<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-roll-enrollment-priority-08" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="join-metric">Controlling Secure Network Enrollment in RPL networks</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-roll-enrollment-priority-08"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="R. A." surname="Jadhav" fullname="Rahul Arvind Jadhav">
      <organization>Huawei Tech</organization>
      <address>
        <email>rahul.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thubert" fullname="Pascal Thubert">
      <organization>Cisco Systems</organization>
      <address>
        <email>pthubert@cisco.com</email>
      </address>
    </author>
    <author initials="H." surname="She" fullname="Huimin She">
      <organization>Cisco Systems</organization>
      <address>
        <email>hushe@cisco.com</email>
      </address>
    </author>
    <date year="2023" month="May" day="11"/>
    <area>Internet</area>
    <workgroup>ROLL Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t><xref target="RFC9032"/> defines a method by which a potential <xref target="RFC9031"/> enrollment proxy can announce itself as a available for new Pledges to enroll on a network.
The announcement includes a priority for enrollment.
This document provides a mechanism by which a RPL DODAG root can disable enrollment announcements, or adjust the base priority for enrollment operations.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="problems">
      <name>Introduction</name>
      <t><xref target="RFC7554"/> describes the use of the time-slotted channel hopping (TSCH) mode of <xref target="ieee802154"/>.
<xref target="RFC9031"/> and <xref target="RFC9032"/> describe mechanisms by which a new node (the "pledge") can use a
friendly router as a Join Proxy.
<xref target="RFC9032"/> describes an extension to the 802.15.4 Enhanced Beacon that is used by a Join Proxy to announce its existence such that Pledges can find them.</t>
      <section anchor="motivation-and-overview">
        <name>Motivation and Overview</name>
        <t>It has become clear that not every routing member of the mesh ought to announce itself as a <em>Join Proxy</em>.
There are a variety of local reasons by which a 6LR might not want to provide the <em>Join Proxy</em> function.
They include available battery power,  already committed network bandwidth, and also total available memory available for Neighbor Cache Entry slots.</t>
        <t>There are other situations where the operator of the network would like to selectively enable or disable the enrollment process in a particular DODAG.</t>
        <t>As the enrollment process involves permitting unencrypted traffic into the best effort part of a network,  it would be better to have the enrollment process off when no new nodes are expected.</t>
        <t>A network operator might also be able to recognize when certain parts of the network are overloaded and can not accomodate additional enrollment traffic, and it would like to adjust the enrollment priority (the proxy priority field of <xref target="RFC9032"/>) among all nodes in the subtree of a congested link.</t>
        <t>It may derive from multiple constraining factors, e.g., the size of the DODAG, the occupancy of the bandwidth at the Root, the memory capacity at the DODAG Root, or an administrative decision.</t>
        <t>Each potential <em>Join Proxy</em> would utilize this value as a base on which to add values relating to local conditions such as its Rank and number of pending joins, which would degrade even further the willingness to take more joins.</t>
        <t>When a RPL domain is composed of multiple DODAGs, nodes at the edge of 2 DODAGs may not only join either DODAG but also move from one to the other in order to keep their relative sizes balanced.
For this, the approximate knowledge of size of the DODAG is an essential metric.
Depending on the network policy, the size of the DODAG may or may not affect the minimum enrollment priority.
It would be limiting its value to enforce that one is proportional to the other.
This is why the current size of the DODAG is advertised separately in the new option.</t>
        <t>As explained in <xref target="RFC9032"/>, higher values decrease the likelihood of an unenrolled node sending enrollment traffic via this path.</t>
        <t>A network operator can set this value to the maximum value allowed, effectively disabling all new enrollment traffic.</t>
        <t>Updates to the option propagate through the network according to the trickle algorithm.
The contents of the option are generated at the DODAG Root and do not change at any hop.
If the contents represent an update that is considered important (e.g., quickly disabling any enrollments), the option can trigger trickle timer resets at the nodes to speed up its propagation.</t>
      </section>
    </section>
    <section anchor="Terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>The term (1)"Join" has been used in documents like <xref target="RFC9031"/> to denote the activity of a new node authenticating itself to the network in order to obtain authorization to become a member of the network.</t>
      <t>In the context of the <xref target="RFC6550"/> RPL protocol, the term (2)"Join" has an alternative meaning: that of a node (already authenticating to the network, and already authorized to be a member of the network), deciding which part of the RPL DODAG to attach to.
This term "Join" has to do with preferred parent selection processes.</t>
      <t>In order to avoid the ambiguity of this term, this document refers to the process (1)"Join" as enrollment, leaving the term "Join" to mean (2)"Join".
The term "onboarding" (or IoT Onboarding) is increasingly used to describe what was called enrollment in other documents.
However, the term <em>Join Proxy</em> is retained with its meaning from <xref target="RFC9031"/>.</t>
    </section>
    <section anchor="protocol-definition">
      <name>Protocol Definition</name>
      <t>This document uses the extensions mechanism designed into <xref target="RFC6550"/>.
No mechanism is needed to enable it.</t>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The resulting priority, if less than 0x7f should enable the <em>Join Proxy</em> function.</t>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type        |Opt Length = 4 |  exp  |     DODAG_Size        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |R| min priority|  priority seq |
   +-+-+-+-+-+-+-+-+---------------+
]]></artwork>
        <dl>
          <dt>Type</dt>
          <dd>
            <t>to be assigned by IANA.</t>
          </dd>
          <dt>exp</dt>
          <dd>
            <t>a 4 bit unsigned integer, indicating the power of 2 that defines the unit of the DODAG Size, such that (unit=2^exp).</t>
          </dd>
          <dt>DODAG_Size</dt>
          <dd>
            <t>a 12 bit unsigned integer, expressing the size of the DODAG in units that depend on the exp field. The size of the DODAG is computed as (DAG_Size*2^exp).</t>
          </dd>
          <dt>min.priority</dt>
          <dd>
            <t>a 7 bit field which provides a base value for the Enhanced Beacon Join priority.  A value of 0x7f (127) disables the <em>Join Proxy</em> function entirely.</t>
          </dd>
          <dt>R</dt>
          <dd>
            <t>a reserved bit that SHOULD be set to 0 by senders, and MUST be ignored by receivers.
This reserved bit SHOULD be copied to options created.</t>
          </dd>
          <dt>priority seq</dt>
          <dd>
            <t>an 8-bit lollipop counter, as per <xref section="7.2" sectionFormat="comma" target="RFC6550"/>.  It is initialized to 128 (or greater) when the DODAG root restarts.  This sequence is incremented each time the DODAG root wishes to propogate new values.</t>
          </dd>
        </dl>
        <t>This document uses the extensions mechanism designed into <xref target="RFC6550"/>.
It does not need any mechanism to enable it.</t>
        <t>The size of the DODAG is measured by the Root based one the DAO activity.
It represents a number of routes not a number of nodes, and can only be used to infer a load in a homogeneous network where each node advertises the same number of addresses and generates roughly the same amount of traffic.
The size may slightly change between a DIO and the next, so the value transmitted MUST be considered as an approximation.</t>
        <t>Future work like <xref target="I-D.ietf-roll-capabilities"/> will enable collection of capabilities such as this one in reports to the DODAG root.</t>
      </section>
      <section anchor="upwards-compatibility">
        <name>Upwards compatibility</name>
        <t>A 6LR which did not support this option would not act on it, or copy it into it's DIO messages.
Children and grandchildren nodes would therefore not receive any telemetry via that path, and need to assume a default value.</t>
        <t>A 6LR which did not support this option would not act on it or propagate it in its DIO messages.
In effect, the 6LR's children and grandchildren nodes could not receive any telemetry via that path.
Therefore, 6LRs that support this option but do not receive it via any path SHOULD assume a default value of 0x40 as their base value for the Enhanced Beacon Join Priority.</t>
        <t>A 6LR downstream of a 6LR where there was an interruption in the telemetry could err in two directions:</t>
        <ul spacing="normal">
          <li>if the value implied by the base value of 0x40 was too low, then a 6LR might continue to attract enrollment traffic when none should have been collected.
This is a stressor for the network, but this would also be what would occur without this option at all.</li>
          <li>if the value implied by the base value of 0x40 was too high, then a 6LR might deflect enrollment traffic to other parts of the DODAG tree, possibly refusing any enrollment traffic at all.
In order for this to happen, some significant congestion must be seen in the sub-tree where the implied 0x40 was introduced.</li>
        </ul>
        <t>The 0x40 is only the half-way point, so if such an amount of congestion was present, then this sub-tree of the DODAG simply winds up being more cautious than it needed to be.</t>
        <t>It is possible that the temporal alternation of the above two situations might introduce cycles of accepting and then rejecting enrollment traffic.
This is something an operator should consider if when they incrementally deploy this option to an existing LLN.
In addition, an operator would be unable to turn off enrollment traffic by sending a maximum value enrollment priority to the sub-tree.
This situation is unfortunate, but without this option, the the situation would occur all over the DODAG, rather than just in the sub-tree where the option was omitted.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As per <xref target="RFC7416"/>, RPL control frames either run over a secured layer 2, or use the <xref target="RFC6550"/> Secure DIO methods.
This option can be placed into either a "clear" (layer-2 secured) DIO, or a layer-3 Secure DIO.
As such this option will have both integrity and confidentiality mechanisms applied to it.</t>
      <t>A malicious node (that was part of the RPL control plane) could see these options and could, based  upon the observed minimal enrollment priority signal a confederate that it was a good time to send malicious join traffic.</t>
      <t>Such as a malicious node, being already part of the RPL control plane, could also send DIOs with a different minimal enrollment priority which would cause downstream mesh routers to change their <em>Join Proxy</em>  behavior.</t>
      <t>Lower minimal priorities would cause downstream nodes to accept more pledges than the network was expecting, and higher minimal priorities cause the enrollment process to stall.</t>
      <t>The use of layer-2 or layer-3 security for RPL control messages prevents the above two attacks, by preventing malicious nodes from becoming part of the control plane.
A node that is attacked and has malware placed on it creates vulnerabilities in the same way such an attack on any node involved in Internet routing protocol does.
The rekeying provisions of <xref target="RFC9031"/> exist to permit an operator to remove such nodes from the network easily.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>There are no new privacy issues caused by this extension.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Allocate a new number TBD01 from Registry RPL Control Message Options.
This entry should be called Minimum Enrollment Priority.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This has been reviewed by Konrad Iwanicki and Thomas Watteyne.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7554" target="https://www.rfc-editor.org/info/rfc7554">
          <front>
            <title>Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement</title>
            <author fullname="T. Watteyne" initials="T." role="editor" surname="Watteyne">
              <organization/>
            </author>
            <author fullname="M. Palattella" initials="M." surname="Palattella">
              <organization/>
            </author>
            <author fullname="L. Grieco" initials="L." surname="Grieco">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document describes the environment, problem statement, and goals for using the Time-Slotted Channel Hopping (TSCH) Medium Access Control (MAC) protocol of IEEE 802.14.4e in the context of Low-Power and Lossy Networks (LLNs).  The set of goals enumerated in this document form an initial set only.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7554"/>
          <seriesInfo name="DOI" value="10.17487/RFC7554"/>
        </reference>
        <reference anchor="RFC6550" target="https://www.rfc-editor.org/info/rfc6550">
          <front>
            <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
            <author fullname="T. Winter" initials="T." role="editor" surname="Winter">
              <organization/>
            </author>
            <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert">
              <organization/>
            </author>
            <author fullname="A. Brandt" initials="A." surname="Brandt">
              <organization/>
            </author>
            <author fullname="J. Hui" initials="J." surname="Hui">
              <organization/>
            </author>
            <author fullname="R. Kelsey" initials="R." surname="Kelsey">
              <organization/>
            </author>
            <author fullname="P. Levis" initials="P." surname="Levis">
              <organization/>
            </author>
            <author fullname="K. Pister" initials="K." surname="Pister">
              <organization/>
            </author>
            <author fullname="R. Struik" initials="R." surname="Struik">
              <organization/>
            </author>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur">
              <organization/>
            </author>
            <author fullname="R. Alexander" initials="R." surname="Alexander">
              <organization/>
            </author>
            <date month="March" year="2012"/>
            <abstract>
              <t>Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained.  LLN routers typically operate with constraints on processing power, memory, and energy (battery power).  Their interconnects are characterized by high loss rates, low data rates, and instability.  LLNs are comprised of anything from a few dozen to thousands of routers.  Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point).  This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supported.  Support for point-to-point traffic is also available.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6550"/>
          <seriesInfo name="DOI" value="10.17487/RFC6550"/>
        </reference>
        <reference anchor="RFC9032" target="https://www.rfc-editor.org/info/rfc9032">
          <front>
            <title>Encapsulation of 6TiSCH Join and Enrollment Information Elements</title>
            <author fullname="D. Dujovne" initials="D." role="editor" surname="Dujovne">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>In the Time-Slotted Channel Hopping (TSCH) mode of IEEE Std 802.15.4, opportunities for broadcasts are limited to specific times and specific channels.  Routers in a TSCH network transmit Enhanced Beacon (EB) frames to announce the presence of the network.  This document provides a mechanism by which additional information critical for new nodes (pledges) and long-sleeping nodes may be carried within the EB in order to conserve use of broadcast opportunities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9032"/>
          <seriesInfo name="DOI" value="10.17487/RFC9032"/>
        </reference>
        <reference anchor="RFC9031" target="https://www.rfc-editor.org/info/rfc9031">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić">
              <organization/>
            </author>
            <author fullname="J. Simon" initials="J." surname="Simon">
              <organization/>
            </author>
            <author fullname="K. Pister" initials="K." surname="Pister">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network. The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key. How this key is provisioned is out of scope of this document. Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters. The JRC may at any time update the parameters through another request-response exchange secured by OSCORE. This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner. Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
        </reference>
        <reference anchor="ieee802154" target="http://standards.ieee.org/findstds/standard/802.15.4-2015.html">
          <front>
            <title>IEEE Std. 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks</title>
            <author initials="" surname="IEEE standard for Information Technology">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7416" target="https://www.rfc-editor.org/info/rfc7416">
          <front>
            <title>A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)</title>
            <author fullname="T. Tsao" initials="T." surname="Tsao">
              <organization/>
            </author>
            <author fullname="R. Alexander" initials="R." surname="Alexander">
              <organization/>
            </author>
            <author fullname="M. Dohler" initials="M." surname="Dohler">
              <organization/>
            </author>
            <author fullname="V. Daza" initials="V." surname="Daza">
              <organization/>
            </author>
            <author fullname="A. Lozano" initials="A." surname="Lozano">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." role="editor" surname="Richardson">
              <organization/>
            </author>
            <date month="January" year="2015"/>
            <abstract>
              <t>This document presents a security threat analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs).  The development builds upon previous work on routing security and adapts the assessments to the issues and constraints specific to low-power and lossy networks.  A systematic approach is used in defining and evaluating the security threats.  Applicable countermeasures are application specific and are addressed in relevant applicability statements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7416"/>
          <seriesInfo name="DOI" value="10.17487/RFC7416"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-roll-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-roll-capabilities-09">
          <front>
            <title>RPL Capabilities</title>
            <author fullname="Rahul Jadhav" initials="R." surname="Jadhav">
              <organization>Huawei</organization>
            </author>
            <author fullname="Pascal Thubert" initials="P." surname="Thubert">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Rabi Narayan Sahoo" initials="R. N." surname="Sahoo">
              <organization>Juniper</organization>
            </author>
            <date day="9" month="November" year="2021"/>
            <abstract>
              <t>   This draft enables the discovery, advertisement and query of
   capabilities for RPL nodes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-roll-capabilities-09"/>
        </reference>
      </references>
    </references>
    <section anchor="change-history">
      <name>Change history</name>
      <t>version 00.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="K." surname="Iwanicki" fullname="Konrad Iwanicki">
        <organization/>
        <address>
          <email>iwanicki@mimuw.edu.pl</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAJImXWQAA61a7XLbRpb9j6folX+slJCMpNixo6qpjSI5Y81KllaSKzV/
dqoJNMmOADQGDZDGOH6XfZZ5sjn33m4ApOjMbGWcSpnGR/f9PPfc25hOp0lj
m9ycqQtXNrXLc1su1YNJ29qo96bZuPpJvS3pRmHKRtlS3d9dq1Lu+ETP57VZ
n6lfnC2nhWlqmyaZS0tdYMms1otmak2zmNICU9OvM61q62rbdNPjN0liq/pM
NXXrm9Pj4++PTxNdG32mrsrG1Ngp2SzP1P3t9bX6GXuSfH+sXVslT5vhmekl
7ZWkujlTvskS3+gy+4vOXWl4aZMklT1T+PNCpbpUrTdK17Xu1KFdKJ3nqjP+
SLlarbRfqZWpTaJU49IzuoGf3tVNbRb+jJfIzEK3eePxRLzfFXKb/pnotlm5
+ixR/Gca/lYwH564mal7m650nXlX9rfEZDd0w+T7HnA1zPAAtUxeQIMHt2g2
MBQbxfdPmULb/EwVaf01Gf4HH1+YpTrZL8/97Hym/qSzlV7vSHOvV22uzuu1
LbPdJ1icd63eGKseTbralaCmd2csw5KuzFJXfEGAu5l6XLVzUzc7+99pn+r8
2U3e+sL61KmHzjemeKZ+1cgrP6T01G9s/W6mHlZmZ9t3rS0Q6OMb/3zLVetX
ZrxfSgll522zLxBko/92Za0zdbXRpU2f7O6SNlz/obBFu5mZrJ1VeZKUri50
Y9eGlr3/6eL05OT78PP1q1cvw8/vXr06Dj+/P/72dPh5snPVGmPeHJ+eyJsI
el0vDdLoYNU01dk333AqUSzO6MkZLPHNAvGALPP9vW+wwOzk1ezl9PQYf62a
Ij+QxQRcDq7evn2rHppspuKTE3i3bmaKfp+pn21tcuO9ujGZbQt1nqb0rwBK
6vDm/OJIYS91t+q8paC41p2p1eHduz8fqYfKpHaBy411pVcLpPG120zvdWOG
le9MjXTSFM9GR2zzIuZ2vnJkiMhRQV7zqlyI6V3JIV+63C27AwBYvEE+SabT
qdJz39Q6bZLk06f/CMb+/Jlww5bGK62AlSuXqXmnNivkOq5UrgEyWgjYv3KC
VwbQVFXtPnYMX7osXVumRtnGmxwARkvqNaJGz3PDwpZmo+5yky0No5QsoyC5
jug9Sx5Xpl8qwHuatxkLGBGaFxuEoJesV8D4Nsq0tllQCZhVWl+MtaJqcXl7
ef5HVTvXsPCZ9SzlSLOxEH5CMKyzX1APVAMJ5xpg/QVxlKtMLW6fieULm2U5
4P4F1YbaZW3K/gp/Pr2AwNi88J+jayhn2DU+RbqStbAn1Qe34J+NLczU565p
TKZIwxL4vHJVRZXo8PHh4t2RKlzGz3/6NGTT58+zZMuTFL470SBbDpbzY9OR
B0ta+JDEOKjYmQdHQ/1KFrU1ZZZ3sG2LOihh8CeUYnVHoTLbDb6oIRYwHxFt
niyD4KD1Y16i2kOWFLr+aHRK91cageFpS47X8Q708jgWsawFOtK/fAsl+N0Y
hSQ3IQdtV8BbL16oG4eckYQi69yuDWqN2STJVUOFWM0NoNSoNDe6lsVKBJHB
Y6IzuaAwBaA+eqswKN+uXa6aXdn6PPlqkP8rzoGauAD+V2sNgyLGsFbuCGSA
FJ4QZeSV767vEWO0PokChOaNQhqwCOP11QLbk368URcTbJSrc43AgjqV25h6
AijKsWmGNHdFYTnmQrriyTLb2KxZTdhYOvfwnGsg5rAajOGw2DYUvDeQd44f
FzqFfG+RF52iiKacGfR3EL5W3jZtwNEN3yKVJMtcb+Uo0sa1eaZy+2TICDCx
SQkEEZGm5O3xSkx3em8bzBjiLSFShVJg0zaHlxksINe5//Iba5evEVAQikxE
QdCWCLq6q8heAN4FigGeC6GNkEfQLGCKhnciLXoUhMltExSZ07PkDtIGZOeL
QrvFgqxTIgb6NPVsRPMRtQhSkAa9mXrzSeCw57CXmMUhylK3LO3fjKyZgrho
mIVE9bsWZ0ch/nOnM+hKgUB5RbGoU8SMy6jo6Syz5EPExkj6YBgJn17p6L0R
4m5pHHCXQUgq0IDF1mABxr0BZ1CnCweXEKkWu9iSV/XtHBTaiPWBLMAEchc6
DpQiyvgCdDwzNQJILWpXqAIU2wL26GEqp7YkVy9QVl2NKmFmy9lEVibbBUNx
/Mhll6ZtBSzr4r0+g5QWRe9RkyYBNzhxUl3plFQLD0jpkseoKiFYM3BDS+JQ
pENeUD7O7+QtsmtUxbdgQEwNwMpJ1IZK6FrnrRFE4goHDBSMYV9kct8jOHLN
IY7LAkqwhnjXC8hiCYLee10+sWfLNgJihepAr1J3BoPJ8iJKZpagnoawFKjc
1pz7pPHGcg9YUphT/mhEB0xjZBGo+TPFqBT2zBUUqFAGkVc5KhDYtXcbGw/7
huwIsYVaQE+dhtvsdQpfVwI2aBNlLEsjtgeBloQpXIwLNHWxaglm4R1XZ5K2
T8ZUdMvWwXRriQ+AuM65sM2Sn1zNPhDX64rC2haUOE+l2+RRxGdhRZpS7fQ+
+Fg63llyaaKpXbmVrpXLbdp9IUpZdUKFYAFkJ7BDwhExVoAH78nEGaVKj1c5
WhUODwoBCSlmewC71EjJJHNBcChZAQEFFcbmC5TOEuB3fBndf01b7jdABvhp
LDnbG2AUzJZ3MccJDF0lBY8gHHCYI0TwLB4Yo8RErYCFcFkIc+QRFVtBXIKk
3K6c43giulOKIagaEiPywdrPwU2trZb8qnSz2o/CBJjeNOM0DPYo9Ec2e8jN
PEdRziZUO/rCJuXMRoCDvs+FwLYfKgJi3xuabcI+0EsKtGZVE0vZxnYAeJ2F
XGfqieB6ykmQJbl+VQhlp86SiHJ0TVicSsPSlKQkVYZdAGNsyBxHGtFNxLim
ix2RWQSVrNWvXZuqNl7IuWpZm54KEh6D7dTk1oKCiljQoeDxX1uSectOZTey
kT+ajIUmX0DN5ZKyN6hLjJuyFz7qYUMwhEhGZbBtW3HAR3tKvL1AVwZGIG2Z
UgPnH13+zIwHKAFGB2N7dXDz4eHxYCJ/q/e3/Pv+7f98uLp/e0m/H96dX1/3
P5LwxMO72w/Xl8Ov4c2L25ubt+8v5WVcVVuXkoOb8z8fSAk+uL17vLp9f359
IOkz7qvImQ2zBEsjLviCneqTyOI5o368uPv7/528DJlFgwDwfPnHm5PX1NYQ
o5DdGF/lnzBolwD2iFUT/0Igo/BZUElAIsqJX7lNyUMwWJXtBREKdXhydEBF
7SBwc1NKU4Alotxe6MRW3wM1MoOok9zWlEhWSPaox6EOnEA11RHNiK+HPIgJ
MsZ5N2eSJJ27/Zs0EWwxbhn0Tl/Q97zJVTkE+scm3heJaWgCiam2IbQal7pc
olX0Px3rT1wgp+mj1JjCaKInZwFzWTlu3iKh39FwW7VI6YdHSSkis8IU92uD
VCL+wZAhxT3SWyY3fetNjKJpNHOLgPas0EgbcpJD8Qc3QqwtTE3JjdW4DAiv
F/wi/mu82LF3hl47m4l7i7ldtsG/TdxpshPdvEMPjpFVD/EFgQbEmCi0f2u2
WfREeAzvk9kHx8yGYD1w5dxphtMDdUjTG/eobvtrR4Rj6Mao6OCfSA0OZY7V
0JVvyJEbTY0rVx6zNQYX5tHH/Sx5h1qxphaul3KLAVqC1EZqIZuZ8CsEjdCa
cdIwmt2FEFSXNDZiypfsjF8gdOiTYj/vR3MYqGKXUnyh2DjEZ8l7N3oQS5aA
VTFAaN1sIz36rQD1TzzhEjQANBPHg+CRlEyURc/MnBFLquOPrxeEIkRSwnK/
0Rn3c89j9fzPyZ5rp3uufTta5QRPfKteqlfqO/VavVHf/3+uxXW+nv7O/+JC
v+L/x64yUb5fYVF1bcolguAP2B33QZPkOSUZ+5cHYl7x+X+/RPe/EsPsvYed
+57Om7/+1o7bf75GPECz5CzilA8BN+/U1fn7c/gWquE2EOylmqPnbMshJM2S
0sWCykVMJDCgOYg0CIykcWTKUzkkwTYfJTtNRrOmQ3rkD6f/i12PsPlgTMig
1cnpF2TA44hpH2XYw3tL3txHmYjuR65PzuNOmI4x9r4s/VErFVwdRpm+6uWE
M2bRAyzpaxZU+uuA7MOgldtFoagLJ13b7tCOE63vGJQ6D89DLs7Nw5PT10dx
NOO/nJyKKhb6KHQdyT1LRrSsXpOLbSPWCARoboRUOyTRvGOKbqhNp8LG3Iq4
zLJ0tYRHbVKDuln7UJC21h2WTF1lBZaEMMKUgGwZsIxjlmQr1ZspvZ3TMWbl
KrzcEnliTgPyP0LACZ1xsoKvZ+hGYKGrRiqCpcYult6T0zdcO5a8Z30kA5rB
szzThuQNjWqwCGsCaVoegcYKQ0hN9YMLMLjt7gIb61dCbrlH4/6AiJG0RrN/
H+ZDx8zhZWoBCO+Zmg+v7mD/F4MZVcu3wY1xisJBmUlrTs+e3/ZMj/ft2wkK
4GFCwYNrEWh8mdn+pJ9uMXWdm75E23JB025FQzAZIK5c4aj3ca0fhpM8vmSr
C8WMjatYz2t4YthSZ1nN1IZ3jX2UV9ym5d3wii4oqtgosdvrLUWdvM9pyIc3
QpM1hziGRyaXV7e8uDC4jyA2XghQ6EFrXfow840JM+q0AuXshxVSOn9qGzqq
Z4UD9f6vq+nlbDh1p5HW3OaIa+OpIbB5Ht2cUkstaQB1xg/2kyXmbTxBKMmH
rm562jZEsBCFD9WGjgkZ6yAeL9VRA04jcwGxzGbsa99WtFRYXQiGjDRkkElD
CwQhz9yAAB1NKzmebfOfnu1YwFd6SdlxsbI5XCcnCEvYMEvjFWkaZWGia2ZB
g6ySc5bRhxOgAb2lQU4XZge64dmBhB+nCTFc71tuK8LRv/hs9rvUI+2GiQCr
yKxwWz/wbJk/CLPEbjBB+s+UTvvt/gVVwykIWWdCG4Qyt08NGseFIUJcGILT
arQ+LRbBe7/FpAK9PJbYoindv1rN7vr5V7B5hibVN0DmQtot8UM4sqCckIzh
/rluRfwwphrsIHbCA3xrA/qPcscp4c+S5CuitUOG2qLK7YB7I8mjVhtupWhS
u2F3lVsnRtRz2lLGTWjI6IB43wgrnCwg6QKF5qMI7rdDxlL5i0M7rcgI3sN2
0X59U0neYu9J9MWDB+ls+BLNyGtuSFy77WkaDuX57HcYgSZ8e6yAeCAd9mlO
ZZ77qq2zj9DE1gbRWTnQtDkdeZpF65+Pl/qlovh9m7oIQ18526kqGoR4GhVQ
veSvB8omHkuQ/gWdhjCpMeXoCGPKZxjD0Vg0R6+5DcfOTFGoMvAdRtFQRlY6
X0w3ms78bClVABYWxC1H9WUkDC0cCmiwKKvSy7NlKU8ydXBqCTRuKyjB56SE
falusV4b2jTbjNq+uZFTGBqdipHDwE8ShuZ8dNQYRx5SM7jln9NknnJndHYo
ru5todIuJaJJiZqmpmrEc5noUptfKOf2DnSHQCdnQWt+cRjmhhSJhZIsGUla
N9AvhAKdLVW567aCnM+I5dSaFr6+fs8RE8/PJltb9UP3toxHdyi+JZ8G7onA
QIJZ4J3J8r4DtlBVo0uD3r1J+QiexvoNdm+M5PaevA3zB2Yk8dVxqtOwjw4Q
x4dlUE+Of6AtHwJ+OdxjNUM8OuEqPKrgLwZJi4vgBwkDPgMYmPfrlyff0eif
JlNp+LRnUYNU+XjmU7elSAdU448QM5Xzhz6nzAXacECwNa0LXytK1aSvamJL
MRoxw2lVrtNIi8NuWh3wpwUH6pB3mZ7GXY9oOTnyEwGm3472mZFaoekcVXhi
VgLVjuY71FyyTZjGunIBu/CxEV0bffIBLMpDj8O8+xzBktuU0zR+/xEmUbvj
vWhE6Faao1DMAFj0gDd9yyQC4N4k0HSgQmhe3Ty0XXzitH1ePPRXQEjKfdbC
sHfjYYDIpdWSDmukuXEc9iMl+FBvOBp5CNRS7+g5CUAVp6C/qewkKMsljfeD
X7xM1kA5LBgTzy5/S63xeSiAEQYbUQr+kES+q+GSEdi8cJatXhliw+tYE7pd
8/Qibhp2sj0JfbZLf6whqCggXcXPtigfx/NvMrV8YAA7CT8Np2h7dpS9nh3n
y6iVnNRIeX8cPneKSYCwj0HvY2JT+Rx7IRJUKktr7uu2awEPnJ/QxM27+AhX
oS2Xe5l88syex4kjl2+5e0bneC4bjqBk+fAFBA2wsTB/DhvSXAi2zAq8Wrc5
9XN9dxPxjfo5KsR97eVV+Su5spMNw9cm3GfGr437b4/iIQG31bMwG30yXbi3
ttKdj7+Q4G/6qN5wv89fsGwVGf4ehM+6WaiRlcaRQFNrHsrQlNiudfoceR/7
D3vCRypVeNCCmMf4CDTO+mGYwIvS8O45luf0AQJ9XiLnNtI7P/54eXwiEt6b
JX0Z0XGgxG83byRQwhw5YrORj5BWsaSGGftNOPcefXI+4v0v1Hnan9Dz2D3M
RvrzKASaNRtRa+frWo6Ux5Ur8OzP9NFVR2HF3wzO4XRa/UJyHCvCE2hdaTxF
yH58HB5c5O1ikfwDtAhmtzYvAAA=

-->

</rfc>
