<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-roll-enrollment-priority-06" category="std" consensus="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="join-metric">Controlling Secure Network Enrollment in RPL networks</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-roll-enrollment-priority-06"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="R.A." surname="Jadhav" fullname="Rahul Arvind Jadhav">
      <organization>Huawei Tech</organization>
      <address>
        <email>rahul.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thubert" fullname="Pascal Thubert">
      <organization>Cisco Systems</organization>
      <address>
        <email>pthubert@cisco.com</email>
      </address>
    </author>
    <author initials="H." surname="She" fullname="Huimin She">
      <organization>Cisco Systems</organization>
      <address>
        <email>hushe@cisco.com</email>
      </address>
    </author>
    <date year="2022" month="February" day="28"/>
    <area>Internet</area>
    <workgroup>ROLL Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t><xref target="RFC9032" format="default"/> defines a method by which a potential <xref target="RFC9031" format="default"/> enrollment proxy can announce itself as a available for new Pledges to enroll on a network.
The announcement includes a priority for enrollment.
This document provides a mechanism by which a RPL DODAG root can disable enrollment announcements, or adjust the base priority for enrollment operation.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="problems" numbered="true" toc="default">
      <name>Introduction</name>
      <t><xref target="RFC7554" format="default"/> describes the use of the time-slotted channel hopping (TSCH) mode of <xref target="ieee802154" format="default"/>.
<xref target="RFC9031" format="default"/> and <xref target="RFC9032" format="default"/> describe mechanisms by which a new node (the "pledge") can use a
friendly router as a Join Proxy.
<xref target="RFC9032" format="default"/> describes an extension to the 802.15.4 Enhanced Beacon that is used by a Join Proxy to announce its existence such that Pledges can find them.</t>
      <section anchor="motivation-and-overview" numbered="true" toc="default">
        <name>Motivation and Overview</name>
        <t>It has become clear that not every routing member of the mesh ought to announce itself as a <em>Join Proxy</em>.
There are a variety of local reasons by which a 6LR might not want to provide the <em>Join Proxy</em> function.
They include available battery power,  already committed network bandwidth, and also total available memory available for Neighbor Cache Entry slots.</t>
        <t>There are other situations where the operator of the network would like to selectively enable or disable the enrollment process in a particular DODAG.</t>
        <t>As the enrollment process involves permitting unencrypted traffic into the best effort part of a (TSCH) network,  it would be better to have the enrollment process off when no new nodes are expected.</t>
        <t>A network operator might also be able to recognize when certain parts of the network are overloaded and can not accomodate additional enrollment traffic, and it would like to adjust the enrollment priority (the proxy priority field of <xref target="RFC9032" format="default"/>) among all nodes in the subtree of a congested link.</t>
        <t>It may derive from multiple constraining factors, e.g., the size of the DODAG, the occupancy of the bandwidth at the Root, the memory capacity at the DODAG Root, or an administrative decision.</t>
        <t>Each potential <em>Join Proxy</em> would utilize this value as a base on which to add values relating to local conditions such as its Rank and number of pending joins, which would degrade even further the willingness to take more joins.</t>
        <t>When a RPL domain is composed of multiple DODAGs, nodes at the edge of 2 DODAGs may not only join either DODAG but also move from one to the other in order to keep their relative sizes balanced.
For this, the approximate knowledge of size of the DODAG is an essential metric.
Depending on the network policy, the size of the DODAG may or may not affect the minimum enrollment priority.
It would be limiting its value to enforce that one is proportional to the other.
This is why the current size of the DODAG is advertised separately in the new option.</t>
        <t>As explained in <xref target="RFC9032" format="default"/>, higher values decrease the likelihood of an unenrolled node sending enrollment traffic via this path.</t>
        <t>A network operator can set this value to the maximum value allowed, effectively disabling all new enrollment traffic.</t>
        <t>Updates to the option propagate through the network according to the trickle algorithm.
The contents of the option are generated at the DODAG Root and do not change at any hop.
If the contents represent an update that is considered important (e.g., quickly disabling any enrollments), the option can trigger trickle timer resets at the nodes to speed up its propagation.</t>
      </section>
    </section>
    <section anchor="Terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>The term (1)"Join" has been used in documents like <xref target="RFC9031" format="default"/> to denote the activity of a new node authenticating itself to the network in order to obtain authorization to become a member of the network.</t>
      <t>In the context of the <xref target="RFC6550" format="default"/> RPL protocol, the term (2)"Join" has an alternative meaning: that of a node (already authenticating to the network, and already authorized to be a member of the network), deciding which part of the RPL DODAG to attach to.
This term "Join" has to do with preferred parent selection processes.</t>
      <t>In order to avoid the ambiguity of this term, this document refers to the process (1)"Join" as enrollment, leaving the term "Join" to mean (2)"Join".
The term "onboarding" (or IoT Onboarding) is increasingly used to describe what was called enrollment in other documents.
However, the term <em>Join Proxy</em> is retained with its meaning from <xref target="RFC9031" format="default"/>.</t>
    </section>
    <section anchor="protocol-definition" numbered="true" toc="default">
      <name>Protocol Definition</name>
      <t>This document uses the extensions mechanism designed into <xref target="RFC6550" format="default"/>.
No mechanism is needed to enable it.</t>
      <section anchor="option-format" numbered="true" toc="default">
        <name>Option Format</name>
        <t>The resulting priority, if less than 0x7f should enable the <em>Join Proxy</em> function.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type        |Opt Length = 3 |  exp  |     DODAG_Size        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |R| min priority|
   +-+-+-+-+-+-+-+-+
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>Type</dt>
          <dd>
  to be assigned by IANA.</dd>
          <dt>exp</dt>
          <dd>
  a 4 bit unsigned integer, indicating the power of 2 that defines the unit of the DODAG Size, such that (unit=2^exp).</dd>
          <dt>DODAG_Size</dt>
          <dd>
  a 12 bit unsigned integer, expressing the size of the DODAG in units that depend on the exp field. The size of the DODAG is computed as (DAG_Size*2^exp).</dd>
          <dt>min.priority</dt>
          <dd>
  a 7 bit field which provides a base value for the Enhanced Beacon Join priority.  A value of 0x7f (127) disables the <em>Join Proxy</em> function entirely.</dd>
          <dt>R</dt>
          <dd>
  a reserved bit that SHOULD be set to 0 by senders, and MUST be ignored by receivers.
This reserved bit SHOULD be copied to options created.</dd>
        </dl>
        <t>This document uses the extensions mechanism designed into <xref target="RFC6550" format="default"/>.
It does not need any mechanism to enable it.</t>
        <t>The size of the DODAG is measured by the Root based one the DAO activity.
It represents a number of routes not a number of nodes, and can only be used to infer a load in a homogeneous network where each node advertises the same number of addresses and generates roughly the same amount of traffic.
The size may slightly change between a DIO and the next, so the value transmitted MUST be considered as an approximation.</t>
        <t>Future work like <xref target="I-D.ietf-roll-capabilities" format="default"/> will enable collection of capabilities such as this one in reports to the DODAG root.</t>
      </section>
      <section anchor="upwards-compatibility" numbered="true" toc="default">
        <name>Upwards compatibility</name>
        <t>A 6LR which did not support this option would not act on it, or copy it into it's DIO messages.
Children and grandchildren nodes would therefore not receive any telemetry via that path, and need to assume a default value.</t>
        <t>A 6LR which did not support this option would not act on it or propagate it in its DIO messages.
In effect, the 6LR's children and grandchildren nodes could not receive any telemetry via that path.
Therefore, 6LRs that support this option but do not receive it via any path SHOULD assume a default value of 0x40 as their base value for the Enhanced Beacon Join Priority.</t>
        <t>A 6LR downstream of a 6LR where there was an interruption in the telemetry could err in two directions:</t>
        <ul spacing="normal">
          <li>if the value implied by the base value of 0x40 was too low, then a 6LR might continue to attract enrollment traffic when none should have been collected.
This is a stressor for the network, but this would also be what would occur without this option at all.</li>
          <li>if the value implied by the base value of 0x40 was too high, then a 6LR might deflect enrollment traffic to other parts of the DODAG tree, possibly refusing any enrollment traffic at all.
In order for this to happen, some significant congestion must be seen in the sub-tree where the implied 0x40 was introduced.</li>
        </ul>
        <t>The 0x40 is only the half-way point, so if such an amount of congestion was present, then this sub-tree of the DODAG simply winds up being more cautious than it needed to be.</t>
        <t>It is possible that the temporal alternation of the above two situations might introduce cycles of accepting and then rejecting enrollment traffic.
This is something an operator should consider if when they incrementally deploy this option to an existing LLN.
In addition, an operator would be unable to turn off enrollment traffic by sending a maximum value enrollment priority to the sub-tree.
This situation is unfortunate, but without this option, the the situation would occur all over the DODAG, rather than just in the sub-tree where the option was omitted.</t>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>As per <xref target="RFC7416" format="default"/>, RPL control frames either run over a secured layer 2, or use the <xref target="RFC6550" format="default"/> Secure DIO methods.
This option can be placed into either a "clear" (layer-2 secured) DIO, or a layer-3 Secure DIO.
As such this option will have both integrity and confidentiality mechanisms applied to it.</t>
      <t>A malicious node (that was part of the RPL control plane) could see these options and could, based  upon the observed minimal enrollment priority signal a confederate that it was a good time to send malicious join traffic.</t>
      <t>Such as a malicious node, being already part of the RPL control plane, could also send DIOs with a different minimal enrollment priority which would cause downstream mesh routers to change their <em>Join Proxy</em>  behavior.</t>
      <t>Lower minimal priorities would cause downstream nodes to accept more pledges than the network was expecting, and higher minimal priorities cause the enrollment process to stall.</t>
      <t>The use of layer-2 or layer-3 security for RPL control messages prevents the above two attacks, by preventing malicious nodes from becoming part of the control plane.
A node that is attacked and has malware placed on it creates vulnerabilities in the same way such an attack on any node involved in Internet routing protocol does.
The rekeying provisions of <xref target="RFC9031" format="default"/> exist to permit an operator to remove such nodes from the network easily.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>There are no new privacy issues caused by this extension.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>Allocate a new number TBD01 from Registry RPL Control Message Options.
This entry should be called Minimum Enrollment Priority.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>This has been reviewed by Konrad Iwanicki and Thomas Watteyne.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7554" target="https://www.rfc-editor.org/info/rfc7554">
          <front>
            <title>Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement</title>
            <author fullname="T. Watteyne" initials="T." role="editor" surname="Watteyne">
              <organization/>
            </author>
            <author fullname="M. Palattella" initials="M." surname="Palattella">
              <organization/>
            </author>
            <author fullname="L. Grieco" initials="L." surname="Grieco">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document describes the environment, problem statement, and goals for using the Time-Slotted Channel Hopping (TSCH) Medium Access Control (MAC) protocol of IEEE 802.14.4e in the context of Low-Power and Lossy Networks (LLNs).  The set of goals enumerated in this document form an initial set only.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7554"/>
          <seriesInfo name="DOI" value="10.17487/RFC7554"/>
        </reference>
        <reference anchor="RFC6550" target="https://www.rfc-editor.org/info/rfc6550">
          <front>
            <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
            <author fullname="T. Winter" initials="T." role="editor" surname="Winter">
              <organization/>
            </author>
            <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert">
              <organization/>
            </author>
            <author fullname="A. Brandt" initials="A." surname="Brandt">
              <organization/>
            </author>
            <author fullname="J. Hui" initials="J." surname="Hui">
              <organization/>
            </author>
            <author fullname="R. Kelsey" initials="R." surname="Kelsey">
              <organization/>
            </author>
            <author fullname="P. Levis" initials="P." surname="Levis">
              <organization/>
            </author>
            <author fullname="K. Pister" initials="K." surname="Pister">
              <organization/>
            </author>
            <author fullname="R. Struik" initials="R." surname="Struik">
              <organization/>
            </author>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur">
              <organization/>
            </author>
            <author fullname="R. Alexander" initials="R." surname="Alexander">
              <organization/>
            </author>
            <date month="March" year="2012"/>
            <abstract>
              <t>Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained.  LLN routers typically operate with constraints on processing power, memory, and energy (battery power).  Their interconnects are characterized by high loss rates, low data rates, and instability.  LLNs are comprised of anything from a few dozen to thousands of routers.  Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point).  This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supported.  Support for point-to-point traffic is also available.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6550"/>
          <seriesInfo name="DOI" value="10.17487/RFC6550"/>
        </reference>
        <reference anchor="RFC9032" target="https://www.rfc-editor.org/info/rfc9032">
          <front>
            <title>Encapsulation of 6TiSCH Join and Enrollment Information Elements</title>
            <author fullname="D. Dujovne" initials="D." role="editor" surname="Dujovne">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>In the Time-Slotted Channel Hopping (TSCH) mode of IEEE Std 802.15.4, opportunities for broadcasts are limited to specific times and specific channels.  Routers in a TSCH network transmit Enhanced Beacon (EB) frames to announce the presence of the network.  This document provides a mechanism by which additional information critical for new nodes (pledges) and long-sleeping nodes may be carried within the EB in order to conserve use of broadcast opportunities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9032"/>
          <seriesInfo name="DOI" value="10.17487/RFC9032"/>
        </reference>
        <reference anchor="RFC9031" target="https://www.rfc-editor.org/info/rfc9031">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić">
              <organization/>
            </author>
            <author fullname="J. Simon" initials="J." surname="Simon">
              <organization/>
            </author>
            <author fullname="K. Pister" initials="K." surname="Pister">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network. The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key. How this key is provisioned is out of scope of this document. Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters. The JRC may at any time update the parameters through another request-response exchange secured by OSCORE. This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner. Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
        </reference>
        <reference anchor="ieee802154" target="http://standards.ieee.org/findstds/standard/802.15.4-2015.html">
          <front>
            <title>IEEE Std. 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks</title>
            <author initials="." surname="IEEE standard for Information Technology">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7416" target="https://www.rfc-editor.org/info/rfc7416">
          <front>
            <title>A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)</title>
            <author fullname="T. Tsao" initials="T." surname="Tsao">
              <organization/>
            </author>
            <author fullname="R. Alexander" initials="R." surname="Alexander">
              <organization/>
            </author>
            <author fullname="M. Dohler" initials="M." surname="Dohler">
              <organization/>
            </author>
            <author fullname="V. Daza" initials="V." surname="Daza">
              <organization/>
            </author>
            <author fullname="A. Lozano" initials="A." surname="Lozano">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." role="editor" surname="Richardson">
              <organization/>
            </author>
            <date month="January" year="2015"/>
            <abstract>
              <t>This document presents a security threat analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs).  The development builds upon previous work on routing security and adapts the assessments to the issues and constraints specific to low-power and lossy networks.  A systematic approach is used in defining and evaluating the security threats.  Applicable countermeasures are application specific and are addressed in relevant applicability statements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7416"/>
          <seriesInfo name="DOI" value="10.17487/RFC7416"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-roll-capabilities" target="https://www.ietf.org/archive/id/draft-ietf-roll-capabilities-09.txt">
          <front>
            <title>RPL Capabilities</title>
            <author fullname="Rahul Arvind Jadhav">
              <organization>Huawei</organization>
            </author>
            <author fullname="Pascal Thubert">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Rabi Narayan Sahoo">
              <organization>Juniper</organization>
            </author>
            <date day="9" month="November" year="2021"/>
            <abstract>
              <t>   This draft enables the discovery, advertisement and query of
   capabilities for RPL nodes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-roll-capabilities-09"/>
        </reference>
      </references>
    </references>
    <section anchor="change-history" numbered="true" toc="default">
      <name>Change history</name>
      <t>version 00.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="default">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAL3nHGIAA61a7XLjxrH9j6eYcH9EckhakvfDVlXqWpbkrBJppStpy5U/
NzUEhuRYAAbBAOQy632XPMt9snu6ewYAKcrJLWddruXiY6Y/T5/uwWQySRrb
5OZUnbuyqV2e23KhHkza1kZ9MM3a1U/qsqQbhSkbZUt1f3etSrnjEz2b1WZ1
qn52tpwUpqltmmQuLXWBJbNaz5uJNc18QgtMTLfOpKqtq22zmRy9TRJb1aeq
qVvfnBwdfXd0kuja6FN1VTamxk7JenGq7m+vr9VP2JPk+1Pt2ip5WvfPTC5o
ryTVzanyTZb4RpfZ33TuSsNLmySp7KnCn1cq1aVqvVG6rvVGHdi50nmuNsYf
KlerpfZLtTS1SZRqXHpKN/DTu7qpzdyf8hKZmes2bzyeiPc3hdymfya6bZau
Pk0U/5mEvxXMhydupurepktdZ96V3S0x2Q3dMPm+B1wNMzxALZMX0ODBzZs1
DMVG8d1TptA2P1VFWv+BDP+9jy9MU53sl+d+ejZVf9bZUq92pLnXyzZXZ/XK
ltnuEyzO+1avjVWPJl3uSlDTu1OWYUFXpqkrXhDgbqoel+3M1M3O/nfapzp/
dpO3Prc+deph4xtTPFO/auSV71N66le2fj9VD0uzs+371hYI9OGNf73lsvVL
M9wvpYSys7bZFwiy0V9cWetMXa11adMnu7ukDde/L2zRrqcma6dVniSlqwvd
2JWhZe9/PD85Pv4u/Hz35s3r8PPtmzdH4ed3R9+c9D+Pd65aY8y3RyfH8iaC
XtcLgzQaLZumOv36a04lisUpPTmFJb6eIx6QZb679zUWmB6/mb6enBzhr2VT
5CNZTMBldHV5eakemmyq4pNjeLdupop+n6qfbG1y4726MZltC3WWpvSvAErq
4Obs/FBhL3W33HhLQXGtN6ZWB3fv/3qoHiqT2jkuN9aVXs2RxtduPbnXjelX
vjM10klTPBsdsc2LmNv5ypEhIkcFec2rci6mdyWHfOlyt9iMAGDxBvkkmUwm
Ss98U+u0SZLPn38XjP3lC+GGLY1XWgErly5Ts41aL5HruFK5BshoIWD3yjFe
6UFTVbX7tGH40mXp2jI1yjbe5AAwWlKvEDV6lhsWtjRrdZebbGEYpWQZBcl1
RO9p8rg03VIB3tO8zVjAiNC8WC8EvWS9Asa3UaaVzYJKwKzS+mKoFVWLi9uL
sz+p2rmGhc+sZykHmg2F8GOCYZ39jHqgGkg40wDrF8RRrjI1e2Qqhi9sluVA
+1dUGmqXtSm7K/z5/AryYu/Cf4meoZRhz/gU2UrGwpZUHtycfza2MBOfu6Yx
mSIFS8Dz0lUVFaKDx4fz94eqcBk///lzn0xfvkyTLUdS9O4Eg2zZG84PLUcO
LGnhAxJjVLEvR4d9+UrmtTVllm9g2hZlUKLgz6jE6o4iZbobe1FDLGA+Idg8
WQaxQevHtESxhywpdP3B6JTuLzXiwtOWHK7DHejlYShiWQtwpH/5FkrwuzEI
SW4CDtqugLdevVI3Dikj+UTWuV0ZlBqzTpKrhuqwmhkgqVFpbnQti5WIIYPH
RGdyQWEKIH30VmFQvV27WDa7snVp8lUv/1ecAjVRAfyvVhoGRYhhrdwRxgAo
PAHKwCtvr+8RY7Q+iQKA5o1CFrAIw/XVHNtLdGKjTcyvQarONAIL6lRubeox
kCjHphmy3BWF5ZgL2Yony2xts2Y5ZmPp3MNzroGY/WowhsNi20jwwUDeGX6c
6xTyXSIvNooi2sMLvf4OwtfK26YNMLrmW6SSJJnrrBxFWrs2z1RunwwZASY2
KWEgItKUvD1eidlO721jGSO8JUCqUAls2ubwMmMF5DrzL7+xcvkKAQWhyEQU
BG2JoKs3FdkLuDtHLcBzIbQR8giaOUzR8E6khY6pG1SB5W0T9JnRK+QVUgqU
50XZ3XxORioRCl22eral+YSKBGFIkc5anRUlftiB2Eus4xBsqVuU9h9G1kxB
XzSsQxL7XcOzv5AGudMZVKZ4oPSikNQpQsdlVPp0lllyJUJkIH2wj0RRp3R0
4gB3tzQO6MtYJHWoR2RrsADDXw83qNaFg2eIWotdbMmr+nYGIm3ECQAYQAN5
DX0HChIlfgFSnpkacaTmtStUAaJtgX70MBVVW5LH5yiurkatMNPFdCwrk+2C
oTiM5LJL07YCpG3ivS6RlBZF71GZxgE+OH9SXemUVAsPSAGTx6g2IWYzMERL
4lDAQ14QPylCl0iyQS3fQgMxNXArJ1EbKqQrnbdGgInrHKBQoIZ9kcl9j+DI
NUc6Lgs2wRriXS9YiyUIge91+cSeLduIixWKBL1KPRoMJsuLKJlZgIAaglSA
c1szBJDGa8udYElhTmmkER0wjZFFoOZPFKNS3jNXUKBCGURe5ahOYNfObWw8
7BuyI8QWSgI9dRJus9cpfF0J9KBNlLEsjdgeNFoSpnAxLtDaxeIl0IV3XJ1J
2j4ZU9EtWwfTrSQ+gOU65/o2TX50NftAXK8rCmtbUOI8lW6dRxGfhRVpSiXU
++Bj6XunyYWJpnblVrpWLrfp5oUoZdUJFYIFkJ3ADglHxFgBNrwnE6eUKh1e
5WhYODwoBCSkmPMB81IjlZPMBcGhZAUgFFQYmi8QO0u4v+HLaVvXtOV+A2SA
n8aSs70BRsFs+SbmOIGhqwIrOyNaUOUIETyLB4YoMVZLYCFcFsIceUQ1VxCX
ICm3S+c4noj1lGIIKopEjHyw9nNwUyurJb8q3Sz3ozABpjfNMA2DPQr9ic0e
cjPPUZuzMZWQrr5JVbMR4KDvcyGw7ceKgNh3hmabsA/0ggKtWdZEVraxHQBe
ZyHXmYEiuJ5yEmRBrl8WQtypvyS6HF0TFqfSsDAlKUmVYRfAGBsyx5FGrBMx
runihjgtgkrW6tauTVUbLxRdtaxNxwgJj0F6anJrQUFFZOhA8PjvLcm8Zady
M7CRPxwPhSZfQM3FgrI3qEvEm7IXPupgQzCEuEZlsG1bccBHe0q8vUJvBmIg
zZlSPfUfXP7CxAcoAWIHY3s1uvn48Dgay9/qwy3/vr/8749X95cX9Pvh/dn1
dfcjCU88vL/9eH3R/+rfPL+9ubn8cCEv46raupSMbs7+OpISPLq9e7y6/XB2
PZL0GXZX5MyGWYKlQRd8wU71SSTznFE/nN/97z+PX4fMonEA6L7849vjd9Td
EKOQ3Rhf5Z8w6CYB7BG5JhqGQEbhs2CUgESUE79065JHYbAq2wsiFOrg+HBE
RW0UKLoppTfAElFuL3Riq/2BGplB1Elua0okK1x70OpQH06gmuqIZkTbQx7E
BBnivJsxSZL+3f5Degm2GHcOeqc96Drf5KrsA/1TE++LxDQ6gcRU2xBajUtd
LtEq+p8M9ScukNMMUmpMYTTRk9OAuawc93CR1+9ouK1aZPb9o6QUcVphivu1
QSoR/2DIkOIeWS6Tm64BJ0bRNJq5RUB7VmigDTnJofiDGyHW5qam5MZqXAaE
3gt+Ef81XuzYOUOvnM3EvcXMLtrg3ybuNN6Jbt6hA8fIqvv4gkA9YowVusAV
2yx6IjyG98nsvWOmfbCOXDlzmuF0pA5ohuMe1W137ZBwDE0ZFR38E6nBocyx
GprzNTlyral/5cpjtobhwjy6uJ8m71ErVtTJdVJuMUBLkNpILWQzE36FoBFa
M0waRrO7EILqgoZHTPmSnSEMhA7tUmzr/WAaA1XsQoovFBuG+DT54AYPYskS
sCoGCB2cbaRVvxWg/pHnXIIGgGbieBA8kpKxsmidmTNiSXX06d2cUIRISlju
Vxrkbvp5pJ7/Od5z7WTPtW8GqxzjiW/Ua/VGvVXv1Lfqu//PtbjOHya/8b+4
0C/4/3FTmSjfL7CoujblAkHwR+yP+6BJ8pySjP3bAzGv+Px/XqL7X4hhdt57
eQf4G5InpxGHfAio2UZdnX04g+8gOm4DoV6rGXrKtuxDziwoHSyoWsQ8SnYa
d0gDwEgZB6M8fEOQb/NNssN4MFI6oEf+ePI/2PUQm/fGggxaHZ+8IAMeR8z6
KMMeXlvy5j7KRHQ+cnlyDne6dFix92Xpf1qp0OogyvRVJyeMPY3GZknfsaDS
Pwfk7sep3A4KBZ076cp2Z3OcSF1HoNRZeB5yce4dHJ+8O4wTGP9y8imqSOiT
0FUk9ywZ0a56RS62jVgjEJyZEdLskCRwP1FwQ204FS7mTsRVFqWrJTxqkxrU
xdqHgrO1br9k6iorsCOEEKYEJMsA5T8FdeiXMoeXifkSzDEj7V/dgbwXfQyw
9m3QLg4P2FeZdKT07NltR3B4345Fk1/7xpzHtiLQ8DKT3HE31GHGNjNdZbLl
nGa9imY/Mj5busIR5Xet70dzPLwzVO2FWcV+TaznNdhRv6XOsporOu8a2wev
uDvJN/0runBtKdkZm5zOUtTA+pxmW3gj9BYziGN4UnBxdcuLC3H5hHrupe6H
1qvWpQ8TzxhHgwYjMK2uR5eK8WPb0Dk1KxwY539dTS6m/ZEzTXJmNkfVNJ54
sM3z6OaUOkkJf6gzfLAbqDBd4ca5JB+6uunYSn+mIfXxY7WmMzKGAIjHS22o
76SBseR2ZjP2tW8rWiqsLnVVOnmZ31GvjiDkURMSY0NDOo5n2/zesx0L+Eov
iH+dL20O18n8fAEbZmm8Ir2SLEwsxcxpfkNbhKTkBEDbbmh+sQkts264ZZbw
4zQhYud9y2w6nHuLz6a/ST3Srm+EWUUmQ9v6gV5K2y2ECrvBBOm/Ujrttvs3
VA1nAGSdMW0Q0H+fGjSFCr1zXBiC02q0Pi0WMW2/xQSYXx9JbNFw6t8F+btu
7BNsnqE38w1AspAuQ/wQBvaUE5Ix3DbWrYgfpjO9HcROeIBvrcF6UQU4Jfxp
knxFbK7PUPT4ue1xbyB51GrNHQQNKNfsrnLrvIRaLVvKlAV9CJ2O7pvchIE6
ki4wR57Ac5sZMpaqQpxVaUVG8B62i/breinyFntPoi/O24XQ8yUaDdfMw127
7WmaieT59DcYgQZbe6yAeCAd9mlO1Y/bia2Rf+jdaoPorBzYy4wO/My89c+n
Kt1SUfyuO5uHWaccaaDnLwl/C0LuRclH52UTp/Gkf0GHAFzrTTmY3E94dN8f
DEVzdJrbcOgaKreRO4yioYwsdT6frDWdeNlSqgAsLIhbDurLQBhaOBTQYFFW
pZNny1KeZNrAqSXQuK2gBJ8SEval6KgtFUnuTmwz6HZmRg4faGIoRg5zLkkY
Gm/RQVvs9KVmcKc7o4E05c7g5Exc3dlCpZuU+BclapqaqhHPZaJLbX6mnNs7
x+wDnZwFrfnFfoYZUiQWSrLkWuwjh401n6gjFOhIpcrdZivI+YRUzmxp4evr
Dxwx8dhovLVVN2tuy3hiheJb8iHYnggM3JAF3hmo7jtXClU1ujTo3ZmUD6Bp
mt1g98ZIbu/J29B2MyOJrw5TnWZcdG42PCOCenLqAW357OvlcI/VDPHohKtw
h86fy5EW58EPEgY8+ob5Ag999/r4LU28aSCThu9a5jVIlY9HHXVbinRANf4C
L1M5f+VywlygDXPxrSFV+FRPqiZ9UhKZ9mCyCqdVuU4jLQ67aTXig/WROuBd
Jidx10NaTk66RIDJN4N9pqRW6MUGFZ6YlUC1o7EG9VxsE6axrpzDLnxaQtcG
HzwAi/JA/Zl3nyFYcptymsavH8IAZneqFY0I3UpzGIoZAIse8KbrJEQA3BsH
mg5UCD2dm4VuhA9ato9Ju9AkhKTcZy0MezfOwEUurRZ0RkHzajkGx4a9EnyW
1Z8IPARqqXf0HAegisO/X1V2HJTlksb7wS9eBkqgHBaMiUd2v6bW8BgQwAiD
DSgFf0YhX5VwyQhsXjjLVgsJseF1rAndrrmpj5uGnWxHQp/t0k3zBRUFpKv4
zRLl43DsS6aWc3XYSfhpODzas6Ps9cK5PTmpkfL+2H/sE5MAYR+D3sfEpvI5
9EIkqFSWVtzXbdcCnrM+oYmbbeIjXIW2XO5l4Mejap6iDVy+5e4pHV+5rD95
keXDwT/NbbEwfwsa0lwItrTQXq3anPq5rruJ+Eb9HBXirvbyqvyJWLmRDcO3
Ftxnxk9tuy9v4myc2+ppGAk+mU24t7LSnQ8/DOAP2qje8Ecz/P3GVpHhzyD4
iJeFGlhpGAk0rOVZBQ1H7Uqnz5H3sfusJXybUYUHLYh5jI9A46zvhwm8KM20
nmN5Tufu9FWFHFdI7/z4w8XRsUh4bxb0QcCGAyV+uHgjgRLGpxGbjXyCs4wl
NYyWb8Jx7+B76wHvf6XO0u5gmqfNYTbSHcMg0KxZi1o7n5ZypDwuXYFnf6JP
jjYUVvzF3AxOp9XPJcexIjyB1pWmNoTsR0fhwXnezufJ/wG8X7KcMy4AAA==

-->

</rfc>
