<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 2.7.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-duke-tsvwg-ecn-aggregating-tunnels-00" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ECN Over Aggregating Tunnels">ECN Over Aggregating Tunnels</title>

    <author initials="M." surname="Duke" fullname="Martin Duke">
      <organization>Google LLC</organization>
      <address>
        <email>martin.h.duke@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="August" day="15"/>

    <area>Transport</area>
    <workgroup>tsvwg</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Explicit Congestion Notification (ECN) provides two bits in the IP header for
routers to signal congestion to endpoints without resorting to packet loss.
RFC6040 provided guidance for how IP-in-IP tunnels should transfer (ECN)
markings between inner and outer IP headers. However, that document implicitly
assumes that no more than one inner packet is present in an outer packet. As
numerous tunneling technologies have since emerged that break this assumption,
further guidance is needed.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Explicit Congestion Notification (ECN) <xref target="RFC3168"/> provides a means for routers
to signal congestion to endpoints without dropping packets. This can achieve the
goals of internet congestion control while not introducing a degraded quality of
experience and/or delay due to packet retransmission. The internet community is
also now experimenting with using unused ECN codepoints to provide extremely
low-latency services <xref target="I-D.ietf-tsvwg-l4s-arch"/>.</t>

<t>To take full advantage of ECN, <xref target="RFC6040"/> provides rules for encapsulating and
decapsulating nodes for IP-in-IP tunnels to propagate ECN markings from inner
headers to outer headers on tunnel ingress, and from outer to inner headers on
tunnel egress.</t>

<t>RFC6040 implicitly assumes that no more than one inner IP header is present in
a tunnel packet. (RFC3168 is clear that an IP packet reassembled from fragments
takes the highest congestion indication from its fragments). Nevertheless, there
are several IP-in-IP tunnel architectures that allow multiple inner IP datagrams
in a single tunnel packet. For examples, see <xref target="I-D.ietf-ipsecme-rfc8229bis"/>,
<xref target="I-D.ietf-ipsecme-iptfs"/>, and <xref target="I-D.ietf-masque-connect-ip"/>. Existing
specifications do not provide recommendations when IP packets with different ECN
marks are encapsulated in the same tunnel IP packet.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="default-tunnel-ingress-behavior"><name>Default Tunnel Ingress Behavior</name>

<t>An encapsulator <bcp14>SHOULD NOT</bcp14> aggregate packets marked Not-ECT, ECT(0), and ECT(1)
in the same tunnel packet unless doing so prevents unacceptable delay, packet
reordering, or other degradation in metrics.</t>

<t>The encapsulator checks the following conditions in order, until it finds an
applicable marking instruction. In two cases, these rules offer an
optional behavior because they might cause RFC6040-compliant egress to throw an
alarm and/or log an error. If the ingress believes these conditions apply to
the egress and the alarms or errors would produce an unacceptable operational
burden, it uses the optional behavior.</t>

<t><list style="numbers">
  <t>If all inner packets have the same marking, the encapsulator follows the
rules in <xref section="4.1" sectionFormat="of" target="RFC6040"/>.</t>
  <t>If the tunnel packet contains both ECT(0) and ECT(1), mark the packet Not-
ECT.</t>
  <t>If any inner header is marked ECT(0), mark the outer header ECT(0). A tunnel
ingress <bcp14>MAY</bcp14> mark it Not-ECT if there is also a Not-ECT header present, in order
to avoid alarms or errors at the tunnel egress.</t>
  <t>If any inner packet is marked Not-ECT, mark the outer header Not-ECT.</t>
  <t>If no above rules apply, the inner headers are all marked ECT(1) or CE. Mark
the outer header ECT(1). Encapsulators <bcp14>MAY</bcp14> instead mark the tunnel packet Not-
ECT to avoid generating alerts or alarms at the egress.</t>
</list></t>

<t>The following table summarizes the possible outcomes for all 16 combinations of
inner header packet markings:</t>

<figure><artwork><![CDATA[
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |         Present in Tunnel Packet ?  |  Outer    | Applicable |
 +++++++++++++++++++++++++++++++++++++++  Header   +    Rule    +
 | Not-ECT |  ECT(0) |  ECT(1) |  CE   |  Marking  |  Number(s) |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    Y    |    N    |    N    |  any  |  Not-ECT  |     1,4    |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    N    |    Y    |    N    |  any  |   ECT(0)  |     1,3    |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    N    |    N    |    Y    |   N   |   ECT(1)  |      1     |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    N    |    N    |    N    |   Y   |     CE    |      1     |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |   any   |    Y    |    Y    |  any  |  Not-ECT  |      2     |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    Y    |    Y    |    N    |  any  |  ECT(0)*  |      3     |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    Y    |    N    |    Y    |  any  |  Not-ECT  |      4     |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    N    |    N    |    Y    |   Y   |  ECT(1)*  |      5     |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 |    N    |    N    |    N    |   N   |    N/A    |     N/A    |
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                    Table 1. Ingress Markings
]]></artwork></figure>

<t>* Ingress may mark outer packet Not-ECT to avoid errors and alarms at tunnel
egress.</t>

<t>Encapsulators <bcp14>MUST</bcp14>, in the rules above, consider the marking of packet
fragments where the inner IP header is not actually present in the tunnel packet
being marked.</t>

</section>
<section anchor="default-tunnel-egress-behavior"><name>Default Tunnel Egress Behavior</name>

<t>Decapsulators follow the guidance in <xref section="4.2" sectionFormat="of" target="RFC6040"/>, except that
they <bcp14>SHOULD NOT</bcp14> raise an alarm or log an error under the following conditions:</t>

<t><list style="symbols">
  <t>the outer header is ECT(0) and an inner header is Not-ECT;</t>
  <t>the outer header is ECT(1) and an inner header is CE; or</t>
  <t>the outer header is CE and in the inner header is CE.</t>
</list></t>

<t>These are expected behaviors in this specification.</t>

<t>When reassembling an inner packet from fragments scattered over multiple
outer packets, decapsulators apply the strictest outcome applied to any
of the packets. If any outer packet is dropped, the inner packet is dropped.
Otherwise, if any outer packet is marked CE, the inner packet is dropped (if
marked Not-ECT) or marked CE (if marked anything else). Other outer packet
markings do not change the marking of the inner parking.</t>

</section>
<section anchor="rationale"><name>Rationale</name>

<t>The above rules minimize the changes necessary to tunnel egress. Marking the
outer header Not-ECT always allows the egress to preserve the inner header
markings, although it may result in a packet drop where a CE marking would
have been a better outcome.</t>

<t>Unless an outer header containing ECT(0) and ECT(1) inner headers is marked 
Not-ECT, it risks being marked CE. As ECT(0) and ECT(1) flows react differently
to CE markings, one will respond inappropriately. However, they will both
respond correctly to a packet drop due to the Not-ECT setting.</t>

<t>A Not-ECT inner header cannot be in an ECT(1) outer header because the outer
header will be marked CE more aggressively than an ECT(0) header, and does not
correspond to a packet loss for Not-ECT. Thus, the egress's drop of the inner
Not-ECT packet on CE is inappropriate.</t>

<t>CE inner header are always preserved on egress, so they can coexist with any
outer header codepoint.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations in <xref target="RFC6040"/> apply.</t>

<t>An attacker might attempt to degrade service by injecting packets into the
ingress that force the outer header to be Not-ECT. They would inject ECT(1)
if the legitimate traffic was mostly ECT(0), and Not-ECT otherwise. This is
one reason tunnel encapsulators are encouraged to separate Not-ECT, ECT(0),
and ECT(1) traffic.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC3168' target='https://www.rfc-editor.org/info/rfc3168'>
<front>
<title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
<author fullname='K. Ramakrishnan' initials='K.' surname='Ramakrishnan'><organization/></author>
<author fullname='S. Floyd' initials='S.' surname='Floyd'><organization/></author>
<author fullname='D. Black' initials='D.' surname='Black'><organization/></author>
<date month='September' year='2001'/>
<abstract><t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3168'/>
<seriesInfo name='DOI' value='10.17487/RFC3168'/>
</reference>



<reference anchor='RFC6040' target='https://www.rfc-editor.org/info/rfc6040'>
<front>
<title>Tunnelling of Explicit Congestion Notification</title>
<author fullname='B. Briscoe' initials='B.' surname='Briscoe'><organization/></author>
<date month='November' year='2010'/>
<abstract><t>This document redefines how the explicit congestion notification (ECN) field of the IP header should be constructed on entry to and exit from any IP-in-IP tunnel.  On encapsulation, it updates RFC 3168 to bring all IP-in-IP tunnels (v4 or v6) into line with RFC 4301 IPsec ECN processing.  On decapsulation, it updates both RFC 3168 and RFC 4301 to add new behaviours for previously unused combinations of inner and outer headers.  The new rules ensure the ECN field is correctly propagated across a tunnel whether it is used to signal one or two severity levels of congestion; whereas before, only one severity level was supported.  Tunnel endpoints can be updated in any order without affecting pre-existing uses of the ECN field, thus ensuring backward compatibility.  Nonetheless, operators wanting to support two severity levels (e.g., for pre-congestion notification -- PCN) can require compliance with this new specification.  A thorough analysis of the reasoning for these changes and the implications is included.  In the unlikely event that the new rules do not meet a specific need, RFC 4774 gives guidance on designing alternate ECN semantics, and this document extends that to include tunnelling issues.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6040'/>
<seriesInfo name='DOI' value='10.17487/RFC6040'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-tsvwg-l4s-arch'>
   <front>
      <title>Low Latency, Low Loss, Scalable Throughput (L4S) Internet Service: Architecture</title>
      <author fullname='Bob Briscoe'>
	 <organization>Independent</organization>
      </author>
      <author fullname='Koen De Schepper'>
	 <organization>Nokia Bell Labs</organization>
      </author>
      <author fullname='Marcelo Bagnulo'>
	 <organization>Universidad Carlos III de Madrid</organization>
      </author>
      <author fullname='Greg White'>
	 <organization>CableLabs</organization>
      </author>
      <date day='27' month='July' year='2022'/>
      <abstract>
	 <t>   This document describes the L4S architecture, which enables Internet
   applications to achieve Low queuing Latency, Low Loss, and Scalable
   throughput (L4S).  The insight on which L4S is based is that the root
   cause of queuing delay is in the congestion controllers of senders,
   not in the queue itself.  With the L4S architecture all Internet
   applications could (but do not have to) transition away from
   congestion control algorithms that cause substantial queuing delay,
   to a new class of congestion controls that induce very little
   queuing, aided by explicit congestion signalling from the network.
   This new class of congestion controls can provide low latency for
   capacity-seeking flows, so applications can achieve both high
   bandwidth and low latency.

   The architecture primarily concerns incremental deployment.  It
   defines mechanisms that allow the new class of L4S congestion
   controls to coexist with &#39;Classic&#39; congestion controls in a shared
   network.  These mechanisms aim to ensure that the latency and
   throughput performance using an L4S-compliant congestion controller
   is usually much better (and rarely worse) than performance would have
   been using a &#39;Classic&#39; congestion controller, and that competing
   flows continuing to use &#39;Classic&#39; controllers are typically not
   impacted by the presence of L4S.  These characteristics are important
   to encourage adoption of L4S congestion control algorithms and L4S
   compliant network elements.

   The L4S architecture consists of three components: network support to
   isolate L4S traffic from classic traffic; protocol features that
   allow network elements to identify L4S traffic; and host support for
   L4S congestion controls.  The protocol is defined separately as an
   experimental change to Explicit Congestion Notification (ECN).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tsvwg-l4s-arch-19'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-tsvwg-l4s-arch-19.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-ipsecme-rfc8229bis'>
   <front>
      <title>TCP Encapsulation of IKE and IPsec Packets</title>
      <author fullname='Tommy Pauly'>
	 <organization>Apple Inc.</organization>
      </author>
      <author fullname='Valery Smyslov'>
	 <organization>ELVIS-PLUS</organization>
      </author>
      <date day='3' month='June' year='2022'/>
      <abstract>
	 <t>   This document describes a method to transport Internet Key Exchange
   Protocol (IKE) and IPsec packets over a TCP connection for traversing
   network middleboxes that may block IKE negotiation over UDP.  This
   method, referred to as &quot;TCP encapsulation&quot;, involves sending both IKE
   packets for Security Association establishment and Encapsulating
   Security Payload (ESP) packets over a TCP connection.  This method is
   intended to be used as a fallback option when IKE cannot be
   negotiated over UDP.

   TCP encapsulation for IKE and IPsec was defined in RFC 8229.  This
   document updates the specification for TCP encapsulation by including
   additional clarifications obtained during implementation and
   deployment of this method.  This documents obsoletes RFC 8229.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ipsecme-rfc8229bis-07'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ipsecme-rfc8229bis-07.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-ipsecme-iptfs'>
   <front>
      <title>IP-TFS: Aggregation and Fragmentation Mode for ESP and its Use for IP Traffic Flow Security</title>
      <author fullname='Christian Hopps'>
	 <organization>LabN Consulting, L.L.C.</organization>
      </author>
      <date day='5' month='June' year='2022'/>
      <abstract>
	 <t>   This document describes a mechanism for aggregation and fragmentation
   of IP packets when they are being encapsulated in ESP payloads.  This
   new payload type can be used for various purposes such as decreasing
   encapsulation overhead for small IP packets; however, the focus in
   this document is to enhance IPsec traffic flow security (IP-TFS) by
   adding Traffic Flow Confidentiality (TFC) to encrypted IP
   encapsulated traffic.  TFC is provided by obscuring the size and
   frequency of IP traffic using a fixed-sized, constant-send-rate IPsec
   tunnel.  The solution allows for congestion control as well as non-
   constant send-rate usage.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ipsecme-iptfs-13'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ipsecme-iptfs-13.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-masque-connect-ip'>
   <front>
      <title>IP Proxying Support for HTTP</title>
      <author fullname='Tommy Pauly'>
	 <organization>Apple Inc.</organization>
      </author>
      <author fullname='David Schinazi'>
	 <organization>Google LLC</organization>
      </author>
      <author fullname='Alex Chernyakhovsky'>
	 <organization>Google LLC</organization>
      </author>
      <author fullname='Mirja Kuehlewind'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Magnus Westerlund'>
	 <organization>Ericsson</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   This document describes a method of proxying IP packets over HTTP.
   This protocol is similar to CONNECT-UDP, but allows transmitting
   arbitrary IP packets, without being limited to just TCP like CONNECT
   or UDP like CONNECT-UDP.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-masque-connect-ip-02'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-masque-connect-ip-02.txt' type='TXT'/>
</reference>




    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAJfT+mIAA71Z3XIbtxW+x1Og6kVtl2RMWXFtpm3KSEztGUtybXk6njST
AXfBJaJdYA3simYUvUufpU/W7wDYP5J2nWkc3Wi5Cxyc853/g/F4zCpV5XLG
jxanF/zyRlo+zzIrM1EpnfGrWmuZuyMmlksrb/7nstQkWhQgl1qxqsZpfS3H
lbvZZGOZ6LHotoyrsGWci0q6iiX4lxm7nfFlUjKmSjvjla1ddfzw4dOHx0xY
KWb8ygrtSmMrtjH2OrOmLrGM6LNrucW7dMaf60paLavxGbHAmKuETn8QudFg
aysdc4Ww1Q/vaoODZ1wbVqoZ/64yyYg7kLZy5fC0Lejhe8ZEXa2NnTE+Zhx/
SmPT+YSfQTT/Ish7DppKd2+NzYRWP0FWo2f878ZkueQvXpz6j7IQKp/xwu+Z
rCcE098yejlJTMEZ08YW2HojZ4BCr3q/2Hg85mLpKisSCLd4X+YqURU/NToD
jjiNX5hKrVTij+b3oK/7vLTmRqXS8Wpj+FJVDmLwai3585d8LUUKdeIQBjyB
HVYZ7lSmRc6TjixeSp2WRmls3yiAUlfcSoKMTACfS5Fcy4rnxrkJe/Xt6eOH
Jw+bo1Oe1SoVOpF0El+bDc4eKz0GB9EUuAPJPIXaoeQVWPK8M6B0jQMcX8pq
I6UG6xofoVTu2e1kcBP+zGwkjHME4UTFYY11IXXFVRFgyrdMOId3LizQhhfG
SvqhOQwk0o6CKAfupfMENKcV/rzwdcLnjmmQAmguiuBxkMlam9xkCoesxY0E
lCS1xMoMMPhz4UviGo84wfNTEsIjtqotlGI7qPBdSwn0JlHzhUrTXDL2ezJz
a9I6oZ2fbAe3t7+DXh5NHz+5u+uMQvBCAnKvmGgC7NNNILWmLEnygAuUcEVy
JcBLJGsFdZClscwIqNisAGXwzz5hPEKanG/WCm6iDQEexCPCgqcys4KM6F0t
clVtQYfJ96W0ShJMsIUvwHsqc7HlaS17xmilN6dCOYeDiDfZ56Aoak30lGNg
z+DoDQ+EyW7ocBKT144ea1078EARMDGpjDjQWQFJ7ET0KCSsLDcbH9l0suVO
2huVAOfb26+fj88mSlarGBTzEzcWNlnf3UHBV4ZX4hr+Uec5F+mN0JXIJEGG
E0dRd+RTfd3ZOpdBczhLlK7OQ0QGJCyV/TfapHHlnuMFEUqB0Cy9eK3PrSzi
kXcKFn2MFgc/aF6QYXhCWIj47hA9yTn91rASW4JjdVtY3CL9DkjfxIvOVfmn
uGoXwAbeykTDU+Ot96Lh07okl8IGsiAGEq2x4EhZLHMZ2V9ZkZEhwB+gGedD
5lpla5ht33yVThs/C4BVrtt6f8IvKCZhb+7BIReXlNBgGXgPF9tRCCeTUAgk
VW0b8UUOk+JFnVeqzHvCpwJGYkXhGIUoijWUaHZk/5bM470AspJSm5QDU1Sl
k0khx3aVPDk+frpU7u5uxA6tUGW1oo9ev/0FhXDvajkGJBpcYx0Mmi/eK0eW
x1wpkzYSOURl7+GN01hJboi4Ej9v1rKnkxBneKpWyAikW5inTwkIW0CwM3qo
LOY0h4TcINDSmVDMRHC8IbemY0iEM7lScH/6DffDVhQRnKoIx4/O37y+OhqF
//zi0j+/WvzjzfNXizN6fv1s/uJF+8DiitfPLt+8OOueup2nl+fni4uzsBlv
+eAVOzqfvz0KwB5dvrx6fnkxf3EUJFKuS2QkM7xpGYMYDJ4EFw6+7hKrlgGF
b05f/uff05MYMo6n06cIGeHHk+mfTvCDQA6nGQ1PCz8BHvJjWZJzkDUhDAFd
VSEyYq3PzxvNyXqB5oPvCJnvZ/zPKNimJ3+NL0jgwcsGs8FLj9n+m73NAcQD
rw4c06I5eL+D9JDf+dvB7wb33kuyGliJgN/FIheJ14cs/o1Edleomthc9+wQ
rtaxyJuKV7bmTLYLLSE5jxenVyPY89W9h/eDLuh5ep8dsOMYoGpNIQTmQAHd
UdSWZNAOH0SSyLISiF0hD47iHmYlDBoJTWcjVKXc+AojJFQRoxfyf2VVQmGY
vGAgTLKWyXWIfCtDQYiOhqOnwW9ot6c/Ag+VQg6oOJwqJQcjW0Is9zzFjELl
M8p6X7VMAKUvSBPhZIiLTsaEZsjdiYTxpRFi5DLCjYdEIA97a0U9lK0Riv2L
mEEQhSiFIHvG5EIOU60twiexlAtbNAUDqjRKANJaY8HNyksZkxjOyal4cZGv
nsgk1hZUGS2PZ5D66Ken7whoTxXhy9e0pS9mqFIZqsqg1BBBQrasgSPcEAhC
nAD5nvhQ0dSzSt7Zr1ZjsdkaTgTcwzrUaFCjp88C2tDh7e1r6bXCTyZTqjna
WgMnHrfgDM2RyjYBjfIlrCpacs+QR54Jvy9uIKtn+Aiaj4IUejsoDSg7Rw9p
HKOl0a864lcU4ZEl1qgNTh22qKpxMq5WIekSdV/mifZTJBcrh1FrzlQAixuj
0n2NIhv3oGgLmJMdgbomYtflD0sUP4PSl54SCh6xNDeNR3ijG0UL7ddSlBLI
GHqwTe8Tu6eLCbWl1+wgeFOAt+iZRUCO3BNrOhaHCm/0x1t0Mqm9BVPJmaPI
8UBFyCJQLUJXgxgSHAAVHs5SP0V7L9E7Ku8YdQU/jgUriTd9TOX6UulYJqAD
GBhO5LCpXNEqU6fN//h//gUqP/Pm72XXEMZ88DIc/LVfdelh9jvmXfD7+Rfx
wvmzIBJ20LZX0L/f3vDS2C7Oiz4Xn6b+6XQROD6PIZeeL+piKe09d/8X8vIp
uLxtny72nsgd/PmR5YjkdHTiF/zqvFx8hKuGlwa0lpdHn5uXA1xd8I6XacsL
n/Lfjpf26W1r4d50PjMvXg27OmqePmAv/Pgz4bLPwb69BHN50PLy6LPzsm8v
H8Ll5De0l5a/aC/BdDtcvvwNeWmfLto3X8zbr+2PX5OXA39XPrpTPdYUHzH7
MPavB+3LQmxDPu2PD1tNtpm0qS502s+fobhpU+hOxkbDNWra3lgmUMkwosrM
Kcoh9KWpvVHVxZ6gHU5Q52dlr6oYzFOoTRdJVSP/bvuj0L3CgC0lHRBKkMmB
pmmx2zOdyb4goSrwdLvZ57AoPR4UpSMu31MR7YcjzLcCva7LCuV8rR2q/Z1K
HxV4g8yhjgaVw4P96gxo9Opbofeq1qjPrz62e/rB3aeLrzjBcngvwjLti8jv
7w21FYlMI5H3JUBDJdi0DK4dIwwGMdj0Txq1tEOvMDYcVq/DKRh32ArWQNzQ
FVAzjmJ9y0Ynlw6UG9slakyoy6Trnqa8898UTcUNhThmVr1uwbUF9cBxaBxC
I2eZ9qvhvY8Tdkk1/waWMKIG4BCdWDKfLj5Kid9TKzas4X193e6mBc0vHAOo
gaTMnUSJ7ZkYHNxdaMRBWLIWOpO7ntpnyL+c+GHEq9gtylBO9zuEQmlVoJL2
WwNRuj5I4HjCbn0XPGhZ2gKRGsFDrQjcZyO2LsweXa+WDwNjSYNtuWeSrXwj
bKQrgmxNvRhFQWyhmOAnlRFmwjgGIUFQNgj4tpn5lnZJlz6Crn+qACVZDtB4
E4Yh7b1MZD42pURkryPdaZ06E2BtcwZWrXLX1P93Ic33UnN3gODKQwMfSqpu
SJlvqX3spAEUNLHeKPQxwKA03plh+xDeKlHJfDu4uqIpJK2ltpo1GxJjLRzb
Tx528ItXHqSJRnUOaAWjmXdtcD9wJEKT8flJImHY9I19KHujlvAhXgJE7mTP
Bfxs3k+70MDdSO/woiUMzMLOMOdKjfTJhXmZgnh9oegG0Td+TU/Mr9a1G/Us
8A/BOweO0uiwoYK0AcaUG0INROhtH4rQQXtTb6ya5qLxKLoVDjqhK63ESBpr
h6m0D1lD24vXQj4HInnVlm6XTmM2Fr1Rs2s+JoOPIe11Fz0+eE78jBGhlwSz
cehFkbigDGia67HmpokvaQbxI6XO7lqOBsZejnZS4u8VgHIi95NOmDH34PeD
cZpkBcLtqDLgn8sMybOgOWdlxQophm8EnMs4stf+iLPRkWmCc7wuVI6Ri1Ay
6u6T5KDaifN+UyMdhZThJGIjHbo7TWU9D40MeY08n1/MD2ijP2FfCzLNsFL4
4oPqrnD7ugSURGaeXGuzyWUaL4duZ9r31zL9y9FKIPAf3YHs5dklKDQrYXj/
BayFXlBuIQAA

-->

</rfc>

