<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-savnet-intra-domain-architecture-02" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Intra-domain SAVNET Architecture">Intra-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-02"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="F." surname="Gao" fullname="Fang Gao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gaofang@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="May" day="05"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <t>This document proposes an intra-domain source address validation (intra-domain SAVNET) architecture. Devices can communicate with each other and share more SAV-related information other than routing information, which allows SAV rules to be automatically and accurately generated.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) is important for mitigating source address spoofing and contributing to the Internet security. Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> divides SAV into three checking levels, i.e., access-network SAV, intra-domain SAV, and inter-domain SAV. When an access network does not deploy SAV (such as SAVI <xref target="RFC7039"/><xref target="RFC7513"/>, Cable Source Verify <xref target="cable-verify"/>, and IP Source Guard <xref target="IPSG"/>), intra-domain SAV helps block spoofed packets as close to the source as possible. The concept of intra-domain SAV in this document keeps consistent with that in <xref target="I-D.li-savnet-intra-domain-problem-statement"/>.</t>
      <t>The main task of SAV mechanisms is to generate SAV rules for checking the validity of incoming packets. The information of source addresses/prefixes and their incoming directions makes up the SAV rules. How to efficiently and accurately learn the information is the core challenge for SAV mechanisms.</t>
      <t>There are some intra-domain SAV mechanisms available <xref target="I-D.li-savnet-intra-domain-problem-statement"/>. Many of them such as strict uRPF <xref target="RFC3704"/> and loose uRPF <xref target="RFC3704"/> conduct SAV based on routing information (i.e., FIB). However, they may have false positive problems under asymmetric routing. Some SAV-tailored information, a complementary of routing information, is required for accurate validation. Manually configuring SAV-tailored information or directly configuring/modifying SAV rules (e.g., ACL-based filtering <xref target="RFC2827"/>) on routers is not practical for complex and dynamic networks, since operational overhead can be unacceptable.</t>
      <t>This document proposes an intra-domain source address validation (intra-domain SAVNET) architecture. Under the architecture, devices can communicate with others for sharing SAV-related information (including routing information, SAV-tailored information, etc.). SAV rules can be generated accurately and automatically based on the shared SAV-related information. The proposed architecture aims to satisfy the requirements of automatic update and accurate validation described in <xref target="I-D.li-savnet-intra-domain-problem-statement"/>. Besides, the document presents some considerations of partial deployment, security, manageability, and privacy.</t>
      <t>This architecture shows the high-level designs for future intra-domain SAV mechanisms. The protocols or protocol extensions for implementing the architecture are not in the scope of the document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>False Positive: The validation results that the packets with legitimate source addresses are considered invalid improperly due to inaccurate SAV rules.</t>
        <t>False Negative: The validation results that the packets with spoofed source addresses are considered valid improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="sav-related-information">
      <name>SAV-related Information</name>
      <t>SAV-related Information represents any information that is useful for getting or generating SAV rules. There are largely two kinds of SAV-related information.</t>
      <ul spacing="normal">
        <li>Routing information: The information for forwarding rule computation, which mostly stored in RIB/FIB. Routing information is not specialized for SAV but can be used for SAV.</li>
        <li>SAV-tailored information: The information that provides more accurate SAV-related information than routing information, e.g., the source prefixes or incoming directions that are not known by routing information. SAV-tailored information is specialized for SAV. It can be a complementary of routing information for avoiding false positive and reducing false negative. Note that, SAV-tailored information can also provide SAV rules directly instead of the materials for rule generation.</li>
      </ul>
    </section>
    <section anchor="sec-arch">
      <name>Intra-domain SAVNET Architecture</name>
      <t>The proposed architecture is shown in <xref target="fig-arch"/>. In the architecture, there is a communication channel connecting two entities, i.e., Source Entity and Validation Entity. Source Entity is the information source. It has some SAV-related information that can be useful for Validation Entity to generate SAV rules. The SAV-related information is transmitted through the channel between the two entities.</t>
      <t>An entity can be a router, a server or some other SAV-equipped devices. A device can act as a Source Entity, a Validation Entity, or both of them.</t>
      <figure anchor="fig-arch">
        <name>The intra-domain SAVNET architecture</name>
        <artwork><![CDATA[
    +-------------------+             +-------------------+
    |   Source Entity   |Communication| Validation Entity |
    | +---------------+ |   Channel   | +---------------+ |
    | |  Source       +-----------------+  Validation   | |
    | |  Speaker      | |             | |  Speaker      | |
    | +-------+-------+ |             | +-------+-------+ |
    |         |         |             |         |         |
    |         |         |             |         |         |
    | +-------+-------+ |             | +-------+-------+ |
    | |  SAV-related  | |             | |  SAV          | |
    | |  Information  | |             | |  Agent        | |
    | +---------------+ |             | +---------------+ |
    +-------------------+             +-------------------+
]]></artwork>
      </figure>
      <section anchor="source-speaker-and-validation-speaker">
        <name>Source Speaker and Validation Speaker</name>
        <t>As shown in <xref target="fig-arch"/>, Source Speaker resides in Source Entity, and Validation Speaker is in Validation Entity. Either Source Speaker or Validation Speaker is an abstracted speaker which represents a union of multiple protocol speakers as illustrated in <xref target="fig-speaker"/>. These protocol speakers can advertise and receive the messages carrying SAV-related information. The followings are some kinds of the protocol speakers:</t>
        <ul spacing="normal">
          <li>Configuration Speaker. The configuration Speaker can be the protocol speaker of YANG, FlowSpec, or management protocols for SAV. Any SAV-related information can be obtained from configuration speaker.</li>
          <li>Routing Protocol Speaker. This kind of speakers are same as the ones in routing protocols (e.g., OSPF). Routing information is mainly obtained from routing protocol speaker.</li>
          <li>SAV Protocol Speaker. This is a newly defined speaker in the document. Generally, the speaker can reside in completely new protocols or protocol extensions (e.g., routing protocol extensions) for advertising and receiving SAV-related information especially SAV-tailored information.</li>
        </ul>
        <t>These kinds of protocol speakers are NOT <bcp14>REQUIRED</bcp14> to be supported in one SAV mechanism following the architecture. For example, a SAV mechanism can only support YANG speaker and one SAV protocol speaker for getting SAV-related information.</t>
        <figure anchor="fig-speaker">
          <name>Source/validation speaker</name>
          <artwork><![CDATA[
    +--------------------+
    | Source/Validation  |
    | Speaker            |
    | +----------------+ |
    | | Configuration  <------------
    | | Speaker        | |         |
    | +----------------+ |         |
    | +----------------+ |         ---> Interact
    | |Routing Protocol<--------------> with other
    | |Speaker         | |         ---> speakers
    | +----------------+ |         |
    | +----------------+ |         |
    | | SAV Protocol   <------------
    | | Speaker        | |
    | +----------------+ |
    +--------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="communication-channel">
        <name>Communication Channel</name>
        <t>The communication channel is constructed between the Source Speaker and Validation Speaker. The primary purpose of the channel is for Source Entity to advertise SAV-related information to Validation Entity. In the channel, there can be multiple sessions maintained by the speakers belonging to configuration speakers, routing protocol speakers, and/or SAV protocol speakers. The concrete manner of constructing a session depends on the actual protocol speakers, but the following requirements <bcp14>SHOULD</bcp14> be satisfied:</t>
        <ul spacing="normal">
          <li>The session can be a long-time session or a temporary one, but it <bcp14>SHOULD</bcp14> provide sufficient assurance of transmission reliability and timeliness, so that Validation Entity can update local rules in time.</li>
          <li>Authentication can be conducted before session establishment. Authentication is <bcp14>OPTIONAL</bcp14> but the ability of authentication <bcp14>SHOULD</bcp14> be available.</li>
        </ul>
      </section>
      <section anchor="sav-agent">
        <name>SAV Agent</name>
        <t><xref target="fig-sav-agent"/> shows SAV Agent. SAV Information Manager in SAV Agent parses the messages received by Validation Speaker. The SAV-related information carried in the messages will be stored in SAV Information Base. The information of Source Speaker, protocol speaker, timestamp, and other useful things will also be recorded together. The recorded information will be disseminated to SAV Rule Generator. SAV rules (e.g., tuples like &lt;prefix, interface set, validity state&gt;) will be generated and stored in SAV Table <xref target="I-D.huang-savnet-sav-table"/>. Besides rule generation, SAV Information Base also provides the support of diagnosis. Operators can look up the information in the base for protocol monitoring or troubleshooting.</t>
        <figure anchor="fig-sav-agent">
          <name>SAV agent</name>
          <artwork><![CDATA[
                Messages from
                Validation Speaker
                    |
    +---------------|---------------+
    | SAV Agent     |               |
    | +-------------\/------------+ |
    | | SAV Information Manager   | |
    | | +-----------------------+ | |
    | | | SAV Information Base  | | |
    | | +-----------------------+ | |
    | +-------------+-------------+ |
    |               |               |
    |   SAV-related | information   |
    |               |               |
    | +-------------\/------------+ |
    | | SAV Rule Generator        | |
    | | +-----------------------+ | |
    | | | SAV Table             | | |
    | | +-----------------------+ | |
    | +---------------------------+ |
    +-------------------------------+
]]></artwork>
        </figure>
        <t>It can be noticed that SAV Information Base stores SAV-related information from different Source Entities and different protocol speakers. When SAV Rule Generator generates rules based on the stored information, rule conflicts may appear. For example, for a given prefix, the information from different entities or speakers may indicate a different list of valid incoming interfaces.</t>
        <t>To solve the problem of rule conflicts, each Source Entity or protocol speaker can be set with a priority. So, the SAV-related information from the entity or protocol speaker is also tagged with a priority. When rule conflicts exist, the rule based on the information with a higher priority will override that based on the information with a lower priority. If two conflicted rules are based on the information with the same priority, they can be merged to one rule (i.e., taking a union set). When the settings of priority change, the affected information <bcp14>MUST</bcp14> be reprocessed for updating rules.</t>
        <t>Consider that one Validation Entity receives the information about prefix P1 from one Source Entity through two protocol speakers. Based on the information from speaker 1, the rule is &lt;P1, {intf1}, valid&gt;. While based on the information from speaker 2, the rule is &lt;P1, {intf2}, valid&gt;. Next, consider two cases of priority settings. In case 1, speaker 1 has a higher priority than speaker 2. Then, the rule of &lt;P1, {intf1}, valid&gt; will be finally stored in SAV Table. In case 2, two speakers have the same priority. Then, &lt;P1, {intf1, intf2}, valid&gt; is the output rule.</t>
        <t>It should be noted that priority is <bcp14>OPTIONAL</bcp14> and not a mandatory requirement. It is one possible method to deal with rule conflicts.</t>
      </section>
    </section>
    <section anchor="connectivity-models">
      <name>Connectivity Models</name>
      <t>This section presents some examples of connectivity models of the architecture.</t>
      <section anchor="example-1-multiple-source-entities-to-one-validation-entity">
        <name>Example 1: Multiple Source Entities to One Validation Entity</name>
        <t>One Validation Entity can collect SAV-related information from multiple Source Entities as shown in <xref target="fig-connect-model-n2one"/>. For each Source Entity, Validation Entity maintains a communication channel for receiving messages.</t>
        <figure anchor="fig-connect-model-n2one">
          <name>Example 1: Multiple source entities to one validation entity</name>
          <artwork><![CDATA[
    +-----------------+
    | Source Entity 1 |---------
    +-----------------+         \
                                 \
    +-----------------+           \ +-------------------+
    | Source Entity 2 |-------------| Validation Entity |
    +-----------------+           / +-------------------+
            ...                  /
    +-----------------+         /
    | Source Entity n |---------
    +-----------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="example-2-one-source-entity-to-multiple-validation-entities">
        <name>Example 2: One Source Entity to Multiple Validation Entities</name>
        <t>One Source Entity can provide information for multiple Validation Entities as shown in <xref target="fig-connect-model-one2n"/>. Source Entity will maintain a communication channel with each Validation Entity.</t>
        <t>By combining Example 1 and Example 2, it can be seen that the connectivity model can also be "multiple Source Entities to multiple Validation Entities".</t>
        <figure anchor="fig-connect-model-one2n">
          <name>Example 2: One source entity to multiple validation entities</name>
          <artwork><![CDATA[
                                  +---------------------+
                        ----------| Validation Entity 1 |
                       /          +---------------------+
                      /
    +---------------+/            +---------------------+
    | Source Entity |-------------| Validation Entity 2 |
    +---------------+\            +---------------------+
                      \                      ...
                       \          +---------------------+
                        ----------| Validation Entity n |
                                  +---------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="example-3-one-acting-as-both-source-and-validation-entity">
        <name>Example 3: One Acting as both Source and Validation Entity</name>
        <t>As mentioned previously, a device can be both Source and Validation Entity. In <xref target="fig-connect-model-relay"/>, the middle entity is such a device. It can receive information messages from the top Source Entity and can advertise information messages to the bottom Validation Entity. The middle entity can also relay the messages from the top Source Entity to the bottom Validation Entity, which is just like routing information spreading.</t>
        <figure anchor="fig-connect-model-relay">
          <name>Example 3: One acting as both source and validation entity</name>
          <artwork><![CDATA[
    +-------------------+
    | Source Entity     |
    +-------------------+
              |
    +-------------------+
    | Source&Validation |
    | Entity            |
    +-------------------+
              |
    +-------------------+
    | Validation Entity |
    +-------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="convergence-considerations">
      <name>Convergence Considerations</name>
      <t>Network topologies may change sometimes and result in the change of SAV-related information. Convergence of the architecture is needed. Source Entity <bcp14>MUST</bcp14> advertise the updates of SAV-related information to Validation Entity in time. Then, Validation Entity <bcp14>MUST</bcp14> update local SAV rules immediately. Even so, there will still be delay of message delivery (sometimes re-transmission delay due to packet loss) and information processing. Therefore, during the convergence process, the SAV rules for checking packets are possibly inaccurate, which may result in severes false positive or too much false negative.</t>
      <t>Existing routing information-based SAV mechanisms like strict uRPF is also faced with convergence problem. Inaccurate validation may appear during the convergence of routing, which is inevitable in practice. However, the proposed architecture involves SAV protocols that are especially for SAV. The convergence process can be slowed down due to the existence of SAV protocols.</t>
      <t>The protocol for implementing the architecture <bcp14>MUST</bcp14> carefully consider the convergence problems, so that normal packet forwarding won't be impacted too much. There are some potential work directions for dealing with convergence problems:</t>
      <ul spacing="normal">
        <li>Taking full use of routing information. Routing information usually provides most of the SAV-related information for rule generation, and SAV-tailored information is relatively a small set of information for supplementing missed information. Therefore, most of SAV rules can be updated during routing convergence if routing information is fully taken for rule generation.</li>
        <li>Advertising and processing the information first that will probably result in false positive. This is because false positive is more harmful to the network than false negative. It is reasonable to allocate more resources for eliminating false positive first.</li>
      </ul>
    </section>
    <section anchor="partial-deployment-considerations">
      <name>Partial Deployment Considerations</name>
      <t>Although an intra-domain network mostly has one administration, partial deployment may still exist due to phased deployment or the limitations coming from multi-vendor supplement. Under partial deployment, routing information usually can be easily obtained by Validation Entity. The main challenge is that Validation Entity may not be able to get enough SAV-tailored information for generating accurate SAV rules. False positive problems may appear under inaccurate rules.</t>
      <t>The implementation of Validation Entity is <bcp14>RECOMMENDED</bcp14> to support flexible validation modes such as interface-based prefix allowlist, interface-based prefix blocklist, and prefix-based interface allowlist <xref target="I-D.huang-savnet-sav-table"/>. The first two modes are interface-scale, and the last one is device-scale. Under partial deployment, the device of Validation Entity <bcp14>SHOULD</bcp14> take on the proper validation mode according to the deploying of Source Entities. For example, if Validation Entity is able to get the complete set of legitimate source prefixes arriving at a given interface, interface-based prefix allowlist can be enabled at the given interface, and false positive will not exist.</t>
      <t>Another approach to deal with partial deployment is to take conservative actions on the validated data packets. That is to say, the packet with an invalid result will not be dropped directly. Instead, they can be conducted rate-limiting action, redirecting action, or sampling action for supporting further analysis. These conservative actions will not result in serious consequences under false positive validation results, while still providing protection for the network.</t>
      <t>In an extreme case, no SAV-tailored information can be obtained by Validation Entity. Then, the existing mechanisms that purely rely on routing information for SAV can be used. The operators <bcp14>SHOULD</bcp14> fully understand the limitations of existing mechanisms.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>In many cases, an intra-domain network can be considered as a trusted domain. There will be no threats within the domain.</t>
      <t>However, in some other cases, devices within the domain do not trust each other. Operators <bcp14>SHOULD</bcp14> be aware of potential threats involved in deploying the architecture. Typically, the potential threats and solutions are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Entity impersonation.
          </t>
          <ul spacing="normal">
            <li>Potential solution: Mutual authentication <bcp14>SHOULD</bcp14> be conducted before session establishment between two entities.</li>
            <li>Gaps: Impersonation may still exist due to credential theft, implementation flaws, or entity being compromised. Some other security mechanisms can be taken to make such kind of impersonation difficult. Besides, the entities <bcp14>SHOULD</bcp14> be monitored so that misbehaved entities can be detected.</li>
          </ul>
        </li>
        <li>
          <t>Message blocking.
          </t>
          <ul spacing="normal">
            <li>Potential solution: Acknowledgement mechanisms <bcp14>MUST</bcp14> be provided in the session between two speakers, so that message losses can be detected.</li>
            <li>Gaps: Message blocking may be a result of DoS/DDoS attack, man-in-the-middle (MITM) attack, or congestion induced by traffic burst. Acknowledgement mechanisms can detect message losses but cannot avoid message losses. MITM attacks cannot be effectively detected by acknowledgement mechanisms.</li>
          </ul>
        </li>
        <li>
          <t>Message alteration.
          </t>
          <ul spacing="normal">
            <li>Potential solution: An authentication field can be carried by each message so as to ensure message integrity.</li>
            <li>Gaps: More overhead of control plane and data plane will be induced.</li>
          </ul>
        </li>
        <li>
          <t>Message replay.
          </t>
          <ul spacing="normal">
            <li>Potential solution: Authentication value can be computed by adding a sequence number or timestamp as input.</li>
            <li>Gaps: More overhead of control plane and data plane will be induced.</li>
          </ul>
        </li>
      </ul>
      <t>When implementing the architecture in an extended protocol, the existing security mechanisms of the protocol can be taken.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>The architecture provides a general design for collecting SAV-related information and generating accurate SAV rules. Protocol-independent mechanisms <bcp14>SHOULD</bcp14> be provided for operating and managing SAV-related configurations. For example, a YANG data model for SAV configuration and operation is necessary for the ease of management.</t>
      <t>SAV may affect the normal forwarding of data packets. The diagnosis approach and necessary logging information <bcp14>SHOULD</bcp14> be provided. SAV Information Base <bcp14>SHOULD</bcp14> store some information that may not be useful for rule generation but is helpful for management.</t>
      <t>Messages carrying SAV-related information come from different protocol speakers. Each corresponding protocol <bcp14>SHOULD</bcp14> have monitoring and troubleshooting mechanisms, which is necessary for efficiently operating the architecture.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The advertised SAV-related information mainly indicates the incoming directions of source prefixes. Devices under the architecture will learn more forwarding information of data packets.</t>
      <t>An intra-domain network is mostly operated by a single organization or company, and the advertised information is only used within the network. Therefore, the architecture does not import critical privacy issues in usual cases.</t>
      <t>The architecture makes the forwarding information in the network clearer, which can be helpful for network management such as fault diagnosis and traffic visualization.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Igor Lubashev, Alvaro Retana, Aijun Wang, Joel Halpern, Jared Mauch, Kotikalapudi Sriram, Rüdiger Volk, Jeffrey Haas, etc.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-problem-statement-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-problem-statement-07"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>Source Address Validation Table Abstraction and Application</title>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>Source address validation (SAV) table consists of SAV rules that are manually configured or automatically generated. The table will take effect in data plane for checking the validity of source addresses. SAV mechanisms may enable SAV tables in data plane using different methods (e.g., ACL or FIB), and these tables are suitable for different application scenarios. This document aims to provide a systematic view of existing SAV tables, which makes it convenient for engineers or operators to improve existing SAV mechanisms or properly apply SAV on routers. The document first examines existing forms of SAV tables and provides a unified abstraction. Then, three validation modes are concluded as well as suggestions for application scenarios. Finally, diversified actions for each validity state are introduced for compliance of different operation requirements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-01"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author initials="J." surname="Wu" fullname="J. Wu">
              <organization/>
            </author>
            <author initials="J." surname="Bi" fullname="J. Bi">
              <organization/>
            </author>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization/>
            </author>
            <author initials="C." surname="Vogt" fullname="C. Vogt" role="editor">
              <organization/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device.  The bindings set up by this procedure are used to filter packets with forged source IP addresses.  This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA70823IcN3bv8xWIXJWY0VxE2rtesxzHFCXZdERJK9He2qxd
W5huzAzMnsa40U1qVtJ+Sz4kT8mP5VwANNCXoaR1hVW2ZjC4HBycG84Fs9ls
Uuu6UKfioqwrOcvNVupSvDJNlSlxlueVslb8KAudy1qbUnz66uzHZ4+vjsRZ
lW10rbK6qdRELpeVuulOQj3TjrnJSrmF5fJKrupZoWdW3pSqnulo5ExGQ2YP
TiZmaU2hamVPJ80OAMEP+M/pJIP/r021PxW6XJmJbZZbbS0AerXf4aYeXz2Z
TPSuOhV11dj65MGDL2E+WSl5Kl6aptblenJrqut1ZZrdqQN5cq320JjT98lE
NvXGVKcTMZsIWMaeikdz8VTDF97KI1nyV1OtZan/Rog6FVcWJt80UvxQ6htV
WV3voY+CDRYAjUGMlt/UrtNc5c08K6FDBv1OxUOlf0HY4LtpADXQdL7RpYyA
+H4u/tQEIL7XstzBCG77AEh+cQO/yVQFB/ERgFzOxXeNpD4MyyUM+BVh8c0p
ONB6q3QLwQZ7bd2Ybzb06zwz2w+B4ekcmlQZQHiq/fd07f/cmHK9hgWzBg5N
Lk0layCfFphCZzDum7+ts0IuPwIZz+biWxXh4hkQh2s4jIU1dCqBIj56/3/U
0fZhg7CNtWv8AHL4tciOv/wGP9v5P0CcTwAN0gR4nsAJu4YPPI+1NCsY/KEH
MpmUptrCIjcgJIS4mD2aj8iaXWWWhdrObA2iZKvKGvu/fHJ+8oeTL9zHz754
8LmfhYjVTwT/zGoJw08nKH6iBWHU706OH7iPXzz47Ev/8XfHn9FcL159i/8K
4eTvuSlXet1UyDePvjt/IZ4oifLPClnm0N3L5G8bWeU00MklQV8ArTCHtpmh
ryQdxcmD49/PHhzzMrJaqxq4ra539nSxuL29nWfYH0ltkS1UuWjsos4XIKLt
wt7qGijILgpZLkDIymIP0vPL3z9YWLOqb0GALipVKGnV4vhkdvLX3332V/iY
uT3Q4S7Wjc7VAgfZbA0z5pts94eT+abeFnhgiLcZ0J9e7VNE4A9ut7Mf6XeP
Aq+PXqkMEEVk+35oODn+MDTYZrczVc24WFZG5ksAYUYwLxhy62BYnDz4/ZfH
M8vw8n54j5P5fD6ZzGYzIZcWKC6rJ5OrjbYCZm2Q0gTQ3s5YOmIRE6Xg2YR0
+72J9K/uq9gjESvMuXikbnQGs2YwLexq25Qa9aSAM90IJbONMPVGVYRVu4Gz
FFsD/4PJZnCo0DMXgZxhSe5cb2C2ilVm/PNU3G5AZgpZFObW4iSiagpYvTZi
qfB0DHbM4Hc+R5llSCEKvoLMU/gxnwtG1FbneaEmk0/IkjB5kxEEbz4BbBPb
mneTV+O4gcWPBCBYb/H0JGAYwIRJa72WBHcHr3ZnzArbES4g3rrSS94gAA+7
RihIKwp/2vMDplFs6BAsZ0fiL04Q/CxyfQPswAiCneD8lVICmCy7xhULdaMK
OxV6ruZTRBLMPoOl0TrBQVPRPfkpga0RxKgVrAKQ/EhRPIfwc+QGVi9NLXK1
K8yeAPnUNnh0BNWFePPm352wevfOfQZp9e7dNOFJ4XjyzZuYhbHXgKCCXijp
3r076sMvNqrYWbEsTHbNRwGEt5PZtaotwpQVwBv+JPzJWQEcYzUsPBdX0A6n
lqldLcyqPz/8Uyf8dq0ULAhDrLY1NhBHAGXX2BdA/QA18e4dEi2CQOvV0l4j
ELjuVmXALNpuLRIjbMDTecQdSJjh7HGDRMdAYbwTYFv8wWGDt5rw5KpDyyCq
d5Va6ddOYcCUumonynWliJcsgHsNfZodrRoAAhvO3CKsarXSmYYN9tkV5H1V
0rAYFNwiHUSF1AxsDnaHov2luHDogl4ocazZqv6JRZiTN6D/iew+/FwuZUl4
BLi2wpM4iGCd1aJ5+eIJsSVq9Z9pi4VBQuv8AFSC4ofAWoKey4UZlH8gkYlj
n1w8PCIkAh9XU1x6D6jei428AWzIAlYAytVoIAgHNJxCmaMctvvtViF4fgEU
M1uWyDWgAVCbpzJXomDfFbRjWdFmB2UzHE6lfm00ToBH4k8zEpuErobEcxbZ
IGNrg4p11JQOWGxNDnLADXVU/qmarwE3Z+dPZ4zDlS5AXGGnvzgb6+cjj1gw
RRFeFFE71JaoM5hPaKuv6azyPViUgCgn1UBggpEKbGB2is0OGGPgBDZK5qQA
QQc1JYrCHVlqTIX/D0r4Bzpa5Iy4fQrS94ByJlXLwgEVsz+HIa0MMGRFk2OX
wZMfpx1VZ3Mg1faUHJqCNo55nkRAosMDM5BYRvMhHwOS5ZZDcJ4gQki9Jdlo
oacFdYKzOVLFY7FI0mFhwdf+RCDFBwKKNQPdTat/hLx4qCzqZuLamDCUJUhI
VpHWyB2REXQ7WdUayI31KQ6ZBjthCrxfyrWSS13QV4R8V+kbme0DCSb4sBs0
nxCAjV5vZmQO4L70umSCWDXU74DMDOiuTWYKi5zqvwj1GhSeJdBxMu2Fh1c/
6dnAf8iG2h1yBtzl5GlAD+5i8skn4kpVoGFMYdb7CYLzskEjHgFB4vLKNSci
tz1NJ0Hxq0yDyvHsBgaE5zjkgtDI2g0Malzkii5dtApxNQkluKWgkG94D7yw
36ZNtR1bTiB/rZOL47zucECz7+A2RBLkCcnzF06eMyDRGJijKWhNgAFHe6uG
mLxQaxi2RRLu6nDCvKc0omaaFfdRoYQD9ssbsol0Gfgg0uEesmdqLT8CMm+E
3QXWhwKFdPIy5u2ncIlugD3YgLoGVYn+NivuXf7w6urelP8Vz57T55eP//jD
xcvHj/Dzq+/Onj4NHyaux6vvnv/w9FH7qR15/vzy8vGzRzwYWkXSNLl3efbn
e8yc956/uLp4/uzs6b2+3Yjb5+sMWdtAiiQl7SSROw/PX/zPfx1/DvLnn1C3
HR+DGe2+/OH4i8/hyy1Y5ryaKQFr/BUthYnc7cC4wllAxoJA3mm4coNAQrsF
BEMp0HAC4v/XvyBmfj4VXy2z3fHnX7sG3HDS6HGWNBLO+i29wYzEgaaBZQI2
k/YOplN4z/6cfPd4jxqRYhKdctHqlMlIO5B2ENho/sW6kmUBsfuqYZtirWqS
ffSR9F5iuZAodZKwQJcBHBcYHALM9dw6O39Y48FF1nuW4x9OeyY8yXRT3cIt
iZQ4Sku0dJo6uVdvjUVLy9ZOkYuXFw8XYGzOh1bx9hMJVWDSvznxRkZsUweD
yLbtDPGYtdAHm3AJjM+3WXIcxEw/aKuM+w7YPowueOESY4ZvL7S810/XJbLG
cj8093zcgtV2CEFzcREQ9H7mNVvUN0bTAXZsfORyWLjJ2t9KJ5Xn4pmpWUON
22kECgwzHtmR9gr2ty7hHguGrtPNqFMq2BbreKIoT9xMms6xcihE45wtaA+8
m4ybb9oLJjK44BLAI8CYuigHrN6auAltnsjopV0CaZRg6YB2KfGM0RwBPkPL
pNYq+EOcT+ExNrNRGjleuHXe6eTupTFKmcbooDfS2XUHaDbmFy83essO3+/Z
FBubG0GrZGm3usaf6g0Q13rD12iHjyXcb5RiVMYIwVM8K/nrviVXvj/hvdCq
Cq4/bDvB9th5h4Cg/gUtk/sbyFycuY9ManDXlXg+CRZxxt6Wpzj70uB9he/Y
CNTf//53crDen/X/7ov4b7AHjX0L/6WHCG3nMb28HTiAt25sd977NN+5Q+hI
Dzf2bVh4DEbYQ7Q0jYnGgva+BjyL0BL9DfbowHy/hagzdqBHwJXv0/802uM3
GPuPwIyYiJhiBFfARXFLOzbW98Njz9ZosPXGDtPGEMxd2vhYekZ+eHMqPvGi
kcMb/3aP9WlfBsfy8t47MpkdRXrS6Ug91zw5G5HE0+74im+5oo3vBx4fnJk8
6eWQoH2sWaqk86fSMZoEpYuLgODlwv3A5k1stQlgc/ZtbuGSokH/tvdXN4oc
w7ooGpyu9vd93LTrgBoIUGyHhpKYy0E61tp6BZ0pVNakPOGqA1cS7FZV+wOu
F5btK4MBD+hmW39msA7rzcD6p2RpnccxMo+l4Mvu/+Rl/NCUuNSfz559OxVP
ABYYkJFoZteDd245Z0Cwcs7K/ahicmuZJVgkJZpGldl2wLIe4tjQfeEBi/YD
B4/4IFd1ODzElNySHx83ZEqmR29cteA6z+HzVy+eHI2ausg/YAWl4HbnSiFG
2TICLVknpbrF+ywYoWVEq94JEHwf35LGL4q9M16js2I2wyFsQ5IbDaa92zHj
9tzbQNvliE1OR8M+csVUfMhZqJy9W+xH7U3nnrcRFQ8wH5wf3+34euluxS5c
yuwIZ5r6pVpW6RmGc/EE9qNeS0QU2hrpQEQn3ZTdAkTsAdl8j+bFepwR3/EO
3NUOWS3BKGE5t4jVv9criVofVpM9jYJ6KpUC4qu4X+jUmfztAV08qNjeqxN8
/ZrjnBigdut0+fqrdPzXkbfaD+li4m13DU9EvxnkLTYTpn5/bN51UCNEEWt2
T25OuTtKiRxurgNqdFTpiTHrbdMJC/+ha5HmcCV5NYF641vBe1kH3iWst3iN
3TUVXuW8hooWIe2QWN7A2a2uHL0kmSHzwN0A3fT+8ud0S1DtVlnrApJgD7EA
X+5jcWqhf2HKtQvID+ohOyAv258AKQvn/uj92saP0Z2HSrNkjRoQTvLVw4lu
fkWC0d1vQYDJYmhRdLTUsYWQxjWcKw3FJoU+tMrZMkBw/GLhYof7n9V62/6E
CkDUClMcyDVRKl5S135q7zCwjY/lgr61gDgKlK383ZOng2PVLkrBgWNYq4DD
sBhaM3wN7t+5ED4XkykMxunYMYF6Esazqj1rAAtlHUiat+TiqkTMK/Qe+X0p
i658bTesYTujgUa9ozAg2IPNkaK4d4vjEEb2fmikBbokTJzdKG9mck2BIBeD
CT04RhbfOS7JsiJ7IPTCOJB1oY1gQzrDkih6jCvHjbCq0qxLkzlvwe4lsgmu
wC54D6VVg7kCqayY9qh2SscGB7DdOf80GfjO71FvyMyl9ckjtcRQXWaqHJ0X
BtTsxu8pNMcAeMBzIDm11SXtGBjah4ucNQXbiqOSzhqqmx1+K/S1El+xd3DK
bviVzJB66mkbUaKo3tdHYcUopIm5TgnirqLkguGsvig02HWmTQdxn/jrmCK8
5QKHkGu5Lo3VIHme73i/fCcpjLn2CRmJhcsEgAFXEtDh1Lam1DDa+a9rEIAA
LRCv4dyB1qyJ/y49HaGV3Pt14GLZ7dLq3K5ifNvTkaxZWx7h70NzdfXvT4sh
Vey1/BAzpj6CQaXtLIe2V382Oj/+7YPmSvvc7/abDO58BBOpc+RtQgx9383h
uT4EqykTtjN/HFaZsVIY/zGs9vqNm2dxv9RS83I+2GoAKjWgbda6/ktgooyc
srIeJhISI3ZUfNMlNNerFRg9sFpsVWkXeW5/HbBKKH1v4FS8LLNOPqZ5GHU/
z8NFlMpVobPaUjIShxk7ty66Uoo1qKtSeAHbFUWdTXlvNLmZvbGGC/hIP0zY
9galTgLQhY19VCcIcU4NM2BuFDfB0YFZGhR3SXYx5fzV1FSNRWN8E1+SeuC7
ikQj2PgUzqlPBxg/QeygxudHZwEK+1qu1zC8twadYucE1GtABC9NvyQnmCpM
mg0TQVQVJmWthslNFVp3RKB3TQEGaDQDmOYriiZ4mGCsy4eo7gKHqAxdN34y
l+PmzXpVrVmr45WctucS42p5zYY0e/fgRI4cemhKvqM7f4PbKN4c1hw1EhKo
KOueEMW8yQqBg8EsVxfGI5PUR1OJrM5d1gKjC2HrG7POWOvHi+QSrhaOJ8SL
YyYMcjmkVyUfv7k1Qwz9cAyvNJ0nqOOIMIC4vnoBDW+ARVbH75yB8zWiTR+i
m2TCk7EJT6IJn6nXQJFZQBLShkRrNj4Of0Z0s8OfEdgAN4XS+sRKMd8AC1mH
ZQQRzD+0xWC5rcBMLJK4d1AtLRi4RYA4SCDKtewRql87Wo8syAgRPlgIx72D
E0cIkXhAK4BV1RS5UwxeLYRNxrcSFOwYlJZ4lcypjCW++FHUUVsiH5/CDFxT
bwxxTa7gEkWMlgoNF7U9d+HRG1z10uSqsJxDZjkw3klWc7LduutsO3RLQ70D
IHXF0fXoMY8Ux6fi0t/UuyoMwH0+xEiTwVaX6VgUirNpx0XudmxB2QtxuE3N
aD+z8gSwitY66bWegpgOAOWdDuMRaQqhB8+qv4UddhqmHkO/1rFoDeSxgcFW
+mnQ7k7+frpzEuhzMMyawnciUgN+PMh6eM3FgTX933w+729ocefki0HAy/dA
bGIEDpCNNweHCN/lpKiI8HFE5N5jC8HF6/wUJ6fEHz1/Wpi3i16Ye9IfgXzj
XTndrJPtganuZBfYw0mJ7JKuR6LX88UoW7RFRAOev8nkISaFb5e6RKYJOCXh
GNAzRV9VMNBU2WYj9mVVmwYDne+NSgjA7iGU3Bu7FPf/hm8V90dHHmabY8c4
A3+Lj11zmFvuL+I+h2bsctHdzH8ywv73f/p4zP003Iw1cyMIi0b8todUjh/S
e2xvXL4Qn3XlixMOsWjZJ+TblS5Ivql8+YynOHMeasu5OL4ubig3CpMEKNvb
oJcdbIUbbRpbUHpPlAMELHbnVGR9DUkVVOtUBkZOSyrk89tDO4WqcNxiIdXO
x99j8baN/VSc/2R2AwlgaTR/cAZXOwZ7qmGqga1c9UAN4oa2kzpgDwB0x0o+
mRMQ8Utja/ZmDmUUWjgbmXe8eO+vyantjjHt3109/ez/HO3HO2iiBd9ztg9Z
9/3tj8Mc6A4x5UDHPjJlH9vS/KB+ZyP8Bq+5GEY5T8pBJs9ckSVQBpZCoEpC
dwhfZMkmJwe7C9djDr737rouh1KK43UHLHdK+lUqxzLalBzomtzyCA5072cc
WG8wqNdGdvgu1e9AayUhodaVr7dblWsqKJqLx+hnssaHBcnqsLUPEdCBYQYQ
Mx024CMFe/Fpi8RKzZIQFg9yNQhc0AAgWHvkCmTbrTlvAfEXJXhjBGoKQyuf
nZBFuHa9g7NoqHQz1KtW4Vq3j+ogQha33EfnbrFGEGdKU4bRl29QE8CAbsbw
ZPIYvUcj5V6uuq5TQklSJi579E4rdLo5n1Vnv+h1Qwk/VGTVOhDHENamSUcC
T5cg87lKR5e+sk+lpZJjScblDboEbRLAjXLAo7SWkN50NXyIwd5Ej1gucjSP
HcWQp+81VQRnnhHb1XyVb3Ds3F0+RayQAYCrxlVVehdUDzQqA20DrfRoReFp
OKoOuDXlv9RUgLLdcRqdp5S4UoHu/juDpc1YmMZl323uPEKOfgaacOTwXZba
FTvtcAMYBRxJgB9OzGosV5NGRQLs/z3oc+0nrHMk8lAWP00E7IF1isJusXQG
Hb5UQZ1OjWG49sRQcAzk9Hlx4OHtVUiyeMs9+XuMxGjUw5UCmGJBxFDLazW4
Wxcz76R2tQKr7+zTla2ZbEiG4gFKlD6tnEnlS5vmtlSZxFPtyB/t6jk2stpS
3Jd5wz8gQB69rlxipxYYLdaUxOOYN1KgAqjdsxIADiklpj8Q5xQBHqiYoA05
f9cLV1v5KNRWdjXuWVFvyOvaLdv14LrCGfRO4qVd5rCuprRRoq1+9SYJONZE
JA6CRtmQcI06GuZl3AoX62CWDsU0Wj/WDNRcnlCerwkeqhsdohnPR474AMU6
TnZMMwsSixbR0JbiazuWxYEbRpcl5km4s1srjO4QYkc5b5UWTQ3V/D0ZKXiP
dAjXvkclg8FnTwkMofzG5zAM2CQ2LjKjYmIXbV8VcILL9DKFFqENrwGE4JNT
nc7JT6+YFBSmGelBz1VwD2ZQbHVd2rSEMM+dCQaUS8ysfGsckLJS0fIWjCk1
9a86iEJaDmRghSJdp7jHIfKi5FW+5w1i0uXLoHDycQWu7ewiEA/bsEpy0oGX
oVSEVdct0wk06pFDjGmPdSTnzXph3i+YbZ+6qCr2z6JF4GKYAXOjZ9iejuct
kl25cG6o3jyI+460IpmLzEOygsty3LM6O8AdOsgSt/6AvOHHQQjpaCOo6kZy
6ZjT1+4k3BGgCKIi5PZNEOnnsNIlIjvLgaN/ZagfdiohwIyWNpwvVQO5WjK0
+qiYLI3rtelayKMzEnnM9C7IrJyBEbWh1MMjb9uCDgbmZLuiYlSV+LCUtj5n
fxANAerYgK7QgcH9f21Q8/rHNDrH1K99JtMUnbu105o3XL+HBp5qoY00H4WC
6Ekd9brGaA5Fn6YA0+HqvTiTflRau6CY8tZ9ZL9zrAksSlLqKPuHXyDxFZ5R
dSfLFRPSjByDsw1CiLJ1ECiRGgNuG4DEKWX/7FZXFV/g3aDcc+RwOqqQW4ry
deQUOKSHGckkx97enPVxwJIfSpKuRD0k4nPfySTcIujBjlDw5kDxj230hsI/
RFK0ePQmVpyaFSUR4oNnFBINtrUHyl1RKELZisJ+cO1qv+P3Mxyf9iaiBDVT
NHwOuJ60LoXU2eReYG4BQrS2nNUoxEy8CNP5KTCKQQmqo5mR75eI2aYcp0WI
uOq3cgegXcTwjNlQGRx32LBaoXpNFfyqkLeWRIdzxC0Vm9b4yADY6+zcCOfr
39mI2cUXypCFjR5VFKyk730dSoI6SlDRGYiEzgMgIdzT4sol3NHTCMyWANJS
Ybw5b/s7AHJVU8YCW/Qu7Y7tBnbsjZ3YWYYFzaCHXPFOtDef8ODuVCE51J9Z
fEptJnIA1sGATpFBONvT7IJLB8olpix9AY2PzKvFI/gfqMsa9A29dTLT5QwA
mjlv6qeXF1eXR6EDPeIDtqh1eY1AeC7bu5J4CGLZkO1/AAMINEPc3Y4rbKfY
OxZjd36fC4TFgWJ9T1T6lFnC10ePC4RJjgKRnqjEp4zu4sKzssuBK62K8DSR
z/WFZUkIedDh5CRpdlVadCn4drRJ1pzUEB8asm949Yhj/nVlCn6whFPOwvsl
QbS6Y0g3VYEMk/tDG0p3A/q1Ua1ox+cLHBbz3OfPs4IWZbNdcplgSDZmSxzG
/Lbboeyiwz4a7fU53NLIMGTvTkcZD4mZbnlfLHacoryM3/7pasurLijBTyLd
rcq/++Mev6LMiUPVXYiQO+5jvjoG2JTrGDrc1Yq6IGFwcfeqlnNGUF1hF5Ck
KqNr8Uuu2KLT4nBusFWSYg5KOfcveLE/G90eWN/gbTF8a5Qcw6G4EZFNHk+8
UxIvs9HGPrTIeYa51x3LWbXZ2K29Thk8YeHCrNddS6uPpn6NAOWIuo6UveTf
uuu8LRBdvqP3BTpeIa7ssPRUou8SYwBQEPK676pbRfZU3UzOgXy1x4gLuOWB
wN+BjZCU1rh9UaJVlIVOpmSahh5RV+QMTs81fmuwJbWhzCR0CfHrWYPs5EMc
oy+R+VLR9CWqoQdG2pcV/SWzfVC1GXzTjSUQP45IHq+I9Dp1GCkZ0ksOg6ay
tt59xWhxIhXfulvTa1ftG8rCPZAHBnjrI4gQ0vFCUjklvf8S2cThnhM5QXu7
DO+H8uuqYNJpfqLPPWsGs9uGa4DIc8U2uPfnJFPxE5RcIzWIqhQukSFy0chn
OnISN+aJ4PRrS5+9p2cl0WyJ2J1olc2OG42QOkz6B1LOnp11iazzZCD6FOFi
Qj3j2q45ju/YMDCYnqNE7+l1CEmj2iS3BybZUN4e8iUY02vYzNNmKe1G3UzF
WXEjKyNeKrisSfiqf2lK8SeJ8ZXvDUjT72QB9AFXyO/pGb5LCXueiv8ABryW
hdw1uRavKl3J7VS8/N//zjWWS/xoCrDIvgfeq+Ca/52Ulp8E5Bd4l0Cc+P7S
/wGnpg+sGmAAAA==

-->

</rfc>
