<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-grayson-distributed-roaming-mobility-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Dist-Roam-Mob">Distributed Roaming and Mobility Problem Statement</title>

    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>

    <date year="2025" month="October" day="17"/>

    <area>general</area>
    <workgroup>DMM Working Group</workgroup>
    <keyword>Distributed Mobility</keyword> <keyword>Roaming</keyword> <keyword>Server Initiated</keyword>

    <abstract>


<?line 63?>

<t>This document describes the problem statement for enabling roaming
across a distributed set of heterogenous wireless access networks.</t>



    </abstract>



  </front>

  <middle>


<?line 68?>

<section anchor="intro"><name>Introduction</name>

<t>Mobility management and roaming are core capabilities of the wireless ecosystem.
Whereas the topic of mobility management has often been focused on the
functionality deployed in public macro cellular networks, that provide service over
wide geographic areas to millions of subscribers, there is increasing interest in
how to integrate wide area public macro cellular systems with small, localized, distributed private
wireless network deployments. This document describes the challenges with scaling the roaming
signaling between these different distributed networks.</t>

<section anchor="Terminology"><name>Terminology</name>

<t>To Be Completed</t>

</section>
</section>
<section anchor="roamarch"><name>Roaming Architectures</name>
<t>Roaming signaling is sent between a wireless access network
and an identity provider to enable the authentication and authorization of an identity provider
end-user onto the third-party operated wireless access network.</t>

<t>Conventionally, these approaches have relied on hierarchical schemes to support roaming signaling.
For example, the eduroam system described in <xref target="RFC7593"/> scales by having a hierarchy that includes national proxies and global proxies, as illustrated in <xref target="fig-eduroam"/>.</t>

<figure title="Hierarchical Approach for Roaming across the eduroam federation" anchor="fig-eduroam"><artwork><![CDATA[
+-----+     +----------+     +--------+     +----------+     +-----+
| SP  |<--->| National |<--->| Global |<--->| National |<--->| IdP |
|     |     | Proxy    |     | Proxy  |     | Proxy    |     |     |
+-----+     +----------+     +--------+     +----------+     +-----+
]]></artwork></figure>

<t>Existing 4G roaming solutions are based on a similar hop-by-hop approach. Intermediaries,
that may include Roaming Hubs, IPX and Roaming Value Added Services (RVAS) terminate
roaming signaling and re-establish signaling between the next hop system, as illustrated
in <xref target="fig-lteroam"/>.</t>

<figure title="Hierarchical Approach for Roaming across the public 4G Networks" anchor="fig-lteroam"><artwork><![CDATA[
+---------+    +---------+    + ----+    +---------+    +---------+
| Visited |    |         |    |     |    | Roaming |    | Home    |
| Public  |<-->| Roaming |<-->| IPX |<-->| Value   |<-->| Public  |
| Mobile  |    | Hub     |    |     |    | Added   |    | Mobile  |
| Network |    |         |    |     |    | Service |    | Network |
+---------+    +---------+    +-----+    +---------+    +---------+
]]></artwork></figure>

</section>
<section anchor="scaling"><name>Scaling Roaming Signaling</name>

<t>The GSMA (www.gsma.com) has been successful in scaling roaming between over 800 public cellular operators.
However, how  to scale roaming signaling for the switch to small, localized, distributed networks is still a significant issue.</t>

<t>One key aspect of scaling private networks is related to the dimensioning of inter-connected signaling that is a function of the geographical coverage of the private wireless access network and the number of subscribers served by a particular identity provider. Public cellular networks provide nationwide coverage to 10s of millions of subscribers. Such scale drives significant roaming signaling traffic between cellular providers that enable assumptions related to longevity of signaling connections to be embedded into technical procedures that support bidirectional signaling between all public cellular operators. In contrast, early data from the Wireless Broadband Alliance (WBA) on adoption of its OpenRoaming federation <xref target="I-D.draft-tomas-openroaming"/>, a system designed to operate with private wireless networks, indicates that dimensioning in private deployments may be as low as one thousandth of that experienced by a conventional public cellular network.</t>

<t>With some forecasting 1 million private cellular networks by the end of the decade <xref target="RCRWIRELESSNEWS"/>, a thousand times the current number of public cellular networks, we can anticipate the future scalability challenges of being able to support 1000 times more networks, each with 1/1000th of the signaling load.</t>

</section>
<section anchor="Flattening"><name>Flattening Roaming Hierarchies</name>

<t>In contrast to traditional hierarchical approaches to roaming signaling, recent developments
have seen a switch to flattened architectures. For example, the OpenRoaming federation
<xref target="I-D.draft-tomas-openroaming"/> uses Dynamic Peer Discovery for RADIUS/TLS <xref target="RFC7585"/> to enable
a flattened architecture with roaming signaling sent directly between the OpenRoaming Access Network Provider (ANP) and the OpenRoaming Identity Provider (IDP), as illustrated in <xref target="fig-orarch"/>.</t>

<figure title="OpenRoaming Federation" anchor="fig-orarch"><artwork><![CDATA[
+----------+                                +----------+
| Access   |                                | Identity |
| Network  |<-----------RadSec------------->| Provider |
| Provider |                                |          |
+----------+                                +----------+

]]></artwork></figure>

<t>5G has introduced a new Service Based Architecture (SBA) that  avoids strict signaling hierarchies. Instead, SBA allows signaling consumers to communicate with different signaling producers.
Form a roaming perspective, the 5G system has been enhanced whereby there is a direct TLS signaling exchange between Security
Edge Protection Proxies (SEPP), deployed by both home and visited networks, used to exchange the SBA-based signaling.</t>

<figure title="5G Roaming Architecture" anchor="fig-5garch"><artwork><![CDATA[
 +-----------+  +---------+       +---------+  +---------+
 | 5G Access |  | Visited |       | Home    |  | 5G Core |
 | Network   |--| SEPP    |-------| SEPP    |--| Network |
 +-----------+  +---------+       +---------+  +---------+
                      |                |
                      |<------TLS----->|  
i) visited            |                |
   initiated  ------->|--------------->|------>                          
   SBA signaling     |                |        ii) home
              <-------|<---------------|<------     initiated
                                                    SBA signaling
]]></artwork></figure>

<t>Furthermore, whereas 5G Release 15 introduced the concept of Non Public Networks (NPN)
into the 5G architecture (https://www.3gpp.org/technologies/npn), 3GPP Release 16
saw the introduction of Standalone NPN Cellular Hotspots <xref target="_3GPPTS22261"/>.</t>

<t>SNPN Cellular Hotspots refers to a connectivity hotspot based on 3GPP 5G network
technology that provides services in a similar way as provided by Wi-Fi hotspots. Charging requirements are considered out of scope for this functionality.</t>

<t>Requirements for SNPN Cellular Hotspots include the ability of a Hotspot
to interconnect with a large number of identity providers, termed SNPN Credential Providers.</t>

</section>
<section anchor="Bi-Di"><name>Bi-Directional Roaming signaling</name>

<t>Roaming signaling used to interconnect wireless access networks with identity provider networks
is used to authenticate credentials presented by devices and authorize
access onto the specific wireless network. Even if the provision of the wireless service is monetized
by some alternative value chain other than charging the end-user, roaming signaling
usually includes accounting messages.</t>

<t>While authentication, authorization and accounting messages can be described as access network
originated signaling, there are typically requirements for roaming systems to support
identity provider initiated signaling. For example, if the end-user is being charged, there
can be an identity provider initiated signaling to indicate that the user has consumed all
their available credit. In other roaming systems, identity provider initiated signaling can be used to
signal a first wireless access network that a user previously authenticated and authorized to access
via this first wireless access network has moved and is now being served by a second wireless
access network.</t>

</section>
<section anchor="enterprise"><name>Enterprise networks</name>

<t>All wireless access networks need to configure their perimeter firewall functions to enable roaming
signaling to be exchanged between the wireless access network and the identity provider.
In public cellular systems, the GSMA is responsible for operating the IR.21 roaming database,
used to exchange the IP address ranges used by each operator for connection to the IPX <xref target="GSMAIR21"/>.
IP address information for equipment such as Mobility Management Entities (MMEs), Serving Gateways (SGWs), signaling Edge Protection Proxies (SEPPs), User Plane Functions (UPFs) and AAA Servers is exchanged
allowing the recipient to use such information to configure firewall and/or border gateway functions.</t>

<t>In contrast to a centralized data based approach that can scale to 100s of public cellular operators,
there is no organization responsible for maintaining a centralized registry of signaling systems
used to support roaming onto small, localized, distributed, private networks. In contrast in private networks, firewall rules are often configured to permit outbound signaling from enterprise specific functions while prohibiting signaling originating from unknown endpoints on the Internet. While able to support access network provider
initiated roaming signaling, such a configuration will block any identity provider initiated roaming signaling, as illustrated in <xref target="fig-entfw"/>.</t>

<figure title="Private Enterprise Firewall Configuration" anchor="fig-entfw"><artwork><![CDATA[
+----------+     +------------+                   +----------+
| Wireless |     | Enterprise |                   | Identity |
| Network  |-----| Firewall   |-------------------| Provider |
+----------+     +------------+                   +----------+
i) Access              |
   Network ----------->|------------------------->
   Initiated           |
                       |                           ii) Identity
                       |x<------------------------     Provider
                       |                               Initiated

]]></artwork></figure>

</section>
<section anchor="Server"><name>The Server-Initiated Roaming Challenge</name>

<t>In order to avoid the need to operate a central database for roaming onto
small, localized, distributed, private wireless network deployments, roaming signaling
needs to accommodate the typical enterprise firewall configurations that block
server-initiated signaling.</t>

<section anchor="Transport"><name>Roaming Transport Alternatives</name>

<t>The challenge of how to support server push based signaling across firewall deployments is well understood.
Roaming signaling is exchanged using a range of different transports:</t>

<t><list style="symbols">
  <t>Wi-Fi Networks typically authenticate users using RADIUS <xref target="RFC2865"/> based signaling. More recently, Wi-Fi roaming is increasingly adopting RadSec to secure roaming signaling using secured sessions mutually authenticated using x509v3 PKI certificates <xref target="RFC6614"/>.</t>
  <t>4G Networks typically authenticate users using Diameter <xref target="RFC6733"/> based signaling. <xref target="_3GPPTS29272"/> specifies the S6a reference point. The S6a interface protocol is an IETF vendor specific Diameter application, where the Diameter application identifier assigned to the application is 16777251. The S6a interface is protected by using 3GPP defined Security Gateways (SEG) used to establish and maintain IPsec secured ESP Security Association in tunnel mode between security domains <xref target="_3GPPTS33210"/>.</t>
  <t>5G Service Based Architecture allows signaling consumers to communicate with different signaling producers. SBA defines the use of RESTful APIs transported using HTTP2 defined methods like GET, POST and PATCH. The 5G System also introduces the Security Edge Protection Proxy (SEPP). The SEPP sits at the perimeter of the 5G public cellular network. The 5G N32 interface is defined by 3GPP for use between two SEPPs to ensure the HTTP2 messages can be securely exchanged. First, N32 control signaling is exchanged to establish N32 forwarding. The N32 forwarding operates by taking the HTTP2 Request or Response messages that need to be exchanged between operators and encoding the HTTP2 header frames and data frames in JSON.</t>
</list></t>

</section>
<section anchor="Solutions"><name>Supporting server-initiated messages</name>

<t>Looking at current solutions for supporting server-initiated messages with these different transports:</t>

<t><list style="symbols">
  <t>IETF RADEXT has identified the challenge of how a home RADIUS server can send Change of Authorization (CoA) packets to a Network Access Server (NAS) which is behind a firewall or NAT gateway. <xref target="I-D.draft-ietf-radext-reverse-coa"/> defines a "reverse change of authorization (CoA)" path for RADIUS packets, allowing a home RADIUS server to send CoA packets in "reverse" down a RADIUS/TLS connection that was previously established by an access network originated signaling exchange.</t>
  <t>3GPP is discussing architectural enhancements to support SNPN Cellular Hotspots in 5G. Discussions highlight that in current N32 SBA architecture, the HPLMN initiated signaling to a callback URI may require a separate access network firewall rule configuration. Proposals include studying enhancements to N32 that permit the server initiated signaling towards an SNPN to reuse the same outbound socket as SNPN-initiated signaling towards the server so as to minimize the firewall and border gateway configuration of the SNPN.</t>
  <t>There are no standard Diameter protocol technique that allows a server-initiated message to reuse an existing SCTP or TLS connection from the Diameter server to the Diameter client in a way that avoids the client operator having to configure firewall rules for inbound traffic.</t>
</list></t>

</section>
</section>
<section anchor="Problem"><name>Problem Statement</name>

<t>The problems that can be addressed with DMM are summarized as follows:</t>

<t>PS1: Re-using outbound sockets when roaming with 5G Service Based Architecture</t>

<t>PS2: Re-using outbound sockets when roaming with 4G Diameter Based Architecture</t>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>To Be Completed</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>
<t>To Be Completed</t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2865">
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="S. Willens" initials="S." surname="Willens"/>
    <author fullname="A. Rubens" initials="A." surname="Rubens"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2865"/>
  <seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>
<reference anchor="RFC6614">
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <author fullname="S. Venaas" initials="S." surname="Venaas"/>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <date month="May" year="2012"/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6614"/>
  <seriesInfo name="DOI" value="10.17487/RFC6614"/>
</reference>
<reference anchor="RFC6733">
  <front>
    <title>Diameter Base Protocol</title>
    <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6733"/>
  <seriesInfo name="DOI" value="10.17487/RFC6733"/>
</reference>
<reference anchor="RFC7593">
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7593"/>
  <seriesInfo name="DOI" value="10.17487/RFC7593"/>
</reference>
<reference anchor="RFC7585">
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7585"/>
  <seriesInfo name="DOI" value="10.17487/RFC7585"/>
</reference>

<reference anchor="I-D.draft-tomas-openroaming">
   <front>
      <title>WBA OpenRoaming Wireless Federation</title>
      <author fullname="Bruno Tomas" initials="B." surname="Tomas">
         <organization>Wireless Broadband Alliance, Inc.</organization>
      </author>
      <author fullname="Mark Grayson" initials="M." surname="Grayson">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Necati Canpolat" initials="N." surname="Canpolat">
         <organization>Intel Corporation</organization>
      </author>
      <author fullname="Betty A. Cockrell" initials="B. A." surname="Cockrell">
         <organization>SingleDigits</organization>
      </author>
      <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
         <organization>Cisco Systems</organization>
      </author>
      <date day="16" month="September" year="2025"/>
      <abstract>
	 <t>   This document describes the Wireless Broadband Alliance&#x27;s OpenRoaming
   system.  The OpenRoaming architectures enables a seamless onboarding
   experience for devices connecting to access networks that are part of
   the federation of access networks and identity providers.  The
   primary objective of this document is to describe the protocols that
   form the foundation for this architecture, enabling providers to
   correctly configure their equipment to support interoperable
   OpenRoaming signalling exchanges.  In addition, the topic of
   OpenRoaming has been raised in different IETF working groups, and
   therefore a secondary objective is to assist those discussions by
   describing the federation organization and framework.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-06"/>
   
</reference>

<reference anchor="I-D.draft-ietf-radext-reverse-coa">
   <front>
      <title>Reverse Change-of-Authorization (CoA) in RADIUS/(D)TLS</title>
      <author fullname="Alan DeKok" initials="A." surname="DeKok">
         <organization>InkBridge</organization>
      </author>
      <author fullname="Vadim Cargatser" initials="V." surname="Cargatser">
         <organization>Cisco</organization>
      </author>
      <date day="27" month="August" year="2025"/>
      <abstract>
	 <t>   This document defines a &quot;reverse Change-of-Authorization (CoA)&quot; path
   for RADIUS packets.  A TLS connection is normally used to forward
   request packets from a client to a server and to send responses from
   the server to the client.  This specification allows a server to send
   CoA request packets to the client in &quot;reverse&quot; down that connection,
   and for the client to send responses to the server.  Without this
   capability, it is in general impossible for a server to send CoA
   packets to a Network Access Server (NAS) that is located behind a
   firewall or NAT.  This reverse CoA functionality extends the
   available transport methods for CoA packets, but it does not change
   anything else about how CoA packets are handled.

   This document updates RFC8559.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-radext-reverse-coa-08"/>
   
</reference>

<reference anchor="RCRWIRELESSNEWS" target="https://www.rcrwireless.com/20210127/5g/million-private-5g-networks-in-europe-vodafone">
  <front>
    <title>A million private 5G networks by 2030? A million just in Europe, says Vodafone</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="_3GPPTS22261" target="https://www.3gpp.org/ftp/Specs/archive/22_series/22.261/22261-jc0.zip">
  <front>
    <title>Service requirements for the 5G system</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="_3GPPTS29272" target="https://www.3gpp.org/ftp/Specs/archive/29_series/29.272/29272-j30.zip">
  <front>
    <title>Evolved Packet System (EPS); Mobility Management Entity (MME) and Serving GPRS Support Node (SGSN) related interfaces based on Diameter protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="_3GPPTS33210" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.210/33210-j20.zip">
  <front>
    <title>Network Domain Security (NDS); IP network layer security</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="GSMAIR21" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.21-v17.0-2.pdf">
  <front>
    <title>GSM Association Roaming Database, Structure and Updating</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA61ba3PbRpb9jl/RlXyRxgL1iuxYs5NdRi9rJ1JYohxN1dbW
VBNokohBNAYNiGZs72+fc28/APAhZzODKssk0Oi+fd/33GYcx1Gd1bk6F5eZ
qats0tQqFQ9aLrJiJmSRijs9yfKsXolRpSe5WohxLWu1UEUdycmkUs/21Zje
iTE4SnVSyAVmTCs5reNZJVdGF3Hazh9Xdv544eaOj46iFLOei5Ojk7P4+Cg+
fhMluDHT1epcZMVUR6aZLDJjMl3UqxIjb68er6MoysrqXNRVY+qTo6O3RyeR
rJQ8FzNVqErm0VJXH2aVbkpQeXcnnvCVNnZDt6Log1phQHoeCRH3GOA3zQ8c
N/jzWFXPqhK3RVZnoC+NIlODS3+XuS5A1EqZqMzOxf/UOjkQRld1paYGn1YL
+vC/USSbeq6r8yiKMR92Zs7F3QD0MJPoluXdnaw+dO/qaiaL7DdZY//n4iIz
iRbjlYEgDD0G5UrV5+L4SNyrpRj/owEbxAiT0NMEOzkX1yqv53LBN3SKNR6f
jr8T378b2jtNUROv3/+VvqqFzPJzsXDC+6+EFhwkegGOF7pagI5ndU7sh2jC
VyEeri9Ovn995j6+fn38nf/45vTUfXxz9rb9+D2PvY0vB1Zbar2QJtalKpyO
9B9nqp7GlUzVxzqG6qnKqDjRkqe7eHi6fbj66Wo8vr96GtMtIZxuD8Uiy3Ow
TpRV9gy5ibMbUaiatMOIyQpqd3r0n51hv0KfIBxx1VSgBfIDG8QvOpVTiNnO
LKsZcXxe16U5PzxcLpeDKqmWWaVyZQzx6hDKfHx0fPLm8Gx26GaOHQHx2Sz2
BMRZESteKH5ulzi9GY0exycnJ6+Pe3shDcwSJSr1jwaLkSEaASGIes7bMqwV
O2k8nZXlANp0OK3Lw3GpEnMoq2QO+R2enPzdqCpTBp8GWPaQF49/TY4Gv2Vl
S9LbkzcnPZKunnX+DKsZyeSDqp1eir2r0Xj/z63/uJOFnDG94qqo6c7e3d3V
PjsZ3hTZ5ehhLMZNWcJyxD20VOyNb8b3+9htTuYGmdSqmspEQWzS4AaEdZnB
ZHAbwtWwO53/oc2/DZt/O8AGD3mb8a+n/c2fnkKkvc3fWymKS2guNGaskqbi
zd1f0vZvR17RRC5XINK4AX+EyNNTT+Tp6QCEHDI58a8nnsib8d3w9uGkrzG4
KYbG6CRj9xG8+6WsJTHxAC69apK6gcsgYbwv4Yutw9tO4cwsJCt4oZam0viw
LGGGEE1RHzZlrmVqDg9vH0Bi/Hz8ZnAUnwzKdAp3EcexkBN4K5nUUfQ4z4xA
uGhYKVJlEvhfSJY0uXTRxvhowzquCjnJiXbnHSKZVNoYIUUnvIDFtdBTMSel
0IgEujHCG6aQSUL/eeMbWKIWWZrmKopu4QV1CmYQo9z16duM7n6J/tK5oigo
9qJVbGJf5YMn2Jlo+iNLyUMhOKKLthfIUYm2FjuInuYKsctuv9ZlltDgxZZV
5pLmAbfFROHPFBx0poBXo2lTMPmSX0sV5LFiyxFlA+YlmAlME4nK8yaXVeDE
Ad6WNTH+OYPhGednNLxstKQ7M6URD8o5ppCWUO0dJu8LEdpKsOK5sBkB+WZF
QoOJI2y8ij1rNNdLep9uYdKaOIIlaN4dZFoukSDruYAC5vmByHWCXf6m0oOe
/J2PjQKTvQVaZrDLHIiXtC+ZY35VzJRfj9bBDuiZVz2TzQp7d4LpSRB4ahQo
mU6xTZqzQ1NH3+h6VBUm0bmerYRoFa1z+wvppb/wghY/KnGhF2WuOO/wVjwk
31ArNl/TzkRUkttY01r/Vks8mGCIWL8JuctUIlJuWQjIybpvpykVyZENUzF/
KMOhEYn1NvwWJz0ufSFV2TZNpIo0hiJXUGTMyFYwz6o0LmWFYQiPFYeAHeSB
sRe6eKZJSffz1YGThyyxgkzwGYbzTIEzz6y1zDNMSeyDdCHiOayLldq4AFSt
M2sQXZMT+ihJCjy/UGlDw5x6BjVie/v0yaU7X76wBinONUAEu4ew/MoaHgwl
b/A+MkC7BeLMR/IZxMJZriftrQMB84PpNeRKa7/aNJvFjp4vX8CP/wtX9IrV
6BUrx6tWr9ZuvPj8VfRZjEdCfP4PfPnhs7j3ZPobN5bEnc9v05H4jEno8n9R
VHxcbbmx8zn//fdsp8OeT+fi2w73bOT8yzfvugoydHrEgShUSDb+dDVhqlLS
VOz9my9RdPURToBGfnfT6pPOm5q9JsWIkMdIKBr8KXzdXJfxZBXjv6C9A9Qc
8J4LlWaSMoCDiJVmIVdecQJN7+CHD5B4/I0Vx9/9ReaNEsM0VanPIY3Ye/hl
ON4XNbsdcpkbKm9Dmorhtin0mrnY6vdghR9rotsZwrqCRkFBcwrKuxQ0CGn9
q9j5pP0K1folMxmZw+dWWcKnz92Pnivu6zu9UFazoHI2/LDa/tAZab8SW91H
y9EwMLyHOTg3UGE1SGQHHVYe4Wt4D3P4xPKre/EVgfsa3vsaT7/yZKeROAn+
ISNxsR3G4Mg0ZCRjF179C+OgYiGeuQi8noQ9Yk5KesVeNzHd5xSJkyPTcJSY
Njn5SB/HvZp7DaYkR3x/dOTpC1mHjTq6Qtx+p5dUcR4ISl04TJBL3wwSoRgz
SB3ACRr5YroSClEKxTWMhj3BrMimYCkic2ZMo2AtPxdKfFArWBaKAs5w/XZ8
VdudyVdMLpSmGdIcQk9oPF7lXIyS9gJzUc4cyLfBiHJqn0n6pLVNACHphHiG
jNQ/9DTsCM/sR9hRNIsJxfhevsjZJqhAeET+h3ifJcz+jSRh4M1sI30NiasN
n5xOBhrBhOMjTlJ3JKwDVJ3J3Ik0xVbgHLsy2JQy/NoUD4MKBYI8qcZy0mVG
EkJclNbrd0STaySZz7RDoidM7uTCozFqgugCrrGvyDg5Usm8YDFgtYQij3LL
+dxlkqUQhCsEtvhsKOQLyo5gQzRgj6Y+EEpWOSoJlItiWukFi/HJi/lHsCad
kHSH4Kws4Ij2nn4c7nNES3XpFSirjfi5VIW38TZMIjC8AAB9+XJA9hDSK+zE
ss4lhDZB39C+tqrJipRyUc+gniFkLSLUqQ04qk5IZpDPkv7TBSWjqCOxT6zG
Kk+y/VhSOY49O9VNOhnoBnvbRPWJawqKOfAVKpE2QzjeQKk2lXyysrkG2O3s
LsX7UHXkmn0AzPLNEw1nvfC1TVNxddIa4g5CwbslVa+Uw8Mgs5JIohmmDWMF
ZCzSVaedggkTThS7fa4I2nT6+AgO1tKxoLq4XUZRxGA5Hh/SKM9i1VFcQhXA
umuYDirfbrQIAcjXP5++bUetB4yOYrNrrGSaOXn1yoFO1YBhG+Z/ACNObN34
rHJdst5EXF8YW0W13n9qiYGOyG6tNhAbxcR2+4i+Yh8CRZMRl6sC3xMxUhDq
JeG18H0rG4eHl7fvx4ePP419SfL9GV4LZVskd9BoZbLp+4ytbsm/5KteGtjd
wdAGAJ+PjHy5uDe8H+2HeNB949a7+3bs7eVof3e1o1lg67lktJHyv3B1xyLr
ckR3M64d1+eW3G66Zssdfz3IdKySuHv98LndHueb4cvXV2w//vE9bkvpLB99
RtcVyXWvmjm74cwqcygZqQvMeBlS0B+5lulCEmJvTMGA3aWQzzpLKcmpMiQw
rT7NWwum0ANXL5Ej4UUKU3pp+pERgZSjq8aXxaIp2LtbVW2xl/aN0pJKKRwM
bgGKvULDeXMqhWh/0IfP2/xRFXPJ/n1JgJZ1vxbYks4CBNlVu5z6CF8IRxjM
wiPC0VWKu5B2bcMy17bks/bGVyNS8gDVYZWJxm7mFCHITp5dWdN6TAb8yID9
akQ+GBbbarKDWPQMo6sJpDavNnTo1Y7HEbQP7HHm8ZmUsVdsiV4ZJezoC3Lz
n6NOUYIHcYySBTsW9gtfvTvdEuZfIfhrNuQtacdAZ8aQrjdbEWX7QRZfnTPz
PUIhguXH/cvf+GG36dJMZAimVxJtrug/ZCCR9GZtV94n9ZxT94Z9ObQ1dxO0
++qRuc3LnM26Xgb6sQ3DJDdz3VRkZpQlHFjDgznSeOR20G9xfNZ1QZzUaBhp
yUXRPZmWzWh8jSn27kf3+1HmcUVM1Qtze1v7L5xkExZLDZeiLGCi1ARqqXgd
GbnkCbNu2wA0jKkpzD1hgZXFhc+s3unalPiH8NXp73H8Gm8fWKmpc3YyVAVc
L8ztiBY+YtravmYUyF/1gH3jkX1y4x3MaSmpsvSj2Ak9ZfF15heCZ76Yy2rG
5XO392j7HEipESiIksaVpshRXCkMZ9lrSmC3D+vdyx3b99gWA8su1yT82I+I
XA+hcryxYUCKnNpWnRR3o5CkFgXDaW5lkE4jkPn5eExQ/Y9ZfNkpozbRc74+
fcvj1lPNzdHea69RvL0zZbeyibb75xHY6ifsYO4QRtgLiVNRsmbliVyV5d6F
5JH82WUD6E4hkcrejVpqIK5Q3IjM1/uaXGGLDoThvnOUUZ6PdwnxiLA8FzyS
0KOCDwyIZwbQEMCgiJoMnhS1oBtWzVylw02Bg800NGpMQ0B/i5xjK3SOgUah
yjCo/EmIT3PC1PptiYO1ngSzZPNtrn4mqgPry422CCaZMXiadssDmyaQbdSr
kioK0LnRsg9bcr2ttliKNuXexpM2uvdLCCeZ0EfJjKvEmKMEOzFVkdvU1l7O
llWsxtoi2roSWoVXoDTJZWQp5WoRnmQV8jwJn0LlH+liVjOeYCW8tuWD30mC
I9npu+u9EUSVVWanCVlipSUVlvCcoRiGHLrWkvatwVoTzxI9Z9I5rxcXIR4s
9LObCcMLvXR876JaRoFRbfcq2uheXZFTQOVvOjie9y8qPFt3MsM83+1BCmU3
hJURfynSWfkQamGPTGBraklYkHfQptPN2+x0OizKJZ1pr/T7GvC3ieVRMb6O
PQS9qD2yy1gmfD0iDBFFdmOhH+8i+KBBUKzUn2qItubItyMh07QiAivJeAUP
g4gYhPAQGC/TonAeRSX0/9Mnf8qC4nZnvnAWShf2sAKsnYEBAqHn5Dl2noXh
MuDu7sogxwhnYaCdSzp3tDe+eaIHrRherCRo6HvS+FEukX9cB8HuvR9dG1t4
D4dDd5SNseIg0IjrrdDpRiAoMyIS2web7D662+zpVtAlrHCI/U90ReY8s/to
NWywgcIgtVH0jcFxCzTatMajMNaSyQlYhJbxXAvo7gQxqUPmSrVC9w7QbegT
ndyp8c/2Zbu0VGpGSP0aPOuUNGjYesOYY+mLoP/BBmbfw1y7wGRb9AUGVw31
kim42GMgQQZMTUndvJoSsQniWdeLMnrb+pI21LfWv+RgCa7Ps0lW99MXH+nC
VE3xAc6OiuS01BlFNXsGxfYqQfhAuOC7BgWuuYhwBKB1/VsQN2tFYbNWlEvq
l0zAZHI0qxejyZYpd3bRi3q6/Dqs1C1Ot6Iwa+BSAM19/67j87ehPzshJlc0
X3uFaCvpXm3XBZr+ReJRVgZorEshVYqeri2V7ZbrB3rlti2O+3Ntu14Cxqje
9Uza+f7H9ao3XPzcc+mPrE9X5zTwtjMFpEu+6B05o+4IPgjxoqvYVAZTc9N6
6bjll68qLjzijvTADuqnBh3A2/ph8rOEv7l2fb+JErxeiJ+9BJUcWvQ7HdpL
p662ZfFEinFpl14sdOrbDC5x7jqs4AF7TsB1dtgLRMYybFu23JZkj4j9hj3R
sK1HDB3A8g96x6/4AFb3WBgfL7Qn2LxLs+siHJm5WAPhfAM8UN/tNSE8LRG7
4Eup5qy1TgfbT2m1WVdjbKDiBIZIaWHP2tNvzqPoT66CDzBIW4r0CkbKj42b
1fYKbJ+AjnJ/+bK+mwHSmEq5/gcds7KLeMH2jvzRStwDpJkZCmeWESK6rXNu
SbCP6RgnH/dHdt3UzQbVng0fz47ePp+K0V9vocJVzQ1bavbxDugEOrnxP3VP
HPweNoQzxXaaN6en2xgRUBw6K0yHvGw8dY228Wtp4RtqEAoOkHTq0D4IB5nD
qWXGlAv+XYNAnZ3C/EJ8DuQgIcpDCcvIGC+17bmLhSCnou5z6JsylNIdZsTx
6zdv3pycHW8jL2NMqLanBJAmW/4w2JSqaVbwcSJ35rmTsl7d7LcgdTg7RLmn
T7aQTEPSQdpX41E7Ufe4MkbWDRLxHFVW2sLq/hy1SPngdQup8ZloK/Szm5c6
E//W3gKjn5YhxtfHZJoPV+NHOnwyHN2a1jqD9r57fBydBEZChnMNZ5hnH1D8
XD0eiNHP40fm2mj4ePHOyod2ZbsUMje6RUKd1nm+bCsSVq7Z4ARNmLuhxryr
6du60GE6WGpXF9uTcn960tcWvxnoCmsJxRFiRqgVl5pXdpWmcWWpY8U68mLV
A6Ya3N+AIiYdS6CVOWHW+S5P2VM+Gg9ilrJK2XppA/17PhzaPrv84AshSxph
lnR6mTqqtoBQLbkcgXxU3Vojh8KE5QmfoNP+/HMlKU5PK7lwIJ07csHfYQb/
Pf75npBiG3ECwNANdoEeJAX+lOFGKPtJa94alVTuMEB7JJHEZX7PCmwU60ee
1+IPOzOElKu/PdrGoXdJaf+YtY+n0va8XBByIZXLPjrxcDH3AW/YA+/2LvRw
X5T86xMHlfuU1OWs7mdbe/d02hElDpWxBI7NMwJ/2sCMvd8PH33JOuidTNnx
2yO4fW/2UnzjHogkkCo3Sf0GtNbzTmve034gQv29lRMcO4kRehi2C73wq34D
X7gkTL/T8O9iGKSiS8b4AxQWrMPBVMV6abYN3QzKTT6WbZzMPjNJY2xm0npZ
Tt+4g2qznU7CtBPxh1cZ8AmGxsX/eTab5/hX+4PSQW3JfLlN3PHrFjp6N/rp
7n4XmolsF4yegIPi/cMtH/dx2CwDdaW0OXGfE73qu5+ADsi5ltoQ4u47FqZu
0hUza23/RLNtyNg6nTF3K9/t5JJz4tSAOUanURT5U34PrqFT6Gv+/RUkTCO3
pcBhts6iCCH+txxFtkBib8/4dMCcdSSnX4G7UEFLkj48BuC70IJ/HIkFN3+j
5Y6wwaM6lNYGY7nT4bQbByeUP1U9vngckdWuqXo4phbWbS2odzvJGd/iThht
zdJijymwh7LPAyzoDu9vx70sLENmnRVWIu6QIJz2xq9n4aHdve1122P7IyjT
wl8E21u4kX8JAS9CP2slbiNzWUgLYUsigvkJJzwaH58jXsU231jTFcJ7EJp8
Js4Tvpg00Xwn/7/5kHkHdm+bEAHNpywXro3oqjoqbO2THSxa/01MdDu8H27O
Qne3zrA5gf01GHmG6J/gBdU9HD0AAA==

-->

</rfc>

