<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-21" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="18"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 78?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 82?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against source address spoofing. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>Within the access network</t>
        </li>
        <li>
          <t>Within the domain (i.e., the autonomous system)</t>
        </li>
        <li>
          <t>Between domains (i.e., autonomous systems)</t>
        </li>
      </ul>
      <t>Access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches and prevent hosts from using the source address of another host on the Internet. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>However, access-network SAV mechanisms are not universally deployed. Therefore, intra-domain (i.e., intra-AS) SAV or/and inter-domain (i.e., inter-AS) SAV are required.</t>
      <t>This document analyzes intra-domain SAV and focuses on deployment at external interfaces for verifying incoming traffic. SAV at internal interfaces is considered out of scope. Within a domain (i.e., an autonomous system), an external interfaces may connect to a set of hosts, a non-BGP customer network, or an external AS. As illustrated in <xref target="intra-domain"/>, the goals of intra-domain SAV can be summarized as follows:</t>
      <ul spacing="normal">
        <li>
          <t>At external interfaces facing hosts or non-BGP customer networks: Prevent them from injecting packets with source addresses they are not authorized to use into the domain</t>
        </li>
        <li>
          <t>At external interfaces facing external ASes: Prevent those ASes from injecting packets with internal-use-only source addresses into the domain</t>
        </li>
      </ul>
      <figure anchor="intra-domain">
        <name>Goals of intra-domain SAV</name>
        <artwork><![CDATA[
+---------------------------------------------------+ 
|         External Autonomous Systems (ASes)        | 
+---------------------------------------------------+ 
              |                           |           
              |                           |           
              |                           |
+-------------|---------------------------|---------+ 
|Domain       \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       |Non-BGP Customer|         |     Hosts     |  
       |   Network      |         |               |  
       |     (P1)       |         |     (P2)      |  
       +----------------+         +---------------+ 
                                                    
- SAV at external interface 'X' prevents hosts from 
  sending packets with unauthorized source addresses 
  (i.e., addresses outside prefix P2).
- SAV at external interface '*' prevents the non-BGP 
  customer network from sending packets with unauthorized 
  source addresses (i.e., addresses outside prefix P1).
- SAV at external interface '#' prevents the external 
  AS from injecting packets with internal-use-only 
  source addresses (e.g., prefixes P1 and P2).
]]></artwork>
      </figure>
      <t>Building on the last goal of intra-domain SAV, inter-domain SAV additionally prevents other ASes from injecting packets with other spoofed source addresses into the domain.</t>
      <t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms, identifies key problems to solve, and proposes basic requirements for solutions.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Non-BGP Customer Network: A stub network connected to one or more routers of the AS for Internet connectivity. It only originates traffic and does not participate in BGP routing exchanges with the AS.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section describes the mechanisms currently used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) <xref target="RFC2827"/> are SAV filters that check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, packets that do not match the ACL entries are blocked. ACLs can be deployed on interfaces facing a non-BGP customer network or a set of hosts, permitting only packets with authorized source addresses. They are also commonly used on interfaces facing an external AS to block packets with unacceptable source addresses, such as internal-use-only prefixes. Since ACLs are typically configured and updated manually, timely updates are essential whenever the set of permitted or prohibited prefixes changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded. Strict uRPF is commonly used to block spoofed packets originating from a directly connected host or non-BGP customer network.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface. Loose uRPF is typically used to block spoofed packets that use non-routable or non-global source addresses.</t>
        </li>
      </ul>
      <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/> is an advanced SAV mechanism specifically designed for inter-domain SAV. It enforces source address validation on router interfaces facing customer ASes by leveraging BGP data received from other ASes. EFP-uRPF is not analyzed in this document, as it is outside the scope of intra-domain SAV.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps and key challenges of the current operational intra-domain SAV mechanisms.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV for Traffic from Non-BGP Customer Networks or Directly Connected Hosts</name>
        <t>To achieve the first goal described in <xref target="sec-intro"/>, an AS operator can deploy ACL rules or strict uRPF on the appropriate routers to enforce intra-domain SAV for traffic originating from non-BGP customer networks or directly connected hosts.</t>
        <t>For example, an AS operator can configure an ACL on router interfaces facing a non-BGP customer network or directly connected hosts, specifying the set of prefixes authorized for use as source addresses. The router then blocks any packet whose source address falls outside this set. The main drawback of ACL-based SAV is its high operational overhead. Because ACLs are typically maintained manually, operators must update them promptly to reflect changes in prefixes or topology. Failure to do so may result in outdated ACLs that inadvertently block legitimate traffic.</t>
        <t>Strict uRPF automatically generates and updates SAV rules, but it may drop legitimate packets in scenarios such as asymmetric routing or hidden prefixes. The following subsections describe two specific gap scenarios that arise when using strict uRPF for intra-domain SAV.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc. For example, a non-BGP customer network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing.</t>
          <t><xref target="multi-home"/> illustrates an example of asymmetric routing. The non-BGP customer network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the non-BGP customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
          <figure anchor="multi-home">
            <name>An example of asymmetric routing</name>
            <artwork><![CDATA[
 +----------------------------------------------------------+
 |Domain                                                    |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-----*----+       +----------+               |
 |                  /\               /                      |
 |                   \              /                       |
 +--------------------\------------/------------------------+
  Traffic with         \          / Traffic with            
  source IP addresses   \        /  destination IP addresses
  of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  
                    +----------------+                     
                    |Non-BGP Customer|                     
                    |    Network     |                     
                    |(2001:db8::/55) |                     
                    +----------------+                     

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Non-BGP    2001:db8:0:100::/56 Non-BGP
                     Customer                       Customer
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from non-BGP customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>Although the non-BGP customer network does not expect to receive inbound traffic for 2001:db8:0:100::/56 via Router 1, it can send outbound traffic with source addresses in that prefix through Router 1. As a result, data packets between the non-BGP customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
          <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the non-BGP customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the non-BGP customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>The intra-domain hidden prefix scenario refers to two situations in which a host or non-BGP customer legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol:</t>
          <ul spacing="normal">
            <li>
              <t>A host (for example, a cloud server instance operated by a tenant) that originates traffic with a source address not allocated by the AS operator, for legitimate purposes such as Direct Server Return (DSR) deployments.</t>
            </li>
            <li>
              <t>A non-BGP customer network that originates traffic with a source address not advertised to the AS operator, also for valid operational reasons.</t>
            </li>
          </ul>
          <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or non-BGP customer is authorized to use. In practice, such authoritative information is often missing.</t>
          <t>Existing uRPF-based mechanisms (strict uRPF or loose uRPF) also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV for Traffic from External ASes</name>
        <t>To achieve the second goal described in <xref target="sec-intro"/>, intra-domain SAV is typically deployed on router interfaces facing external ASes to block packets carrying internal-use-only source addresses (see <xref target="inbound-SAV"/>). ACL-based SAV is commonly used for this purpose. The AS operator can configure ACL rules containing a set of unacceptable prefixes (for example, internal-use-only prefixes) to block any packet with a source address within these prefixes. However, ACL rules require manual maintenance, which imposes high operational overhead and may result in improper blocks due to operator oversight.</t>
        <figure anchor="inbound-SAV">
          <name>Intra-domain SAV for traffic from external ASes</name>
          <artwork><![CDATA[
+---------------------------------------------------+ 
|         External Autonomous Systems (ASes)        | 
+---------------------------------------------------+ 
              |Traffic using internal-use-|           
              |only source addresses      |           
              |(e.g., P1 or P2)           |
+-------------|---------------------------|---------+ 
|Domain       \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       |Non-BGP Customer|         |     Hosts     |  
       |   Network      |         |               |  
       |     (P1)       |         |     (P2)      |  
       +----------------+         +---------------+ 
]]></artwork>
        </figure>
        <t>In addition, loose uRPF can be used in this context to block packets from external ASes that carry non-global or non-routed source addresses. However, it may allow spoofed packets using internal-use-only source addresses, since internal-use-only prefixes exist in the router's local FIB.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As discussed above, current operational intra-domain SAV mechanisms have significant limitations with respect to automatic updates and accurate validation.</t>
      <t>ACL-based SAV relies entirely on manual maintenance, resulting in high operational overhead in dynamic networks. To ensure the accuracy of ACL-based SAV, AS operators must manually update ACL rules whenever prefixes or topology change; otherwise, packets may be improperly blocked or permitted.</t>
      <t>Strict uRPF can automatically update SAV rules, but it may block legitimate traffic in the asymmetric routing or hidden prefix scenarios. As discussed in <xref target="subsec-gap-1"/>, strict uRPF may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being dropped (i.e., an improper block problem).</t>
      <t>Loose uRPF is also an automated SAV mechanism, but its rules are overly permissive. As discussed in <xref target="subsec-gap-2"/>, any spoofed packet with a source address present in the FIB may be accepted by loose uRPF (i.e., an improper permit problem). It has limited effectiveness against source address spoofing, as it only blocks non-global or non-routed addresses.</t>
      <t>The fundamental reason these limitations have persisted is the absence of SAV-specific, authoritative information that can be consumed automatically. Current automated uRPF-based mechanisms derive their SAV rules solely from routing or forwarding information. However, routing information is designed to express reachability rather than authorization to use a source address. As a result, uRPF-based mechanisms cannot reliably validate source addresses in scenarios such as asymmetric routing or hidden prefixes. While ACL-based SAV can accurately encode source address authorization, it relies on manual configuration and ongoing operator intervention. Such manual maintenance does not scale in dynamic networks. Consequently, addressing these gaps requires the introduction of SAV-specific, authoritative information and the design of automated mechanisms that can consume this information directly, rather than relying only on routing or forwarding state.</t>
      <t>Another consideration is that uRPF-based mechanisms rely on routing information to make SAV decisions, assuming that the routing information in the local FIB is correct. If the routing information is incorrect, SAV decisions may also be incorrect, potentially resulting in improper blocks or permits. It should be emphasized that ensuring the correctness of routing information is the responsibility of mechanisms or operational processes outside the scope of SAV. Network operators and SAV mechanisms are encouraged to leverage such solutions to validate the routing information used by SAV.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section outlines five general requirements for technical improvements that should be considered when designing future intra-domain SAV architectures and solutions. These informational requirements can not be used to initiate standards-track protocol changes.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy of existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the goals described in <xref target="sec-intro"/>, preventing spoofed traffic from entering the domain. At the same time, it <bcp14>MUST</bcp14> avoid blocking legitimate packets, particularly in the presence of prefix changes, asymmetric routes, or hidden prefixes. To overcome the improper block problems, routers may need to use additional information (e.g., SAV-specific information) beyond the local FIB information to make SAV decisions. By integrating such information, routers can account for asymmetric routes and hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be capable of automatically generating and updating SAV rules on routers, rather than relying entirely on manual updates as in ACL-based SAV. Although some initial configuration may be necessary to improve SAV accuracy, automation reduces the subsequent operational overhead for the AS operator.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new mechanism <bcp14>MUST</bcp14> support incremental deployment and <bcp14>MUST</bcp14> provide incremental benefits under such partial deployment. In an incremental deployment scenario, the mechanism <bcp14>MUST</bcp14> avoid improper blocks and <bcp14>MUST</bcp14> clearly specify the extent to which the goals described in <xref target="sec-intro"/> can be partially achieved.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to update SAV rules promptly when prefixes, routes, or topology change within an AS. If SAV-specific information is communicated via a protocol, two considerations are essential. First, the mechanism <bcp14>MUST</bcp14> allow routers to learn updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> transmit excessive SAV-specific information, as this could significantly increase the burden on the routers’ control planes and potentially degrade the performance of existing protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities to existing intra-domain architectures or protocols. They <bcp14>MUST</bcp14> ensure the authentication of any SAV-specific information they rely on. Protecting against compromised or malicious intra-domain routers is out of scope, as such routers can compromise not only SAV but the entire intra-domain routing domain.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document discusses the limitations of existing intra-domain SAV practices and identifies problems and informational requirements for improved intra-domain SAV mechanisms. It does not specify new protocols or mechanisms and, as such, does not introduce any new security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Libin Liu, Li Chen, Tony Przygienda, Yingzhen Qu, James Guichard, Linda Dunbar, Robert Sparks, Stephen Farrel, Ron Bonica, Xueyan Song, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 358?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+082XLcRpLv+Ipa6cGk3N085EPmzs5MS9RBhw5apK+1HY5q
oLq7LDTQRgGkWhId8xvzNt+ynzJfsnlUFQpXk/TEbsTGmg8SGqgjKyvvzKrx
eByVukzVkTjLqyJWYpokhTJGfCNTnchS55nQmTjJykKOk3wl4cdLVV7mxRsj
nsq1mGYy3RhtRuK0yGepWomzUpZqpbJyJGSWiNfq10oX9MJEcjYr1MVRc7yz
6TcvH593+0dJHmdyBbAlhZyXY63K+djIi0zBczDAeM09x8b1HB8eRPnM5Kkq
lTmKqjWsBB/wv6Mohn8XebE5gpXN88hUs5U2BlZ6vlnDZCePz59EkV4XR6Is
KlMe7u9/sX8YyULJI/E6r0qdLSJEwKLIq/WRBT96ozbwMqHfUSSrcpkXR5EY
RwKmMUfieCKea/jBKzqWGf/Mi4XM9DvC9JE4NzD4spLi60xfqMLocgNtFKwy
BWhy3JLsr6VtNFFJNYkzaBBDuyPxUOlfEDb4nVeAH3j1aKkzGQDx5UR8W3kg
vtQyW0MPfncLSH6xHf8aqwJ243cA8nwivtKZh+S5zOKlAkj4ZROU/1zm2WJR
QZMKkCZneSFL2L4anF91lsZ/xefJu0WcytnvAOjFRDyDKRYepBfQ4VdEjnt9
S6CW2G31678I1suJeKoCqF4C3dgXTXgAykul6+kX0CgDYlnS+0mcr66fNsry
YgXjXQCTRMgb/pcQr588Onxw+Ll9vP/5/if28dPDg337+KB++/mnB/fxMZbA
mWMgID3f4G8hrLh5hB+s0Bl/Q99JXJycehF0puKqYLoTwjKUoB+wdBhBmzin
n8TW4nD/8GC8f8CTyGKhStiEslybo729y8vLSYztERF78Z7K9iqzZ6r1Oi/K
PZAzZm9W5DKZAQhjgnmPITcWhr3D/c++OBgbhpfXM1mWqxSmOzk9e9pcW57N
9QL6AfUcP3t0Kp4oWVawJrdCK2ufVrJIbry6g89ut7oy4YWZS10Cc5m9VGaw
qhLldXn4xWf7eyafl5cg1/YKlSpp1N7B4fjw50/v/wyPsV0DkdfeotKJ2sNO
Jl7AiMkyXj84dAiA/f7swRdABfAcTSaTKBqPx0LODMjouIyi86U2AmCpUDYL
kNYXMBogQyxAgUirQEQ+F+qtNiheRSjeBSNdSEsWF7VmWql4CTxgVqB+YMS4
0DMYt1wqMa+yROJ0MhVWPRjWR4ma68y2mkmjY1EEGkoA0YsShs10DF31CqHl
T3ZZK50kqYqiu6TE8qSKCZT3d4FUSC3lV1E0rEx3QD3sIhAqSwAFC1igKdtL
NOs8BygXE6drRb5WJGAMcFQmFPImtIexhCx5wXma5peIu1RdqNSIHaOU+MEy
6E+7sDn3xLe6BEan9jKOcaaMx299tIjf0RM1GXHzqsyzfJVXAByQj1rtYpeH
0FupzLY3rkOnsdkVUTRtzGjEUl7AuCmo1WQDCFmn+UYltKR6WyfiHChXBW9E
uVnj1qQgLgpV9wPUOkKnbV6DnYHUtswN7mqRr0SFKo1W00I3UJ7McvhQUHMc
C1vB/rJ6Ey/q6XUWp1WiCJ3Du3xS0w3t+MkuNE4r+oYURlLhBysnf8KxWlJB
7KBU2UUK5cVRD5PlOSnsH/Ar9euToz+EUvcnQP2z/BKwUYzsro/tHrSQTQgF
PIiKVT4h2SGYdqJQALwaNdnTbjq/m57t0qh5sYe7oBGF3YbwzjXEOS0DJpO2
qCDZ8E6Z5oTUDQafQzMDHwE7DCX3KUGM4MYh++JUcwlrJqwzQli+gKQkagDL
cq7jiWMl6tHqChCBNDQgswrci6pEggFpu1YTxzSyxTLAo12Oodd9sK3kBmfI
VAy8nMNgRtEcRLvQCzYlGz98eipgvWW+AjK1GzgCPDcGnZ5NxBQgTtMKhW+p
cAvE+/ch/q6umKUXuUyJ9jvIRREzAy6pVitZ6HcwiDRWwBgU8vfEdADJMkak
Ms8BaENwg2FzavkTIFkxe+rsF0AA9l/L+I2CEYCfly1eZcG98aTKipNgBMwB
OSA4eSDEbgBugD3VgCyH4fDdVvgcxYxh8nGeAct0IO6A9Ntvv0Ufj2//97GI
Pgj399iDXVPaGYtbsYNg77qWH8TvnU00/j6I4b/w2/9Ct9aCPmxZRv0N0XfM
ZM5/P+4NT1F/+xBiHee964Zr/hFId/2nRrcP5DkCB9wX7a342H36hJbcmW28
ZbZx/2zCw/5jP/qCp6BbgI3efv3dGjjs69fq1llTd5F9a/MYPLAD+heHrr3H
5Kc1Ju2ne+Fs93pm+64Xk3vhevZ6Fle/a2Cy0e06lASr/dE/7V1LyqKDqzah
dCnN9/rw0ormR1Y0f2jB9oxkuP0dBZ+cRdpZR2eFUePTzunBbqet+3S42+l1
q3W1RMfN/qKx0/pd5SA++u4jZ0Oa0IiEmQyY7h01UGWBKupoAOjlLAP/DkgV
bQqcZa7fCsDBZDtE9wKIUJs47YpudkvBMqzXA4qracN6LaAH1wF6twWobwPT
Tc9uqU17QVSTBYDIAMHv0wMyCAmFqFvfH4m7DauGPfP/uPN0yOa5A07bw0qn
hC9r/6cSfAG0kvo6jJq2LWEjSTRa+GQ3ewSwX3GtGcHNyPHrI6CWCdGxlLc4
1dgrrooCm7EbSTB2zb7Qm4axslLPNYz4Rm28C41GlsnTCzWyTla+zhG8AUfa
WJ8Hfee7d8W5KsDoztN8sYmitgByguVITIUpq5knZWsZs4WXZwoNy1WObgMJ
e79GpCz45Lw2109f6HIzESfo1sG+AOEvdIbhYGf7c1QghxdoUK5lUepYr6EF
ms4IYcExXyBjxM9C2R3jOWFliLvXFQZ+wEUSBTwJcgkYPmgHbNKMTqzkmty4
QqW0G2ap12BxszMt2+7pDtP5LgGK3SkCUvswnvN2zC4tFPa9QrdxtgmgyGHW
NxwySFSsjd0W8lSBKsTDNI/f8BKCCAsAUKXExjbO0CDaVC2A4leIqw7FooU+
wzHRB7GToD9ZKYQFtiCOMbrEECHSGtCcIqmUtwRnkHsQljWNWN4GGngemzUg
C6nkxMVDKTq+VELXLwS1AjBRpiIRulEwDGs5DsZDHgjTIRj2XlRyoZCbFTEa
phCMuPPi67PzOyP+X7x8Rc+vH3/19cnrx8f4fPZs+vy5f4hsi7Nnr75+flw/
1T0fvXrx4vHLY+4Mb0XjVXTnxfT7O8zSd16dnp+8ejl9fkdQMKjhjheErZli
kgOyLMk3jBx1k7f58NHpf/3j4BPwOv8Ng8YHB19cXdkfDw4+/wR+XC5VxrMR
S/JPdOsi4AslC2KfNAU/dK1LENgj9D/NMr/MBMYgAJP3fkDM/HQk/jSL1wef
/Nm+wAU3XjqcNV4SzrpvOp0ZiT2veqbx2Gy8b2G6Ce/0+8Zvh/fg5Z/+kmqQ
d+ODB3/5M1IPyEoW468CMd5OpYXBKg5K1nIdlNw0BeVfLZa4TeL+AwpCYWD/
J9oPfPngE3qJIf6fmLDn4NNi/IiUxoJk0lynQAEofVYKBgSaXRcaowWwn0gc
WWI5oa0lR8CdK2VlNkX2uLuNBhokLxSC63WqWeR39BT8F+qxNQaZdawwQgXU
ahQHZFsSt0aK1YUAKAlJnGG1TjlW154LY77CBi4f5RjcTcVzjcbgzvTRc/Cw
A/QVLDwYM1ZExUsVvxkIOSoZL6388nFgH/qppRXgEMTVUs80/nImz0R8uwzQ
lAf6xquDkZeOrIJyUnAgsWKrvB49F7DoQjel9QQ/GBcECgOs3dDJcGiKIlOt
QJZdFJtYaCOFwnuL+UyxR475EIWA3lvRAJUZBKwRFCOphavrmMKwteuSQqjt
SYFQK0CUND02ab0LZ6CFFSOMpKMPTrv8CQpIYCxOQSeA/azC7yDv9ErhEjg3
Tb1xXrC6AGQUichxTDo3IwlhrROi2TPY1rgU1evTJwE311YixydXBFNNtWgx
OG07GCrvo1tsyeT3z7/93QhANSziSV5cyoIs6kB5iocS2H7nyclDMFambiBg
XN4LZZWCnoMjsksDQ1NEZ0kpBunckDi/YAHUhZJ1y44O+iOdbwg2gHKRN8wm
ZgkrKBgeatk1sCbiFZrpl9qoUdAaoU+0iWGxyD4h7il2HFKrp0RnrDiKdIYp
TkiOgoQxCxBm6SYwgTk/MRxZpc1/nmPksrX3xDlgcGqOmJODw9sE6KHouDez
RmJWWXOZBJjNii3JBQQSjUl+y3oLeEsGtlPPt+wiS0kcx/RuZKEWgNXUkl5J
Zld3V4IF6zBDtB3jNDeGjBGZSL0kByxyF2k+A+R0RFEUPc6Az2IY54kCrwe7
nEoUJjj7zuMnp2N8Ys3wgDCvmd+SC+7WcLWEsy9tssXoRTagOcm0t5k/syUp
imZySxN4sejJhfxR4PaU9PoCvyE5wRCgR1Ss9AVCgWRY+68T4VaHS6LoO+dn
ko6pSBabJjpw0QPaXUya9HnT6B82yoms6QK+7JV1dZ1e9zkhymHINaf70HYG
lKapIgft97m97KV2DCrcjHPrKxJKhlxXynkcO6Z95JmWY2mwompmFzU+wGXl
wCRLDTvAGVxduHhDw55+/77OLF9RDgkUmssHk5pmHU36nFwXBMMEQsiyOxgL
4PcUGt0c5zsDc7hkcgcxxPR23R3pNJjawckHBBciGJQCaGaJFlfvWrzepI+w
om3kvN38GIJi5Kxarz2sgnWKNDBFEAcoImSb46xVUjv5YI2RmEF6dKYN6HEU
TC1enQOZhnxBxF3ycIT8pJCXMxgAgQIUjDkJTKYvchUYyxoM+JCoUYAulQTl
81DFEgHuMUlwbBS/DTOkLixYAQqtOcJZOaCW1RrxV6LimKeYnnQREIDSowvJ
JF9TWGcinkidVuwnJhgrouQmu+1kuFclG0IEH0lgIKsEwC/ZJmdRHQQWXIYW
3PGApK31YldmvWyb+ncmlXflWZ/pkmBJgAfC8Z02wEKTWGXgwuTGm37SbFbg
oRQY3LJRIFjtUieJygIr8LxRgMFsTnEdz8kCqNLLegrR1ZMRFuARdg3tPlun
EDKwVQcdkQnSalpD6GoTo2kX6pWSrHaZLmEoVLkuJulDTpR9BphL4nWu/cSQ
2xo1HIWf5BsKMiZ6PlckW+kTwQ0ILlRZFRmJlVqbT0QPQMjrOQZdyBRHh59k
gQ3IuFZAVTpGY9mKIZDuQL9kdIyEKuOJaMqTYXnQiCKugBo19OgJISKJwAzU
DFgDzVawk2QiwBoA/W3Dw+36AbIGCzVzpM72SQ/5wK69f0/Tj5cA39VVkKs3
7LXQWsjA6vYmShuWeZeZcYbV4f7+wVEye3B0tPfpp2SMYIkWe/kWF7xNl3kX
C6M610YlvDbPNvGvfYPDUdjivo+R+h0Mo2QXWloTLiBlv9VFXuZxnsIaa73Y
wjzzwSyvkBIDzA+jRL1d80otATFtW8HucbSPWPqMlSFL84JiJPVyZT3j4BgH
+9eMc0hrI4GvsiREMglAjfzYhinE/0C7el473Q1w3CJCcg4wwsZmVZyD3QTm
MqePnP+k2bDqJQ3vISA9ecHIlQ7dVN7N/z6ORDNlf6u/D9FQFcGWxPoNegfZ
/MEqhf+puX0+uT+1f03vOhk93H2wd5jJHuze7t2z2i0IaPfuZP0bef9O0rl3
7nu/c27+62T9B2pGBrDW6j1UcPJhgEt+DH/01gRYLvEeCkW2embf628hRJBh
PTkNkiZBb4A6NArCZliIPu+VRrY31tEMtOhP229J/Leg7kHjcFnD9X3xn7C6
4TZ9dxr6dvc2fW+63ogEcSiAW3/Nz4eROIY9azd6qd6WPy/BBBZbP0cdRURf
LXbhr28/7ef+YgzvLPf/uc/9nV8CqHXVSc9nrmLuhcqLatG7JvcZ8IvGVdfz
qFPGyXbXF7a3v2IRlFcfYJdg+lEyrc5HRj5lCqZky4V3216XONQq3NU3TK8x
IO+EGaCthpNPiLMFxT4gxYXaFtigGYTmXm1BgXeANj/WpKAX2BxiEG/kG/lY
YdMqo1JXaS3uEceunDfnkulb1xgYMAdk+LMPF+INvRtw8KZFgbaRLY+3AQoN
5lFsvWUbbKD427zGDIyGWe2AZ+sAXrC7MxtodQEJH7EOA68Nq75G86jHYvPp
58u8Sm1AXdLSmimXTmQCybvfsiQXtcDtD7b1/gSjXEb9WpHzPmI/cCvODZ17
2A7GAL8ACdbkFKKPV4k+WWEjPuTkc4Kx6+pj1malU1kgxLoWmL17Q4TbnaAT
pnArIhRuxYAPO3fo/bI+gdHdb0SB9fmfcfzhlNpw7UDD3G/EJ3ygAWM4NuRH
wQhdVlx8gvi+XGqMeAznF+ql9hfR2KBFt1hblr5Y+0JzvNxGB7a6KEeUeWV4
duZNJz9O8yoBSiouKCpoSkkpCYpkubKXEhadlbsMQA+8/ZRHQe0U8yJ2IBsV
cFGyETFkuO1VwRVQLmLE4V9xxsC9pniI2Dk+e70bHFLgHN30Ghq5HdTONUwc
ehtgk4PnszyN2GGhpOFaIIylNOKNI8sSFLBh2g8y/0yqSMg+lGUrwHwItaTz
g40gAC0NlEqqY42cZINiSP5Eg331/sNkqU33CMBEnGS+KsClcQfhoSI5oBZB
h4ApQvPYHUNDAWCxERQQ7DQUM5CDzz7tWjxLjXmGAT506WxS/ySoGrKjFVwE
TcYB3W52zGaN5QyzxrXg4WjOR4btwcKesAlTOlXGSl0lQUz9psmPx+FpiWZS
47Cb1IBPoJOuz2p0izzCPF5YhDCYDGgc4+hm/GNQXxufN9x+YIPOzuGpGbJS
xgDP1dXupBuLb6Z2WVfDaysUOFo3nOCo8zU2L8opDZuNaBQneGpoisLhyoTd
GgFhOqJXfNRqx6ggqO0PjdVwWva26QNOKKCcRTZj7gVblsThYIaCjK5mTsDZ
vy5/YmPAHmuUHYbxysn/3ZMz5w012di3bUdg+snTgjbczdZHnx4g//viev72
x8mZP07O/HFypoWrNqH8Pzo5U5+X8MrORRN6jYEyNAYaOheDCyeZPwYxCgwj
V01IetIVi6DWgwG6qro7tK0TQhUeVudYi5BMgr6yQa/CbO6XfeB2HVCPTO6V
u2BKUrXfsNblCwxcmMAbYr7OispcOvfc2FoXe8YCIzRcTlYZxJac5Xjc4pal
LFxPi9VEVFwEHVPweUvr8JEdgPECd+LYZdPrckTQ0r4mvi4uggU0jSBbUIZl
iwV5hlmvcdDIig7bBlj7sMnkCgBx5SSUMlOZoZoCvrcAgIo3ndqIUWhp2WoG
V+bgyhpqS8YXWPZVMdgqh3/n2ieu9nPEgmTUjNm5iB1WZboSzVa1QlzXW7rK
NAaov0RhqAbCEdYNqhJCb6NBTmx6h4VIV81gCgIArhAm+jOunaGT72A2Dh07
4RpZ+tra6Z74yEzhN3R71ioJjss3jUB34GgXENks7iMHq1O+6gnf4dHYfUbn
B8kLmRQ3B1y8C3UNSg65zGrTEhQD1jOXRHqmR6fL0oivgMQ6u3oRPWtmuqkX
jZV+S8Aq8SwMoOZzOskENGuuvTTE1d6RZLIm9aDMDIQlB5LCi1M4MuDiaIH8
IOGyRqvckBPJTjo5olwbGp6cGV0XDLC6ASmtWiFMIadM/KGHesf73XIgUs1e
p64P4GDZVoqCiXRKwC3zujg5AChQGX0FDNrUJZqY5H+7JswXWBItZzrVJfg1
kgomYWWZD03YxfIFBW0KaoWx+xcHOMIoD4pbcAh9lXZPSOBfqWP6dqlT1XJz
SXZZTQATww7nSaekrbHQEVcCuUpjqw8aFwrZwz9ciO0dPZIoeGqSduIMYe8q
kzozYYBAVL/OaEalLZQ2um5s2aiPVblYpL/L5xYE7I7kMVlQ0sWTaXhpjaNz
S+RsAIUDuWLFUYOAUKf64xJ5NkDAdO8dqmZ7iY2T2Z5oOeTcS1hOa/eRe++Z
QRQvsARGpqxL/zu80q4xJ4uPYogg3+bD/UwdaB81p7Y2nLFH0HyjdV7yuYm0
VX/Vjix4FW1IxJolxfVhMLVag7zlGCLFJ9HgcNkYO09mi9AHgKb1UArGaCsK
oHGAaYxkNI4t5XHzfHWjQpoKvru3PyG99dzag1wJrLVguWSLuhWzvz+Ei5+8
3BhCvzs4yhWGUevAIjoAL9Vl/zmz4Phvu2gbJkrp1q05MhCXa6Y3vXiLt6Te
rOAyHso3Me9RfVhVcmKufVtQES9Bkcb1JWz1yWR7w1SAgzZkyLcob5z/QmfS
wK4h8VvCaMCGZox3nb3x6YvgMA4WaTpLur4iirVtBrgctuIFnWm0qOhYv/2X
pbXvzwIyp1HCoCzf/LMtHGtPr5NwsUZQ0+/LyvrwjT2SjrfsEAlLykevFOkB
nvwiB8uRmJBvKGubhSN77rqirJyTHeFpE3fqh9E6ams0fNVbmZuT+RdTjnyp
BsxMM/I1kGH9J2lrf6i/wSY2wtY4IRx83wVi2eRWNwQi8DrhOhEP+fzkouBa
e+LgoFsNqNXLeIMj8U4HIUTnLYS07HM6Rt979BmJ1juFX5OzcnOKRR6Vaz5N
M+8v1eYzerZWO0xZmzrGb/p1YY+v6b1WMn8a9guQpat3oIOnzLltc8Ra7JlC
kSyLjT0VSnxHAsTy3civhg6jg8Fg7QdyH8jg6PdsXR4/8FEZy9+CfLe7cZLF
LHKg47HPFdZob2HZ3l6JitB3C+9BA+xSO3vor9FuBrswRy8JrH28dqKiI30F
YaYegxJpMhuawZmZo+YJ25Dl2wrYAxWnijjdnS9214RkFI/gXMJNRJVzHizw
WOfAgi5h9D7BOzzAGoR9WKAouRURS5usbjvr9ckI0j8Bc9WSqBVLaFS5k/0z
JDpcXqnKNGehsd5CesUyouR9w8JrHR6diCd4kqh/VygAFhz+wW3I/OnUYZjw
fLE9sQo8Byw8wetZc6xi7pkGz70DdjODXq16i0ylmZN6hyeP1YYEUccHYStS
BjE6oiy/Z1WB8iwPI2zmn3/7OwUT8XT2OpWZuwIyMAsTlKjWxrJl/dJqFq9H
HYqt/PPXz0adOGhgffn1Og+ioTLc9bHiokpR7pFhqDk92a+/m6YKn/S1UHHa
mCYMA2IVnj1C8ep8FwxdDO4kXrPgjP4JxiJLexuNiyoA7SF5UyUB3rQiMVGP
GbJOuQaSEB/w8xci8k0NKE1CNVUPSXYUOTOIRgzVEOOTRO+vB/H33dQbQt5d
QP1sfTpUX4n23Tgu0sOSOoxjbLWiXAUBE1NwIY6/DIdvuBy0G+m0AiuR5Foj
rfZqrUREGeX3nnYiMPmR7yymR3XXgAQzHsDTX1NgsGV/Mn057cellpm86qDR
TYOLxNJRnITGsBUz7qIfMHffZPllqpKFvfY9eoFtUYu/8WeDwBOpSMCisGN8
AY0ciS8lGvYvJC3ty1yl4plMgWVBSkz1L1UmvpUY43oBGkLCx9f4P9jfKEWe
KlCHx7k9HvQc3DC8ZL3CR/GILhk5zwGO0+LdZqEV2O0j8T00fYdC/Cto9iVY
rkY8rXhI7AZtxHGVzWSBpzVmOP4ZqJo3IOPPSrXGjk8keIcpfs7EwxyF9kh8
V6kN0P1Z7o4p8dXBeKYPMB/9N0h18xN2XwAA

-->

</rfc>
