<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-bmp-over-tls-01" category="info" submissionType="independent" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="BMP over TLS (BMPS)">BMPS: Transport Layer Security for BGP Monitoring Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-over-tls-01"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Steven Clarke">
      <organization>Vodafone</organization>
      <address>
        <email>steven.clarke@vodafone.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="05"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>BMP over TLS</keyword>
    <keyword>BMPS</keyword>
    <abstract>
      <?line 57?>

<t>The BGP Monitoring Protocol (BMP) defines the communication between a BMP station and multiple routers, referred to as network elements (NEs). This document describes BMP over TLS, which uses Transport Layer Security (TLS) to ensure secure transport between the NE and the BMP monitoring station. It updates <xref target="RFC7854"/> regarding BMP session establishment and termination.</t>
    </abstract>
  </front>
  <middle>
    <?line 61?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as defined in <xref target="RFC7854"/>, facilitates communication between NEs and a BMP station. Keeping this communication secure is important because it includes sharing sensitive information about BGP peers and monitored prefixes.</t>
      <t>The  <xref section="11" sectionFormat="of" target="RFC7854"/> , "Security Considerations" acknowledges that while routes in public networks are generally not confidential, BGP is also utilized in private L3VPN <xref target="RFC4364"/> networks where confidentiality is crucial. It highlights that without mutual authentication through secure transport mechanisms, the channel is vulnerable to various attacks and recommends using IPSec <xref target="RFC4303"/> in tunnel mode with pre-shared keys for enhanced security in such scenarios.</t>
      <t>Additionally, a recent draft proposal, <xref target="draft-hmntsharma-bmp-tcp-ao"/>, titled "TCP-AO Protection for BGP Monitoring Protocol (BMP)" suggests an alternative approach using the TCP Authentication Option <xref target="RFC5925"/>. This method authenticates the endpoints of the TCP session, thereby safeguarding its integrity. TCP-AO is beneficial in situations where full IPSec security may not be feasible, although unlike IPSec, it does not encrypt the session traffic.</t>
      <t>Alternatively, Transport Layer Security (TLS), offers endpoint authentication, data encryption, and data integrity defined in The Transport Layer Security (TLS) Protocol Version 1.2 <xref target="RFC5246"/> and The Transport Layer Security (TLS) Protocol Version 1.3 <xref target="RFC8446"/>.</t>
      <t>This document describes how to utilize TLS to secure BMP sessions between a monitoring station (acting as the server) and a Network Element (acting as the client). Unlike BGP, where either side can act as the server, BMP's role distinction simplifies the implementation of TLS in a client-server model. Henceforth, the term BMP over TLS will be referred to as BMPS.</t>
    </section>
    <section anchor="bmp-over-tls-bmps">
      <name>BMP over TLS (BMPS)</name>
      <section anchor="operational-summary">
        <name>Operational Summary</name>
        <t>The operation of BMPS is virtually the same as the original BMP specification defined in <xref target="RFC7854"/>, but with an additional layer of security using TLS.</t>
        <t>In BMPS, the BMP station functions as the TLS server, while NEs act as TLS clients. Following the completion of the TCP three-way handshake, as defined in <xref section="3.4" sectionFormat="of" target="RFC793"/>, each NE, functioning as a TLS client, initiates a TLS handshake with the BMP monitoring station, acting as the TLS server. Once the TLS connection is successfully established, NEs can immediately start transmitting BMP messages, as there is no separate BMP initiation or handshake phase.</t>
        <t>The following steps summarize the operational flow of BMPS:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates and completes a TCP handshake.</t>
          </li>
          <li>
            <t>The NE initiates and completes a TLS handshake with the BMP monitoring station.</t>
          </li>
          <li>
            <t>BMP messages are transmitted by the NE according to <xref target="RFC7854"/>.</t>
          </li>
        </ol>
        <t>A BMPS session ends when the underlying TCP or TLS session is terminated for any reason.</t>
        <t>The <xref section="3.2" sectionFormat="of" target="RFC7854"/> states, "No BMP message is ever sent from the monitoring station to the router." To adhere to this standard, the monitoring station MUST listen on separate ports for BMP (non-TLS) and BMPS (TLS) sessions. This approach also offers a simplified "make before break" migration from BMP to BMPS.</t>
      </section>
      <section anchor="transport-layer-security">
        <name>Transport Layer Security</name>
        <t>In regular TLS connections, the server has a TLS certificate along with a public/private key pair, whereas the client does not.</t>
        <t>For BMP over TLS (BMPS), it is REQUIRED to implement mutual TLS (mTLS), wherein both the server (BMP station) and the client (network element) have certificates, and both sides authenticate each other using their respective public/private key pairs.</t>
        <t>A self-signed "root" TLS certificate is REQUIRED for mTLS, allowing an organization to act as its own certificate authority. The certificates issued to both the BMP station and NEs should correspond to this root certificate.</t>
        <t>The operational flow of BMP over TLS is similar to standard TLS operations:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates the connection to the BMP station.</t>
          </li>
          <li>
            <t>The station presents its TLS certificate.</t>
          </li>
          <li>
            <t>The NE verifies the station's certificate.</t>
          </li>
          <li>
            <t>The NE presents its TLS certificate.</t>
          </li>
          <li>
            <t>The station verifies the NE's certificate.</t>
          </li>
          <li>
            <t>The TLS connection is established.</t>
          </li>
          <li>
            <t>The NE begins transmitting BMP data to the station over the encrypted TLS channel.</t>
          </li>
        </ol>
        <t>TLS version 1.3, defined in <xref target="RFC8446"/>, streamlines the handshake process and supports more robust cipher suites compared to TLS version 1.2 <xref target="RFC5246"/>, enhancing both speed and security. However, widespread support for TLS 1.3 remains limited, with many systems still primarily utilizing TLS 1.2.</t>
        <t>The BMPS is REQUIRED to support TLS 1.2 or higher to ensure secure communication.</t>
      </section>
      <section anchor="operational-recommendations-for-bmps">
        <name>Operational Recommendations for BMPS</name>
        <t>The BMP over TLS (BMPS) is RECOMMENDED as an alternative mechanism to safeguard BMP sessions in scenarios where alternative protections like IPSec may not be feasible or deployed.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The BMPS implementation increases computational demands due to continuous encryption and decryption processes, resulting in high CPU utilization and potential vulnerability to denial-of-service attacks.</t>
      <t>The TLS cipher suites that provide only data integrity validation without encryption SHOULD NOT be used by default.</t>
      <t>The BMPS implementation SHOULD follow the best practices and recommendations for using TLS, as per the Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) as defined in <xref target="RFC7525"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2818">
          <front>
            <title>HTTP Over TLS</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This memo describes how to use Transport Layer Security (TLS) to secure Hypertext Transfer Protocol (HTTP) connections over the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2818"/>
          <seriesInfo name="DOI" value="10.17487/RFC2818"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="I-D.hmntsharma-bmp-tcp-ao">
          <front>
            <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
            <author fullname="Hemant Sharma" initials="H." surname="Sharma">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="11" month="April" year="2024"/>
            <abstract>
              <t>   This document outlines the utilization of the TCP Authentication
   Option (TCP-AO), as specified in RFC5925, for the authentication of
   BGP Monitoring Protocol (BMP) sessions, as specified in RFC7854.
   TCP-AO provides for the authentication of BMP sessions established
   between routers and BMP stations at the TCP layer.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-tcp-ao-03"/>
        </reference>
        <reference anchor="draft-hmntsharma-bmp-tcp-ao">
          <front>
            <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
            <author fullname="Hemant Sharma" initials="H." surname="Sharma">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="11" month="April" year="2024"/>
            <abstract>
              <t>   This document outlines the utilization of the TCP Authentication
   Option (TCP-AO), as specified in RFC5925, for the authentication of
   BGP Monitoring Protocol (BMP) sessions, as specified in RFC7854.
   TCP-AO provides for the authentication of BMP sessions established
   between routers and BMP stations at the TCP layer.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-tcp-ao-03"/>
        </reference>
      </references>
    </references>
    <?line 142?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is the result of studying all the referenced RFCs and drawing some parallels from PCEPS <xref target="RFC8253"/>, leading to the specification for BMP over TLS (BMPS).</t>
      <t>We are grateful to the contributors of the RFCs listed in the References section. Their work has been instrumental in shaping and inspiring the development of this specification.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51Za2/cNhb9rl9BTIDdGJhR6leTDFBsHcdJjPVrbafBfuRI
nBFhSVRJyu40yH/fcy8pjTR+bHcLtNZIJO/73HPZ2WyWeO1LNReTD+dXN3Nx
a2XtGmO9OJNrZcWNylqr/VosjRUfPl+Jc1Nrb6yuV+LKGm8yU04SuVhYdR8O
EeYe+27PbsRrOnJnkmTSq5Wx67nQ9dIkSW6yWlaQmVu59LOiqr0rpK3kbFE1
M9o+86Wb/bSbtE2OvW4u3r47PEhcu6i0c9rUft0oOi1XjcJ/ai/EKyFLZ6DC
4O1kKiYqZ3VlST9Ojz7gDyyZnF7ffpokdVstlJ0nJGWeZKZ2qnatmyewZT+R
Vsm5uGyc+Js4l7VcqQqHJg/G3q2saZu5+Hx9+S25U2u8yueJmAmyv3NZ97vz
R/x9kyT3qm4h75UQ8Zxvn+lHsOobjifvfqZP9LqSuqQlv6o/ZNWUKs1MRe+l
zYq5KLxv3PzNm8HHN+G4lfZFu4BHNg5+86LHJ7SrJId72hUP3ixOw4mpNi+f
8/LXtPAVUiaRrS+MJa8lAv8s27IMWfFFVRIRveGt/M3Ylaz1n9Ij9HPxm8nl
0tSKP6ngnYL3pEHcr/dxBXvqsYAbrxABcVxKe6f+ogDHe9KM92wJqA2Een2P
kIrrT8d7u7vvw9Ph3sHP4ent4d5hfEImh6d3u2+7pwNal1B1jE56+34/Hvlu
9114Otj/ab97+jluP3zfHf5u75C+ns4+plve91kzkwZCktlsJuTCeSsznyS3
hXqurLl+d0SulrpWTnishLlVW+uMHSUWyj8oOFJymjsf3so6F1Vbeo1sFMhh
r6ybCquWylqVC2+EdKLGVuS5UCXXlBOvL07cTipuC+0E8KGltxDtMqsXED6s
o6l4KHRWiNbhw7N49Rord0gaVbRVwtEHJXy/vtOe7Lo4YbXpkSRVG2dEq1Jx
6kVEI/H9e4zjjx+wayVtTivZB4rhSaCC5KLUrmAz+GhlK12Hs0IMKp3npUJA
Xolr9XurbfTEmaxXLbAmxAbgIghdnJicf725JRCjv+Likp+vT/719fT65CM9
33w5OjvrH7oVN18uv5593Dxtdh5fnp+fXHwMm/FWbL06P/o3/pDyk8ur29PL
i6OzCTAXXhrGSJJTDbyJTzCyscojyghxF7yc9nw4vhK7B8FzVB/wHD9TDeD5
oVB1EGXqch1/IhprIZtGSUtHyLIUmWy0B85PSYArzEONyrcqJSee1t6avM3I
xclfSOxpUJKSm1UcRHUqljLTJURRuJ9OeuQrKzxK/lT8U6mGZLGTxjtjBuK9
rigDCeQWKpPIY6E9VMjKFk4TVLWceshcTWAgemCg8lqgpNiyRqGyQrkFG2EH
3L/UfyiXBgfAKBQE79vdFWYpNolLCdHVyjEan86VZQluImR2V5uHUuUrrnvp
qeK6anbkrKZFemddGTvOgpWqcUSJ+NXGw/Z6qakJo/VOWV8YTi1atB6u/TM4
vbH6Hk4WZ/u/XV2EEBCuQb/+6AeK8Og4Upm8a9sMv7g0C70qSvzrO33RqchP
VetbWQrqNbQ3RsIXsGRVPMaESmUFGoGr3DTgHX7VqiRp921J5i1KTvd7hMi0
MMh7OCtEwSqKN5iHAzRRAE+v4OHOqJ/2YRRVT8snViZXrCWFbEYhh0NQ7I6J
lqohOMMb14UIO10L0HOZqkk2RfgoB7eBPeRzZDMpwKhJ3RfHmsY48v337/94
siGHlvDLs82C6oDJIQDg9vhqdnTJFRTz6QU+GOprAoVXSCBP3kHkAQ419zaq
aWskI3goFSVwvjgaB+my4T/sPupwP37E9lApxDYfxjR2J7i+MZowFJnenRoh
meNp1WItnFwqAGwAbe0d49aKnJyKaCaELJDMS035xa7XSCMujpiORCZifPsQ
VTJkPqBwqaTTSJUp2V1wrrV1qe9U2DOles8N1Kb1qs7suvGscddAkJJLiKcg
bxxHUX6534HbLpeECp0rtjJ/KtDBZCeRX1Dm8sveDUNQJBD5Ly22j/pvEMxI
k+7FqIH+IOlJwv93zn5sEgd0DkPa0+wAjYCKMgILzx74Gat70JfdgLI87vHi
NRgR/ZYuxsKCcexElL+IjOUkMJbtxVmp8RYM5muIM0pjGnNFaUo9QQiLBgbZ
mR+LmJKOf3eAV4BLrh3ODTXm0ChKvdQxv+kXCw/qIsnJUmqNUfwsnMfgAlz8
gjgr1KkvApoRBxkxKQAQ0hj5usXOaEpJmZk8Mc/h9SsUZ+wWqI+btqqkXYeO
Y7oPpB6tZ+zUlmAYnYGNBgnvHIAArDQdwlFqVAZrY/0/15oXbYB3RpUeATG3
UE5BaF+PAV2gOEw5rVmZaU/xupgv2+Br12lEhnZhCV2PO32IGX0Mrnap+GTK
0jx0CAbsR3Q6yzv0QadRavYAZACg54DYO/WYd3Qtej896Hr0+30yVRFIXpxM
ey1jwsmBIsASJLJmEAzve0nBTc+T2qkY5/DG9FRcInX6l2i+ddQR0UQfylBP
BIHrDdNV+ZQ9RRmu0QZzUgkL8B0Vzy220t53TLnCCSC5gckxNNPRNVVtIy1R
AloVTWOn2oFhTSGdihxn2YcBM1pD6lE6Eg74YT4iRZZY16UlJqHdlGEJ3H/g
QdR6jGTwJ2LYi02Tvb+y5X8JQZrspyN/BD7deQsZslj3E0qWmdC1UKWDkqAm
EUqtHz+IgxCJ5q1tDWpXrrkYYI6xMdBhLbzezSaQRl1d1msAgnQ8qZC5wwzd
G7NIxxSZ5gczNINOVQQbjqByaU3FmjyBuTCFvoQ5MZ2IWwBQzunAXyjdQJRz
tOvpc0fwPIQU9LCXaXZMIGo1gU6RZq9rU8+40VDA2F2h73S9IbKLnpwwV43t
VG6gGGSoosAuCFnxB566m2CYW0XYY2NJoDcdjgIvn+t9jEyYIdtS2q1SixQ0
QnqxKXtlfUBJoGhp4IiAhpGTv+koNU2OjdQ2tqFRn+rJB7T7FB20BfPMUeCP
bsIke/oG1PFqXl4F5sFSgGcLEzM+av56ALc7/Zgd9Xi9dRGwA0PBEAc2ukBR
+FRqoW5E/AJEGm6wPZvUFi6lZsJs8xm3MIGGjuVy5vSKsHhijfGTRz4e+oCS
qeIrCNmBjqxHt0fcQUOzIG5JE+ooYHzpFbhmMbYTglwbWnDvwu17FQJYjL1t
SZBjyUhT532lkP7DI9OtljyGwE3Aqch0pSkFiTbFeuNP/V73DGCG1te3h1jO
w5G4A83ODsw7ji86yD9bzmY4jDKg3Yb6xM0gSaPVB/3ql089HKswOvriZPvU
n8Pqx51v0OzS5G0ve6HAYdzjHse0OnqkE81OD8MKc3AV/BwHTYoYft1vGPD0
EQ8KbHiKE1HUVdnfzQ26ozXUoDljXNsEHKwIraxZtA45ohtmpK2O9xuNjORv
LH3E46dxKiXrQjU2im566s2UCsppHlSgTlSqCIrsVeDiofOJ11u6VoXPSuSd
J+rAGFZR63FrIHlFuE/kFGVL3RxEIrD7SOlIuZjeHckcAlUnMq5k8qBXZPOj
C8HRHQ2T3jG7ve6m+jj/xX5y0wvfBs6gS3+TxnxtPP/2twysajeOjgcVGjq7
UT/OEcMjmn4QJx92c+VTIyjZnqumNGtKWuL0z1z7DL05HjQwjlD/iKnS+s41
OV26g2nkLXdr1ApSv6Vrkc2AGeZL1f+Muan4StjRNTFN4TWHRxxffY1h3kBe
A0P51qe/gdF8AQSBuarxfmaWPPdoENZ4HRMzgwtrlOp8NwQV7mkW46vGrdH3
XpY6RLq/QhrYsrlBJQ+3LtAzFKiEIenzDoz7AlPlYsXUSooQ/87U1vXRINH6
EYZpchOh46mUvAnZ/NUpngtfHrVJ3EcYDs5SvbD2Y1j8xC3pIV/HcDadHl0c
PZFJw0GduAuYPa+UIWnT+D8iFggXnXLU3zjyJXjyfR7+15zKf5kswcTU5Mf2
qTrAXsgiHvx8mzPLpZvi8AnkTfE9GpQOXs6tDLOCwRBKRLEsVekCa7s6PkHs
AsjuHfIEVgLAIuNmFB9NqMunmRNs+6bCjSjxUMxJ3XaqEKsxwBrb31GxZsxe
83C5TvGNejsCqXCvfMu0hqkSuXNBlxgAUG/ZGfGWqpBNoCR0lGu07YbTHKBc
mob9xnKp5Q9tSZP/ANkaLzELHgAA

-->

</rfc>
