<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-savnet-remote-measurement-ip-spoofing-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Remote Measurement of IP Spoofing">Methods for Remotely Measuring IP Spoofing Capability</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-savnet-remote-measurement-ip-spoofing-00"/>
    <author initials="S." surname="Wang" fullname="Shuai Wang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangshuai@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Ruifeng Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lirf@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Q." surname="Cao" fullname="Qian Cao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>caoqian@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="March" day="19"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 68?>

<t>This document summarizes and standardizes methods for remotely measuring a network's IP spoofing capability. For outbound spoofing capability measurement, i.e., whether the network allows IP spoofing traffic to be sent from inside the network to the outside of the network, DNS traceroute can be used to check whether spoofed packets are generated in the network and sent to outside of the network. For inbound spoofing capability measurment, i.e., whether the network allows IP spoofing traffic from the outside the network to arrive inside, DNS resolver and ICMPv6 rate limiting mechanism can be utilized to check whether spoofed packets are received by devices in the network.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Traditionally, routers only forward packets based on the destination IP address without checking the packet's source IP address. Source IP address spoofing, or IP spoofing, referring to a packet with a forged source IP address, can be used to hide the identity of the sender, or to pretend to be another host. IP spoofing can be exploited by malicious users to launch attacks, such as reflective DDoS attacks and DNS cache poisoning.</t>
      <t>There are two kinds of IP spoofing, i.e., outbound spoofing and inbound spoofing. If a network allows outbound spoofing, a packet with source address different than those assigned to that network can be sent outside the network. In contrast, if a network suffers from inbound spoofing, a packet with source address assigned to that network can enter the network from the outside. In order to prevent from IP spoofing, source address validation (SAV) should be deployed to filtering spoofed packets. Corresponding to the two kinds of IP spoofing, there are also two kinds of SAV deployments. Outbound SAV (OSAV) is deployed to discard outbound spoofing traffic, and inbound SAV (ISAV) is deployed to discard inbound spoofing traffic.</t>
      <t>While deploying SAVs can help discard spoofing traffic, network operators have little incentive to deploy SAVs because they worry about validation accuracy and operational overhead, and even accidental dropping of valid traffic <xref target="inter-domain-ps"/>. Furthermore, deploying OSAV only helps other networks but brings no benefits to the deployer. Even so, network operators are encouraged to deploy OSAV so that when OSAV is widely deployed, every network can benefit.</t>
      <t>Identifying networks that allow IP spoofing, i.e., measuring IP spoofing capabilities, is important to characterize the threats faced by the Internet and help improve the security of the Internet. To measure whether a network can filter spoofing traffic, one can send spoofed packets and observe if the spoofed packets will be received. <xref target="osav-measure"/> and <xref target="isav-measure"/> illustrate the basic ideas of outbound spoofing capability and inbound spoofing capability measurements, respectively. For outbound spoofing capability measurement, spoofed packets with source addresses in prefix P1 are sent from the audited network AS 3, and if a host in AS 2 can receive the spoofed packets, then AS 3 allows outbound spoofing. For inbound spoofing capability measurement, spoofed packets with source addresses in prefix P1 are sent to the audited network AS 1, and if a host in AS 1 can receive the spoofed packets, then AS 1 allows inbound spoofing.</t>
      <figure anchor="osav-measure">
        <name>An example for illustrating the basic idea of outbound spoofing capability measurement.</name>
        <artwork><![CDATA[
                              Spoofed Packets
+-----------+     +--------+  with Source Addresses in P1   +--------+
| AS 1 (P1) #-----#  AS 2  #<-------------------------------#  AS 3  |
+-----------+     +--------+                                +--------+

Prefix P1 belongs to AS1, and AS 3 sends spoofed packets with 
source addresses in P1 to AS 2.
If AS 3 allows outbound spoofing, the spoofed packets will be 
received by AS 2. Otherwise, they will be dropped by AS 3.
]]></artwork>
      </figure>
      <figure anchor="isav-measure">
        <name>An example for illustrating the basic idea of inbound spoofing capability measurement.</name>
        <artwork><![CDATA[
                 Spoofed Packets
+-------------+  with Source Addresses in P1   +--------+
#  AS 1 (P1)  #<-------------------------------#  AS 2  |
+-------------+                                +--------+

Prefix P1 belongs to AS1, and AS 2 sends spoofed packets with 
source addresses in P1 to AS 1.
If AS 1 allows inbound spoofing, the spoofed packets will be 
received by AS 1. Otherwise, they will be dropped by AS 1.
]]></artwork>
      </figure>
      <t>Obviously, if a client can be deployed in the audited network to actively send spoofed packets to a controlled server and passively receive spoofed packets from a controlled server, the IP spoofing capability of the audited network can be easily measured. Based on the idea of client-based measurement, CAIDA spoofer project has collected data from 11,403 autonomous systems in 219 countries since 2015. However, CAIDA spoofer project heavily relies on volunteers in different networks to improve measurement coverage. This results in two limitations. First, it is quite challenging to involve lots of volunteers, especially new volunteers. For example, hundreds of ASes are measured by CAIDA spoofer project every month, where only tens of them are never measured before every month. Second, volunteers attracted by CAIDA spoofer project are generally more concerned about IP spoofing than others. This may cause biaes when characterising the IP spoofing in the Internet, i.e., underestimating the number of ASes that allow IP spoofing.</t>
      <t>Therefore, remote measurement of IP spoofing without active cooperations from volunteers in the audited network is critical to improve measurement coverage and randomness. This document describes some methods for remotely measuring IP spoofing capabilities in the Internet. These methods have been proposed publicly before, and the goal of this document is to standlize these remote measurement methods, and exclude false measurement results by imporving these methods.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>Spoofed Packet:</dt>
        <dd>
          <t>A packet with forged source IP address. That is, the source IP address of the packet is not the legitimate IP address assigned to the sender.</t>
        </dd>
        <dt>IP Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets that pass through it.</t>
        </dd>
        <dt>IP Spoofing Capability:</dt>
        <dd>
          <t>The capability of a network to transmit spoofed packets.</t>
        </dd>
        <dt>Outbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the network to the outside.</t>
        </dd>
        <dt>Inbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the outside to the network.</t>
        </dd>
        <dt>Outbound Spoofing Capability:</dt>
        <dd>
          <t>The capability of a network to send spoofed packets to the outside of it.</t>
        </dd>
        <dt>Inbound Spoofing Capability:</dt>
        <dd>
          <t>The capability of a network to receive spoofed packets from the outside of it.</t>
        </dd>
        <dt>Outbound Source Address Validation:</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from a network to the outside of it.</t>
        </dd>
        <dt>Inbound Source Address Validation:</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from the outside of a network to it.</t>
        </dd>
      </dl>
    </section>
    <section anchor="outbound-spoofing-capability-measurement-method">
      <name>Outbound Spoofing Capability Measurement Method</name>
      <t>We can measure outbound spoofing capability remotely by exploiting address rewriters inside the audited network. An address rewriter modifies the destination IP address of packets sent to it to another address but leaves the source IP address unchanged. In this way, the modified packet becomes a spoofed packet because the source IP address of the packet sent by the address rewriter does not belong to it. Marc Kuhrer et al. exploits DNS proxies as address rewriters <xref target="dns-proxy"/>. Specifically, they send DNS queries to DNS proxies in the audit network. If a DNS response is received from a host other than the intended DNS proxy, they assume the DNS proxy is on a network that allows outbound spoofing.</t>
      <figure anchor="exp-address-rewriter">
        <name>The example of how an address rewriter generates spoofed packets.</name>
        <artwork><![CDATA[
+---------------------+                  +--------------------+
|   +-------------+   |                  |   +------------+   |
|   | Scanner IP1 #---|------------------|--># Target IP2 |   |
|   +------#------+   |   From: IP1      |   +------#-----+   |
|         /\          |   To:   IP2      |          |         |
| AS1      |          |                  | AS2      |         |
+---------------------+                  +--------------------+
           |                                        |
 From: IP3 |        +----------------------+        | From: IP1
 To:   IP1 |        |   +--------------+   |        | To:   IP3
           +--------|---# Receiver IP3 #<--|--------+
                    |   +--------------+   |
                    | AS3                  |
                    +----------------------+

Target IP2 forwards the packet by changing the destination IP address to 
IP3 and leaving the source IP address unchanged. This behavior looks like
the target sends spoofed packets directly with the source IP address IP1.
]]></artwork>
      </figure>
      <t>As illustrated in <xref target="exp-address-rewriter"/>, an address rewriter (IP2) forwards the packet by changing the destination IP address and keeping the source IP address unchanged. The address rewriters may be due to the misconfigured destination NAT, which translates the destination IP address of incoming packets to a preset address (IP3). Since the source IP address of the modified packet is the scanner (IP1), the scanner will receive the response from the receiver IP3, even though the scanner has never sent a packet to the receiver. This process can be used to determine whether the target network (AS2) blocks spoofed packets since this behavior looks like the target IP2 is sending spoofed packets directly with the forged source IP address IP1.</t>
      <figure anchor="exp-alias">
        <name>The example of how an alias target responds.</name>
        <artwork><![CDATA[
+---------------------+                  +--------------------+
|   +-------------+   |                  |   +------------+   |
|   |             |   |                  |   |     Target |   |
|   | Scanner IP1 #---|------------------|-->#IP2         |   |
|   |             |   |   From: IP1      |   |     IP3    |   |
|   +------#-----+    |   To:   IP2      |   +------#-----+   |
|         /\          |                  |          |         |
| AS1      |          |                  | AS2      |         |
+---------------------+   From: IP3      +--------------------+
           |              To:   IP1                 |
           +----------------------------------------+

Target has two interfaces with source IP addresses of IP2 and IP3. In 
this case, the target will receive packets with IP2 but respond to them 
with IP3.
]]></artwork>
      </figure>
      <t>From the scanner's perspective, it sends a packet to IP2 but receives the response from IP3. However, this phenomenon does not always indicate an address rewriter. As illustrated in <xref target="exp-alias"/>, a target with two interfaces can receive packets from one interface but respond with another. The behavior of alias targets does not generate spoofed packets and cannot be used to measure outbound spoofing capability.</t>
      <t>We can use traceroute to distinguish between address rewriters and alias targets. Traceroute sends packets with increasing Time-To-Live (TTL) values, exploiting ICMP Time Exceeded messages from intermediate routers sequentially revealing the network path between the source and destination. Moreover, we can figure out the network path between an address rewriter and its receiver since address rewriters usually send modified packets without resetting TTL values. With the help of quoted packets in ICMP error messages, we can detect the change of the destination IP address of the packets from the scanner, which indicates an address rewriter.</t>
      <figure anchor="exp-sav-not-deployed">
        <name>The example of how to identify a network that does not block spoofed packets.</name>
        <artwork><![CDATA[
+---------------------+                  +--------------------+
|   +-------------+   |                  |   +------------+   |
|   | Scanner IP1 #---|------------------|--># Target IP2 |   |
|   +------#------+   |   From: IP1      |   +------#-----+   |
| AS1     /\          |   To:   IP2      | AS2      |         |
+----------|----------+                  +----------|---------+
           | From: IP3                              | From: IP1
           | To:   IP1                              | To:   IP3
+----------|----------+                  +----------V---------+
|   +------#-------+  |                  |   +------#-----+   |
|   | Receiver IP3 #<------------------------# Router IP4 |   |
|   +--------------+  |   From: IP1      |   +------------+   |
| AS3                 |   To:   IP3      | AS4                |
+---------------------+                  +--------------------+


The spoofed packets generated by the target are not blocked, and the 
scanner performing a traceroute to the target can receive both the ICMP 
Time Exceeded message from IP4 and the response packet from IP3.
]]></artwork>
      </figure>
      <t>When an address rewriter in the target network is identified, we can measure whether the target network blocks spoofed packets. As illustrated in <xref target="exp-sav-not-deployed"/>, if the target network does not block spoofed packets, the spoofed packets will be transmitted outside the target network. Then, the scanner may receive the response from the receiver (IP3) and/or receive ICMP Time Exceeded messages from routers (e.g., IP4) outside the target network. As long as the scanner receives packets from outside the target network, we know that the spoofed packets do arrive outside the target network. Therefore, the target network does not block spoofed packets.</t>
      <figure anchor="exp-sav-deployed">
        <name>The example of how to check whether a network blocks spoofed packets.</name>
        <artwork><![CDATA[
+---------------------+                  +---------------------+
|   +-------------+   |                  |   +------------+    |
|   | Scanner IP1 #---|------------------|--># Target IP2 |    |
|   +-------------+   |   From: IP1      |   +------#-----+    |
|                     |   To:   IP2      |          |From: IP1 |
|                     |                  |          |To:   IP3 |
| AS1                 |                  | AS2      V          |
+---------------------+                  +----------x----------+
                                                 blocked
                    +----------------------+
                    |   +--------------+   |
                    |   | Receiver IP3 |   |
                    |   +--------------+   |
                    | AS3                  |
                    +----------------------+
The spoofed packet generated by the target is blocked, and the
scanner will never receive responses from IP3.
]]></artwork>
      </figure>
      <t>On the other hand, as illustrated in <xref target="exp-sav-deployed"/>, if the target network blocks spoofed packets, the spoofed packets will never be transmitted to the receiver. As a result, the scanner will never receive any response from the receiver. However, there are two cases where the scanner can not receive any response from the receiver: one is that the spoofed packet is blocked, and the other is that the receiver does not respond to packets from the scanner. To distinguish between the two cases, we send a regular packet from the scanner to the receiver to check whether the receiver responds to packets from the scanner. If the receiver can respond to packets coming directly from the scanner, but the spoofed packets fail to trigger a response from the receiver, we assume that the target network blocks the spoofed packets.</t>
    </section>
    <section anchor="inbound-spoofing-capability-measurement-method">
      <name>Inbound Spoofing Capability Measurement Method</name>
      <t>The key idea of inbound spoofing capability measurement is to first send some spoofed packets to the target network and then observe whether the spoofed packets arrive inside of the target network. To this end, DNS resolvers <xref target="dns-resolver"/> and Customer Premises Equipment (CPE) devices <xref target="ICMPv6"/> can be leveraged for the observation.</t>
      <section anchor="measurement-method-leveraging-dns-resolvers">
        <name>Measurement Method Leveraging DNS Resolvers</name>
        <figure anchor="exp-spoofing-scan">
          <name>The example of sending DNS query with forged source address.</name>
          <artwork><![CDATA[
+-----------------+               +------------------------------------+
|  AS1            |               |  AS2                               |
|                 |               |  +--------------+   +-----------+  |
| +-------------+ |   DNS query   |  | DNS resolver |   |    Host   |  |
| | Scanner IP1 #-|---------------|->#     IP2      #-->#    IP3    |  |
| +-------------+ |   From:IP3    |  +------+-------+   +-----------+  |
|                 |   To:IP2      |         |                          |
+-----------------+               +------------------------------------+
                                            |
                                            V
                                     +------#------------+
                                     | Authoritative DNS |
                                     | nameserver (ADNS) |
                                     +-------------------+
]]></artwork>
        </figure>
        <t><xref target="exp-spoofing-scan"/> shows the scanning setup for AS2. The scanner in AS1 sends a DNS query with forged IP addresses IP3, which belongs to the audited network (AS2), to a DNS resolver in AS2. If the audited network allows inbound spoofing, the DNS resolver will receive the spoofed DNS query. Next, the DNS resolver will send another DNS query to our controlled authoritative DNS nameserver to resolve. Therefore, if the controlled authoritative DNS namesever receives the DNS query from the DNS resolver in the audited network, the audited network AS2 does not filter the spoofed packets from outside.</t>
        <t>However, if the controlled authoritative DNS nameserver does not receive the DNS query, we can not assume that the audited network filters the spoofed packets, since there may be no DNS resolver in the audited network. To futher identify networks that filter inbound spoofing traffic, we send a non-spoofed DNS query from the scanner to the same target IP address. If the controlled authoritative DNS nameserver receives a DNS query triggered by the non-spoofed DNS query, a DNS resolver exists in the audited network. As a result, if the DNS resolver does not resolve the spoofed query, we can conclude that the audited network does not allow inbound spoofing.</t>
        <figure anchor="resolver-network-type">
          <name>Classification of results based on DNS resolvers.</name>
          <artwork><![CDATA[
                                        SPOOFED DNS QUERY 

N                        ADNS receives no query    ADNS receives a query
O  D                  +---------------------------------------------------+
N  N   ADNS receives  |                          |                        |
|  S     a query      | block inbound spoofing   | allow inbound spoofing |
S                     |                          |                        |
P  Q                  -----------------------------------------------------
O  U   ADNS receives  |                          |                        |
O  E     no query     |         unknown          | allow inbound spoofing |
F  R                  |                          |                        |
E  Y                  +---------------------------------------------------+
D     
]]></artwork>
        </figure>
        <t>As illustrated in  <xref target="resolver-network-type"/>, there are four cases when combining spoofed DNS query and non-spoofed DNS query.</t>
        <ul spacing="normal">
          <li>
            <t>First, the authoritative nameserver receives DNS requests in both spoofing scan and non-spoofing scan, suggesting that the audited network allows inbound spoofing, and the DNS resolver is open.</t>
          </li>
          <li>
            <t>Second, the authoritative server receives the DNS request only in spoofing scan, suggesting that the audited network allows inbound spoofing, and the DNS resolver is closed.</t>
          </li>
          <li>
            <t>Third, the authoritative server receives the DNS request only in non-spoofing scan, suggesting that the audited network does not allow inbound spoofing.</t>
          </li>
          <li>
            <t>Fourth, the authoritative namesever does not receive any DNS request. This suggests that no DNS resolver in the audited network can be leveraged to measure inbound spoofing capability. Therefore, the ability of the network to filter inbound spoofing traffic is unknown.</t>
          </li>
        </ul>
      </section>
      <section anchor="measurement-method-based-on-icmpv6-rate-limiting">
        <name>Measurement Method Based on ICMPv6 Rate Limiting</name>
        <t>As suggested by RFC 4443 <xref target="RFC4443"/>, in order to limit the bandwidth and forwarding costs incurred by originating ICMPv6 error messages, an IPv6 node <bcp14>MUST</bcp14> limit the rate of ICMPv6 error messages it originates. This provides an opportunity to infer whether the spoofed packets arrive inside of the audited network based on the state of ICMPv6 rate limiting.Since most of IPv6 addresses are inactive, an ICMP error message will be fed back from CPE devices when we send an ICMP echo request to a random IP address in the audited network. If the CPE device limits the rate of ICMPv6 error messages it originates, it can be utilized as a remote vantage point (RVP).</t>
        <t><xref target="ICMP-based-msr"/> illustrates the ICMPv6-based measurement method. We have a local scanner P1 in AS1, and AS2 is the audited network. Three rounds of testing with N and N+M ICMP echo requests packets are conducted in the measurement, and thus three values rcv1, rcv2, and rcv3 can be obtained respectively. Based on this, we can infer whether the audited network filters the spoofed packets by comparing rcv1, rcv2, and rcv3.</t>
        <figure anchor="ICMP-based-msr">
          <name>Three round tests of ICMPv6-based measurement method.</name>
          <artwork><![CDATA[
+------------------+                          +-----------------------------+
| AS1              |                          |  AS2        +------------+  |
|  +-----------+   |                          |  +-----+    |Unreachable |  |
|  |Scanner(P1)|   |                          |  | RVP |    |IP address T|  |
|  +---+-------+   |                          |  +---#-+    +--#---------+  |
|      |           |                          |      |         |            |
+------------------+                          +-----------------------------+
       |                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:P1 dst:T                    |         |
round 1|                                             |         |
       +<-------+ rcv1 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:P1 dst:T                    |         |
round 2|                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |        src:arbitrary IP in AS1,dst:T        |         |
       |                                             |         |
       +<-------+ rcv2 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 1 XXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:P1, dst:T                   |         |
       |                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |         src:arbitrary IP in AS2,dst:T       |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 2 XXXXXXXXXXXXXXXXXXXXXXXXXX|
round 3|                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:P1 dst:T                    |         |
       |                                         XX  |         |
       +--------+ M ICMP echo requests +-------->XX  |         |
       |         src:arbitrary IP in AS2,dst:T   XX  |         |
       |                                         XX  |         |
       |XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +<-------+ rcv3 ICMP Error Messages +---------+         |
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="ICMP-based-msr"/>, in the first round test, N ICMP echo requests are sent to a target with inactive IPv6 address in the audited network, and then RVP will resposnd with rcv1 ICMP error messages to the scanner. In the second round test, besides the same N probe packets, extra M ICMP echo requests with forged source address that belongs to AS1 (noise packets) are sent to the target simultaneously. The number of ICMP error messages in the second round test are defined as rcv2. Similar to the second round test, in the third round test, M ICMP echo requests with forged source address that belongs to AS2 (spoofed packets) are sent to the target. The number of ICMP error messages in the third round test are defined as rcv3.</t>
        <t>Comparing rcv1 and rcv3, if rcv1 &gt; rcv3, it can be considered that the spoofed packets are not filtered in the third round test, suggesting that the audited network allows inbound spoofing. Comparing rcv2 and rcv3, if rcv2 &lt; rcv3, it can be inferred that the target network has filtered the spoofed packet in the third round test, and thus is able to filter inbound spoofing traffic. The ability of filtering inbound spoofing traffic can be inferred according to the following rules.</t>
        <ul spacing="normal">
          <li>
            <t>If rcv3 &lt; a*rcv1, then the network allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else if rcv2 &lt; a*rcv3, then the network does not allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else, the ability of filtering inbound spoofing traffic cannot be determined.</t>
          </li>
        </ul>
        <t>where a is a factor to avoid potential interference from fast-changing network environments, satisfying 0 &lt; a &lt; 1.</t>
      </section>
    </section>
    <section anchor="measurement-results">
      <name>Measurement Results</name>
      <figure anchor="meas-res">
        <name>Measurement results for a single month.</name>
        <artwork><![CDATA[
+----------------------------------+-----------------+
|            Type                  | # ASes          |
+----------------------------------+-----------------+
| IPv4 Outbound Spoofing Blocked   | 373             |
+----------------------------------+-----------------+
| IPv4 Outbound Spoofing Unblocked | 5,309           |
+----------------------------------+-----------------+
| IPv4 Inbound Spoofing Unblocked  | 35,163          |
+----------------------------------+-----------------+
| IPv6 Inbound Spoofing Blocked    | 3,677           |
+----------------------------------+-----------------+
| IPv6 Inbound Spoofing Unblocked  | 8,174           |
+----------------------------------+-----------------+
]]></artwork>
      </figure>
      <t>As shown in <xref target="meas-res"/>, with the address rewriter-based method, we found spoofed packets sent from 373 IPv4 ASes are blocked, and 5,309 IPv4 ASes are not. With the DNS resolver-based method, we found 35,163 IPv4 ASes did not block spoofed packets from outside. Combining DNS resolver-based method and ICMPv6-based method, we found that 8,174 IPv6 ASes did not block spoofed packets from outside, and 3,677 IPv6 ASes blocked spoofed packets from outside.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="dns-proxy" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-kuhrer.pdf">
          <front>
            <title>Exit from hell? Reducing the impact of amplification DDoS attacks</title>
            <author>
              <organization>Marc Kuhrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="dns-resolver" target="https://ieeexplore.ieee.org/document/10082958">
          <front>
            <title>The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation</title>
            <author>
              <organization>Yevheniya Nosyk, Maciej Korczynski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="ICMPv6" target="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s49_paper.pdf">
          <front>
            <title>Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels</title>
            <author>
              <organization>Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9U923YbuZHvOkf/gLUeYsckZUqam3Z2Eo4sZ5TYskaSZ9bJ
5uSA3aCIcbOb0+iWLFveb9lv2S/bqsKlgW40RVn2bMKceMhuoFBVKNQNBWg4
HG5uqIrn6T94VuRin1VlLTY35LKkr6raefLkmyc7mxsJr/aZqlK2xQ7mInkD
3erpQioli7y6XkLPo8PzZ5sbvBR8n/1J5KLkGfvb6eHJ88nB4d83N64uoEle
iTIXFTvML2QuRCnzC3bO1Rv2rCgTGHdzIy2SnC8AXFryWTW84vnFUPFL6DQs
xaKoxHAhuKrhu8iroVwO1bIoZgBn+OQJ9q9klUHvF6KaF6lis6Jkp9Qvu4aH
2BPHPDphZ6YfO+BLPpWZrK4B++m0FJf7povpQEOxYhb02tzIALV9JnIcldcw
XLm/uTFkMlf77GzEfobXmxuMaWrO5jWX7llRQs+/zov84qLmeVLn7DmfFiWv
ivIa3yeAzD77XshfpO6QFHVelfDsYC5zzmASaiXY+fOn7KF4m4hlxV795RGA
tQ1pVOwoFlxm+wzZqBCFP767SDI+HYm0HiW5w/fpiD2XDbZPeW5+E6bnCtCA
3uxVLi9FqYhVnwHLqshkyvM/Vma8NpanIZantZwJmAoP09+Sp5ksZz3s/HEE
UlU0mP4ogaHmyW+OZ8KLX2H8Nqr4v7woF7yCOd3H9qfPDvb29nbhu8xnwRuJ
63aYFgAwHy4VPWOs4uWFAK0wryp4tr2d8opXJU/eiHIkRTUbAanbsJ639VLG
R3YphwDLYpqJxRD0UEVrbdvA10v5rKhBN7BJmpZCKfYTRyGpQO0AWlqjGEDs
WFRXRflGsT/xJZvkPLtWUg3YiYbPziz8AQOFB2v811rqxa2YHhHgwoA7T3Z2
8XeaK8Tt7XUPvVdXVyOYily+JUrVtQLw2zOZCbWdFPlMlCJPxLZuokQCqqe6
Hu9tw9fx3nDJl4D5m3peAruW6Syg+cHhW1mxWVks2Fxk2R8A2bROUO9Uc8Hk
YskT0kh8sczkTCaaH0+fFmeMVxVMgXqg4TnFhD/YUEvfC14m7C808oCdz4F5
iv1QLwEfmcwHIGelVBWK7GmhVHGl2QXtSiAwZz8U2bsBLL55OWz0Afu+SOb1
ImTjeM+yEWauyKBpDyelEOLtMitKMcKvVnBqEobxkydf73zzxdchg86BDwdZ
oQROpAaOE/2LSKp9T9Eju54KAH3tlHg+hXWS9ovVKs69FpdzmM1rzo4Ldf1m
AKxMpPiF/QXM17vrXL2RA/YjV3LBnoM1HRCnQTDP3lyBXYTm3/NlBbwV7M+w
/jMBfJzkafkOIDytUx4TwqODFyeXX66QwDxVaqiuF8tCyXpBrLtaDkH+KmRe
DaTzVG0juO0nO9vYGr//Q+198w8Swa7svQbOwNTXsLKYVOzFNa0gmLzAgF5+
2ay3S8kJUXYKuIM+XsgKG53JFCZpzvNcZCsFEph1wU54PmB/lnwOhvI12KsB
AAJpAy7+dQ7mGZ6Q/YTH4poX7FjCmz+BCgU+SphNfPOaF+9Qs0LPustMUM/D
IeNThUqqwt/nc6DPChpT9WLBS/lOKBJ4cot4mdKDhedPlNafWDh2cJZrXvxO
oZdgfRLQvda3GKGLw4CpWvoiLZjn2AyYHInRgF3NYVyYBhRjMwLjWVZchcMA
QTPQAmBA2VQwhcSQ7gBjhFPg94Ym+BMQoVewILy3A/b0+AyhJaLE+QfscoRY
4zKDngl6fg4pGh5eLFHlgw4FEWcX5PhV8BTmLsAaiUbEAEx8cM0hmd/GoHvw
h5jik9/iDC9LUGiGbZoZVnMRAXoxMiQQzL+R8oVIQMSlWjhuVYDuu3U5VopE
wKApm16zVFzKBKQt5N2IWdldyDTNyE3eQstXFmAUUGWRLJc8lfgD6L8eMJq/
UrEiB0EFqQUF1Iw75TihhR4lFaDsc21BgGncKMQrCRJfV5oCq0o1ABBypbVn
035kFaoHwvJ/gN6JNx+AnQDrqBU0cN2ApSHhF2B7Aeh1hhi0xXFupxD+m1co
IUaiQNBStG0wLDRblgJ0YWpWB88Lmot5oapRa7ESdLJEstIzsgCzkMiiVjgo
sBNgZLzOk7m1swNQG/hLIU0ZWB8UIN8Qk+CgJCU8QQ4WUhU5DKdnFcwYyADK
AUw1Az6DjtGRRsMsLepd1YGA28sFKJo12siuhU7fQYvphtd24lI5I+8FViuI
NvwDdhZIVPIi15yHx5UbxPCNVndkYQFKOUN7VHKFC9fHT9U4kLLa6k5IrsRH
oF8YLO/22ie0ijIVVkYundoMuN8a9bJxPx+eTX56xBSskixFBqTkZ2iEwAus
dHjbWvMQGRQlQFoWeWrkH5Hqn/3KSQjPVBE2BATMqOTFjthLO9H45uFLQhBN
nIdZKlWCuqArT0ZLDgLBIkBHqwB1NLaBM0L5/hlMt+UMuQSTnxRNELi1Swei
i4KdtWIpKDRSbM4vUelW4KPAkAkueHiAeBBwDXkqEo7RETDtmgEAiIYguAIt
5k0bT8AT58k1kanhk9ZkBaj5ueCpZgDKA7Yl3QJv07JYLhFH4DtBc1bl/ftW
fPThA9iyusSZW4BPO/DoxynROhkZAJNIuii3jtQUUJ2i2CiWo7bKxUxWygqJ
4X45YoeInCpifEJJgbgDpJZfmInSDKKhlVkrYJFy/USiqk/RnbGTO0DaMY4M
1jehQnN6RNp2RvQ4zAkqqZuY8lr4mZeuaZcC9CggAoFNUYLbVWnTydFPE+iR
6TUCAQsHbszAPSHljA9dSgnnjIQKgJTFpTCGQEdd1jDY1iN2Xlh/y1lnHlCs
V3BENMGxpwZoZLoWHWVqCqYC3QhjjFpNrmSWobqwhn8EAlRAXGwTWx8+EBSQ
qvAhdKvRda00aWDDQfZg5jipgpWeZcxS9HieCo2zWmpDlt3Zbe0S21Hc2r8B
hTuTb9nJmAS2cVmRNF6nZH/tdEzO2K7RSmg80HIjCHi8QzNhOBnjNulParrb
awzXdTw/AYlmIUcIHMcJHK9P4NgS2PUJcNX+t/uY2Kv3c2ZGONEjbG48Hjaf
x9TksfeT6A+jaU0/EO633Ny40Wg+PBk/Ylv0cIvpWWRb3w5Xf3TLXcZubsNn
9cfHZ3PjxE3RVGQFql2YocmZmQwaEJe5ik/65kZs2gEYAWE7oC3BG1spe4OV
KmJzw48OCCR7ibrqSioxMFbOtCX75BrujsIZf7/Ptnwlo4P9/3gwAVfpLWaR
BIW2TsdYh7/RMrcqGW+RjB58uFXkVkrZHQVLC4eRrHVlaacjS59efHbuIT5j
Jz69K/uO0jNeV3rGEemR95aeNTWsEZ6X00uMuzCWJaWYZBI1qAk2nCNqQuW2
RsWw0piwuKGmuJOikiLLMNpEk62j/CVGFtTT6t12Z7JUke56PuIJIOuCtDG1
USewyqWU0Cn43o/RLQs1E4Y6fg+s0sHk6OnEIFqC6aFMKDjN4G0jhgkOiQl6
jft4PNh7sovJuCIvFhje6uw1SeDO+BuzlwB+GVPobGMy94sR+6G4EkRmz2iC
X0piW4Y9AffLIgM4AkM8ANyElY3bWDh/zSMHhodhwH8FPw1TdLA66qzSeRGI
fyj1Ql47hDzPZElhZYUO5K+1xKzVHNaLwC1Giq9kfokpHJYVFblKDVLg6aKr
IzFlAjhdea+0U2Cke8DmILgwLdR/cia0m20nC1dNnCPakV6AnMwpWQWdyPmv
RK6MQCwIVI4tPYAC1pPwu4/YmQB5A+fc4ymvKJW5CoMmKYc0YjiCYpugF5ya
2CjIlGG8T0GJMrxf8Gumg6qp5EA4RQ6Nb67sWvehmEVpvW0bBdSYlcFs06JR
EXm9mAK6lq3xMGLkUiUziqd0BjaQmDBsdtkrrQSAZBfomdUbSmZsYQLtCcQO
MoHg7xYxJbVRwj/FIqdcWJhYToUCSFNcTMVC3JZL7ouQ2lzFUYRqwFGAPBUC
Hc9iSTsjy3qayQSgTw3jEE+EcVFgvIvy5+MpaT1S3jszQZcSMWabIU2g/DbJ
6hQsAM9U2MwuWxBOiuwuzaQ3SNPEbm2Fe3HPeX5RA1fNpLM3OpYHEh+8eHV2
/mCg/8uOX9L308MfXx2dHj7F72c/TJ4/d182TIuzH16+ev60+db0PHj54sXh
8VPdGZ6y4NHGgxeT1w80lQ9enpwfvTyePH+g58HnG6XvKLlIiQDKN8LiUht2
4slMfX9w8r//M96DwO7fTp8d7IzH30BQp398Pf5qD37g0tKjkZLQP9FMb3Aw
zhxjFFwbKBWg/zLkv8L80xWmU0ox2tj4/d+QM3/fZ99Ok+V47zvzAAkOHlqe
BQ+JZ90nnc6aiZFHkWEcN4PnLU6H+E5eB78t372H3/4hkxCED8df/+G7DZ0N
PxflQuZFVlxc44P3+5cKjLUATyL0M/c3N/bZJEgr9qWbcX1xXBTGy+qkt41B
N7AkpmwqepKJC0lKLmge5ittklpnVJrCEkIQpX4qYEFLUBHabDTJibQQeqgg
e+a7Nog2OjGYMSnqizmziZto1YsbMfRVeLBlBMpNgdHtZDPJU3NJx09HQ5gQ
iG9eaZryzzy2y2gXQVI7SvgdudrnmLY26Ozs5fcabKUvGx+xoa9vr9wN3GyC
kfQZ1nYDn4a3vGdWYxR/huFbIwbYmOG32KoJDorDdLkZJbx1ctAGSisjZmf8
wUCaXSfa1zF0luIK/A/tobhNlZaXMmIQg7U7gJsHrrYkd6p3fw+IDrhCdFNY
ZDbIbEPMSWfg2RtwXT2I22FgsjFoOTKm8Ypfa61pMLEzgAl6cIFAGbamxs/c
36pqCV+T/+3Q7pa3DsnNfPo1LwyzxdnIslzR7hwW+iDHwKJ2+f/+vasFwtz+
GcYMWHVDO60UR9NSRji/1oLCJhjWB+v7mN7GGAqe2WVegmsqGAU7Jmg3y4Sy
gYXZ5uYmHsTqjlSkbgyLB2h98El02Yt9hUBx36MRcedkx7Kh7czN407+pCdT
Em1Iab/2O+x80wXQaUjtNIAbdpZgIQluJI8pe3jTHQwefQe+AFXJQLsdgngT
YLAVYvAMeLxPINsYbLUx0J/t/wrxPS/24V8cyz1i7a83OvU5XtHEezQ568Dq
5Kk+YhZafF7rA+M6Du023eK4NMjcNGwFAJZD4wZAVyJCkbhxnXYDxF0fnHuM
GmillIQdZv2cSDyO57j7xu1rPTnbjTMl8uljCkUxjUSaUgzl6zNQZaRBbUzc
o7FBpaAPt0sRAmpk236lSqZQ1DlDWVG8USyTbyC6oj01jVk8S5lCSJZUGImg
nxwfCeY1kiwE1To0LYZOM5ukIdprmzUEvQ7hCxDU1eO2kqiDlskPTpS3I0YB
1vv3sWE/fBhE4T+E2Xh0n+nAWXgjxHLNWeiaKp1bwWRm7dzLBXguRT6TF5QG
8kc+npxjCkkmc+2NZ8Sb1QZe5mBtEb8g6wnxqUITaNoBI3YfgVGjPN9K89s2
5tJ4BEYxA6Dxo0HwiNLL/u6VM3TOCSu9RTzQu+6YurmYB4AwkalzZGT8XWGI
YZsFYsQdzF6CeLfqhVKIyzFMFEHdmFkC1jg+BP37iE2zAmt3Ov6jYVJ8Sfng
cK1Lcq3SSBVIZGn1haFmhf1z2uR2yx4A+rHRgp5NXt+oOwNrIa7CIGLUdUNU
niGAjrHvM+p38woiPOh8/bxeQWO26XN3r6Ax2x1k4jb5to9vCXE5Yyaf8mVY
zxFuozfSL0xB1I6uvzzZpRgDbRemZ7nZx7KLLlA3wV4bQsBAxlReGb2xAEjm
dWzDlMxJJhHXlaZLN9EomAGslXpm1ZxRZL8D5QSa39RX0LaFtr2+RmuQJUpU
RHMSJ9x2DHFjORc5xFY5WAEXA/EMIjGMPlI8IyBihhAiyD5LinSR+Wz4i8oq
nDe/PiHIKWCdjGsXMF/XeeowcxQmazAU99ipGlKsPxAtuUHmUsjndP06AfjI
C9gp9mwKn3V9G4bjtVRzAFxdYWa9a8Jx9ABjIKgBo+c2kESwICVu9uHJN7kQ
w/Ni+Bx59/D8/PkjrCyrsRjKSwdQYT02ZYdvEyFS2vlTil8IVzeJZk2kErlj
636VgEg0r/TWFhY3ApJ2y8VYuiWvGso8w48keT4FxM5FKQoStCthaqMuDG/7
AcZ8LqpwqVRj87U97XK1VjUhTmF1y+1oSpPJjyEeAe8M60bsZ2tRqRoMBOrX
uqi83nhqCFkqyrIoHSsdbegkJJou7b1Z76ffzWp8Ry+dZha89dnsElTRNfjP
at//f2NuaxxvjblvNY4e3quZ2DRsG8eWQe37hLGv/7zfoLYAeLHvx5DwU48c
bDW9V8tBx8e56Uba8c+WPTZ0dLIXkQMP/9Vy0JBp5KDLdF8Odu2jydlep90n
WEx2I7JteZrDLiYZacwkbeijOcIgQqTNtuvmho1nwAnAI5b67FBodzxAvm2d
FkatkfIChGIWwToHe25I5zYY98J5D3F3B4t8APVhU+jd6/lgYtVUArdzi00O
FjnQE8D/PO+xEiZX2orLsDxYDyeRpVdhnn1FQBcP5frdnjYL0AMypbwtyKvJ
XF2cZXfUcGj/0EQ4BHlHeRhTY9JgzZCaQnsUhW0qNdB9bvUnrAvxUIwuRgOU
pkcrUQRGUqadh+kA572GXmEvIJrTNzlKFspQjHmpO6J1C8tsocidJ+0TW+L7
m+L72+K4Er6LMQ5j3T4tHMmAN8BXQuh/dNOo+DBcvg2C8wh+8p5+3Gy+DWYz
SsSqjzECd00ax1rfNX3dsdw3q1v/9qnxrlXtNaqYcmvZ08acklbV+UGr5qxa
VOuYvPXMXXiYk99mYUwdq7Zm5tAhxwo+vsLy3G514qOtsDaaLy2b00mcTjAH
oSu2IjnckLc8v15hdoLEhH+8EfM1ytRj+COgIUeNvB74fZ1ZUH1mIiYphv1+
J2cknUHwckN90RydG4olBmieLIlkySh0RY5e1BkvA/fLp701D10xC97a7NJq
HI9mYS/tRnaIM3sDLhXdDV2nddwOz7jMdFmQvLigpdA/XcQMty1tmB8X6chQ
I3vY+a51GOemcPCOxeemBnKGRcWmPgdLNnuKdFpkGGHL3Qkwfw67Z7+9s+Y2
i9BxZQqd2xOoNvzj6LYmwf42h8YOQKkAvngVhlhIXG2Hv9ZySZQ9PDg5fOSO
mL9/rw+zQ0ezS5IJXcyaUmEqLRoiQyeBTKFml9nsue6HPEUM7W0c6nZPqm13
10ola4+q5Qi0fQBqscNWf6I+SQRSxCy2TiARpLZ/hZBsRci1hnQTXingNiZ+
wBIP3QIhtX29tqd3g14efpzTtTU0j5odjl6cyClr2pkmj12bOHUxPoFzFnH7
VlQXRD2wj5WC/mGiA9+l+U9rNm9lVu6EGbhQdBUKnWS41OU666J5Q3c8mSMr
DyfQ9dHafWPsfdzjGdmr1dAg9LhGdoOzkfRIUa2tqNUekXF2fOCghbCO2Qsg
adNUVPWStBEsZr1RYM0mnY4cu72T+OjBNhJtL+tcrHdYK1JSp3eAB3qvPFiv
NOiOs6/tfisPaQWAOtvi1jg4OkbsWLyt+rpq38LU6TW009UqpX8siXdEzBMc
KgolsEHMbLzONaBc+lG+xVSj4tyANgMjjBtEuYn627lm5jB21BfxsgpkpZzz
uT4hZcsPbCbGUeQyTrSt1nJn2rhrdKMOzcDVEKAXbApA8mIdPpE7MKu1J2sz
b+EBfMOnvisZfMc0L/JhR+x6/VPFF15pQ1Mif3Q3Hjtp8Zes8SKbiC+K2qC9
GsVb8MP7Tu+04hkjCkF/3++n82H+bIVzjiem6IxL74x7O654dum+R7Cbz9nJ
y5fPDp8S6j++Ojx9TZCO+5pPNImGyyBX1vtoveH6BYSn4KSsZyTWMMmA1nFn
qJUOQe8L8jnO6DtviMAeOm/XEXF8FWc+Aju72/CrMTth7Mfui49gGd6+ChPw
in0qngGwQ/ruz7zXo84xwZr7wPp59oyx0zsMvxozQOt198VHypmW2K7TYtf2
0CzLId5Max2XgwxP4LjLEsF3cefT7FHbIMLqrTOE2Ck6EKZsmoTHjEyxzXig
DllMZe7XgjUaEEO3qNIjg/Z7e8ZVKx5fvcZUqyYCuhvtSBtHbl7JlQvGs0/x
JivQw8oczexRdL1Ojs20hIZM4c00uSHDnmDt0tGmoQFEdOjzcEDLb4FwQrdK
GpTP57K8F8Yfyea17AkIRoHXDPVLRtSvwfSah6qpmTRYGUdiPY+kmzrwKm9W
ZFw6ezStM/LeWZxbPBqcMKPUVqQo3Fl6c4FfcE2lWeSGfu2FnD47YHgXLix1
cysu5WO9C8PoDDohOwVBupIplTSltqCY6C30Ckzq0jg3MD0XVEJiynoAlXYV
Cs/13Zp5Ae4Gnd1sRqLyJyyHi3XFUjILX6imEPYSXEUqOimWeLlSnSOf6VQ8
HhO/c4aqLQHBVYJ0g6+HYXBR4khXGC/oOMtMU9mEZ5wkhpuyOB6r0XF7p4jk
FJDU3urByaHLapGmdT6uBZLMC7cuKarTR7X9Kp4+L9L4t80Ymhx11/mgSr/2
/ZBcu6h0vPqS5xXSuCwk5upOfzp5NNLBMkLXNz4MF6oMLoJSriDg8svupRDm
kPWI/Sz04XDOwHXimfPtT8Ymjrb3lezYku5u5DEvBRWXmZvnKqPAKNw+pu7H
j190+a08aaIwAW+sbK7tCK6w0Aq5pmOrQph6LlYml4Af/LujW8C3XcvJYlpx
iUdqwyurvKszZFPY1RX4O4RtdCigWCw5HdGP4dR18SPOzYr7ZVa7Qo+ju5+r
fTEvA9reVtbudfsepdXgHjcU3LzKS8GTOZ9mwuUa2Y3JWuItPD3F4B64GwYy
bjaovYV4fuNj9/hO2G1p7B77Gbkgf3kT9lkBLmwRtI1vI99nZm/HqB9J5ic3
vWuwjmNrsQeV7/pwUGWyD0oiVdX++a04kHJg409AxbeOClxompBDUq4vrHJt
CHkcgXB/HD7/XPRIxaeci51PSkVUu9+BCiSAl1MJlgtCHljyxvYEFH2muQgk
audfVKJu/rP9YWcHh8eT06OXbMw6L93nn1+qB71i/dnX5n2lukesdwKx/u3l
YWe1PGj9sPsvbnGiEFZ9gEP3k4fv+iCsLw+3Q/hYKrrysN7n82na3bto2nYy
L4x7mu1HF4hQEKKaAKw/Auo/MdwOrgY2MtEVIM04g7h8+ze7hsekbDAbBLq9
O2CudASdYrM9CCGIsqelGkeoFWXa/RlX+2MicUq1BfhPhaJUgNvOOcb0wFQ0
O1PiLbAmvgL6N3V1vii8/5I9zAvpas7Vo84FuPbYuVzUWcVzQRc96h3e5kK4
GLmyhzwaIRUzigY5RY07eKZ5IbH4yt241GGKrTXHNF/w4v5c2GEPW0FkHx/u
QHgb0Qjdu5Q3OAiCVRel0lYYPfnO/nZ5CWAOSgjmqnorsO3RBh0qN4F8l4H3
yM3iHfke9jsd7HfYtx3sKbwPcG9VZ+GZU4d2rGywjxKXl5BAP0a8t6clzYH/
JqvZ/D2A3kxmmw6eJEXp/42AWYHsIqbUmVAmQ30005r2W8Z/r/MSpEf8NGo8
h/zvuv8h3trXsJWA7EaA3JKR9qB1UrrrEW8OcLpD+joFb2/vQt7jze+V/pse
/LKQMHNFpc84moOm+i9u6bTgjKtq6O5xsFSI/FKWRW5uOle8kkpfZP8EaYf/
j3UeJ0wjn+qNovXOBgSfSLlTq5rqHLeoIrZ1S1+I6VvIjx8PbNBe5Dar73WZ
LI23+1VY0P05xnuVm8JcGO+Lwe6Tbz7peJ0i0WY4pO+LwfjL3U833pfd8Rp2
4niDL7/66hPSFxkvoO/rwfirvU8zXtsTQ48KK02tD/YicscnVmlxrG25yIS5
sdZ5XfqKSvK3LCj0tNzVF+0TYM6RQ+eN8rezRmtEb3ND4SUZcHfzBhXgWtbC
BqBuvLPC/mZX3/BGghowqUz7TxKFhUlo0cz2b+9Q3p+Y6kOBbJueaRKJO6Kh
uaEls+lvhejWyqotdjQ5ngAp2k/Q1+l2/44a3dVS6Lald7HraOP/AKrMRP9v
dgAA

-->

</rfc>
