2 - y1.
As shown in the <xref target="Figure2"/>, the value of AS 3 can be 
obtained using the aforementioned difference value(DRT) method 
by A 4. To solve the problem, the document proposed Enhanced DIT.</t>
      </section>
      <section anchor="enhanced-dit">
        <name>Enhanced DIT</name>
        <t>Delta Trap (DRT) is triggered by one path which has one more 
hop (itself) than the other of same destination. From the perspective of 
connection topology, triangular structure is at risk of data leakage.
Based on this, the document design a private number comparison 
algorithm leveraged by homomorphic encryption, which is capable 
of comparing paths in a triangle topology under guarantee of 
data security. The comparison result could guide the logical 
removal of non-shortest paths. It includes classic homomorphic 
encryption algorithm Paillier and a private number 
comparison algorithm.</t>
        <t>Paillier algorithm randomly selecting two large prime to generate  
key. Then it can process the corresponding value by encrypting 
and decrypting. Based on Paillier, the private number comparison 
which is used as an independent module of DIT to patch 
the leakage caused by Delta Trap(DRT).</t>
        <t>Private Number Comparison firstly detects the triangle structures 
from the network topology. Then it will compare paths, comparison 
and path selection would be accomplished by communicating 
with each other. As shown in <xref target="Figure4"/>, suppose A, 
B and C, each of which is responsible for local values, N<sub>A</sub>, N<sub>B</sub>, N<sub>C</sub> , 
respectively. First, A sends encrypted N<sub>A</sub>, En<sup>A</sup>(N<sub>A</sub>), to B and C. 
After receiving the message from A, B sends 
En<sup>A</sup>(N<sub>A</sub>) o En<sup>A</sup>(N<sub>B</sub>) 
to C, where o represents homomorphic addition calculation, which means 
En(x) o En(y) = En(x+y). After receiving the message from A and B, C sends 
En<sup>A</sup>(N<sub>A</sub> + N<sub>B</sub>) o En<sup>A</sup>(drt<sub>C</sub> ) 
and En<sup>A</sup>(N<sub>A</sub>) o En<sup>A</sup>(N<sub>C</sub> + drt<sub>C</sub> ) 
to A in the specifified order. After receiving the message from C, A decrypts and 
subtracts the two values, De<sup>A</sup>
(En<sup>A</sup>(N<sub>A</sub> + N<sub>B</sub> + drt<sub>C</sub> )) - De<sup>A</sup>(En<sup>A</sup>(N<sub>A</sub> + N<sub>C</sub> + drt<sub>C</sub> )), 
and get the signed delta value DRT<sub>C</sub>, which will be sent back 
to C. Finally, according to the value of DRT<sub>C</sub>, C and A can determine 
the priority of the two paths, Path<sub>(C-&gt;A)</sub> and Path<sub>(C-&gt;B-&gt;A)</sub>.</t>
        <figure anchor="Figure4">
          <name>Comparison example: communication and computation process  of homomorphic encryption-based private number comparison</name>
          <artwork><![CDATA[
                                                                            
                           +---------------------+                                     
                           |                     |                                     
          |----------------|     a=En(NA)        |-------------|                       
          |                |  DRTc=De(c1)-De(c2) |             |                       
      (1)a|                |                     |             | (1)a                  
          |                +---------NA----------+             | (3)c1,c2              
          |                                                    | (4)DRTc               
          |                                                    |                       
          |                                                    |                       
          |                                                    |                       
+---------------------+                             +----------------------+           
|                     |                             |                      |           
|     b=aoEn(NB)      |-----------------------------|  c1=aoEn(NC+drtc)    |           
|                     |           (2)b              |    c2=boEn(drtc)     |           
|                     |                             |                      |           
+---------NB----------+                             +----------NC----------+           
                                                                                                                                                                     
]]></artwork>
        </figure>
        <t>The specific process of diffusing is showed in <xref target="Figure5"/>.
The received BGP message will trigger an UPDATE operation, after which A can then specify 
the downstream of subsequent transmission. For cases that the direct connection is the optimal 
path, as shown in the left figure, A directly diffuses the message and uses an identifier to notify 
the downstream C. For the cases that the direct connection, for example A 
to C, is not optimal. As shown in the right figure, then A will notify 
this update to the directly connected downstream node B instead of C, 
and then B will forward this update to C. 
Then for C, the path notified by B would be accepted as the optimal one.</t>
        <figure anchor="Figure5">
          <name>Two types of diffusion constraint</name>
          <artwork><![CDATA[                                                                                                     
                                                             |                                    
                                                           -----                                  
                                                             |  Forbade                           
                                                                                                  
                                                             |                                    
               |                                   |        \|/ Enabled                           
              \|/                                 \|/        -                                    
           +-------+                           +-------+                                          
  |---------   A   |-------|-         |---------   A   |-------|-                                 
  |  |-----+-------+-----  |          | |------+-------+-----  |                                  
  |  |                  |  |          | |                   |  |                                  
  |  |                  |  |          | |                  -|- |                                  
  | \|/        |       \|/ |          |\|/              \   |  |                                  
+-------+------|------+------+      +------+-------------+-------+                                
|   B   --------------|  C   |      |   B  |--------------   C   |                                
+-------+             +------+      +------+             +-------+                                
    |                    |              |                    |                                    
   \|/                  \|/            \|/                  \|/                                   
    -                    -              -                    -                                                     
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability 
Considerations</name>
      <t>I2BGP introduces a new field Attr based on BGP to obtain the message 
of link in domain. The transmission and use of this field is similar to med 
and local-pref in the BGP header.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations related to this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security 
Considerations</name>
      <t>Owning to I2BGP is based on BGP, I2BGP faces the same security risks 
like BGP. A BGP implementation MUST support the authentication mechanism 
specified in <xref target="RFC5925"/>. 
The authentication provided by this mechanism could be done on a per-peer basis. 
BGP vulnerabilities analysis is discussed in <xref target="RFC4272"/>. 
Specific content has been explained in <xref target="RFC4271"/>.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), 
which is an inter-Autonomous System routing protocol.</t>
            <t>The primary 
function of a BGP speaking system is to exchange network reachability 
information with other BGP systems.  This network reachability information 
includes information on the list of Autonomous Systems (ASes) that reachability 
information traverses. This information is sufficient for constructing a graph of AS 
connectivity for this reachability from which routing loops may be pruned, and, at 
the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set 
of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These 
mechanisms include support for advertising a set of destinations as an IP prefix, 
and eliminating the concept of network "class" within BGP.  BGP-4 also 
introduces mechanisms that allow aggregation of routes, including aggregation of 
AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC4272" target="https://www.rfc-editor.org/info/rfc4272">
        <front>
          <title>BGP Security Vulnerabilities Analysis</title>
          <author fullname="S. Murphy" initials="S." surname="Murphy">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries.  There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
            <t>This document discusses some of the security issues with BGP routing data dissemination.  This document does not discuss security issues with forwarding of packets.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4272"/>
        <seriesInfo name="DOI" value="10.17487/RFC4272"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC5925" target="https://www.rfc-editor.org/info/rfc5925">
        <front>
          <title>Protection of BGP Sessions via the TCP MD5 Signature Option</title>
          <author fullname="A. Heffernan" initials="A." surname="Heffernan">
            <organization/>
          </author>
          <date month="August" year="1998"/>
          <abstract>
            <t>This memo describes a TCP extension to enhance security for BGP. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5925"/>
        <seriesInfo name="DOI" value="10.17487/RFC5925"/>
      </reference>
      <reference anchor="RFC5492" target="https://www.rfc-editor.org/info/rfc5492">
        <front>
          <title>Capabilities Advertisement with BGP-4</title>
          <author fullname="R. Chandra" initials="R." surname="Chandra">
            <organization/>
          </author>
          <author fullname="J. Scudder" initials="J." surname="Scudder">
            <organization/>
          </author>
          <date month="November" year="2002"/>
        </front>
        <seriesInfo name="RFC" value="5492"/>
        <seriesInfo name="DOI" value="10.17487/RFC5492"/>
      </reference>
      <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760">
        <front>
          <title>Multiprotocol Extensions for BGP-4</title>
          <author fullname="T. Bates" initials="T." surname="Bates">
            <organization/>
          </author>
          <author fullname="R. Chandra" initials="R." surname="Chandra">
            <organization/>
          </author>
          <author fullname="D. Katz" initials="D." surname="Katz">
            <organization/>
          </author>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <date month="January" year="2007"/>
          <abstract>
            <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.).  The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4760"/>
        <seriesInfo name="DOI" value="10.17487/RFC4760"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vc23IjR3J976+o2HkBggAkcrR2mLGjMIdz0WzIs4yZ2dDa
DodV6C4AJTa6oa5ugpCoH/C7f9Bf4pOZVdXVuFDUZSNsbuyIQNclMyvz5KWy
OZ1OM9fqqvhPXdaVuVRt05ks1+2lstWiVs/U9crkt5nr5mvrnK2rdrfBsHev
P73J7KbhCa69+Pzzf/r8ItON0ZfqralMo0v17x9e33x9df36P7KsqPNKrzGv
aPSina603elq+Z3FP1N7MV9upp9/nmWtbUuMeWWcqZxt7Q9GvavaRk+Leq1t
hQ+LulnrFlQo/EYPTRMefqi71lbLTM/njbkDhRcv395kJXa4VKbKbreXWabU
VDUyTm2auq3zuuQveaXKtNNXRF+WPVOFbkHKxecXF9Pz8+n5P2SZ7tpV3WAV
WoPoNIVt6wbzhbWvhCn1Z+IK39YNdn5p7He0218re2caMLVT9ULd1K51ClJX
n0xp8nq97iqbM2MOM/O6A9u7S8jeVhpfGHBYXiqWl5fdP8+7TTszRTfLK4wA
UULFjbE/rDqi47r+jWT4XXOsswmrDrYNe35trPrmtzLtdyu3jzD3r12+0rX6
t9XvtNku/2F1iqlvTFWA89+NsW1xwFlWiTrfmUuM+/Dm+ouLfzy/VFlmg6LT
k2w6nSo9dzCEHKr5sm4K06i30M+t3qkbr8ZqBHUfKwtCDlScjQXqW1f1uu6c
cjvXmrVTTVdVNA7m9On6ZqbetTQ/75rGVG25U+3K4Bl+iQvleqPnpSGuIbii
pNnrrmztBl9CUSqTM9tqbtqtMZXqqsaUILWIRIm5uonDWSrteBNHpo416fdg
ijPwQ+TMO1u2RCI9NPcb01hT5Tz89dubWZZ9wveMAIuu4t3pEU0WNmmNtsbM
nI7aKCy9rZtbpfPcOKdsgilb265UjX2aZL6bqa/qrcF5T5RtIYGqqlvsVUIu
4KgE6UQZjh0yaM1gQStUe4QCFTpfWSwlkt20dg2YLExuCVhnn1YgFUjZrSF+
kvmmdsYJkE3UdmUhsMK4vLFzfL2qt7RiPW9p7SJiZtj5ESp4ZxJ5PBNPgpuJ
tq1tUZQmywh966ITqfqfH5+BMujA2v2UvUh+Bpqpjqim0Q2JzEEXQIOrSy8H
v1w4f5ALBeh1KaqSVqVu6AC79RzbYHhQFXX10anRoYKPZ9c4FTilQo6WlocV
AbaxLkm+0+X03Y38d2sbPDX5qqrLernjw8Z5rGt8bRYLm0Pt2tkVHQzJup3w
cqQn0TowfGsLAy4LsynrHfb1ehsonRBKkIIZBbKgttVO2fWmbuCCW7gpqGhu
6PhZZ/Gkqe/8JqbhEyXVp1M0DQwYMmjMwi4sm7HLVwAWtsllo6sO4gJCTVjT
S3hkPmoIFqq8ZBOCFhg8htDg/Dsy2pW+s8CKAooswid6HTSmmgGWgh14hCC6
pqW9NVECDkhTlqSY4Hmunc3xyFY5wwOdr74lGlb1xsHp0qD+MK/64/vo8Wl0
9XFMEtRqo3F80wAXa9M2WJpQzWvwJX9fkkHT4nI2K7skUxYdA1servkz1osI
9OOPHnp/+mmmPtKXhLWtWe4g3aVuCmBqWQbgohm2KizZ4RruGco+L3V+O6/v
lZwuOABKKIKJY/Zu06jlwAKhjIbOnvnBskSxTYOgxLIZ/E5jRoSMO1PWGygj
TkRUkg7uixngHtYI6SYBVzGMuJLNpnpLKvsJTgiyH71692nMiIag0LU/w1RA
LxLLHOaEMy8K7GWZFEXeabMpLX8D04HnFQekyZtBY4FC5XSDWM7Eo5kpUMAL
rjU0kBh5RFK0fyl6SopNtOlWk1rc6Rz7tOKG4PjFKPgQCaJoqMB7xcgxhCRe
xK1gZxhGhx8WDBvxGV2TyVUSDrw48pNlYOVSKXJki4ZpWHmK9k+2mIggiWcH
V6ab6RPVigGwSA/6pKxO755lVx8/u/po3OURa/Vuxgb/DfdBWnjJfLkNKAGV
ESuFj1QjWYD1tjKMkIh44FvbnVBj7jn68dbvnF6SqOr1kAlagLXhmHuFlD9A
ylD6xngId6rbAFdzEIF5mEQCyDHH7dZz0AiFApq3GqwUTbs/FzgHdDkyz6UT
a+FfNxhRsp468iyEXVHl/vIB1DJA19WEOIHqe2nSqQDIaUVAdrPbRFQGX/4j
7XJ2+dguf/vtO3ww33fwkOKb6OlfIbRrktzH3FSwgBpx+qFmMz4570z64MXV
YBvnSGYBuTXp4pzZXbx9eePhFEIKO+g59HoQNKwQqZjKA8kemRTKHPtBevfs
GYB+Q36XrCTNK1/f07dQFjJtMhrSqxA7ITErC0YwHgVzVF6YcMOmYRgI2G2r
24HTRpbddm5iZsvZhLRDwzPPwSEiBvgieKT8FpFMWcOFEcJNvCMzbT5jDUrX
wlnpamjxMIPK+RSdApHvassQSq68gZ8i+N8dp4xWg3/bAMoxKsTnNLaa8GkU
dgHuCAh0C88771qzD+muW69xRIQrAO153SKTRwB3q6hcoEaR0TEfKmAFKkfp
jX/u5XFcCGNx5zCwnGdJhI+Ae07uVwJ30A8qIqGzd6TciWuceJfYMnAOIw8O
R9jVgBi2Y3OvKZoX7Km75aqlY533NIg0dSGh5Ew06saD/00Ef5WoY5bx870M
gZDCxxVuxdpFYQOxglAuxzaMcj71YZVLp0ODTK7J96VrckjGTK01mfkdh9oD
pGyB5xLlyil6A3Q99qcL+pyHBdyAM1IrxD9l7WN5SZnIL7AkDqEBuQFk75ch
cvd3OEhRGMZPxhH1ojWVd4KMYZbC+f3hLErvBmBDwTFgV0QyRQxE6eSrcOQT
RINv7LJrDKJBOpItdtjWHDD2Wa0zDeJgJUCYl5QZqPzyhoLUK/G0X6grCUXV
CKHul0qf878X/O9z+jdXYgs866XMugizZNLcj5upN7DCsM+knyJa76jq0Irl
wUkimSFACjUAGosMoBaOfTDch+ScW0Y6rhJTcjmkZIqZetlRfKcWWHuSJC9B
+yF5ZhRDjKZ4kw9xwsKrQsgu1saDEgGH85ST3AgFNLwxmqhogV38NfTq22+/
pQLe4OcMaH527AP/nsVf5ecM8j3rPzyPHwYPpv3UhydulJL0sD8VJ4rDTz5c
JL8/H05lIg6WfMLPQxY3fHhs3PCn3y57+OhV+hdMf7hGTE0a+Zt3/w18/9Jd
nzj1UWIe9jVr8HN2/sdTj6Jmnfg5+9kRpDXz7MfLZ96GFNfMX/zhtfdYYtFT
iauPpQR/+Eks6S847TtrtlxH4VL5zwZtHHzXcNVxDgMHFaJs6/2TO4D2wzCd
oI7iuAaJqS5jMjaI3ntEN2mBzKjvumK5HoYinNQnZR0ulxCWCDAyEzU7A+Be
2RXe/aw3lFHsJ41JYMT7xRzI+lqYYXeRgF8kZKKu8KuETBxr1Ay8OBfrVsIj
ILXZhWTRIZXQhMpAt1eS9ScAKqVc5J0LW/gw2Rc02VUk9caQMSOUo2V9HWzH
H4iOpqOqBfy31OdYqA1LLd1OKIKoFzZESMi6CNoVUNpUqd/UeUMhWqyI9O5F
gl9fT5khslayKR4sEMquQvbm+sDG+wtRqFjBoCeU4XNFzn7fGSpXrLW7DRp2
JJoR9n2lfCjLig5D5UjV8cg01lERI85bNnqzErna1u0LytxDaxyC1XI3e+nj
rd4NSkhENQyqCvHvxwrhFGHvrTuqYExuzPF3kAJxsDU9E9jHDSvrcKimIAGG
lXkVKs9dLchd+hrbvhmSwfniV3DQNjmcDRljdRj6DQMzPrO5ofVLA1NF/kNn
FA9NI2qvMFbV80Xncl9OiDVV1vDKdSQ1rpyYvJMSZZ9L+Occh54mxGcdUvym
8i6Xd+zatlLlTGeGXWBQroOk3hC0lLSp8SboQw6YMYQwCLD76DboertqKCHw
BrIFUBkE7WL4XMCQenxagRAUQ76QczVaTgfWzVMlYv6qXuN/zQZiUK9jFr5f
3ksgaJVM4OE167CImJH44GbjEHKF4v5QiOg7PC6SSqkAcZp7IU3oypavRXoa
rlMaqGoN0KK6LTIhj1112QWJHhbUGIV7coUDHSsRoawWivJaQccLzgL7fcmg
A1iI/ngsx3ic/2ptyOZjGcTFOyWRN6W+wQ3t6GRYnZlXRdkRBMMG4snfbaAV
LSGkHwNiuKpBh9x52v0OXdXvUTd2ySKlzejKzSXxeKiP3m9K0WsdKup0K/jK
jF5XIz2u8e98PFYvlK7P5hM82TIa4Wu+AEyYYiJi4UdhhTiir+6kIxhB8f//
+a//ZnQDsIO/TS16Ilq9L0AmlkXB6VAvmVhKoCUIvxhC1TfkTWiDpJgW/OlE
TCMh3yb+9s4MFL8fJYRvjyzsbyf9fezx5QeDTu4hZZhkarxvZGVzmOsW4j3n
NSVdhyS7tUQ5p7bDc8JSiM8an1zqGJIouiyi6jS77rj6kQWTI6L7XKAdFRL4
xvIEa3S3c+wB3NayZuNxyNsls1zpO7lbSVWdMIIjkntgx0x8uYRfEG9cxOO8
X185yzFryA05AmEpDun0rHIxGF78rraFHKMvAgqEkiMKQW2WvbGNawHyW8NB
w98rZnhKyKBCzOARtaFNQnU7OHGe6PYLjpP/e3EGwgy40bU42RMXCOSzQqFo
/65nBX8L2tjxSMmybU0El8pAr0C+Y2MD/0XXhGhG3Gh6f4nzpzv8SVpPTDwV
OOdqa48tIBsAWFPV/n4EBK0p5Y39C8HF51xbXRnfBeHvckLphB2RL5l2G4jP
6HWcKl7Vzsxskl4MYBUAIAdmk4CadD3KlpwTkKszNZf+AioCSq6y8JeX8Dyd
N3qW21yAjjszchL2bVVvGZ4sG3xdRV1b1F1VeGGEy4DDOyo6G5jPLPY5iLWI
BIY3ZcmkeSOVUQpsTsifoHaxEOQXejXHqIBLxI+uZVL5GjZCFuCFrlspLCPr
MFR0r6gFgSpRlE5wNLaFhvtb3lN70ynKlv4OtqqrKTS4DUVjr7ievXhfx7W2
WA3UztexfEwXilcXVLwiiSIffz7pj4lvsp06lycXSemUz7NJK7oJ5Vw+99Eq
RM5DaH7Se8LLpZbljbU3niPMBchh0xkRYeMjxA4N9n4T6rq85ZH76EQJmNLj
R0AKSUG8m0TVO04hgy6TOBnWsWExdNEH5L1VmFhSYR4oHMvA7Ny4oWS+OyaX
gCYxDgHiUXMX2RnnlwKj132vCacIdK0eGlRODOGlfNoDq+RWB8SXq7rgDQr1
QfKg93LJgOnIh1gm76rYgJDUJyKSSXzLeosNKVdu2Ot5X5qmFbQE+JY2C59a
OOrh+XMHy+JLgKXlC+yQlC0WzkhnCYEX43nQ67zmDJ6uJ2KVgce0yvdNievy
xwy+GVIFpxuDQzP+mKlHp1WvJDME9CZZob9yCepKhjdM6xjXbGUpY2DM9AWS
fryfq4vvdM7gFP2kV7VXQrjPgY7vE/QnsqgZpFTo4xJBDjMgn/WELJuLGSll
E1DG1R1/eV3vX7mIa9hy3RwikdwRgdlEckfPmNSu+BZMPCUgqKTcDeFWVHoi
2VELTMs3j3x1U8SroK3kEbp0NR7SN2w1RCxnnBCST9BC4gtYXLDUU6YprY0R
LkXJG25GAgpf+WvZ7zuN3I5D3qIHlD0796XIBCJY9QftTC6NElgQnB0LDXwT
bReL0DgWjDr63NjaJSjXbah1N9SZqIZ3LBsnIwvFgzQz9xcNSnEVNhuUec8e
/ZQNqskPj38Kgxl9fSVcCd6mn56HWvMvWleIOutJPDtBflJpTsrgvrotxeik
ch0r0wcl84fhAxD+xdEHx/fYr4/H4vZFKG4P+ryPlnZCh4AL5W1KCKgDQ31C
mJ5l33B96AQoC9S7Qw+1H2UH7JegnGrk7JQ0RbKb/RqG917cVevz+qLR2xAA
6GHnCOwhpMgzaU1wxjsDju4E4O7PESfeXyBg3J2zYYQv8M9z+hYBw+s7wtAF
PeIRF5w9dBUvM6FxER0OLrQhjgBp/iY9D6HC6NWHT+OYC/jtdxc+2A3bqyke
za5OB01qsh99PD8o5vVUaPIra+mdMsUporzjBf2kebNPR5pLJ8f7mdRr6bgs
OPxlrUm/oZJL0CG/FxVPGrtcmkYkRgEsAxqFrfSB+0WpaD5CWmjKxZhOziMQ
h65UJ6IYJNG02RvSiEQFpL8hql1/W4+94Yyps5McAKLiThQRusFRErUTkLsL
yvcy9FcRpO4JAQTYJTdX+r4E754TD9gn7iUFoViRmT5VgwkOKukS70uecoPO
ya1wQf0VIZlGloKdlx1Sbdi6iXwEA5faS0KZL7pJQ86ys/5SB4uxOUFraqgI
rUNhP7SxQXrdChHS6C5XQYggS2phzE8wlYjgRsPYrc9dnyQ1aFQ/Ka4jwRCF
NxL+ka5va9/cjFXXHG8v+SUarK9uzU68mHSfh1jRRyuhPEfLiFHggAL9/qIp
lPrg3lTUiEDZpE8Kj3ITow52wNIskXRp0o1gJ2dNAZ/la/xcHHII4Psgfd+e
Zn1XTETluPNCaji+G9kDdNSdqP/JVVLo7Q96JVUEEhyHesKV8ao4GZwZVZmH
Mfk2NHv1l3gxWAhveEDAHH5wCuPbYKBfKQAG8HuOjNF5YL+aqJe85fXET130
cpYDdZYsiCLqsiaNliLARL3H3Pcv8f9rtV9X5ZrX5IpSyMIlZe33f3Ld/Mur
P31G/yEGwmFDsxiEJ0A9jNnImM2Xo8GMMQennl7wxvEvPKOxsTt20JLJzAkN
jy5bH3360j+lPa8JUsjVJvXcw8IgNyjFrDO2lBhdEQGje66X76hcTp/OduOn
8CCXpxN1/QRO1Nke6XuDR0XTjnnEtZ8gnT9PkE787J+GBc7UsUUpZQ8+11/l
cmzO5cAncA15XwWw8OXYbs71QW97gCmvh69MSvtsdJTaKB81ENBx6seIHYar
jh4XunqCSMZyMUAZKQsFDo/iCEYhH0IcTBpkh9xeBZSbU+mDVJLMzN8fDq69
gWZ7q1zz1leM2bELM4Dt4G2E2GAmrV2j6+mXV31zGH18yd/QJe+xNqgTsfQj
/SZHu14eHh2rX8B83uvx/thh49TjhPXUDAh4GBVtOc5fvDKj/Hw8pf9cjPsR
DydmPc6YzBqdj/VgYE/Me32E7AeacHy/n/l5GD0f5+eT/OJXzv5iPCrKdpz/
uun/D2bFbrvHtYV++ix1X5sPtzxJxKkHD790kfz8hSYf8j4/kyMa/4pFfhdK
VH7xYk6kRDr6ReaeyPn4ZGfaaYk/TsnoYjz/u7Dz91skSOD9/OnK9j7fU7ZY
iXgeKhFJdOqvCC7V4IVfubRNWgBCtM595scyDF8gOxmAh4rGv+gKjjrcG15T
hFiEa96jrxXFdj65jU371/Y6V4av4fQvlaYBAujnFwdsqNxLSjZ47YB4jxed
ocGF6yR2bSlnpcZuIyU9jmqnCOsWIWLpbweRFWTvrt5fPYFLfv3X35BWteJZ
+WCWCi8gh8JiSIBpl4+hgPQ0ecY+PS9SN5Ccb2Fb6Dy0pXPrBr+aGfahLN1J
cZ7fjcqy89mn65vP3iWvkd51JeV+fNLWOP+nDKSNT6oBJGHMkuAGbIe3q/Ze
4KG/WEDFE6+aa0OlfOu4Icb4/J8LuiV3MSLEwZMlFVVb5Ynao4WDGSkzr3Sz
PugJiZ2hEO4FvX2bWEbcHmdfb1Z1Sax9Gr4LG5+o2EMVVu6nx+5TqbAgnV9I
Bz+9eKYDK/xuVmlzW3cOSSTS1L6zMSg1NSFxL6mvaMu9OVVojGTUoVtRkmTf
omjoUj3eHVCCOC/N4B3z0Hyf1gP5Xf+S36qXDjKR0vNZ+vbRnWlApRdYKvtd
0IKiNnIBwG0Yeq8C0Atp2NUVNcFHndIacIxOkWYYQLeXXUX6vNClo2uvhv4m
ArJSBLlpRX2fW3p7uXX9fb4IMF5E9HT6C1LpcV3sMIvs8iqncmVJDQjyKteh
Je4PoS3Tvw8xGf4ljMngz3NMwp+smKR/5mHyN3rGo97SlFfQqq9tuL20lDtx
y7RgfCVtv7Z/bZ6ShCz7X1TQ549TRQAA

-->

</rfc>
