<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-05"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Alston Networks</organization>
      <address>
        <email>alston.networks@gmail.com</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
      <organization>Independent</organization>
      <address>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="04"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>

<t>Documents describing protocols that are only intended to be used within
"limited domains" often do not clearly define how the boundary of the limited
domain is implemented and enforced, or require that operators of these limited
domains perfectly filter at all of the boundary nodes of the domain to
protect the rest of the global Internet from these protocols and vice-versa.</t>
      <t>This document discusses some design principles and offers mechanisms to
allow protocols that are designed to operate in a limited domain "fail-closed"
rather than "fail-open", thereby making these protocols safer to deploy on the
Internet.</t>
      <t>These mechanism are not applicable to all protocols intended for use in a
limited domain, but if implemented on certain classes of protocols, they  can
significantly reduce the risks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides examples of
limited domains, as well as Examples of Limited Domain Solutions, including
Service Function Chaining (SFC <xref target="RFC7665"/> ), Segment Routing, "Creative uses
of IPv6 features" (including Extension headers, e.g., for in situ Operations,
Administration, and maintenance <xref target="RFC9378"/>).</t>
      <t>In order to provide context, this document will quote extensively from
<xref target="RFC8799"/>, but it is assumed that the reader will actually read <xref target="RFC8799"/>
in its entirety.</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>In addition, <xref target="RFC8799"/> Section 6, notes:</t>
      <ul empty="true">
        <li>
          <t>Today, where limited domains exist, they are essentially created by careful
configuration of boundary routers and firewalls. If a domain is characterized
by one or more address prefixes, address assignment to hosts must also be
carefully managed. This is an error-prone method, and a combination of
configuration errors and default routing can lead to unwanted traffic
escaping the domain. Our basic assumption is therefore that it should be
possible for domains to be created and managed automatically, with minimal
human configuration. We now discuss requirements for automating domain
creation and management.</t>
        </li>
      </ul>
      <t>This document discusses some of the mechanisms which protocol designers can
use to limit the scope of their protocols to a single link. If the protocol is
intended to be used in across multiple links, but should not be forwarded
beyond a single administrative domain, then the protocol designer should
consider making the protocol "fail-closed" rather than "fail-open", as
described below.</t>
      <t>This is primarily targeted towards protocols which are intended to primarily be
used within a single layer-2 broadcast domain, or for protocols which provide a
transport type service (similar to MPLS or SRv6) and are not intended to remain
within a single administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="some-types-of-limited-domain-protocols">
      <name>Some types of limited domain protocols</name>
      <t><xref target="RFC8799"/> Section 3 discusses some examples of Limited Domains, based mainly
on the network type (e.g. Home, Sensor Networks, Data Centers, etc).</t>
      <t>This section instead classifies the types of limited domain protocols based
more on their intended use, and technology.</t>
      <t>Broadly speaking, there are two types of limited domain protocols:</t>
      <ul spacing="normal">
        <li>
          <t>Layer-2 type limited domain protocols: These are protocols that are
intended to be used within a single LAN segment.</t>
        </li>
        <li>
          <t>Transport type service (for example MPLS and SRv6): These protocols are
intended to provide a transport service, and are intended to remain
within a single administrative domain such as a Enterprise or a Service
Provider network.</t>
        </li>
      </ul>
    </section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-closed".
Fail-closed protocols are those that require explicit interface or device-wide
configuration to enable them to be accepted or processed when received on an
interface.  A classic example of a fail-closed protocol is MPLS (<xref target="RFC3031"/>):
In order to allow MPLS to transit an interface, the operator must enable the
MPLS protocol on that interface and on the device itself.  This ensures that
outside MPLS traffic does not leak in or out of the network / domain.</t>
      <t>Fail-open protocols are those that require explicit configuration in order to
ensure that they do not leak out of a domain, for example, through the
application of filters.  An example of a fail-open protocol is SRv6 - in order
to ensure that SRv6 traffic does not leak out of a network, the operator must
explicitly filter this traffic, and, in order to ensure that SRv6 traffic does
not leak in, the operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently riskier than fail-closed protocols, as they
rely on perfect configuration of filters on all interfaces at the boundary of a
domain, and, if the filters are removed for any reason (for example, during
troubleshooting), there is a risk of inbound or outbound leaks.  In addition,
some devices or interfaces may have limitations in the size and complexity of
filters that can be applied, and so adding new filter entries to limit leaks of
a new protocol may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering.  In order for the protocol to be accepted and processed when
received on an interface, the operator must explicitly enable the protocol on
that interface and on the device itself.  In addition, there is less risk of
operational mistakes, as it does not rely on filters that may be limited in
number and complexity. Finally, fail-closed protocols do not require that
operators of networks outside of the limited domain implement filters to
protect their networks from the limited domain traffic.</t>
    </section>
    <section anchor="ip-hop-limit-limiting">
      <name>IP Hop-Limit Limiting</name>
      <t>Some limited domain protocols are intended to only be used within a single IP
subnet. In these cases, it may be possible to use the IP Hop-Limit to ensure
that the protocol does not leak out of the subnet.</t>
      <t>By specifying that the IP Hop-Limit of packets carrying the protocol be set to
a value of 1, it is possible to ensure that the protocol does not leak out of
the subnet. This is because routers will decrement the Hop-Limit of packets by
1 when forwarding them, and discard the packet when it reaches zero.</t>
      <t>The approach of setting the IP Hop-Limit to 1 ensures that the protocol does
leave the subnet. This is different from requiring the received IP Hop-Limit
has a value of 255, as used in <xref target="RFC3682"/>, which ensures that traffic cannot
be spoofed from outside the subnet.</t>
      <t>Which option to choose (if either) depends on the specific requirements of the
protocol.</t>
    </section>
    <section anchor="ipv4-multicast-addressing">
      <name>IPv4 Multicast Addressing</name>
      <t>Some protocols (e.g OSPF) use addresses from the IP Local Network Control
Block <xref target="RFC5771"/>, (224.0.0/24). In addition to providing a discovery
mechanism, this traffic is not forwarded off-link, providing a simple and
effective way to limit the scope of the protocol.</t>
      <t>In some (rare) cases, IPv4 "Link Local" addresses (<xref target="RFC3927"/> may be an
appropriate mechanism to limit the scope of the protocol, but this
such a niche case that it is not discussed further here.</t>
    </section>
    <section anchor="ipv6-link-local-addresses">
      <name>IPv6 Link Local Addresses</name>
      <t>Link-Local IPv6 Unicast Addresses (<xref target="RFC4291"/> Section 2.5.6) are used for
communication between nodes on a single link. They are not routable and are not
forwarded by routers. In cases where a limited-domain protocol is intended to
be used only within a single link, the use of IPv6 Link-Local addresses can be
an effective way to limit the scope of the protocol.</t>
    </section>
    <section anchor="making-a-layer-3-type-limited-domain-protocol-fail-closed">
      <name>Making a layer-3 type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
layer-2 protocol identifier, usually an EtherType. This mechanism is used by
MPLS.  In modern router and hosts, if such a protocol identifier is not enabled
on an interface, then the Ethernet chip-set will ignore the frame, and the node
will not see or process it. Thus, it is necessary to specifically enable the
layer-2 protocol identifier on all relevant interfaces inside the limited
domain, and the protocol will be blocked at the domain boundary where the
protocol has not been so enabled. This is a simple and effective mechanism to
ensure that the protocol does not leak out of the limited domain if and when an
operator makes a mistake in configuring filters based on identifiers appearing
deeper in the frame such as IP addresses or IP protocol or header options.</t>
      <t>This layer-2 protocol identifier technique only works for transport-type
limited domain protocols (i.e., protocols running at layer 3).  Higher layer
protocols cannot necessarily be protected in this way, and so cryptographically
enforced mechanisms may need to be used instead (e.g., as done used by ANIMA in
<xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
    </section>
    <section anchor="ethernet-protocol-identification">
      <name>Ethernet Protocol Identification</name>
      <t>Figure 1 shows the general format of Ethernet frames. The relevant protocol
identification field occurs after the destination and source MAC addresses and
any tags (such a VLAN tags). The alternatives for protocol identification are
discussed in Section 3 of <xref target="RFC9542"/>.</t>
      <figure anchor="fig1">
        <name>Ethernet Frame Format</name>
        <artwork><![CDATA[
+-----------+-----------+- - - - +----------+--------- - - -+-------+
|Destination|  Source   |Optional| Protocol |  Body of      |Trailer|
|MAC Address|MAC Address|  Tags  |Identifier|   Frame        |       |
+-----------+-----------+ - - - -+----------+--------- - - -+-------|
]]></artwork>
      </figure>
      <t>This document considers EtherType protocol identification. An EtherType is an
unsigned 16-bit field in an Ethernet frame with a value in the range of 0x0600
to 0xFFFF, and so it is a somewhat limited resource; however, there exists a
special Extended EtherType (0x88B7) that can be suffixed by an Organizationally
Unique Identifier (OUI) followed by a further 16-bits identifying the protocol
relative to that OUI as discussed in Section 3 of <xref target="RFC9542"/>. These alternatives
of a direct EtherType or use of the Extended EtherType for the case of the IANA
OUI are illustrated in Figure 2. The following subsections discuss the factors
which may influence the choice between these alternatives when use of such
layer 2 protocol identification, to make the isolation of a limited domain more
robust, is warranted.</t>
      <figure anchor="fig2">
        <name>EtherType Based Protocol Identification</name>
        <artwork><![CDATA[
  01234567 01234567
+--------+--------+
|    EtherType    |
+--------+--------+
Specific EtherType

  01234567 01234567 01234567 01234567 01234567 01234567 01234567
+--------+--------+--------+--------+--------+--------+--------+
|  0x88  |  0xB7  |  0x00  |  0x00  |  0x5E  | Protocol Number |
+--------+--------+--------+--------+--------+--------+--------+
Extended EtherType|         IANA OUI         |IANA Protocol Number
]]></artwork>
      </figure>
      <t>Because specific EtherTypes are a limited resource, an Extended EtherType
<bcp14>SHOULD</bcp14> be used unless there is a strong reason why it will not work
satisfactorily and a specific EtherType is required.</t>
      <section anchor="extended-ethertype-protocol-identification">
        <name>Extended EtherType Protocol Identification</name>
        <t>The main advantage of using an Extended EtherType with an IANA Protocol Number,
as shown in Figure 2, is that such a number can be allocated by IANA with
Expert Review based on an Internet Draft and is thus relatively easy to obtain.
The main disadvantage is that the protocol identification is 5 bytes longer
than a specific dedicated EtherType.</t>
      </section>
      <section anchor="specific-ethertype-protocol-identification">
        <name>Specific EtherType Protocol Identification</name>
        <t>The primary disadvantage of using a specific EtherType, as opposed to an
Extended EtherType, is that assignment of such an EtherType is significantly
more difficult than assignment of an Extended EtherType IANA protocol number.
As discussed in <xref target="RFC9542"/>, a specific EtherType can only be assigned by the
IEEE Registration Authority under the following policy: "Since EtherTypes are a
fairly scarce resource, the IEEE RAC has let us know that they will not assign
a new EtherType to a new IETF protocol specification until the IESG has
approved the protocol specification for publication as an RFC.  In exceptional
cases, the IEEE RA is willing to consider "early allocation" of an EtherType
for an IETF protocol that is still under development as long as the request
comes from and has been vetted by the IESG." (<xref target="RFC9542"/> Appendix B.1, citing
<xref target="IESG_EtherType"/>)</t>
        <t>During development and testing, a protocol can use a "Local Experimental
Ethertype" (0x88b5 and 0x88b6 - <xref target="IANA_EtherType"/>).  Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.
However, there is always a risk of some implementation using a Local
Experimental EtherType not getting updated causing conflicts with a later
different use of that experimental EtherType.</t>
        <t>The primary advantage of using a specific EtherType is the saving of 5 bytes
relative to the use of the Extended EtherType with a protocol number under the
IANA OUI.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Protocols are designated as "limited domain" because something unexpected might
happen if they leak outside of a domain with unified management. For example,
VLAN or VPN or overlay identifiers may be misinterpreted resulting in the
delivery of data to or the acceptance of data from unauthorized network nodes
violating intended security constraints. The use of a layer-2 protocol
identifier to provide a "fail closed" barrier at the domain border can
significantly improve security by eliminating the opportunity for such
misinterpretation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC3682">
          <front>
            <title>The Generalized TTL Security Mechanism (GTSM)</title>
            <author fullname="V. Gill" initials="V." surname="Gill"/>
            <author fullname="J. Heasley" initials="J." surname="Heasley"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <date month="February" year="2004"/>
            <abstract>
              <t>The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to protect a protocol stack from CPU-utilization based attacks has been proposed in many settings (see for example, RFC 2461). This document generalizes these techniques for use by other protocols such as BGP (RFC 1771), Multicast Source Discovery Protocol (MSDP), Bidirectional Forwarding Detection, and Label Distribution Protocol (LDP) (RFC 3036). While the Generalized TTL Security Mechanism (GTSM) is most effective in protecting directly connected protocol peers, it can also provide a lower level of protection to multi-hop sessions. GTSM is not directly applicable to protocols employing flooding mechanisms (e.g., multicast), and use of multi-hop GTSM should be considered on a case-by-case basis. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3682"/>
          <seriesInfo name="DOI" value="10.17487/RFC3682"/>
        </reference>
        <reference anchor="RFC3927">
          <front>
            <title>Dynamic Configuration of IPv4 Link-Local Addresses</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="E. Guttman" initials="E." surname="Guttman"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>To participate in wide-area IP networking, a host needs to be configured with IP addresses for its interfaces, either manually by the user or automatically from a source on the network such as a Dynamic Host Configuration Protocol (DHCP) server. Unfortunately, such address configuration information may not always be available. It is therefore beneficial for a host to be able to depend on a useful subset of IP networking functions even when no address configuration is available. This document describes how a host may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.</t>
              <t>IPv4 Link-Local addresses are not suitable for communication with devices not directly connected to the same physical (or logical) link, and are only used where stable, routable addresses are not available (such as on ad hoc or isolated networks). This document does not recommend that IPv4 Link-Local addresses and routable addresses be configured simultaneously on the same interface. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3927"/>
          <seriesInfo name="DOI" value="10.17487/RFC3927"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC5771">
          <front>
            <title>IANA Guidelines for IPv4 Multicast Address Assignments</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>This document provides guidance for the Internet Assigned Numbers Authority (IANA) in assigning IPv4 multicast addresses. It obsoletes RFC 3171 and RFC 3138 and updates RFC 2780. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="51"/>
          <seriesInfo name="RFC" value="5771"/>
          <seriesInfo name="DOI" value="10.17487/RFC5771"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May" day="01"/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 373?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much thanks to Deborah Brungard and Brian Carpenter, for their review and
comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've
had numerous discussions with many many people on this, and I'm sure that I've
forgotten some of them. Apologies if you were one of them.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01-02:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add Donald Eastlake as an author.</t>
            </li>
            <li>
              <t>Substantial re-write and expansion of material concerning specific and
Extended EtherType protocol identification.</t>
            </li>
            <li>
              <t>Add initial Security Considerations text.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>00-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deborah pointed out that "this only works for transport-type limited domain
protocols (e.g., SRv6)" could be read as SRv6 fails-closed.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51b63LbRpb+30/RS/8YKSFpSbZ80WQyI0tyohrb8lpOUlOp
VKoJNEmUQIBBA6KY2A8wb7HPsvNi+51zuhsASdnOOjM2CQLd5/qdW2M0Gqk6
q3N7ogfXZmr3qn39KltktU31ebkwWeEGykwmlb3FHQ53VKNcfh+l4fe0TAqz
wBJpZab1aHXTLEyVjbKiNpU1I3pq86HRwbFKTG1nZbU+0a5OlWsmi8y5rCze
r5dY6/Li/UulsmV1ouuqcfXRwcHzgyNFK4KSy6K2VWHrgVqV1c2sKptl56o+
xV36J/ySFTP9Hf06UDd2jXtTrOzvGp0TuUq52hTpryYvC2y7tk45kF//+ltT
1tad6KJUy+xE/1yXyVC7sqorO3X4tF7Qh1+UMk09L6sTpfUI/9ca7J3on8b6
nywGviTi+clUlS2618tqZorsd1OD7RP9XVnOcjvUr16d8a8WospP9Iof+4dI
dQzC+zudjvVp7uqy6Ox0WqSVXXWv93eSH/QbW5P4XHc3wz/RNvzTP2Z0eZyU
i/6u//n3WP+4LpIb29n2P/+usqR7ub/rWeaSsruXveVb/5HQD9t7XEOGVebm
henydt1U1s37v3xmH8ePjG/8I/fxdD7WF8bVuekxdV4WJk/7v/T3uyxSu7T4
q6i7u6aPLP7rbKaKslrgmVtLxvLu5dmzp8+fn6ismG5cf3Tw6DB8fPLsKHx8
fvTUf3x89DzccPz0afj49MmT47Dy8+eP24/h6vNHT5+Fj8ePed3Li+vvfr2o
57Zit2P6PSDQT/q6hpcuwJmGvcT7xGJaw4cYSSbyMcUTJ/ro4OgRvHx0cMgX
na0y64hVuUnrn+zkRH8zr+ulO3n4cLVajTNbT8dY5qGZlE39kL3aPcRjs4cu
kOEeWiKiJiK+VcTA6ZvT+xjATy3N+p2dZa6u1p+nfQonsF9OtimMkA34mhVC
ZWatHT07OBoVzWJiq+0L47t5vcgfbF4eHYKr0WikzQS0mgT4dF4mDS+qU+uS
KpsQqC2rEoBU5k7Xc1NrwCIUlK9hyDVZYqrrUk+sbhw+rrJ6nhVq4DFYB+DW
5RQ34yswrtZJbk2FFVI7zQqr5+UKS1sNVRSpqda4mb/7RZQsojOns8UyZ91g
aSCptmTPiU2HEKuu7G9NBuKYynJpK1OXlfOLuc3lnMYdU5vUoGOa5cBpTczl
edg9UlOUEEa46mmpgdQQCx7nq/D5Otwxy8uJySP062lVLjwFrSSJ+NsssaNb
KMKMlXo/B3upF79OASuNc9jWlQtLyoC28XhWJBkkIM+XU4RIpxc2mQMh3MIR
VWAA0tyhMllDtCXCsdCgNrqvKj2YAkNGSV5CnQOF22DTtEr4Bc8WgyExVNnJ
Wi8MB75N/jh801aAq7xck0fjFhWEwgzTE5F4ppFswyyXeZaYSW7pcdJHu2q0
OGid7I0ZUH0GhnrS1Dqb9mwF2yfwZOIvyQ0LFtqKCzM7a60TYDxJKZuCgoIs
o7Jpk1jRceZu3Fg8ZpGlaW6VekBqrkrcQ/Cs1B9/eKj9+LGjQ3o6KYvELtlI
tpxjSJTcZmRl9s4sWMHldIMvEGmcXlkIBP9etPdtJFH6uswbogYPwFzyJoV+
1LWtyNz0y6ZgUvXZHPeS5vauX55pppswHXTvD/W1nbEZvgM24p6hHpwhy6Go
QVJ3Cptevr19oqe4SPFuoPfiViANSqLkSs+tSWGhQ23Hs/GQlQb6XFY3+oot
kKlUp+kCpBAE0YUh2zZxgmUMhCbEUTz5+HEf8r8s4OypWJeXG0m3tnc16bHr
RqsM0uLkCoJlqm4tuTs8sqsqbzI1IQyMA8+m4jfi2sSELAWMbGCRa76oOyso
giegJjYFAtXrcd8Urq0I/dGQTByZnlLf6lNQvVjgqqlmQm7m3RXGa6JxMux1
7T6YBTTBdoulyIcSQgX4EABlrefZbO7X8lIAgVOQH4F6DyshCabP+/RjSQ6N
pVwCqVdZ6VrjYTG4cpSAdfIlAEBEt7Fm4ML/AJZlMwFhEA+yaEtqxHoLawrP
VodweoCdvYBiErpAnE0gVA91+LYs8ZezSVNlECh2xGrEwrCDWfSkh32W4BLS
hQpYRyZNHYkYbnKHFThKgUsvsihesjZSXdjJU8DeFlw41TngsoJW35Q1oGlN
rqV3afgI2TrlD6Ji75E+kmS2B8cU+hDFOsbPxrknzjJhBuBbjtjm+ESqqBpy
eqyJhAWX3D4vBmYKhkvE1Rszgz8YVjIWmSOVh5CrqqyGWMm6pU1EPlkvyMbA
hkIF6EcwjBjtxC5WmSNwRuaY0y4iwRgfPSmkIvG/xHjT1D61j9EYF2zqeA3k
t+RPYJqsrrZL5x06BtWwgbcxylwJ7gKPuLRokjm+OwcubizzhMUkXi9QyJG1
2zuKJxmBOVBims0AWBwE4TPAcBjTDDQUul81dixEgMsDMysGYFxDhKQPo1mg
JLFoUbJwJVAFJWYCa7vM5UkXEN6XqYFlrSiybqiFAgOMxMcpUjmYjpaeEDiL
uhP8Nm1ywgTPLIMqyW1TX2z5U3jOCouQ9gh12lQLmEI5Iczud0uOPKEgbskx
FyX298YJrmHId5aik7/SpqYs5dLVXhnIdClRJNqEypzShwK6TFsYCcY6Epte
IAUvU4kJhrwZGWngaItJflD4gnuZJq+ZV9ITwjkZDiu+KVaGswJv6+wWiVkG
qBMZjPVVQ5DkyBkoKCx5D8ZoKGhahkwTCOvmZYO6jXlbluCfsheymqA9yZCD
niTAMeNUHJRUkBG4kvKRP2tCBLgaFhPv7XE5RlkAo1kFcOriHztJXBLsRGPm
rYn+dm964HOJp09pOynmap7B56Kt+6yycpw7ERwTCpHtStRI4Pl+lazqpqUl
uQ5IzMnUixs2P3qiE/bUrgKDMr6kgoxhU3lNyTA/7ySGe0VQaJmwBlYGqUKq
JnZdsgX5LfuoGzNHEFD0qQj8+ZUVVOEyygfavLe9uZc663tTZ+OUr67IZy3y
9aCGjPwpo94LBVHkBZbNtCQuXEd6ogSCga6I2kdhiJ1qrCNps7bV6EhPqtKk
QOk6cg6zIdPZ3CLkV0ZBVIVblhX0SgWu8/nknoOuc8PJ2Ou3r65poet3t0/2
xWN9Tt+lsrJskpuk7dTImDLss7K4JaiD5HnRc4qcjKmOqwh9A0ikdpvTg9c/
XL+HhPlf/eaKP7+7+O8fLt9dnNPn6+9PX72KH5S/4/r7qx9enbef2ifPrl6/
vnhzLg/jqu5dUoPXp/8aCDgNrt6+v7x6c/pqQCbaT0NJDGLCJIgKkMko0DUD
PPPi7O3//s/hY8SJ/0KgODo8pEAhX54dPn2ML4gMPj3m+lu+UkRQEq3ZOZDr
EZYhQEnFAMNdUSpeWUjzq59JMr+c6G8myfLw8bf+AjHcuxhk1rvIMtu+svWw
CHHHpR3bRGn2rm9Iuk/v6b9634PcOxe/+XtObYXR4bO/f6vIhK4Jy7iPwwlE
P+OJNn9Pzr6Jifbe0otAyJDf0Zd8raTojUkQOw6nd/p7LERlVuHgL6E1OtTn
pjb6jEpWrprqZD8gg/PUUOpBYYyrWKQdvrr8LG9CmOLQLWRlVeuWXEqQXSH3
mhdlXs6ognlBKAE7Q4bDYOeLfjHnVfn5TZHVfKVfecxh7u+9U0s7wCezG72L
nYFgE0Benb6BlGY+qn2l398DWJ1kThCL+GbICkR0ujQbe0c41C0c+oWHEfD+
v2CnHWWz8FijLwQmKOumeK599a7eyv5VMCnGx5chtFDph4JOLkgUUvSIZ4ZS
IAhv4rUaLYiQSNuMg1UnTtHOvYA2Vp2F+0KCpkrn06HQhQt5t2AeCjfmJbXc
9VqBC9VP3iAtVJ7c9pnbhde0SahpQkUnx6bEcjFGwId9EgvhcW8HqUfcZayp
smbmkqjoknLb6Q7yKeSyFeyx71M3/OPH/ZNek0FaanwXFS6k+YxL17inFDux
yOFst2VG8aNxR3Y/05WLILrkniwfKkhtPgUr7PyACeqy8GMKCS1lIJ4eX62l
pZWCmoojLucrjRtD/hYQ6GEbV1ur+XJN9hWWtSJSQmFsmqxDo5fJ8YSYmGz0
6ql6jhx9JmW57/2FikXKXkcaLXaoskc9KZK8WI8iYYpNqiWMf94tsUiil9QO
hapOIen7xRzl/YLs/8OuUD69t+poa6f5bO3WXeITCswKAmlpXmbuJgsp6C7r
lwyBM4iKymeI3TfFt8tHrwx2N+4neet12vTLdRakCroWqYgZhiWITCBjees7
WqbgjprD0ns920gbanog9ywb+BIymZKqmv0QiKhcZCZpy6xgArzly2eSL5lP
tw5XvqNOfuZ0WXU5WZg1qvdbH6ekPynpHAII6mD21E5LCTVo4Im17CGWzdj6
qhU1L+2NWqGwq6BL6EfaQaFYYkppPcO3Rasminw1EwrLoPttXXoM4ZYNdyGG
wQ+DK5Okg2Wp2FUSCYndkvx7Rc0GEBNLfSRWfST+DCq2Zt0CZBcb1ZdjY6+7
Ei2C20HeKFQZ2swmp24nNZ3E5rO6RYBg+j1VkuAnbcKCIC5Tsw0TGOuXWSGl
+04H21SAQHh3NhWm3zoAe7mzLxenGS2ZvRFUVrUrhYnTPb09zhou3yIJXY44
gZU0ljxNcaZ8bxK5md5wGXJfQnb5lg5acI+YG4OUWlFnkOYSUb6xW0J9GSfW
0CMt4qiKHfm2ON+F4eyrsi9S2LXvz62lWPcr9HagQZBJbmxNKVJVrbfK+gll
jzUP1/StyRtW0eHQDwy6HGyEwU9TqjqUxvbXxHLrNvbouHef2sT3t+mRnZRP
1upQ8iLf9PBcLASEqITBRSGKH5GbM7JMk0A3+ndblTKWI/xCkohkFBuA8zpI
ZFMxh73MZJtjBW5vrd7FZ5rR8JLNmYxV3CPsEwGlu6Gac2ocFXB0fMyeHLpC
kr89eXZE8xzpXvSp88EXGA1FKFLqsiynFIKIguB9PfP5iZcplyFBTRCBoJw9
xDNJmPe1HMdwAaNiN7jXlROzVEE43gFvH+vX1MPiRsypdE9bJ2y9jkpGfXX9
9uU+u4jvs9qOn0NOr8oEGOdLSeqZIGjm6kVeJjciGjq8QaLZOzp6PD4YHzw8
erw/7mJoW+BIY5tspqRpkortv2Ev5QlDnNhmo4n0iLpxw95CjrGL50F2SskF
1Twrs76/Vag7kgKFHLH3KqDPfkAQlt7gFfYSzgcdsfhU/vnRU5TxHmdQIbBV
o6iiwXc7dv48DdJZJMaVVGi6gFUIlsUOsBdFOzCaNpWEYWm8PJCBaUtwUDi8
RNHVkVzlu34oejYRWaKjON1Z0/h4/EQGQOwE0IOikWJThBx6AnOwcHN/gqHY
7Lm+D9MEDlFwAY7Inc6danU76Q96WA9+VmE2hie7Z5fAzxAqpH212ZxkwyHJ
k5WHEXNHNq2GJc9SNCv48wYFXbyW5q3xDdFHvebEFhPTbj19VcStFjzC+pLH
eGpQ+skImYvRUNJvjVWhI9tKjI52UVleDSEHmTabznEoD6GtAWceAhEBqCSU
vGgBhVdhSMgK5TkMZ+LeiHfsGKxYMrNU7crnBOaYHDrcksyz5YiiowyZZ4WM
RZDrV2YRmkpUgYIgxffQBs7aTkUPgRBXjQshtbB0mUoJCC0gKkuiU1R/QnKh
RkFiZ29NUXdT/KyIMN8/D9TSGldkeqllQihKuW/dPQIU6x1xgi7Aa4pVkrZb
gq8g0c6Yq4OKHSPu4tJmUf0Fec9mzjjl5TnSAwDbTJzSYJDgM2KKnqHcI7cI
Cab0MqnSj5J1fi5MYSq1CH1VKI9Y37GFhYDUeit2xPc2x6/8wRAfWF3ocX5K
o9yYJI/x2CF5LtUqoRE3Ih9W96aue9nYjoedC1VT8PkXOphAG+tHCIf6+2xG
qM1XVHuzJA3RMGXGEobVkn9wZFzRANdXfUm1XtblrDLLuVivCqfVuvM0LvDs
5oxLmrz+KAAdRKBZaBjpn765fH1KFYm0q58/p9kAbRq+H8tBmQetm4YuoL70
IpUAgUqS5+HI5GhMIL3kmS1gJ7mWk6JkWnEZVrLjuNE6V5CSynprw4xsDvNJ
kobMZioNEz6HVocZrkiqgUz069OzjslQrkC1am1mUJ1HrB+pxUtX9oUCQ2Za
cAvV9aZXeoMSauO2kZmOSMXePriT40XHj5E4jhWfvPx61P7pf9by39e7fpff
wveveaUP5y23H7S+Fl5x/WopVemHVjX4/UWZcvuE/3x4XyGC2OqDrEQC8glB
77PW70lI+sNl9BZc0y/ZH/2fD+HfT7OnN3j4BHsf1B8n+gEg41BOwP5tEI1E
dn7J1jP4uDlgDgNU1zkte4/extT2a+/iwwGqKfwxxsMno0lWeyvLihgko53K
LD1UDB6mgBYzTgoO7g6eHBxQi/Dg7iX+RLf1x8A46Vx1jy1B2qy+v9J5VXtL
AVqaDnw0A48of7ZGTsBRytMSv3dw9+zZi6f7vT6Ra6Z0doKdGleuOie9GS9+
EMRrFav3rn643IetU0faPxczTRGIC0LcqmOpxSfzBj7CAzKwWP+U06Zr/Ow9
45dxmM90XE5JTxdFTlJ3OPUnM31E2iGK0GHi/NnfRsenFZNDHYY8b3g2IhR5
iDoSpxfeiTdUaX4qFlmQSGQS6q0oqQEJX7NiChMo/DlOFHHURgq5cb3FmARM
zwRhj+QaekdkSvyRxZAN0vqZK/PYNd06XksTOFWVk4ZO83DEqCo+jeKxR+uD
w6NHj4+fPI0f+k7bflDRtVvhbjv5xv3XoUCNz9y775/6cN+mf+pD4IicxX94
8dR/ODjY/HB8QR8ifr6R/ty97P95SraNNwCpvAvADhQxlq9sUBNQ8qiHkqyp
F5xd3ROYCTdf+FaQ29KYNOLMFjINGQS3iFZ++h7Si6bgHmmnhw5vK+lwofTg
V/N1PDZKWQ8lW8qBLieulXFJknbPvvVQ2rc+yKIfPNiFAPdmI+Tg7CUmpdTC
CFQ3jvO0Xax5jC/0LuEPVTz+0IGRYTxmG6p5sZvQuwe8JOE0Ha9KW6iLO+S6
tX5nbzO7ajNj056E1fyKlxwnpQ0aEkQeTnVCslzNlJOa52+RUyBXy2y2q5O2
kczgnmPQVsMKciiNxlw03ukoAxLKhIW2amRVbPv+p1UhB4rWfRpbhexQPyer
5XLJRS9VvIXaVlqrgc5RwTIUphshv3ccX84vUO8wS+h0n3DeW2S3mbAio0RF
42N1uhH7OpngcLd1k5GEprfsK4ZCxd/lxcVFePFHVHXKL/7QoAiVok9/2/i1
LPMsWdPLkBmFpk3vVlOT0Tsy1LhNbMfHOV7yXsgCqdDMYXywtpuCX6MJE9jo
vkKnHyy1rPAJPLpEbz+2sonlNnPQwCZyv+P1d7SbtNFu7Uap3H+Mk/FmEme5
hs91QrjSnbB3NEziLEf5fl6HKY6KmRyvpZ5rOHE3kHeGvIMSSAZ9R6CTYeIG
R9KigyXVJBHRRIr8LS+XcjpLHMlPQhm9kLRTJy20WLl/YpxU87e2rqPSWSzj
ge/Pieno0yW1hLM7/WJ8ONSJTFb++KP/+htKNKXOpeDuUcOncJy8dtHp0pDl
cfdXD6QbxoiU0TOQIi9LBfBAMs3JMS/EH2kkjt17765Rgaj1VUiJuocuo343
lDhszYBo8WLq+2vbkIYqx+r7fp5MoSZHhdyd2nJrN862vNF5eGE+VZfPzlZk
2TM/m2iWKcMdxUs+7Fsi4cuS2oUSgE/vq3bmEBNUwxPJHeuP+wj4hfDnTwdr
Z27pFtzroXoj97afSZE92RuA1aKICtkHtTPpfFt4d+HMO4vxxyPb0z/tK2By
BNltvoY0iLMn0gm1ZiHYgqTDHY5FNpvTDIZs28/z17H/FOaW8fw4M9AUcryo
c9yYysI43ldc0OPCj2/5Hxo25JSud9pNvn2/yFz36CTAkAYnoFDKOpXaPOMX
X0BESofoKNQK4Mrkml8kCj+ymTaFvJdJx9vjARlulKvbjDN4Xt7rJr4dQnAE
fMcPvg/iNWm22leq277qnh3jU1U6HBOeoADI5OXDXnORp/HbL6TBV8g9W4IA
RJY0WZg4p6MAXNUQP34mL+YapitCKa95KkGGtGk1/Ypdeplyp0lCx446AhOT
3NAipwnFntymfPrOIekVg7Xp3wb8fiuls68pulPAvuFe+LkFi2auX1RNMaPR
JOHViyoDnpyZaslnIIehVszo5U7OvKgxRDMO2gdUnNIrBYv+ygQ5a+qXWews
lriaQ+ErK2c72pAvw6xymSV/1Zd/ubUw75R8zVZlE1MDri/lWD51pPivpS35
KJJ0/aR1cPmXhW77tbwcqJ+VdW2L7mH6xRgBgo5Y0vkPONK6bEAaH8tsb+Fz
z3PqVeDG3fL8CqXX6IBfrP6KmkGbL4/7oCtGPua7rlExwxPorRHIc7SC/fgG
9N3SyCt7IGBBYEm38CuLFTdJI9SR/HeXRvd2cSKBfGob696DVpre4CNAA2cH
o4ND4SzYybLM5E1OnsVBwgPW3ie7wRu1NxPeH6uOh3L0cwBm5Q0OebXP+MNk
5KnOD3HG6v8A7eSRGcJCAAA=

-->

</rfc>
