<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-esp-ping-01" category="std" consensus="true" updates="4303" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="ESP-PING">ESP Echo Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-esp-ping-01"/>
    <author initials="L." surname="Colitti" fullname="Lorenzo Colitti">
      <organization>Google</organization>
      <address>
        <email>lorenzo@google.com</email>
      </address>
    </author>
    <author initials="J." surname="Linkova" fullname="Jen Linkova">
      <organization>Google</organization>
      <address>
        <email>furry@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2026" month="March" day="01"/>
    <area>Internet</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 42?>

<t>This document defines an IPsec ESP echo function which can be used to detect whether a given network path supports IPsec ESP packets.</t>
    </abstract>
  </front>
  <middle>
    <?line 46?>

<section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>IPsec sessions between nodes that have global connectivity will by default use IP protocol 51, known as ESP packets in IPv4 or IPv6 headers without encapsulation.
On many other paths where NAT44 <xref target="RFC4787"/> is involved, then the ESP packets will be encapsulated in UDP.</t>
      <t>ESP packets may have advantages over ESP-in-UDP encapsulation, such as:</t>
      <ul spacing="normal">
        <li>
          <t>They require fewer keepalive packets to keep sessions open.  </t>
          <t>
** On some networks, ESP is be statelessly allowed in both directions, and thus not require any keepalive packets at all. For example, the IPv6 Simple Security recommendations <xref target="RFC6092"/> specify that ESP by default must always be allowed and not be subject to any timeouts.  </t>
          <t>
** Even if ESP is not statelessly allowed, experience from real world networks is that timeouts for ESP are higher than for UDP sessions, thus requiring IPsec endpoints to send fewer keepalives.</t>
        </li>
        <li>
          <t>They provide slightly lower overhead, due to the absence of the UDP header.</t>
        </li>
      </ul>
      <t>However, because ESP packets do not share fate with IKE packets (while ESP-in-UDP do), it is possible for the network to allow IKE packets but not ESP packets.
This leads to the IPsec session not being able to exchange any packets even though IKE negotiation succeeded.</t>
      <t>Because ESP is only used after IKE negotiation, this failure mode is difficult to predict, difficult to detect, and difficult to recover from.
In particular, migrating a session using MOBIKE <xref target="RFC4555"/> to a network that does not allow ESP could result in the session blackholing all future packets until the problem is detected and a new migration is performed to enable encapsulation.</t>
      <t>Operational experience suggests that networks and some home routers that drop ESP packets are common enough to be a problem for general purpose VPN applications desiring to work reliably on the Internet.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="protocol-specification">
      <name>Protocol Specification</name>
      <t>An IPv6 node that desires to determine whether the path to a particular destination can support ESP packets can send an ESP Echo Request packet to that destination. ESP Echo Request packets are ESP packets with an SPI value of (7-TBD) and a Next Header value of 59 (No Next Header).</t>
      <t>If the destination supports ESP, and wishes to reveal to the sender that it does so, it SHOULD reply with an ESP Echo Reply packet.
ESP Echo Reply packets are ESP packets with an SPI value of (8-TBD) and a Next Header value of 59.</t>
      <t>The ESP Echo Request and Reply packets utilize the standard ESP packet format as described in Section 2 of <xref target="RFC4303"/> with the following changes:</t>
      <ul spacing="normal">
        <li>
          <t>SPI set to
          </t>
          <ul spacing="normal">
            <li>
              <t><em>ESP-ECHO-REQUEST</em> for ESP Echo Request</t>
            </li>
            <li>
              <t><em>ESP-ECHO-REPLY</em> for ESP Echo Reply</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The Next Header field of the ESP header SHOULD be set to 59 (No Next Header).</t>
        </li>
        <li>
          <t>No Integrity Check Value-ICV.</t>
        </li>
      </ul>
      <t>The payload has the following format:</t>
      <artwork><![CDATA[
 0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |        ECHO Identifier        |      ECHO Sequence Number     |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |     Data ...                                                  |
 +-+-+-+-+-


* ECHO Identifier: An identifier to aid in matching Echo Replies to Echo Requests. MAY be zero.
  Implementations that support multiple simultaneous Echo Request sessions MUST ensure that
  different sessions have different identifiers. Implementations that are not aware of other
  implementations that might be running on the same node at the same time SHOULD randomize the
  identifier to prevent collisions, and MUST be prepared to receive responses to packets that
  were sent by another implementation.

* ECHO Sequence Number: An identifier to aid in matching Echo Replies to Echo Requests. MAY be zero.

* Data: Zero or more octets of arbitrary data.
]]></artwork>
      <t>Figure 1: ESP Echo Request and Reply Payload Overview</t>
      <t>An IPsec peer, prior to an IKE negotiation or after completing an IPsec negotiation, intending to ascertain the path's capability to support ESP packets to a specific destination, MAY send one or more ESP Echo Request packet(s) to the destination.
Should the destination support ESP and intend to communicate this capability to the potential IPsec peer, it SHOULD respond with an ESP Echo Reply packet.</t>
      <t>The sender MAY send ESP Echo packets with no data.
The sender MAY also send ESP Echo packets with up to an MTU of data, and this can be used to determine if the network will transmit packets of that size.</t>
      <t>When responding to an ESP Echo packet, the node MUST copy the data from the ESP Echo packet to the ESP Echo Reply packet, up to the limit of the MTU of the path back to the sender.</t>
      <t>XXX - are ESP Echo/Reply valid when using UDP encapsulation?</t>
    </section>
    <section anchor="use-cases">
      <name>Use cases</name>
      <t>A node that wishes to set up an IPsec session to a peer that is known to support this protocol can discover whether the intermediate network will carry ESP packets by sending an ESP Echo Request to the peer.
Depending on wether it receives an ESP Echo Reply or not, it could choose to enable encapsulation, use a different IP protocol, or use a different server or interface.
For example, if MOBIKE <xref target="RFC4555"/> is used, a node can use ESP Echo Request packets to verify reachability before moving to a new address.</t>
      <t>Network operators can troubleshoot IPsec sessions by sending ESP Echo Request packets from one peer to another to determine if the network between the peers will successfully carry ESP, and if so, what maximum packet size the network is able to support.</t>
      <t>This is particularly useful as the network operator does not need any VPN, or IKEv2 credentials in order to debug such a situation, allowing an operator to do this independantly of the user who is having the problems, and without having to share any credentials.</t>
      <t>Aside from being helpful for a local enterprise support person in helping a guest (like a contractor) to make their remote access solution work, this decoupling also allows for one operator to report problems to transit operators further along the transit path.</t>
      <t>ESP Echo Requests can be used as keepalives, to maintain firewall state entries if the network statefully filters ESP between endpoints, but this is not their primary use.</t>
    </section>
    <section anchor="discovering-esp-echo-support">
      <name>Discovering ESP Echo Support</name>
      <t>If no response is received to an ESP Echo Request packet, it can be caused by one of the following:</t>
      <ul spacing="normal">
        <li>
          <t>the peer doesn't support ESP Echo protocol.</t>
        </li>
        <li>
          <t>there is no end-to-end ESP connectivity.</t>
        </li>
        <li>
          <t>intermediate nodes allow regular ESP packets, but drop ESP packets that have SPIs in the reserved SPI range.</t>
        </li>
      </ul>
      <t>Without some prior knowledge about ESP Echo support by the remote side, the sender can not distibguish those two scenarios.
Therefore the sender SHOULD NOT treat lack of response as an indicator of end-to-end connectivity issues until an explicit confirmation of ESP Echo support by the peer is received.
Packet capture/diagnostics tools can look for SPI=(7-TBD) or SPI=(8-TBD) packets easily, even on a very busy gateway when doing diagnostics.</t>
      <t>ESP might still work even if intermediate nodes drop ESP Echo Request or ESP Echo Reply packets, senders SHOULD still attempt to use ESP if no alternative paths or protocols (e.g., UDP encapsulation) are available.</t>
      <t>The sender MAY use any means of obtaining the information about ESP Echo support, such as an explicit out-of-band configuration (for example, a VPN client might be configured to always use ESP Echo when communicating to the given VPN server).</t>
    </section>
    <section anchor="updates-to-rfc4303">
      <name>Updates to RFC4303</name>
      <t>Section 2.6 of <xref target="RFC4303"/> discusses "dummy" ESP packets, which are distinguishable by the Next Header value set to 59.
As per <xref target="RFC4303"/> a receiver MUST be prepared to silently discard "dummy" packets. This document updates Section 2.6 of <xref target="RFC4303"/> to allow packets with the Next Header value of 59 to be processed, if SPI is set to <em>ESP-ECHO-REQUEST</em> or <em>ESP-ECHO-REPLY</em>.</t>
      <t>OLD TEXT:</t>
      <artwork><![CDATA[
 A transmitter MUST be capable of generating dummy packets marked with this value in  the next protocol field, and a receiver MUST be prepared to discard such packets, without indicating an error.
]]></artwork>
      <t>NEW TEXT:</t>
      <artwork><![CDATA[
A transmitter MUST be capable of generating dummy packets marked with this value in the next protocol field, and a receiver MUST be prepared to discard such packets, without indicating an error.
A transmitter MUST NOT use the reserved SPI values [ESP-ECHO-REQUEST] or [ESP-ECHO-REPLY] for dummy packets. A receiver SHOULD NOT discard packets with  the Next Header value set of 59, if those packets use the reserved SPI values.
Packets with the reserved SPI values [ESP-ECHO-REQUEST] or [ESP-ECHO-REPLY] and the Next Header value set of 59 SHOULD be processed by the receiver as described in draft-colitti-ipsecme-esp-ping.
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If an IPsec sender uses ESP Echo Request packets to determine whether the path supports ESP, an intermediate node may drop ESP Echo packets to make the sender believe that the path does not support ESP even though it does. To prevent such downgrade attacks, IPsec nodes MUST NOT fall back to unencrypted mode of communication in case of ESP Echo failure. The node MAY switch to another path (e.g. via another interface) or another protocol (e.g. IPv4).</t>
      <t>Intermediate nodes can can forge ESP Echo Reply packets to cause the sender to believe that the network supports ESP even though it doesn't. This may result in ESP packets being blackholed and ESP sessions being unable to transmit or receive data.
Intermediate nodes can achieve the same effect by allowing ESP packets with an SPI of 7 or 8, but dropping packets with any other SPI value.
This is not a new feailure mode, this failure mode already exists today, because intermediate networks can always choose to drop ESP packets.</t>
      <t>The security considerations are similar to other unconnected request-reply protocols such as ICMPv6 echo. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>By sending an ESP Echo Request from a spoofed source address, an attacker could cause a server to send an ESP Echo Reply to that address.   This does not constitute an amplification attack because the ESP Echo Reply is the same size as the ESP Echo Request.  This can be prevented by implementing ingress filtering per BCP 38 <xref target="RFC2827"/>.</t>
        </li>
        <li>
          <t>An attacker can use ESP Echo Request packets to determine whether a particular destination address is an ESP endpoint.  This is not a new attack because any endpoint that supports ESP likely will also reply to IKE INIT packets.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This memo requests that IANA allocate two new values from the "Security Parameters Index (SPI)" registry. The following entry should be appended:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Description</th>
            <th align="right">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">7-ESP-ECHO-REQUEST</td>
            <td align="left">ESP Echo Request</td>
            <td align="right">THIS DOCUMENT</td>
          </tr>
          <tr>
            <td align="left">8-ESP-ECHO-REPLY</td>
            <td align="left">ESP Echo Reply</td>
            <td align="right">THIS DOCUMENT</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Tero Kivinen, Steffen Klassert, Andrew McGregor, Valery Smyslov and Paul Wouters for helpful discussion and suggestions.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>minor edits since -00</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6092" target="https://www.rfc-editor.org/info/rfc6092" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6092.xml">
          <front>
            <title>Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service</title>
            <author fullname="J. Woodyatt" initials="J." role="editor" surname="Woodyatt"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document identifies a set of recommendations for the makers of devices and describes how to provide for "simple security" capabilities at the perimeter of local-area IPv6 networks in Internet-enabled homes and small offices. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6092"/>
          <seriesInfo name="DOI" value="10.17487/RFC6092"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4787" target="https://www.rfc-editor.org/info/rfc4787" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4787.xml">
          <front>
            <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="4787"/>
          <seriesInfo name="DOI" value="10.17487/RFC4787"/>
        </reference>
        <reference anchor="RFC4555" target="https://www.rfc-editor.org/info/rfc4555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4555.xml">
          <front>
            <title>IKEv2 Mobility and Multihoming Protocol (MOBIKE)</title>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>This document describes the MOBIKE protocol, a mobility and multihoming extension to Internet Key Exchange (IKEv2). MOBIKE allows the IP addresses associated with IKEv2 and tunnel mode IPsec Security Associations to change. A mobile Virtual Private Network (VPN) client could use MOBIKE to keep the connection with the VPN gateway active while moving from one address to another. Similarly, a multihomed host could use MOBIKE to move the traffic to a different interface if, for instance, the one currently being used stops working. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4555"/>
          <seriesInfo name="DOI" value="10.17487/RFC4555"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71a6XYjt5X+X0+BkX+k2yGZ3hed8ThqSXYzbi3TVNvO5OT4
gFUgiaiqUANUkU1Hfpd5ljxZvnsB1EJSiudkMvRxi6zCcpfvrsB4PE5qXefq
WJzPrsV5ujLi2prapCZP5Hxu1ZrfjK+nl98mmUlLWWBsZuWiHmtVL8a6ciot
1Fi5alzpcjl+8jRJvhCulmX2k8xNieG1bVSS6MryV1c/e/Lk7ZNnibRKHotp
WStbqjrZLPHjenZ+enEufjD2FouJb61pquR20w0bn9HeSSrrY2ySJU2VyVq5
Y/Hi+ZPnSZKaDPOORQPS3iSVPhb4fCFSWYrGKSGtlVvxSC+EzHOxVe6xMFas
pFuJlbIqEQKsH9MLfHXG1lYt3DEvkamFbPLaYUR8vy38a/qZyKZeGXucJGOh
Szz8MBGnJtd1rTHUi+2Dsar82fSeGwtavzVmmdPeqpA6Pxa5H/b7JT+fpKZo
F/3DRHzQ5a1Zy3bRP6iy9+zggovG2u2h5S4m4qNOV9JmzpTtihf0SOXDV7zw
DEpVeQFhzsyi3kCBrCnXbVWk9reEi9+7OHSSyiQpjS1krdcK8tHlovdrPB4L
OXe1lWmdJDcr7QRg1hSqrEnkulROYL/pNWDGGFWE0UVTprU2pdisQCSrd65I
wxmpJ1O1Smu8UzW0KqRYYq9SAD0bUCsqWa+Ea6oK+nW9lSuZ3qraTTxRhc4y
CBFYhkHMc1WIWQ2kEWFJ4ic55RyIcNi73ijawWQgt17JGphaK7HMzVzmIjVl
CYL0WtdbsdFA3nwb8cSwnGLzYHXi5dORuC3NphTS9cmCxjBu/YIAi7+vAFiZ
KeuwIIDX1EKVqaxck0sSzCS5KgWkvxWGZUA8O5IIVHZ5cvPihfjrX7/++M3p
i9dvXv/yi9C0/Nrka5WNQD9YwT+D3T3ZqrcLZA2SPp1dQ2D9kQUsjLmX2VqW
tVxCJGYNGsiP6HKMGUNaR1AGlCgd4PCluFmprbDqvxsNUhdqg4m3SlUyhw7b
PaBkethpwFQKPCdk7V9+KcC7M4WKGncjZkWTosgz1SrHvHxLTsBsPB9zyElk
2JNxhRnAL4TQOCi1bukhge5TA3VjpYn4BqpRn2VR5Yql6PU00/RAzFTaWAIA
tjAFYJQx8w6K+Dco4tWTt8+gCFepVC+2HkNEdA8pBVwnNtrILTMSiSdCiUbi
rZn/hZAP8RCltS4UkOFYMBDLOVkBfF8QBk06II0ReKiU1dARFGBNAYoBYggy
z1qJ0nymMe4hYNS8MDmFlV4S6DCg5Oek8qiqkZeqlyj5eG9LkEdldOl16/Br
V/fERUAHbGWtM7CbY58alBPdlkFGRjESWaNoGVIBfAszYhb8kyjxhoPl3mMa
5owgulSSHfZhnBkvoBUxtICU2NDE9LvzdsgjeJ9c9XGdmccjoWuSTmXAL/wG
C4C2ju6HlEOSHiw1hwHTdgM/xN4wB7UucjPwO0HrJENJG2GM+gyXXS49UOPa
as32bJqlJ79US1NrRh9ZXqpUpjKI411PCtjYlJAsu1QEXIh3ZyrpEaMWcPsN
JFTA9dGsTC8WOiW4gpzKqkyn9Wj41Ltnb2GDF2QZ5CgIdJNkWoIDW9NbCR0V
emmxMTHbCqBx9Pvi6h3RFhzay5cvYUck5E7iBNTMKA95L3xiMjUNIG2Vo/21
93lx6XkO6a0QqGlDuL5FUxObUaZNWeucJ1QhOhDvzFgwSdp+E6nGggQJZSn0
+SClSlbajtdOrjCIv8PkenbomiX8aB2MrrVC2og93Yr+QbJUU0Tw/FpTDQBN
OCbPA1pUyWAAFeRHWhYIqUtVgoBcVI0FgpX4/vpSyKrKdRrcFSKct1vMZula
lWuwgkjjJRgztQnFzhtlC12a3Cy3FN0V7HlL0wDpo4tPs5ujkf8rLq/4+8fz
//w0/Xh+Rt9n708+fGi/JGHE7P3Vpw9n3bdu5unVxcX55ZmfjKdi8Cg5ujj5
45FH3dHV9c306vLkw5FXez/pIDF5wWhiBBBmjboEjKdWz324eHd6/bf/efoi
OO9nT5++Bej8jzdPX7/AD8Ta0u/GhuR/Qj7bBOJU0tIqBCyoX9cyp4jj4G0o
8FOUniT//jXAp8T41df/kYQ0xGcIM44RQSFJclL6OEPJR1A9qUi5aGukAdVm
Q4xZyoDYRDoLo1kwLw9WSqhChjTAED8n54y/bcHwEa4cc8Mg76o8FXG9yX2D
PSqHeQZIowTzeirWMm/Ycz96Pb55d/Y42NWl+lyL9+zEuyEv34pHl6b/7jEA
OPVev89am/hhV6+fjXYrLy2UOxTqgrMlRn0Uq8mnswNxhv17gJ5VFak2kNzj
kR57jibJwce/lvE3v4LxibesPRHTpOGeDZyW/ll57qhCQ3rfI0L4xJyAOAD7
zCdF4hnt50FO1RaBnIim1RaGvCq5BR+AfC5HvDiGBCUg4ieKlOen76/GZObn
s5uf2qyhT/je2OsPf9wbCbZ8OjCQykIrePQQ62m0j/VRX5QieYQehMuXAo/I
fS05UTtdqfRWfE+CHk9Pvw9iruQ2NzKjonGHcy+9Y5+Fiidi//P0wLNnB549
90tgjad4/1y8EC/FK/FavBFv/zfP/Cq/Hf+T//ll7iJxpBQxzeAr4YQg2/C5
672dkSIpbF02xTwMufsXUHMmaykmk8kBEf6Dzx41SSgedtk7FvCvuuOWvKZm
q4Cu0xXpvUWk9l6kj2U3EQg7BLyflTWToNcpVQQUbUJMZRcT/W2BbERTxeA0
fZUl8ms3tOy27OHQqUpHqQktEtanrAoxpOyN5Iqse95xBAoPkkP+idMlLvNh
UlxIhg30oRkFZePEqm3KkgQTEgInqRSj6ET1QnxAhUPrR+GKTBE8U9xiIPOK
XDPoRvzLtesqNBbAnLIwlAnWZ1ZIIxWVZwiBFQZ6pbSVYyelDRXDjlZFkSVL
XygPOZsMULED6/9jaISdCNPH4r/wiCr9wpDwkVSCdOhA2rmurbQoCjEMc5Jv
9JKU//T4If9/HXzWFbLrtVabkDRQLVEpKoAqq41noNwrEfDCFwBIHiEbn4LH
6YOCgBKmMgu5oXSpsrUMaTVlHL+h/KGSc8QgeFcq8w5kGJyVuJDh9AP3iKXF
yYdBOhNlc09i8cg9jmG8n4cksxXn/PckBb6ALbPACa1AGXNTUrKlfKI4ZIF5
MzVhAIlDX6T9LIFwmP2jPIGjS8g5WlbbsYM0oTRB/ztTkEaah+Y1VdDxxc0n
ghMtEjsd2h1qo/ncUS8GFSz3ggDD0hW6y+Q46pIfgx2Dmx+oixRYj5Aod+ny
bRL2DWzJqam2Xjnk2bn5UPdTm36KqQ4LchS4pAG5JgJDOhB4bvPfOYYPUz1Q
/eOPP4pxm5vR4r/ziyPfgm1TFh+qzr021teUpH9CyZRKRw3hk15G3qWYlH+A
wNaAYr3ps3HV5psuNAF7ZsI6avuEpKxMO18x95N7LltQZGqC7EBlqbTwHH1r
g+NzwWQPZfQR4Ipkc6aqMJT6rn4/XUdv6w4gGzYKr8qm4EttvKKa8p7qd+Rb
9L0o1euLjmi13fcO7owaP9YzvZApkDfowgG5bXug6w5AjgTyERXppKN4PHBv
lQKKsRE15qySyHCDA5irheHexzoinIt+mWUAPjWsLoP4DVf1xnobq1Gog3sU
e6YWu63kTiP3UsN2QU7Q48W0wesho4096qjQ0NLlBpBziyaHwlqAeKeAFaje
2XBwl5+RjhTRAl0sI+LyEGlsQgW8TkI7n0DbVpm+pYTdREifyx0JdX2aUnEn
ZUstCNY+tLh+JlJEee9uuSVubBYZnzfL0EkGeXUTMCVjeg7Bt5vQeOMNSsPy
CdiypE5icBCgkYzKEPHInFi7Xa/HxbrRN97jABOahURzj0rI4cRRu5LV5vt1
K5VXJAQqaqTITUrdHt9u0E61Fg9yHbWOSp7ge19LhsKjXN+SLaSm5KMTYzne
FfKW1aItgFogLgnJ6oUe88YfmEDYoXWXKVhlFTpcLnQlfSOXI2xPWMiumJ7A
PzsG8v/kXVtoLxrrz1tyE+QVx5C/DacEgwxoEHEAiK7ZO/LcwKwpg1hoqzbU
LOF2NUnKUkK1g3B+6YG80Dl3wriDHoDfdphH3G2tAzYJal5ikH1BqRWo4d7V
WfCuA1ucedVwa6E0bY5JKwVPmO2GuqH5enfo+eZ+a0Y2zwJfDAtKLqGjubJd
lL+pB6mKj4nBQ078aKs8V8TvuDbjmA30D6Fo6DBM8MGV74xateR+UC9OeInt
dRS7gy4U+i52UCEScssZV/+WmgGUDQRb4WalzzYpvuUqo2b1nF61DEUO59uw
HgOZTGjU78uQDEl5CIK1ni8bhFjqclN82WCRFCEG+3AbHUJhR92b3TUPgVIF
PqjfSypoNSo5pME9UPJHNrHoi3Rwpqedg4ZDUxiT1GdqmHLYK4HdIiTSi3t5
ZA33IDRJrr2fRXikvvPvoKZlacBoSsZncm86uTG3bK8Q9VexSRZ/htZRewog
nc63I38aAGokRTSEsMZtxRIY2EjfpATQCPC9DYPl+vIOT/LcN35VOE46gKQW
KgMD2OvgdPjyWnFRLX4XWdeqqDgNac8l2OokWXfJR8jhZNPY1g6ceKQmy8lo
P0N7zImdXEudU6zaT7k5v4D3LpQsOaE1c/I/0f23J9ckvoOYbY8yByjAyLFZ
jOfS42ZBJZtf5dGin6xI7ranKBbLXjUdZwTH4s//BtkKq60rVEIwIor9wTet
6lOlx+zYPvk7EzQotPKSpO3xTV7tdfkozWwcFdJHWVMU26Ohb/Bn8CRaNsWS
TZGTgYDu/b5l24WbIDZSmBtuKKMh2IMFPoCsOFoTYdTCjGTFkzMxvEcQ7oiI
h3hsT+UGBdNh6n272R8SAHUUYCmZBDbJ5WHnwN6BfifUvdvZpEMfQP7m/Meb
2Ds8aauruicCrjxz3t6f0rCmmfXe4bu9VVkkHqR4iuGaQ6j8XHclBHdLR6G5
/KDEo6AZ3Z3ig1MPPjIkWcpaQ6XU5fkPfab+FTz9P7N0DxsUQ8ge94If0+nE
n3Zh8GeCwZ+GMPgz+/EB4xNs1rLQi1eR8gFSHzA0huvIZ0sUHtvTgPtp9rxe
75rCP8GdbzI8SGKvS99aVZcEBDnsnk34q2ipv1G1dxttwidn7dWLUwR2pBHe
+TrO4XqFOIeBhtzcQ3XgAydqu0dL+5GRL8cMg2Nv6Zi9R1rmCqFgHVoI7S5t
gdTPBPtn/OGsCl6w65syyjOzKZdWciO2xrbAe+jicdBuwbygVDu2R5oSMdRu
KzoF5UN+6KoXa3x5Qi2PQX4TrgVM+ITG93eopQUkpat+xcoccbwWay27Lmws
5zmdaQdHK/cT6DYUH/Lt5x+UHKX+8snynj4RS9xfeOgf9pl9qbf1RU+9hwSO
7DxEHtJyd61g0HDh8i9eLghXBWhA7y4ZjWjKWE23fTZj2862b/7dw7dMV4H+
0GlXiwVdCppvu1r4voNHqPA1bfSmy/i57NwZG2+VtW5g0pb6fGTAXZCF6l0N
OXRbROZIvLMt8h/NNxtMJrfdXZxDbazAoE+BumbSbmHSJnbB7NOB2XOm4nSh
qcjBbM9KU4aMXmV8NwlWP/bHu11eGXO76ekFHbjTTUSgsH9NhUu2dw831bgN
QD1uYxaKrm80NlWxZ8Ruw1snd9y5ayZ93yt0u+L9qP1+Wzx5j/0nuPCQCAWP
QYKodd1QXwDbIOts7xGETVvxH+ivatdhivs/oYWzy+EkbBuK3OCCvC9vj1dI
Ovif6AzVOuMM/L07vRbP34TrPM/ePHv9yy989eukL5hf0bDbd9T3XncIAuMm
lpdqbBZEXgbI3hEV2UMcPzjK856COjV5uPfJfRYblUVtyenl9KaH2y/E9OTy
ZC9Qea+CQjhiMxTfPJis2p9PoO4l+kJkbtvnR20AvJYW2uPWyBT+7rN4BBN+
fEQ1P2zQbr2/7o60qdOypVsphEO6K1RRq0xlwPldONu9E2ccjyuW5B00wc1Z
QPouOR77z1384n91X4/vktfj3QSCj3f3NHsnbt5PZ+Ls6vTTxfnlDVZ/Mx4m
GbvzSMr7s+6++uorzgpO0rYDQYBkKcvylrFzQ8dv36G4L+nWzqwmF1qK73KJ
nISqvJMSgNmIi/RbSM7YEd0SoGp6Vmxdbtbs1a9lk4sfwpUsSu5i0y+UUww8
ur/lr3aRohkAp3yBIjdLuqZNl6dQIWYaGneapDp+8iT5OzzBWZK3LwAA

-->

</rfc>
