<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-rtr-selective-sync-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="Selective Synchronization for RTR">Selective Synchronization for RPKI to Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-01"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="08"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 52?>
<t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The RPKI-to-Router (RTR) protocol is a simple but reliable approach, which help synchronize the validated RPKI data from a trusted cache to routers. There are already several versions of the protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/>. The supported types of data that can be transferred increase, which is shown in <xref target="tab-version"/>.</t>
      <table anchor="tab-version">
        <name>Supported data types in different versions of the RTR protocol</name>
        <thead>
          <tr>
            <th align="center">Version 0</th>
            <th align="center">Version 1</th>
            <th align="center">Version 2</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
          </tr>
          <tr>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">Router Key</td>
            <td align="center">Router Key</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">ASPA</td>
          </tr>
        </tbody>
      </table>
      <t>The RTR protocol keeps the synchronization of all types of data, and selective synchronization is not supported. However, routers may be interested in a part of data types, instead of all. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Since multiple types of data are transmitted together, the router cannot use any type of these data unless it waits for all data to complete transmission. Furthermore, there may be more types of data in the cache <xref target="RFC7909"/><xref target="I-D.van-beijnum-sidrops-pathrpki"/><xref target="I-D.ietf-grow-rpki-as-cones"/><xref target="I-D.spaghetti-sidrops-rpki-asgroup"/><xref target="I-D.spaghetti-sidrops-rpki-prefixlist"/>, which makes the above issue more significant and worse.</t>
      <t>This document describes the synchronization problem of the RTR protocol and provides some possible solutions.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-ps">
      <name>Problem Statement</name>
      <t>The RTR protocol does not distinguish data types in the cache. Different types of data share one serial number and one End of Data PDU. When the Relay Party (RP) synchronizes the cache to the router, various PDUs, such as IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA, are mixed. The router cannot select one or more really required PDUs or deny receiving a certain kind of PDU. For example, if the router supports RTR v2 but does not support or enable ASPA, the ASPA PDU messages will still be transmitted. Another example is the router in an IPv6-only network unreasonably has to receive IPv4 RPKI data. Overall, the transimitted Data PDU type cannot be flexibly selected by the router.</t>
      <t>The negative effects of the above problem are as follows:</t>
      <ul spacing="normal">
        <li>Storing unused data on the router, which is unreasonable.</li>
        <li>Unnecessary transmission and storage overhead.</li>
        <li>Inefficient end-of-transmission acknowledgment. Multiple types of data are transmitted together. The router cannot use any type of these data unless it waits for all data to complete transmission.</li>
      </ul>
      <t>The above negative effects will become worse when there are more kinds of RPKI data available <xref target="I-D.van-beijnum-sidrops-pathrpki"/><xref target="I-D.ietf-grow-rpki-as-cones"/><xref target="I-D.spaghetti-sidrops-rpki-asgroup"/>. 
The main problem of the RTR protocol is the lack of selective synchronization capability.</t>
      <t>How about using different RTR versions for controlling the synchronized data, e.g., using RTR v0 if ASPA data are unwanted? This is not a good solution. First, the data selection is restricted to RTR versions and thus is not flexible either. Second, upgrading the version of RTR for future new RPKI data is not a proper choice, which is also a problem of existing RTR design. Specifically, existing RTR protocol has low extension capability. When there are new PDUs defined for transmission, a new RTR version needs to be issued. The new version protocol is not well compatible with the older ones, which induces some challenges on version negotiation, protocol implementation, and deployment. This document will primarily focus on the solving the inflexible synchronization problem. How to define an extensible protocol needs to be further discussed.</t>
    </section>
    <section anchor="sec-solution">
      <name>Preliminary Solutions</name>
      <t>This section preliminarily proposes some independent solutions for achieving selective synchronization in the RTR protocol, while trying to keep the protocol's simplicity. A new protocol version may not necessarily be required.</t>
      <section anchor="subscribing-data-pdu">
        <name>Subscribing Data PDU</name>
        <t>Define a new type of PDU called Subscribing Data PDU. The new PDU will indicate the data types that the router is interested in. An example format of the PDU is shown in <xref target="fig-subscribe"/>. The field of PDU type is TBD. The Data Type fields indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The router can send the Subscribing Data PDU to the cache. After finishing the subscribing, the following PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, are only for the subscribed data. If the router wants to modify the subscription, a new Subscribing Data PDU can be sent for overwriting the previous subscription.</t>
        <figure anchor="fig-subscribe">
          <name>An example format of Subscribing Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |         zero        |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                  Length                   |
|                                           |
+-------------------------------------------+
|  Data    |          |         | Data      |
|  Type 1  | ...      | ...     | Type N    |
|          |          |         |           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="pdus-with-data-type-field">
        <name>PDUs with Data Type Field</name>
        <t>The existing PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, can be extended to carry the Data Type field. The values of the Data Type field can be 4 for IPv4 Prefix, for IPv6 Prefix, 9 for Router Key, and 11 for ASPA. An example format of the extended Serial Query PDU is shown in <xref target="fig-serial"/>. A router can send the extended Serial Query PDU for requesting a specific type of data.</t>
        <figure anchor="fig-serial">
          <name>An example format of extended Serial Query PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|    2     |    1     |                     |
+-------------------------------------------+
|                                           |
|                 Length=16                 |
|                                           |
+-------------------------------------------+
|                                           |
|                  Data Type                |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="end-of-specific-data-pdu">
        <name>End of Specific Data PDU</name>
        <t>End of Data PDU tells the router that all the requested data are synchronized. The End of Specific Data PDU can be defined for indicating a specific type of data has been synchronized. An example format of End of Specific Data PDU is shown in <xref target="fig-end-pdu"/>. The field of PDU type is TBD. The Data Type field indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The type of data specified in End of Specific Data PDU will become ready for use. The router does not need to wait for all the data to complete transmission before it can use the specified data.</t>
        <figure anchor="fig-end-pdu">
          <name>An example format of End of Specific Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                 Length=24                 |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
+-------------------------------------------+
|                                           |
|              Refresh Interval             |
|                                           |
+-------------------------------------------+
|                                           |
|               Retry Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|              Expire Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|                 Data Type                 |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-10" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="16" month="June" year="2022"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. RFC 6810 describes version 0, and RFC 8210 describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-10"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-prefixlist-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for RPKI Signed Lists of Prefixes</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="30" month="March" year="2023"/>
            <abstract>
              <t>This document defines a "RPKI Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (AS) may originate to all or any of its routing peers. The validation of a RPKI Prefix List confirms that the holder of the listed ASN produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by this AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-prefixlist-00"/>
        </reference>
      </references>
    </references>
    <?line 208?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9VabXMbtxH+fr8ClT8krnk3oqpxbE4cl7bsWhNLVkS5mTST
mYJ3IInqeLgAONK0Jf+W/pb+su4ugHvhm+2kdWvN2LrDy2Kx2H32wZ7iOI6s
tLkYsJHIRWrlQrDRqkhnWhXyLbdSFWyiNLu8+P6UWcUuVWWFZhdaWZWqPOLj
sRaLD86+uowylRZ8Dgtlmk9sPBXFNDYy06o0sbY6NkFCbEBCfNiP1NioXFhh
BlFVZpwe8NcgSuH/qdKrATM2i0w1nktjYLGrVQkLnD67eh5FstQDZnVl7NHh
4cPDo4hrwQcMlouWSl9PtapKmO80iK7FClozmFzA/gph4xNUM4p4ZWdKDyIW
R4zJwgzYecL+AsrDq9vPOS9Cg9JTHjY+YC8qvhQSmsWcy3zAcMsFL/48o/Yk
VXPoS6WFbTwR8h+SRKSqKizu7OlMFry17Chhf4OZrYVHs6pYwuJ18/7l39Iw
4yb9RiXOEhTb0uEMJvwK/+rm/TqQCnM/55N0iAql5xz9A86CXT5/ev9B/9A/
Pjhyj6fxSSKFndR+hR1jCW4TyWKyNv+bh4cPw6QFL+IxrFxU83puye1Ml9ey
Ixi8Zhlja8xNnKoCXdJ1m5JPZ8Ja2Ti1G+Ycbf+oUouJfJNLYwdRkiRRFMcx
42NjNU9tdDUTFH+xVbGPv68hou6y0kchM3XMCcN4njMLUxZCy4kUmYtdCByO
AaxJgEnY1UwaBkFZzUVhUVSpDMyGIeKNFUVGMsQb0AmPF9ZrloMxpipLpS2r
o9YtYLrBn7RwYa2LpeC5fKFkxoyaC1YVhUiFMVyv1oeSssJrTvPU2HIJv4p8
RWq6zc24ZdIyCPMc2gshMtNjHHYCjZmCvRXKUjNtgINO3bkAEPUQkSXMHcNc
ZlkuougOQoNWWZWS+u/uGJHGEptuP+KEwNZgHTkvc8HGFSqZSz6GF17CGJ7O
emw5k+mMzURets/THSXPJSJf+ywnWs1BJiEcdKQgQ6wdsIAN4aZ4DjbJwK4C
fILn6BmIloapCYmvtXz37g8+sm5v3TNGED3viq3bW3c63iHQuADCJLqxLJ7Z
GLTTvDAToTWMkkUKShkR9g0GMjO1LKAD1LB8HHstcYEoumF/da/skDXP/dbz
EbuJbgYx/QzubTxAJzu9WBxD6sJYY3vf3Nj7nd5dbzC2/XMTUuT3YrXxtjG2
+zYcXQzrt+jdgN1p2YFRnn50MKoN7exL1gajZXICpsVYXj/eduwe3EbOW9vx
fC1EaWjoepCCBIKT9pG6mDI7A1u6QKsdAlKGWqLn9YJvsjlfoT9IzLWC3Bc2
wFnJAVFqx8E1e5h2LDiv1ySBIATJ4C8p+A50G6s04lNVVCaYBG3V4AWoUxXo
aqrAgPPa1zrj5I0tsqWEJllAsItNeCI39ozDSQMl+FQwBZucgbIAe+Degs2r
3EqM+K5wDEkvw1LAqKkAhcE+tgNzaEXYFSyxIgn+PI3HrKrIQSEEtyWX1hDR
wp0EpIe0WiJ96uibsOeVxsXmSgtaEJTxx4FNa6pKZ0oHLj/7rPnLu3ePP5Q1
ETMe70mbdf/+vPmhYU3ivL0NSDLn18J5Mx/DiYADmMpvzshpATkRbGvp4IDy
GYHw0k2GmTCplmOxPSYgbMCP5tuii4TCy0KCCOc4kFWNRKAHLlv5bAbJ5A67
FL9WUgtc0LCXQIsqcCEXnEBGUbXMsIOz16Org577zc5f0fPlsx9en14+O8Hn
0Yvhy5f1Q+RHjF68ev3ypHlqZj59dXb27PzETYZW1mmKDs6GPx24EDl4dXF1
+up8+PLAeUHbQOTBqg5hOAX0Y26iYDkK6CdPL/71z/6xzypH/f7D21v/8qD/
zTG8LGeicKtRKnevYNRVBGlRcE2wAC6d8lJanmM6D2kCHReI0h9/Rsv8MmDf
jtOyf/ydb8ANdxqDzTqNZLPNlo3JzohbmrYsU1uz075m6a6+w58678HurcZv
H+eyECzuP3j8XYRU5ML74MgCK6AjcXykNLeb8F5zn8yRuUqa2VryqIM8YSd1
HulCgZnhqUPsAvRrCSwCwn4MQOVOT7BnBYH0CY69OHmdsB/hNF2EiBwA5gLA
fQW06OJul642+AIe1QBgD0iPlqoyKAyBHkEfTr+Vp3vtRNxrZVrnUphNe+Sq
c/kG09DVBrq6JEbqA3gSRHj2qF10ZrQ6dmaiwNZUyAWlDJYKTST0WrqN056f
w0jxhiPwQuqatAHd50NDZ7M4IhZYn0yg0zid0pTXHucTKwDpbI75ZwozKDvB
UcL/404qSdgQpEFoBCUw+7VzIeYrslpMAQf3XLwLtxPkis043QLcXoUzeE07
E/aKOGTudKO1pc9j4ehdsvImBgUnOVwjULIzN4wcr1paOfwF6i2mdD9jAhww
tTV9cSgeUJf4LCa7PFdLuJECSYco+AAJaJHMNhcgis9ef1pqxymnBegoU4lR
AlelWE3i7sz0ulDLXGRTjM2EnX0aEdjmqv95IuCs7qy7Yfulc64UUxhlSQJn
zxcopjBY0PdpO821hC/gok8e/DlZAuwGNzPHgNyXn3045HBA2L+bxELG4WOZ
S7tCQwGBRUNVeAzoaA3XpmAOfBsND3rDlTDPcViXPXjP7DGRTJOel0TzDxEq
KMxrt6AiDfjEY3dP95yas6lSWU0lAG+kNrbX3GP9hhwLR2qtZeo8q6spp/t9
VQv2IQrnL50DjuDoiwy0LKeaZ2Ez4SqCJw7icL+TylZ4bxbLlhPU6mJZAX14
pmTavupBLleuOxxVp9IANAKYGmhRipT4GkByb0cxAuEKoMBVLcz62f3Y9VpU
kxA9g5xRgGFwC+2wgITh9tJYy1USAt9BMulzCY4LY9oehltfCqQtEHjgTmjX
JdiVTKjyDAyCzl2bg64Zni6mM9irKBDlQWqjwVRZSZ7Zay2FYY0A4zvwUDNR
5mrlUKdLaimiSy3nkFYBiyfQbgJKgkMtwhnLonaGHcyXLnRoD2dETCne+Dip
Vq9ttom7dCADgWWNq64gjRE5ZI8CoXcU+LGnMsHJbx05N96vy3oK7qIuW5Hx
wJKiBDzG7dZ028FhOpOCtrjn3lps4AUdEcK2XpF5FF2VOzWTr4wr68iU/G1I
XlHbIBwg3rBcacllGtR9LGqW4a8Eo2pM9BnXCsk0OvFGJsEB/THLYlSAB2+b
1PgnDgyXWYll81bNi3IR1We61+XOtRwpRc0mXA01ICvK7pZtJnIaG6+PCJWh
iRR5YEhuAzDp6smJ6yWVsW7vxpmuoi1VWjp/LRMBCHo86LLB+4MuIXw46HDC
fn9AIHs3pL5WQdGEguc2awZi6gnycIKz4FCARtco30xzaOz4CXY7+iqLNK8I
R0eOPZ9DQE9AK//6QyU0vF1CUrfh5SmxYmgqwY194aJuE9ZxW+JxhGItNby5
EnbaoaCYUigi5woy2Ko9pbQt8NtqBF/DMxhcuB4yoqWWNpgAAnNBfL0tEU39
/v376LApcz1oHvv368ej4/D0p36UxB//k0Q39dcoKqihrhu1taaq1hQMaQh5
Xnv0W6FVe/S2Yt0u2fc+Qe970XYp23/WK4f08xLyBGSVjxy9R/Yn601OwXbY
5Kbu9pqQjfvYkSRJGBMeb1z3+YbeO2S39f77J+j9Ffkh1lQ7IMVCWXUrym0L
BKygAlYTi6Cs3iDYc0QwgpaaqvwXo98HpPta4zheyrV2Yb0Gqw5rFzyvRH2v
WhsS5B1TdHeA1Te0kNV91V27cPf71IwYuydr1Pq2974rl9AQTCTDrWi9WxYq
gtlVuGMAZuypZJ1CHUASPDH2hQDUSLj75elJK7xAtyY2+hth0pb9eQHK4dOj
lhH3jd4n+zMDaxMZX5DeAVlcVe736f07gNVpsRdVd0ath1ZfSQyXv4YKr5UY
mYVLVqe+5T7j+u/fPvwDdUSy1L6MO0jctVZAw/Y90TPTPXhCl9GxgCtnd6Wt
Zti59CYOYo2pzKrfxKg/I6HumMIbyH0K2LnXdp3JfaRGS1f4VaZF0Te+3mOh
q65zNTeaHbUuWGCC5SrpvkRjKY2ob61hKxd82ZnAv2x97Mj+n2SCxnJ7R++T
/aUi6mfU+1JMIMJn7i/ZFgjGX4beoLiFPLBV7f9nvZ+9KSWAyxenN9tDdD4j
Y/C5bT9l2JU/iDFgsbrS0q7YU7gqyUxo3ikk+l78y5cnJ/SHXMPz4faxkhc8
jANN2Zin1zhjWH/QcR/sQXv3+VNkjw4mPDfiIEzDn38Dod2FR1crAAA=

-->

</rfc>
