<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-24" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Problem Statement, Gap Analysis, and Requirements for Intra-domain Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-24"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="09"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 81?>

<t>Source address validation (SAV) is an important means to mitigate IP source address spoofing <xref target="RFC2827"/>. This document analyzes the gaps in current operational mechanisms for intra-domain SAV. It also identifies the properties that new intra-domain SAV mechanisms are expected to provide.</t>
    </abstract>
  </front>
  <middle>
    <?line 85?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against IP source address spoofing <xref target="RFC2827"/>. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>IP source address validation in the access network</t>
        </li>
        <li>
          <t>IP source address validation at intra-AS/ingress point</t>
        </li>
        <li>
          <t>IP source address validation in the inter-AS case (neighboring AS)</t>
        </li>
      </ul>
      <t>Some access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches in the access network and prevent hosts from using the source address of another host on the Internet <xref target="RFC5210"/>. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>However, access-network SAV mechanisms are not universally deployed <xref target="CAIDA-spoofer"/>. Therefore, intra-domain (i.e., intra-AS) SAV and inter-domain (i.e., inter-AS) SAV are required <xref target="RFC5210"/>. For the purpose of this document, intra-domain SAV is defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The AS validates the source addresses of data traffic that it originates directly or indirectly. Intra-domain SAV is applied at external interfaces (on routers) facing entities that are not deployed as neighboring ASes and are therefore not covered by inter-domain SAV. For example, as illustrated in <xref target="intra-domain"/>, an entity can be a single host, a set of hosts, or a customer network with no AS that manages one or more IP prefixes. The entity may source traffic using prefixes assigned by the AS or its own BYOIP prefixes. From the perspective of other ASes, such traffic is originated by the AS.</t>
        </li>
      </ul>
      <t>SAV on traffic received on external interfaces facing a neighboring AS is considered inter-domain SAV, regardless of whether the neighboring AS uses a public ASN or a private ASN. SAV on internal interfaces (e.g., interfaces between Router 1 and Router 3 in <xref target="intra-domain"/>) is also outside the scope of this document. This is because routers inside the same AS are generally assumed to be trusted, so SAV on internal interfaces provides limited additional benefit when SAV is already applied at external interfaces. In addition, techniques such as fast reroute can make SAV at internal interfaces technically challenging.</t>
      <figure anchor="intra-domain">
        <name>Deployment locations of intra-domain SAV</name>
        <artwork><![CDATA[
    +--------------------+        
    |  A neighboring AS  |         
    +--------------------+          
              |                                      
              |                                     
              |                           
+-------------|-------------------------------------+ 
|Domain       |                                     | 
|         +----------+               +----------+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       | A customer     |         | A single host |  
       | network with   |         | or a set of   |  
       | no AS          |         | hosts         |  
       +----------------+         +---------------+ 
                                                    
Intra-domain SAV is applied at interfaces '*' and 'X'.
]]></artwork>
      </figure>
      <t>This document analyzes the gaps in current operational mechanisms for intra-domain SAV. It also identifies the properties that new intra-domain SAV mechanisms are expected to provide.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl newline="true">
          <dt>SAV Rule:</dt>
          <dd>
            <t>The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
          </dd>
          <dt>Improper Block:</dt>
          <dd>
            <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </dd>
          <dt>Improper Permit:</dt>
          <dd>
            <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </dd>
          <dt>Proper Block:</dt>
          <dd>
            <t>The validation results that packets with spoofed source addresses are blocked by SAV rules.</t>
          </dd>
          <dt>Proper Permit:</dt>
          <dd>
            <t>The validation results that packets with legitimate source addresses are permitted by SAV rules.</t>
          </dd>
          <dt>SAV-specific Information:</dt>
          <dd>
            <t>The information specialized for SAV rule generation.</t>
          </dd>
          <dt>Direct Server Return (DSR):</dt>
          <dd>
            <t>A traffic delivery model commonly used by Content Delivery Networks (CDNs) that use anycast service addresses while delivering data from edge locations that do not announce those addresses. In such deployments, a request is received by the anycast server or location, but the response is sent directly by another server (i.e., the edge location) with the anycast service address as the source address, rather than the address used to reach the edge server. This can create a legitimate hidden-prefix scenario.</t>
          </dd>
        </dl>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>The requirements language is used in <xref target="sec-requirement"/> and applies to implementations of SAV conformant to the listed requirements.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>The problems of existing intra-domain SAV mechanisms can be characterized along three dimensions: improper block, improper permit, and operational overhead:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block. Existing intra-domain SAV mechanisms may block data packets using legitimate source addresses when the applied SAV rules are inaccurate.</t>
        </li>
        <li>
          <t>Improper permit. Existing intra-domain SAV mechanisms may permit data packets using spoofed source addresses when the applied SAV rules are inaccurate.</t>
        </li>
        <li>
          <t>Operational overhead. Existing intra-domain SAV mechanisms may require operator involvement to determine and update SAV rules. This overhead depends on how much manual effort is needed to keep the SAV rules up to date.</t>
        </li>
      </ul>
      <t>In this document, these three dimensions are used to analyze the gaps in existing intra-domain SAV mechanisms.</t>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section introduces the mechanisms currently used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) can be used as SAV filters <xref target="RFC2827"/> to check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, each Access Control Entry (ACE) used for SAV filtering specifies both matching conditions (i.e., prefixes) and the corresponding action (e.g., permit or deny), and packets are processed accordingly.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps of the current operational intra-domain SAV mechanisms.</t>
      <t>ACLs can be used on interfaces facing a customer network with no AS or a set of hosts to permit only packets whose source addresses belong to specific prefixes. To ensure correct filtering behavior, the ACLs used for SAV filtering need to be updated when the permitted prefixes change; otherwise, packets may be improperly permitted or blocked. In ACL-based SAV deployments, keeping these ACLs up to date can introduce operational challenges when operators need to detect prefix changes and determine and apply the corresponding ACL updates.</t>
      <t>As described in <xref target="sec-mechanisms"/> and also noted in <xref target="RFC3704"/>, loose uRPF sacrifices directionality when validating source addresses of data packets. Since its rules are overly permissive, any spoofed packet with a source address present in the FIB may be permitted by loose uRPF (i.e., an improper permit problem).</t>
      <t>Strict uRPF may block legitimate traffic in the asymmetric routing or hidden prefix scenarios (see <xref target="subsec-ar"/> and <xref target="subsec-hp"/>). It may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being blocked (i.e., an improper block problem).</t>
      <t>The following subsections describe two specific gap scenarios for intra-domain SAV.</t>
      <section anchor="subsec-ar">
        <name>Asymmetric Routing Scenario</name>
        <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc.</t>
        <t>For example, a customer network with no AS connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing. <xref target="multi-home"/> illustrates an example of asymmetric routing. The customer network owns prefix 2001:db8::/55 and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
        <figure anchor="multi-home">
          <name>An example of asymmetric routing</name>
          <artwork><![CDATA[
 +----------------------------------------------------------+
 |Domain                                                    |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-----*----+       +----------+               |
 |                  /\               /                      |
 |                   \              /                       |
 +--------------------\------------/------------------------+
  Traffic with         \          / Traffic with            
  source IP addresses   \        /  destination IP addresses
  of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  
                    +----------------+                     
                    |Customer network|                     
                    |with no AS      |                     
                    |(2001:db8::/55) |                     
                    +----------------+                     

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Customer   2001:db8:0:100::/56 Customer
                     Network                        Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from the customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
        </figure>
        <t>Although the customer network does not expect to receive inbound traffic for 2001:db8:0:100::/56 via Router 1, it can send outbound traffic with source addresses in that prefix through Router 1. As a result, data packets between the customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
        <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
      </section>
      <section anchor="subsec-hp">
        <name>Hidden Prefix Scenario</name>
        <t>The intra-domain hidden prefix scenario refers to situations in which a host or a customer network with no AS legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol within the domain.</t>
        <ul spacing="normal">
          <li>
            <t>A host (for example, a cloud server instance operated by a tenant) may originate traffic using a source address not allocated by the AS operator. This can occur in deployments such as Direct Server Return (DSR), where return traffic is sent directly from the server using a service IP address that is not part of the operator’s internal routing view.</t>
          </li>
          <li>
            <t>A customer network with no AS may originate traffic using source addresses that are not advertised to the AS operator. This can occur in scenarios such as Direct Server Return (DSR) deployments or when the customer network uses address space assigned by another provider (e.g., in multi-homing or hybrid connectivity scenarios), and such prefixes are not propagated within the operator’s intra-domain routing system.</t>
          </li>
        </ul>
        <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or the customer network is authorized to use. In practice, such authoritative information is often missing. Strict uRPF and loose uRPF also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
      </section>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section identifies five requirements that can inform the design of new intra-domain SAV mechanisms. These requirements describe the properties that new mechanisms are expected to provide in order to improve upon existing mechanisms, but do not make assumptions about how those properties are achieved. They do not mandate or justify any specific extension to routing or other protocols and therefore cannot be used to directly initiate standards-track protocol changes.</t>
      <t>Existing intra-domain SAV mechanisms have problems in terms of validation accuracy and operational overhead. Current uRPF-based mechanisms derive SAV decisions from routing or forwarding state, which is intended to express reachability rather than authorization of source address usage. More generally, current mechanisms lack authoritative information specifically intended for source address validation that can be consistently and automatically consumed by SAV mechanisms. As a result, uRPF-based mechanisms may not provide accurate validation in scenarios such as asymmetric routing or hidden prefixes (<xref target="sec-gap"/>). Existing ACL-based SAV deployments may have limited applicability in dynamic environments when they rely on operator-driven ACL maintenance. These problems motivate the first two requirements below (in <xref target="sub-require1"/> and <xref target="sub-require2"/>). The remaining three requirements (in <xref target="sub-require3"/>, <xref target="sub-require4"/>, and <xref target="sub-require5"/>) are motivated by deployment and operational considerations.</t>
      <section anchor="sub-require1">
        <name>Accurate Validation</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy of SAV over existing intra-domain SAV mechanisms. In particular, it <bcp14>MUST</bcp14> reduce the occurrence of improper blocks (i.e., blocking legitimate traffic), improper permits (i.e., allowing spoofed traffic), or both. Specifically, it <bcp14>MUST</bcp14> satisfy the following conditions:</t>
        <ul spacing="normal">
          <li>
            <t>result in fewer improper blocks than strict uRPF, particularly in scenarios involving asymmetric routes or hidden prefixes (<xref target="sec-gap"/>);</t>
          </li>
          <li>
            <t>result in fewer improper permits than loose uRPF.</t>
          </li>
        </ul>
        <t>To achieve higher SAV accuracy, additional information beyond the local FIB (e.g., SAV-specific information) may be needed to make validation decisions. By integrating such information, routers may have the ability to account for asymmetric routes and hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="sub-require2">
        <name>Automatic Updates</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> be capable of automatically collecting and processing relevant information, and updating the corresponding SAV rules in response to relevant information changes. Automation helps reduce operational complexity and maintenance overhead, while allowing some initial configuration to improve SAV accuracy. This ensures the mechanism is deployable in practical networks without introducing excessive management burden.</t>
      </section>
      <section anchor="sub-require3">
        <name>Incremental Deployment Support</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> support incremental deployment and provide measurable benefits even when deployed on only a subset of external interfaces facing hosts or customer networks with no AS.</t>
      </section>
      <section anchor="sub-require4">
        <name>No Adverse Impact on Routing Convergence and Fast Reroute</name>
        <t>If any new intra-domain SAV mechanism requires disseminating SAV-specific information among intra-domain routers via a protocol, it <bcp14>MUST NOT</bcp14> adversely affect the convergence of existing routing protocols or the operation of fast-reroute mechanisms.</t>
      </section>
      <section anchor="sub-require5">
        <name>Authentication of Information Used for SAV</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> use information that is authenticated or trusted, either through verification of its integrity and authenticity, or via an established trust relationship with the information source.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document discusses the problems with existing intra-domain SAV practices and identifies informational requirements for new intra-domain SAV mechanisms. As it does not specify any new protocol/mechanism or protocol extension, it does not introduce new security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors thank Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Tony Przygienda, Yingzhen Qu, James Guichard, Ron Bonica, Xueyan Song, and others for their valuable comments. The authors also thank Kotikalapudi Sriram for his suggestions on the definition of intra-domain SAV. The authors thank the IETF Directorates and the IESG for their reviews and comments, which helped improve the clarity of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="CAIDA-spoofer" target="https://spoofer.caida.org/summary.php?">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 326?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9U82XYct3Lv/RWI/GBSmoWkJFvmvbn2iNRCR6JkUfISWccH
042ZgdnTPW50czSy5JPfyFu+JZ+SL0ktABq9DBcleQgfpOkFQFWh9ir0cDiM
Sl2m6lC8LPJpqpbirJSlWqqsHIgnciUmmUw3RpuBkFkiXqk/Kl3QYyNmeSFO
srKQwyRfSp2Js7wqYiUmSVIoY8SPMtWJLHWeRXI6LdTFYev1yY+nj153F46S
PM7kEmBKCjkrh1qVs6GRF5mC38EEwxWPHBo3cnhwL8qnJk9VqcxhVK1gefyB
/x1GMfw7z4vNodDZLI9MNV1qYwC815sVLHby6PXjKNKr4lCURWXKg729b/YO
IlkoeShe5VWps3m0zovzeZFXq0MLfnSuNnAzoesoklW5yIvDSAwjAcuYQ3E8
Es80XDBGxzLjy7yYy0x/IPIcitcGJl9UUrzJ9IUqjC438I4CLFOAJkc6Zt+V
9qWRSqpRnMELMbx3KB4q/TvCBtd5BfSBW0cLnckAiO9H4qfKA/G9ltkKRvC9
G0Dyux34XawK2I3PAOTZSPygMw/JM5nFCwWQ8M0mKP+6yLP5vIJXKiCanOaF
LGH7anD+0Fkaf4e/Rx/mcSqnnwHQ85F4CkvMPUjPYcAfSBx3+4ZALXDY8o//
IVinI/FEBVCdAt/YG014AMq10vXyc3gpA2ZZ0P1RnC+vXjbK8mIJ812AkAjx
6vHRwYODr+3Pu1/v3bM/7x/s79mfX9/fv3sYoRgFA2MJ0jgEptGzDV4LYVXL
ET6w2mH4Iz0nbXLy0uuKMxVXBfOaEFaIBF0AujCDNnFOlyTK4mDvYH+4t8+L
yGKuSiB8Wa7M4Xi8Xq9HMb6PyI/jscrGlRmbarXKi3IMusWMp0UukymAMCSY
xwy5sTCMD/a++mZ/aBhexme0KJcpLHfy8uxJE7c8m+k5jAOOOX569FI8VrKs
ACeHoVWKTypZJNfGbv+rm2FXJoyYWesSBMqMU5kBViXq7vLgm6/2xiaflWvQ
ZeNCpUoaNd4/GB78dv/ub/AztjgQS43nlU7UGAeZeA4zJot49eDAEeBocnI8
GZpVns9U0aAE6W+RzwhpfM681oswThIg3IupXWMUS9B+IxgHe7hcymIzWi1W
30YwJhqNRlE0HA6FnBqwC3EZRZbc0vLVhbdBYgcU9K7QuDFCL5EZZFaKpZKZ
ARUrlrrUc8QAwDfNSYzFRry1svFuJF4vYCageYV2B6YESn+ATS8XSszlyoAU
C+CmAh/mK8WklSksFy9Aes2Szadu2cOROIHJUpML2IOs1DNt5wRTB7OUfClL
kal1Z3A4Oey0UO9XKi5VgtjB+AuY0pJrqZMkVVH0BRnkPKliotCfX4AIkInN
P3lKdq25pWSiZipLYKk5rG/Ka9LtVJVoQy1R8sKA2siEQk0CIxELwA4xnuVp
mq9xdKouVGrEjlGKZkI99G73MIpu96wZbDhQBSeScYwPMl74ylGwPBN2cjaG
1enxKodb110PXlUFjAbEjBI7mdLzBZgJxGRytiuQsMs2VEYs5AXcTMHZSDZA
2lWab2DnmruKXKdgzmCfy81KxzJNN7TjfhxA41RBPxlIO63AJ0MGXeQG3bki
X4oKzT+938IT5FpmOTwo6HVcAd86QWRhznpjRuJ5DZ7O4rRKFO3Vdn46WSJ7
kgdHvHWyCy+nFT1DKSG9+taanXd2H0K9KnZQL++KKVCckKcRJstzcnPe4lMa
12eJ3oZ26x3sz9N8DXQpBpZkQ0eyHhEDioiKHSXaBL8Bbxt6kvSFKhQgowZN
ud3RIzUaeJbbZRGAzWE26rxFrGXfAgAKdsiTkP6PgWSkM6pilRtSyWWorQZd
zYFPFYgqTCSNFT1DuwZwA9s6NrfaqMkbirgDnkpwnOVspmPWURq4pNBz8DBw
XAJgxiXQiNSeuxp1QgLS0KtVqhGWEpQYMhhoTsJ9JmFHxA7sMPjgcG12BdzC
PUZtWatHtzd+PyRyfiiI1kDji6XbGhoSAyciQaeb5haQdkbSqvdyuUphH2FO
naYVWh7UsvDOn3+GlP30CYMmhmxDam4KNBMoYcCEKEUDvAThAfKRDA6QOBIM
hylBRxReWEGUFwAcbgShtwR7M0eyZwpHLBF2EAmQ55l+r1hPuHWXcuP2y+0O
C7l7G/Awep4xyiVvN+4RqIR8nYmHv7xoTP0Y1QSxF5AfDQxwPyLAugEJOxCm
ihd+NdhPzwbBGmCKcLdRj9gXgSMUTEYC3LftdqdlaydxAfBgDJi3QiWdTRvA
vHPQEanVYuuFIkgRitZEFbKyBLmZpgDO5OyUt2NV6At0DODGSFiYaZU2W6rR
3Akp35nC/imVUfQIS+5zDM0Xd/sYhv0TtP/wEmLE4haDteyIsfVBNC4TS4Dd
yQRGEH4oRA+IGvI5hAZgc8lWGHCl2DGYKo52VQLbll+GnnUhjEg1+EooU0mi
rVszhalnIO9A3FqIrTG7XJhRAfiZBqIE/ZrpPypYhpgItZEEc1MoQo6kaCnP
vafQByjPwVYRtHWaQkgEOwwMF/3111/ka94Z9vzdEfaPXvkoxKTNIHgzfOfy
aexL9d9Hca2/zxp1g0FRE+yPfUj0YBV9PGahuglYH2GYv7gTTtf8az1qDPtY
i0yb4Hfco3sEz//GamLsfvy6BaNe3Mb1G73j+oeNw1f6xrWGdXDqItmH28da
A320k9kbB+59T8n7NSXto9vhard7Vvu5l5LjEJ9xD3L1vQYlG8OuIkmA7a/+
17iPgWs2v+OFpSO/NaN0Oc2P+giKwZvoNkST0L7jk3pUw5o3R5GdsZ6AaI0i
s9+LPfvtwZPPwqulOa73F13htgXq+MvbX5Ld+/LnL0ekgP88FF80PFDOIPzz
rWPy1igMSPOYYgMy2W139RZEp/9v4+8vvhCvVbHUWZ7m800E1LgwKyDUJ3KH
XlWYShHRIblwBVwhJtKadl4bbHBc6KmFbAlUR/NUqJQpttAr73jIdhi3w47c
Lu0IDifHHuO0fImz+H3bMbtEDKByZdhvq6HIaxucqFhjDt0AahTHAZnEQ9i+
8xqNIEYGIKq0tEQkwsr4XMENEopUzcEPWKKz1QkxkKJTnBd9PLsQRlyVQnjA
u4xjzGAxVEi4BkQvkeTlZ4DEEVzSD8+KZi1vAtHLG1Ho+qA40sA+9Sx3XfRv
tBs19q1F4fcQQwONXv2JSxJjttour+t7gl4EcD7APCiSbiLrruI7MOUxxYvi
TBUQnYlXqqwKiIqPz17t0qQTH0QkKsVwHOKeHH5CYLBc5hnsimPioxw4HJTC
sXvv1GVgdo6OTyGeJDqgNy2zTYyup4E1dQP59UKnyq2EUkOxL+VPVDJXgfJi
ec0psJRZllcZhmELjMr9dOQBk7ObeP2H5TaK7ZUhEfShkQ2fQtiAHkA2t+ZA
TCtmY5h9BTAoHG8QZR+BoyzbXI6dwOYXcFgDg13mhPaSATnQQ++mBCDokjbK
kjb9ZF+nfQDxgNggXtQLMhw2pEEnP4YXSgyXAy5c6AS08pBVGERFKpOFzlmn
NiqTz2Q2ryBCRjOhxLnaCCzRGXHr+Zuz17cG/L84fUG/Xz364c3Jq0fH+Pvs
6eTZM/8jsm+cPX3x5tlx/aseefTi+fNHp8c8GO6Kxq3o1vPJL7e4cnrrxcvX
Jy9OJ89ucUKuYb0KZUMxUr+AH4VXJnKanpILD49e/ud/7N+DmPGfMJ26v//N
p0/24sH+1/fgAqMvXo1Yni+BxJsIbISSBZmSFIRCrnQJVo5SGGaBUT6mQICQ
t98iZd4dir9P49X+vX/YG4hw46ajWeMm0ax7pzOYidhzq2cZT83G/Ralm/BO
fmlcO7oHN//+baozJYb7D779R8Q8UoTsk1r28caPInXMjQevAb0pgUQ+D1UQ
NKaF8FHtuaAyw+oKajvYaHgJOT7VGG831kQm7lbCbUbe1rk/Maj2iuZX72Eq
a7e3+iI28wTXWCIBjYWqVqY5JXoLBZpMw2JkxA+9IWODMqivWdtb9go8KkyX
LSDQ53x8Y/RIPLoOfJihovdZjzobxFmqy4wQZRtIuVjH0xshEqnaAo9EAzhG
5QbQ8YA+8Lba5OvDhqC96CHoDeCznOSLKjDgIk9tRh2YLgGFgi6not3jtojA
YrPWdeuiGaLCDhhn0A1iiaYJ2LcC2NQMWJksUqZUwpr8XKkVYVpjWK1oVcbu
pKXuSCUZ1eE9ooszD9ahb/jz12F2kqMj6/iHVO3EK0GVgqWsngQEbZKCla7m
C9S64u6DuoJFFMSbD+7RTayPv2MnZrYBM3aBKTbhCkcznZbsIiwVTJhgFg2Y
udApZ5ezxHo93aylwSoR5fy45MPDbZnIoLVA/94yF/mb7YAsa8jpCoUfDLfd
baNiW7TiAqCLJgK1wVR0vlOo4LpxUxQNxYQrTOhhFXkqnmmMTncmR8/Aq7I6
iGYCo4PwMW1MQFpYIl4o0AP99SfyGFj8fNHRR821MwrUBDlf6CklKevE9U+L
gGB5EFT5mGfAS7TweIStEojHo12G33mp9eZaZxczvuBWgbCU8QLvg+rnxKZx
HpYDpw7A4rxgTy2h5Dbvik0lW70D64Hfs9ll5esUELngRY6wIlFjmAinSDe0
GWdlocFhrl69fBzwqc/hwnbIqsyXlJOvkUHX0MUGW+uAfftADieR87/+7d8N
+Y8pVkvWkoAKowDxkOqij08eQoQ5cRNh+gDovqIdRO9Fz4BmuzQxvIqkLHEp
yseT/0eFmn4omVA7OhivcBcJNoBynjdiXd4wF+kTPPRmNyoeiRfo1q61UYPg
baqfaRMDsipBYzMUz3J08lvkJ8GFQF1T7YZ9AaYUQIhsVcdl7McTJUgmOF/B
qQhQCBhHYEm2pgJTZQtF9ewSQlKQQvNsceUb9RMucXcIg3o37Be0ShV0t0vW
OI3TzdXYWfvyNZeretQtDdXiShetgtFlBbUw9cYJNUzXWMFD8vuYmMK2jqGf
KvakcuFD3qAOlwPjmaqwYg4CWSuNqQJlrvOCGYlQ2aJe0NbaAIFtd1K7F7Xe
8/U8JNBc/Y0rcsyqDgdytVSYrWjoTZtEoIgUABpyPZ3TPEFoihbfCp5xkHuL
T/vhrUpjM10xxrlHdQ+IwxAdFSCSk3BChAu1TRcG1fimR30CLJZExB5GNCIo
9uEDO29deJRKiIf5JS+tA5BNL8NGwjSwt76QTRhhfZUwCXTm1tq43YORONMo
vVhfrf1BlD63G8ZAqI8qbOPdSyvSxLadnB4rhNI1eqCQ231uZGgCbKwx4kao
0Cd2wcUuKrHQhNQ+euCQ+wqv9XTNZgl+SoGlXG6XRZ7ioF20gnbbzgM7Uk1x
U2RhN8PfWaw+feIUJK4NVCnluSJ1aGu9QIhtyUsqzWf0dGATXPw8hN7JxFSR
NNr8WQ9pGO+QMq8b/UkMMJt5x28C9EytEEDLBZj3Jp4piTGpKWgbjsWZHYb6
1JMKWbtDa+5kc3yGm4MaXdnGHs816FwjmCUW5G3bEvYRrCTyFjolQGecJ9Gz
mSKFTI+IzzVWYjH3Zlwsy7OORA9AqAhyjHKIbzH3kKHCtflR99YqT3W8GXhm
omKtIsUH/lgZI72bbReXqnPgjsxn3Ze48TDIV8atpYH3kKmc1oFNRu8EJASi
n6mE8J/sBtHGspaFbsDNItNNk6u6nD8CRqbVhwuAFHi77hQh58tiQza8Z/Br
MoctLPN1ZpwcHezt7R8m0weHh+P792nbLOK8Meu8i/Kgtw3hYORv+xcOBs1G
BfWeNbHfszB/e6Gla3urOdpvbpGXeZynZAnBbdQQH7XJzOIwzSvkvYDMXQJw
QcUEuV7kYmsyPUX2kCZfIRlUxjWTgiK5Gk1Zr7R1jv29K+Y5IJwosoUwLiRu
coGVIpS8Nkwh3be8V69rl7sGbVusRvYM03qmx0I6X1izZeplCe9qIh95Z8Z2
T/T2PFzv704kmj0EN/r7GG3rObik0n+N0UF7wdaehv+rtX2Bu7/X4IrRdXV8
+/Cto8PS+tbh7dE92F5CgPboThtCoxGhDWb/2rc/c23+67Qh9DUYbB3dptOW
wTi6V0p+DS96mxSslIjXVjvZVoHO6uP+NwS1AFhDf/IycEKD0QB1aP7D1/B0
yaxXG9nRv463vtHfR3BJJ0IL6h4yHrUMQD8j948NXAK+cYOxOw3runuTsdfF
NyJFHCrg1l/z8UEkjrEU2Po7Ve/L3xb5Cn5e9jjqGCL8O6pbWPr20z3ubw9x
bfxb/uzjqHdmr25FL1zuMdAI3aCeeCNoJ525btSOsxDZonk7HAPj0wfUGhy0
VmgchUV1EwRDed3RWXe01CbYtbNMrnDzboV55l4ckhwAxtoxez5cN6VKcNtj
2uq+oHtWez7gv6NXDuFignmw5hRb6cWtAS5Z1PSm0POnWjW6w4NmicR1ofTi
Fjgc++SNc0AV0gnjDoiXJ0WBvoyNMumkkqIW8piYYqHqkJy8XUcRmA3LD4GM
2WMmprGbU5thc6lEny0MM24Nn7sm76DHw/INDOu8Sm0yUxJqje6KThhPrNzv
CVJHe4HbHmzn3RGmqA02CWCWflDnhDq0NlTPuXz5LXIBLFezT0g2xg4DpMK2
FSQgODYn1A2zMe2x1KksEFJdK7bePSFG7S7QSUA4jLZrAd/N0S3QcUzav7+I
OofkTzl98ZJf6Ubji5UtyzZ89P6kB0jJjJKs4J7rsrJlYnh9vdDY62xP1lx1
BKAmAJ2m8Ccsmu39HYQbByMutNF4FMZG8ZcGGCGp+BUu9zC4O7NWcJ7mVeL6
SrA2IDOfBnR9ZCXQIyt3Sew9Ai34OwxKPTQpdaY0zyrYLGLQPMJZBwA5SFv6
fvLtrUQkQnSohu4FBxia/TOe3SyWHmDbGlO7VPYgDAO/kkXpwnEHtK0z2CZ2
R/kLrdaWxpcxwmXku3z7feyZOA64gpB19upqMjaoDsyxXS/xgQt/WpAzd/Vh
FNekZKtWRX3CQnhr67KMm2mhfRJEX2Bm1sNsC2cEeX3qxZICzb2cc1K95vP2
/nSlw2xMqZYjTk41kuUDq9O4AthO+/MCqJE8SW353tiTsrqkI9WNLAvtHngB
qY41smBdcWTd0bPdyquTXtprv9wH5gLYDEr8u0KxPcazHSbsGZiBKAtKWWPa
KswYI8WDlDMlJWZSY0lnW06Y8l4bdsXImDT0e2OQqk+99B5Iw92VUxJbL62c
EfvSsG9d2PNztrGOTz9mvmc3OKGCpa3Ohy9O1bq/jSBsEWpVvoKe4hkSs9F0
xFU4qp1QMpK0rUJhQJ1xRb+xOxnamLHORW9pYL66X5mSw0XCPb+aj2mKapUH
zRj1JFyytN2O1CBM54xWbOYkOJslNZRw/2MAEG0WJwcTywN+loxqSkDw34GB
+cMBmzqxjgeKqHskzCjDy15vkAEzrthuj/nF2IpZ+qIh1p2catcZmFZqNipx
6SIxQzxYfl4bQ1uUAq64VnsONWz4li0UflVw71Z45ph6geLN1uaqke9pQWGy
qiZYBXYIGarRkM0sHRBlVpfj6YspA6s7tKl7UTDb+X5F+pg6NOVUU5UrbOd0
akM6j7tlqCsj56BKnufhmbOBL+8GYKdI2e0Kxm0zneRqtMtsP4TtxQg73rBS
ZEpuYqFKH7c8uLNh8JiOwdn25VCcGkFNP82pgsAGhETFt3s3j4R3Lec16mR4
mpCrlVhAxzqYZ7atdVkCiNjNH9DDZpfYbSG6Q5tMLqnGcqGLPONhzjxjTQMd
yrouO0yQq6gULJC3yW3jDiJlAq5e5iWfkOT4rMB+EKxAhMoIy+RrscNV2Grq
1OR+WPZzNw8IY27LxHW171RsTNmZ7C6euG3cucdncFvz38eDlqh0HODEAjUp
O2LoSo7ssdtandvu4CA7RQU1ahDeZ5srVLeg/lqnWu1BfVYGtn8UdcD1et/I
eoOTqeMKAi0Komj2QlEpnvyamMWQ20eaJU7fpERXreZL613udjpC/Sjp66G2
aF0PwdYCUMngIAQSXcNngHpmxg59XVatm6cO0RVmYUQunqk1hhYt2Ek1NWLI
mhSkPgJJ5PZIctqbsqjMlaL4t8tgcSQhYGrvBzgmqH8t9Bx1KZ1gtXs9CA/T
hipwqja5bRSrO4WsG9w4ZhEM2nXl/7pHk6xxoJfqUzviIavWeWHbF1BJBZMN
fCHRqxdiUqtUsJoc0+eESC93yYmi1KJnqyRPp9d7z8qglDmNLd5wW0dTxg5u
IGNoEOSKPgCB6biWKUhTdNKQI+jDGNRWZ49VqQtJ3RUBTXwbrUsa9aeAyOD7
cxiUvevO5j0Kjyw23qp0ZZzgNlURBtrvkfYIRKCWvbMwsAdUaoHEpCR7NqTL
6o/9hG5dyI82BOTepVZnKH8sAnUl0VL7iAEm958zwVAK/T3XCESfaHhPRL1Q
9vsFpGqnFbiXGW/2SRazboeZgrOAZ/zppubO373BzttvP2Euyc/f0vbOiC+V
BJQJMXumHaiANpCsZPh9Fc7rcfNHyb34Wz9ZwH1lIB/tKMwE4TzT4BR+JtS4
gf3qQFeXbcZ5jvIMHs1JfSPUj/FAzit7NL5BnnufKPMpr6aQDz4TiOLUkspC
zMK9ykXIZd42Q05DYHJSek+51u94XEMyUkiz2Yxy2SQ1NT7haYZ2Bsq4KNZL
Ar6OHwYYug8DNFvASXEsMNqK/ethC+qbsNGuQbj7N+ArjD47QbqNq+3a3Ffn
v7CgtHWjOYlO35wJQERuY2Xs5NtPBTfIjhKNIfwCD36aarMgO1vRFxKC85/+
1FbDneZWHQxn3efWKINcezY2hHUfQvsk2udsscm18vkF7wDScttdFJdRYGsQ
RMEBdJj9asfYVwa94KXjsQxXJXFd+I7rHfuM633L66iwDh4HjVnq3kWcw9Gi
xwcUJ5PTST8FNSi4ziFlv4I72Idw0hw2reknnsTnWb5O8WQcUYMzzBwosXNx
Lr6X+LWT5xLs9UB8n6tUPJUpiAdgM9G/V5n4SWIH1XOI8CQ8fIX/QziL2D6B
uFsc57bH6nUOYLwsPmzmGgIsORC/wO0PqO5+qGBmuQSon1Q8HNtcMvEwx89r
DMTPldpI/OwnTkM+M3K371TW1M9ckTLFc5h0zkmEmFBSiNH5F3DFz2UqV1Wi
xVmhC7mkeSh/Us3nWLGmQ1U2D41fK9JebjrHuLv0wlH4iU+buMxdK1Zin5w9
CeAuFKZgjW2sWtq+Vw6X0TS7E7/WG4rBx0Qe6XyihT+3NoUwN4K//wYpCeq9
blUAAA==

-->

</rfc>
