<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-06" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-06"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="June" day="17"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements can target either collaborating parties or non-collaborating ones. Sometimes these measurements, also called probes, are viewed as unwelcome or aggressive. This document suggests some simple techniques for a source to identify its probes, allowing any party or organization to understand what an unsolicited probe packet is, what its purpose is, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements can target either collaborating parties or non-collaborating ones. Such measurements, also called probes, include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties' resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices through which those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests some simple techniques for a source to identify its probes, allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what an unsolicited probe packet is,</li>
        <li>what its purpose is,</li>
        <li>and more importantly who to contact for further information.</li>
      </ul>
      <t>Note: it is expected that only researchers with good intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <t>This section provides a way for a source to describe (i.e., to identify) its probes.</t>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a Probe Description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a Probe Description File (see <xref target="file"/>) as defined in <xref target="iana"/>, e.g., "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:user@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the Probe Description File must be made available at "/.well-known/probing.txt". The Probe Description File must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one-line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:user@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probes description
    Description: This is a one-line string description of the
    probes, with no line break.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>A possibility for probe attribution is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8::dead, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the Probe Description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the Probe Description URI is "https://[2001:db8::dead]/.well-known/probing.txt". In this case, there might be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the Probe Description File (see <xref target="file"/>).</t>
      <t>As an example, the UK National Cyber Security Centre <xref target="NCSC"/> uses a similar attribution. They scan for vulnerabilities across internet-connected systems in the UK and publish information on their scanning (<xref target="NCSC_SCAN_INFO"/>), providing the address of the webpage in reverse DNS.</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>Another possibility for probe attribution is to include a Probe Description URI in the probe itself:</t>
      <ul spacing="normal">
        <li>For an ICMPv6 echo request <xref target="RFC4443"/>, include it in the data field;</li>
        <li>For an ICMPv4 echo request <xref target="RFC792"/>, include it in the data field;</li>
        <li>For a UDP datagram <xref target="RFC768"/>, include it in the data payload if its content has no structure;</li>
        <li>For a TCP segment <xref target="RFC9293"/>, include it in the data payload if its content has no structure;</li>
        <li>For an IPv6 packet <xref target="RFC8200"/>, include it in a PadN option either inside a Hop-by-Hop or Destination Options header.</li>
      </ul>
      <t>The Probe Description URI must start at the first octet of the payload and must be terminated by an octet of 0x00, i.e., it must be null terminated. If the Probe Description URI cannot be placed at the beginning of the payload, then it must be preceded by an octet of 0x00. Inserting the Probe Description URI could obviously bias the measurement itself if the probe packet becomes larger than the path MTU.</t>
      <t>For the record, the in-band probe attribution was used in <xref target="I-D.draft-vyncke-v6ops-james"/>.</t>
    </section>
    <section anchor="operational-and-technical-considerations">
      <name>Operational and Technical Considerations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on intent or context. This section describes the upsides and downsides of each technique, so that probe owners or probe makers can freely decide what works best for their cases.</t>
      <t>The advantages of using the out-of-band technique are that the probing measurement is not impacted by the probe attribution but also that it is easy to setup, i.e., by running a web server on a probe device to describe the measurements. Unfortunately, there are some disadvantages too. In some cases, using the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on, the probe source IP address cannot be known (e.g., RIPE Atlas <xref target="RIPE_ATLAS"/> probes are sent from IP addresses not owned by the probe owner), dynamic source addresses, etc.</t>
      <t>The primary advantage of using the in-band technique is that it covers the cases where the out-of-band technique is not feasible (as described above). The primary disadvantage is that it could potentially bias the measurements, since packets with the Probe Description URI might be discarded. For example, data is allowed in TCP segments with the SYN flag (<xref target="RFC9293"/>) but may change the way they are processed, i.e., TCP segments with the SYN flag containing the Probe Description URI might be discarded. Another example is the Probe Description URI included in a Hop-by-Hop or Destination Options header, inside a PadN option. As per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that a PadN option should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. If a PadN option does not respect the recommendation, it is suggested that one may consider dropping such packets. For example, the Linux Kernel follows these recommendations and discards such packets since its version 3.5;</t>
      <t>Having both the out-of-band and in-band techniques combined also has a big advantage, i.e., it could be used as an indirect means of "authenticating" the Probe Description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). While the out-of-band technique alone is less prone to spoofing, the combination with the in-band technique offers a more complete solution.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing measurement experiences over the global Internet obviously requires ethical consideration, especially when unsolicited transit/destination parties are involved.</t>
      <t>This document proposes a common way to identify the source and the purpose of active probing in order to reduce the potential burden on the unsolicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>It is expected that only researchers with good intentions will use these techniques, which will simplify and reduce the time to identify probes across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  Therefore, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party. In that case, not only would this third party be wrongly accused, but it might also be exposed to unwanted solicitations (e.g., angry emails or phone calls, if the malevolent actor used someone else's email address or phone number). As a consequence, the recipient of this information cannot trust it without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no probe attribution.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <seriesInfo name="DOI" value="10.17487/RFC9116"/>
            <seriesInfo name="RFC" value="9116"/>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8615"/>
            <seriesInfo name="RFC" value="8615"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC4443"/>
            <seriesInfo name="RFC" value="4443"/>
            <seriesInfo name="STD" value="89"/>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0792"/>
            <seriesInfo name="RFC" value="792"/>
            <seriesInfo name="STD" value="5"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0768"/>
            <seriesInfo name="RFC" value="768"/>
            <seriesInfo name="STD" value="6"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9293"/>
            <seriesInfo name="RFC" value="9293"/>
            <seriesInfo name="STD" value="7"/>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP).  TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet.  Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion.  This document collects and brings those changes together with the protocol specification from RFC 793.  This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements.  It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state.  The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J. P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp'ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="RIPE_ATLAS" target="https://atlas.ripe.net/">
          <front>
            <title>RIPE Atlas</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC" target="https://www.ncsc.gov.uk/">
          <front>
            <title>The National Cyber Security Centre</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC_SCAN_INFO" target="https://www.ncsc.gov.uk/information/ncsc-scanning-information">
          <front>
            <title>NCSC Scanning information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-vyncke-v6ops-james">
          <front>
            <title>Just Another Measurement of Extension header Survivability (JAMES)</title>
            <seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-03"/>
            <author fullname="Éric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Raphaël Léas" initials="R." surname="Léas">
              <organization>Université de Liège</organization>
            </author>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>Université de Liège</organization>
            </author>
            <date day="9" month="January" year="2023"/>
            <abstract>
              <t>   In 2016, RFC7872 has measured the drop of packets with IPv6 extension
   headers.  This document presents a slightly different methodology
   with more recent results.  It is still work in progress.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful review and comments received from Jen Linkova, Prapanch Ramamoorthy, Warren Kumari, and Andrew Shaw.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIALjKjWQAA81a3W7cyLG+n6foyMCJhWiof1me4GBXluxdrbWyYMm7WCSB
0UP2zPSKZDPd5IxmBQG5zXWuzhucIEBewm+SJzlfVTc55Egja3FiIAush2p2
V1fX71fV7Pf7vVKXqRqItaOytHpYldrkwozEaV4qm6tSXFgzVG6tJ4dDq6aY
6AdEa/5aL5alGhs7Hwidj0zPVcNMO4dX5bwA8dPXV296iYlzmeGvxMpR2deq
HPVN4VTcL4hiXy4I9rcOerqwA1HaypU7W1svt3Z60iqJ7d8Vykqa5ITME/G9
zOVYZSov13ozY6/H1lRFe5pMxaWKK6vLuTiWhRzqVJcaBxgZK04vxLkqaR0O
PLLSYcO4rKxa612rOcaTQSOJ/gnx3ZuqvFKDnhD/tp2E8FJa+xFvdT4W3xBl
Gs+kTjHOUvqaBBYZO6YX0sYTvJiUZeEGm5s0j4b0VEX1tE0a2BxaM3Nqkyls
0sqxLifVEGvVdJ7H1+HVfRXQ3BRadWVrn7Am8kQibVat3vy8jqNJmaVrvZ4r
ocaPMjU5RDBXrucyacuPf64MNh+I3PQKPRB/KE28IZyxpVUjh6d5Rg9/6vVk
VU6MhUL64FjA/rDodSR+YE55yFvdp79aHbeHISOZ619YdQNxrF1seByaUQqn
PlHibYqnVMpcHOzxu9gkILV9uLvt/4SqMVErWGB4X+UlucErlY515QeVV2MQ
3tcx7RTFJuuw/CoSJyaHmbVYfqVy8+mfZftFl+kPOTRunS4//V0kSpzpT/87
Vp9lZAiyuowSpvp1lRL70VB12PkuEqeVzWTeYuc7+KLO2+P/Dm5+ZqqRZqot
bnq5wUgJkoNej6JK85cQZ0fvv3n98fL46Oz1gGmFIPZ6NNKxRiwQRynCEaw0
8953Ju1Y9S9jmSpxZQqTmvEceoMiwPHck6ApUHtt60kayThjT0qM3iyS0eb2
VrS9vbeP3xfbBy/xx9bB3s7+AS9P4CsDgVC1741IWXg+se0ZFOLk3Sks5xEK
jSHzf/3w+4gtBA10BX+hlbVK/BcCIzgQxxX9eyaHBjHKaEtquTj411/+dnz+
/nLFVhcTBK6iUOK9NFX6Zfe60lllxRssTGqj+lJbYeW1OLbQeJrK7k6vjCuR
9poNEb9NVlSI++KS7ClWiAYFwhLlGSw9vfjh4OPVu4t3Z++++aljgae5KCeK
oj1yKD29UhOTJkSotJQk63xwFJMxY+L04CkWCYOczWZRDCElbJOFRNpxm8NA
vq+zePswgpV2rHH78CnWuLvz4nB/dyfi3/2XT7DG9wjmtsThwGw67wrzXE6R
CS8g0rGVSQVOIMSJMekqWjKT11a7SY44e1JZqa38eaUtzEmw7yzQRr6C3omc
6kRcIKFcL6n56BpbaXGl4klOAodMVtAIoe4iwkknVtmnnxCmsfewafwkrS3+
9Zf/oQzPNlIjrPfQqcn0LyoR3+rxpH9ZKDwGA/l/2MacNmTDOLhvGAdPMYyd
l4cv9vZ2I/598SUN4/3pxeuPR1dnR5cdmdEwkGYq3YMxWtKbyOpCRRDkJuac
H18edyhcQdLnNTw7ng/JExuQBm+26kHKJNA8dnE0NtOouq5JU845/3h6/uZd
ZxN6hbPIPCflNskqmOjnaLfmb9J43wVK/TalXq/f7ws5BDyRcdnrBfvIlHRA
kRSYnMC6sJtQSH44a2wQ7DhKEmcUwigAIf7kQNndlwBgLhKXJlOlzjAJ612X
/oaQqTPYJU1hoIzoaAzRd6rVDEPSiSqfqRTgRtEmcjy2CnUAYCkUoZ1ADVAR
KeGq8RjY0gHSYarTWYHMXJJj6j9XIURKvKwsYm9phE6wSo/mQmNNs3Oamhmx
LvM5n21Om7ZBCS2tcsRHRpliNpElJmPImRRIoayPgdWAZqXQoMqTeJvKFgYi
oEFanRmcFJwChMq8TOeYaWiDGGUOVBIFFWU6SVLgl2fk4dYkgPmsvy+lsCqe
PEFLOo/TCqjs9rYFnu7u+GC3t1+9f3P84vDFzt0dTnGp8oTo35MStDUBIkiE
GU61qRxEANEBRypBchWU4ARUIoBVqvGEZJObkhRQYSokBylx6DN81HC43wrY
CCsap3lVQRIosTxBokVEN7CKNBG4iJkJVBKwIUv6lKh+MszBoplOUxAkIyq9
cel8imc99gYxnNeSJka80VgVKz2t47I3iOc6UhEZg8pbowlRyj0lmSRk3DAP
wRIIf0rY+ziHyHB6Wrggzputky7BhMRLbZPAwUTyDOY3UVMds/9ZluJsoqHh
jgDI5RAGcuRDWvYcFVlENrrIKeGtAAmMrEOr/wH+ByDff5IPNvOW3JDGn+CJ
zP2osqzmVgyFFM4N5T9Nuwh1U6iYtmfDMXlKluAU1c1gGJZUTsTYmAQkSjo9
tRzYvCpw46PjQmIkDeiIFAZpkEFkyOVlPTcLAZB0gEReOaeILlzPhWzErvfM
t1uANl2MtOYDBy/ENBYoRAV4QzYgZnJ+T08JL1zYb0t16y3d0VYP7CU+vD8V
t8/Az92ywSRqpHPe9uFVkl7RQ2EgLvYlEzyN1f7QujcaRvfcKYpKIzzf3a0T
Hb9VEI+Wuby72xDexBediBtJJstpP0LGSfvXuZnlm3Q8bB6VN+Xa7725+EKz
9s+GEg2WZgD92K9b1MIqUUxIh3mVATE0a0qVDn633Qd86u/v7/e3tnd211aJ
kg93+4zPheC/4lgUIVaszYBBKb5mEmEb0Ekj9KccaddWHjlivPMYwZEhp+V9
vV+0+aqNbI9A9u3tb5AVXm5vH4Q0EYI/O5nOA4k6BIy0ShP3ELGdZWJsD8cS
CU0jSdGzd1s8vb4pUMw5PF1YNaKSL+mfyXxcSUQrSFHkaua3Emut863VvHHm
G6o62yUdlyCGW4kSsjIQbsnB9VdJg9QG3/B81GqSlAX6KRZTB4kUQobxDEdi
2+o1WPjZ4uzsMM/1iELGejOheb2AjG1zbx8BOu8QDvEv2PqCoh8fiBVG36bx
g0x1gnjUDAWdUNWws9vf3unvbl9tHw52Xwy2XvzSXrlQVD32gBIHAAfwJ/jh
yLYXh65y0gp89cuWogdNFL0n7vbSUHw3FOqExSE9N4KXDa2S1xxz31Vl34z6
QzJy7zut5jZZHfKP09zO9RHX56tWM5M4gqkNK01GKBwSix7pmPU7lBTrjXeY
EKlrsBCaBO38t9FyKm90hwfb+8gO4g12DkoLR5Fh5RLVna2t7UEyPBwMEiWT
jSVPJZ7ALvFasivqUQAqVGEjbpxfEmgxACd01i4xMKBduYii7cjJG+UrQlrY
9dcHcJWCp+eGEjkdUBO19VWBc3mXP/6hy/4f//RI6OTejSZQ7hhxKlsncXbv
GIUtKZVALiTlH73uXaUYYSkvVWZjERfYCbiJFCDhkzJhxEmD0letclr64e1n
qlkQoGoUIRtOTm4CbEeXA21r5SwxF1RmsoqnVZoru7ivkLE1BGzri4+Yeo6M
lNzclSqjVzU35DNFNUy1m7ShVrB3bUVdzIrnnrNFCY1DbgQ8U2PvJb+YqWGB
oEHbtawz8rXVan/NQ33xRK+tS6NV0Ea3KwBgKJWO2G/IHwlzH39PTTwgQdMU
Ht5x9/b2dilb1BsQ7PS0EllKnz9+v0xp7yFKL17uPJ2Q+HBywS/GVmY1gYPD
RwgUcp4aODciAWFEyvCE+SYAY4iWzVVVa4ur4wvkxzFDw5Aad14+dthfvUXu
e6OhKAiREN58fw/oTSbnwniNhepOo/xhnX5riv5w3scPFScnrQLuXeEx/QSB
QdngwA+bADszahhbEv7ieKpR0wgDryibKB6OyBVK8H54UEb7wXeo6MsXK7Zu
trZwEkbpOEe9IK9QYCxWISqNHol15FuG1xWpjKkD47kbqrH2XtflLYTo1n4F
1afJw+xRSHQU9YJ3ruBhuSWgpVvGWsFt6lTTqfeGitpFTqTUB6GyXAZ/k8hw
3199gGLIIEItjbTkI6EOAeC+V8+oDdXUV1+d9k8ifx3pL+D60wNTuP7PEpuG
oqt9hUs0uUPMAA3Iiewo3Dj3eh8cCaPVQTAt7MBJyj82heEGjXJHY4ioBGFl
Q8KXG2KCzAJpJapQeUIthFBm0nz2jpsy1Iw1Dq2BrJduVThfB2K3BMnM/wXN
KUmIdrG/M77A9YLCTCpum3CYyWv6m1OBVYo5islzuP6m+2pABeV8Te0jOuVH
F9xFJlNU4ATsaOvK1abSFkvDi+9bTIKNhuTbNRPHHSPfKvJGubCXto7x48F+
6dsEXM9LN6d47lRZFbVrgYKtvCtIyifU8kYmIXnLpqlDDZfHSgUXiQ+U28qK
nDKd1+iAzuN7Ntq1JFEaw2iCX7G0Nj4rGg80amfmzAVIkFTKnwgswxphFx4A
AUZ7uSjHwAKyl+L86IoKfipq8jlgdsKlOKc4iGD5+BstyQb8eHrRJOBFYGGk
VLeYFv14eNaiZw+00epMOdLkyJqsRVB5xZL1LWmVDRJAIJnnMgNk7mJZEp0q
42BthdWZtPOF1XWN7p7zcYIPBsKXJ951WCXU2rPqEY0EWxzBDFgXz6VrDASB
dgh6677ertlqW0F3a4qQheEukkxXxEj6qkGTMn1cDA2o1XG3gabUUJI2oWTR
KRE471KpRMjfh8NW2m7Rv/zpXIxSyRBtkcrX2ckyORcxQvLYi4p6TiWBR1I0
FBiTjpLa2T5DPnQOHk8nDx2rRnThaF62K/F/XfszNHhq+t9YIIYWmsDWThQh
1LfgLXzRN833Xu4xMmuaHdF29DLa3wghKbRZ6x5jF6nUzXRqPNZNla3f+ohO
TplRBz8kxEOfmR15bYVcCVDPaZmwFLUYH8S3DB66eyYmeCKci7qfTVrNoLSE
z7aCd25pSuaUM6JIrCkK7lrTDUQw2iUTJOpnOq9uxFsqJdJQhtaXS92NQy7z
ancdssEz6LR8DYyT7Eb7AIvf+sY559ZlV6b/74UE16Rgnz8m3Lgc6vEiqLRQ
mfdcSJXxhOR6TCMGWxIdfDfntLdGd6Lk2zFfzKw9apz3wcsGq/iaAzXKTGOt
Sr2JNi70cISq+/6d0j015roqEJl+nFBR+Ugypk+uSNEpBXxwkvtcUxgzwim8
8rywlri5H2fNaETBVfrOPBZB+yXllbQKjfdn4jWK64cg1esbVLDlMhKg5rzl
Ty8g4mnwwHFqhqDQ3HIsQCeVS9SlQrLwu8TtXajhRC0Zjr18pdO+fQh3JZvt
y5364o3CnM6nJp0iDi33xCEzuplwrLUsY+g579yWtFs+JDBKFuE6g1K2vxGs
gRBsA+iWjkrlX1LFXntN3kA8xuu6tO5eoHh2wSFdoC3AiQl3im2Jc6MKpAH8
GHPC6GL+QGvgk3a7lKnLtGBpIe5CK4ZL9in1Cr9ar/saLMjw4ae/DOSWBvvZ
7W3no5nm5rHzvQRGKZAxbqql4vhrCI8IHSdckt7SkfisFRcuLjaF8mVPS1ds
gYtWSXf17bPmEqbXO/0Sd0P+Do8n8F0b2Qadv6VmunTv2E6NqHwzpv3FSG2I
7X6LdvXVUPKYBdY1xmjRo6ybo8PGchj5iHZQI4+oMWkoBECK26jt+zVBcMgq
DCgKS0hgCq5DG0J5XNcwEPJ8ipGk1l77EDMOWYRy6dK8fR/rFnUM94ni+tB1
uvPH7tyqho4elviOHgNQ0uTM3x9P2JwXl7Bwihmi4Bgz4BEV4xoSClXLDErq
2wUYh3F+wyqfIWlQZ8z7YrCo5kZ2DFjI90++5OJLJbqZpxt5XwvfExKnGnIB
mkvdT0CCzhXWgpK/nlpnlCLZJ6hrhJi5Ued1Xeig73LZYgLE50+s6Yxk0+RD
IDPSC40yhFhQCqvCpGVcRKw1EGNGPUGqqpBUDKfTgHhKq+ouCoMB5FUvDEst
P/wD67sPZrjrd3R+dN97+TLNVwhrP1J39y3XLMi3bg2sj7UroYawOSXzIuGO
TJPQFs3xusOMaIvgRnDh+aK+KBVcl8Iax8l2c36dG4KU4F01GumbQR2+/A1N
Xxx7CE3x1BqCdeGjeLy6DI4oA0DzAeu5Wx90QxjPhYFVKP6QG1Hk8aD/6GQI
nEQCOoqpXktV4kF473bgbUQl/73G/rYWBOU/43LBF1J9HbrTACLiKCUo+kYb
5IUN8QYxh75QE9+AeWB8+kwNAE3DyL5Xk0SLt6aa0KWO/xzfXosrakekyndd
JyotRlVaX3v7cI19oSf6fS+Lifz0j1Scffq7DN8d5Cjlrf9iJGU0UN/e32ec
XbLmfmxlrLAXO3AtB8ZuxABAklYz5tKjToBJ/3EGTsQa/Q4JEWj12kzlBvCb
LGSOqE3fJ2YGxf8Edf+PEugsF28rFHzaH/koh1fOxOVEzqLe/wG3VLGzUjEA
AA==

-->

</rfc>
