<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-spring-srv6-security-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Segment Routing IPv6 Security Considerations">Segment Routing IPv6 Security Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-security-03"/>
    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Mizrahi" fullname="Tal Mizrahi">
      <organization>Huawei</organization>
      <address>
        <email>tal.mizrahi.phd@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="L. M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="F." surname="Gont" fullname="Fernando Gont">
      <organization>SI6 Networks</organization>
      <address>
        <email>fgont@si6networks.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="05"/>
    <area>Routing</area>
    <workgroup>Source Packet Routing in Networking</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 93?>

<t>SRv6 is a traffic engineering, encapsulation and steering mechanism utilizing IPv6 addresses to identify segments in a pre-defined policy. This document discusses security considerations in SRv6 networks, including the potential threats and the possible mitigation methods. The document does not define any new security protocols or extensions to existing protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/buraglio/draft-bdmgct-spring-srv6-security"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-spring-srv6-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Packet Routing in Networking Working Group mailing list (<eref target="mailto:spring@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spring/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spring/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-bdmgct-spring-srv6-security"/>.</t>
    </note>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Segment Routing (SR) <xref target="RFC8402"/> utilizing an IPv6 data plane is a source routing model that leverages an IPv6 underlay
and an IPv6 extension header called the Segment Routing Header (SRH) <xref target="RFC8754"/> to signal and control the forwarding and path of packets by imposing an ordered list of
segments that are processed at each hop along the signaled path. SRv6 is fundamentally bound to the IPv6 protocol and introduces a new extension header. There are security considerations which must be noted or addressed in order to operate an SRv6 network in a reliable and secure manner.
Specifically, some primary properties of SRv6 that affect the security considerations are:</t>
      <ul spacing="normal">
        <li>
          <t>SRv6 may use the SRH which is a type of Routing Extension Header defined by <xref target="RFC8754"/>.
Security considerations of the SRH are discussed <xref target="RFC8754"/> section 7, and were based in part on security considerations of the deprecated routing header 0 as discussed in <xref target="RFC5095"/> section 5.</t>
        </li>
        <li>
          <t>SRv6 uses the IPv6 data-plane, and therefore security considerations of IPv6 are applicable to SRv6 as well. Some of these considerations are discussed in Section 10 of <xref target="RFC8200"/> and in <xref target="RFC9099"/>.</t>
        </li>
        <li>
          <t>While SRv6 uses what appear to be typical IPv6 addresses, the address space is processed differently by segment endpoints.
A typical IPv6 unicast address is comprised of a network prefix, host identifier.
A typical SRv6 segment identifier (SID) is comprised of a locator, a function identifier, and optionally, function arguments.
The locator must be routable, which enables both SRv6 capable and incapable devices to participate in forwarding, either as normal IPv6 unicast or SRv6 segment endpoints.
The capability to operate in environments that may have gaps in SRv6 support allows the bridging of islands of SRv6 devices with standard IPv6 unicast routing.</t>
        </li>
      </ul>
      <t>This document describes various threats to SRv6 networks and also presents existing approaches to avoid or mitigate the threats.</t>
    </section>
    <section anchor="scope-of-this-document">
      <name>Scope of this Document</name>
      <t>The following IETF RFCs were selected for security assessment as part of this effort:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC8402"/> : "Segment Routing Architecture"</t>
        </li>
        <li>
          <t><xref target="RFC8754"/> : "IPv6 Segment Routing Header (SRH)"</t>
        </li>
        <li>
          <t><xref target="RFC8986"/> : "Segment Routing over IPv6 (SRv6) Network Programming"</t>
        </li>
        <li>
          <t><xref target="RFC9020"/> : "YANG Data Model for Segment Routing"</t>
        </li>
        <li>
          <t><xref target="RFC9256"/> : "Segment Routing Policy Architecture"</t>
        </li>
        <li>
          <t><xref target="RFC9491"/> : "Integration of the Network Service Header (NSH) and Segment Routing for Service Function Chaining (SFC)"</t>
        </li>
        <li>
          <t><xref target="RFC9524"/> : "Segment Routing Replication for Multipoint Service Delivery"</t>
        </li>
      </ul>
      <t>We note that SRv6 is under active development and, as such, the above documents might not cover all protocols employed in an SRv6 deployment.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>HMAC TLV: Hashed Message Authentication Code Type Length Value <xref target="RFC8754"/></t>
          </li>
          <li>
            <t>SID: Segment Identifier <xref target="RFC8402"/></t>
          </li>
          <li>
            <t>SRH: Segment Routing Header <xref target="RFC8754"/></t>
          </li>
          <li>
            <t>SRv6: Segment Routing over IPv6 <xref target="RFC8402"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="threat">
      <name>Threat Terminology</name>
      <t>This section introduces the threat taxonomy that is used in this document, based on terminology from the Internet threat model <xref target="RFC3552"/>, as well as some concepts from <xref target="RFC9055"/>, <xref target="RFC7384"/>, [RFC7835] and <xref target="RFC9416"/>. Details regarding inter-domain segment routing (SR) are out of scope for this document.</t>
      <dl>
        <dt>Internal vs. External:</dt>
        <dd>
          <t>An internal attacker in the context of SRv6 is an attacker who is located within an SR domain.  Specifically, an internal attacker either has access to a node in the SR domain, or is located such that it can send and receive packets to and from a node in the SR domain without traversing an SR ingress node or an SR egress node.  External attackers, on the other hand, are not within the SR domain.</t>
        </dd>
        <dt>On-path vs. Off-path:</dt>
        <dd>
          <t>On-path attackers are located in a position that allows interception, modification or dropping of in-flight packets, as well as insertion (generation) of packets. Off-path attackers can only attack by insertion of packets.</t>
        </dd>
        <dt>Data plane vs. control plane vs. Management plane:</dt>
        <dd>
          <t>Attacks can be classified based on the plane they target: data, control, or management. The distinction between on-path and off-path attackers depends on the plane where the attack occurs. For instance, an attacker might be off-path from a data plane perspective but on-path from a control plane perspective.</t>
        </dd>
      </dl>
      <t>The following figure depicts an example of an SR domain with five attacker types, labeled 1-5. For instance, attacker 2 is located along the path between the SR ingress node and SR endpoint 1, and is therefore an on-path attacker both in the data plane and in the control plane. Thus, attacker 2 can listen, insert, delete, modify or replay data plane and/or control plane packets in transit. Off-path attackers, such as attackers 4 and 5, can insert packets, and in some cases can passively listen to some traffic, such as multicast transmissions. In this example a Path Computation Element as a Central Controller (PCECC) [RFC9050] is used as part of the control plane. Thus, attacker 3 is an internal on-path attacker in the control plane, as it is located along the path between the PCECC and SR endpoint 1.</t>
      <figure anchor="threat-figure">
        <name>Threat Model Taxonomy</name>
        <artwork><![CDATA[
  1.on-path   2.on-path   3.mgmt.  PCE as a Central  4.off-path 5.off-path
  external    internal    plane    Controller        internal   external
  attacker    attacker    on-path  (PCECC)           attacker   attacker
       |            |           |        |            |          |
       |            |           v  _____ v ____     _ | __       |
       |     SR  __ | _  __   /        +---+   \___/  |   \      |
       | domain /   |  \/  \_/  X-----|PCECC|         v   /      v
       |        \   |           |      +---+          X   \      X
       v        /   v           |                         /
 ----->X------>O--->X---------->O------->O-------------->O---->
               ^\               ^       /^\             /^
               | \___/\_    /\_ | _/\__/ | \___/\______/ |
               |        \__/    |        |               |
               |                |        |               |
              SR               SR        SR              SR
              ingress      endpoint 1   endpoint 2       egress
              node                                       node
]]></artwork>
      </figure>
      <t>As defined in <xref target="RFC8402"/>, SR operates within a "trusted domain". Therefore, in the current threat model the SR domain defines the boundary that distinguishes internal from external threats. Specifically, an attack on one domain that is invoked from within a different domain is considered an external attack in the context of the current document.</t>
    </section>
    <section anchor="sec-effect">
      <name>Effect</name>
      <t>One of the important aspects of threat analysis is assessing the potential effect or outcome of each threat. SRv6 allows for the forwarding of IPv6 packets via predetermined SR policies, which determine the paths and the processing of these packets. An attack on SRv6 may cause packets to traverse arbitrary paths and to be subject to arbitrary processing by SR endpoints within an SR domain. This may allow an attacker to perform a number of attacks on the victim networks and hosts that would be mostly unfeasible for a non-SRv6 environment.</t>
      <t>The threat model in <xref target="ANSI-Sec"/> classifies threats according to their potential effect, defining six categories. For each of these categories we briefly discuss its applicability to SRv6 attacks.</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized Access: an attack that results in unauthorized access might be achieved by having an attacker leverage SRv6 to circumvent security controls as a result of security devices being unable to enforce security policies. For example, this can occur if packets are directed through paths where packet filtering policies are not enforced, or if some security policies are not enforced in the presence of IPv6 Extension Headers.</t>
        </li>
        <li>
          <t>Masquerade: various attacks that result in spoofing or masquerading are possible in IPv6 networks. However, these attacks are not specific to SRv6, and are therefore not within the scope of this document.</t>
        </li>
        <li>
          <t>System Integrity: attacks on SRv6 can manipulate the path and the processing that the packet is subject to, thus compromising the integrity of the system. Furthermore, an attack that compromises the control plane and/or the management plane is also a means of affecting the system integrity. Specific SRv6-targeted attack may cause one or more of the following outcomes:
          </t>
          <ul spacing="normal">
            <li>
              <t>Avoiding a specific node or path: when an SRv6 policy is manipulated, specific nodes or paths may be bypassed, for example in order to bypass the billing service or avoid access controls and security filters.</t>
            </li>
            <li>
              <t>Preferring a specific path: packets can be manipulated so that they are diverted to a specific path. This can result in allowing various unauthorized services such as traffic acceleration. Alternatively, an attacker can divert traffic to be forwarded through a specific node that the attacker has access to, thus facilitating more complex on-path attacks such as passive listening, recon and various man-in-the-middle attacks.</t>
            </li>
            <li>
              <t>Causing header modifications: SRv6 network programming determines the SR endpoint behavior, including potential header modifications. Thus, one of the potential outcomes of an attack is unwanted header modifications.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Communication Integrity: SRv6 attacks may cause packets to be forwarded through paths that the attacker controls, which may facilitate other attacks that compromise the integrity of user data. Integrity protection of user data, which is implemented in higher layers, avoids these aspects, and therefore communication integrity is not within the scope of this document.</t>
        </li>
        <li>
          <t>Confidentiality: as in communication integrity, packets forwarded through unintended paths may traverse nodes controlled by the attacker. Since eavesdropping of user data can be avoided by using encryption in higher layers, it is not within the scope of this document. However, eavesdropping of a network that uses SRv6 allows the attacker to collect information about SR endpoint addresses, SR policies, and network topologies, is a specific form of reconnaissance</t>
        </li>
        <li>
          <t>Denial of Service: the availability aspects of SRv6 include the ability of attackers to leverage SRv6 as a means for compromising the performance of a network or for causing Denial of Service (DoS), including:
          </t>
          <ul spacing="normal">
            <li>
              <t>Resource exhaustion: compromising the availability of the system can be achieved by sending SRv6-enabled packets to/through victim nodes in a way that results in a negative performance impact of the victim systems (e.g., <xref target="RFC9098"/>). For example, network programming can be used in some cases to manipulate segment endpoints to perform unnecessary functions that consume processing resources. Resource exhaustion may in severe cases cause Denial of Service (DoS).</t>
            </li>
            <li>
              <t>Forwarding loops: an attacker might achieve attack amplification by increasing the number hops that each packet is forwarded through and thus increase the load on the network. For example, a set of SIDs can be inserted in a way that creates a forwarding loop (<xref target="RFC8402"/>, <xref target="RFC5095"/>, <xref target="CanSecWest2007"/>) and thus loads the nodes along the loop.</t>
            </li>
            <li>
              <t>Causing packets to be discarded: an attacker may cause a packet to be forwarded to a point in the network where it can no longer be forwarded, causing the packet to be discarded.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t><xref target="attacks"/> discusses specific implementations of these attacks, and possible mitigations are discussed in <xref target="mitigations"/>.</t>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <section anchor="attack-abstractions">
        <name>Attack Abstractions</name>
        <t>Packet manipulation and processing attacks can be implemented by performing a set of one or more basic operations. These basic operations (abstractions) are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Passive listening: an attacker who reads packets off the network can collect information about SR endpoint addresses, SR policies and the network topology. This information can then be used to deploy other types of attacks.</t>
          </li>
          <li>
            <t>Packet replaying: in a replay attack the attacker records one or more packets and transmits them at a later point in time.</t>
          </li>
          <li>
            <t>Packet insertion: an attacker generates and injects a packet to the network. The generated packet may be maliciously crafted to include false information, including for example false addresses and SRv6-related information.</t>
          </li>
          <li>
            <t>Packet deletion: by intercepting and removing packets from the network, an attacker prevents these packets from reaching their destination. Selective removal of packets may, in some cases, cause more severe damage than random packet loss.</t>
          </li>
          <li>
            <t>Packet modification: the attacker modifies packets during transit.</t>
          </li>
        </ul>
        <t>This section describes attacks that are based on packet manipulation and processing, as well as attacks performed by other means. While it is possible for packet manipulation and processing attacks against all the fields of the IPv6 header and its extension headers, this document limits itself to the IPv6 header and the SRH.</t>
      </section>
      <section anchor="modification">
        <name>Modification Attack</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An on-path internal attacker can modify a packet while it is in transit in a way that directly affects the packet's segment list.</t>
          <t>A modification attack can be performed in one or more of the following ways:</t>
          <ul spacing="normal">
            <li>
              <t>SID list: the SRH can be manipulated by adding or removing SIDs, or by modifying existing SIDs.</t>
            </li>
            <li>
              <t>IPv6 Destination Address (DA): when an SRH is present modifying the destination address (DA) of the IPv6 header affects the active segment. However, DA modification can affect the SR policy even in the absence of an SRH. One example is modifying a DA which is used as a Binding SID <xref target="RFC8402"/>. Another example is modifying a DA which represents a compressed segment list <xref target="I-D.ietf-spring-srv6-srh-compression"/>. SRH compression allows encoding multiple compressed SIDs within a single 128-bit SID, and thus modifying the DA can affect one or more hops in the SR policy.</t>
            </li>
            <li>
              <t>Add/remove SRH: an attacker can insert or remove an SRH.</t>
            </li>
            <li>
              <t>SRH TLV: adding, removing or modifying TLV fields in the SRH.</t>
            </li>
          </ul>
          <t>It is noted that the SR modification attack is performed by an on-path attacker who has access to packets in transit, and thus can implement these attacks directly. However, SR modification is relatively easy to implement and requires low processing resources by an attacker, while it facilitates more complex on-path attacks by averting the traffic to another node that the attacker has access to and has more processing resources.</t>
          <t>An on-path internal attacker can also modify, insert or delete other extension headers but these are outside the scope of this document.</t>
        </section>
        <section anchor="scope">
          <name>Scope</name>
          <t>An SR modification attack can be performed by on-path attackers. If filtering is deployed at the domain boundaries as described in <xref target="filtering"/>, the ability to implement SR modification attacks is limited to on-path internal attackers.</t>
        </section>
        <section anchor="mod-effect">
          <name>Effect</name>
          <t>SR modification attacks, including adding/removing an SRH, modifying the SID list and modifying the IPv6 DA, can have one or more of the following outcomes, which are described in <xref target="sec-effect"/>.</t>
          <ul spacing="normal">
            <li>
              <t>Unauthorized access</t>
            </li>
            <li>
              <t>Avoiding a specific node or path</t>
            </li>
            <li>
              <t>Preferring a specific path</t>
            </li>
            <li>
              <t>Causing header modifications</t>
            </li>
            <li>
              <t>Causing packets to be discarded</t>
            </li>
            <li>
              <t>Resource exhaustion</t>
            </li>
            <li>
              <t>Forwarding loops</t>
            </li>
          </ul>
          <t>Maliciously adding unnecessary TLV fields can cause further resource exhaustion.</t>
        </section>
      </section>
      <section anchor="passive-listening">
        <name>Passive Listening</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>An on-path internal attacker can passively listen to packets and specifically listen to the SRv6-related information that is conveyed in the IPv6 header and the SRH. This approach can be used for reconnaissance, i.e., for collecting segment lists.</t>
        </section>
        <section anchor="scope-1">
          <name>Scope</name>
          <t>A reconnaisance attack is limited to on-path internal attackers.</t>
          <t>If filtering is deployed at the domain boundaries (<xref target="filtering"/>), it prevents any leaks of explicit SRv6 routing information through the boundaries of the administrative domain. In this case external attackers can only collect SRv6-related data in a malfunctioning network in which SRv6-related information is leaked through the boundaries of an SR domain.</t>
        </section>
        <section anchor="effect">
          <name>Effect</name>
          <t>While the information collected in a reconnaisance attack does not compromise the confidentiality of the user data, it allows an attacker to gather information about the network which in turn can be used to enable other attacks.</t>
        </section>
      </section>
      <section anchor="packet-insertion">
        <name>Packet Insertion</name>
        <section anchor="overview-2">
          <name>Overview</name>
          <t>In a packet insertion attack packets are inserted (injected) into the network with a segment list. The attack can be applied either by using synthetic packets or by replaying previously recorded packets.</t>
        </section>
        <section anchor="scope-2">
          <name>Scope</name>
          <t>Packet insertion can be performed by either on-path or off-path attackers. In the case of a replay attack, recording packets in-flight requires on-path access and the recorded packets can later be injected either from an on-path or an off-path location.</t>
          <t>If filtering is deployed at the domain boundaries (<xref target="filtering"/>), insertion attacks can only be implemented by internal attackers.</t>
        </section>
        <section anchor="effect-1">
          <name>Effect</name>
          <t>The main effect of this attack is resource exhaustion, which compromises the availability of the network, as described in <xref target="mod-effect"/>.</t>
        </section>
      </section>
      <section anchor="control-and-management-plane-attacks">
        <name>Control and Management Plane Attacks</name>
        <section anchor="overview-3">
          <name>Overview</name>
          <t>Depending on the control plane protocols used in a network, it is possible to use the control plane as a way of compromising the network. For example, an attacker can advertise SIDs in order to manipulate the SR policies used in the network. Known IPv6 control plane attacks (e.g., overclaiming) are applicable to SRv6 as well.</t>
          <t>A compromised management plane can also facilitate a wide range of attacks, including manipulating the SR policies or compromising the network availability.</t>
        </section>
        <section anchor="scope-3">
          <name>Scope</name>
          <t>The control plane and management plane may be either in-band or out-of-band, and thus the on-path and off-path taxonomy of <xref target="threat"/> is not necessarily common between the data plane, control plane and management plane. As in the data plane, on-path attackers can be implement a wide range of attacks in order to compromise the control and/or management plane, including selectively removing legitimate messages, replaying them or passively listening to them. However, while an on-path attacker in the data plane is potentially more harmful than an off-path attacker, effective control and/or management plane attacks can be implemented off-path rather than by trying to intercept or modify traffic in-flight, for example by exchanging malicious control plane messages with legitimate routers, by spoofing an SDN (Software Defined Network) controller, or by gaining access to an NMS (Network Management System).</t>
          <t>SRv6 domain boundary filtering can be used for mitigating potential control plane and management plane attacks from external attackers. Segment routing does not define any specific security mechanisms in existing control plane or management plane protocols. However, existing control plane and management plane protocols use authentication and security mechanisms to validate the authenticity of information.</t>
        </section>
        <section anchor="effect-2">
          <name>Effect</name>
          <t>A compromised control plane or management plane can affect the network in various possible ways. SR policies can be manipulated by the attacker to avoid specific paths or to prefer specific paths, as described in <xref target="mod-effect"/>. Alternatively, the attacker can compromise the availability, either by defining SR policies that load the network resources, as described in <xref target="mod-effect"/>, or by blackholing some or all of the SR policies. A passive attacker can use the control plane or management plane messages as a means for recon, similarly to <xref target="mod-effect"/>.</t>
        </section>
      </section>
      <section anchor="other-attacks">
        <name>Other Attacks</name>
        <t>Various attacks which are not specific to SRv6 can be used to compromise networks that deploy SRv6. For example, spoofing is not specific to SRv6, but can be used in a network that uses SRv6. Such attacks are outside the scope of this document.</t>
        <t>Because SRv6 is completely reliant on IPv6 for addressing, forwarding, and fundamental networking basics, it is potentially subject to any existing or emerging IPv6 vulnerabilities <xref target="RFC9099"/>, however, this is out of scope for this document.</t>
      </section>
      <section anchor="attacks-summary">
        <name>Attacks - Summary</name>
        <t>The following table summarizes the attacks that were described in the previous subsections, and the corresponding effect of each of the attacks. Details about the effect are described in <xref target="sec-effect"/>.</t>
        <figure anchor="summary-table">
          <name>Attack Summary</name>
          <artwork><![CDATA[
+=============+==================+===================================+
| Attack      | Details          | Effect                            |
+=============+==================+===================================+
|Modification |Modification of:  |* Unauthorized access              |
|             |* SID list        |* Avoiding a specific node or path |
|             |* IPv6 DA         |* Preferring a specific path       |
|             |Add/remove/modify:|* Causing header modifications     |
|             |* SRH             |* Causing packets to be discarded  |
|             |* SRH TLV         |* Resource exhaustion              |
|             |                  |* Forwarding loops                 |
+-------------+------------------+-----------------------------------+
|Passive      |Passively listen  |* Reconnaissance                   |
|listening    |to SRv6-related   |                                   |
|             |information       |                                   |
+-------------+------------------+-----------------------------------+
|Packet       |Maliciously inject|* Resource exhaustion              |
|insertion    |packets with a    |                                   |
|             |segment list      |                                   |
+-------------+------------------+-----------------------------------+
|Control and  |Manipulate control|* Unauthorized access              |
|management   |or management     |* Avoiding a specific node or path |
|plane attacks|plane in order to |* Preferring a specific path       |
|             |manipulate SRv6   |* Causing header modifications     |
|             |functionality     |* Causing packets to be discarded  |
|             |                  |* Resource exhaustion              |
|             |                  |* Forwarding loops                 |
+-------------+------------------+-----------------------------------+

]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="mitigations">
      <name>Mitigation Methods</name>
      <t>This section presents methods that can be used to mitigate the threats and issues that were presented in previous sections. This section does not introduce new security solutions or protocols.</t>
      <section anchor="filtering">
        <name>Trusted Domains and Filtering</name>
        <section anchor="overview-4">
          <name>Overview</name>
          <t>As specified in <xref target="RFC8402"/>:</t>
          <artwork><![CDATA[
   By default, SR operates within a trusted domain.  Traffic MUST be
   filtered at the domain boundaries.
   The use of best practices to reduce the risk of tampering within the
   trusted domain is important.  Such practices are discussed in
   [RFC4381] and are applicable to both SR-MPLS and SRv6.
]]></artwork>
          <t>Following the spirit of <xref target="RFC8402"/>, the current document assumes that SRv6 is deployed within a trusted domain. Traffic <bcp14>MUST</bcp14> be filtered at the domain boundaries. Thus, most of the attacks described in this document are limited to within the domain (i.e., internal attackers).</t>
          <t>Such an approach has been commonly referred to as the concept of "fail-open", a state of which the attributes are frequently described as containing inherently more risk than fail-closed methodologies. The reliance of perfectly crafted filters on on all edges of the trusted domain, noting that if the filters are removed or adjusted in an erroneous manner, there is a demonstrable risk of inbound or outbound leaks. It is also important to note that some filtering implementations have limits on the size, complexity, or protocol support that can be applied, which may prevent the filter adjustments or creation required to properly secure the trusted domain for a new protocol such as SRv6.</t>
          <t>Practically speaking, this means successfully enforcing a "Trusted Domain" may be operationally difficult and error-prone in practice, and that attacks that are expected to be unfeasible from outside the trusted domain may actually become feasible when any of the involved systems fails to enforce the filtering policy that is required to define the Trusted Domain.</t>
        </section>
        <section anchor="srh-filtering">
          <name>SRH Filtering</name>
          <t>Filtering can be performed based on the presence of an SRH. More generally, <xref target="RFC9288"/> provides recommendations on the filtering of IPv6 packets containing IPv6 extension headers at transit routers. However, filtering based on the presence of an SRH is not necessarily useful for two reasons:
1. The SRH is optional for SID processing as described in <xref target="RFC8754"/> section 3.1 and 4.1.
2. A packet containing an SRH may not be destined to the SR domain, it may be simply transiting the domain.</t>
          <t>For these reasons SRH filtering is not necessarily a useful method of mitigation.</t>
        </section>
        <section anchor="address-range-filtering">
          <name>Address Range Filtering</name>
          <t>The IPv6 destination address can be filtered at the SR ingress node and at all nodes implementing SRv6 SIDs within the SR domain in order to mitigate external attacks. Section 5.1 of <xref target="RFC8754"/> describes this in detail and a summary is presented here:
1. At ingress nodes, any packet entering the SR domain and destined to a SID within the SR domain is dropped.
2. At every SRv6 enabled node, any packet destined to a SID instantiated at the node from a source address outside the SR domain is dropped.</t>
          <t>In order to apply such a filtering mechanism the SR domain needs to have an infrastructure address range for SIDs, and an infrastructure address range for source addresses, that can be detected and enforced. Some examples of an infrastructure address range for SIDs are:
1. ULA addresses
2. The prefix defined in [RFC9602]
3. GUA addresses</t>
          <t>Many operators reserve a /64 block for all loopback addresses and allocate /128 for each loopback interface. This simplifies the filtering of permitted source addresses.</t>
          <t>Failure to implement address range filtering at ingress nodes is mitigated with filtering at SRv6 enabled nodes. Failure to implement both filtering mechanisms could result in a "fail open" scenario, where some attacks by internal attackers described in this document may be launched by external attackers.</t>
          <t>Filtering on prefixes has been shown to be useful, specifically <xref target="RFC8754"/>'s description of packet filtering. There are no known limitations with filtering on infrastructure addresses, and <xref target="RFC9099"/> expands on the concept with control plane filtering.</t>
        </section>
      </section>
      <section anchor="encapsulation-of-packets">
        <name>Encapsulation of Packets</name>
        <t>Packets steered in an SR domain are often encapsulated in an IPv6 encapsulation. This mechanism allows for encapsulation of both IPv4 and IPv6 packets. Encapsulation of packets at the SR ingress node and decapsulation at the SR egress node mitigates the ability of external attackers to attack the domain.</t>
      </section>
      <section anchor="hmac">
        <name>Hashed Message Authentication Code (HMAC)</name>
        <t>The SRH can be secured by an HMAC TLV, as defined in <xref target="RFC8754"/>. The HMAC is an optional TLV that secures the segment list, the SRH flags, the SRH Last Entry field and the IPv6 source address. A pre-shared key is used in the generation and verification of the HMAC.</t>
        <t>Using an HMAC in an SR domain can mitigate some of the SR Modification Attacks (<xref target="modification"/>). For example, the segment list is protected by the HMAC.</t>
        <t>The following aspects of the HMAC should be considered:</t>
        <ul spacing="normal">
          <li>
            <t>The HMAC TLV is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>While it is presumed that unique keys will be employed by each participating node, in scenarios where the network resorts to manual configuration of pre-shared keys, the same key might be reused by multiple systems as an (incorrect) shortcut to keeping the problem of pre-shared key configuration manageable.</t>
          </li>
          <li>
            <t>When the HMAC is used there is a distinction between an attacker who becomes internal by having physical access, for example by plugging into an active port of a network device, and an attacker who has full access to a legitimate network node, including for example encryption keys if the network is encrypted. The latter type of attacker is an internal attacker who can perform any of the attacks that were described in the previous section as relevant to internal attackers.</t>
          </li>
          <li>
            <t>An internal attacker who does not have access to the pre-shared key can capture legitimate packets, and later replay the SRH and HMAC from these recorded packets. This allows the attacker to insert the previously recorded SRH and HMAC into a newly injected packet. An on-path internal attacker can also replace the SRH of an in-transit packet with a different SRH that was previously captured.</t>
          </li>
        </ul>
        <t>These considerations limit the extent to which HMAC TLV can be relied upon as a security mechanism that could readily mitigate threats associated with spoofing and tampering protection for the IPv6 SRH.</t>
      </section>
    </section>
    <section anchor="implications-on-existing-equipment">
      <name>Implications on Existing Equipment</name>
      <section anchor="middlebox-filtering-issues">
        <name>Middlebox Filtering Issues</name>
        <t>When an SRv6 packet is forwarded in the SRv6 domain, its destination address changes constantly and the real destination address is hidden. Security devices on SRv6 network may not learn the real destination address and fail to perform access control on some SRv6 traffic.</t>
        <t>The security devices on SRv6 networks need to take care of SRv6 packets. However, SRv6 packets are often encapsulated by an SR ingress device with an IPv6 encapsulation that has the loopback address of the SR ingress device as a source address. As a result, the address information of SR packets may be asymmetric, resulting in improper traffic filter problems, which affects the effectiveness of security devices.
For example, along the forwarding path in SRv6 network, the SR-aware firewall will check the association relationships of the bidirectional VPN traffic packets. And it is able to retrieve the final destination of an SRv6 packet from the last entry in the SRH. When the &lt;source, destination&gt; tuple of the packet from PE1 (Provider Edge 1) to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;, the source address and destination address of the forward and backward traffic are regarded as different flows. Thus, legitimate traffic may be blocked by the firewall.</t>
        <t>Forwarding SRv6 traffic through devices that are not SRv6-aware might in some cases lead to unpredictable behavior. Because of the existence of the SRH, and the additional headers, security appliances, monitoring systems, and middle boxes could react in different ways if they do not incorporate support for the supporting SRv6 mechanisms, such as the IPv6 Segment Routing Header (SRH) <xref target="RFC8754"/>. Additionally, implementation limitations in the processing of IPv6 packets with extension headers may result in SRv6 packets being dropped <xref target="RFC7872"/>,<xref target="RFC9098"/>.</t>
      </section>
      <section anchor="limited-capability-hardware">
        <name>Limited capability hardware</name>
        <t>In some cases, access control list capabilities are a resource shared with other features across a given hardware platform. Filtering capabilities should be considered along with other hardware reliant functions such as VLAN scale, route table size, MAC address table size, etc. Filtering both at the control and data plane may or may not require shared resources.
For example, some platforms may require allocating resources from route table size in order to accommodate larger numbers of access lists. Hardware and software configurations should be considered when designing the filtering capabilities for an SRv6 control and data plane.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of SRv6 are presented throughout this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="topics-for-further-consideration">
      <name>Topics for Further Consideration</name>
      <t>This section lists topics that will be discussed further before deciding whether they need to be included in this document, as well as some placeholders for items that need further work.</t>
      <ul spacing="normal">
        <li>
          <t>Add tables for attack section</t>
        </li>
        <li>
          <t>The following references may be used in the future: <xref target="RFC8986">RFC9256</xref></t>
        </li>
        <li>
          <t>SRH compression</t>
        </li>
        <li>
          <t>Spoofing</t>
        </li>
        <li>
          <t>Path enumeration</t>
        </li>
        <li>
          <t>host to host scenario involving a WAN and/or a data center fabric.</t>
        </li>
        <li>
          <t>Terms that may be used in a future version: Locator Block, FRR, uSID</t>
        </li>
        <li>
          <t>L4 checksum: <xref target="RFC8200"/> specifies that when the Routing header is present the L4 checksum is computed by the originating node based on the IPv6 address of the last element of the Routing header.  When compressed segment lists <xref target="I-D.ietf-spring-srv6-srh-compression"/> are used, the last element of the Routing header may be different than the Destination Address as received by the final destination. Furthermore, compressed segment lists can be used in the Destination Address without the presence of a Routing header, and in this case the IPv6 Destination address can be modified along the path. As a result, some existing middleboxes which verify the L4 checksum might miscalculate the checksum. This issue is currently under discussion in the SPRING WG.</t>
        </li>
        <li>
          <t>Segment Routing Header figure: the SRv6 Segment Routing Header (SRH) is defined in <xref target="RFC8754"/>.</t>
        </li>
      </ul>
      <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Next Header   |  Hdr Ext Len  | Routing Type  | Segments Left |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Last Entry   |     Flags     |              Tag              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[0] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                                                               |
                                  ...
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[n] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9020">
          <front>
            <title>YANG Data Model for Segment Routing</title>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="P. Sarkar" initials="P." surname="Sarkar"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines three YANG data models. The first is for Segment Routing (SR) configuration and operation, which is to be augmented by different Segment Routing data planes. The next is a YANG data model that defines a collection of generic types and groupings for SR. The third module defines the configuration and operational states for the Segment Routing MPLS data plane.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9020"/>
          <seriesInfo name="DOI" value="10.17487/RFC9020"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9491">
          <front>
            <title>Integration of the Network Service Header (NSH) and Segment Routing for Service Function Chaining (SFC)</title>
            <author fullname="J. Guichard" initials="J." role="editor" surname="Guichard"/>
            <author fullname="J. Tantsura" initials="J." role="editor" surname="Tantsura"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document describes the integration of the Network Service Header (NSH) and Segment Routing (SR), as well as encapsulation details, to efficiently support Service Function Chaining (SFC) while maintaining separation of the service and transport planes as originally intended by the SFC architecture.</t>
              <t>Combining these technologies allows SR to be used for steering packets between Service Function Forwarders (SFFs) along a given Service Function Path (SFP), whereas the NSH is responsible for maintaining the integrity of the service plane, the SFC instance context, and any associated metadata.</t>
              <t>This integration demonstrates that the NSH and SR can work cooperatively and provide a network operator with the flexibility to use whichever transport technology makes sense in specific areas of their network infrastructure while still maintaining an end-to-end service plane using the NSH.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9491"/>
          <seriesInfo name="DOI" value="10.17487/RFC9491"/>
        </reference>
        <reference anchor="RFC9524">
          <front>
            <title>Segment Routing Replication for Multipoint Service Delivery</title>
            <author fullname="D. Voyer" initials="D." role="editor" surname="Voyer"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="R. Parekh" initials="R." surname="Parekh"/>
            <author fullname="H. Bidgoli" initials="H." surname="Bidgoli"/>
            <author fullname="Z. Zhang" initials="Z." surname="Zhang"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes the Segment Routing Replication segment for multipoint service delivery. A Replication segment allows a packet to be replicated from a replication node to downstream nodes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9524"/>
          <seriesInfo name="DOI" value="10.17487/RFC9524"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="A. Hacker" initials="A." surname="Hacker"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC9416">
          <front>
            <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="I. Arce" initials="I." surname="Arce"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="9416"/>
          <seriesInfo name="DOI" value="10.17487/RFC9416"/>
        </reference>
        <reference anchor="RFC7855">
          <front>
            <title>Source Packet Routing in Networking (SPRING) Problem Statement and Requirements</title>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="M. Horneffer" initials="M." surname="Horneffer"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>The ability for a node to specify a forwarding path, other than the normal shortest path, that a particular packet will traverse, benefits a number of network functions. Source-based routing mechanisms have previously been specified for network protocols but have not seen widespread adoption. In this context, the term "source" means "the point at which the explicit route is imposed"; therefore, it is not limited to the originator of the packet (i.e., the node imposing the explicit route may be the ingress node of an operator's network).</t>
              <t>This document outlines various use cases, with their requirements, that need to be taken into account by the Source Packet Routing in Networking (SPRING) architecture for unicast traffic. Multicast use cases and requirements are out of scope for this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7855"/>
          <seriesInfo name="DOI" value="10.17487/RFC7855"/>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs. The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time. This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="RFC9098">
          <front>
            <title>Operational Implications of IPv6 Packets with Extension Headers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="N. Hilliard" initials="N." surname="Hilliard"/>
            <author fullname="G. Doering" initials="G." surname="Doering"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document summarizes the operational implications of IPv6 extension headers specified in the IPv6 protocol specification (RFC 8200) and attempts to analyze reasons why packets with IPv6 extension headers are often dropped in the public Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9098"/>
          <seriesInfo name="DOI" value="10.17487/RFC9098"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC9288">
          <front>
            <title>Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document analyzes the security implications of IPv6 Extension Headers and associated IPv6 options. Additionally, it discusses the operational and interoperability implications of discarding packets based on the IPv6 Extension Headers and IPv6 options they contain. Finally, it provides advice on the filtering of such IPv6 packets at transit routers for traffic not directed to them, for those cases where such filtering is deemed as necessary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9288"/>
          <seriesInfo name="DOI" value="10.17487/RFC9288"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="I-D.ietf-spring-srv6-srh-compression">
          <front>
            <title>Compressed SRv6 Segment List Encoding (CSID)</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Francois Clad" initials="F." surname="Clad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="6" month="February" year="2025"/>
            <abstract>
              <t>   Segment Routing over IPv6 (SRv6) is the instantiation of Segment
   Routing (SR) on the IPv6 dataplane.  This document specifies new
   flavors for the SRv6 endpoint behaviors defined in RFC 8986, which
   enable the compression of an SRv6 segment list.  Such compression
   significantly reduces the size of the SRv6 encapsulation needed to
   steer packets over long segment lists.

   This document updates RFC 8754 by allowing a Segment List entry in
   the Segment Routing Header (SRH) to be either an IPv6 address, as
   specified in RFC 8754, or a REPLACE-CSID container in packed format,
   as specified in this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-srh-compression-23"/>
        </reference>
        <reference anchor="IANAIPv6SPAR" target="https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml">
          <front>
            <title>IANA IPv6 Special-Purpose Address Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="STRIDE" target="https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx">
          <front>
            <title>The STRIDE Threat Model</title>
            <author>
              <organization/>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="ANSI-Sec" target="https://www.ieee802.org/1/ecsg-linksec/meetings/July03/3m150075.pdf">
          <front>
            <title>Operations, Administration, Maintenance, and Provisioning Security Requirements for the Public Telecommunications Network: A Baseline of Security Requirements for the Management Plane</title>
            <author>
              <organization/>
            </author>
            <date year="2003"/>
          </front>
        </reference>
        <reference anchor="CanSecWest2007" target="https://airbus-seclab.github.io/ipv6/IPv6_RH_security-csw07.pdf">
          <front>
            <title>IPv6 Routing Header Security</title>
            <author>
              <organization/>
            </author>
            <date year="2007"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 487?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge the valuable input and contributions from Zafar Ali, Andrew Alston, Dale Carder, Bruno Decraene, Dhruv Dhody, Mike Dopheide, Darren Dukes, Joel Halpern, Boris Hassanov, Alvaro Retana, Eric Vyncke, and Russ White.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+V9a3cbx7Hgd/yKXuqcvVIMgCIlWTQ38TVFShbvihKXpO1k
Zd2cAdAAJhrMIPMghdDa33J/y/1lW89+zAxEOvGezZ5lTixgMNNdXV1d76oZ
jUaDOq0ze2h2Lu1iZfPaXBRNneYLc3p+/bW5tNOmTOuNOS7yKp3ZMqlT+LQz
SCaT0l7/6semSW0XRbk5NFU9G6zTQ/O+LqZDUxVlXdp5BZ82K/zwYTCYFdM8
WQFoszKZ16PU1vNRtS5hklFVXn89qmSS0eMng6qZrNKqgknqzRoeOX159cqY
BybJqgKATPOZXVv4T17vDM2OnaV1UaZJhl9Oj17AP0UJny6uXu0M8mY1seXh
YAagHg6mALbNq6Y6NHXZ2AEs+ckgKW0Co8qSdwY3RflxURbNGvFRNOXUmvNk
+tF6rKS5eWtrvI8e+Gg38Hl2ODAjc5rXtsxtPTrBZQ6ubd7AvMb8qgGN4XXv
/MRXzPf4NF5fJWkG1xlx3yESx0VJTyTldAm/LOt6XR3u7uKNeCm9tmO9bRcv
7E7K4qayuzzELj66SOtlM4GHJ02ZLLK02OU9msxWi2ndu0v4WAYorepgTh5n
PC1Wu79mpEHS1MuiRPTBqAaQAdvzdmxeyBh0kWnnbTr9GF+HZR2al7ktFxtz
OU1tPrWV4pJusIwyBei7eVHeJOUM4FhnSW7HsFfRxFdjc5b+rUyWaTDvVZJF
V2nW101yY9NwkjrJxiu+bbxezr5b4GXER3uGqyJfhMOnSe6v0eDHyzRPzA95
Sk8HU8Bd9bPvpvhzQ7+Op3k0/Jvx2RhPKpzAMqmCWd40aWU6v9FsVzaz8wKG
S8K5MnhglS4ai2uQZ1awaVlWfFe7J2h9EQSvxuZ7uD+Y+hWciSSfFf46TXt5
+rXuVRVOPF/Abd9V6de5/MhzDPKiXAHvuaYTdfHqeH9v7xv5ePD08b5+fP7s
qX785uBr+fjN4/3H+nH/mbv69Js9/fhsHx4bpPm8NcuTZ8/23SDPnsnH508O
nrpB9nS85wf+hoPn/rFvDuTjs8ffPHNgHBz4G9xC9h8TnKejk3GXSZbLEaBi
XVrijnTf0dsj5NKX50cXh4TEOikXFs6lHsubm5sxEFjCLAAeXOTI46tdvDhK
1zju2k6BgY5Ku0irutx84afxp2W9yngikTUIgkgKufm8KddFZc3RbIagmgt5
GNnG5dXF6cnLw3CEq6WVy/ARuHFtzoqZzXpXs6pmORyyaVlUxbwmZmPzUVPt
ZumkTAB0aw/2nxw8P3h4/YdpNd5//GicVOtPNBYJAbP/eO8Avh69vTwdgWiL
INl5t1bxNgToV2mOcNOFoTlLUuDuQMhTOzRAzua8LK5T3Ajk0U5KXti/Nmlp
CccGiMnUsLzzZpKlUzpoAPIKjy5Powfg0ByZF0llszS3ppjfMdwZ7M+Crplz
ZGM723feAkIe79Pm7+3aabUYwRQfgf3urqxF6VPt/luTbR4/2X2y2nv2+PHz
Z+P1bB7hC0SyMcdJDjD9BCwfLjyPsEZ7r7LstU1ARXDw9wKWpOWkqVAGZMlk
LHIDpAVS3C6O9ueL1392GsG0unn8vAvU88FgNBqZZII7NK0Hg8sLAAN4XALC
PZnPAd02XwA6LR6gIXyZJuuqyQjvtH9Vzb+ZlZ0uE9jqlYE1ZOnfnOqTMAGD
TKkLk6LGkc43pmItqUK5nRg4jaOZncNEM7MuYJc3wOCXAAeoPA1t0Sytpg2N
omsy00iVwoEIemV4Q7gyzRoUU7Tf66LGuUEM1XRAKoKff4ETPcmsWaV1uuC1
rSwI1Fk1poPloSgAgLyADwQsjLCB+W48TOuyAPWtyCrUn+wnmLEi4GDp9hOc
AwTG3TNm7K/S2Syzg8ED1HzKYtZMEQLYi5Yi+fDy4pF5L4z6Q4BmkHyEadhW
QCXSMm9hxYpSKc+vkCHAgoE3ZPYa8LawlXu2AV2wzJLNAJGiF90CzJIpcppk
mWWktaETmgUgXwuUIEM+4MKRWwLWcWCSgUVGA3gtgn5aJ/USD+2a1LrKTDYm
XcHOyAJBObQlTJ0BEuG2gaMfWg/on4jWKdIZgF8bm0yXZlmsQd8tZP8ZDMsz
jY1S+hxWnuBQsLSNmRQNEkVBTxAOdLcIyFQ2CBFHG9/GENELAIMAbSPUm2UK
wK0aWMjEIjUBTEAtek5wFl4uwlEQM0VKi6ibj00JrC5BwqWTiNMBDSc5qHLj
AckROMC4LDQnVoihdAXsHZcEo9YprAK5JA7LWJzP7bRmZG2BHdYFAh5YyO8M
P7hKNqYBMUUkcfFaFsccBBRwnEAp5KXDldCKnnjYakcwY2JQxvPuFgAwnk6F
OFa2MAtIDmCnI/ycJcwN7sckEcSukxLoJ9+6QBkfrKPSom02c8dHjsBjk1TB
tDDke9FJ/MzPxhGOGmJ+SlB4Skd0SofKgcC+K75AMAATc1IkrPUa2CNtOlAH
DQ/w3NgsA5LGTeYFwI50dy4G+1KA3XuMz7wXvemD0DldQJ3qg1vLT8s0s8GK
bohm1mubEKUCLcOOI8G1+P6Q1i5fTQUHnPiTP6+zFAivhCOIB9CJBhA2s3UB
J65SmjiKJyAFAA6RjgxjkmKX4piwpMQdFtjLefppCAwBbhcRlOIhaY9Li9P5
/Y3A1U5PHvVMkBVAI0UJG4l8hPHpH+P9LdZ4mY+huwmEOUkUtzYUMzKaYw1I
ebjTQzlVoDfBN2CNBbBKAhWksTv/aa7fZvY6nbK8RXJPp+kaWQhsque5IMtT
pDykHrIJWkgFMCJkdDYDAaYJQQoByQasCuax+XVaFnnAoZFPLJNraxagQDhZ
XTXrdQEHErADFjXRyaRMZws8b4DgtIJjMvNcShd2A6CD5gG/wWJiuOW0AtG2
9AdbTct0Ag9fJ2VaNJXTAvQYqd5AyEQ3CZJNRStwohuovSxAtDByk+siJdYt
egNzQRl3jAL9clqs5UgCMCcCDMKG8g8XTWoS+mbguFXMqypUcJHzoKbqeEKC
R6mitcCWMRuTce0c7qyVL3sN4dD81782Rf3f2qL6CJ0aNcwB8oLvCJ4kFqpP
iu9qu6TvPA7W4vaJC9A6eLseIsofqeKOVsCiTFZgKyzaI6LR6Uf809Hb780J
6jlk3hCKWrN0BgBTdTtI56RtfhElaOAGKAH7ZcFMVYWFruLSlkifDkFvL0EV
QmpqT8pQ882vlCUcL8E2Yj3v1XEHsWhab1/FhSWpQOPg4GdNVqd0Xt08J6Ar
APo3MvDgJ1Y9+HSqMkRaoAFLAG7F02azYs0kl8+GSHdVM10KP58U114zruAM
LJY16cZT2mY40oE2bFfrrNiw4FFVBmQsXMOn6awcF/k1ck4SVoC0E9QOUvoO
Pz+Ijbg3Sb5oQIHlo/TRbgy6Dyuzc/bD5RU6MfFf8/Ydfb54+T9+OL14eYKf
L18fvXnjPgzkjsvX7354c+I/+SeP352dvXx7wg/DVRNdGuycHf1ph/n8zrvz
q9N3b4/e7OAi64j7oPBlEYnmbwmMBc93Ug2ULRFiXhyf/+d/7D01t7f/RTwz
nz/Ll4O950/hy83S5iJVchCW/BV2A9R2lsOIXkA8MOYUFNqK92xZ3KB+WlrA
8+/eI2Y+HJrfT6brvaffygVccHRRcRZdJJx1r3QeZiT2XOqZxmEzut7CdAzv
0Z+i74r34OLv/5V8AKO9g3/9dkDUc2VL4C5FViw2YHWZ12dHx+bqzY+H5nVS
LQH9Z8BcgZ7MUQPoBCqUw3QMXMZcoSL7BgxhkDo/JlljPafEsUA3OHRH/NQr
DY4R000Xrw+3cdJ4NDga3Ts95wxGfaCunmBx5vYBC6DPIgFVJw1MFy+lTJ18
KvJitWE2gBxAtMOIfoeiP8MwdTDVvCxWrNeKx15HZUvzvTj+PgxVRSVqRCUV
dNOpXaMzBod4L25BuPG9uAX148GTZ6yRvhcn4YcxMIY6SYGnlHYh9iMdqtGs
WAEHdRpLGZrNeADhO3LsimQye4GCNcLZ4GWAJnQNdj9aK/gFxOqhOcp5DrJj
6xpN1JKxRGupwQx0SkpKRrW762ZZ4CXS7QCFqLooDzQM8diY2FhL+mYTdW0J
KEymqDiTBgIMd2YVEjciRW+CSZFryw4De04QR2Tlg3FjpxZ5vVrdOCZcpm3Z
MjgtAXFZl6DPlWqgw+/wiRRxegwtWrpq/UVYqaLVLQx4VMEzFLJAEjUliSdF
VwQA7NS7fET+Atyod/M5faGN0h/c6DSS4oF9TUVFUkVsXtY8Cd9IkuSlBPql
3WAhD4YqGMxr1Unz0TwjWSc4i6g7zSu0rOGxhwubi/H1KPBreHgDGHFLiKHz
JfJ9uIGCZweDE+/iwbWrP8VfCbyadJHJl4bleUAGTTN0YQOPmgXnGv1gNAqK
E+dtRGN1qNMQWa3cBOIbI9WYecwEFCFrcS2yQhRU3eVy6LGKp70hvwlpFoyE
YgqaL6zoFdJyjto++4z9kWCVY2L9HEK3gSMMbBJ0v5NCM0EGkEd3xggMbh63
lfR5ukD3CsCeTsl3CFZBAloNqffhcWbrZI4TOkjRFQKEkiUTix6ovdGzzrr0
1v3w4HrvFQGt+JXjEJ030jMvnJ1m9lhPSKvAwZAEW6PzkTEpRyzAm3gBlME5
HOGmN1UEL1IVuuVQF2GyHQKaMlBx5CRtkG5K0PbABoyn2IUfWlsgjAjnLpMc
jmrfiRkyS0Ne6KjqKcH8bEjwMBzBEeXlsPBJ0HuBd63xHICSuxH4yVuJt4jz
20+zQoWaDEyCSkLrQJ2nIiqVGBJzjpAeF6s1GO90Kl5mVs22xBzDpxLY3zGv
OkM74fz45fHxIxWDYO2oHI4Mvbs24olIHic6Olvdt5/EvdL6nkRHkHZJDQ7L
//J/YLTsjXVyY/aDz0/Gq8UKdhQHivFhno7dKX7mPsJQVgUGhUb9ZyYX+Asw
KX/Bbfo0RvcVDSb+7KDTffB/wW36Ubwf5pfgtujLL30Xwy+/3DnEtTF/xj/4
QP/g35/hDvnYGQL2An+DGwzfs6sjfTUajb6Cf3+GYXb59p87Qwjb2uXxft7F
2+E/fxzh3y+EFA/dtR/+urOQn/txoVDI3x89FH/UIa71x93wSxtJ0d/uwBCE
3zKgo2/fBV/chehD9P3bQWvAf/+5fUFnav2y++/tR39hDP9MG4T/wF7AP4BG
9wv97Xq8dxZIt5ttBGTMFx7tXLjrUaSYLRfaP11etJ5VqUN/ngeEX/blVlb9
Ws+TtLrfH94acZbbQyPmzUjkMYVP/7ATxrzNlRg1O2ADHVUuzCBObTKehrhO
cVhWTik3O3XZVMgD+UzsSDgHhefQsc+mRF91bOvEGjLPKP5MjChh1IXUTdaW
Fk1aoQ/RMSrSRhynUw9i1yxQ1QjluNXZ1HRL8+vioxXl3S3JOdf1dvJic2jA
zliPiVTyHrsmXHZgLz0wLzlidPsArMyRpS+fUTvXMASF8EpQcVD6oWYlARbC
HCiS2aZKyXHP3s1uqJbHRP0BLI6pxDcouMeDSBxPtHgN7QehRY2dqF5xnVK0
eWbZkLUkySjknKKGxo5296uTgkGwmMMWMjaHWpxufxRukYuPTZOmikwssZww
TDhJ65Jicn4S8hNVzeQvFIwrwpv83GAiBCK46rcryQGAEBB+It0ZYwO2xDwd
tPMow48UWbEURDW/Bl03XcWucQyiiFP/pmiyGUK7gmugRTX53CYcSsetQAMy
HxEagoCAaNbR8cGjqckkH7x94p30YPIWvKEcm03LDpEM+djhPVX6yUhiJQzC
qjYRjQ+OuV/BdMOYg50D/BIfA32ocoE2F95gQmP8YOTe/JBz1l36N6CiI7LJ
D4NDShgC/geaI6mzTXi7mPDOggHgUnvNsdBlci02tdstjddLsLYw07SEY4j+
0ihqiIpQxYoVz0wOD71BwycTi+M3uUYRLeZrTYP4o54HwRyrtkNWdMlWRdPM
pD5Yz8HFksMWsGdFs1gKSbNdxzeCVZTVnC6iUzhLX4CYse9iznp4B6LO7cqt
OFYzte7At6PNsGcjsI6rvzaAyZk9dHEgJflgv8hUWBfFnE452rzyGO1LGWSM
pJIp4bLszOviBjdrKISmoyvclbB0pSg2TRI2fcVMazk+qiiI5PnvyFxuQFit
DIckAE2H4fmVAGGOFnu6xpwdz876uBmtn2+gvULfoWNCuJxGwp8FWD/KqVOd
Whl+RSAB4TQlLmhFkrN1KNwoIiJjC1DMQvxh1XJmkKTAyFxiVjbhyDgnLSg8
PL0Hy8tQwseI/RqUI0LwePaMAhW3GjdA1uKNfxE+FaZsjcwRxv2IFPx2qs+L
PFHkmHdxDk5oMsSKdSeAzKNHK32W+TVwhMkGrVO8ce7PYJQawnewkpFmGTE+
CfYg86XgpPAZzxo0UQS3jE8jRXRH5hyIz5Zla1m8HD3m4j8KlgHH1BHORtgA
UD+xgaI9kAgkHMWfs0RxrOcx4pOyoMoZ4pqWhgvLxL8GcjcjFaYmYz52EuFs
DJN7liWsKAkBw2pvpzsRbrDI+ypnYp5MUUYkkmNVWqLvzH5qGeB+DeJ2EKcD
BeOBdUpCnaIBkDxK8xFMP+IEMS97cLuOgWiDrJTQYwlSKEoVWvvgqtdsKlVZ
ndI+sSh4MJnB5815Gds3j7ogCq/v+Qf0yIh7THVL3N8b0AcB7b1DAlc7DpM7
Q+YWSuB+xap3W/lYdTdTD4VqfTii20x1R0fSwTOuLvMDSErybo09yBQAlfhL
eMvQp0mlSCrI4ViULUEhQHmfbMjLRYe4UlHCGnQ7ayjKhQ1gSqv7C5LjIp9z
3kqSsRwhlWXL0EOH8i6y4XZM8J1Jnh3vk9N3mdVN1WND6k64J8CuUxTiFu6v
Qq+7Q53yIMIMD8AHAYR/uVkLoG08soPrfujwErwDhc8oInKgLKjQ/ojIC7U0
XOQU2ZwkxOMZn2DsJDx4QaJUZIvgNrv5ijXG3Og653YqpyIVHmAjDpInaVWh
Qxn29ARYC57DuaYAHDJ811jWImptYJRx7IpOvrjh5R5nFaCTFRYV66Kka7Iw
npMzt6UgiJGRiGrmMQg30wPCxzrQmocnxeWjgBmx7L2wktVqPy3hUUTpYXfW
aJGRZuLoJ1C4MRpG6eeoIXCS1SzgKrtK22oNERGTcX2TbDp6Pi5xQaIoWjwc
9GTqrGkZimGqzEM7XoyHmnN38OFRS/PuY+WyEA3YBq5t2KRA5+tkcIW2X5Pn
FsUZWpeanOaYXV41q0hFLAX5wPl79oGOOgVgr1HlVzc7sugtu8ui7JW31rOi
WIdGlAvyyHapGEG0+AgdhcumJZqesv9i0C5hNF4MWX9ese2R/cRTm0pH4jOQ
FYmLjsketHYGTqLl2O/piVOQOPqgAUdHJDhwTanD83jJ5mHgmHLppPAxLhj4
8MiDiZAxw2Fy9E57HDDWEWIBiUYurb2FZydPE0VUR6AWFD5FnpVGOBEjT4LL
OfAIAAZjS8HTQ3fUAxujBRGY1be3InE/fw5z/pXbOXEZpet6O4u5Zk9Cf08C
7O1t8PPnz+TQ0kjp7QMFg7JH+LI5kjoJzkmSAkR31LQkIjgwqj0oXQTCHohW
DqGo3ExGoRkyAYKeipdS9S1ca/u6eZgEgHGyQ1KJ+QI2CwiD87bKGW8+JikA
cc4qRyvFfB7tMK7gHxFnzuJsSTQt9AjHxLkwC8exNyATThYTpYzCqYG7akwr
pN3gMCMtUFLkKezozM9AQKPELCkM7VHuHBoILUf6yNkFggM9llSwWQZnIF3Z
YHIXtI+xK5kAgoQ0/wvJ3PCYRfwFvWP6iMohtQpXCaIT7IMMTivWhTJ2VG7P
wTq2IS5DZT60I/lGX5rDIT0Qf6XNJFXCjREskMK6tD7iuZozISUcpV0V1yHD
cQlCsrbYMluX9loShAMnKj9UIsMWZpFipQC6zcXYu6T8WKRmmpDlij4NeBrG
4nAobG3FKfYkm2bJCjUY4MpgimJV5UrxnAHrCBYcGieHMfnwT9YfmVlD1rOG
rVv5Vz4BOTIpElecUOR+r7dylCjZRAcSPsJMhU8IaWRjSdln7dcxxTm5Gu7N
u5JFgmkKlFdIXpHUZjNXKEHeL7HkiLopXTouiqmGsYoNXIiOFfzfZvOo2iYY
Sco8xsSAz8KMHOHGtw/C3SFG/cC8u0YFw94MjnyuQzeZitxinJrgjuFNgCuf
fdAS4ezkxEwdcjtVgTD7l8qpWshlAe6jOJFIeJDIAr9paf5l5xNMzkwcVAwa
+lBx0+eQARKAYy2OS3ciUTshzyr8zAsnm0nz2vFnpHragxN/2Fz16cOTo0eh
W+s1V3BQfnwwIJfO+MeT4PFeigmwKFnHgsPADDtp4REXHZQqqZDZGGQnqpmA
RFR3MAM8NhiWcn60KoA6wSmcRa6ZF4l5kYpdAHh3ChoGefiM3TVWaV0BQWK0
5Jh8Wp5KQAm5T5UyaCe83/6S2pywyoKgpBQVhCeYipRSFwrEYw2/7+0fjCZA
2fDj0CuU8SbCIgI0h+RJOrVPyZNqTaAdIJVdojfLya5tJ5yk5ChVWt0XTo7l
ZFym3KGn26IMAINblPs4AJA/nKp1T/p84sii7/SlLXbZlxKF2lCcZ9nNSgow
R4tTza7l9ld+EZBzG7AUM1kz8V2CoVJRtMkPyJKVct9R7b/pNchkKbqEoedm
3qNVfdk7iSOgm1RJIPCWJkLx9/GKcowwkcl6jcfB3cyZvPy888OAcjitzOj5
a4kZSvAT/HO+L0a5v+j6IplBVToI0xaa6XBsFLPtRNOxOZ0H8a20EpWV61GJ
MXL8XRICSCeuTFQAcHvrBvj8WcssXADSk0Q/nBRIJ9HKSuFWDFeybhe9h8Fc
9H7L2KEiyad01x1SPsjDFgtRaUUEEf/EYuaIU/WoKuxe0Rd1m5IlF+MtyD/4
3A3OMnEO7o7cDL4UBxl82es+uNPgHvS6rwZdD8hgcBbo+SLOQ1dNwAnJMCMF
d84hN3fQgjlYiVIj8I0agb9WZerLlwwtpirIVwluYXbcb1wYzV6ZYvnPxgd0
t6mDbC5qIV7kBZsXZcsNClQ7tuOhuCbJeuUwmZfAVcwE/ADktfNS474H69dz
gYfRsX9E3mpnG2GHgcwmH0nhtp8wJyGVeq3SdT4KscnurCDzSMq8iZkE3Tiu
rUsT0RxWNJfa2UBRero6AKLNJK886RdgnKoPEeEKStX53G6lAUQvrDFwx3Xh
jzJbQv41YCOHAzKBE4FhVSdc77a6dg6twM40Doco+oL4TeoqB1pJNYuEzmDX
RRK7y0jXBLQ3ZR6RMGVjUF5GFH7S80uGyql6GVrH9zT3xowvH5Clhpkazj35
kH0RdvYIabmIYcQs9iQ2acg1EQtFSpOBoaQ8xYVjqk0OF2pineJRol+df4ZI
XDgce2K80z06km3fSq84lun1ZGK+WCdpXAid3QIcjIi8Q0OBI+TgvtrDqWBO
8rPGo7ypvQZOiyd3EXmEGdEKKJcf5CHA+E1hplRs5tu/BT9pEUNwortOyTu0
Bcrdohk1NU90Ks8pe+SPSu525kdfnMb7ijraUaCnfOYjIcnftAvthj7qzG0d
kxOqPiG9oicfPqhZ1chK4kFqeVLgyDSeZYQ5LJU4DWBNneDUlkBCy1xKZqSM
V5aNuDDxo5XQE3pZffleMM9/z7EAlARqC0whBwk/YZHhNEtS9Eg/uqvbBLo3
/HbOurk6To0PYuqAFNTIwYRa2MB/GyqX3iWlemSwvL4IozKskJYiBnLVl2LU
hVc8rHJA4eBPqHyJMk9HxZy+BlYfTt1b5+RKKmF9t7dSjPlZ48+qw6UkTler
oGqqjipwhveAeWyOnCkcPtkxTjoBiG07EdFZVyrqWduNCsF0Wr+JlbpoibmL
mZDZRVqnK6SDFVfbVsNAHpCTnfTwWMn0SZ+rwIpm+7bPeu/WMtGRlbyUbCNu
jKRczZuMXcAh6/UmNHMaVJTuWPmXwjxu3JIVA5oPsx7KjSzMudG9s8PZ3k78
xFlgKPA+YbutBZ8YsRVaFKNIZlEeYB8VR/LKYuxb0xxRvzp5ax5eFvP6Bs/+
iaTNS3eDRz5to1RP4kI6FoTGv3l7dmkeakuEgCdzsuKjsTQZi+XWJhBybZVe
o3RRPtI9DrTuSpxcH6gDl61K4b7uXs4CdFlzrtEZHRbnQo0B6qMS3/crSDHp
f7x3PZFkMklcqB4l9gUgwp5cA33MVFi4x0TiRnGeUM7H3P3u1bW8soHyrxlt
TmyiQ3sc8fV+P3Y7nYZTGiObnERCTa1awGpv/XanCtHOG4zTwyjiGXHAUMQM
A5XXJZ6Ha+JGa5hAEOLDecHuAk7P2CQDcJYFp3dSAQT31nCNsIJs7SOXWhit
ol9H6dtExzJaaT1kPQ1NBapBlpQZuaP61LF3hBHVu35sZVh7701fJnTbDgpw
7+oPOAbDoWB8pqVDOWYmwrabbI0ewlbizLakLqBQytcMErjv5VF8Ydkdo80A
2N9asyjMUqyFKUQbm/u2b+T2DtszURm+702nQFLtB8b/K6+NetEWVo3kG89d
EEkrW5K4oJmvmwwDzETKSKyu2xc2yXIJ7Fybc2ffhAc+b2IESFthk7lW9TT1
sQLw8Lf0bzZMldNaEtv26tWc1k9GIq5MIqk+ARJQWwLu1gWr894gCWo9nAXt
2kZ4c1weuNudGJagffWH8C/+tu1S957BLxrF5Po8B50v2VP37Bf+fvnNoIni
q/G3Yn4IM/2uz6PahiYuO4RnnA/YX7rLBds3jPiLw0vb3bTboPHxqV3Wsg5h
mC85dLcu6uJ1+9Idjt+tw6AfN7jUl1T3ZRSbzh8M03Ynd+8ZfBUVxMbftl3q
3jP4RV3KPOx52z/Miwo9sl2AcVFe08fvwq2dq/BLVcBfwE3og9uKrv+juCHH
lQwbevTZG3TPDffeG/yuFCbuub8XN1EM+v8CbkK/DeLGOTRER7knvwkUGPge
azR0y/34TWQvyLfQEP67+E3gpSFVIGIU9+c36lFnT7SJh7k/v+nZzP8H+U2n
GJw1is2I9QspBhfJKpoIVoE/MGe+tfMZt3bGuGeQ/9lK13KpG9IIWjJ4YxW1
r++jdF2pGhsqNjKc9KB1So1oNBLUcqliaoe6nl1xk+mqyBpJfy2jbtLY50wK
2E/IvGZoXjnT+vaB9wy33KJYKS903aqVP2x39zAvyORJmqzeUkcfl9GPDYDF
Dg3qNTexOAhD8gVHNnUaveK4C2pzE1thYAzzhKS7KTyNyCH3e1p9JJUPTAFe
q6/0wHFiiKTyhkvTsf8Wavp+6HaqMA6A6Hj65GDvgyvYjJ2j0pR1dHb+5tKl
U44jzA1eeX0YLYh1Ctvpmu9y9nfdU2qP1fHNSulJ7QoXCNiK9RbS74FxKejC
cu6W/txWzdvdDYPwaFBiIzM85ChsN7RA3iCysnIf0sXkkQk6RNk/SnYT8l7J
QHc1o+wzm5udOWjOIyDCfIfy8bl6ay7mpqwBQG9q2do5xnK43bBfVcLuM/Fo
pflSOxKTu5DIi3x3NNk0K8jnTbxBCnM4OsYmHieeYYSKswU1VVcqLrmBA5nx
drbw8dl4A4fIA1xlbipZETICroO1WWke/hd+lHsAALaK3EoZYS7VyKW0hZ/B
YzkGgZFy9dykObc+Z383f6a489hwehW58n07B9gJ3z6U/BJBlKqVpE8ZHpLz
KTGXCqT6UFORyJsSsDLXFjjkuRJoDIv1JEge4EXwwD1CMViALBlZqkTvZuwr
QoaF1jJ3TO9iXrsX2JsQJi7e5GM9OGdmwVb3GhBFRjudC3abwP2osswbvIOr
1Vl52IlZ9I4GHlw+P42JbTvSKdbIIi/B/SxHa9xUFiDMqdQSxjzidlKx/bSW
cnzSDcLWDOgPDV0ZrcVTw4hp3XBDfEtdN9zDkgLqonXYdCRDItRSpjmZsUFX
Ab87qdb9+3aT4b6I1xXvj1Gk0RwwmJwoA2badhgHAeGoq13QGUBTQc/wTHOO
PbVWub2Vl8l8/ow7fp1iSU1JrxmxwBtF2OattbR7iwT8o/f1CRUxXskrFid8
4Av2A98Bf18sCWQkhjPIPXNDxRwVVgIP9pgtyVPai5w7EINxHuZ7t3h8t6H+
k/EeEdzT8d54sM/uRjJxgoULhEhDCOJE84HtzGcCOf6WurqGCnnGRpHjUol1
+19xQ4DK6sJokigu3kZIoihhJo3Y8+qeUJR7tw5FwQLautIEpL5kZiG3tjTt
a8jHDSa1YlDZotYaRum5EWricK9qma0YBkUw9IUDe06PoC3z1QbsxcP6A3Qw
MVTiiNsESdxUj40vdwCCOaqjlZDDbaN7jfeWQWxWAMZxw51OiLz611ZxQ02s
99qn2ZD+2aFrtPwSJ47m7Q7OzRPrlJvWSdgBMS+9HcW20W0LOV4/MJhB47CO
8mYjXD+gNP+am3ic3NoZsT0SdpTuPC8TkLIN9RR3UHDAVY6fuDLvc3e8GH6p
gheOWNZPzJ6EhbRGkRdCiHdck6juBRe/5wNI4Yc3R35O3K0r5kjz9FO7r9Y3
X2NT4idj8/0P4TODM5IWJNyKkrJDwOLAVIDdr5+aSVaApTaXmAZajxOq74wK
kzDTChv2mN29/QMOhKKe6O4mvXKeTK3aUSmXh4qbOWLYa2x/UHPnihijyGbg
hDTcqjuIlMcYcoMlrVNCdQByVGfaBDS4uUPe2F6nb0KyJHooDgUM9lsKemew
7mtI9zXVFEYv02Io5ZiklQXZ3V31+0tKvTDmLGny6VKSrLox1FAMs9UMlGEr
r8Nz83HRQYghD+M0Ucez/kXBWcdtbz0qwpfr5IX5SGktpFfqm3VipBfbqF2r
613UA7WlJGhJq9YFDRiHzTw0ZG+/jN6IBUCz18+Vh1b8hiynmQcck1Kd0Uvq
36rlbmP9IRxbu3k5/hP0PLNtIIiEYAzuiRoqKeMuxC41cLscm9novV/uxqC3
s6P9Kspbp6zVDt0hf/UVmUFS533asT/E5u2PzO2D5SqZfmZhHRRDsVavxR3a
6F3CrXEnQHrhELE0uo37pzodCZ3zbN7QiLyu0HE61KRkM8+SReW/vsFGsS+B
ajacpe0CVrQTMeMhNaq0o2qZINT4KoM0zuPyjaS5QQxQXxCcoVsQfMDfD9qM
m5fTIjgqelNdovLvCsJbeurrKJEwqrD73G5L0EaIvNZHZJFE8AW2OB4YdQMU
9AOrkHZyvj8h1b25DcIdgSm04T+WDkUVjsgZV1oE1OQpWPmIUGQMIF0wuUtf
Q4HcjFsC6PtxKGOZlA6sHhVWWgVtqcMIfllrl4WGc1GoG6U/UdF+CmFUyYrf
VOGavpWWthlL8rR2S62ohEjxYZpTiHNaP0LslPW0Icv7o7VrVcEA3yBRVt1p
W2CxZxylD6NNEs6U8NmlGTgJetp6tyvG2TYM2lj65nXr5aaiNyqx476TvrTO
msWCHS2cNSTVf2T2R31CuGmdU5Q6RVpoYEcd8YNEJx1D97WvEjroG0OkksZ1
72mld6BChZQITLCWGvSwN0q7+3IEKBVPaLtFbzz/qgC4qPoJlYvZa3HC9KXr
jvrfV4CAONcyq6kObTJVRD5UWLImuRngNGqpzfnNkkWt3A9/ILLS8u+qmx2t
ZRz9fXOk4Ctcf5glHk3CBIS+GhdYc9NQQ857FJrRAqb+JXaqKY/UWNcSYQ66
+ZaqeDNvXlKFoAreZsz3ui9jI6WFcxDQR0A7yX4tx+dEmqE/EdbTrHnrk54k
L7EERDdMZmj9BpEJiUpUVTFNvWoa5P3NAqd50LBKm6nyO6C4ENucrtyLhkhZ
eqkZJi//2qRrfrkVlmtTx7JJ8SmIPZxSTGTwU9QaL+l2ZHH2oksSHFJVea8p
jjmQ3FGKbEG0+10+Pmx13zMw2RLAs9RJoNUZU9sm6ulXN0ZmkzL/8rCUr4PK
eNhZNeq+R68dRLHLTTzZOS+SsdOjswVJRQYmndTkIybbcZ1cgMQqKjENvFJb
9ExWjwJlj2cWGu/TQJnOluKAb9tqgTLRGjGpOsY4JS5rj9L4/YBh1J5WGLZ2
IEdwtVmtbF1ie34egOUIWlDk2XXZs+ITFgnpyweDonOX45vLEtobMR7EWfqu
zU7QwkfYS7RhqgyOEkqmnaelvUETlzQRMKi0GYkcS/ZRM56rZbp26JykXELM
KumP52/d6oKmwzNRgDQWVSJ6sF0Sm795i2TVkegPoGvUkaHmaklzDUqsvbrw
e97HYTjet6Zu5D0YxLGDIc9f7pmH5+xQLc3LGWj0e48QwvOX9J6L38MNo9Pz
0dHJycUQL45ghaPL05NvfZIXF0I5LMhj++Fje8FjpGrFnh/vm4qPrCs0pZ2k
25Ci6YvrM0lxlgWzJnrzp/L+OYoujZgFAlKf1D6e6OHw2rASAjs1lYJCjmC0
Bs69xlFd+siJKDGGaYr1yLj1FzAq4hJNjk2u0ynHxbW149hocqIsnRIE1bks
u+0xj4WnQniukYd/HyHGYzDSRfHCPK2Lkuu+SIHlQaRxJcgB650XCXUQChCJ
6cCidsGxKyTyDbIelEEyVSQapAJJvju8eQeJf1+HF1z3ek3xGF3BqQZfhq0I
VuRjcHpZ2AY8CgMQB+36/pEevOsmYtHckFn8kPLiq+f7H4auHxzbxm8kxhq8
dhPUtRkSA/kuw543LdFD1pl7ThspJ75WSxQ/gp1P3Bz0BjJ7E3xRPLLrBfJJ
NyX6Q2rk1WMThmKCKfoMOuGgwTxuPM2O9X3odDd/fHP0FmyyBDkwxU00n5Si
iKgx6ZEOr9t6GoJGPhFxXQQFHWGhCG5RUTqpL8EpxU3QwCDOOqZ3KwsydJ/5
SfFcxq0auMFRaxmRxx+7na/A9Ebqz7BjcSkd7diJy1vLxcvmtaKPKgC0eCOy
/bbsBIXygC+mi1yNyXn/Rs71ZV5BBVmMOn7bqfKG40jbbWk43Zcbc11ZlCUj
PJAzdVvZxub06O1Rzxyh93JJr7XlO6UvGj16VazTKS9IOlTHA7WygAjH2KoM
H2JFXzwJPj1Ey+4n3I51Zqecbwborbnix26c9kaloNSrq+8te+3X5JFVsiwy
4h8Ic0rOAQKERtS5qc5vwE1YmKhk09jJJssRV4r3wlBeBbJ/p1yFfqd5g+f/
MHiJqnvDq/RsCdrR4BUxKah7FrJAoFlF64jfvYzxEfxX/SsSPubA+E9wyKXC
Sl7hNaVgE6jVkxI15RG96DB4oXCUxc/gGnolHTbreiNvU36BAnhoXl2AqtCA
jgDDvHnKKljVrA6DN19r+pNutSo9KjskaS/ofIS/BoNpun8TuL9ALC5I8RD/
UhzcDd+UrTKYdTAJBsi1GISxYY1sS1Oh6t5dhejUNdRl/H4zK9q99KakGLyx
r20UOSvoDYOBAtRSR1u94reuqVW2sW1K93bCdui8tRL3TjDf+sBtyMn2qK90
fWu/Jatl0FQceBPbeKXWsNUaGPLhbjrkwxrdCtM4s6kv8NXftVUiGtJEapwn
Ri/emJGOTDwpLVwXrMvzi9O335ufvqcuS/2qEL9IR3uK3aUypVu86J0cQWMe
d5NF6TVB7b/9nmtPdIg9+PmJeWqema/Nc3Ngvvk112iQr0b/4P8GnPn6Fl+G
I7igTNjXsxLfMoFvhsXvii56Wyx8FzRW8Pu8ljcw/VawhBEGzcp9hTGIvizd
q2TRTsf9TWH5h/5+6Y6i9Idtat4DW36IUd8JuoBCbvnojlF+G1j+7lH+abH7
d4/y5b/xePxPB/E/7R5EFJ7/f0vhUW70aDQi7wt1YZ5ibD+zM+agg9tDNn/s
7A871Ll2R8K+XCFSyYuosvSjZfNJH2f5eZ1kTcJv6wHVjOQ+WTGYEkw2CFlk
/zOZJ6U5ytIhetRKewOfqxrLXk/A8DTH6AICreFF2YBhcWKnZWKx6cHJsmyu
4b/FbAOmKEJwUqyXNsWI00mCAtqcNB/RJP+3wmZgrmVrW8KgL0AxrDDcXSV5
cQ1zZtdJWZgLWyd5MjQvQeM1P27y6UeJfV3gi6l+WoIFMB78bzsgTZmmlAAA

-->

</rfc>
