<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 2.7.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-ipsecme-risav-00" category="std" consensus="true" submissionType="IETF" updates="4302" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="RISAV">An RPKI and IPsec-based AS-to-AS Approach for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-ipsecme-risav-latest"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Google LLC</organization>
      <address>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <author initials="H. (Henry)" surname="Wang" fullname="Haiyang (Henry) Wang">
      <organization>The University of Minnesota at Duluth</organization>
      <address>
        <postal>
          <city>Minnesota</city>
          <country>USA</country>
        </postal>
        <email>haiyang@d.umn.edu</email>
      </address>
    </author>
    <date year="2023" month="March" day="07"/>
    <workgroup>ipsecme</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document presents RISAV, a protocol for establishing and using IPsec security between Autonomous Systems (ASes) using the RPKI identity system. In this protocol, the originating AS adds authenticating information to each outgoing packet at its Border Routers (ASBRs), and the receiving AS verifies and strips this information at its ASBRs. Packets that fail validation are dropped by the ASBR. RISAV achieves Source Address Validation among all participating ASes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/draft-xu-risav"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Source address spoofing is the practice of using a source IP address without proper authorization from its owner.  The basic internet routing architecture does not provide any defense against spoofing, so any system can send packets that claim any source address. This practice enables a variety of attacks, most notably volumetric DoS attacks as discussed in <xref target="RFC2827"/>.</t>
      <t>There are many possible approaches to preventing address spoofing. <xref section="2.1" sectionFormat="of" target="RFC5210"/> describes three classes of Source Address Validation (SAV): Access Network, Intra-AS, and Inter-AS. Inter-AS SAV is the most challenging class, because different ASes have different policies and operate independently. Inter-AS SAV requires the different ASes to collaborate to verify the source address. However, in the absence of total trust between all ASes, Inter-AS SAV is a prerequisite to defeat source address spoofing.</t>
      <t>Despite years of effort, current Inter-AS SAV protocols are not widely deployed. An important reason is the difficulty of balancing the clear security benefits of partial implementations with the scalability of large-scale deployments. uRPF <xref target="RFC5635"/> <xref target="RFC8704"/>, for example, is a routing-based scheme that filters out spoofed traffic.  In cases where the routing is dynamic or unknown, uRPF deployments must choose between false negatives (i.e. incomplete SAV) and false positives (i.e. broken routing).</t>
      <t>This document provides an RPKI- <xref target="RFC6480"/> and IPsec-based <xref target="RFC4301"/> approach to inter-AS source address validation (RISAV). RISAV is a cryptography-based SAV mechanism to reduce the spoofing of source addresses. In RISAV, the RPKI database acts as a root of trust for IPsec between participating ASes.  Each pair of ASes uses IKEv2 to negotiate an IPsec Security Association (SA). Packets between those ASes are then protected by a modified IPsec Authentication Header (AH) <xref target="RFC4302"/> or an Encapsulating Security Payload (ESP)<xref target="RFC4303"/>. IPsec authenticates the source address, allowing spoofed packets to be dropped at the border of the receiving AS.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Commonly used terms in this document are described below.</t>
        <dl>
          <dt>ACS:</dt>
          <dd>
            <t>AS Contact Server, which is the logical representative of one AS and is responsible for delivering session keys and other information to ASBR.</t>
          </dd>
          <dt>Contact IP:</dt>
          <dd>
            <t>The IP address of the ACS.</t>
          </dd>
          <dt>ASBR:</dt>
          <dd>
            <t>AS border router, which is at the boundary of an AS.</t>
          </dd>
          <dt>SAV:</dt>
          <dd>
            <t>Source Address Validation, which verifies the source address of an IP packet and guarantee the source address is valid.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The goal of this section is to provides the high level description of what RISAV is and how RISAV works.</t>
      <section anchor="what-risav-is">
        <name>What RISAV Is</name>
        <t>RISAV is a cryptographically-based inter-AS source address validation protocol that provides clear security benefits even at partial deployment. It aims to prove that each IP datagram was sent from inside the AS that owns its source address, defeating spoofing and replay attacks.  It is light-weight and efficient, and provides incremental deployment incentives.</t>
        <t>At the source AS Border Router, RISAV adds a MAC to each packet that proves ownership of the packet's source address.  At the recipient's ASBR, RISAV verifies and removes this MAC, recovering the unmodified original packet. The MAC is delivered in the Integrity Check Value (ICV) field of a modified IPsec AH, or as part of the normal IPsec ESP payload.</t>
      </section>
      <section anchor="how-risav-works">
        <name>How RISAV Works</name>
        <t>RISAV uses IKEv2 to negotiate an IPsec security association (SA) between any two ASes. RPKI provides the binding relationship between AS numbers, IP ranges, contact IPs, and public keys. After negotiation, all packets between these ASes are secured by use of a modified AH header or a standard ESP payload.</t>
        <t>Before deploying RISAV, each AS selects one or more representative contact IPs, and publishes them in the RPKI database. When negotiating or consulting with one AS, the peer <bcp14>MUST</bcp14> first communicate with one of these contact IPs.  Each contact IP is used to enable RISAV only for its own address family (i.e. IPv4 or IPv6), so ASes wishing to offer RISAV on both IPv4 and IPv6 must publish at least two contact IPs.</t>
        <t>A typical workflow of RISAV is shown in <xref target="figure1"/>.</t>
        <figure anchor="figure1">
          <name>RISAV workflow example.</name>
          <artwork><![CDATA[
                            +--------------+
                            |     IANA     |
                            +--------------+
                                   |--------------------------+
                                   V                          |
                            +--------------+                  |
                            |      RIR     |                  |
                            +--------------+                  |
                           /                \-----------------+-1. Signing CA
                          V                  V                |  Certificate
              +--------------+               +--------------+ |
              |     LIR1     |               |     LIR2     | |
              +--------------+               +--------------+ |
              /                                             \-+
             V                                               V
+--------------+                                           +--------------+
| 3. RISAV     |---------+                          +------| 3. RISAV     |
| Announcement |         | 2. Signing EE Certificate|      | Announcement |
|              | +-------+                          +----+ |              |
|     AS A     | |                                       | |     AS B     |
| contact IP a | V                                       V | contact IP b |
|           #######   --------------------------------  #######           |
|           # ACS #    4. SA Negotiation and Delivery   # ACS #           |
|           #######   --------------------------------  #######           |
|              |                                           |              |
|           ########  +++++++++++++++++++++++++++++++++ ########          |
|           # ASBR #       5. Data Transmission         # ASBR #          |
|           ########         with IPsec AH/ESP          ########          |
|              |      +++++++++++++++++++++++++++++++++    |              |
+--------------+                                           +--------------+
]]></artwork>
        </figure>
        <ol spacing="normal" type="1"><li>RPKI process. The five Regional Internet Registries (RIR), authorized by IANA, use their root certificate to sign the Certificate Authority (CA) certificate of the Local Internet Registry (LIR), which is used to authorize the Autonomous System (AS) (sometimes indirectly via the Internet Service Provider (ISP)). When they obtain their own CA certificate, the AS would sign an End Entity (EE) certificate with a Route Origin Authorisation (ROA) which is a cryptographically signed object that states which AS are authorized to originate a certain prefix. This authenticated binding of the ASN to its IP prefixes is published in the RPKI database. This is a prerequisite for RISAV.</li>
          <li>ACS EE certificate provisioning. The ACS would need its own EE certificate for IKEv2. This EE certificate is <bcp14>REQUIRED</bcp14> like the BGPsec Router Certificate defined in <xref target="RFC8209"/>.</li>
          <li>RISAV announcement. Each participating AS announces its support for RISAV in the RPKI database, including the IP address of its ACS (the "contact IP").</li>
          <li>SA negotiation and delivery. The ACSes negotiate an SA using IKEv2. After synchronization, all ASBRs would get the SA, including the session key and other parameters.</li>
          <li>IPsec communication. RISAV uses IPsec AH (i.e. "transport mode") for authentication of the IP source address by default. When an ASBR in AS A sends a packet to AS B, it uses the established IPsec channel to add the required AH header. The ASBR in AS B validates the AH header to ensure that the packet was not spoofed, and removes the header.</li>
        </ol>
      </section>
    </section>
    <section anchor="control-plane">
      <name>Control Plane</name>
      <t>The functions of the control plane of RISAV include:</t>
      <ul spacing="normal">
        <li>Announcing that this AS supports RISAV.</li>
        <li>Publishing contact IPs.</li>
        <li>Performing IPsec session initialization (i.e. IKEv2).</li>
      </ul>
      <t>These functions are achieved in two steps.  First, each participating AS publishes a Signed Object <xref target="RFC6488"/> in its RPKI Repository containing a <tt>RISAVAnnouncement</tt>:</t>
      <sourcecode type="ASN.1"><![CDATA[
RISAVAnnouncement ::= SEQUENCE {
         version [0] INTEGER DEFAULT 0,
         asID ASID,
         contactIP ipAddress,
         testing BOOLEAN }
]]></sourcecode>
      <t>When a participating AS discovers another participating AS (via its regular sync of the RPKI database), it initiates an IKEv2 handshake between its own contact IP and the other AS's contact IP.  This handshake <bcp14>MUST</bcp14> include an IKE_AUTH exchange that authenticates both ASes with their RPKI ROA certificates.</t>
      <t>Once this handshake is complete, each AS <bcp14>MUST</bcp14> activate RISAV on all outgoing packets, and <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from the other AS after a reasonable grace period (e.g. 60 seconds).</t>
      <t>The "testing" field indicates whether this contact IP is potentially unreliable.  When this field is set to <tt>true</tt>, other ASes <bcp14>MUST</bcp14> fall back to ordinary operation if IKE negotiation fails.  Otherwise, the contact IP is presumed to be fully reliable, and other ASes <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from this AS if IKE negotiation fails (see <xref target="downgrade"/>).</t>
      <t>For more information about RPKI, see <xref target="RFC6480"/>.</t>
      <section anchor="disabling-risav">
        <name>Disabling RISAV</name>
        <section anchor="targeted-shutdown">
          <name>Targeted shutdown</name>
          <t>IKEv2 SAs can be terminated on demand using the Delete payload (<xref section="1.4.1" sectionFormat="comma" target="RFC7296"/>).  In ordinary uses of IKEv2, the SAs exist in inbound-outbound pairs, and deletion of one triggers a response deleting the other.</t>
          <t>In RISAV, SAs do not necessarily exist in pairs.  Instead, RISAV's use of IPsec is strictly unidirectional, so deletion does not trigger an explicit response.  Instead, ASes are permitted to delete both inbound and outbound SAs, and deletion of an inbound SA <bcp14>SHOULD</bcp14> cause the other network to retry RISAV negotiation.  If this, or any, RISAV IKEv2 handshake fails with a NO_ADDITIONAL_SAS notification (<xref section="1.3" sectionFormat="comma" target="RFC7296"/>), the following convention applies:</t>
          <ul spacing="normal">
            <li>AS $A is said to have signaled a "RISAV shutdown" to $B if it sends NO_ADDITIONAL_SAS on a handshake with no child SAs.</li>
            <li>
              <t>In response, $B <bcp14>MUST</bcp14> halt all further RISAV negotiation to $A until:
              </t>
              <ul spacing="normal">
                <li>At least one hour has passed, OR</li>
                <li>$A negotiates a new SA from $A to $B.</li>
              </ul>
            </li>
            <li>After at most 24 hours, $B <bcp14>SHOULD</bcp14> resume its regular negotiation policy with $A.</li>
          </ul>
          <t>This convention enables participating ASes to shut down RISAV with any other AS, by deleting all SAs and rejecting all new ones.  It also avoids tight retry loops after a shutdown has occurred, but ensures that RISAV is retried at least once a day.</t>
        </section>
        <section anchor="total-shutdown">
          <name>Total shutdown</name>
          <t>To disable RISAV entirely, a participating AS <bcp14>MUST</bcp14> perform the following steps in order:</t>
          <ol spacing="normal" type="1"><li>Apply a targeted shutdown (<xref target="targeted-shutdown"/>) to all other networks and delete all existing SAs.
  - Note that the shutdown procedure can fail if another network's ACS is unreachable.</li>
            <li>Stop requiring RISAV authentication of incoming packets.</li>
            <li>Remove the <tt>RISAVAnnouncement</tt> from the RPKI Repository.</li>
            <li>Wait at least 24 hours.</li>
            <li>Shut down the contact IP.</li>
          </ol>
          <t>Conversely, if any AS no longer publishes a <tt>RISAVAnnouncement</tt>, other ASes <bcp14>MUST</bcp14> immediately stop sending RISAV to that AS, but <bcp14>MUST NOT</bcp14> delete any active Tunnel Mode SAs for at least 24 hours, in order to continue to process encrypted incoming traffic.</t>
          <ul empty="true">
            <li>
              <t>TODO: Discuss changes to the contact IP, check if there are any race conditions between activation and deactivation, IKEv2 handshakes in progress, SA expiration, etc.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="green-channel">
        <name>Green Channel</name>
        <t>In the event of a misconfiguration or loss of state, it is possible that a negotiated SA could become nonfunctional before its expiration time.  For example, if one AS is forced to reset its ACS and ASBRs, it may lose the private keys for all active RISAV SAs.  If RISAV were applied to the IKEv2 traffic used for bootstrapping, the participating ASes would be unable to communicate until these broken SAs expire, likely after multiple hours or days.</t>
        <t>To ensure that RISAV participants can rapidly recover from this error state, RISAV places control plane traffic in a "green channel" that is exempt from RISAV's protections.  This "channel" is defined by two requirements:</t>
        <ul spacing="normal">
          <li>RISAV senders <bcp14>MUST NOT</bcp14> add RISAV protection to packets to or from any announced contact IP</li>
          <li>RISAV recipients <bcp14>MUST NOT</bcp14> enforce RISAV validation on packets sent to or from any announced contact IP.</li>
        </ul>
        <t>Although the green channel denies RISAV protection to the ACS, the additional mitigations described in <xref target="data-plane"/> ensure that the ACS has limited exposure to address-spoofing and DDoS attacks. In addition, the ACS can use the IKEv2 COOKIE (<xref section="2.6" sectionFormat="of" target="RFC7296"/>) and PUZZLE (<xref target="RFC8019"/>) systems to reject attacks based on source address spoofing.</t>
      </section>
    </section>
    <section anchor="data-plane">
      <name>Data Plane</name>
      <t>All the ASBRs of the AS are <bcp14>REQUIRED</bcp14> to enable RISAV. The destination ASBR uses the IPsec SPI to locate the correct SA.</t>
      <t>As defined in <xref target="RFC4301"/>, the Security Association Database (SAD) stores all the SAs. Each data item in the SAD includes a cryptographic algorithm (e.g. HMAC-SHA-256), its corresponding key, and other relevant parameters.</t>
      <t>When an outgoing packet arrives at the source ASBR, its treatment depends on the source and destination address. If the source address belongs to the AS in which the ASBR is located, and the destination address is in an AS for which the ASBR has an active RISAV SA, then the packet needs to be modified for RISAV.</t>
      <t>The modification that is applied depends on whether IPsec "transport mode" or "tunnel mode" is active.  RISAV implementations <bcp14>MUST</bcp14> support transport mode, and <bcp14>MAY</bcp14> support tunnel mode.  The initiator chooses the mode by including or omitting the USE_TRANSPORT_MODE notification in the IKEv2 handshake, retrying in the other configuration if necessary.</t>
      <t>When a packet arrives at the destination ASBR, it will check the destination address and the source address. If the destination belongs to the AS in which the destination ASBR is located, and the source address is in an AS with which this AS has an active RISAV SA, then the packet is subject to RISAV processing.</t>
      <t>To avoid DoS attacks, participating ASes <bcp14>MUST</bcp14> drop any outgoing packet to the contact IP of another AS.  Only the AS operator's systems (i.e. the ACS and ASBRs) are permitted to send packets to the contact IPs of other ASes.  ASBRs <bcp14>MAY</bcp14> drop inbound packets to the contact IP from non-participating ASes.</t>
      <section anchor="transport-mode">
        <name>Transport Mode</name>
        <t>To avoid conflict with other uses of IPsec (<xref target="conflict"/>), RISAV updates the IPsec Authentication Header (AH) format, converting one RESERVED octet (which is previously required to always be zero) into a new "Scope" field.  The updated format is shown in <xref target="fig2"/>.</t>
        <figure anchor="fig2">
          <name>Updated AH Format.</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header   |  Payload Len  |   RESERVED    |     Scope     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Security Parameters Index (SPI)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Sequence Number Field                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                Integrity Check Value-ICV (variable)           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The "Scope" field identifies the scope of protection for this authentication header, i.e. the entities that are expected to produce and consume it.  Two Scope values are defined:</t>
        <ul spacing="normal">
          <li>0: IP.  This is the pre-existing use of the Authentication Header, to authenticate packets from the source IP to the destination IP.</li>
          <li>1: AS.  This header authenticates the packet from the source AS to the destination AS.</li>
        </ul>
        <t>Other Scope values could be defined in the future.</t>
        <t>The AS-scoped AH headers are only for AS-to-AS communication.  Sending ASes <bcp14>MUST NOT</bcp14> add such headers unless the receiving AS has explicitly opted to receive them.  Receiving ASes <bcp14>MUST</bcp14> strip off all such headers for packets whose destination is inside the AS, even if the AS is not currently inspecting the ICV values.</t>
        <t>Transport mode normally imposes a space overhead of 32 octets.</t>
        <section anchor="icmp-rewriting">
          <name>ICMP rewriting</name>
          <t>There are several situations in which an intermediate router on the path may generate an ICMP response to a packet, such as a Packet Too Big (PTB) response for Path MTU Discovery, or a Time Exceeded message for Traceroute.  These ICMP responses generally echo a portion of the original packet in their payload.</t>
          <t>An ASBR considers an ICMP payload to match a Transport Mode RISAV SA if:</t>
          <ol spacing="normal" type="1"><li>The payload's source address is in this AS, AND</li>
            <li>The payload's destination address is in the other AS, AND</li>
            <li>The payload contains a RISAV AH header whose SPI matches the SA's.</li>
          </ol>
          <t>When an ASBR observes a matching ICMP response, it <bcp14>MUST</bcp14> forward it to the intended recipient, with the following modifications:</t>
          <ul spacing="normal">
            <li>The ASBR <bcp14>MUST</bcp14> remove the RISAV AH header from the payload, so that the echoed payload data matches the packet sent by the original sender.</li>
            <li>When processing a Packet Too Big message, the ASBR <bcp14>MUST</bcp14> reduce the indicated <tt>MTU</tt> value by the total length of the RISAV AH header.</li>
          </ul>
          <t>These changes ensure that RISAV remains transparent to the endpoints, similar to the ICMP rewriting required for Network Address Translation <xref target="RFC5508"/> (though much simpler).</t>
        </section>
      </section>
      <section anchor="tunnel-mode">
        <name>Tunnel Mode</name>
        <t>In tunnel mode, a RISAV sender ASBR wraps each outgoing packet in an ESP payload (<xref target="RFC4303"/>) and sends it as directed by the corresponding SA.  This may require the ASBR to set the Contact IP as the source address, even if it would not otherwise send packets from that address.  (See also "Anycast", <xref target="reliability"/>).</t>
        <t>Tunnel mode imposes a space overhead of 73 octets in IPv6.</t>
      </section>
    </section>
    <section anchor="mtu-handling">
      <name>MTU Handling</name>
      <t>Like any IPsec tunnel, RISAV normally reduces the effective IP Maximum Transmission Unit (MTU) on all paths where RISAV is active.  To ensure standards compliance and avoid operational issues, participating ASes <bcp14>MUST</bcp14> choose a minimum acceptable "inner MTU", and reject any RISAV negotiations whose inner MTU would be lower.</t>
      <t>There are two ways for a participating AS to compute the inner MTU:</t>
      <ol spacing="normal" type="1"><li>
          <strong>Prior knowledge of the outer MTU</strong>.  If a participating AS knows the minimum outer MTU on all active routes to another AS (e.g., from the terms of a transit or peering agreement), it <bcp14>SHOULD</bcp14> use this information to calculate the inner MTU of a RISAV SA with that AS.</li>
        <li>
          <strong>Estimation of the outer MTU</strong>.  If the outer MTU is not known in advance, the participating ASes <bcp14>MUST</bcp14> estimate and continuously monitor the MTU, disabling the SA if the inner MTU falls below the minimum acceptable value.  An acceptable MTU estimation procedure is described in <xref target="mtu-estimation"/>.</li>
      </ol>
      <t>If the minimum acceptable inner MTU is close or equal to a common outer MTU value (e.g., 1500 octets), RISAV will not be usable in its baseline configuration.  To enable larger inner MTUs, participating ASes <bcp14>MAY</bcp14> offer support for AGGFRAG <xref target="RFC9347"/> in the IKEv2 handshake if they are able to deploy it (see <xref target="ts-replay"/>).</t>
      <section anchor="mtu-enforcement">
        <name>MTU Enforcement</name>
        <t>In tunnel mode, RISAV ASBRs <bcp14>MUST</bcp14> treat the tunnel as a single IP hop whose MTU is given by the current (estimated) inner MTU.  Oversize packets that reach the ASBR <bcp14>SHALL</bcp14> generate Packet Too Big (PTB) ICMP responses (or be fragmented forward, in IPv4) as usual.</t>
        <t>In transport mode, RISAV ASBRs <bcp14>SHOULD NOT</bcp14> enforce the estimated inner MTU.  Instead, ASBRs <bcp14>SHOULD</bcp14> add RISAV headers and attempt to send packets as normal, regardless of size.  (This may cause a PTB ICMP response at the current router or a later hop, which is modified and forwarded as described in <xref target="icmp-rewriting"/>.)</t>
        <t>In either mode, the ASBR <bcp14>SHOULD</bcp14> apply TCP MSS clamping <xref section="3.2" sectionFormat="comma" target="RFC4459"/> to outbound packets based on the current estimated inner MTU.</t>
      </section>
      <section anchor="mtu-estimation">
        <name>MTU Estimation</name>
        <t>This section describes an MTU estimation procedure that is considered acceptable for deployment of RISAV.  Other procedures with similar performance may also be acceptable.</t>
        <section anchor="step-1-initial-estimate">
          <name>Step 1: Initial estimate</name>
          <t>To compute an initial estimate, the participating ASes use IKEv2 Path MTU Discovery (PMTUD) <xref section="2.5.2" sectionFormat="comma" target="RFC7383"/> between their ACSes during the IKEv2 handshake.  However, unlike the recommendations in <xref target="RFC7383"/>, the PMTUD process is performed to single-octet granularity.  The IKEv2 handshake only proceeds if the resulting outer MTU estimate is compatible with the minimum acceptable inner MTU when using the intended SA parameters.</t>
        </section>
        <section anchor="step-2-mtu-monitoring">
          <name>Step 2: MTU monitoring</name>
          <t>The initial MTU estimate may not be correct indefinitely:</t>
          <ul spacing="normal">
            <li>The Path MTU may change due to a configuration change in either participating AS.</li>
            <li>The Path MTU may change due to a routing change outside of either AS.</li>
            <li>The Path MTU may be different for packets to or from different portions of the participating ASes.</li>
          </ul>
          <t>To ensure that the MTU estimate remains acceptable, and allow for different MTUs across different paths, each ASBR maintains an MTU estimate for each active SA, and updates its MTU estimate whenever it observes a PTB message.  The ASBR's procedure is as follows:</t>
          <ol spacing="normal" type="1"><li>Find the matching SA ({icmp-rewriting}) for this PTB message.  If there is none, abort.</li>
            <li>Check the SA's current estimated outer MTU against the PTB MTU.  If the current estimate is smaller or equal, abort.</li>
            <li>Perform an outward Traceroute to the PTB payload's destination IP, using packets whose size is the current outer MTU estimate, stopping at the first IP that is equal to the PTB message's sender IP or is inside the destination AS.</li>
            <li>If a PTB message is received, reduce the current MTU estimate accordingly.</li>
            <li>If the new estimated inner MTU is below the AS's minimum acceptable MTU, notify the ACS to tear down this SA.</li>
          </ol>
          <t>Note that the PTB MTU value is not used, because it could have been forged by an off-path attacker.  To preclude such attacks, all Traceroute and PMTUD probe packets contain at least 16 bytes of entropy, which the ASBR checks in the echoed payload.</t>
          <t>To prevent wasteful misbehaviors and reflection attacks, this procedure is rate-limited to some reasonable frequency (e.g., at most once per minute per SA).</t>
        </section>
      </section>
    </section>
    <section anchor="ts-replay">
      <name>Traffic Selectors and Replay Protection in RISAV</name>
      <t>The IKEv2 configuration protocol is highly flexible, allowing participating ASes to negotiate many different RISAV configurations.  For RISAV, two important IKEv2 parameters are the Traffic Selector (<xref section="2.9" sectionFormat="comma" target="RFC7296"/>) and the Replay Status.</t>
      <ul empty="true">
        <li>
          <t>TODO: Write draft porting Replay Status from RFC 2407 to IKEv2.</t>
        </li>
      </ul>
      <section anchor="disabling-replay-protection">
        <name>Disabling replay protection</name>
        <t>In the simplest RISAV configuration, the sending AS requests creation of a single "Child SA" whose Traffic Selector-initiator (TSi) lists all the IP ranges of the sending AS, and the Traffic Selector-responder (TSr) lists all the IP ranges of the receiving AS.  This allows a single SA to carry all RISAV traffic from one AS to another.  However, this SA is likely to be shared across many ASBRs, and potentially many cores within each ASBR, in both participating ASes.</t>
        <t>It is difficult or impossible for a multi-sender SA to use monotonic sequence numbers, as required for anti-replay defense and Extended Sequence Numbers (ESN) (see <xref section="2.2" sectionFormat="comma" target="RFC4303"/>).  If the sender cannot ensure correctly ordered sequence numbers, it <bcp14>MUST</bcp14> set the REPLAY-STATUS indication to FALSE in the CREATE_CHILD_SA notification, and <bcp14>MUST</bcp14> delete the SA if the recipient does not confirm that replay detection is disabled.</t>
      </section>
      <section anchor="enabling-replay-protection">
        <name>Enabling replay protection</name>
        <t>If the sender wishes to allow replay detection, it can create many Child SAs, one for each of its ASBRs (or each core within an ASBR).  The <bcp14>OPTIONAL</bcp14> <tt>CPU_QUEUES</tt> IKEv2 notification <xref target="I-D.ietf-ipsecme-multi-sa-performance"/> may make this process more efficient.  If the sending ASBRs are used for distinct subsets of the sender's IP addresses, the TSi values <bcp14>SHOULD</bcp14> be narrowed accordingly to allow routing optimizations by the receiver.</t>
        <t>Even if the sender creates many separate SAs, the receiver might not be able to perform replay detection unless each SA is processed by a single receiving ASBR.  In Tunnel Mode, the receiver can route each SA to a specific ASBR using IKEv2 Active Session Redirect (<xref section="5" sectionFormat="comma" target="RFC5685"/>).</t>
        <t>In Transport Mode, assignment of SAs to receiving ASBRs may be possible in cases where each ASBR in the receiving AS is responsible for a distinct subset of its IPs.  To support this configuration, the receiving AS <bcp14>MAY</bcp14> narrow the initial TSr to just the IP ranges for a single ASBR, returning ADDITIONAL_TS_POSSIBLE.  In response, the sending AS <bcp14>MUST</bcp14> reissue the CREATE_CHILD_SA request, with TSr containing the remainder of the IP addresses, allowing the negotiation of separate SAs for each receiving ASBR.</t>
        <t>Future IKEv2 extensions such as Sequence Number Subspaces <xref target="I-D.ponchon-ipsecme-anti-replay-subspaces"/> or Lightweight SAs <xref target="I-D.mrossberg-ipsecme-multiple-sequence-counters"/> may enable more efficient and easily deployed anti-replay configurations for RISAV.</t>
      </section>
      <section anchor="changes-to-as-ip-ranges">
        <name>Changes to AS IP ranges</name>
        <t>If the ACS receives a TSi value that includes IP addresses not owned by the counterpart AS, it <bcp14>MUST</bcp14> reject the SA to prevent IP hijacking.  However, each AS's copy of the RPKI database can be up to 24 hours out of date.  Therefore, when an AS acquires a new IP range, it <bcp14>MUST</bcp14> wait at least 24 hours before including it in a RISAV TSi.</t>
        <t>If a tunnel mode SA is established, the receiving AS <bcp14>MUST</bcp14> drop any packet from the tunnel whose source address is not within the tunnel's TSi.</t>
      </section>
    </section>
    <section anchor="possible-extensions">
      <name>Possible Extensions</name>
      <t>This section presents potential additions to the design.</t>
      <ul empty="true">
        <li>
          <t>TODO: Remove this section once we have consensus on whether these extensions are worthwhile.</t>
        </li>
      </ul>
      <section anchor="header-only-authentication">
        <name>Header-only authentication</name>
        <t>An IPsec Authentication Header authenticates the whole constant part of a packet, including the entire payload. To improve efficiency, we could define an IKE parameter to negotiate a header-only variant of transport mode that only authenticates the IP source address, IP destination address, etc.</t>
        <t>This would likely result in a 10-30x decrease in cryptographic cost compared to standard IPsec.  However, it would also offer no SAV defense against any attacker who can view legitimate traffic.  An attacker who can read a single authenticated packet could simply replace the payload, allowing it to issue an unlimited number of spoofed packets.</t>
      </section>
      <section anchor="time-based-key-rotation">
        <name>Time-based key rotation</name>
        <t>Each IKEv2 handshake negotiates a fixed shared secret, known to both parties. In some cases, it might be desirable to rotate the shared secret frequently:</t>
        <ul spacing="normal">
          <li>In transport mode, frequent rotation would limit how long a single packet can be replayed by a spoofing attacker.</li>
          <li>If the ASBRs are less secure than the ACS, frequent rotation could limit the impact of a compromised ASBR.</li>
        </ul>
        <t>However, increasing the frequency of IKEv2 handshakes would increase the burden on the ACS. One alternative possibility is to use a state machine. The state machine runs and triggers the state transition when time is up. The tag is generated in the process of state transition as the side product. The two ACS in peer AS respectively before data transmission will maintain one state machine pair for each bound. The state machine runs simultaneously after the initial state, state transition algorithm, and state transition interval are negotiated, thus they generate the same tag at the same time. Time triggers state transition which means the ACS <bcp14>MUST</bcp14> synchronize the time to the same time base using like NTP defined in <xref target="RFC5905"/>.</t>
        <t>For the tag generation method, it <bcp14>MUST</bcp14> be to specify the initial state and initial state length of the state machine, the identifier of a state machine, state transition interval, length of generated Tag, and Tag. For the SA, they will transfer all these payloads in a secure channel between ACS and ASBRs, for instance, in ESP <xref target="RFC4303"/>. It is <bcp14>RECOMMENDED</bcp14> to transfer the tags rather than the SA for security and efficiency considerations. The initial state and its length can be specified at the Key Exchange Payload with nothing to be changed. The state machine identifier is the SPI value as the SPI value is uniquely in RISAV. The state transition interval and length of generated Tag should be negotiated by the pair ACS, which will need to allocate one SA attribute. The generated Tag will be sent from ACS to ASBR in a secure channel which <bcp14>MAY</bcp14> be, for example, ESP <xref target="RFC4303"/>.</t>
      </section>
      <section anchor="static-negotiation">
        <name>Static Negotiation</name>
        <t>The use of IKEv2 between ASes might be fragile, and creates a number of potential race conditions (e.g. if the RPKI database contents change during the handshake).  It is also potentially costly to implement, requiring O(N^2) network activity for N participating ASes.  If these challenges prove significant, one alternative would be to perform the handshake statically via the RPKI database.  For example, static-static ECDH <xref target="RFC6278"/> would allow ASes to agree on shared secrets simply by syncing the RPKI database.</t>
        <t>Static negotiation makes endpoints nearly stateless, which simplifies the provisioning of ASBRs.  However, it requires inventing a novel IPsec negotiation system, so it seems best to try a design using IKEv2 first.</t>
      </section>
    </section>
    <section anchor="security-consideration">
      <name>Security Consideration</name>
      <section anchor="threat-models">
        <name>Threat models</name>
        <t>In general, RISAV seeks to provide a strong defense against arbitrary active attackers who are external to the source and destination ASes.  However, different RISAV modes and configurations offer different security properties.</t>
        <section anchor="replay-attacks">
          <name>Replay attacks</name>
          <t>When replay detection is disabled, off-path attackers cannot spoof the source IPs of a participating AS, but any attacker with access to valid traffic can replay it (from anywhere), potentially enabling DoS attacks by replaying expensive traffic (e.g. TCP SYNs, QUIC Initials).  ASes that wish to have replay defense must enable it during the IKEv2 handshake (see <xref target="ts-replay"/>).</t>
        </section>
        <section anchor="downgrade">
          <name>Downgrade attacks</name>
          <t>An on-path attacker between two participating ASes could attempt to defeat RISAV by blocking IKEv2 handshakes to the Contact IP of a target AS.  If the AS initiating the handshake falls back to non-RISAV behavior after a handshake failure, this enables the attacker to remove all RISAV protection.</t>
          <t>This vulnerable behavior is required when the "testing" flag is set, but is otherwise discouraged.</t>
        </section>
      </section>
      <section anchor="incremental-benefit-from-partial-deployment">
        <name>Incremental benefit from partial deployment</name>
        <t>RISAV provides significant security benefits even if it is only deployed by a fraction of all ASes.  This is particularly clear in the context of reflection attacks.  If two networks implement RISAV, no one in any other network can trigger a reflection attack between these two networks.  Thus, if X% of ASes (selected at random) implement RISAV, participating ASes should see an X% reduction in reflection attack traffic volume.</t>
      </section>
      <section anchor="compatibility">
        <name>Compatibility</name>
        <section anchor="conflict">
          <name>With end-to-end IPsec</name>
          <t>When RISAV is used in transport mode, there is a risk of confusion between the RISAV AH header and end-to-end AH headers used by applications.  (In tunnel mode, no such confusion is possible.)  This risk is particularly clear during transition periods, when the recipient is not sure whether the sender is using RISAV or not.</t>
          <t>To prevent any such confusion, RISAV's transport mode uses a distinctive Scope value in the Authentication Header.  The receiving AS absorbs (and strips) all AH headers with this scope, and ignores those with any other scope, including ordinary end-to-end AH headers.</t>
        </section>
        <section anchor="with-other-sav-mechanisms">
          <name>With other SAV mechanisms</name>
          <t>RISAV is independent from intra-domain SAV and access-layer SAV, such as <xref target="RFC8704"/> or SAVI <xref target="RFC7039"/>. When these techniques are used together, intra-domain and access-layer SAV checks <bcp14>MUST</bcp14> be enforced before applying RISAV.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="reliability">
        <name>Reliability</name>
        <t>The ACS, represented by a contact IP, must be a high-availability, high-performance service to avoid outages.  There are various strategies to achieve this, including:</t>
        <ul spacing="normal">
          <li>
            <strong>Election</strong>. This might be achieved by electing one distinguished ASBR as the ACS. The distinguished ASBR acting as an ACS will represent the whole AS to communicate with peer AS's ACS. This election takes place prior to the IKE negotiation. In this arrangement, an ASBR <bcp14>MUST</bcp14> be a BGP speaker before it is elected as the distinguished ASBR, and a new election <bcp14>MUST</bcp14> replace the ACS if it fails.</li>
          <li>
            <strong>Anycast</strong>.  The ACS could be implemented as an anycast service operated by all the ASBRs.  Route flapping can be mitigated using IKEv2 redirection (<xref section="4" sectionFormat="comma" target="RFC5685"/>).  Negotiated SAs must be written into a database that is replicated across all ASBRs.</li>
        </ul>
      </section>
      <section anchor="MPProblem">
        <name>Synchronizing Multiple ASBRs</name>
        <t>To ensure coherent behavior across the AS, the ACS <bcp14>MUST</bcp14> deliver each SA to all relevant ASBRs in the AS immediately after it is negotiated.  RISAV does not standardize a mechanism for this update broadcast.</t>
        <t>During the SA broadcast, ASBRs will briefly be out of sync.  RISAV recommends a grace period to prevent outages during the update process.</t>
      </section>
      <section anchor="performance">
        <name>Performance</name>
        <t>RISAV requires participating ASes to perform symmetric cryptography on every RISAV-protected packet that they originate or terminate.  This will require significant additional compute capacity that may not be present on existing networks.  However, until most ASes actually implement RISAV, the implementation cost for the few that do is greatly reduced.  For example, if 5% of networks implement RISAV, then participating networks will only need to apply RISAV to 5% of their traffic.</t>
        <t>Thanks to broad interest in optimization of IPsec, very high performance implementations are already available.  For example, as of 2021 an IPsec throughput of 1 Terabit per second was achievable using optimized software on a single server <xref target="INTEL"/>.</t>
      </section>
      <section anchor="nat-scenario">
        <name>NAT scenario</name>
        <t>As all the outer IP header should be the unicast IP address, NAT-traversal mode is not necessary in inter-AS SAV.</t>
      </section>
    </section>
    <section anchor="consistency-with-existing-standards">
      <name>Consistency with Existing Standards</name>
      <section anchor="ipv6">
        <name>IPv6</name>
        <t>RISAV modifies the handling of IPv6 packets as they traverse the network, resulting in novel networking behaviors.  This section describes why those behaviors should not be viewed as violating the requirements of <xref target="RFC8200"/>.</t>
        <section anchor="mtu">
          <name>MTU</name>
          <t><xref section="5" sectionFormat="of" target="RFC8200"/> says:</t>
          <ul empty="true">
            <li>
              <t>IPv6 requires that every link in the Internet have an MTU of 1280 octets or greater.  This is known as the IPv6 minimum link MTU.</t>
            </li>
          </ul>
          <t>RISAV adds ~30-80 octets of overhead to each packet, reducing the effective link MTU.  A naive version of RISAV could violate the 1280-octet rule, when running over a (compliant) path with a Path MTU of 1280 octets.</t>
          <t>This violation is avoided by the requirements described in <xref target="mtu-handling"/>.  The resulting behavior is fully compliant when the underlying Path MTU is stable, and should compensate or disable RISAV within a few seconds if the Path MTU changes.</t>
        </section>
        <section anchor="header-modifications">
          <name>Header modifications</name>
          <t><xref section="4" sectionFormat="of" target="RFC8200"/> says:</t>
          <ul empty="true">
            <li>
              <t>Extension headers (except for the Hop-by-Hop Options header) are not processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header.</t>
            </li>
          </ul>
          <t>In "tunnel mode" (<xref target="tunnel-mode"/>), RISAV acts as a classic site-to-site tunnel, potentially adding its own extension headers.  <xref section="4.1" sectionFormat="of" target="RFC8200"/> specifically allows such tunnels, and they are commonly used.</t>
          <t>In "transport mode" (<xref target="transport-mode"/>), a RISAV ASBR does insert a new extension header, which could be viewed as a violation of this guidance.  However, this new extension header is an implementation detail of a lightweight tunnel: it is only added after confirming that another router on the path will remove it, so that its presence is not detectable by either endpoint.  (<xref target="icmp-rewriting"/> adds further requirements to ensure that this header cannot be detected in ICMP responses either.)</t>
        </section>
        <section anchor="ip-address-usage">
          <name>IP address usage</name>
          <t>In some RISAV configurations, it is expected that many ASBRs will decrypt and process packets with the destination IP of the ACS and/or emit packets using the source IP of the ACS.  This can be viewed as replacing the central ACS with an "anycast" service, which is generally considered permissible.</t>
        </section>
      </section>
      <section anchor="rpki-usage">
        <name>RPKI Usage</name>
        <t><xref target="RFC9255"/> describes limits on the use of RPKI certificates for new purposes, including the following excerpts:</t>
        <ul empty="true">
          <li>
            <t>The RPKI was designed and specified to sign certificates for use within the RPKI itself and to generate Route Origin Authorizations (ROAs) [RFC6480] for use in routing. Its design intentionally precluded use for attesting to real-world identity...</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>RPKI-based credentials of INRs <bcp14>MUST NOT</bcp14> be used to authenticate real-world documents or transactions.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>When a document is signed with the private key associated with an RPKI certificate, the signer is speaking for the INRs (the IP address space and AS numbers) in the certificate. ... If the signature is valid, the message content comes from a party that is authorized to speak for that subset of INRs.</t>
          </li>
        </ul>
        <t>RISAV's usage of RPKI key material falls squarely within these limits.  The RPKI signature used in the IKEv2 handshake serves only to confirm that this party is authorized to originate and terminate IP packets using the corresponding IP ranges.  The "identity" of this party is not relevant to RISAV.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <ul empty="true">
        <li>
          <t>TODO: Register RISAVAnnouncement.</t>
        </li>
      </ul>
      <!-- # Acknowledgements -->
<!-- TBD. -->

</section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5635.xml">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks.  This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5905.xml">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol.  NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6278" target="https://www.rfc-editor.org/info/rfc6278" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6278.xml">
          <front>
            <title>Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax</title>
            <author fullname="J. Herzog" initials="J." surname="Herzog"/>
            <author fullname="R. Khazan" initials="R." surname="Khazan"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes how to use the 'static-static Elliptic Curve Diffie-Hellman key-agreement scheme (i.e., Elliptic Curve Diffie- Hellman where both participants use static Diffie-Hellman values) with the Cryptographic Message Syntax.  In this form of key agreement, the Diffie-Hellman values of both the sender and receiver are long-term values contained in certificates.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6278"/>
          <seriesInfo name="DOI" value="10.17487/RFC6278"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7296" target="https://www.rfc-editor.org/info/rfc7296" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol.  IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs).  This document obsoletes RFC 5996, and includes all of the errata for it.  It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8209" target="https://www.rfc-editor.org/info/rfc8209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8209.xml">
          <front>
            <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
            <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec.  BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together.  BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP.  The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives.  The end entity (EE) certificates specified by this profile are issued to routers within an AS.  Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate.  These CA certificates and EE certificates both contain the AS Resource extension.  An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate.  This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates.  This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8209"/>
          <seriesInfo name="DOI" value="10.17487/RFC8209"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38).  Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704).  However, as shown in this document, the existing feasible-path uRPF still has shortcomings.  This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704).  The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV).  Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques.  This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6488" target="https://www.rfc-editor.org/info/rfc6488" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6488.xml">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI).  These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="RFC9347" target="https://www.rfc-editor.org/info/rfc9347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9347.xml">
          <front>
            <title>Aggregation and Fragmentation Mode for Encapsulating Security Payload (ESP) and Its Use for IP Traffic Flow Security (IP-TFS)</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for aggregation and fragmentation of IP packets when they are being encapsulated in Encapsulating Security Payload (ESP).  This new payload type can be used for various purposes, such as decreasing encapsulation overhead for small IP packets; however, the focus in this document is to enhance IP Traffic Flow Security (IP-TFS) by adding Traffic Flow Confidentiality (TFC) to encrypted IP-encapsulated traffic.  TFC is provided by obscuring the size and frequency of IP traffic using a fixed-size, constant-send-rate IPsec tunnel.  The solution allows for congestion control, as well as nonconstant send-rate usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9347"/>
          <seriesInfo name="DOI" value="10.17487/RFC9347"/>
        </reference>
        <reference anchor="RFC4459" target="https://www.rfc-editor.org/info/rfc4459" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4459.xml">
          <front>
            <title>MTU and Fragmentation Issues with In-the-Network Tunneling</title>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Tunneling techniques such as IP-in-IP when deployed in the middle of the network, typically between routers, have certain issues regarding how large packets can be handled: whether such packets would be fragmented and reassembled (and how), whether Path MTU Discovery would be used, or how this scenario could be operationally avoided.  This memo justifies why this is a common, non-trivial problem, and goes on to describe the different solutions and their characteristics at some length.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4459"/>
          <seriesInfo name="DOI" value="10.17487/RFC4459"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="INTEL" target="https://networkbuilders.intel.com/solutionslibrary/3rd-generation-intel-xeon-scalable-processor-achieving-1-tbps-ipsec-with-intel-advanced-vector-extensions-512-technology-guide">
          <front>
            <title>Achieving 1 Tbps IPsec with AVX-512</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC8019" target="https://www.rfc-editor.org/info/rfc8019" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8019.xml">
          <front>
            <title>Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document recommends implementation and configuration best practices for Internet Key Exchange Protocol version 2 (IKEv2) Responders, to allow them to resist Denial-of-Service and Distributed Denial-of-Service attacks.  Additionally, the document introduces a new mechanism called "Client Puzzles" that helps accomplish this task.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8019"/>
          <seriesInfo name="DOI" value="10.17487/RFC8019"/>
        </reference>
        <reference anchor="RFC5508" target="https://www.rfc-editor.org/info/rfc5508" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5508.xml">
          <front>
            <title>NAT Behavioral Requirements for ICMP</title>
            <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
            <author fullname="B. Ford" initials="B." surname="Ford"/>
            <author fullname="S. Sivakumar" initials="S." surname="Sivakumar"/>
            <author fullname="S. Guha" initials="S." surname="Guha"/>
            <date month="April" year="2009"/>
            <abstract>
              <t>This document specifies the behavioral properties required of the Network Address Translator (NAT) devices in conjunction with the Internet Control Message Protocol (ICMP).  The objective of this memo is to make NAT devices more predictable and compatible with diverse application protocols that traverse the devices.  Companion documents provide behavioral recommendations specific to TCP, UDP, and other protocols.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="148"/>
          <seriesInfo name="RFC" value="5508"/>
          <seriesInfo name="DOI" value="10.17487/RFC5508"/>
        </reference>
        <reference anchor="RFC7383" target="https://www.rfc-editor.org/info/rfc7383" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7383.xml">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages.  This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-multi-sa-performance" target="https://www.ietf.org/archive/id/draft-ietf-ipsecme-multi-sa-performance-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-multi-sa-performance.xml">
          <front>
            <title>IKEv2 support for per-queue Child SAs</title>
            <author fullname="Antony Antony" initials="A." surname="Antony">
              <organization>secunet Security Networks AG</organization>
            </author>
            <author fullname="Tobias Brunner" initials="T." surname="Brunner">
              <organization>codelabs GmbH</organization>
            </author>
            <author fullname="Steffen Klassert" initials="S." surname="Klassert">
              <organization>secunet Security Networks AG</organization>
            </author>
            <author fullname="Paul Wouters" initials="P." surname="Wouters">
              <organization>Aiven</organization>
            </author>
            <date day="7" month="December" year="2022"/>
            <abstract>
              <t>This document defines three Notify Message Type Payloads for the Internet Key Exchange Protocol Version 2 (IKEv2) indicating support for the negotiation of multiple identical Child SAs to optimize performance. The CPU_QUEUES notification indicates support for multiple queues or CPUs. The CPU_QUEUE_INFO notification is used to confirm and optionally convey information about the specific queue. The TS_MAX_QUEUE notify conveys that the peer is unwilling to create more additional Child SAs for this particular Traffic Selector set. Using multiple identical Child SAs has the benefit that each stream has its own Sequence Number Counter, ensuring that CPUs don't have to synchronize their crypto state or disable their packet replay protection.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-multi-sa-performance-00"/>
        </reference>
        <reference anchor="RFC5685" target="https://www.rfc-editor.org/info/rfc5685" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5685.xml">
          <front>
            <title>Redirect Mechanism for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Devarapalli" initials="V." surname="Devarapalli"/>
            <author fullname="K. Weniger" initials="K." surname="Weniger"/>
            <date month="November" year="2009"/>
            <abstract>
              <t>The Internet Key Exchange Protocol version 2 (IKEv2) is a protocol for setting up Virtual Private Network (VPN) tunnels from a remote location to a gateway so that the VPN client can access services in the network behind the gateway.  This document defines an IKEv2 extension that allows an overloaded VPN gateway or a VPN gateway that is being shut down for maintenance to redirect the VPN client to attach to another gateway.  The proposed mechanism can also be used in Mobile IPv6 to enable the home agent to redirect the mobile node to another home agent. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5685"/>
          <seriesInfo name="DOI" value="10.17487/RFC5685"/>
        </reference>
        <reference anchor="I-D.ponchon-ipsecme-anti-replay-subspaces" target="https://www.ietf.org/archive/id/draft-ponchon-ipsecme-anti-replay-subspaces-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ponchon-ipsecme-anti-replay-subspaces.xml">
          <front>
            <title>IPsec and IKE anti-replay sequence number subspaces for multi-path tunnels and multi-core processing</title>
            <author fullname="Paul Ponchon" initials="P." surname="Ponchon">
              <organization>Cisco Meraki</organization>
            </author>
            <author fullname="Mohsin Shaikh" initials="M." surname="Shaikh">
              <organization>Cisco Meraki</organization>
            </author>
            <author fullname="Pierre Pfister" initials="P." surname="Pfister">
              <organization>Cisco Meraki</organization>
            </author>
            <author fullname="Guillaume Solignac" initials="G." surname="Solignac">
              <organization>Cisco Meraki</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>This document discusses the challenges of running IPsec with anti- replay in environments where packets may be re-ordered (e.g., when sent over multiple IP paths, traffic-engineered paths and/or using different QoS classes) as well as when processed on multiple cores. Different approaches to solving this problem are discussed, and a new solution based on splitting the anti-replay sequence number space into multiple different sequencing subspaces is proposed. Since this solution requires support on both parties, an IKE extension is proposed in order to negotiate the use of the Anti-Replay sequence number subspaces.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ponchon-ipsecme-anti-replay-subspaces-00"/>
        </reference>
        <reference anchor="I-D.mrossberg-ipsecme-multiple-sequence-counters" target="https://datatracker.ietf.org/doc/html/draft-mrossberg-ipsecme-multiple-sequence-counters-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.mrossberg-ipsecme-multiple-sequence-counters.xml">
          <front>
            <title>Problem statements and uses cases for lightweight Child Security Associations</title>
            <author fullname="Michael Rossberg" initials="M." surname="Rossberg">
              <organization>Technische Universität Ilmenau</organization>
            </author>
            <author fullname="Steffen Klassert" initials="S." surname="Klassert">
              <organization>secunet Security Networks AG</organization>
            </author>
            <author fullname="Michael Pfeiffer" initials="M." surname="Pfeiffer">
              <organization>Technische Universität Ilmenau</organization>
            </author>
            <date day="27" month="February" year="2023"/>
            <abstract>
              <t>IKE SAs may have one or more child SAs that are used for traffic protection. This document collects arguments for (and against) having more fine-grained sub-child-SAs. They can be used to separate data streams for various technical reasons but share the same security properties and traffic selectors. This shall allow for a more flexible use of IPsec in multiple scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mrossberg-ipsecme-multiple-sequence-counters-00"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6).  It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC9255" target="https://www.rfc-editor.org/info/rfc9255" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9255.xml">
          <front>
            <title>The 'I' in RPKI Does Not Stand for Identity</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>There is a false notion that Internet Number Resources (INRs) in the RPKI can be associated with the real-world identity of the 'holder' of an INR.  This document specifies that RPKI does not associate to the INR holder.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9255"/>
          <seriesInfo name="DOI" value="10.17487/RFC9255"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91963YbR5LmfzxFDdV7TLoBmKTuPDO9DZGUxWlJZBOU3e7L
ygUgCZYFVKHrQgq2Nc+yz7JPtvHFJTOrAMru0z37Y+lzLBKoyoyMjIx7RA4G
g17vwYPk6iarklmZXtcJ/VLfuKRauWl2nU2T2k1v8mJRzNe9Xp3VC3eUfDHK
k8uLP5wlaT5Lzi4qNx1M0srNktF4UBeD0TgZrVZlkU5vkuuiTMZFU05dMprN
SldVyTfpIpuldVbkX/TSyaR0t0fJ5dl49E2vNyumebqkGRiUwcdmkK1o9KUb
lFmV3g4Wae2qmiBOqprmfp8uipyeXruq18tW5VFSl01VH+7vP98/pIfS0qVH
ydhNmzKr18mI/uxVNf1/eZScnV697N3NjxKdoffhjj7Ma1fmrh6cYP7eNK2P
aKZZrzctZllODzfVIK2mWdZbZUcJ/TxIpmlOnzqaq0zXyW52naSLBSDaS2jp
N2l1k9y40hHuiqlAWhUlwXBd8V8YYuau02ZRE94LeWC99N/3es1qhlUfJY8e
0qJ6aVPfFOVRL+Gfgf6bJIK3P7jkT43/rCgJ5KuKIL9p0uRdnt26siJM+AcI
RboBn38KSHOEiz/KQ+uGFi2f9ZNXaTbL6O+TjD7JprV/bUpjHCUvXPYDvRUN
RrgkSA/29/efPQoPF01el/T88U2Wp/5jt0yzxVHysfngfl8riEM3a4bT/B4M
/CfBsqIHk2//P8TDD7q430+ZTD+Pie/SfH7tsuTrpmhj4s83RT6fE+zTJk9e
p5OiTOui3IaNP399jAe2YOC4yW6a5LJIZ//Uyp8//pUrnzfFWtbz+x/n00U6
+fzaX7j8h3SZ5cmbYTKe3tylZf1jGwlfF8V84ZLXr48DYAxv9KdC1IUlc/X1
7yf0RzUd0i7cAwJhBRAnu69cXq73km/TCAdCkcRmA5klxXXyJstzVxV1mqR1
ctIs6Kx3kOmf2MTbu/GoC+mNwPD72bBZ5sBYr9fLi3JJ3PfWYV2XL48PDw6e
26/PDp/i1wf4/fmzJ/b7w+ePnukjxIQOwq+H4deH+uvjw4N9+/XJw8f26/P9
xzba4+fPn+jHTw6f2sBPHj2z957uPzSInh76Z58dPH1kvx7uP7fRnh0+emof
P92nJ3pZfh0v8ezt1elr2UMVX6PpTeZuwSMOkqvJqhIRltxl9U0y+uZPg8cH
h/w4+C49vSqzRbL/pJ8c7h8eyDhpOcchuKnrVXX01VdEBHdF+WHSZIsZbeYw
IzGyGE6L5VdVQXtIkq5aZJMyLddfPSxng7nLXckCcMBPDj46+rWapkTWCzcg
yTklOVmUg9QAHRwMagJUpOEAgOqb6eyWjrGbDW7dlM7wwH2sXV5hQqxiEGT3
YN5kM5JCJBUHg0GSF7V7f3Y6/vr9W/qt18Nn6YSOb0rHtyfaQDFtli6vkxVJ
bfq3EiHdT1L6pCBpVixYupNAJrCz6gYIhULQgIUqTiuTvRNCkXN5MmrqIi+W
RVMl43VVu2WV7I7GkJbyGlQPVi0I2rzGmxU/NiTZTF8SXDZ5n58tymxO7KLG
u6R3pLNZlUBE4uWpfOzpocghYR3UkqKp5wW+XKXTD67GcctohS+KkjaQ2FpD
egBD9uKy2uvzsjBb6aYuu9W56NySgkQiHN+C860qgTCeUAfmgYbJBc+Gx+jz
azqiya1XhqCtkN5TrFakSE3WPB9eGwreEyEGmu5edSpJlwX2gPSPFTG8bJqt
DDGuGvZkl5fZbLZwoANSdspi1kzxaq+no6Y6arUqimvGnqiDK1BGRg8Ql5Kd
SpNKXjm78G+BMgl32KMV4VF0lexHge66LJaMjOKO6H+YMP8jvZF0zEz1rqSk
t3nwklZL1Fs3QEpBqyaKxbC3RBeE8DWUJqJ0+n2eZnlVe4D7BBY/IHTD+hmR
70x3WnFPEiRbymOtdQ9FE/ardTmOJG0xbVRJfJ+5dFrXNFbVT5YFTUyA0TPr
5JaO+tJBACYnxdgeSlI6SVk1bSroxySQfvpJGe2nT0OcNNINeeeXAGZVVFVG
Eyap6s+OlUI6gbcgaCCmsz9DGpAUXEbw4fAA4CkT/vSJcFRNy2yCQW5IbGPV
BEaFh+4nol0itj0wSTCh5K2wtj5TS0qqvRwGVpTpr6H/LQGNKrEwXqY3RIgu
nwNqnrhPTGCaQleeZdfXtG7iLaBMklK38WerYkGkq+cKdERsmDA3cyvaRnpg
se7MWrq/N1npZO7O2IQ94hULUXIc/uRjK8eru/evijtCdNnHPuF74oguF5qv
aZcXYl54XoaDhkn6G0gAi3QMFkl2nhXkSnRXbT9lRAknrlrh2bVLS94hd01c
hPRKYqC8nNYcxgQrph2cjTs6GAsci9WiWLvZMCEbLVuuaIiUXiabp6K9zQKO
simZHEzOE5I7+dSY73RBAMR8O3fXfGivhakQFmjYhYNoYIKRUy/4ZBGWLVSb
WUBMslxzChdeIjw3lxcv5SBARSBC5d8hvj996otQ+Zhikr4gU7mCGpkVHYul
Ux6aLZhTg+kwMul7olMsjxgMiYxpCoK/42PGHFwZDATcmhQ1Oq00XZN/yIkr
9QWyCNZk2TApFwWRre37dbqgv3I3Zx2DxEQ2dEOiGRL4BDPtIU4QU688Sac6
i5+clMUHGkZB2RtuClxmczgALAsHgh9oSISrrs3N30Etw3dmdhPFZUYvHZqL
JM4uS5Y9kzCM62m5XtXFvExXN2udAd8tSZNI86xaYuiSNMmpUzeBygna7/ZE
JHKwAao0eLlOU6cYluRZzdwR20v0izPGpwvbL8qD4XuLMEuSUyxzlWYl3uSj
3mCnz/5wensIGGl7CqLWGtJCxwuOANKupplnd3tBMNuUJLcqJ8OmQjk5nzni
tCKdU2JyM4h/3QwoNl7poGFfuRSaxO7o1Z7foUPaIVocwXOaT9NV1SxkRR6u
i3S9IIsq2T0dX+zZWw9JUOgckWKj3K6N8j5YUnGHMe0weKlX0Nq8ekEnB29P
RN0B6jvKzZC9QpfCWOUkvCZDoknnjoVW8sGtExIMpG3tvHk3vtrpy7/J23P+
/fL0j+/OLk9P8Pv41ej1a/9LT58Yvzp/9/ok/BbePD5/8+b07Ym8TJ8mrY96
O29G3+2IFNo5v7g6O387er0jHDs+RLxtvGg+CMSPsXNp1TOhyNL4xfHF//nf
B49oi/5NTSHmRv+m9gb9Qawjl9mKnPir/EnoWvfosIFVZiIIaEMzEhHYA+Lr
N8RN2O9DiPzyL8DM346Sf59MVwePfqcfYMGtDw1nrQ8ZZ5ufbLwsSNzy0ZZp
PDZbn3cw3YZ39F3rb8N79GFP/IiuJKtbvYXHxXLJSGvARWgTltX2fQpbMnFE
v4Sz0fH4qHcELfu4IDkzremQlCya724yOvgqyGgeOgwLIl01Upgjg6CL3LE9
QPtGz9KXK5JUrFqBv5CohNnNB4XODQ4sEbRqHDRw2TUaWBHHigSYswtAh3MQ
Kb96jAh0LIBe0BXoKSvZqIgW4A9hk8/INGTNMpezRywTL9+rpNko3gTZ5AU6
HMFnJg6tjQ5wSeqAc9teyFQ24Own5zT0bebu5LTPC0Iyr48eqlTdzFQ3VWGF
EW+y+U2yIB1qoXu64ifpzTtI6yBmCBY6IvoBFMxKOM634bGzqtfbLpew5QsT
Tr9CzHlzlVUGD/B9mg50bWyOqTtBHSA+THjMln7hqoWwSUmYhmwjCJfJHXgA
qFtsHqK8mVODTt4g9lCxLdRl4KIneg5uNjUR+CJdm1EB1YYd9QvCdz24c/iH
n3PQfDKaWViWXyspJ8LHW+vBx5Ant2wejuqYKgjSljXcNzOULezkzejYG9NK
YB67Tk286iZb2amQZ77oLphWotOS9MlWgPwLsZZtvpaVTWvg4ZkOCYQ+Xiv0
JGOUJvdiWT0DC516yMcVYIP7yPkXGYD3oFzPmQyOb9z0A45a45Lds2NS5Gi0
xYyP04bMf9VngV4xrdhS2cG20EdIktOXLNaFwl95sv8WZG80/ovKi6fTtKO8
BHOEDEgy1lRBYmWrdTgnZEMBT6VbiOKO7fF+mXGSN8sJbVoflExcYg7DZuoZ
XqUU1UzIOmNuSSbGNRGGB5b5kjgfusqUi5UpXoloUTAG24gdvSKxyaoTECth
nrScdfD4whF3NqMCa1Itk8kRvMAtHNRLSAEaZ4mHOzJi+8qqG0HW0gijpbMO
iT/RevyCofaWGIlUOf6LLSERPaLyrhythKX9dVbCkiCR2OSswIWHhW6qFkym
4YaPQLciSAt1SygdsYiFVFPfimeB12TeLNZqdJxd3D5KWLW+fbLHThLekDt1
3NGgBQxnPybJpfpG3hKL4/aJGEOKJ3BIYqD0AWguhpw4SVKvVyyYwdqvSaSz
X8KYuWhH7Au5zuZECwfsC/mv8OP92Nt+fjto/fz2sw//zP8/G70dyZ//upFt
gsG9P7/q/W8+M/Q/BOw/+r5ghnblMv7z/9n8X3U/+Osm/gYHw2SczXMQ6PHo
M6NtQeLGR7TAY0cS/ZpPX2ewX1jMxtfdpQn2Xp9dHkR/bvn6UP/svv/Pzr+B
zc/+/LVLmp8hwq0/3/R+effv/dk4ZT8nD80FgZ+ff82oOkj3VRprlOekUU9Z
24k24ufkMBDT6WlMCz/bE+1Xe51d/NlD/ktw/bZLADYWMiN0rC3nbeuPPQl9
zI8VSYWUvv+12/dN0np10lnjA/mh3zaOYucnfra7Rh0LdlDC3z8ivI+St0FL
YIFyIirYuv3s9rH+hXAlWzndvT/37GMLLprst7/0Ez17L75I6fVIeDxMTkjp
SK5IEauWmZio9zz7Gbj0hzUNU1m/gip1/7P34uuX17gNX/9KPhErCD8dJQ9U
eZCw7n/sBGOSNQ51IQ93PvV6B0EfnmqUx5FGRmrgpZsTaqGuWwgKnyCaB3ct
CUdE/zSMJTordIk+a66ktGWleC+ngZtAlaqIz7D+F3EZ9hAWrMLvHpPaHr+i
lsPrYroFEnr+NcPhPQemBnrAxLbshlYRv9xLdqti6epsyVbgLCODqUa0Kku9
4cOTwb+CiNeFmAwlGT/ji709VXnh8EqKSZ2KWgyvK6lwx6N4FX2zcO+Khgwm
xgH7Okl7l1Du7ulpe91MmKlYmMk5G2yGpspc1OeEq+Az2fQD8ESw9yY/0NLE
CiWzoWa3fyb2AMyOaBeh7Grc2GFIgggLI/vgOvuoIcDY1zrztpP5eMZv2cVe
V+xg4fcce1DMipjdY0Dw2JsRIqjvTL+kB5OcAj8kGRWjik05sAEO+l2Jo0lR
nTvMp9p/5z12p8Ou1Lk7X9Mn5ndMFtkHoaQXXzOvEMO/RcMzWmkeBTKRicHK
uxfDaSRDh+alb/vv/TPqAmlWCFMFHGxFHYJy00UzM0u/7XjjGDvhYxdf7QQZ
t4PoigigvCOA1Aew9shEkDm2u+kdTWUQ9Im1W63z6U1J2/BjZPFyeF83Y+7E
oTEedUGOXI2Rp5Gwk9IBRd5Ir/fYXP3BUKQ3DLfiJFA+rnbdTg0RwQgkI9rt
7DEe03Y0QsmWcNbxkk3Wln2oB509kCRcslyUFYTOmVrVx1OwIkIrqwUaDOsz
QLxjBLGi3C2YR80sdYJjCZGFr4gPs70wp52OG3wBbPJWTan+tuBQYk8bwp8a
7+h33ETO5oJPE97bslgkF4s01zDGNZGhBDEVRVN9ZoVnIquVN9Id9XpfmpYo
u8rQZBU7HYSOKzvIXyYXjU+MaRnI9I0r4V+OE2WENrI8g9PRcibUdgcBSpwQ
boIANPM1yQsRhkOmOHH+FdwHL+Fw6JuHrnMCg7MjZaWYXj8X/inBjyePnj37
9AlD4mTxQbx0HMcsSB7xYrJcskC+5+XGqvP3R2zME5McHvQ2vk2Ojv4jGRPP
OX17fJr8FAwRzoOjNf9l/2+ctPX16WVycvpy9O71VbLfD8+l1dkJreHsJPpM
0QsvyUrd5dG3SBoGsC/Oz1+fjt4mnwBerycEv4kc5GvAqQifoz+j7Ud2IT+B
mtLNm0UqbMFoqMW39visyLbWEtMVNx8dkVl1k34IcWXj4LF2r4lHAsZo/EUV
fcspNFkVjcSeJqVVnen96N3VK1KGcCTnen7acUR29KgzSAL5JN5ly89bAh4M
6jznwG9r1gxASeg7uOAYFGTR3IKdeq8SuGUn+Ur9bxquQoiSn8qLfCCvaUBf
nOkxNpKUWXKq6Q3sEyPNYAq/W5kVs2TXDUlYPtmHz7EgcPUMEdMUithR5y6k
+1RVBseD8xLbzrdVUQNprHM0eUniAxPSJqiGRI/oaHD+M6/8vi4b933fA0wT
iDMQC5zQ6kUVIQnBAaCVpgUm2TW2riWykC2GY32Ooe6yStWtDohE+M1SNJwJ
GAVgNUj7kdBhUH41xoW/3QcUaZjOEd+YEe0S9mfu0yfg+aU5XlvpcBNkaoC4
+om85RMbhhJBPCHNj3iT+XTx2YPkihMukftx09SYp9eTQzQeVZzhRYutOfTI
2hpNNHPLkIsIRJG9idSMlYXYeWakl/YTy586GD4aHgB4zhzx29JoyhTP2FfZ
XtGRIuWcOWTOIbwBrYx/4awEJeoZZlUJDFcv2RXzOXMWi0k6fUbB5O0hVITM
Ccw1K1jI5Q7WS1rCq+un59kYZOL8SMfm976ozLku8gU0ycnZTLyZ2AFs+bAv
2MPpc+0UUnAR93GFjKzagxzP5t36K+C/roX4ZoJtZi2KH6E+wxGtahNDqUcm
lC8lT0kZC8dek20lDwXWkZBsRJYAT2KVEp7J1xZM6nJeoV+1Qt6evx+dnJxJ
ZPv9GBGRQlkfi+KtFPOQ6EVo4rqw3As6k5yuB3pfEepcJXrDOPnNiDcizRhJ
nPcG6yVdIDUhUQvWaHwHz/zmBc4d4V4UsU0YMUm0Il5LXpAGli0Yy9A2iJhs
6/oYkXnQTbqo+dhfNyUjdgOPPD8pwbSUBRKoB4jVic8ftHxDqiQKXIgCkdzY
T84v+aHfBF2b9Yvc3WE7mZfQd7woQCX6dFpLuuDhIx6wYgB164WbteRsDB4n
Cq5lyb8ZWRpVhH3L3txMIGIjnfCcANEWhmYyyNeeRfZFPdbTCVThLIqCCV3J
PsUCCSEalk0XSEC9LTLarpoDs0Kmi6JYVV5i2SYzAospJ/kRCicEkmi6mqjq
gyYYJJPUHdsC6PGkZ6yHyiQ5RTFwyKsCmkwUKAJWSBis+9uUHqaJlailHXpm
jRKshuPBR+xOGRFhIwuq7nJmnBP7cGAf0iFhWwDCPz7EVWABjr9lrsY5UaBc
UBPy04PW72dhT84MFgHYP6dSo/Qqbw3/hRiF8JiQvCbFhAU2wB/XJPPEJPGi
ZovRxDl9kabC716ydcHgbNF9g5bS0Zr53W/TrA5baDQvIHlybMt1STuBOspb
x6tcc7y2IJrKwaNjbX4LSJv6R7YkJQHnE+4ToALcJSCCtooxzkeAoLJ0Jb9T
BACrdi65atjQe0OmJ58ONj676+t74pF8XKQyN06TKDjN2OXs12ErRlFuaZy9
3u+Sq/OT8yOoBsijTkSVrQTMGFV9+grR+4z1cE2sBrCsE0IDzMRu8iFz0U+D
SyB80O8KCz4BBO9cEjWIo5FczEp92NVTie9/XWLgYzGAWY6ziQyWpKFuWBc5
+y6VzkraR3FjsN9KDIYqJIOLzh6YKkvHKTsbJqTXLpFykJtRSCxgItFxzmXx
ICZwAcIsbGXX+kSpjLduKtIbcfLa+1SAGXZwMGDLFKxMJfKqFPWek6d46+kM
K2UIKeEcszhWHsu7wkJxZvunWQ+qcrJvE0NNiqJGQcpqxVn9YvNv8PE7RQOd
cOZ0TF8hxs6yS6PrmnYruhuhhdYPjxfYGDPlJYL4hBahWWwL8VbYPFdt74Os
xMOC3EjwIII0m7G6zcZjpDu7sqTBdG/17UUK91fb22AoQEZhsjNnQlJPyo5M
jcE+uuVKE4tM09PMVJC22YQ7/kVOdxGv3UQSRMoorZM1E9U7kF5fVuG0w3Wj
4PoJ+NCGnNJC18kcQXnOLDqRfnCf3hON73ImOUv0CQlbkO06B2dR/YqJkHWw
QPHJXFLRW9gjBOTw529bjKbsCYHRijM9RKTLZnNNcG+ljJKhQ6b9gLfs06cN
vxRODGT6IqMR6A0itUKeKMzrNmildp1E1SKcMW1A9P14VmMcTsvx+fkfzk4h
a0PxxxMt/oCKCoGLwS/e/fnPr/m5/wlv7T7yW/e0NKaSo85eH6tWkZw6Gu7+
QoUHEplSJ9posfCVSiEFUjzu3rHcyVgRx9+MTXDZcHYCen+iZmtfnOHFRSFB
FWb0JawWOsHY7WrDGS1J8Gqhbcv1PrHc893x6GQPkg96VqpLYFbFDmtsMPG6
kAVEj5tbZSMGQe/PEda5Waq74dWb0fFg/Go0OHz8hL0/lUAOBZyFLHHL2BYn
lczdokij5Qk2b+xGpVpZcilB2snWQ8YcpkJ5e81+NimYQRJUK9uT5VxAvU/E
O7velhSKhNx87mUtJEWucRXbdk5E5F2ahUq5LVMkXBonHmbm8J1hcGrSvCs+
+pJ8H7l8Ee2whHafNxYHUK5u7AvV5Ix3muCJMGP+HqG5rjMdbGenFhVHPsAo
DOAwMd28Uw3D7M1iGu3xBD1vRt+F78PYWhCnnkLklXHViVVUkX5F7DsEFOiB
Ava2OQ7ejU/fX12O3o4vzi+v3r85Pzltm6+W6NhWavpinEiZZGRktzUUUhPM
9bAeRn7TbQTZPdasNNxlyJBn3ew+4jDC6eaHKlnGr/wCTW4wlm30uZn77EmT
7UAbTlxfv5Y0Ydw3GocsgrgB6oR5XqlpGJcI9rfpNUxF4pmDRdphAhuar3hP
TM2HmxBJgYod8SsWJbJvreaW4womX7yGt7fpyWnXTnbnZZYfrAuk87IgAI0z
9ObPuXcEEetwPW6tWYVd688QrIwIhyDSRTatNZOSofDOOj7PJPfsIfbTaBht
FWJMv1i8I77LvrgVSsn5zCHbxqeX35BsK6Y1bciuj1CjVjMrmoo1QQ15sel7
R8okWNaPriz2kLZeqG9kZzylHVJXtHIBAXGms28mTR7+uozJgy2fHW757GEv
2aeHD5OHyaPkcfIkeZo8S57/I5/1fjv4J//r/Zy8dR9rQz7nklhB1Gs6Zpxb
4tGeWK4JI49/+/lfAkP3JyrOMulMStrMfSQl4uJsr/P0fw8MDMbfG65FfctZ
2slLjjRs/flvg+Ef+CEYuh9tTbEfnB1/k+yithrq4V5rhH8BDP80HrakHB1a
vtE7PaOjVzCq6ZhyqhGHl+ITrZ0MQpkOEyzKaYMdAu2l7mSd4HMJXpMINW7N
PREycw6CWZN9IUWJ4k3hwkzwc85KZ+cpWApZfXJQboH1SquuWH1mC3D/KIon
+pJ/N/D+OA0maJ7RJrPsWz6SxRU9x/f+sNAuQIVALKhhwX2ZHByJ9JKwpjCC
zaJHFYLdgVFbszkw11Nx0KyNAfOfxFYEuz0b9BxQLXI0HvB2RVkLgjufc+87
XnUSNujAirIfpLmZ1FUzvfGDNfkC+kfdqb9kjcPiLguEBmtzzeAhtoeWUEGj
d2webkWBbH62bFqzAWLblzsucY1RxUpQVKrUl1KozBt1mYSGtCJ9AXUUbcK8
DorDLOgF/lqqr1bF4J3litXalIxKuOXgLAF8IK+HhyJPK3Vpnx2/uaAl3xHb
QAehqF1ChUJ9uLuzulHF2yuBHEZCOFB8nFp5Z3YQ6Rc37MXSNiwSKJeJNCLH
olnw1BcEcp2yFAknV0WRvMjmye7F1Yu98BJwe4Gx31y9Y1clFraWCFRyldFR
PP04JdOF9nEJVXour1zBN8kQiuivXBuYSuEE6hyZBICMkBpl9XQKnRKfohfq
ZUaqCYMpZELEumaLh9KSiYNhpR19y2u7RAfi+r+68WHUjXouVaRVb+4no7cn
vcPuK/fbhnFwX15+2HrZMk+wGwJXyBESeobXgBeivGI8+iK2phkLxaRCMSkG
4Uc5CyfGOdssEqgvyjuUH2Ve5wZl5dhE79HqhwYIIWYS25/iZLsyO5cHLkMQ
obsQz9d00Ryg9f4l0ADXdQtC2FURL1iJgP1m2kXGE4h4+MBov9WCdrVMNolb
SdRyOgPYvvLfciZmyfdE8d/LwbcppV0G2n9AM7/etk6fzmTu/E0fa4k2Vnml
VnRaqi9QBOFsRRYRkkeqbJkhNGju5BbPCEo4Dpt2M/EVtUzqUg2XiIvs8eN9
JD7tqitxicNfsYlf7qk5EiIe4t4PJnzfk6VgWhB3V6aranvbIbE5o9o2jTJL
2b+48CTwi7AROsmUvgOB94h5v9J4ZKIT7E0XHjaQjTkhouMow2h7IwHj/DDe
JccUPRpqzT1pW4VKsFBIfFXn7tg5CYXujPL1NK3qnT6hWHJRuEOIZIlcBex9
VjI8faiSAThDMRp7IsFqXxGSFiwdXiN/FeayGHWyMWb0efkjJKyZi9fXTmx6
wsSb9GO2bJbtnPt3OWFgl+bZs+wlyA/rKBLqk80nFGIFVrqoyVFZmqtmJsar
T/ZBQ5Wqatxn/ADafwSxo5xBTKdTt6rZo7qDhnAlMLFjyY/i0c23ZEaY1Pfv
hPgJ8S07kypiESpgo5UDO5sRYwm1rJra+IGOKVLiyy8vyoxeRGOVhZvNvfoo
wpie+/JLiQxtGRovqeNLV+zfsm1QXwxLTnYrBPeH+GH7gZFK6wGOvjEroS2F
IuSkbjhFrAAOPEnV09wD8bd3unlhyeliisYdnUXL6F5WqkTgGOpQ0HFKQm/Z
SsfdwETrQ9O2uDMNcwrp9XZvKIxJxcks3gZApFW8EcsiRxya36bh+5ocYLob
C/jOmpCmJi7gu9ZmROTHXB9unzz+FC+7sN4QrM82ginLuhmER9mtoZjYMlsA
DYkeHIZEOPPvTSq5xqyFF3mERJFKShAHj/f3lY14ZxC7JoFnxBArnYU96YgU
EHpc2xlqZ5yf5A5HZQDrnjM8+k6La+NU99HXX7+8HH2tCbfPHz56Kgm3W7y0
ujNriWdrmFOKn0Gxmn9XVwNpEyCc9YGwx1MJsoG+N8WVimRx2YF8OHogZ0ae
Y8UXKsKCeeRNsVIWopswzyAoTBxpq6pdo8LZXsANnJKc4vtjsA35hHBmRhBT
0t/EK+dble6OhryLcDFpX2U6xzpF2ENv66u0eLSHhTQV0Ynk1nX98jEiQt8U
H6FkWWFrai0pyoOL3g2RU280gvHXNcduu15VTmGHdII3fk5gL7SqAbiCLPUy
XXLhSFm7etExWXTXbAfM5AHjBrMqsXNRBZGPm3CXKkEWt8fpHs9sulwNvDZF
x3OP8ecy5rWCvGjrZPWcG3R1TCJ1PEbvtyU35BVCf/To8fOQQPdwiKZIiO+G
5EltHmCRyHhZ2/YgULrnIpoJZo1KQhs8UrbuZU0WJDIbCegInEe6xvjGGVYY
YAm5YRxNJzSlVDOqWPhjB1klmrhoaDV1x7Vbwf9xJgUAfqns7zY5m/oCAf/9
veIAlCJ8ZNMqpWNEf5/sqdL79OGzh2FPDoePeVei9g1kTEqBDK3QG/ttHkWY
8O3zmtyXEiEbYkkomwUjXfIoaUqL1TIsPhUIPnRBmgYgmPkMxM8+p3OLPEDS
H9VT3mWV7JnhsRAlzKy1lXVoCJLBS0pNXycAsdHelvus+EEbqCi52BuFJEVb
UVy/s4dH/J4KYXNm+N1sAQQ6UYlkIW+0P7zGw26x9tak31dmDZLfP2ucScI4
gqffZv7kdglm+GvGtOZ5+jn9xd4iNCvMLPS0bZxJ3JYx9kFFiR1x/8eyVZKz
NS50tVkR1MKhmY5h90Q75gZpcpr9hBDc9GCJJKwIDOj5vp6BuBsGVOdD3p6M
OxbiOVVKERrk7HMNNEGbaL0A8sFRgfSOvBFg62p4K3VjYknwCQpUWqmfoRJN
+2WmMU3vzCAq3O1y7r3gZG5Pc2bJcqxv5sDThHaAtdZjH7KFH2ULGw7Hyfqw
8oGmCVQ8Xm/l3xzQgjkmMooVuHheLY/S/Af2wAQ/mRn6mGW7UwmZgHI4285O
1j3Uu20gbTKEPqdEsshSypLeLXBcWxKWaZwGh6Lzi8osf4Rky45HteuWPhiK
+RMNIJm+7OKd9WNvi4HbIiMibq5SmC/WNhqeRVBxi6TE2EGX51qiLTyOTQPO
HFj7+DAWil5Zmp1K43AKTjs1VzddNW41XhpODLe+r1mtbnfOfJ9wL82CNGjp
qAi76HrA7lmJjEuTYG5/KxVN4oq1qDmswIgqON3JJMkk6JjqMgxZqQdPaLpa
wsQO+Xerdb+bi8K5Ct4l2fa5CffRnrwoQKzddYOEsWriaGFk9FqS+PVCRaqH
2TpYh9MMJXdgyWIQd8jnjOqZrkuJ/K3NiLGEec7/Rpdl2kSsH7+ilyX8Ilea
STjmPkgG0KU0EbsIcafMct9/ehCsB5FMIlfbUsQ3UkN0JpvfIAaycB8z4a7m
+tyebR9Ka7nTceCzAkBrokrzVK136F0RtbIVwIKUtQadG4veWrFxOHxujjX2
SQpKxnVaN1WUavxtiapsuRCF5RFyo+NnNQHz5XFy+Gj/KRYoVcKdGibt2xZC
fT4jWJyK1db1i1pU+QgS+/LoWSJm2GdWLWN22c6xFnvsKJ/rYmIQkop2r8bZ
XrLIMJglvvl+XyZxw8whYWZjTHU8Oh6z/MUxW91F1U3JJBMZmOOReFjKcs0D
bSlG03Tl4O+J9U5lTdIZjzN7JUuMNENR51nELyV/nhOaufFXVNfH300LU+Oh
L5n8Z1uSC5q2KiTSkM93Vmbuv/Qp3OJC4wzjgUoIWSzYIimFdK7yDFXAGuX3
vdjSqu3BphOQ6UENLdDRYeGjaaDtRIEKzWTf7pmPQH3L8Xk41Iq3sPXI/0KO
rZWimBaKOGQpltEmoBYxMRfz5enF69F3g/HV6Ord2IIF6kN7OXo9PjXmenx5
Oro6fX/86uz1yXvU6UdZa5owx7lQUnrQdlX5GEyoW+ODVC7NtaCI8gyvspoY
bcd3mn/mpLZQcqfN4QrVIbtjMwqQqctnVNmcnUxUouWRomgtC9hpsGufgvCM
7jRYtaeKoHVcTb4/vnj3/o/vTt+djr9XXtjK8yOL7mxwMsQdJf7yJKW7dBBZ
o2TgQTVfph9cJJVwPACE7yPZpgyhd8AMputT9WecJEBmStWQMlu3+IhD2llo
1uAqYW7EhiwSr14DOqc5nXw6y7NYsYkQrtZHsSLVRgvkK3M9qdIED/ZpFLQ2
cuYt0aNfOQgPbtOtwNjLJEpRr6W2lznarChqg5g0ds9bJ1xHcWgtopWtxawP
9zkgyTuKInVg4FoC1mhsYLa9/H1cmivtG1MkIzU6tIPApZMokSV9P37y7HE4
74/FOQgIWmFecBqUIpp3A1USPt0gbLtac56vZe0O68FY0sPdymnY0og37dKO
nQxpgUh6ls+U1dq+rpRszQBPqxCRmuViXZN8wmJ+aNQ+CcJJYNB9Ei5furop
ubdBVGl5NX5/cT4en714fSr7F0LFHVGtYVIO6WzlbyrLNWoM0KJ2CrIiWJpR
Y+726fF6lqj6oRwSDsOItAOz6dBfr/eSc1yUfMKVMT7VoZtsNqatWXHBinIX
WjqpxLlnMJFUGlT2sHQ7f40jpR1qAZWOsIQoprHnbSZFKtHAZMuAbzYi4aKs
Sn3ubf4kXW/TKovuPmgJybZi2coTJ/Z/HErJaO88XXjeD+tHTyb0FM+11BK0
koB4hyRSepfHUVpeB/eIhUplolIjdSrSwj0f7GjPfiCLgXv9BP1Gjxc3gVit
t7absGr4ZoUBrQCP70egx+GOEIFSco1YXxxZkvecTvUaDUlLNWQEeO+2Fi/6
cjOfmp5JYFvVN8KZxHTSOPagDDNqHbPtOLeSoLtpXzqamvYbaShyKQbL0vA0
oU7geZBcGA879Qeg4zf2Fx95DdHX5vhEZtp94pqR5eCrQ6OB2FS7c2L2wr8M
vapVflBzJkR0FCFf74jv3ZBhqj5izbQbsIeznSjIGT6fS2XeTKIjtC0EmFpr
T7Q+0fKe2r2LpHbYm8DgzKTecgtsO4tTmNFOLXzJqtMeJMFa6zQ31vCILImz
QHO9CaKVOyYtszvL9gncG7kL6MS9mWJkNZq8xRL2ViNBvMNCswf7g4f7H+l9
qAyVCLhWtc+0kDa+q1Qzu32LYsZ/fFx97gQ7/SUCmBd8nUb39iIua1OnB7aG
jzH6r9Nhm2fq7gkXm4zyzadLZEp4WdZuX6ZHZ6qN2ZYrXjUXIbYzjbxwkYQn
kWIpqzrqohCFn4VN+4oJzY7JiJVL7AZtrkibVgLlwqqus77VJwA91GZmq1XY
AKJCiX7DjPOWl14swo4SVj6kLpUlzEROZGm6G8+v3e7jgc2tUqs7fUtI0J7w
a/BEQ4jg7vWLQq7BEowbjoX/ivTxiqAv+DPHFua0vErTp1mblO7YIPncJNA2
WKYRLKzqEEFO9QSDOolJZnIjK0v86GYjJmw71sG7ZA1O4oJnWbC+IlicNGQB
5haXw10HyTnOOa7hyaWztiiHcguQ3BEgQUsugCVJDh+1k7S+1kdJ2eRaB2Rd
Umr/jOZtZMIzpZqZC/tXMlKd8p0+Fjb26bxm1VhxdTyQpT7BPyup09olnruo
H3NZETfwZg+MZLregmGoxOPcuzrOFuJkAosTsMXXXiHfV+P1Mg543osIOqbE
ldLcSfqG1CjHWq0WFG8uy+oR+3ozXed7zo29hTAroxPI8repJM/AR98ZP+lS
8Gslh/w3V5NzWqvfrS07Bafq0qV55bUpcRL4JnoyBe+mSlQ/PIeA1dLheOLb
q4uNmk9cLMlJIy81tQWAhgsWafL6ppgFHWYi/TnZmFpvolMuDGl90k5ibG2U
qCw+v79Ur1z7kXvx34+GDnR7lc5l3+iXYWKr0mKztVAYDwZpot62ynNwKWMz
JmLlz77Jf7uan3vGs/yfcntFTkRsXztUS4NIfysMb5LNruhmH7YoMamVy/LY
4cqC6GaK6dpH2M3Xe7V9F0jxUgQpT1UTONxf9AdCyKl1NrNaIe2AU1tb+4ll
mG49atHmaWAIGcSi46fdD7iRSEYMk1Pf42LmzxwyWso9+4yaLs2+i3o7qNHA
rIKZv5wiyVNyVk2mZdFgMYRtEitlNuEcckDTnoXfnLjoQhKN6ZihvkEvMiOM
6Ynr3MfWJREW+nCJk2oUtXiWGIJ1oGK5Em6agCPGpDVydjILzpqbJo20jKB7
d5t4SLV1ttUIKhCQr6sQwfZpC1687flbVFg9i73A0PHE8+SLe/tRt5jz3bf/
63DPN6LioC/InDOMt99WduaveNBbEV2lF8jAfGDvHeYoOqLUZ2dGbqjWIpjw
tA+utfTtdJxtd/yQ5wfyT3J6fPJKe7AdPkXes+mr8LdZ5IbzI7knQKxBVaZH
TtbMzg2/7dl7PaWN2FGxZOXCZ3DTd2nJjWjQkIY1dSFAniAUTsUdcOXSN75T
taVv+6sgs9zfmEnMABcSiXkUwyHFsJxezw22UBg7QUiGmRz0NrHuWt42jgWz
AekrA49jfiZa8A3n0UGRXFTsbdMijr7PD3cf4uuTWGyU0Cc3LINyktW4OtiS
C0yF5KC2loAxxfiA9D2V/kqKHl3dEBygrSxvNPaZiOUSHvd8Xa55ZY1cUl0u
W9cUadnF55zw/c2Yb2XBB1aa4wVpufFmvrB0KWrbUNzMS+4wJbRwcxEfSRJz
iaFC+qQ1FmEf5l6/xQqcxQfiO10naj1x3TwK8Gj/b0P/FmFMyH8bf/eWqPmP
786OLa+r2uMaaavgQ1DBt4LrhHX4thV1ehGY96de3ZsA+oCg1p6MHvafHoQ+
jew24MrrCP8h7+uu2BbLFcsjymXUq02FiAg1E5JNH8KBiewJpc/jdtm69hCT
uKA3iqwRwgbftqxk7Z4ZmlZa9N33WGv3+WtKpxFCawuHYf2q2dnNrpsQeQzB
IPMb3DYLnGNsiZ8ui0J0d9YQIOowuhDTpII5Czql30MhBfeapZM2t4DUWXRT
l15JJkJ78zoyuzvK3/IUyZL77jWTkg6AkMceU7ZSr/nWYw0u6922UU2o0AKy
7yAiF3r3oTg4Sdx+ZOtzM+lBN/WuCE3fvFS1CH9esOjL8qj/nolXHFbfjHJz
/M4tU/E8DHtTcZurP/0Pf0/ortwOJWokaWyzYrm3CdIWyld1DYeNYKIROT/H
Eik2ITN+IDdDq8NZMw3ZPJYz+i1YFUlDFJI6u9yVzqnvXKB81BebNHqVdNdj
UVsaF6Epqz5gwRijqaRphkfTRsUZ6+cBgKjWtbFYFjqnTH1yxm43kTwvJHgQ
5osamA33lIgYqu2UZNwtaNDSwrfqhzMVor3q3uXgdORCtXAf4yi0syvgdqvb
aTscCGxBHBqndryPjdQkWaCKY22hktjOwFa/qwZvW07tdFIV5YTIMFwbvyfH
LaBdk1DBNTCTaMd0uAvpCwmHd6dbpT4X94fR9rVbN3YYkZ4M0LrkN756Mbp5
264zxE3gdGrg45CW/zMVtQP4vHisUDcb3e2MnaDvzjQFeP8h7g7wF0zg9BIA
bGBFAea6mPMG99sTb5vU0rbM0tf0/Zk5bDgx3dOF3HMZlWG19LhKb8D19Wpa
EQ6LzF8lZ5wzbkG4lCvCIX/IyBmktyR7dIi+fBTnhFd67UZtTU2Khkxq5btW
iQXPOK71QDu82s0z1cul8XsijW79zrM/88svT5UZobZI6gfM5PIN4wl05oTW
00QofN5IJ3+2DlPvuNGmXVse0UaonBbLd1LA3vQoioINvmasfQWeutikWacC
64yV1qw4iKd6xQVloWtgu+fvmaYmpiWHrZZ6CWZUvMqb8uLrCzgSUtF0tFFi
YlNKDUS9daWaQCzplQafBvKCK539hixkpWM3b4aWQHKdl1JRaEDgRY9MnrIQ
xOOeOKRWUIktbriGDgCcKkBKhmSsqqtEu9e5Wct2KZ3v+7w9O+CR5AK9jTtN
Vp6ikUpcu9x613hr27JigQYNOGiqlb8bQ/0E3u0HmN5Yv0XxgP/04M3FRVmQ
vFh+ivO7p8WNmB1Bv5PBBQuhS56lCXEWRZw7weSoPdZkLuPZ41YnVNEbhRqC
Q8Y3+vIpRhbxgfcyjW5G9wnWkveNhpPpDBtJqz8J2jtB5b+xuiHx0ZQZ6RCc
YKHxWhjWfn5fSgFp1GpzH4WOlX3E1oJCY3cf8U5cBBZkrN6bztvzN839UK0J
BnQSb90UD/eA48oSHmwQ7kqPL4dlD2a4eQfosqbtpmcq85DS5VifjVozWjXM
NKXBoeLy4FHVhLEeAGUNTCKlMKpTQXdQzqaVNubTurEeFW1tUEMsUaM3CQRe
q3/22t0JFLOCwxAw/32t8WxL29XHrI/erxHXNxsX3/uHGUesv3t/IFdc+ea9
MnjNdTuhje4Vkak4HZj8xEXppIl8nFPl22f1E95RvtQ5llndjndclbhA/JHO
kIi7xYbjKWXb/XD/8CDcaVsTM2jmNysh9gPcHk6SsuZUZrmxge93EYHFRpdw
M4UWvqjiGuUBTtqgaySO6ylKUjJwi8hrc1K+HV2RlkS2Hx0Zbh9pnFQqAJBz
Idpw8Mry6YGokux/H0imoQaEV1Qzpla7XrU69K/lYgC9mtqUDVYwqpqd4Cz6
Tn27aysWFxvw4vaJHUut1Ku8EbxQ9xffyBqVEPLhUqicJgcxwfSj8ieCSrxh
+h0+81nrdgY36+bubtaqdoYUd0WTHjnEqkV+0beLYLbHvWYBtTYiPdzf133h
2r1eLzQyfYzHwkNJla5R6PI7WbDnUnLxNhMoYeSDr5y1+8zYo6KFOiCuw2dW
+gu+wwdU9XOxbiXQnFpSAW671eIIHl4qDaMrsP/r4f4gGvI6dCuoW9diaxWH
z6PwHQf8sEkySvIUH9kNOP7aIdERBKOyp1iH1sKVzcISeEqyxZgsbtlI3rWO
A/WetLvRGw58UVYbId65ITsnxhtroyEc0drHLSXcRplQ6NXmMZqLHSVyI4kH
L9h2DQw3Uc49lHxnRSjdUoLDy6QaqABpd7i33Fnmx3rni0UI/LDab0SpTxNk
Wv1aYnJ8dB85+rQhb7Xtuo8oo/FC4VWxGkzWA/qHzAxhlfKotFnEyfEJo1Dg
iW9xHJZLTRfOFL4ccg0ePM038Fep2w1mvMf90OvaZC4XVivn4BF2o/RjMZeZ
8eI76dHOzpxUojacjwfWtxeCZD6sfhL7le26absn3Z8g3+iFdPN2G1VcEsB/
D/B31JsxnQo3S1E3XFXIic9qBwOW78mznh6xixaaAWesyO1JrrsvRJDRdg4P
uhuqibUyllQksO0qc1W+BELK76XDwIKvhZnZ0jpdY7E6+ygs0LcsgkHCyqRs
uZkUHbgtCuLthMBi0+ioFnLTSUKWygzSeaMeYtvYfMDzrkYzczXuUWCf7CJK
2xREHMWOQ8I5QGGFWTPuhcOhCYw24tjSdku1O3azZnVobIS9E6Vt6kWpxAvE
1bq2AlMLGsEHtVmcLpzZ7jNpsay6Wy8aGsxpuIFTh1RpzfJuiwGZH9Xv3Jcs
XD7YoGyPyYATkrZVM1lD/9CqT/RVK0MRtCDljBRqKUnRrBVfvmhFye0qR9+R
T+L6X+F4IyHIXgsFyqH3XnjFhJ+ajIG8xJy1V6eokSM1R0x7djolO2qh7piJ
GrUWCO3Kokp6bimr3kBxrCBM+E5wJzrB88PHj2kLg9LByU2+fbXGkvm9+E4y
5rag8VVTcvugbuZi6MkF9lyuamHfVxarvJOmB3IJHssZn2ZQ602uG/M1lYtz
S3kcgtUtroVZFCGDZtvdpla7gMtNq73kr3/RS7D++jc/epZbvQOyMAxCKTQX
M4jL3KUwcsavyNUbdtcdxzPSxYC0PN+Dsl4Ph5yqCoA1S29K2yOsVPrmvr2M
2hVOvA+u3dsxGnlWTBvV7krxnKZ6EwEm0lbR9hCLdMG0J+noDgnUIHCzdvue
SK274Zpwj0GYjbEvBws2qcsr2K1befPaUEpyX6xmac9LvDD6MCEM+YoXXM1U
a50mRxBlcqvV1SwDiASnBYESm1x7l0j70lmGVQFN44oHwGzq5RfKUzy1AzHI
/ywR/ZHgV/X3JsVNPhERVk4PjOpf/GpYgY8ZbAkfav05M3a5nyVUUElpEK9p
YznRHbogejPl+UrcDQ7UblXmM+0V2h0j0B0v0PykYM7ef2NttdmewlXM3eh7
yMPG5cl2rVV8Hw69+u//NhjgGu2p704lJDwY/E6+u3pxMuS/erhVHLHG3v8F
LdUE9iufAAA=

-->

</rfc>
