<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 2.6.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-vyncke-v6ops-james-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="JAMES">Just Another Measurement of Extension header Survivability (JAMES)</title>
    <seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-01"/>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="R." surname="Léas" fullname="Raphaël Léas">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <city>Liège</city>
          <country>Belgium</country>
        </postal>
        <email>raphael.leas@student.uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <street>Institut Montefiore B28</street>
          <street>Allée de la Découverte 10</street>
          <city>Liège</city>
          <code>4000</code>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2022" month="March" day="20"/>
    <area>Operations and Management</area>
    <workgroup>IPv6 Operations</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>In 2016, RFC7872 has measured the drop of packets with IPv6 extension headers. This document presents a slightly different methodology with more recent results. It is still work in progress.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/v6ops-james/draft-vyncke-v6ops-james.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vyncke-v6ops-james/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Operations Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/v6ops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/v6ops-james"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In 2016, <xref target="RFC7872"/> has measured the drop of packets with IPv6 extension headers on their transit over the global Internet. This document presents a slightly different methodology with more recent results. Since then, <xref target="I-D.draft-ietf-opsec-ipv6-eh-filtering"/> has provided some recommendations for filtering transit traffic, so there may be some changes in providers policies.</t>
      <t>It is still work in progress, but the authors wanted to present some results at IETF-113 (March 2022). The code is open source and is available at <xref target="GITHUB"/>.</t>
    </section>
    <section anchor="methodology">
      <name>Methodology</name>
      <t>In a first phase, the measurement is done between collaborating IPv6 nodes, a.k.a. vantage points, spread over the Internet and multiple Autonomous Systems (ASs). As seen in <xref target="analysed_as"/>, the source/destination/transit ASs include some "tier-1" providers per <xref target="TIER1"/>, so, they are probably representative of the global Internet core.</t>
      <t>Relying on collaborating nodes has some benefits:</t>
      <ul spacing="normal">
        <li>propagation can be measured even in the absence of any ICMP message or reply generated by the destination;</li>
        <li>traffic timing can be measured accurately to answer whether extension headers are slower than plain IP6 packets;</li>
        <li>traffic can be captured into .pcap <xref target="I-D.draft-ietf-opsawg-pcap"/> file at the source and at the destination for later analysis.</li>
      </ul>
      <t>Future phases will send probes to non-collaborating nodes with a much reduced probing speed. The destination will include <xref target="ALEXA"/> top-n websites, popular CDN, as well as random prefix from the IPv6 global routing table. A revision of this IETF draft will describe those experiments.</t>
    </section>
    <section anchor="measurements">
      <name>Measurements</name>
      <section anchor="vantage-points">
        <name>Vantage Points</name>
        <t>Several servers were used worldwide (albeit missing Africa and China as the authors were unable to find IPv6 servers in these regions). <xref target="table_vantage"/> lists all the vantage points together with their AS number and country.</t>
        <table anchor="table_vantage">
          <name>All vantage AS</name>
          <thead>
            <tr>
              <th align="left">ASN</th>
              <th align="left">AS Name</th>
              <th align="left">Country code</th>
              <th align="left">Location</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">7195</td>
              <td align="left">Edge Uno</td>
              <td align="left">AG</td>
              <td align="left">Buenos Aires</td>
            </tr>
            <tr>
              <td align="left">12414</td>
              <td align="left">NL-SOLCON SOLCON</td>
              <td align="left">NL</td>
              <td align="left">Amsterdam</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">Digital Ocean</td>
              <td align="left">CA</td>
              <td align="left">Toronto, ON</td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">Digital Ocean</td>
              <td align="left">USA</td>
              <td align="left">New York City, NY</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">DE</td>
              <td align="left">Francfort</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">IN</td>
              <td align="left">Bangalore</td>
            </tr>
            <tr>
              <td align="left">14601</td>
              <td align="left">Digital Ocean</td>
              <td align="left">SG</td>
              <td align="left">Singapore</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH</td>
              <td align="left">AU</td>
              <td align="left">Sydney</td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH</td>
              <td align="left">PL</td>
              <td align="left">Warsaw</td>
            </tr>
            <tr>
              <td align="left">44684</td>
              <td align="left">Mythic Beasts</td>
              <td align="left">UK</td>
              <td align="left">Cambridge</td>
            </tr>
            <tr>
              <td align="left">47853</td>
              <td align="left">Hostinger</td>
              <td align="left">US</td>
              <td align="left">Ashville, NC</td>
            </tr>
            <tr>
              <td align="left">60011</td>
              <td align="left">MYTHIC-BEASTS-USA</td>
              <td align="left">US</td>
              <td align="left">Fremont, CA</td>
            </tr>
            <tr>
              <td align="left">198644</td>
              <td align="left">GO6</td>
              <td align="left">SI</td>
              <td align="left">Ljubljana</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="analysed_as">
        <name>Tested Autonomous Systems</name>
        <t>During first phase (traffic among fully-meshed collaborative nodes), <xref target="table_analysed_as"/> show the ASs for which our probes have collected data.</t>
        <table anchor="table_analysed_as">
          <name>All AS (source/destination/transit)</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS Description</th>
              <th align="left">Comment</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">174</td>
              <td align="left">COGENT-174, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">1299</td>
              <td align="left">TWELVE99 Twelve99, Telia Carrier, SE</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">2914</td>
              <td align="left">NTT-COMMUNICATIONS-2914, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">3320</td>
              <td align="left">DTAG Internet service provider operations, DE</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">3356</td>
              <td align="left">LEVEL3, US</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">4637</td>
              <td align="left">ASN-TELSTRA-GLOBAL Telstra Global, HK</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">4755</td>
              <td align="left">TATACOMM-AS TATA Communications formerly VSNL is Leading ISP, IN</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">5603</td>
              <td align="left">SIOL-NET Telekom Slovenije d.d., SI</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">6453</td>
              <td align="left">Tata Communication</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">6762</td>
              <td align="left">SEABONE-NET TELECOM ITALIA SPARKLE S.p.A., IT</td>
              <td align="left">Tier-1</td>
            </tr>
            <tr>
              <td align="left">6939</td>
              <td align="left">HURRICANE, US</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">7195</td>
              <td align="left">EDGEUNO SAS, CO</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">8447</td>
              <td align="left">A1TELEKOM-AT A1 Telekom Austria AG, AT</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">9498</td>
              <td align="left">BBIL-AP BHARTI Airtel Ltd., IN</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">12414</td>
              <td align="left">NL-SOLCON SOLCON, NL</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">14061</td>
              <td align="left">DIGITALOCEAN-ASN, US</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH, FR</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">21283</td>
              <td align="left">A1SI-AS A1 Slovenija, SI</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">34779</td>
              <td align="left">T-2-AS AS set propagated by T-2 d.o.o., SI</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">44684</td>
              <td align="left">MYTHIC Mythic Beasts Ltd, GB</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">60011</td>
              <td align="left">MYTHIC-BEASTS-USA, GB</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">198644</td>
              <td align="left">GO6, SI</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The table attributes some tier qualification to some ASs based on the Wikipedia page <xref target="TIER1"/>, but there is no common way to decide who is a tier-1. Based on some CAIDA research, all the above (except GO6, which is a stub network) are transit providers.</t>
        <t>While this document lists some operators, the intent is not to build a wall of fame or a wall of shame but more to get an idea about which kind of providers drop packets with extension headers and how widespread the drop policy is enforced and where, i.e., in the access provider or in the core of the Internet.</t>
        <section anchor="drop-attribution-to-as">
          <name>Drop attribution to AS</name>
          <t>Comparing the traceroutes with and without extension headers allows the attribution of a packet drop to one AS. But, this is not an easy task as inter-AS links often use IPv6 address of only one AS (if not using link-local per <xref target="RFC7704"/>). This document uses the following algorithm to attribute the drop to one AS for packet sourced in one AS and then having a path traversing AS#foo just before AS#bar:</t>
          <ul spacing="normal">
            <li>if the packet drop happens at the first router (i.e., hop limit == 1 does not trigger an ICMP hop-limit exceeded), then the drop is assumed to this AS as it is probably an ingress filter on the first router (i.e., the hosting provider in most of the cases - except if collocated with an IXP).</li>
            <li>if the packet drop happens in AS#foo after one or more hop(s) in AS#bar, then the drop is assumed to be in AS#foo ingress filter on a router with an interface address in AS#foo</li>
            <li>if the packet drop happens in AS#bar after one or more hop(s) in AS#bar before going to AS#foo, then the drop is assumed to be in AS#foo ingress filter on a router with an interface address in AS#bar</li>
          </ul>
          <t>In several cases, the above algorithm was not possible (e.g., some intermediate routers do not generate an ICMP unreachable hop limit exceeded even in the absence of any extension headers), then the drop is not attributed. Please also note that the goal of this document is not to 'point fingers to operators' but more to evaluate the potential impact. I.e., a tier-1 provider dropping packets with extension headers has a much bigger impact on the Internet traffic than an access provider.</t>
          <t>Future revision of this document will use the work of <xref target="MLAT_PEERING"/>.</t>
        </section>
      </section>
      <section anchor="tested_eh">
        <name>Tested Extension Headers</name>
        <t>In the first phase among collaborating vantage points, packets always contained either a UDP payload or a TCP payload, the latter is sent with only the SYN flag set and with data as permitted by section 3.4 of <xref target="RFC793"/> (2nd paragraph). A usual traceroute is done with only the UDP/TCP payload without any extension header with varying hop-limit in order to learn the traversed routers and ASs. Then, several UDP/TCP probes are sent with a set of extension headers:</t>
        <ul spacing="normal">
          <li>
            <t>hop-by-hop and destination options header containing:
            </t>
            <ul spacing="normal">
              <li>one PadN option for an extension header length of 8 octets,</li>
              <li>one unknown option with the "discard" bits for an extension header length of 8 octets,</li>
              <li>multiple PadN options for an extension header length of 256 octets,</li>
              <li>one unknown option (two sets with "discard" and "skip" bits) for the destination options header length of 16, 32, 64, and 128 octets,</li>
              <li>one unknown option (two sets with "discard" and "skip" bits) for an extension header length of 256 and 512 octets.</li>
            </ul>
          </li>
          <li>routing header with routing types from 0 to 6 inclusive;</li>
          <li>atomic fragment header (i.e., M-flag = 0 and offset = 0) of varying frame length 512, 1280, and 1500 octets;</li>
          <li>non-atomic first fragment header (i.e., M-flag = 1 and offset = 0) of varying frame length 512, 1280, and 1500 octets;</li>
          <li>authentication header with dummy SPI followed by UDP/TCP header and a 38 octets payload.</li>
        </ul>
        <t>In the above, length is the length of the extension header itself except for the fragmentation header where the length is the IP packet length (i.e., including the IPv6, and TCP/UDP headers + payload).</t>
        <t>For hop-by-hop and destination options headers, when required multiple PadN options were used in order to bypass some Linux kernels that consider a PadN larger than 8 bytes is an attack, see section 5.3 of <xref target="BCP220"/>, even if multiple PadN options violates section 2.1.9.5 of <xref target="RFC4942"/>.</t>
        <t>In addition to the above extension headers, other probes were sent with next header field of IPv6 header set to:</t>
        <ul spacing="normal">
          <li>59, which is "no next header", especially whether extra octets after the no next header as section 4.7 <xref target="RFC8200"/> requires that "those octets must be ignored and passed on unchanged if the packet is forwarded";</li>
          <li>143, which is Ethernet payload (see section 10.1 of <xref target="RFC8986"/>).</li>
        </ul>
      </section>
    </section>
    <section anchor="results">
      <name>Results</name>
      <t>This section presents the current results out of phase 1 (collaborating vantage points) testing. About 4860 experiments were run, one experiment being defined by sending packets between 2 vantage points with hop-limit varying from 1 to the number of hops between the two vantage points and for all the extension headers described in <xref target="tested_eh"/>.</t>
      <section anchor="routing-header">
        <name>Routing Header</name>
        <t><xref target="table_rh_types"/> lists all routing header types and the percentage of experiments that were successful, i.e., packets with routing header reaching their destination:</t>
        <table anchor="table_rh_types">
          <name>Per Routing Header Types Transmission</name>
          <thead>
            <tr>
              <th align="left">Routing Header Type</th>
              <th align="left">%-age of packets reaching destination</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">80.9%</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">99.5%</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">99.5%</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">99.5%</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">69.0%</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">99.5%</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">99.3%</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="table_drop_rh0"/> lists the few ASs that drop packets with the routing header type 0 (the original source routing header, which is now deprecated).</t>
        <table anchor="table_drop_rh0">
          <name>AS Dropping Routing Header Type 0</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">6939</td>
              <td align="left">HURRICANE, US</td>
            </tr>
          </tbody>
        </table>
        <t>It is possibly due to a strict implementation of <xref target="RFC5095"/> but it is expected that no packet with routing header type 0 would be transmitted anymore. So, this is not surprising.</t>
        <t><xref target="table_drop_rh4"/> lists the few ASs that drop packets with the routing header type 4 (Segment Routing Header <xref target="RFC8754"/>).</t>
        <table anchor="table_drop_rh4">
          <name>AS Dropping Routing Header Type 0</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">16276</td>
              <td align="left">OVH, FR</td>
            </tr>
          </tbody>
        </table>
        <t>This drop of SRH was to be expected as SRv6 is specified to run only in a limited domain.</t>
        <t>Other routing header types (1 == deprecated NIMROD <xref target="RFC1753"/>, 2 == mobile IPv6 <xref target="RFC6275"/>, 3 == RPL <xref target="RFC6554"/>, and even 5 == CRH-16 and 6 == CRH-32<xref target="I-D.draft-bonica-6man-comp-rtg-hdr"/>) can be transmitted over the global Internet without being dropped (assuming that the 0.5% of dropped packets are within the measurement error).</t>
      </section>
      <section anchor="hop-by-hop-options-header">
        <name>Hop-by-Hop Options Header</name>
        <t>Many ASs drop packets containing either hop-by-hop options headers per <xref target="table_drop_hbh"/> below:</t>
        <table anchor="table_drop_hbh">
          <name>Hop-by-hop Transmission</name>
          <thead>
            <tr>
              <th align="left">Option Type</th>
              <th align="left">Length</th>
              <th align="left">%-age of packets reaching destination</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Skip</td>
              <td align="left">8</td>
              <td align="left">5.8%</td>
            </tr>
            <tr>
              <td align="left">Discard</td>
              <td align="left">8</td>
              <td align="left">0.0%</td>
            </tr>
            <tr>
              <td align="left">Skip one large PadN</td>
              <td align="left">256</td>
              <td align="left">1.9%</td>
            </tr>
            <tr>
              <td align="left">Skip multiple PadN</td>
              <td align="left">256</td>
              <td align="left">0.0%</td>
            </tr>
            <tr>
              <td align="left">Discard</td>
              <td align="left">256</td>
              <td align="left">0.0%</td>
            </tr>
            <tr>
              <td align="left">Skip</td>
              <td align="left">512</td>
              <td align="left">1.9%</td>
            </tr>
            <tr>
              <td align="left">Discard</td>
              <td align="left">512</td>
              <td align="left">0.0%</td>
            </tr>
          </tbody>
        </table>
        <t>It appears that hop-by-hop options headers cannot reliably traverse the global Internet; only small headers with 'skipable' options have some chances. If the unknown hop-by-hop option has the 'discard' bits, it is dropped per specification.</t>
      </section>
      <section anchor="destination-options-header">
        <name>Destination Options Header</name>
        <t>Many ASs drop packets containing destination options headers per <xref target="table_drop_do"/>:</t>
        <table anchor="table_drop_do">
          <name>Hop-by-hop Transmission</name>
          <thead>
            <tr>
              <th align="left">Length</th>
              <th align="left">Multiple PadN</th>
              <th align="left">%-age of packets reaching destination</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">8</td>
              <td align="left">No</td>
              <td align="left">99.3%</td>
            </tr>
            <tr>
              <td align="left">16</td>
              <td align="left">No</td>
              <td align="left">99.3%</td>
            </tr>
            <tr>
              <td align="left">32</td>
              <td align="left">No</td>
              <td align="left">93.3%</td>
            </tr>
            <tr>
              <td align="left">64</td>
              <td align="left">No</td>
              <td align="left">41.6%</td>
            </tr>
            <tr>
              <td align="left">128</td>
              <td align="left">No</td>
              <td align="left">4.5%</td>
            </tr>
            <tr>
              <td align="left">256</td>
              <td align="left">No</td>
              <td align="left">2.6%</td>
            </tr>
            <tr>
              <td align="left">256</td>
              <td align="left">Yes</td>
              <td align="left">2.6%</td>
            </tr>
            <tr>
              <td align="left">512</td>
              <td align="left">No</td>
              <td align="left">2.6%</td>
            </tr>
          </tbody>
        </table>
        <t>The measurement did not find any impact of the discard/skip bits in the destination headers options, probably because the routers do not look inside the extension headers into the options. The use of a single large PadN or multiple 8-octet PadN options does not influence the result.</t>
        <t>The size of the destination options header has a major impact on the drop probability. It appears that extension header larger than 16 octets already causes major drops. It may be because the 40 octets of the IPv6 header + the 16 octets of the extension header (total 56 octets) is still below some router hardware lookup mechanisms while the next measured size (extension header size of 64 octets for a total of 104 octets) is beyond the hardware limit and some AS has a policy to drop packets where the TCP/UDP ports are unknown...</t>
      </section>
      <section anchor="fragmentation-header">
        <name>Fragmentation Header</name>
        <t>The propagation of two kinds of fragmentation headers was analysed: atomic fragment (offset == 0 and M-flag == 0) and plain first fragment (offset == 0 and M-flag == 1). The <xref target="table_drop_frag"/> displays the propagation differences.</t>
        <table anchor="table_drop_frag">
          <name>IPv6 Fragments Transmission</name>
          <thead>
            <tr>
              <th align="left">M-flag</th>
              <th align="left">%-age of packets reaching destination</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0 (atomic)</td>
              <td align="left">70.2%</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">99.0%</td>
            </tr>
          </tbody>
        </table>
        <t>The size of the overall IP packets (512, 1280, and 1500 octets) does not have any impact on the propagation.</t>
      </section>
      <section anchor="no-extension-headers-drop-at-all">
        <name>No extension headers drop at all</name>
        <t><xref target="table_no_drop"/> lists some ASs that do not drop transit traffic (except for routing header type 0) and follow the recommendations of <xref target="I-D.draft-ietf-opsec-ipv6-eh-filtering"/>. This list includes tier-1 transit providers (using the "regional" tag per <xref target="TIER1"/>):</t>
        <table anchor="table_no_drop">
          <name>ASs Not Dropping Packets with Extension Headers</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS Description</th>
              <th align="left">Comment</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">4637</td>
              <td align="left">ASN-TELSTRA-GLOBAL Telstra Global, HK</td>
              <td align="left">Regional Tier</td>
            </tr>
            <tr>
              <td align="left">4755</td>
              <td align="left">TATACOMM-AS TATA Communications formerly VSNL is Leading ISP, IN</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">21283</td>
              <td align="left">A1SI-AS A1 Slovenija, SI</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">60011</td>
              <td align="left">MYTHIC-BEASTS-USA, GB</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>Some ASs also drop only large (more than 8 octets) destination options headers, see <xref target="table_large_do"/>:</t>
        <table anchor="table_large_do">
          <name>ASs Only Dropping Packets with Large Destination Options Headers</name>
          <thead>
            <tr>
              <th align="left">AS Number</th>
              <th align="left">AS Description</th>
              <th align="left">Largest Forwarded Dest.Opt.  Size</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">6453</td>
              <td align="left">Tata Communication </td>
              <td align="left"> 8</td>
            </tr>
            <tr>
              <td align="left">1299</td>
              <td align="left">TWELVE99 Twelve99, Telia Carrier, SE</td>
              <td align="left">8</td>
            </tr>
            <tr>
              <td align="left">174</td>
              <td align="left">COGENT-174, US</td>
              <td align="left">8</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="special-next-headers">
        <name>Special Next Headers</name>
        <t>Measurements also include two protocol numbers that are mainly new use of IPv6. <xref target="table_special_next_header"/> indicates the percentage of packets reaching the destination.</t>
        <table anchor="table_special_next_header">
          <name>Transmission of Special IP Protocols</name>
          <thead>
            <tr>
              <th align="left">Next Header</th>
              <th align="left">%-age of packets reaching destination</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">NoNextHeader (59)</td>
              <td align="left">99.7%</td>
            </tr>
            <tr>
              <td align="left">Ethernet (143)</td>
              <td align="left">99.2%</td>
            </tr>
          </tbody>
        </table>
        <t>The above indicates that those IP protocols can be transmitted over the global Internet without being dropped (assuming that the 0.3-0.8% of dropped packets are within the measurement error).</t>
      </section>
    </section>
    <section anchor="summary-of-the-collaborating-parties-measurements">
      <name>Summary of the collaborating parties measurements</name>
      <t>While the analysis has areas of improvement (geographical distribution and impact on latency), it appears that:</t>
      <ul spacing="normal">
        <li>authentication and non-atomic fragmentation headers can traverse the Internet;</li>
        <li>only routing headers types 0 and 4 experiment problems over the Internet, other types have no problems;</li>
        <li>hop-by-hop options headers do not traverse the Internet;</li>
        <li>destination options headers are not reliable enough when it exceeds 16 octets.</li>
      </ul>
      <t>Of course, the next phase of measurement with non-collaborating parties will probably give another view.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>While active probing of the Internet may be considered as an attack, this measurement was done among collaborating parties and using the probe attribution technique described in <xref target="I-D.draft-vyncke-opsec-probe-attribution"/> to allow external parties to identify the source of the probes if required.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="TIER1" target="https://en.wikipedia.org/wiki/Tier_1_network">
          <front>
            <title>Tier 1 network</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ALEXA" target="https://www.alexa.com/topsites">
          <front>
            <title>The top 500 sites on the web</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GITHUB" target="https://gitlab.uliege.be/Benoit.Donnet/james">
          <front>
            <title>james</title>
            <author initials="R." surname="Léas" fullname="Raphaël Léas">
              <organization>Université de Liège</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MLAT_PEERING" target="https://catalog.caida.org/details/paper/2013_inferring_multilateral_peering/">
          <front>
            <title>Inferring Multilateral Peering</title>
            <author initials="V." surname="Giotsas" fullname="Vasileios Giotsas">
              <organization>University College London</organization>
            </author>
            <author initials="S." surname="Zhou" fullname="Shi Zhou">
              <organization>University College London</organization>
            </author>
            <author initials="M." surname="Luckie" fullname="Matthew Luckie">
              <organization>CAIDA, San Diego Supercomputer Center, University Of California San Diego</organization>
            </author>
            <author initials="K." surname="Claffy" fullname="Kc Claffy">
              <organization>CAIDA, San Diego Supercomputer Center, University Of California San Diego</organization>
            </author>
            <date year="2013" month="December"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/2535372.2535390"/>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="I-D.draft-ietf-opsec-ipv6-eh-filtering">
          <front>
            <title>Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</title>
            <author fullname="Fernando Gont">
              <organization>SI6 Networks</organization>
            </author>
            <author fullname="Will (Shucheng) Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="3" month="June" year="2021"/>
            <abstract>
              <t>   This document analyzes the security implications of IPv6 Extension
   Headers and associated IPv6 options.  Additionally, it discusses the
   operational and interoperability implications of discarding packets
   based on the IPv6 Extension Headers and IPv6 options they contain.
   Finally, it provides advice on the filtering of such IPv6 packets at
   transit routers for traffic *not* directed to them, for those cases
   where such filtering is deemed as necessary.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ipv6-eh-filtering-08"/>
        </reference>
        <reference anchor="I-D.draft-ietf-opsawg-pcap">
          <front>
            <title>PCAP Capture File Format</title>
            <author fullname="Guy Harris">
	 </author>
            <author fullname="Michael C. Richardson">
              <organization>Sandelman Software Works Inc</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document describes the format used by the libpcap library to
   record captured packets to a file.  Programs using the libpcap
   library to read and write those files, and thus reading and writing
   files in that format, include tcpdump.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-pcap-00"/>
        </reference>
        <reference anchor="RFC7704">
          <front>
            <title>An IETF with Much Diversity and Professional Conduct</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker">
              <organization/>
            </author>
            <author fullname="N. Clark" initials="N." surname="Clark">
              <organization/>
            </author>
            <date month="November" year="2015"/>
            <abstract>
              <t>The process of producing today's Internet technologies through a culture of open participation and diverse collaboration has proved strikingly efficient and effective, and it is distinctive among standards organizations.  During the early years of the IETF and its antecedent, participation was almost entirely composed of a small group of well-funded, American, white, male technicians, demonstrating a distinctive and challenging group dynamic, both in management and in personal interactions.  In the case of the IETF, interaction style can often contain singularly aggressive behavior, often including singularly hostile tone and content.  Groups with greater diversity make better decisions.  Obtaining meaningful diversity requires more than generic good will and statements of principle.  Many different behaviors can serve to reduce participant diversity or participation diversity.  This document discusses IETF participation in terms of the nature of diversity and practical issues that can increase or decrease it.  The document represents the authors' assessments and recommendations, following general discussions of the issues in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7704"/>
          <seriesInfo name="DOI" value="10.17487/RFC7704"/>
        </reference>
        <referencegroup anchor="BCP220" target="https://www.rfc-editor.org/info/bcp220">
          <!-- reference.RFC.8504.xml -->
<reference anchor="RFC8504" target="https://www.rfc-editor.org/info/rfc8504">
            <front>
              <title>IPv6 Node Requirements</title>
              <author fullname="T. Chown" initials="T." surname="Chown">
                <organization/>
              </author>
              <author fullname="J. Loughney" initials="J." surname="Loughney">
                <organization/>
              </author>
              <author fullname="T. Winters" initials="T." surname="Winters">
                <organization/>
              </author>
              <date month="January" year="2019"/>
              <abstract>
                <t>This document defines requirements for IPv6 nodes.  It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
                <t>This document obsoletes RFC 6434, and in turn RFC 4294.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="220"/>
            <seriesInfo name="RFC" value="8504"/>
            <seriesInfo name="DOI" value="10.17487/RFC8504"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="Z. Li" initials="Z." surname="Li">
              <organization/>
            </author>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil">
              <organization/>
            </author>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic.  This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." surname="Previdi">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC1753">
          <front>
            <title>IPng Technical Requirements Of the Nimrod Routing and Addressing Architecture</title>
            <author fullname="N. Chiappa" initials="N." surname="Chiappa">
              <organization/>
            </author>
            <date month="December" year="1994"/>
            <abstract>
              <t>This document presents the requirements that the Nimrod routing and addressing architecture has upon the internetwork layer protocol. To be most useful to Nimrod, any protocol selected as the IPng should satisfy these requirements. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1753"/>
          <seriesInfo name="DOI" value="10.17487/RFC1753"/>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="J. Arkko" initials="J." surname="Arkko">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC6554">
          <front>
            <title>An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL)</title>
            <author fullname="J. Hui" initials="J." surname="Hui">
              <organization/>
            </author>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur">
              <organization/>
            </author>
            <author fullname="D. Culler" initials="D." surname="Culler">
              <organization/>
            </author>
            <author fullname="V. Manral" initials="V." surname="Manral">
              <organization/>
            </author>
            <date month="March" year="2012"/>
            <abstract>
              <t>In Low-Power and Lossy Networks (LLNs), memory constraints on routers may limit them to maintaining, at most, a few routes.  In some configurations, it is necessary to use these memory-constrained routers to deliver datagrams to nodes within the LLN.  The Routing Protocol for Low-Power and Lossy Networks (RPL) can be used in some deployments to store most, if not all, routes on one (e.g., the Directed Acyclic Graph (DAG) root) or a few routers and forward the IPv6 datagram using a source routing technique to avoid large routing tables on memory-constrained routers.  This document specifies a new IPv6 Routing header type for delivering datagrams within a RPL routing domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6554"/>
          <seriesInfo name="DOI" value="10.17487/RFC6554"/>
        </reference>
        <reference anchor="I-D.draft-bonica-6man-comp-rtg-hdr">
          <front>
            <title>The IPv6 Compact Routing Header (CRH)</title>
            <author fullname="Ron Bonica">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yuji Kamite">
              <organization>NTT Communications Corporation</organization>
            </author>
            <author fullname="Andrew Alston">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Daniam Henriques">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Luay Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="15" month="November" year="2021"/>
            <abstract>
              <t>   This document defines two new Routing header types.  Collectively,
   they are called the Compact Routing Headers (CRH).  Individually,
   they are called CRH-16 and CRH-32.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonica-6man-comp-rtg-hdr-27"/>
        </reference>
        <reference anchor="I-D.draft-vyncke-opsec-probe-attribution">
          <front>
            <title>Attribution of Internet Probes</title>
            <author fullname="Éric Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoît Donnet">
              <organization>Université de Liège</organization>
            </author>
            <author fullname="Justin Iurman">
              <organization>Université de Liège</organization>
            </author>
            <date day="3" month="March" year="2022"/>
            <abstract>
              <t>   Active measurements at Internet-scale can target either collaborating
   parties or non-collaborating ones.  This is similar scan and could be
   perceived as aggressive.  This document proposes a couple of simple
   techniques allowing any party or organization to understand what this
   unsolicited packet is, what is its purpose, and more importantly who
   to contact.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vyncke-opsec-probe-attribution-01"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Sander Steffann and Jan Zorz for allowing the free use of their labs. Other thanks to Fernando Gont who indicated a nice IPv6 hosting provider in South America.</t>
      <t>Special thanks as well to Professor Benoit Donnet for his support and advices. This document would not have existed without his support.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAMnFNmIAA81c224jR5J951fkqmFY2iFLvImSemCMKYmtpk1Rgsi2x7NY
NJKsJFnuYhVdF8kcsT9g/mIe11hgP2L6x/ZEZGZdSEpuz2Wx4zFEVuUlMjLi
xInIpGu1WiXxEl+9FgffpHEiukGYLFQkbpSM00gtVZCIcCZ6PycqiL0wEAsl
XbwfpdGD9yAnnu8la3H4TfemNzo6qMjJJFIPNBg9OKhMZaLmYbR+LbxgFlbi
dLL0YhonWa8wZ783flNxw2kgl/jmRnKW1B7WwfSDqj10wlVc+xEv4pqPUeKk
4q2i1yKJIGazXj+vNysyUhJz3a5UJBMMGgsZuOJGBnLOkh9UHsPowzwK0xWa
9e8eOiJve1D5oNZ470KMIFFRoJLaFUlQeVBBql5XhHi2pxBa/oPvMb4XzMU1
taTnS+n5eM7Sf+2pZOaE0ZxeyGi6wItFkqzi18fH1I4eeQ/Ksc2O6cHxJAof
Y3XMIxxTz7mXLNIJ+iqtmuOCaui91k5hbNPO0R0dLyz2OH5Oy84iWfoHlUqc
QInvpR8GWOBaxZV4KaPk/U9piGleiyCsrLzX4j+ScFoVcRglkZrF+LRe0of/
rFRkmizCCOqrQTaBfUenT39xxHc8Iz/T2/3pL5E3LT6GCmTg/ZmV/FpcevE0
5Ocx5lBY4JUS3/r45EsZiE6b301DF0M1zloN/RXWiIaeggGY92mQkP1dKH/u
pfqh0rtk9PT1lGZypuGyJPO9IwaffpFxQeJ7uVrIT//tF16UZX4XYD+j2Es+
/SJcJQbep/+aq4JgxQcvCBbRPMp3fDjh13GSurBlJ/VpVc5ElaT8xhH9NFrK
oCAmObIXFJ9/rpRG0/y5BrfAOEmaiBv4q5p5YaTERfPMvO36/qdfFA3gS3H1
6RcsCKMmSjTqhZ1p1+v1366AH3kFjscr+DpfeSUI8SSB+K8rFUKU7JsQ437v
vqFFN4g29gBUDQHHJhjQb2Q0J1PKXCVwHr0P3kq5nmQXpG/H1PF9433esTvo
/bFbHnuhRBKuxEm9LqBJFQtgI5BTPKrJ3pkeHx8d6aufJRnaMbpyLzS97o/f
vrsoDc7+uHcUuLQvJ7ktHF+oIPQS5yoMIO1x3jHzQv5fzfx9wZCNmTxnHWhz
M+iO39/1evf94XVJ3H4wU1FEMHiT+olHeBRJX9wpRQ/3rgNxAQgzd6bSc7Xi
XZVg6+PjlQTOHjfrjdZ7z477flkY9/1Kj3usLRafVUymYNd6ddsHINSdRqN9
ctw8aZ20TpsO/z3XluhinNeCZqg1mp+hrO9k7PnKC2Nx7YVJ/Ky+1uIy9H3s
ixiEgRsGzww3WnjiT4sw/cdGuZEJrO1RDNLpB0+Vx7rs9q+6VTECShIShgjW
0CnMbpVCg+JSUbirFqe8nYlL6Xvwp8CTecdn5v52Ki59OZut/1XTViq1Wk3I
CeBITpNKP6Dd6lTF/ZvL07PTpljIWCw1QXHZ6dwIrgiaspLA8yQWj4h8gqO2
2iIusQPX9WIB0pEyuVlFKsZfUAcR+958kfhr4XozWB69XSpYhhvCVNd60CWB
YKSm9BI9YZcYsZ8IDAnI8n1BiAFoxrjhHA1iRy9m6bmuDzd6RWQjCt10Slhc
ydf29PQHs7yPH/+hBRog8iJQJYk34G/QN48y98MJHNPSnX+FKkZeMFU0WcBL
6teuHE04iOTUgHpqWvNWD52aWtRmnp+wK5sVQ2UPnosVx+GSRw6XkMs11A5W
IrIe2drwdzbzmIrQrJBoKddiovQY04UM5sBmvR80OPSzCn1vCtDAzry0cVUx
QegjtWl4gNIlFIf9CK2mrKC8diET5rO1RqMlDm+Iy2Frm80jh4MFhUOaLFyp
AP3SCGoitopH8oHI4MRXNMTTkw4IHz86ZC03udbZWCR0EIGnA79jVWXxlgWq
ztsZKCggeVSYaAoskZOQiCuUxgYTQBAsTjofHOmIB6wJbBlK8bDzUCOWJt3c
ZKytsKwMwyvI2U2TMAiXYRqL0TpO1DIWh91RjKV2oU6aGIp8egIR99exApuM
P37UwuqVA+0pwPPOHtutxADoNvVBd7RiDxLE4VrjoLh3EOvpiUM9jRiHPOoa
7FpRqwm0uMaGmP1hbkBus8f4oZpIQcX3yl+TbsJtZbGe2C5ZmIkKQIGSGMSj
RlOt5JzFF1PA1kTl7qoe9PLZciYQY8oiyGAt+pc3d2gYx6RxmDMEhbhzjIw5
0XWy1s6eK+f3NJuxcYTbJQm2PaGcTlPqj6FgmtDlI5T0uFCcx+3CA6kq9sNH
3mAMtfIlkcW7jgWX0pxmsqlcJTwZrCQUzgrf97u3fJzX6C1cGs7KFp1vOxuR
eVJYJLs2R3ehLcYj33yT0oza0Anw4KJQpsvbjAcQIwiD2r49Y3SSsFZ4IGRO
p0r3ohYx2IOrPbIoAQ9vje/pifkelgCaVguI0jFZq8JLVinSNnF5NYQHYSaF
bvgLC3bDJcHCzPtZzCJ8ZuchfzN2hwSRRUzI0eEnkOzB441h+4TjEnjoHFiL
A/mmkTchNA1jhZ2E8Xvk5bFBhsztY3x/BZ6iXfmOXblSGcESiYeBIlHAhbBQ
Zwp3JKjz3Ud4lDiU/kTB9zgrh3TdGXIyyft0uYByaHElCOQxAgYr7MDMQ0Ne
pZ1EG35MqDgn2AYkPD3xmt8bqIFafS8mvMQaaewyBGHYuTZd3kYdybojEaTL
CRuIazMHaGHTHQ3xrxiCl2wu9WNG2s0gnPLObiqb08b5yabnYoZ3QbjpXm8u
UpDmWHQ9oATeN5rtRnszHNRGt4PL26HQf/Bg010C2yJXLqlVu95pbK48MHDo
9HaqZLC57G7GYYTkCDCEHvsbvRt1N0MwtR8ovlyC9lTF8Adu26lvt73qbd7A
lqZwiOSZJv3h5gJBDew5Us80GV1vEIbncmWadJqnnc3td2833Xeb0doN1Lr0
9G6w+V5G8Fw8bbc7Z+3NzRoGOUViJmmfNu++3VzK5STyoENqc3p20tq8Dcl7
5irCAjfdePEAk0VAGl6iRadebzQ2Nz+M3/Yvaxe97mg8qpEa0PINLBYKq4It
khDnZ512e3N929mM+pvBj+nE/xEQsKk8vRavSlajc42vDpB1ZgbTHR18ZMsf
w5Nh1nui0tOrYgyqVK5SZg+FGCoOLdRJCIZXqe+vawDphXKLEQGBhNHlqJoZ
dCm8iXgRPrI9UxwjRHuEDhcCwGchayEfFA+ppiQuiI3UNiyGbNz06YqdfsWm
e8n8hwxBNE7bYiMub697w3ENX0CjR3gw5gApuEXz/JyefN8bfNfDxzGw6UGd
n1ehHR/s+lIilSL+PeqVOzbPGzT2cDyuXd7e3Lwb9i+74/7tcFSjN7sTtVrN
Op5cjbvXeTAl9/emKovURHNMtawqrnrbI5x08GTQ+643aO1O0O60TvEErl0b
9waj8X23dj24vegOaCWUEohrhtSqePst2t0z0MD4Od3nAU5PTmjI7rhLK6pB
rfRZkD7TwJvmhHKpIkTN70bDATGnASIk06TRXVX0hxiChzvp1Fv4POrfDmrD
3pikUB+A8CMfLCnwfkQkcVwHiu3bHp32CfUYY4PLk5YX2jntNGngXvfidtjT
Y/cGPcgs+uPuoN8Vo7vu/beDnhg5K6eLKfrjrRHOW7Tpb9/d32PXhj2jzF2V
EAbiRe/quvdueCtG3RE88NbKe9Zus8YbNP23t9DYGF+yhXZTaB0m1L2uiu7Y
djpvn5/h88VFf1Dr3omLt937cZ9AFUxEDBLSSK5Dxliysi2UBWAMsjYEnmRZ
/Wta/u1lrzvE3g3NonQbQi18AW5VxZt7+7jZaJ61eAWjPm03hLe7I4sb02qf
nrKX1JrcbATDTTI2pxkY3mFDQ/xT7MnAiC8a1EQZIbHaqri+yLaf4C9rWwDA
YiMNffgG8MsnynGvAC5F7IPIh89z6CMCRC5NmXQC+4YsRhkOS3xa/JRSym0N
EkGcXxFoTSSRA1PH+t6WxUAL56pIuk1aFHE6E4SC0jSiUJL5p6umRCweFyGn
NkJzeEdc2MF5Oq4VUOakKE+qZlwAYAuMPFQ/T9Uq0arRMMpjxUk6seW8Iyay
NnfIMgQA6vcLIp5JKbXVjIOn1sgEMqMTEnAOkzgFYUILmKSeD5aK9UAmcLOZ
XDJZz5/EC3pEauAUGH3mnCAJSCBpCXijpf5A/IjS9iyB4US+lMXvYejoRMGE
GJrJx7IaACevaxJXUfmTqC01f6T9qArPUbBam3xMp0g1CpAc2TeU+ti0KCsG
UCR9Ja5oEms3xkC6o0oFMLaSOvNesNqnihhtxrZJBnygpe9ZkI98wxDJwtCU
FRld6MVhLkpeuyOYS5pU9R6anYF64WwwMRl/IFZK+xaRE/te8AFp9QyTErvV
dFS6LuXwNEUYAOL1sOLQm/FgKZNd6lnzQRR9k1dyBea03v748Wi7NpJSEkIL
mIW0GOou/XkYYc1LTrusq+Vbla2G2YBZp/ZdyqPsS1Id1UuIHvCwaErEN5Jc
JiNSPno1C0MuiiMXm9Hm4dFERpyLenofi3pcyNVKBbFNtTTb4e2KoAK2kQWa
+cgnE/HVV6KBdSrjAJE3nzPP1tkq2tV0O/JJ5Sr3qKrFzdZJrhnHUBOXRnjP
aFnYInarLC0nBwm4tGLqOBZq9slHzxeaYuYWDKUt8cya7pQzw5owaAFFELki
4q9ca5ai/8e7I+dX9IRxjY6RfLFc7PHs3VDAYXxkmkDnL69+ogqD7a5W2lVa
6diKZ5JSY2OxWffPkhkCfYbM1mrmITtwaGb4v1kK5ufKVWzSUd61agHtcz96
lNoIVyGyUQpgh8qZO1WN2zz+kiISnEzPTf7JHWwJJTPbNABsThccBXNTtyb8
Uo1mB7322TsDkvV41xF3dFJHK4lZHgIB43vzUPpZhp+hSR5tvuSslxLpOa2H
MMPGpy9LIUY9SD+VBl9WIQUtD0N7gOVp4og+e40Nt7nLkMQrdqKXYw7VuUzJ
ZKIRQI9sfTRj+lkximpH9P9ylMkLNzv1jWz1XN0gqObzMkqL0eTpqXi+pKuf
WWaXXz94a+R9epXwq/dq8ZHNKwcSndbpbK5cHtoudlqdSB/kJUZjvPYCsg+P
KxBSvLu6Q6u1H1JNlB6ML7MH2oZ92AFpi+qevDaol0MOvRz9MBQzX86ZZtoY
yYkf4SM2GlZpaGes+ERAtJy2Vse/UTA6byGzPGxS2UtGck4Hw1RkhfbA4gph
OCv8lueH+McFibMQvc/QddcHGXE5NMd9ilQRvYcRwsyjwDIACk+Q3boiLQ8s
kmtrQTVz90wEnQNz9TFTlGTFYLk7BsmhjYSYrGvkwDR6sWAXrnQSZ2Q3WwfJ
6RTv3xkN76Q7NO04AhOD2F6zr4I5KWwmzkSIrBxWkfVPgw9B+GinyspR4sD1
4qmM3AN4ShL/5qGzInpBvs8ZpYmk+VdEPAQzJo0aL88FJe0dxCD0WuYjnm67
Crul0nxmOp5qNatIa6s8EpKtf64kv75w6nbSaJppOZ7bgmrRerMi63oFW+M6
bJ3stqNru7H3oLi6DXxdAsNmcClGJDOG4R43NfbZr9BXMn+fkZXi6xGJYz0E
nRGVjJiQrUp6qRsN0bUALSvPR5VqOydj1K/N3PhnzUyFWwoVJt0rKstNl8u1
GN31DafVOGT91bTkir1o2Q23SOJkmMsxvGql8TRJzjePvu3sLTZe+TPL26wt
Wp2UJeVEszCmmaF/Z1mReX5ocx+q4ds8hXIBrRcs6ZjA3Ma739mVEDl8Awk+
G2tiSknBByL1U+rRkch+h86r7UUAnaxXoFia0Ay8IP1ZfKCw6seaMQDGYg7b
Ug/m07UJc05zhs6UbxFLC4h9YPkEsyoLHSdOS4eOP1xc3jWbdUrWNdOZPSPk
gxfy7bFsiKbTcM6dEzMMIlD7vN3kYExnj67r2Zwwp2870F0V+gqhQXxWRA75
AdrbzZ15yuf8mHM285AsPgkZ/0/OC+n/QRAWOx9gbfFKTUGCEOwKx12RtLaq
iTFJWu5KsdcuuO2cmlh71qxDY3ZbzYYc6LMXM+BSZ2DCmwdhZDJv2k9d2EgD
fdzsbtF2j9H9EfCn3AN2yka7VVhYjyQnamWj9GFxU+kmS74dZ+dnHcpO6QDo
Xp87U8HHyxeUHeJzhpRGUeF4XlDsp3IEM6SGOHyJHh2JhH1gDr7BJY32Wade
PIXSOxulCPYUAfI3UBEN56oZkykmN4FbJKH2eLq5ffjDJpJzjxzxgOQNa3fm
KAgLQct8MKYlCDtbQ9ImcZAxJaZd7msP2lx9ap0TS0NC701U0dyzUrH1/2jx
ngNN6URrKyzpSGRyfGJ8dF2Cj39nJV2ytWlXSZlRz1Lf1nNK1H1rfE5zDNx5
URG24EGbsuRiDGE2X9TM9HbYbIhCZ6pQUpX/rO6cf6Hrlfh2DmjQ35qlb63S
Nypqds6duv52UnrX0d9aX5RqnVaRttB5B1n3iB6LMZX7zA1iKnXanaAsB6PU
s53geKIeuazJqt2tu1GTPZuFZR/SK6Skc49q6Obouty04L6gPdAc3I7rDkc7
Jzpu4USnsqGK/aZUry8qwq4jq/iOuCDHCdwehYg6KUFfYjE58xphnfNFqpZG
HhI45HG+yuNqBiUn9fMT6ItyTF2oIXPkgylWGCDT4Nc+szOaegxTAPjE1GFN
MoPkgpJWR4zCcgkvTqNV5FFJy9nZuvY/Y+va4nCkNK/a0pZBz9OTtkbPl7Yo
OxmlE4Y9u9P+Tbujy4jm+tbo/i0XOXR5JVM4nozuEQEJximkIS5yCQbYqnM5
j+otDIl0bhgukepgEbcc8vYCzmGD6nq5WYph/+b+9srooXF60iJy0KRGy3BC
9XIOwfo11n9Cr1v0+v5uYB+fkPY0nWJacULvL+/f1hqaoHfs91azdDdkEtL5
V62zlHRfY7mqRcm8tnAjbIW9X1K0n+euq2XZqwkvpHo0P+SalYZAU3SpE9xA
3bZJludHOkE2lZ/ixSkVRWF0pPH+raaC+CNuDVGy0H9DmTNZZsko8+zTVg4K
bHKLPZpSc8GiFpMF+aECBSfMNnNqE9qIgaa3GyE+C7gZZUfIrwi88e+Jc6aR
90pnYOZx3cIzN6XwzVRTs8MNp1yAfIv93KjEIG2TbJx8+K0XRhZK3goj5s31
C9N8y9egGetrb3OFbgcB4B/VRGVk8OIF3cPaCIgiOhEnrLRVjH3m9nvtevGS
orodgOHnS8pfScov8wnoaD+7coj47Yi+JoE2Md6Riktu1OJLkxx/yRlx1aBx
ZrtEiTUo6BxO2+hVYct/s5G+kNzsmqcbfvzIdplZ4k0pl/hNlkm2NwwLJICO
dHeftZrZs5Z91mnbZ+2G0zF9m9mA7YyanGQDNm07/ewHAGPhoba8YsMt83PD
z7C+8RaQuJ7LwY6vRtFG2DqqNgez18dkQrp+ZMCoqKnsJu/K3KDIzlAmgHNb
Od2qgfthSPdXKX98hufy3T3mNnpcfQ2OhuOTOArMfgkI6DzB7vVZjZOgcv6Y
HRt5wcxPlbn6a9INRysn9v6cHTa+UG4yBWj5Y7hdetZWzBrgX5vxfeuSx+8W
jwp5c6OT5YM+naWuBaswNnPR6PoKt7k4XFRx29ZSstPSQqL6O36SD/9cteMw
CeluVla+O8rvHDPom1vE+jRlAeN4pDhF25kCdRUBihcvY2KcvhaLc9ns/icr
+HBnWqt3+I0RkLMgoaWhsl69XZRootahSVNyITgLo9huLgmYbTKn0HTcXyJn
WbHGlltWYWTirsFBx9H49aZU7LHIRfZSvFtLKkVGR8forN99JaKYGZW9LvF6
p7Z3aKtotp5ni2xcVuMUnm/AbhXmXujWMFe6SzBJHRHG4d8Ybq2RvbgUe5F+
yhfPN3a4zW8AT2QmenFH6HZad5qlzKz+xQ6AkUwWwthyrdZ3M6ltTw25eu/n
dTZwyudLjUc5EnAkLOJesK0KbQDA3T2ZuL59QIl0niEEIa8mSxCy+yo6O9Do
p0/cyz8KyO6RkOHvTWCOTHWAyp8Guco/OtDZ0uf+isFcGiAx7WXi2J7I7dxU
EYf6FgIfKUTmxtaBSLBlpVvuR68/847g/7d7c597Keszrkvldm2MIU/BYlhS
kudhd8U8cefYkCx9ZM2HT2t1ZkZET8e9Q33eqguumXG/VAymYp01VR4jZ0zZ
rvG2FPeNiD21haG8sbVB5nQOyJwjxIhc8cWrhH/76+Zvfz37O65+mj77L5Se
lZRtl1PU9i3par+6eUUvMNPYXNcd6bKtGFIYM6/AWgv32fXe2Pv4FALgNkk4
DX1T/DPOL/n3Ph6JFKhHS2UI6vJr56ZI/J6C5nu9a4ASRBRSpLnUU67L7QDx
FnVh/C4I/9so8DCkrqbn4cn5kYbvUw3mWTH4sNFumVfNMjfdsyC7QUVU53qD
0TRQ/M4oMLZor6v3RT1w9hzG+nDFNv9XZeitWp1S0783SxejdLmU0Tq7C1Sq
ZK9kBNiNi33j/GKgyn5moukMtoqRHhEL4KxnOpyrkI/bPboehqieX1vjX21l
wY3OT4Lp+ojztiIrfb3n+I26Fs8C99IZUngpMc0yUhqRsaoczGJT9NE8pV2s
xBNt9uki/M4Puuwpje7KUTsIs/a/3zp+384STdR9XsyXUkza4EIaDsochOl8
oY/Vsms6cU6tqdZFl7vSyP7mjRmwPsbAxhVNRB8y7fwyyFoE3z3J0qm5x2RF
a+LBU4/atNQ0jfQvcfVxnA581oCw8dTN/qJo6x6lTSPsUZ4u7xVO7LgiWpJY
mrsb+66sWLlpZ3O+wEdr5WuayBMC76dUbZ9mFMiL+W8+aPrCQ9QKQ/DPnfRV
TWZmEXEDOz3eePRfIfBm+mKJKYqbtZuTPm+WHYpCj/RT1+6wu6PE8r3KBV/5
0i3lVKel+hezE2iLBulOKXHwlauZK4BQhwDlfnUwQ5xQGaAVfqapj4pk8IF+
Vcz/vZJEzWYy0C74DbbjT2H0Z3supO9z6jNolWXE+kQFe4H0UJdaeURWxhtS
TwAvuA5pB+myswFSOi4P6KcQOlXcc4VxBOddiC44FDpgsRakzej2Z2WYBZg9
U3EMIeln/p/+BzyHf+fPcvOhX7qiDEuf0rv0C4yd3zfrEn3GzNXPXmyvRxJS
F0ZxKv8L/D+/uA5GAAA=

-->

</rfc>
