<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-savax-data-02" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title abbrev="SAVA-X-Data">Data Plane of Inter-Domain Source Address Validation Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-savax-data-02"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Wang" fullname="Xiaoliang Wang">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization abbrev="Tsinghua University">Institute for Network Sciences and Cyberspace, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>guoyangf19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2022" month="May" day="20"/>
    <area>Operations and Management Area</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. The inter-domain source address validation architecture is an effort to enhance the Internet by using state machine to generate consistent tags. When communicating between two end hosts at different ADs of IPv6 network, tags will be added to the packets to identify the authenticity of the IPv6 source address.</t>
      <t>This memo focus on the data plane of the SAVA-X mechanism.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Inter-Domain Source Address Validation (SAVA-X) mechanism establishes a trust alliance among Address Domains (AD), maintains a one-to-one state machine among ADs, generates a consistent tag, and deploys the tag to the ADs' border router (AER). The AER of the source AD adds a tag to identify the identity of the AD to the packet originating from one AD and sinking in another AD. The AER of the destination AD verifies the source address by validating the correctness of the tag to determine whether it is a packet with a forged source address.</t>
      <t>In the process of packet forwarding, if the source address and the destination address of this packet both are addresses in the trust alliance, however the tag is not added or incorrectly added, AER of the destination AD determines that the source address is forged and directly discards this packet. The destination AD forwards the packet directly for packets whose source address is an address outside the trust alliance.</t>
      <t>This document mainly studies the relevant specifications of the data plane of the inter-domain source address validation architecture mechanism between ADs, which will protect IPv6 networks from being forged source address. You could see <xref target="RFC8200" format="default"/> for more  details about IPv6. It stipulates the state machine, tag generation and update, tag processing in AER, and packet signature Its promotion and application can realize the standardization of  the data plane in the SAVA-X to facilitate the related equipment developed by different manufacturers and organizations to cooperate to accomplish the inter-domain source address validation jointly.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119, BCP 14 <xref target="RFC2119" format="default"/> and indicate requirement levels for compliant CoAP implementations.</t>
    </section>
    <section anchor="terminology-and-abbreviation" numbered="true" toc="default">
      <name>Terminology and Abbreviation</name>
      <table align="center">
        <thead>
          <tr>
            <th align="left">Abbreviation</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">AD</td>
            <td align="left">Address Domain, the unit of a trust alliance, which is an address set consisting of all IPv6 addresses corresponding to an IPv6 address prefix.</td>
          </tr>
          <tr>
            <td align="left">TA</td>
            <td align="left">Trust Alliance, the IPv6 network that uses the SAVA-X mechanism.</td>
          </tr>
          <tr>
            <td align="left">ACS</td>
            <td align="left">AD Control Server, the server that matains state machine with other ACS and distribute information to AER.</td>
          </tr>
          <tr>
            <td align="left">AER</td>
            <td align="left">AD border router, which is placed at the boundary of an AD of STA.</td>
          </tr>
          <tr>
            <td align="left">ADID</td>
            <td align="left">The identity of an AD.</td>
          </tr>
          <tr>
            <td align="left">ADID_Rec</td>
            <td align="left">The record of a number of an AD.</td>
          </tr>
          <tr>
            <td align="left">ARI_Rec</td>
            <td align="left">The record with relavent information of an AD or STA.</td>
          </tr>
          <tr>
            <td align="left">API_Rec</td>
            <td align="left">The record of prefix of an AD or STA.</td>
          </tr>
          <tr>
            <td align="left">SM</td>
            <td align="left">State Machine, which is maintained by a pair of ACS to generate tags.</td>
          </tr>
          <tr>
            <td align="left">Tag</td>
            <td align="left">The authentic identification of source address of a packet.</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="state-machine-mechanism" numbered="true" toc="default">
      <name>State Machine Mechanism</name>
      <t>In SAVA-X, state machine mechanism is used to generate, update, and manage the tags.</t>
      <figure anchor="SM">
        <name>State machine mechanism.</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
  +------+              +-------+                    +---------+
  | S_n  |     triger   | A-Box |     transition     | S_(n+1) |
  |      |------------->|       |------------------->|         |
  +------+              +-------+                    +---------+
                            | generation
                            |
                            v
                        +-------+
                        | Tag_n |
                        +-------+
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>State:</dt>
        <dd>
          <tt>S_n</tt> and <tt>S_(n+1)</tt> represent the current state and next state of the SM respectively.</dd>
        <dt>Tag:</dt>
        <dd>
          <tt>Tag_n</tt> is generated in the progress of state transiting from <tt>S_n</tt> to <tt>S_(n+1)</tt>.</dd>
        <dt>Algorithm Box:</dt>
        <dd>
  A-Box is Alogorithm Box. It is used to transite the State and generate the tag. It takes the current State as the input and the following State and current tag as the output. The algorithm box consists of two parts: one is the transition function <tt>transit()</tt>, <tt>S_(n+1)</tt> = transit(<tt>S_n</tt>); the second is the function <tt>generate()</tt> to generate tags. <tt>Tag_n</tt> = generate(<tt>S_n</tt>). Algorithm box (A-Box) is the core of state machine. It determines the data structure of state and tag, the specific mode of state machine implementation, as well as its security and complexity.</dd>
        <dt>Trigger:</dt>
        <dd>
  It is used to trig the transition of State.</dd>
        <dt>Transition:</dt>
        <dd>
  It reprents the progress of state transiting from <tt>S_n</tt> to <tt>S_(n+1)</tt>.</dd>
        <dt>Generation:</dt>
        <dd>
  It reprents the progress of calculating the current tag from current State.</dd>
      </dl>
    </section>
    <section anchor="tag" numbered="true" toc="default">
      <name>Tag</name>
      <section anchor="tag-generation-algorithm" numbered="true" toc="default">
        <name>Tag Generation Algorithm</name>
        <t>There are two ways to generate tags: pseudo-random number algorithm and hash chain algorithm.</t>
        <section anchor="pseudo-random-number-algorithm" numbered="true" toc="default">
          <name>Pseudo-Random Number Algorithm</name>
          <t>In the pseudo-random number generation algorithm, an initial number or stringis usually used as the "seed", which corresponds to the initial state of the state machine. Using seeds, a pseudo-random number sequence is generated as a tag sequence through some algorithm. Next, we would take KISS (keep it simple stub), a pseudo-random number generation algorithm, as an example to introduce how to apply it to the state machine mechanism. For the algorithm details of KISS, you could refer to the following reference pseudo code:</t>
          <figure anchor="kiss99">
            <name>KISS99: Pseudo-random number generatation</name>
            <artwork name="" type="" align="left" alt=""><![CDATA[
/* Seed variables */
uint x = 123456789,y = 362436000,z = 521288629,c = 7654321;
uint KISS(){
   const ulong a = 698769069UL;
   ulong t;
   x = 69069*x+12345;
   y ^= (y<<13); y ^= (y>>17); y ^= (y<<5);
   t = a*z+c; c = (t>>32);
   z=cast(uint)t;
   return x+y+z;
}
]]></artwork>
          </figure>
          <t>In this algorithm, State <tt>S</tt> can be expressed as (<tt>x</tt>, <tt>y</tt>, <tt>z</tt>, <tt>c</tt>). The algorithm box is <tt>KISS()</tt>. After each calculation, the state undergoes a transition from <tt>S_n</tt> to <tt>S_(n+1)</tt>, that is, the four variables <tt>x</tt>, <tt>y</tt>, <tt>z</tt> and <tt>c</tt> are all changed. At the same time, a pseudo-rng number (<tt>x</tt> + <tt>y</tt> + <tt>z</tt>) is generated.</t>
          <t>As the state machine shown above, the initial state is <tt>S_0</tt> = (123456789, 362436000, 521288629, 7654321). In fact, the initial state can be arbitrarily selected by the algorithm shown below:</t>
          <figure anchor="seeds-rng">
            <name>KISS99: Initial state selection</name>
            <artwork name="" type="" align="left" alt=""><![CDATA[
void init_KISS() {
   x = devrand();
   while (!(y = devrand())); /* y must not be zero */
   z = devrand();
   /* Don't really need to seed c as well
      but if you really want to... */
   c = devrand() % 698769069; /* Should be less than 698769069 */
}
]]></artwork>
          </figure>
          <t>The basic design goal of pseudo-random number generation algorithm is mainly long cycle and pretty distribution, however, without or little consideration of safety factors. The backstepping security and prediction ability of KISS algorithm have not been proved.</t>
        </section>
        <section anchor="hash-chain-algorithm" numbered="true" toc="default">
          <name>Hash Chain Algorithm</name>
          <t>For the design of hash chain based tag generating algorithm, one can see S/Key in <xref target="RFC1760" format="default"/>. In the S/Key system, there is an encryption end and an authentication end. The encryption end generates an initial state <tt>W</tt>, and then uses some hash algorithm <tt>H()</tt> to iterate on <tt>W</tt> to obtain a string sequence: <tt>H_0(W)</tt>, <tt>H_1(W)</tt>, ..., <tt>H_N(W)</tt>, where <tt>H_n(W)</tt> represents the iterative operation of <tt>H()</tt> on <tt>W</tt> n times, <tt>H_0(W)</tt> = <tt>W</tt>. The state sequence <tt>{S}</tt> is defined as the reverse order of the hash chain, that is, <tt>S_n</tt> = <tt>H_(N-n)(W)</tt>. For example, the initial state <tt>S_0</tt> = <tt>H_N(W)</tt> and the final state <tt>S_N</tt> = <tt>H_0(W)</tt> = <tt>W</tt>, so the transfer function <tt>transit()</tt> is repsented as the invere <tt>H()</tt>. Different from the KISS pseudo-random number generation algorithm mentioned in the previous section, in the hash chain, the tag is the state itself, that is, the output and input of <tt>generate()</tt> are consistent, and <tt>Tag_n</tt> = <tt>S_n</tt>. In the following discussion, <tt>S_n</tt> is temporarily used instead of <tt>Tag_n</tt> for the convenience of expression.</t>
          <t>The encryption end sends the initial state <tt>S_0</tt> to the verification end, and maintains <tt>S_1</tt> ~ <tt>S_n</tt>, which is also the tag sequence used. The encryption end sends <tt>S_(n+1)</tt> to the verification end every time. The verification end uses the <tt>S_n</tt> maintained by itself to verify the tag correctness of the encryption end by calculating <tt>S_(n+1)</tt> = transit(<tt>S_n</tt>). As explained above, <tt>transit()</tt> is the inversion of <tt>H()</tt>. In practice, a secure hash algorithm is usually used as <tt>H()</tt>, such as SHA-256. For these hash algorithms, it is easy to calculate <tt>H()</tt>, but it is difficult to calculate the inversion of <tt>H()</tt>. Therefore, the actual operation is as follows: after receiving  <tt>S_(n+1)</tt>, the verification end calculates whether H(<tt>S_(n+1)</tt>) is  equal to <tt>S_n</tt>. If it is equal, the verification is successful, otherwise it fails.</t>
          <t>Hash chain algorithm has high security. It can prevent backstepping and prediction well. Not only the attacker can't backstep or predict, but also the verification end cannot do that. The disadvantage of hash chain algorithm is that before using tags, the encryption end needs to calculate all tag sequences, and then send the last of the sequence to the verification end as the initial state. At the same time, the encryption end needs to save a complete tag sequence, although it can be deleted after each tag is used up. The cost of storage of hash chain algorithm can not be ignored</t>
        </section>
      </section>
      <section anchor="tag-update" numbered="true" toc="default">
        <name>Tag Update</name>
        <t>After the state machine is enabled, the source AD uses the initial state <tt>S_0</tt> to transfer to the state <tt>S_1</tt> through the algorithm box, and generates the tag <tt>Tag_1</tt>. In the subsequent state transition interval, the AER of the source AD uses the same tag, <tt>Tag_1</tt>, to add to the message sent from this AD to the destination AD. The source AD does not transfer from the state <tt>S_1</tt> to the state <tt>S_2</tt> until the transition interval passes, and starts to use tag <tt>Tag_2</tt>. In this cycle, the state sequence <tt>S_1</tt> ~ <tt>S_N</tt> and tag sequence <tt>Tag_1</tt> ~ <tt>TAG_N</tt> are experienced, in which <tt>Tag_1</tt> ~ <tt>Tag_N</tt> are used as tags in turn and added to the message by the source AER. Similarly, the destination AER uses the same state machine to calculate the tag sequence, so as to verify the tag in the message. If the source AD and the destination AD can ensure the synchronization of the state machine, it would guarantee the synchronization of the tags. So the tags can be verified correctly.</t>
        <t>Each state machine has an activation time and an Expiration Time. After the expiration time comes, the current state machine is deactivated. If a new state machine is available, the new state machine will be used and performs the same label verification process.</t>
      </section>
    </section>
    <section anchor="packet-processing-at-aer" numbered="true" toc="default">
      <name>Packet Processing at AER</name>
      <t>SAVA-X does not require the intermediate router to recognize and process the SAVA-X option, which we will described at <xref target="iana" format="default"/>, as long as the intermediate router correctly implements the extension header and option processing method described in IPv6 protocol  <xref target="RFC8200" format="default"/>. The intermediate router could correctly forward the packet regardless of its specific content even if it does not recognize the SAVA-X option well.</t>
      <t>The border router, AER, needs to handle tag correctly. The AER of the source AD judges whether the IPv6 destination address belongs to the trust alliance. If no, the packet will be forwarded directly. If yes, the AER continues to judge the hierarchical relationship between the the source AD and the member ADs to which the packet's destination IP address belongs. If the source AD and the destination AD are under the same sub-trust alliance, the AER would add the tag between the two ADs, otherwise add the AD_V tag.</t>
      <t>Note that the packet will not be processed at other AERs in the sub-trust alliance.</t>
      <t>At the AER of the boundary of sub-trust alliance, the packet is classified according to the IPv6 destination address. If the destination address is not within the trust alliance, it will be forwarded directly. If the destination address belongs to this sub-trust alliance, it will be classified according to the source IP address. If the source address also belongs to this sub-trust alliance, it will be forwarded directly. If the source address does not belong to this sub-trust alliance, the AER needs to verify the sub-trust alliance tag and replace it with the AD_V tag in this sub-trust alliance for following forwarding. If the destination IP address of packet belongs to other sub-trust alliance, it SHALL be classified according to the source address. If the source address belongs to this sub-trust alliance, verify the AD_V tag. If consistent, replace with sub-trust alliance tag. If the source address is not in this sub-trust alliance, it will be forwarded directly. Otherwise, the packet will be discarded.</t>
      <t>The AER of the destination AD classifies packet according to the source address of the packet to be forwarded to determine whether it originates from a member AD. If yes, enter the label check. Otherwise it will be forwarded directly. Tag verification process: if the tag carried by the packet is consistent with the tag used by the source AD, remove the tag and forward the packet. Otherwise the packet will be discarded.</t>
      <section anchor="port-classification" numbered="true" toc="default">
        <name>Port Classification</name>
        <t>In order to classify packets correctly to complete tag addition, inspection and packet forwarding, it is necessary to classify the ports (interfaces) of AER. Any connected port of AER must belong to and only belong to the following types of ports:</t>
        <ul spacing="normal">
          <li>Ingress Port: Connect to the port of non-SAVA-X router in this AD. Generally connected to IGP router in the domain.</li>
          <li>Egress Port:  Connect to other AD ports.</li>
          <li>Trust Port:   Connect to the port of SAVA-X router in this AD.</li>
        </ul>
      </section>
      <section anchor="source-address-validation" numbered="true" toc="default">
        <name>Source Address Validation</name>
        <t>In SAVA-X, AER must check the source address of the packet. Only the packet passing the check will be subject to the  <xref target="pkt-clsscify" format="default"/> step, and the packet using the fake source IP address will be discarded. The source address is checked using the ingress filtering method. AER only checks the source address according to the following three rules:</t>
        <ul spacing="normal">
          <li>The packet entering an AER from the Ingress Port SHALL only carry the source address prefix belonging to this AD.</li>
          <li>The packet entering an AER from the Egress Port SHALL NOT carry the source address prefix belonging to this AD.</li>
          <li>Packets entering an AER from Trust Port are not checked.</li>
        </ul>
        <t>The prefix of IP address owned by one AD SHALL be configured by the administrator or obtained from the control plane, and deployed to AER by ACS of this AD.</t>
      </section>
      <section anchor="pkt-clsscify" numbered="true" toc="default">
        <name>Packet Classification</name>
        <t>It SHALL be classified after the packet entering an AER passes the source address validation. There are three types of packets: packets that SHOULD be taged, packets that SHOULD check tags, and other messages. The judgment rules of the three packets are as follows:</t>
        <ul spacing="normal">
          <li>Packets entering AER from Ingress Port. If the source address belongs to this AD and the IPv6 destination address belongs to another AD in the same sub-trust alliance, tag must be added. If the source IP address belongs to another AD in the same sub-trust alliance and the IPv6 destination address belongs to another sub-trust alliances, the  tag must be verified and replaced with the sub-trust alliance tag. Other packets are forwarded directly.</li>
          <li>Packets entering AER from the Egress Port. Tag must be checked if the source address belongs to another AD in the same sub-trust alliance and the IPv6 destination address belongs to this AD. If the source address belongs to other sub-trust alliance and the IPv6 destination address belongs to another AD in the same sub-trust alliance, the tag must be checked and replaced. And other packets can be forwarded directly.</li>
          <li>Packets entering AER from Trust Port. These packets SHOULD be forwarded directly.</li>
        </ul>
        <t>The relationship between IP address and ADs SHALL be obtained from the control plane and deployed to the AER by the ACS of the AD. When the SAVA-X option of the packet received from the progress port carries the active AD number, you can skip the "mapping from address to AD number" process and directly use the AD number carried in the message.</t>
      </section>
      <section anchor="tag-addition" numbered="true" toc="default">
        <name>Tag Addition</name>
        <t>AER SHOULD add destination option header and add SAVA-X option into the packet according to the requirements of IETF <xref target="RFC8200" format="default"/>.</t>
        <t>According to <xref target="RFC8200" format="default"/>, the destination option header SHOULD be filled so that its length is an integer multiple of 8 bytes, including the Next Hader and Hdr Ext Len fields of the destination option header, the Next Header and Payload Length fields of the IPv6 packet header, and the upper protocol header (such as TCP, UDP, etc.). If it is necessary, AER SHOULD recalculate the Checksum field.</t>
      </section>
      <section anchor="tag-verify" numbered="true" toc="default">
        <name>Tag Verification</name>
        <t>AER will process the first option with Option Type equals to the binary code of <tt>00111011</tt> in the destination header. We would talk more about that at <xref target="iana" format="default"/>.</t>
        <ol spacing="normal" type="1"><li>If the packet does not contain destination option header or SAVA-X option. the packet SHOULD be discarded.</li>
          <li>If the packet contains SAVA-X option but the parameters or tag are incorrect, the packet SHOULD be discarded.</li>
          <li>If the packet contains SAVA-X option, and the parameters and tag are correct, AER must replace the tag or remove the tag when needed before forwarding the message.</li>
        </ol>
        <t>In the following scenarios, the tag needs to be removed. If there are only SAVA-X option, Pad1 and PadN options in the destination option header of the message, AER SHOULD remove the whole destination option header. If there are other options besides SAVA-X option, Pad1 and PadN option in the destination option header, AER SHOULD remove SAVA-X option and adjust the alignment of other options according to the relevant protocols of IPv6. In order to removing the sava-x option, the destination option header may also be filled, or some Pad1 and PadN may be removed, to make its length be multiple of 8 bytes. At the same time, the Next Header field and Payload Length field deployed in the IPv6 message header, and the Checksum field of the upper protocol header (such as TCP, UDP, etc.) SHALL be rewritten
as necessary.</t>
      </section>
      <section anchor="tag-replacement" numbered="true" toc="default">
        <name>Tag Replacement</name>
        <t>Tag needs to be replaced when packet pass through different sub-trust alliance. Tag replacement needs to be done on the AER of the boundary address domain of the sub-trust alliance. This feature is not necessary to realize on the AER of each non-boundary address domain in the sub-trust alliance.</t>
        <t>When packet is arrieved at the AER of the sub-trust alliance boundary, it is classified according to the destination address.</t>
        <ol spacing="normal" type="1"><li>If the destination address does not belong to the trust alliance, it will be forwarded directly.</li>
          <li>
            <t>If the destination address belongs to this sub-trust alliance, it will be classified according to the source address of the packet.
            </t>
            <ul spacing="normal">
              <li>If the source address also belongs to this sub-trust alliance, the packet will be forwarded directly.</li>
              <li>If the source address does not belong to this sub-trust alliance, AER should verify the sub-trust alliance tag and replace it with the AD_V tag in this sub-trust alliance for forwarding.</li>
            </ul>
          </li>
          <li>
            <t>If the destination address of the packet belongs to other sub-trust alliance, it shall be classified according to the source address.
            </t>
            <ul spacing="normal">
              <li>If the source address belongs to this sub-trust alliance, AER should verify the AD_V tag and replace the tag with sub-trust alliance tag when it is consistent.</li>
              <li>If the source address is not in this sub-trust alliance, it will be forwarded directly.</li>
            </ul>
          </li>
          <li>Otherwise, the packet will be discarded.</li>
        </ol>
        <t>Alliance tag will be used when the packet crosses the upper AD which is at the higher level of source AD and destination AD. Alliance tag is the tag maintained between the source AD corresponding to the AD in the parent AD and the destination AD corresponding to the address domain in the parent AD.</t>
      </section>
    </section>
    <section anchor="packet-signature" numbered="true" toc="default">
      <name>Packet Signature</name>
      <t>It is difficult to accurately synchronize time among the trust  alliance members. So we propose a shared time slice, which means that there are two tags effecting at the same time in a period of time. But it may suffer from replay attack. Therefore, a packet signature mechanism is proposed to prevent replay attack and concel the original tag.</t>
      <t>Tag is time-dependent. The state machine triggers state transition by time and generates a new tag. In a short period of time, all data packets are labeled with the same tag. Moreover, due to the subtle differences in time synchronization, both old and new tags can be used for this short period of time, so attackers can reuse tags for replay attack by simply copying tags.</t>
      <t>The packet signature mechanism joins 8-bit part of the payload in the packet and the tags generated by the state machine. And then it calculates hash value with parameters above to achieve the effect of packet by packet signature and resist the attackers reuse of tags. Its processing flow is shown below.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                     Packet by Packet Signature                |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |Lev|Len|                   Reserved                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <dl newline="false" spacing="normal">
        <dt>Packet by Packet Signature:</dt>
        <dd>
  Hash value of original tag, source address and destination address and first 8-bit of payload, credible level and credible prefix length.</dd>
        <dt>Lev:</dt>
        <dd>
  2-bit of credible level.</dd>
        <dt>Len:</dt>
        <dd>
  7-bit of credible prefix length.</dd>
        <dt>Reserved:</dt>
        <dd>
  23-bit of reserved field. 0 will be padded.</dd>
      </dl>
      <t>Firstly, it takes the source address, destination address and the first 8-bit of the data part of the data packet from the data packet, joins them in the way of <tt>(src-ip, dst-ip, first 8-bit of payload)</tt>, and then joins the tag generated by the state machine at this time, the credible level of the SAVA architecture adopted by this AD and the length of the credible prefix to hash the concatenated string with the hash algorithm to get a new message digest. Then it is reduced to 32-bit packet signature by clipping and folding algorithm. The AER adds the 32-bit packet signature together with the 2-bit credible level and the 7-bit credible prefix length to the SAVA-X option, fills the option into 64-bit, and forwards it. At the AER of the destination AD, the same splicing and the same hash operation are performed to verify whether the generated string is consistent with the signature of the data packet. If they are consistent, they are forwarded. Otherwise, it is considered that the source address is forged and the data packet is discarded.</t>
      <t>Due to the problem of time synchronization, when both old and new tags are valid, both old and new tags need to be verified. As long as one of them passes the verification, the packet should be forwarded. The original tag generated by the state machine will not appear in the packet. The attackers does not know the tag generated by the state machine at this time, so they can not forge the packet signature in the same way, which ensures the security of the data communication plane.</t>
    </section>
    <section anchor="mtu-consideration" numbered="true" toc="default">
      <name>MTU Consideration</name>
      <t>As the AER adds an option to the packet, the length of this packet is increasing, causing the MTU problem. This problem could taken  place in source AER or the link between source AER and destination AER. If it occurs on the source AER, the source AER returns the ICMP message of "packet too big" to the source host and informs the host to reduce the packet size. Othewise, if it occurs on other links from the source AER to the destination AER, which means the packet size  exceeds the MTU of other links from the source AER to the destination AER after adding the tag, the corresponding router will return the ICMP message of "packet too big" to the source host. However, after the source host adjusts its own MTU, the problem MAY still exists because the root cause is AER causing packet size exceeding MTU, and the host does not know it. This problem can be solved by the following two methods. First, the MTU of the external link is set to 1280 at the source AER as this is the minimum value of MTU under IPv6. Then the MTU of the source host end will be set to the minimum value of MTU subtracting the maximum value of SAVA-X option. This method can solve the problem, but it greatly limits the packet size and wastes the available MTU. The second is to monitor the ICMP message of "packet too big" sent to the host in the domain at the source AER. If such a message is monitored, the expected MTU value in the message minus the maximum value of SAVA-X option will be forwarded. This method makes good use of MTU value to a certain extent, but it causes a large monitoring cost.</t>
    </section>
    <section anchor="security-consideration" numbered="true" toc="default">
      <name>Security Consideration</name>
      <t>This present memo doesnot find any security problem.</t>
    </section>
    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>SAVA-X is designed for IPv6 enabled networks. It takes a destination option, SAVA-X option, header to carry the Tag. We recommend to use  <tt>00111011</tt>, i.e. <tt>59</tt>, for SAVA-X option. Here we give our SAVA-X option format in use.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Option Type  | Opt Data Len  |Tag Len|AI Type|   Reserved    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                              TAG                              ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                     Additional Information                    ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <dl newline="false" spacing="normal">
        <dt>Option Type:</dt>
        <dd>
  8-bit field. The destination option type of SAVA-X = 59.</dd>
        <dt>Opt Data Len:</dt>
        <dd>
  8-bit field. The bytes length of SAVA-X option. Its value is <tt>2 + LenOfAI + (TagLen + 1)</tt>, where LenOfAI is 2 when AI Type is 1, or 4 when AI Type is 2, or 0 default.</dd>
        <dt>Tag Len:</dt>
        <dd>
  4-bit field. The bytes length of TAG equals to <tt>(Tag Len + 1) * 8</tt>, e.g. if Tag Len = 7, it means SAVA-X uses 64 bits long TAG. It guarantees the length of TAG would be an integral multiple of 8 bits. The maximum length of TAG is 128 bits and the minimum length of TAG is 32 bits.</dd>
        <dt>AI Type:</dt>
        <dd>
  4-bit field. The type of Additional Information. 0 for no Additional Information, 1 for 16-bit long Additional Information and 2 for 32-bit long Additional Information. Others are not assigned.</dd>
        <dt>Reserverd:</dt>
        <dd>
  These bits are not used now and must be zero.</dd>
        <dt>TAG:</dt>
        <dd>
  Variable-length field The actual tag, its length is determined by Tag Len field.</dd>
        <dt>Additional Information:</dt>
        <dd>
  As defined in AI Type field.</dd>
      </dl>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>Much of the content of this document is the expansion of the IETF <xref target="RFC5210" format="default"/> in inter-domain level. Thanks to the effort of pioneers.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.1760.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml"/>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAHcjh2IAA+U92XIbR5LvitA/1MqxMaQFcEhKoiTachgmNRJ3LIkjUtb4
ZcVCdwFoq9GN6YMkdEzsb+zv7ZdsXnU1GiRleyZiZ+mwCHTXkZV3ZmUVh8Ph
7Vu3bzVZk5t9dagbrY5zXRhVTtRR0ZhqeFjOdVaok7KtEqNGaVqZulY/6TxL
dZOVhRpVySxrTNK0lVG3b+nxuDLn++pk9NNo+NchDokzpGVS6DnMkVZ60gwv
22Gtz/XlEAbRw+1daKAbeLu7vbs73H4w3N3GTl+putFF+k7nZQEvl6bGp9mi
2ldN1dbN7vb2Y+yrK6P31auFqQikWkEn9UIXemrmpmgARANAXEz31UvTXJTV
e/UW/smKqXpWle3i9q33F/u83MI0w0OE8PatRDf7KismJc6ZlCk031dtPdR1
kmW3by2yfQU/X6lEF/DYKF1Veqk2sonSeY6wbqqyUjNdz9TMVAZXo4aqKRP5
VJdVU5lJbb8u5/xNYRtZrHKt9mmu1Ex0mzc1NHENuJ/Djm6bWVnt4yv8GdoP
SjH+/2zUX1v/sKxgVQflfNHC6tVJkpkiMQN1WsNyZ61Wb4rs3FR11ix9H0vi
KxvVALYBDP6F2yxbQBM/G6jnOksz+H6YwZMsaXyvBMbYVz+Y7BfoFjwuUwB9
Z3t7+9H98GlbNBW0P5hlhfbPDXBsvq8u2/fm+0Zg3DJpu5UUa9HyHwDPAjni
7f8P5Pwi6/0+Iaa/Dj1/zXSZQxfAjw7n/hfG0AUs9NIue3tv9973k/ISX20l
5Xwton6GxhOTqWdt2cHSUVGDmgU8qQnoBauIBGWssg6WY8DDQq9Bofo/h8Np
Wy4RITuPv8cH9daKON6+VZTVHNT2uSGd9fpPBzsP97bt592dncf284PdHff8
Eaj+fezNZmI4HKqibMy7o6cnz969hE/0nF+Oc23/xwfYVo9h1RpX/YNJNGrv
ZmacBUACXegqrRWQ4r0BdauTpKzQAqDipabHoIuBngXbQM1mcSAd7ADUYbnI
ErAIS9Xo90DnRQ7kVRcZaOm2AftSL8B04hhgcXHkmg2tjEhsMQdjm2RlC9+a
BiaowaqcGzU2plC5botkZlIwQThbvSjLCXyLRzH1ljqFsTOy6Clb9M5E596i
69CiZwiDMhNYUoOrN8VMA8PGCBsv7fwNmHEAGAYAJwKaT02BVtkApxQ18Bqa
40ZPAaC3MwAfRGneFoCgBnuPQShwUSAaME+qZmWNyG9Umk0mYEPRlB/W5Jsc
n++pgmVoQAMCSsHsjmlBgAChkyUgfM1S6J9NlvQcrSR+RWa3mKcxY6xsIcOc
zgAHczMvgawJEAEwhM3Rc0FqsrOET9jlgaYJoCir51vMbPMsTXNmSMRYVaYt
UZzHNjf1szZ4+E0/vgIO1OM8q2eoP9glQucjIwLpeQkotQPx8LXaGB1uDhR+
bui7huWYYVMO4VeHejLAIbC1pSK2jwk5IA5NzSIvlzVhAR5a7EPfP6gxSA7Y
BnC00ERsjJ6+3mRuhE8dph8dIuJpLTxIRDP+4ukFrSMqg5rNpiSRAPakKue4
NBoTIATuJIcPUKxBU4BHBm9W4AhlGjqCRs0mman7BBNY3ooMSvkMObyqQGgK
fCvjyTJSA0ufI04vZobmzhoSLAs5qgP4BjI2XRFe4sEj5rlFVSYy/IqmGahs
rQbprs2+IzAzq+eAVAhGFegNxBctJOKtAUjmhQHsuEXCGIBVkT0wb1kh2AC9
Rw8HV6DZoQcRDdLeswgYX5BD7JbJ0GlWJ6Sog1UwUTtTOI0esIsbBe2xVRQX
oHP6ZtcB0lqwYqnpwYtXFxDutBR6oKTBFHXTppaRKpObcw3vUPUDfyUStFjk
rOiVX6O2vZKwSpUE+WKWJTNWlcBL2DhSpTXLzdiQCPVyo/q5bNHs5/DGGPXx
o1jjz58Jj/MSJkeKorkHO4tGDmfYUkew4CZbtDnpEaJxqG5Ii1tFQ8sBQrcL
DAv5lfC+CDFwE6seIWadTYHauPIjoCK0nZduFL1Y5IJlitYgGsyzD8bCUKQo
QB+0tcJdKogIiHYHcZ7oJMszAl7oCR9TZf7WZgsiegqykZcLeDZeBrZrrosW
+iKUFcslYBiI9EEYAIZOynLB9hK+oNcxX6B+/xI2+KWEhvlyy5qX92apgLbA
+3devDk5vTPg3+rlK/r8+ulf3hy9fnqIn0+ej3780X2wLU6ev3rz46H/5Hse
vHrx4unLQ+78YvTzHSbJnVfHp0evXo5+vMO4C+UBtQssbSzLWVQGUadrFNik
ysbwBfoATyl0/Qbqh4NjtXOf2QyfAJvhFFmRIkUR+YD1isP8HNFOikIx4lDI
DsrRscrgG7VhTG+xMT4lrVPm5XRJg47Iqc60Nc6foifqkzokGBf8Dd4Po5+7
+8O+H2wIGuhTxxQPiKbg+zTIc13rbSU11jw1MLqYXxSDklMNJMBeY5PiBT+w
sP4qDBA2AeEwk+xyC+E6HQFcpzTzyM3sfCFRCqyU21qkdsXLoQUenHxCPXtQ
ooOTqxNTgXngsWr6zKOAp09uR+xpkPkTo3xwIioe45IxhkuYg6EQAR2vEiV/
i7APH2jOyMEIEEeedqrEoIAmQkEn70GTTYAPJ6cjGevwCEl02nEzqKFv8e61
SaQVmA6YlklXtHOI27rtXx+tNqeFor44R34NF+ahqggqGuKYhuhOyPRb6UGz
nrz4pE4Ity+sWnX4sE4fqyX0PTICGlEeeurknhN36CnP7bxl65BZbQq9O4qI
ECKG+BOLWQSPemH5RtwaZqdBhyO8+QLAgfXSEMKBswscHWGez3oiLNschN4V
uVTRz91h7+P4Jby2owBC3xX4C3+AJ6dAavw6Gv5QXrrHGqSSUGK7bBR3dzaR
JnYU/hWphu/kaedx56Xyo/w+K1r/8ykwwDdofX2T86ub3L0ZaMCFevquuG7C
YLSP++qrkxeK8tpP7pz089bWnc/ILPR2//atfXUGlD4jpjoTAp6B3IG81RTt
oI/fVmTKmVuxZWEu7VcbBr5QqIAxrAd7JIZYT3kGWsgZcrXl5tQ6GOC0TK0M
8YCWrWw8w/CBJDjwaPBRPoXQp5nNFXAkTcO8CZOMwLj5d+SEBQIl47PwnLgl
eU3AMkXdOHsR4kA61OKcLMDTs7HGpMzz8gLh9qPabujLSSfQ2NCLHXbtFjEG
0MXKsVN8UYJGqZp6nwK6TMJML3KTtuAUypk83Ng8GwQkfGIbbxACN78RswST
pHY4P4ZdPQyyqhYdAZ+4FzLolhpFK9ggGmza8RP0ix1hhRUJsVH0I44n2L6W
/XjXhVCL8TbBLpEDuNvp6rAdd2eA6L4w4CnA76xBNwJogRaOyIKekrmEr8yo
oOBAwxEXdZklm3YxjyYUZ5au9rntTbJTNPVvY+9nTiVdO26i8wQDDBeSBzxH
U0S8a91APaUP9En52TxByZHGsBidV+DGC72sV3hjXy1q06blEFYFTrr1Cjxf
I7ZpOwjUD6Yh7AsGA6Y/5v6vuf9L7h8AYZMAfdOEgZPtgfYRBBMwrHPnpFTI
XIAfomxLiUmisIjkHQjq0jvWa/C+ZG1zLXa8SOV1uPoN5wJhJAg5dT/ANTju
mPmOVaG2yR/3upmBYzedgZ8xD5TElnoJehfABOeRYlFUT+rPRycnauO9MQtM
sNQkBhh6jzfXgrEGb5z0vNQ0AiaiJG9nMPNBTjXElEucRdCyxn3ZUn8qOUvi
+cAGx4A7BHigli6iBs8OPeWyo0TpMWGD18DJeOvo/PFrcLcBd+e6yvQ4Bz3y
9R/5TQtgq0vQVTu79+4/2Hv46PFgCd/u7e3ev7e3vb09+ADfHuzu7D56tLf7
eJDAt4d7D+7f2935JhgAgdzY/OhsL+pmiAdyzA5q6LL3+NHDvcfbe4/f/PiN
a8SvG//gklpCq68v7xI4/tVS/ecTtbH89tude6Cb5dt33+089N++/fbBpu/Q
wFj66w93k28UwrzRfPfdvd3g/Ycnia6bDYR+MwABYs22KtTl3eXdD/L0M7sK
77O6fvzYugu44MeP96089jIMsQz7D0cS4wb8w1bv7OSM8g0Q7JrLBYVnxOEb
Z5don5b4zwf8Jznb7DOCMOYZI/8MrMsE06dGo1RaLVdKFMnMB/GNqaal5IK9
dexXrQMOyLJ6IMzWVgEHRRCyR5SccWoQ7Agy99SkAJQk6zTIZpPNTShmQH5B
Ga5X3cXh8N8PZ5uRzLML05MRUjXIWoE5pHOJSmPdg+g5ebeNtnjDM3jA3QFr
W74GPAO5MAnTN6IQS1fjDBBYZZi4Mzk4chwyxWLM0I0NyKgTxfMyS2nMd0w3
9THi/9ScIzNtBKwKehY0zMa/bSzD95vA+SDWSzXH0BwzqwDWB1OVTrSRy/tH
hH6HZfE///XfDSW6YA2FYQuOChkERryB0Jce41bUhBSR9LnA3ElTbm1thVMm
4ZTq373oE7gnM1JiAGqO9hj4q/At3DAicmQdiEs6UncUkYTx72QNhWSsa/B8
UoMpPzUtoSkGxTdV7jYShjWSikqWSc7eFeaimqXPPJB4SaJ74HbsQJ3nWQMQ
s4+a2gnQq9ETAwMgd5WVbLmNcb+uMYsFW8TA8YLp0ox9Tj3GfOLSWoQAWNro
Y/qbAl2dcxEY9BeeozNxQM5E4CXcvmVNjqAIRg3cDsCeSaNcK6pxr7rQxUY5
wOTuyR//bJYYnlD6DfdlP38mAaJ4gV7WS1jdnITJbxYWSbXkLBnu4lEKtvBJ
BG3fMIY6rYOtpqIjnmdvzwY2xCg4IUVeAa3O4+zsubjuENmQd4Ze/Vt6Uo4b
cr3EB3JeBgRmz99tb7yluOH5ux3+BMxPX1/y1wtaInwv8LsPDCUAoskg4lPl
IuAJBkYgKEhJ1gM3G4gTPGc8WH4Xv+fs48lnihNTM6Gcjba7B7jPD7NQ0kv8
L0/fQK2zzn+Ck228HBabOCH7I+LY9KlAq1Htsn1IlxVho5fSKFjGAKjhAwR0
ZPoCM1wSoA4R5xeVFeeMWzJ1hy5jTrYLG5BY3FzGMfaBJ2Fsbc5pB71mbTKw
L2LMuc0sb4wgYDL5pGMtOXCVTDR+QkqHgSNaSr9RylzrQ0eijBMk7+fhdlZb
1wQfUw9BMfNFKdaIPPUM3C+jKRVoh5yIxMOU56agihJ8LV4HjOd2AzrSBmRI
67VsII4ob4N6ubV5N7uHDI13ztTfGeQwc51bhggdelxDr+QzLD5sXzO7QgFY
kiTxMCsNXKqacRjnPZmeODj1WzoAe7ZvOwBC7zDAXJ9gAMeoRuTnPKt4MB0h
cHxfh6qCuGKBtSlZQu4U2YwVHdcTvVF3kMEWkA9fT56PhrsP9lwAUnfHAFbm
XWij6yXtPcnajB2KvAJqgntYGbxs4nbrlkDRMvCkaBjc8kIr7fQi8kYtfA9x
sybXFpBvsnNEbOyk9hDYQVC7DfXnG64TuZe4GwdzssdLwjaxy8UXPQPDK8Ad
bjFOWnhP2xEXWY0aAEw6Fi9xtdHznhAeUatmGYapYuIptYN2FDUPqrLIEejY
f3THIKIFM1+iX0I4o0ofWBiM8QffG90P6cj0cTLWg6QCHYe0JNUlu+JZrVPc
e8aMeewXRLxFym5MJJTCHsxwDPqEAp3LOmYLDBFCka8Dq41CTsPkEKG59IEL
9tesRffoqL7o4yr4anSltOS7mlgpAYA5undAwKyxYUBqct6c9JGXWAcSuXbB
OE1KXkgNTt9VaMVRxZMHrwwwm0r1Gued3tCWBkRCNNtqMIScW2Bwlg46JTNO
3a1T4dYcR6kKVto2uxKHNhB8DqJMsK/sIYuz441X3Y4ZiU0nqYcShTu851bY
est9HOxMRMxvygwDyrKkrpIL/KYa0VsHfgEmuF0RUFzxIT6VmyjFuBjR750T
61tE+OigaPcMwuomy7uJT7s0tdC46crYgl4V15pRRaHF1q7FFoBL0UYYtHt/
zxvRl2c22xu8Zqxgg9PRM2pSUVoBRAUbpOTRsOkN28InaeuyfFgsh94P5kLI
Nw8L5iyaJdy1CMQ915NsnuW6ypeDVXwDbWNSrhQCxlYjFj5QYbruMcniowlM
pMNj9umrbYLHCQUhNdpNar8sEuDzIqjxWJEvMoacSpy2GgjdmCs7827AifNv
aqs1pGYsVa4AiuzGU1QfMVJmnGVEU38uu9vZ3Nhw6enlIhNzeUqujlcMxr+i
HqDSjCjneH8q0B2pkXnQ+TqiXWtzsdpMn4OlQy3Dw622sVWWzE1oxkyFu9gB
6aG/yWMdLrU7knA/5pKdY1/QA9YGWOj2LaktcMIq1R2i3XCfBEwflX1wNSGw
DO6LTwss52GjygVyjS9UKBfs8EvpkyzBl5vA3B8/ZrrQnz9T4pfzmvXaOX1h
m9tmqYUs4OuTJzQD9xxT/1jhswgRgGudg8NSpnG9C5VbYEFWmZS5CouqgsLd
FTiQWT00UuLG4Q5juDJTeJKLR0tbP3bjCCIFKuFE5wRTP1kTYt2idAWN7Kq4
TExceUE1Wc7ezmD5eeRagyisL/z8pU2ngT+HLwkrfWWLmHQrpm5LolOEh+xd
lIMQEZZrBUfGlxBS66UVH4QMMZMVraHhCSoOFDOwhFhhB4qMS76wkmiWLXzV
8sysUU9zw1s5hzQmM6KH7g91tMij4+46b674SM9jGjhQxO142K0tsktlfUdG
VjRutJaLkosGvStsm44O3/1EO8PICVhur1zhZohxcXeE+VnWpMzn6WtXW7oK
IaeEm67bEJbwrFuWTI+mFjzMmlVxT/l+P2c5TPdxndS4YiJwTVVsdi2nrRs7
4miKRFaXF4x+1dqESTwbddnHFQZj6PCFE1+xrM7oTpvwDFdOYOnsdEfgB6y2
5wqCAnfL+DBFJgXUIWe6ysOe/pgt8UkXX0HdS6FAHH3VdYA15uc1aOM6ypsR
7Bpq3YRQAdqchOJwYSbKIo0w1o/cdSCIAKzH7LWs8spqkl7tLNXckuHuWIqu
i2cR6orXr8GrHUdacw2qh3Fdlb49U2CkNFp7Ze5NB+YyK4lq0fdJZiZ5H6z2
OrRg/NfnL+3bkn4yorqqMr8RFSg6fyDDiQF2IBet48cfIgPMy3PvhaMgrboO
IfDXUgpLF/B00IHQJHEVtBD2sIuAAQC/XbpSe++6UOFzEJYDyTKbpXXno4Ji
7+jQA+GgMIgvtA3hTAR5iTHZBnlQE2B8PJY74YBmVCwReQVv8GFDecXbbl5x
kSOHmZlQl4WJ22a5MKwfcDbaDhxCzMd1KYgbPCRJE7kjKzJbURZD8bDEr7Pi
hQzGxSiY5fNwwgBHz46j1kAQqine4omfhvOGE9tzLwymtObyX2m8Dsy1IAr9
1x5bimo8HWpJQK4VUmBCmw4TwmO07Wp7aAzLkaCMfgngBhd68b4ZJnldg7+7
/PxZYfbM5aHseK0bbYL1Iyums4fhw7xCoBgJGncMj2MHJsMkywFn3vPfYq2G
K6NOvaeLVpRZwGuzCkLTqgW3Xhjt1C+INBFnGGkal+QImVHMEoMAWmXZB4FU
GTPHZ4EBF6LfbNqnK7O+fHX6WyY9FuXRO6NnZfKE0VgJXZxF8cXToWG/kM0B
OTDmzXZZTLJpWwX7/ylYCNwh1k1J1VS8pQgN3JoTqYGn0yPh+TgWXoQWBsOq
a3v8ysuRhMaxJlUfv4qYGWRqjWvhUgRr6MLZqj7M+wMkkr7nYjfiNa/dGPn7
/lglev1yKmRMuhsTUX1vReIpi0zqlFSRZHZkrxyDLTrIQcztMi0EgzuJW5lw
72ANUziOCNn+pp5VEF7dJAL1xwldQLM27gLbJqaFs25dkFZjvy+a4VfBvTqM
BMMRuC6tFTjeqfc31jmS5EVExOvxf64jYkeRsL9kAbOKt//w4z8ci85UX8tb
67D9D2M2cfC6iAoJiD6QlUXnlnEe81fQyatfkufaS61XEWuGRfHvTaoEEkFH
tA5rr/muUb0rmteGmaLKnQY2REA6j76a8IrDBt6kDKd05cfkKrGTzhqWEq5k
T7hUQQo9sbbmPawQm9yZa94Q5NhCFopGwna641Ka0cFXe2WBa+fCg07OPNhh
GolXffsWIkFIghmdkOdk1UEGE1vEKAFfOjp3veKsBIfy+LT+09M/RUlNyu+E
vYKXq7sLMUwBL4FzRgdU2dJgfjM3xbSxx+bQ58fTOvM2bzIs5AVQHgH1G9Rw
WZHkbWqdNawmVs/dmp+nlXoKT34ElgCtl6d1XxgawTUIxvHIO9bLvNQpDoRw
xWNx1pdxaAexyqBdLFAmbUpY1r5hd/dPD44H6s0h/GOaZGsz2N52kRC724It
YJto/+WAPM92zhCFXPJTGId+/Ao0yJDTCp+Zb+zZYZdmn2QVboBKehgNwiv+
fApuA++2u0ztGFBXLal8mcoFtrd3dnbg/zMXxwTo5TWDYPoa7/w9HzDmc8VE
9SB9T8vYcarYHvO2iShUDrglu5618CRdyOlb4Tie78Lod7c7ncxSd2Rm3Nr0
aAUKu8EDwFiXgcEu1s3Z4/KD62e8d7MZw1jHTWm3Fbk8SWZ0UZlNDVnLUVbd
ZMEF6kjM0qFDzOUB4VUnHb2zUt9UJwbon5W1t04u5Tc2MplzisQHpTCls7Rj
ne6IfKUv5Wndx0Md+k5CGDsC4hZ6MSvzK0bpgkfG04IwNlgSukKKPnivBbcP
vpipWD3/grQjg5Nn04IcaFhoDFePipZLCKyKcdeq0Ga1y9rQvJa4eGXb8NKt
6mpkz/XSpphFUw/o9AlWbMb4wJae/LTxP8dwPFDo8LpHi68rAQm1MCm4tbrY
+wdCDdLJdhO8q5RjrWnZ6ctUtXdfKnNRZU1jwCDrQG+Hyvg1SyTSlM4QdsTF
euEolUGGRNmqDn/1QM8eC01Q+QmisVOMhOWim74dGJ/lp9sI7G5e3yzoIE+M
tpcJoSaOsnX2NoZ4Niq3weTYuimv3jx6G6AEnQH0jc79YfBwB3LVIbdT2uTi
Vcn7vk2k2Az1efS9myNfvJ8UWp9/zqbSmjQdF/YPf+s+U0+iuX/ZV832JftO
yAY1H1r4Z+w4uX2m0IivvZbH4eKmm031TH8pIa9D5k2o1o9Eh5UQbc6NWL/3
xMos62xsbF0N5m/emLp96/6XbU6NIpDDmpgLG0Za76wqXc6NLQXEbL5EmvUR
lo7CG7rAJLhUQTJR3cq2aHJ7HBoj/aDQOdjH94OtXA0iIaQtktdyxdrauqq+
/v162Y0V1/yc2Gt6KIfZrSwGbm2x3BDPXbmyKyNlUXQbmdeSnmt4Q46rsS4o
IF/gHU4aBQIzt9S9zjN/q8rc6MLfNRUc7KVCLgNGM2mkLCnyLuj2MKx4ykq2
/lSY9QOXSaMXU7cTV1pITL+UQt6oJtpd++UvLYruu5AVUM7Clg9Ho8nBbVg8
FybKJmXuSjJOhTEAviF4OKbAazvCYyauMI+Pe9erxZvjpS9HC69/w5Iw3iOm
czQzzHrEGBlQATBfoBQk/mhrNMoZSsnnlnoBaCnplFXauiJgkGI8ZWV9mEQu
IyNixjV5A764rBQ/TyB0mSwSSz4hgcqhF2KsQJSK61ruiJIaTr5PKEY/4IYO
F2Mku1ja8mi/x7Ceung5U60eDcdZQ3caeFXPvmkW6Q4rhgSGPyRt93TjQ9cj
W2JNFcyuQJ5qkc913sqWfxgNjinkQbmboXtEozL3h7UOy9UFsVJH5cwqwKGO
0YaLovpIuYvLlr5NIA5UTAN7dDK4rmW750qPnZ5nuz3P7vlBdqDBPXVfPVB7
6iFECo+/5JkMc3f4G/+TcT71gKqsLgTEdrVit+Wn3xueH805/F/0wfXa0EVN
aS/Ivz88t2+tRwPd8/DcMy6Gs4GKG/RdcdjnR1FtA6WnWOKIqUnQBmCXTZqN
cyNGlzSqfSSbhBx7EocC3gioXTtO3F3a8AUVD1farI5nkc2D3rM9KksDTssB
R1rfYsH7RXS8E1eUc3Tib2WJUTJYiw+fsnM4IUvP6rrqPuB6C5vsDh4ORJfB
47lVWxeaavPONuoqGWYLAKJu6Hc/ETbD45xutPBs6hplx4ZZDJwUPsfkDG5k
je9F1Gm5cMPGm32SapCuXeJRRavcxIemF8ApCEA5SurMWuekFl0T0ojhtImF
NJsCecggW2cXpmsTtvn3dsU+dLQunj/LM3+CaAIWLzq968tr6RpVhGbdWE05
5RonBzc37BELfPkwfhkxtDXYnZwX5nzkmp9g22DvPo40CMuO8FIal8lZW/E1
8D5Djdc5WiS4p4R3f8YMXQ6pTWesSnASFhh7LhMirqmm8mhbFQ4byC1Xzny6
hy7giGKMIMZJDfmpN7r7tCub5EOHocmhd6HA9AK15tbNWfWbKFjpd54QcCoK
WOdd2VsFgs1hOvdo6+dLd4HpPKw7COvcokCrdrcHBPg67Xi31ykGV3asIdTS
VexPyR0bzllxqYL3BV7q8mtUDx++W7rDXUSoaFWOdcL9WlCUNhbhcyqiw+39
ACGbBVdkY2Ug7mxKTPXi9A3Wa/lLCNw9Gk4FaJeVjbbsBisKz18CnKGfDZKu
a6qvw+vRbf4XJxSeksSe5bDEXcJTKLni3F9SSjIt9ZFZ8d4Fp8HrlTAX6/N4
T6vEoNDduu37DDrf5XoXRsDRwYtjp21hgXdc2ScwbDa900mH4EXjcprbH2ah
h5SgpIt/IqJ+MCzLIsodQDlNg2utg2NmHtK+E2u4oDg6jaZTylwmnKAVQrgc
/5fOI2VCWGRpI2p7r1gc4Eu1H8mU3J3zK3G7pZ7bezR8jVKEe9rF4OvJMDaA
BQ4iFfZi9DNeHwyQmEu6GG4cXNxflbi9R1/RpOMhDuHaEIOMQHxKo1tlSvPH
qiBruuzNkWRd5udeLwQleRelFPdBzEPu2SAkE4VVl3hVPigxkoCM73IFRO3s
PtpWsd4nEsmV1pLdwZqzeTv37jCOzAc9eMvm1GadgilD/OJJWFcqaVyZZO+4
GHjTAXS7pacv40adPVK5H59ONVF1A2IpJJ47ST4FrYLVC3k2z5pVFkeKXOja
Hjd1Z9EQKkle+Dv7AONgyBrRK9fyJN/gWHqKR4WzqxQg7cNbOG5cXCbPaQ/h
4vlLKspFvDF+4voLxHBb3wCNq9nJGLFzcvSnZUnXG1hS8VgYwavEVLS7TafQ
GodykgrM2+QaLZPAj6RNSC7lilZreDrmRG4ztzdg0h9BQFEhU5fRQcWlt1rW
NMifOhi9HMXj1erjV7RTT7du8urpaCIaScnR0P6bHHR2t5IHF1Dqnh3HQdf1
lC04OnVqK01PMdH0lu/Rnc/pFDqf0w2qEECTb4FiP3vwGD5OVqsBnmOu8AL8
Rrrmpe28V3ybL3IAjPsvn9gIqzzgO3zlvx+GNTMK7w7GT59GR9TiUyfB8Hsn
Nv5+VdZCqdPRs6sb/P2fAo+twAIzcBTc/fyPhef2rYBSlG/gOFxSDKez3k18
rPkNlNQT9eDxlozlyNw/GO3MB75lR4YwJSiaslZnu+oujvRqAnxyV20A1yD7
3FU7/sIl+xqa73LAIjyFT3aopuD+yvNder5t/2CaS4pbqO9fBzVyjK9dOtuQ
zgSa+lo9AvDMFmgUcP3sqyfqIUV17L/Jskn77t0HI9RIaAQjkz5zx8zrjjOO
U1/YWMiWsVXAM50KCBiRYbeWJR4CsbPLzfxBVLH3Ky3v7fJ4tLd15FllBU+W
L/pZGTNWqDeLck2DAWgnbLCzRwPn8idq+qQCYd6lxpLDuKKxBNa1K/vHDVC0
KWGyreJs2ylVpjJapDXtEKDjR/caSb0sXrfHfDN6Rh1/ktsRh3lYQEIhJV9w
Q250XIXozpSR12g5xRfd9S+HpsNY2t79lXnmDgr21ChBdxUsJf+dQ/r7fy/Q
Z7E5LDnkbSM891cYMntifaELe3cPuVGuUBP/2Nbnzyor4j87wdlOWLTGmEP8
KfnjUJjYg7EM7sXZP7SF99bcvvW/RM/w3GZyAAA=

-->

</rfc>
