<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-idr-bgp-origin-attestation-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGP Origin Attestation">RPKI-based BGP Origin Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-idr-bgp-origin-attestation-00"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="S." surname="Yue" fullname="Shengnan Yue">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>yueshengnan@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="05"/>
    <area>Routing</area>
    <workgroup>idr</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 78?>

<t>The Resource Public Key Infrastructure (RPKI) provides a framework for Route Origin Validation (ROV), but its deployment faces two critical challenges: 1) high false positive rates for "invalid" states and the operational burden these create; 2) incremental deployment has been hindered by limited immediate value when ROA coverage is incomplete and ROV deployment remains sparse.</t>
      <t>This document proposes a paradigm shift from reactive ROV validation to proactive origin attestation. We introduce two complementary mechanisms: 1) "Pre-validation before propagation" where routers validate self-originated routes against local RPKI Verified ROA Payload (VRP) cache before advertisement, holding invalid routes for operator intervention; and 2) A BGP extension that carries cryptographically signed origin attestation in BGP UPDATE messages.</t>
      <t>Unlike traditional ROV which only validates against outband RPKI-based ROAs, this approach enables originating ASes to actively attest to the legitimacy of their routes. This provides immediate security benefits even with partial deployment: each deploying AS gains stronger protection for its own prefixes, and downstream ASes receive clearer signals to distinguish legitimate routes from potential hijacks. The mechanisms dramatically reduce false positives while creating a deployable path toward comprehensive route origin security.</t>
    </abstract>
  </front>
  <middle>
    <?line 86?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <section anchor="motivation-and-paradigm-shift">
        <name>Motivation and Paradigm Shift</name>
        <t>The Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/> and Route Origin Validation (ROV) <xref target="RFC6811"/> represent significant advancements in inter-domain routing security. However, after more than a decade of development, actionable deployment (where invalid routes are dropped rather than merely monitored) remains limited among network operators.</t>
        <t>The fundamental challenge is not the lack of security benefits, but the operational cost of deployment. Current ROV implementations suffer from persistent false positive "invalid" states, primarily due to registration and propagation mismatches between RPKI management plane and router control plane <xref target="Right_the_Ship"/> <xref target="Demystifying_RPKI-Invalid_Prefixes"/>. For the downstream ASes point of view, these false positives create urgent operational burdens that outweigh the security benefits. Meanwhile, most operators--especially incubent operators have very strict announcing prefixes management process, they have a stronger motivation and direct capability to protect the prefixes they announce, which is not well leveraged in the current mechanism that relies on offline ROA signing and validation by downstream ASes.</t>
        <t>This document proposes a paradigm shift in how we approach route origin security. Instead of focusing solely on validating routes against out-of-band RPKI-based ROA records (a reactive model), we introduce a proactive model where originating ASes proactively cross-verify their locally originated routes against their local RPKI cache data, and ensuring consistency before actively attesting to the legitimacy of their routes through cryptographic signatures.</t>
        <t>This shift addresses the core deployment challenges:</t>
        <ol spacing="normal" type="1"><li>
            <t>It enables actionable 'drop' policies by drastically reducing false positives. This is achieved through a layered approach at the origin. First, enforcing consistency between the RPKI management plane and the router control plane eliminates false positives caused by configuration errors. Second, and crucially, the 'validate-before-advertise' principle, combined with the ability for the origin AS to attest its announced prefixes and validation result, directly tackles the problem of transient false positives caused by RPKI data synchronization delays across different ASes. While perfect global synchronization is impractical, this mechanism allows downstream ASes to distinguish between a true hijack and a mere synchronization lag, dramatically reducing both the frequency and operational difficulty of handling invalid states.</t>
          </li>
          <li>
            <t>It provides immediate, "selfish" security benefits to break the deployment deadlock. Each originating AS that deploys these mechanisms gains stronger protection against hijacking for its own announced prefixes from day one, independent of widespread adoption. This creates a clear and compelling value proposition for first movers, solving the classic coordination problem where no single party has sufficient incentive to deploy alone.</t>
          </li>
          <li>
            <t>It creates a powerful virtuous cycle by shifting operational responsibility toward the origin. The core innovation is moving the burden of verification and troubleshooting to the originating AS. By performing self-validation and attesting its routes, an AS ensures the "cleanliness" of its announcements. For every downstream AS, this translates to a significant reduction in emergency operational alerts and manual investigation. As more ASes deploy, the aggregate operational burden across the ecosystem decreases while routing confidence increases for everyone. This cooperative model establishes a strong, self-reinforcing incentive loop.</t>
          </li>
        </ol>
      </section>
      <section anchor="key-innovations">
        <name>Key Innovations</name>
        <t>This specification introduces two complementary innovations:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Pre-validation before propagation</strong>: Routers validate their own originated routes against local RPKI cache before advertisement. Routes that would be "invalid" are held for operator intervention, preventing false positives or route misconfiguration from entering the global routing table.</t>
          </li>
          <li>
            <t><strong>BGP Origin Attestation Extension</strong>: A new optional transitive BGP path attribute that carries cryptographically signed origin attestation. This allows originating ASes to actively declare the validity of their routes, providing downstream ASes with stronger signals for validation decisions.</t>
          </li>
        </ol>
        <t>Together, these mechanisms transform RPKI from a purely reactive validation system into a proactive attestation framework that provides deployable security benefits at every stage of adoption.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Pre-validation: The process of validating self-originated routes against local RPKI cache before advertisement to BGP neighbors.</t>
        <t>Origin Attestation (OA): The act of an originating AS cryptographically signing its route advertisement to declare its legitimacy.</t>
        <t>BGP Origin Attestation Extension (BGP-OA): The BGP path attribute defined in this document that carries origin attestation information.</t>
        <t>Originating Router (OR): A router that supports pre-validation and the generation of the BGP-OA extension for locally originated prefixes.</t>
        <t>Downstream Router (DSR): A router that supports verification and processing of the received BGP-OA extension.</t>
        <t>Enablement Status of Origin Attestation (OA-Status): The operational state of the Origin Attestation function on a router. It includes two steady states (Disabled, Enabled) and two transient states (Enabling, Disabling), as defined in Section 4.1.</t>
        <t>Origin Route Cache (OR-Cache): A cache maintained by an OR containing its originated routes and their corresponding pre-validation results when OA-Status is Enabled.</t>
        <t>Attested Origin Prefix List (AOPL): A list maintained by a DSR containing prefixes attested by all ORs of an AS, along with their corresponding origin router ID and attested validation state.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-ps">
      <name>Problem Statement and Deployment Challenges</name>
      <t>1.The False Positive Problem</t>
      <t>According to RPKI monitoring data, there are thousands of global IPv4 routes that are validated as invalid based on ROA records, with less than 1% are true positives caused by router control plane errors. The main scenarios leading to false positive judgments include:</t>
      <ul spacing="normal">
        <li>
          <t>Timing mismatches between ROA publication and route advertisement. Research <xref target="RPKI_Time-of-Flight"/> indicates that the average delay in ROA publication is about 10 minutes with a widely dispersed distribution, the maximum delay can exceed 100 minutes.</t>
        </li>
        <li>
          <t>Configuration errors or untimely updates in the RPKI management plane. For example, incorrect ASN or Maxlength settings in ROA records, as well as stale ROA records after service migration.</t>
        </li>
      </ul>
      <t>2.Operational Barriers to Actionable ROV</t>
      <t>For operators considering enabling ROV with drop actions for invalid routes, false positives represent an unacceptable operational burden. Each event requires immediate investigation, disrupts change control procedures, and its handling cost can exceed the perceived security benefits. As a result, the number of operators who have effectively deployed and are operating ROV remains small, and most of these deployments are primarily in monitoring mode, which delays response to actual hijacks.</t>
      <t>3.The Incremental Deployment Dilemma</t>
      <t>The security benefits of traditional ROV depend on both widespread ROA coverage and widespread actionable ROV deployment. Inadequate ROV deployment becomes a bottleneck restricting the incentive for comprehensive ROA coverage, creating a circular dependency that hinders overall progress.</t>
      <t>4.Asymmetric Security Benefits</t>
      <t>The current RPKI model creates an imbalance between the private costs (operational burden, complexity, risk of self-inflicted outages) borne by an operator and the public benefits (improved global routing security). This imbalance has been a significant barrier to widespread adoption of actionable ROV.</t>
    </section>
    <section anchor="sec-solution">
      <name>Solution Overview: RPKI-based BGP Origin Attestation</name>
      <section anchor="architecture-principles">
        <name>Architecture Principles</name>
        <t>The proposed solution is built on four core principles:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Cross-plane consistency as a security primitive</strong>: Requiring consistency between the RPKI management plane (ROAs) and the router control plane (route configuration) before route advertisement dramatically reduces error rates. This proactive check prevents both hijacking-prone misconfigurations and false-positive-causing ROA errors at the source.</t>
          </li>
          <li>
            <t><strong>Proactive declaration over reactive validation</strong>: Originating ASes actively declare route legitimacy through attestations, rather than relying solely on downstream validation against potentially stale or incomplete ROA data. This leverages the origin AS's strong willingness and capability to protect its routes.</t>
          </li>
          <li>
            <t><strong>Actionable ROV on Downstream ASes</strong>: Downstream ASes must be empowered to identify real hijacks with high accuracy and minimal operational overhead. Enhanced source-level information (attestations) is key to breaking the bottleneck in effective downstream ROV deployment.</t>
          </li>
          <li>
            <t><strong>Incremental deployability</strong>: The system <bcp14>MUST</bcp14> provide tangible security benefits at every stage of deployment, not just at full adoption. Early benefits should accrue primarily to the deploying origin AS to create a self-reinforcing incentive loop.</t>
          </li>
        </ol>
      </section>
      <section anchor="security-paradigm-shift">
        <name>Security Paradigm Shift</name>
        <t>This proposal enables the paradigm shift for route origin security - from passive validation to active attestation:</t>
        <t>--Traditional ROV (reactive): BGP UPDATE -&gt; Query local RPKI cache -&gt; Determine validity -&gt; Act</t>
        <t>--Proposed Model (proactive): Prepare route -&gt; Self-validate -&gt; Attest legitimacy -&gt; Advertise with attestation -&gt; Downstream verification</t>
      </section>
      <section anchor="value-of-the-solution">
        <name>Value of the Solution</name>
        <t>This solution provides the following benefits:</t>
        <ol spacing="normal" type="1"><li>
            <t>Leveraging the willingness and capability of the origin: By performing cross-validation between the RPKI management plane and the origin AS control plane, errors can be detected and corrected at the source to the greatest extent, preventing hijacking misjudgments caused by RPKI ROA misconfigurations or prefix hijacks resulting from router control plane misconfigurations.</t>
          </li>
          <li>
            <t>"Validate before announce" mechanism at the origining AS: This can significantly reduce both the scale and duration of transient false positives experienced by downstream ASes due to RPKI data propagation delays.</t>
          </li>
          <li>
            <t>Route origin legitimacy attestation in the router control plane: Provides real-time and completeness guarantees that the RPKI ROA plane cannot offer, clearing obstacles for downstream ASes to promptly identify and handle transient false positives and prefix hijacks related to the origin AS.</t>
          </li>
          <li>
            <t>Initiates a positive feedback loop: Origin deployment -&gt; error correction -&gt; attestation delivery -&gt; enables effective downstream ROV -&gt; encourages further origin deployment.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="protocol-specification">
      <name>Protocol Specification</name>
      <section anchor="conceptual-model-pre-validation-before-propagation">
        <name>Conceptual Model: Pre-validation Before Propagation</name>
        <t>The pre-validation mechanism operates at the boundary between route origination and advertisement:</t>
        <artwork><![CDATA[
                           +-------------------+
                           |  Route Origination|
                           |   (Control Plane) |
                           +-------------------+
                                    |
                                    v
                           +-------------------+
                           |  Local RPKI Cache |
                           |     (VRP Data)    |
                           +-------------------+
                                    |
                                    v
                           +-------------------+
                           |   Cross-plane     |
                           |    Validation     |
                           +-------------------+
                                    |
                                    v
                           +-------------------+
                           |   Cache route w/  |
                           |  Validation State |
                           +-------------------+
                  +-----------------+-----------------+
                  |                                   |
                  v                                   v
         +-----------------+               +--------------------+
         |   Invalid:      |               | Valid/NotFound:    |
         |  - Log event    |               |  - Sign attestation|
         |  - Alert ops    |               |  - Add extension   |
         |                 |               |  - Advertise       |
         +-----------------+               +--------------------+
]]></artwork>
        <t>An OR's implementations of pre-validation <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Perform ROV validation on all self-originated routes before advertisement to any BGP neighbor.</t>
          </li>
          <li>
            <t>Maintain a cache (OR-Cache) of originated routes and their validation results.</t>
          </li>
          <li>
            <t>Provide configurable logging and alerting for invalid routes.</t>
          </li>
          <li>
            <t>Revalidate cached routes when the local RPKI cache is updated. If the validation result changes for a cached route, update the cache and take appropriate action (e.g., adertertise route with BGP-OA, log an alert).</t>
          </li>
        </ol>
        <t>A DSR's implementation of ingress origin validation, building upon traditional RPKI-based ROV, <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Perform route origin validation and policy enforcement based on different combination of the local ROV result and the pre-validation result attested by the origin.</t>
          </li>
          <li>
            <t>Support incremental deployment scenarios, allowing partial BGP-OA deployment within the origin AS.</t>
          </li>
        </ol>
      </section>
      <section anchor="bgp-origin-attestation-extension">
        <name>BGP Origin Attestation Extension</name>
        <t>The Origin Attestation is carried in a new optional transitive BGP path attribute. The value part of the attribute has the following format:</t>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Attr. Flags  |  Attr. Type   |          Length               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      Attestation Type         |          Reserved             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                                                               |
|                    Subject Key Identifier                     |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Timestamp (seconds)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Timestamp (fraction)                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Validation Result          |      Signature Algorithm      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Signature Length                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                     Signature (variable)                      ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>Where:</t>
        <ul spacing="normal">
          <li>
            <t>Attr. Flags: Set to 0xC0 (Optional, Transitive, Extended-Length bit).</t>
          </li>
          <li>
            <t>Attr. Type: TBD by IANA</t>
          </li>
          <li>
            <t>Length: Total attribute length in octets</t>
          </li>
          <li>
            <t>Attestation Type: A 16-bit field indicating attestation properties (see detailed definition below)</t>
          </li>
          <li>
            <t>Subject Key Identifier (SKI): A 20-octet identifier that contains the value in the Subject Key Identifier extension of the RPKI router certificate <xref target="RFC6487"/>.</t>
          </li>
          <li>
            <t>Timestamp: 64-bit NTP timestamp <xref target="RFC5905"/> of attestation creation</t>
          </li>
          <li>
            <t>Validation Result: The ROV validation result from the originator's perspective at the time of signing.
    1 = Valid
    2 = NotFound (no matching ROA found)
    3 = Not-applicable (pre-validation was not performed, e.g., during OA disabling procedure)</t>
          </li>
          <li>
            <t>Signature Algorithm: Algorithm identifier used for signature (see IANA registry)</t>
          </li>
          <li>
            <t>Signature Length: Length of the signature field in octets</t>
          </li>
          <li>
            <t>Signature: Digital signature as specified below</t>
          </li>
        </ul>
        <t>The Attestation Type field is defined as:</t>
        <artwork><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|O|V|         Reserved          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>O-bit (bit 0): Origin Attestation Enabled. 1 indicates the OR's OA-Status is Enabled. 0 indicates it is Disabled.</t>
          </li>
          <li>
            <t>V-bit (bit 1): Strict Validation Filter. 1 indicates the OR only advertises routes with a pre-validation result of Valid. 0 indicates it advertises routes with results of either Valid or NotFound. The 'valid-only' strict mode would require operators to mandate that ROAs be signed for all originated routes. The subsequent processing flow for this mode has not been included in the description.</t>
          </li>
          <li>
            <t>Reserved (bits 3-15): <bcp14>MUST</bcp14> be set to zero on transmission and ignored on reception.</t>
          </li>
        </ul>
        <t>The signature covers the following elements in order:</t>
        <ol spacing="normal" type="1"><li>
            <t>The AS number of the originating AS (as it appears in the AS_PATH attribute).</t>
          </li>
          <li>
            <t>The NLRI (prefix and length) being advertised in this BGP UPDATE.</t>
          </li>
          <li>
            <t>The SKI (from the attribute)</t>
          </li>
          <li>
            <t>Timestamp (from the attribute)</t>
          </li>
          <li>
            <t>The Validation Result (from the attribute)</t>
          </li>
          <li>
            <t>The Attestation Type (from the attribute)</t>
          </li>
        </ol>
        <t>The signature <bcp14>MUST</bcp14> be created using the originating router's private key. The corresponding public key and its binding to the (ASN, SKI) pair <bcp14>MUST</bcp14> be distributed through RPKI router certificates, following the key distribution model defined for BGPSec in <xref target="RFC8209"/>.</t>
        <t>Downstream routers verifying the signature <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Retrieve the router certificate based on (ASN, SKI) pair, to get the appropriate router ID and public key.</t>
          </li>
          <li>
            <t>Verify the signature covers all required elements as listed above.</t>
          </li>
          <li>
            <t>Check that the Timestamp is recent (within a configured validity window, e.g., 24 hours) to prevent replay attacks.</t>
          </li>
          <li>
            <t>If any check fails, the BGP-OA attribute <bcp14>MUST</bcp14> be considered invalid, and the route <bcp14>SHOULD</bcp14> be treated as if the attestation is not present (following local policy for un-attested routes).</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="originating-router-procedures">
      <name>Originating Router Procedures</name>
      <section anchor="oa-status-management">
        <name>OA-Status Management</name>
        <t>The state machine of OA-Status is defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Disabled (initial state): The Origin Attestation function is not active. BGP UPDATEs do not contain the BGP-OA attribute.</t>
          </li>
          <li>
            <t>Enabling (transient): Entered from Disabled upon receiving an "Enable OA" command. The OR performs necessary setup (e.g., ensures RPKI-RTR <xref target="RFC8210"/> session is up, VRP and router keys are cached). It <bcp14>MUST NOT</bcp14> advertise routes with the BGP-OA attribute in this state.</t>
          </li>
          <li>
            <t>Enabled (steady state): Entered from Enabling once all prerequisites are met (local RPKI data ready, SKI and signing keys available). In this state, the OR <bcp14>MUST</bcp14> perform pre-validation and include a valid BGP-OA attribute (with O-bit=1) in UPDATEs for originated routes that pass local policy.</t>
          </li>
          <li>
            <t>Disabling (transient): Entered from Enabled upon receiving a "Disable OA" command. The OR continues to include the BGP-OA attribute in UPDATEs but sets the O-bit=0. This state <bcp14>MUST</bcp14> be maintained for a minimum period (e.g., 30 minutes) or until all relevant BGP sessions have been re-established, to ensure downstream ASes receive the disabled-state notification.</t>
          </li>
          <li>
            <t>Transition from Disabling to Disabled occurs after the minimum notification period. In Disabled state, BGP-OA attributes are no longer included.</t>
          </li>
        </ul>
      </section>
      <section anchor="originating-a-route">
        <name>Originating a Route</name>
        <t>When originating a route, an OR with OA-Status=Enabled <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Perform pre-validation against the local RPKI VRP cache.</t>
          </li>
          <li>
            <t>Cache the route and its validation result (Valid, NotFound, Invalid) in the OR-Cache.</t>
          </li>
          <li>
            <t>If the result is "invalid":
a. <bcp14>MUST NOT</bcp14> advertise the route. 
b. <bcp14>MUST</bcp14> log a detailed error and <bcp14>SHOULD</bcp14> alert the operator.</t>
          </li>
          <li>
            <t>If the result is Valid or NotFound (and local policy permits advertisement):
a. Create a BGP-OA attribute as per Section 4.2.
b. Include the attribute in the BGP UPDATE message.
c. Advertise the route to neighbors</t>
          </li>
        </ol>
        <t>Initial Propagation: Upon first entering the Enabled state, the OR <bcp14>MUST</bcp14> reannounce all the routes with the BGP-OA extension.</t>
        <t>Disabling Procedure: When transitioning to the Disabling state, the OR <bcp14>SHOULD</bcp14> send BGP UPDATE messages for its attested routes that include the BGP-OA attribute with the O-bit set to 0. This serves as an explicit notification to downstream ASes about the impending deactivation of OA functionality. To ensure robust cleanup and minimize the risk of the notification being lost due to transient network issues, the following steps are <bcp14>RECOMMENDED</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Sustained Notification: The OR <bcp14>SHOULD</bcp14> remain in the Disabling state for a minimum period (e.g., 30 minutes). During this period, it <bcp14>SHOULD</bcp14> periodically (e.g., every 5 minutes) re-advertise affected routes with the BGP-OA attribute (O-bit=0, Validation Result set to Not-applicable). This increases the likelihood that downstream ASes receive the state change notification.</t>
          </li>
          <li>
            <t>Final Cleanup: After the minimum notification period, the OR transitions to the Disabled state. At this point, for each affected route that is still valid and should be advertised, the OR <bcp14>SHOULD</bcp14> send a BGP UPDATE message without the BGP-OA attribute. Optionally, for a more definitive cleanup, the OR <bcp14>MAY</bcp14> first send a WITHDRAW for the route and then (if the prefix remains valid) immediately follow it with an UPDATE without the BGP-OA attribute.</t>
          </li>
        </ol>
        <t>This two-phase approach (explicit notification via O-bit=0 followed by cleanup) ensures that downstream ASes are both informed of the state change and that the final routing state is consistent with the OA functionality being disabled.</t>
      </section>
      <section anchor="handling-roa-cache-updates">
        <name>Handling ROA Cache Updates</name>
        <t>When the local VRP cache is updated and the OA-status is "Enabled", the OR <bcp14>MUST</bcp14>:
a. Revalidate affected routes in the OR-Cache.
b. If a route's validation result changes from Invalid to Valid/NotFound:
   i. Generate a new BGP-OA attribute.
   ii. Advertise the route with the new attestation.
c. If a route's validation result changes from Valid/NotFound to Invalid:
   i. Update the OR-Cache. 
   ii. Log a detailed error and <bcp14>SHOULD</bcp14> alert the operator.</t>
      </section>
    </section>
    <section anchor="downstream-router-procedures">
      <name>Downstream Router Procedures</name>
      <t>A DSR <bcp14>MUST</bcp14> have a functional RPKI-RTR session and current VRP/router key cache before processing BGP-OA attributes.</t>
      <t>Case A: UPDATE Contains a BGP-OA Attribute</t>
      <t>1.Perform Standard ROV: Validate the route using the local RPKI VRP cache. Let Local_ROV_Result be {Valid, NotFound, Invalid}.</t>
      <t>2.Verify OA Signature: Extract the (ASN, SKI) from the path and attribute. Retrieve the corresponding public key and router ID from the local RPKI router key cache, verify the signature. If verification fails, discard the BGP-OA attribute and process the route as an un-attested route (go to Case B).</t>
      <t>3.Process OA-Status:</t>
      <ul spacing="normal">
        <li>
          <t>If O-bit=1 (Enabled): Record/update the OA-Status for this (ASN, Router ID) as active. Add/update the prefix in the AOPL for this AS, associated with the router ID and the Attested_Validation_Result from the attribute.</t>
        </li>
        <li>
          <t>If O-bit=0 (Disabled): Update the OA-Status for this (ASN, Router ID) as inactive. Remove the router's entries from the AOPL for this AS. If a prefix has no attesting routers left, remove it from the list. Process the route as an un-attested route (go to Case B).</t>
        </li>
      </ul>
      <t>4.Compare Results (if O-bit=1 and signature valid):</t>
      <ul spacing="normal">
        <li>
          <t>If Local_ROV_Result and Attested_Validation_Result are the same (Valid/Valid or NotFound/NotFound): Mark the route as Strongly Validated. Propagate the UPDATE with the BGP-OA attribute intact.</t>
        </li>
        <li>
          <t>If Local_ROV_Result is Invalid but Attested_Validation_Result is Valid: Check the Timestamp for freshness. If recent, this indicates a likely RPKI cache synchronization delay (transient false positive). The DSR <bcp14>MAY</bcp14> decide to accept/propagate the route while monitoring the situation, or apply a local policy (e.g., lower LOCAL_PREF). It <bcp14>SHOULD</bcp14> schedule a re-check after its next RPKI cache sync.</t>
        </li>
        <li>
          <t>If Local_ROV_Result is Valid but Attested_Validation_Result is NotFound or vice versa: This is a minor discrepancy. The DSR <bcp14>SHOULD</bcp14> log it but can treat the route as validated. The more secure result (Valid) <bcp14>MAY</bcp14> be given preference.</t>
        </li>
      </ul>
      <t>Case B: UPDATE Does NOT Contain a BGP-OA Attribute</t>
      <t>1.Perform standard ROV, yielding Local_ROV_Result.</t>
      <t>2.Check the Attested Origin Prefix List for the origin AS.</t>
      <ul spacing="normal">
        <li>
          <t>If the prefix is in the list (attested by other routers from the same AS), the DSR has collective attestation knowledge. It <bcp14>MAY</bcp14> use the attested state(s) from the list to inform its decision, similar to step A.4 above, to mitigate false positives.</t>
        </li>
        <li>
          <t>If the prefix is not in the list, process based on Local_ROV_Result and local policy only.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Trust Model: The security of Origin Attestation relies fundamentally on the RPKI trust anchor hierarchy and the correct binding of router keys to AS resources via RPKI certificates <xref target="RFC8209"/>. Compromise of an origin AS's RPKI signing key or router private key allows for forged attestations.</t>
      <t>Replay Attacks: The mandatory Timestamp field and its verification limit the window for replay attacks. Operators should configure an appropriate validity period (e.g., 24 hours).</t>
      <t>Partial Deployment Security: An AS with only partial BGP-OA deployment on its ASBRs is less protected against hijacks via its non-deploying ASBRs. Downstream ASes using collective attestation knowledge (Section 6.1.B) should be aware of this reduced security guarantee for prefixes not fully attested.</t>
      <t>Key Management: Secure key generation, storage, and timely rollover procedures as specified for BGPSec <xref target="RFC8209"/> are equally critical for OA.</t>
      <t>Algorithm Agility: The Signature Algorithm field provides agility. If a cryptographic weakness is found in the default algorithm, a new algorithm ID can be assigned. Transition mechanisms should be defined in a future update.</t>
    </section>
    <section anchor="operation-and-management-consideration">
      <name>Operation and Management Consideration</name>
      <t>Incremental Deployment: It is <bcp14>RECOMMENDED</bcp14> that an AS enables BGP-OA on all its external-facing ASBRs (especially those facing providers) for comprehensive protection. The protocol is designed to function with partial deployment, but coverage gaps remain vulnerable.</t>
      <t>Minimizing Oscillation: Operators should avoid frequent enable/disable toggles. Implementations <bcp14>SHOULD</bcp14> enforce a minimum time between state changes. The use of the transient Disabling state with sustained notification helps ensure downstream cleanup without needing a full Route Refresh.</t>
      <t>Troubleshooting: The primary point for diagnosing and resolving attestation or validation issues should be the originating AS, as it has full visibility into its RPKI data and route configuration. ORs <bcp14>MUST</bcp14> provide comprehensive logging for pre-validation failures.</t>
      <t>Interaction with BGP Path Selection: The validation state derived from BGP-OA processing <bcp14>MAY</bcp14> influence BGP path selection. It is <bcp14>RECOMMENDED</bcp14> that this influence be implemented as a tie-breaking rule after standard criteria like LOCAL_PREF and AS_PATH length, similar to the VALID &gt; NOT-VALID rule for BGPSec <xref target="RFC8205"/>. For example, a path with a Strongly Validated state (attested and locally Valid) could be preferred over a path with only local Valid or NotFound validation.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document requests IANA to:</t>
      <ul spacing="normal">
        <li>
          <t>Assign a new BGP path attribute type code from the "BGP Path Attributes" registry for the Origin Attestation attribute. Suggested value: TBD1.</t>
        </li>
        <li>
          <t>Create a new registry titled "BGP Origin Attestation Parameters" under the "Border Gateway Protocol (BGP) Parameters" group. This registry shall include the following sub-registries:</t>
        </li>
        <li>
          <t>Attestation Type Flags: Registry for bits in the Attestation Type field. Initial contents: bit 0 (O-bit), bit 1 (V-bit), bit 2 (R-bit). Registration policy: Standards Action or IESG Approval.</t>
        </li>
        <li>
          <t>Validation Result Codes: Registry for the 2-byte Validation Result field. Initial values: 1 (Valid), 2 (NotFound), 3 (Not-applicable). Registration policy: Standards Action or IESG Approval.</t>
        </li>
        <li>
          <t>Signature Algorithms: Registry for the 2-byte Signature Algorithm field. This registry <bcp14>MAY</bcp14> initially reuse values defined for BGPSec's Algorithm Suite ID in the "BGPSec Algorithm Suite IDs" registry <xref target="RFC8208"/>. Registration policy: Specification Required.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6811" target="https://www.rfc-editor.org/info/rfc6811" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6811.xml">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8208" target="https://www.rfc-editor.org/info/rfc8208" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8208.xml">
          <front>
            <title>BGPsec Algorithms, Key Formats, and Signature Formats</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="O. Borchert" initials="O." surname="Borchert"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure").</t>
              <t>This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8208"/>
          <seriesInfo name="DOI" value="10.17487/RFC8208"/>
        </reference>
        <reference anchor="RFC8209" target="https://www.rfc-editor.org/info/rfc8209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8209.xml">
          <front>
            <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
            <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec. BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together. BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP. The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives. The end entity (EE) certificates specified by this profile are issued to routers within an AS. Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate. These CA certificates and EE certificates both contain the AS Resource extension. An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate. This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates. This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8209"/>
          <seriesInfo name="DOI" value="10.17487/RFC8209"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5905.xml">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RPKI_Time-of-Flight" target="https://dl.acm.org/doi/10.1007/978-3-031-28486-1_18">
          <front>
            <title>RPKI Time-of-Flight</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="Right_the_Ship" target="https://dl.acm.org/doi/10.1145/3719027.3744853">
          <front>
            <title>Assessing the Legitimacy of Invalid Routes in RPKI</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="Demystifying_RPKI-Invalid_Prefixes" target="https://weitongli.com/publications/papers/li-2026-demystifying.pdf">
          <front>
            <title>Demystifying RPKI-Invalid Prefixes - Hidden Causes and Security Risks</title>
            <author>
              <organization/>
            </author>
            <date year="2026" month="February"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vd63Ibx5X+j6fopWvLgIOBCIqyZGySDURKMSuUyBCUXNmU
SzWYaQBjDWaQuZBCbPlZ9ln2yfbc+jIXkpLXye46FRsczPR0nz6X71z6IAiC
QZVUqZ6pq8s/nQXLsNSxev7HS3VRJOskU/Oq0mUVVkmeDcLlstA3s7u+jvMo
C7cwUlyEqyrY1GG2DpK4CJbrXZDT/UHo7g8ODwf5ssxTDZdmg3oXh/QB/zMb
RPDvdV7sZ6qs4kFZL7dJWcJT1/sdvOHsxfXLwSDZFTNVFXVZHR0efnN4NAgL
HcJC8rpKsvXgNi/er4u83s0UzGLwXu/hSgwPZ5UuMl0FpzjPwSCsq01ezAYq
GCiVZOVMvZqob3H28Dev6BWM9zf4v72cF+swS/5OC5mp/9jk2XoNX0V1ps7D
ZV6EFcxdwY16GybpTBExtn/7w9/XURouJzquJ1EGX0dJBUt8rpMfEho3yuus
wlWfbJIs9Kb0eqL+qL0ZvQ4zc6E5F5jhrU7UtY42WZ7m60SX3jzW8EgWZn/Y
0F2TKN9+ziROJ+o8sVM4hSnQn80JXJcwCoyv3mTJjS5KGNy9v8rTJIb3V3LT
L6DEYqL+Ums7i8WGlyQXm3OhZ9WrfJmk2k1iX+tSnvpDhHds6YZPo8Ygy4st
DH8DTKrU1cuTr4+fHbqPT83HZ9OpfHx2dPjEfXzmPn4zAx7OVq3xnnzj3T7l
oUE0310nWx3kq+Blmqw3FV5WnuSq5tf4rfA17j6SZaYu56/wMwmYOjo8ehwc
PqZhwmKtK2DSqtqVs0eP4nQSRtsJPPMozpNH08PJ9PDw6aNvnj4L8JFpcPTs
+NnXwfTd9BlODt/3rtrod4tNsvPnNS9LXeJGK/hWnet1UiXbMNqrfAVCeBMC
K5CwAoeCKsFV9E775GTRmPaTYDr9xGlPj588evx0Crrh6eTx0+PjZ09wwad6
uy+rZLWHqb0jtSezeXdZ6FXyAbWQW4V/t/LvVuZuFahvkzjWmToJa1iyCrNY
LXRUF8BKQJ/yfdm7sNeni+bKvg5AifWsDES1Ag2TksA+2tXLNImIw8tHu3AH
MvYoTQJ6PvYmO9nFq8FgMpkMBkEQqHBZVkUYEWsMrmFDrnSZ10Wk1SUNqP6k
97AtqyKE++qoqguthrjekdoV+U0S48IUfL3VqFkV8C3vnrEFb5EoNC147uLt
aKyWdaWSqlSx3qX5fquzSq3CCMapbnMVAXVgGamKNmGagjgC2dV0pDbAT3Bb
Wmq1y0F7gGSoAk0DvfEgYeIfKDQjQmtkrxzoQC+HEZd1gbsBl2GQCIxCpf9N
HY2Ay+APnAbc481pE5ZqqeEBEPBYF2AAl3uVJtukgo/JdqvjBEZQ8N5aq1vQ
HOrqYg56AbRbuNYqQfaFjdmhJaP5wOr98QvUO1mpyl1YlBq243oDz4C5rOlr
oC4slKgLN4Rxst6qcpOsgFhFvoWnYdOQCDjqjaNxleOT8h2bV+WZ14n6DqYG
miuPa9hjojjNkdYPxmkLFgJUZbllsh8ANwfe8EsN5NY0uXBNlw5w7XCpwE0v
SjMXrUqdrsTAh0iygmUaHoNVVyrNcZdJSb3VRbJKdEwEvAz3aR7Gavj26nKk
ojCCXZS3hjHQtkpKmuxYbfI0RumTvTcvQH7gbYcPCVr1G7gdZvpvtAuw4XPC
KvpDpbOSaLYJK3hTUaBVjIr9rsrXRbjbIB+me1Um6wwm1yUm6icc6c3l6fz6
BZCuLGHnS9jKN1mavAfy4r4J9+E+3cKQG5VnMKghkyMIzH5JbOIQF9CjHMP0
gC/CHW3rRuksXKbwmKEsUmC+QOnJFW87jM6TxEsoBGlDx8KVpBBiTRQxnZVk
x9alUVRLnYE+A3HVQEZ1m1Qb5McqaQjLTGmcG1/gGak1czewGghxge+odERk
wx3CEfPbDC6zthzT5sRwCZ7Q4ZbXVOhIIyNHqQYUV9BWgA7AhcVJiWuvk3Jj
F1hpywQoIzt4Y0Yz3SQ/hNF7Wq72WBwxKVpZ3mcQcZSJppIpcdNS0Re4slBW
ibsAlAByVPltWMQkR4XeIE/dyDwMzxhiis7dglkA5DH4AkEnSSKR5ccv4L6A
hPMjfPkFIBSYAXMaEufSqIEFqoHBZ2rrvwoo+Z510X0qmu8FqPI90ATWVKI+
QtKDlEYhfAZBBFRLYkhGmqQsiHNUaLRyJJRdtPo2vwXmKWCLV3Cf2qIsg8xl
RMsojDWyZQy3pPmORTskihCJPY05ZE3TkndgDNjHfLdDHQP7AW+gwbdwL+zq
Ns/ATMLejqzGNUocEB7MEzA/WS6jM8oJk3ZVZ3EoZsEaI1TrWV6xWAFL4cw7
osImrm1+ohyFfOUtaKJO6qLAlaFySKwaJhuuynq1grUwJyNiLis2lQ0b2LZ8
Y5AokIQigaXHYJhAUgqQDjTylpE87Q28WIIEgJJFY1fdor0jnbwNM9BlbInS
MGMLxjoeVoI8msoXP/7YxHofP8Klh8HUx48T9TIviExtsd/lwFFIq5tE347F
Yrflki24qgEU4c0dQ1+yXocpA1AC8IAv6mzVRL3SYUYiPgZWKSvHBkGgy52O
EtINYMrrpXsPfA34AMgPbL1HHZdEIBVZBk5BhLxvtFqDjEUOIIf0OQgpPR06
9bhtynqcgOpDo7QLwQnBGbNhRxVKK7FvoNHk1bAGNjHCpbc6TUE5MiKJUVLx
0UiYzupBJhRIC9o/mEC+WqVJpskck9ij2oNJ+Thg3960zwAwMI9Nfguzc1at
X12CKgOmBzAArLCCcclrwNgA7AhMwswHLrbABfyFXk+PPUWTAv5+qYahw1Db
PNYpINNbHxuFHpCiGwTodAyvvQ1mFRV5WQY3CGj2YmkJ6OCE74RC3n0sfIx6
YGkhm0VgZiAIvA8kj/VAtLegqGnzya96yOzDH/ABZKIBdti6os2wm8n7FcYx
XCuZ2WAORUMre0B9MJjCnlUWo3hq/EtU0V+C+IKVQjZDBkIr5dtenHtLygWg
IAACnxw4ObZzD0EB7wmXWy4KResSpUG9JEUJxkSjMx11ycfaDh+4W+Pht71a
T6MRydgBaSsmdPfIW4BHVsm6FtWriwKtC/qAeRbzzkZgpUnDkFpQXxpYGPDu
Bhbyfol6HZTLDhUVQI1lgpiU4Bg+aLTESjSqSBLAMISFjAYRchlFETsF0pJs
2Ok6BaqxBoKtqcDMpbL3QGfYzC3xUxECMbsWyV8/0RXZWJX7LIJ9MzEY4B/Y
PNxUlBd4F5o6HIs0ifqOIBdo2hWqu3WaL0Ey2kMgWwDiQh4DHhKY7HQaEDW/
LTumpYUcDReEGDHUghOJJCEBiM5b03A97oGNyF3LXDZjVei/1cRkOJBvmXCh
SQT0JZGEmcap78GwCQfhOyIx6sLysTpAtwpmftCD0GFtS1jpe7apTkJjUKGg
Xd5P1AuUkqYCY+XPd5diaj2EfDeKN9qLaUay6+H6HkYjJBOHqLphIehU7zT8
iy39LS4UbgVlH8b5jn1Vkn2282hGyAtgsQGsDbYNX8r+NxubxLoXKxR9UNsY
ahyjybgxAacoDcsSlF2UgxkgMuSZ5WvW8Fmu0NIQvi+qPUUCEI2h5srQfEXo
VtwQuGLCAbfBomDjHtPGuSnvAPoWqzoFJFNUdV7DcvawDBQO0q04K59BQPp2
qKSs0SfXwldq10YFJ0DhGysKsFSzQolzIHwixzpysAK2sUbNvMlz31I0OWKi
nu9J+PJiy0AeHHlPQ5B0WGODG85WBTUaMhRZK1EYB7hnGaKJsjzAKflKiPwH
RoGagFRDWEWiSc+kRE5UZQ0/hETPeOIwHEJBtHYeQcMU9CcrOVDwNVwBYcOp
ryUeMi/ZISHtwLvJujhcrwE5I8TsCSKJ4sL7QJuXgHWBe8CZgbmX1mc0nhCZ
AXgq0hxroltWZtXIOMLpubzJIg6MNIBfV26ImVgKx7whhU6sXXMcmcIQE3Ie
2RM0LFIag46I1rKEBTtlTyTI8ZcY9q++ejAY9NVXnGhpBIIYeaBS+KRo0N0h
n4mJC5PKus3rFKyM7wKhK7jRcPXOGBC6R5o+d7EGTE9wKDhFTdNNqkvjOEbI
xCiZLcZt0qy4v/qqPxOmXpiAE1JpDn7nrWJFB+OwNaUtxKcprgAyViTLmij4
ywJUwldiCu+NGAHvpiH55Zp3Lqk6sHEsFgkHaNtVQiLWTJg4De6DxzDwkgQJ
QPgyX2t01sddm0PEQO3DDEHEB1Vakz9vQbs3rsgfbHTegO1+rM6FqIma1rZ6
0ZyuRYUbtbh4GNMFeljjREJ2rVFFYkJtPxg0pWNGmlqcPlLGzlv59NDo3cKA
u4eskqFzu+SwRQ/TDS/mI54K0IQWkLUBQD9DNXR799WGX/AW52jAHB5ifjWE
OwI7qx5uj4H2mXFXfY+yIQa94VjJmtH2XHirZJ0ExLgaoegJoqfxynq3y9FE
7JrKzaB/MCmi/UUcFM/fix8jl/d4eQb4TNRgcOrExczldHHPZDqWWxiJ8AJP
Q2KjcWc+sPYX5HQR0RZAnJoYsJ87Ar5BtsM3dYRGzdt6Hl6BDWe6IH7mZRD8
AXOU1rEYFXLg9yYvMzxNSpwauD88x3jElIY7nUdhbqZbEjR5/Bh8BC89LH0W
WQgcPZ5MnQRwePOEhAc2PaBPRG0WKIwDViENsUSUri6uyL+DS4bve8STOSJB
V7BgoBZLsCfoOFAlp4QsfRGjyYphmkxGGFrmy0ExdQ6eiRrOLy7Paa4p/tma
qgK28afq3DgzJN6VprCiUsQdoRTi07V1FztLEGESVjw79TCebniHtDOs+67A
yUkKCQKfh+BQgYrk0Ol7wB63FGU5ePVmcX0w5v+q1xf0+erFn9+cXb04xc+L
b+fn5/bDQO5YfHvx5vzUfXJPnly8evXi9Sk/DFdV49Lg4NX8LwfsWh9cXF6f
Xbyenx90NQlZuhzBA4EDICLFg8sBcG0EaohZ6/nJ5X/95/RY/fjjv1y9PDma
Tr+h2Cb+8Wz69Bj+wD3mt1FSh//EiNwg3O3QWUENBZsRhbukAoNIzAvoG7AQ
ehpAyK/+ipT5fqZ+u4x20+PfywVccOOioVnjItGse6XzMBOx51LPayw1G9db
lG7Od/6Xxt+G7t7F3/47BRSD6bN///0AEx+X4nChcLCeQiKeOp/1xEaVJC+y
Kz8iCkX2ekm47dKEwGUskKooIp+O/BqO6XDwnwALRdMqcvAY6IA3Bi8lKRE0
d3Z5c+xCZCHzicGxyB/WU+d4Yp75IcUxy1eqyTEAwZv+K78JIwt94ZH+wJJE
ia5FTakSsH1YJDna2dCsrpUF+KGO1yYbQ7oXEHuAxR94e1+IH2btFQy44H4H
cAM0C4tog1H+bj0JSAC48TiIIRg5TpIBpxgP1XC03oaQdAlvU9NDmFxG5CbS
hRQGQDSalJjy0DEFawgXEHiviCgfkm29leHBDwTLF2m4dXpoh8NEmzrpib4h
xq8B/W/xLVJcZuLivVFAcU8/hFuKvGFKv6DQ/HzxGgd7FX5ANkXwqyvEGqVZ
seUKYBsKxKPogxLQjTA0p8RKcFCSCB2PdWHwy9HkwjPGzwn2FATa5y6senXx
djB46Xk7JQc5Y/ZUtBhQzj4jiTEMK3FZhufNbNq44xS5DCBQus7CKNI78nZ6
3GIJMJGDpQq2D35SueF6Y4ixLOodMC0i/7V2goBYJ8YYAutWNMc2VkZpNG/X
KSypC8FCPQmeObrOJqqJd2f1dgk0B7F3RLvd5JyS0SuMORqfCNURCj5aw8Ku
WOhpCzi2oKp4plvJ8bFL40JwnKV0mTlgEU81oa9vMjcSGJU4kBYfrfZy2Bhk
QuVw5pWteIrzNAFduA3ZEHc9Go7cNqoSOA6HyowimF4krlHQguvzo3QNJmxk
Nc+yMIbNxx1v1bwsgeu3FMuAV1UgODp6j2ulBJpxrV00A/mzmVb3ZzT2k/JR
UkQ1eCTKRBWjPWskrt6BheNDKTHXGrMZQMfjybzcA3Pi211l1nMhFVPQJMvE
nGBQxkb3QJNtwWxgKryRToB9vsHFI6sCiu3KyVhCLR/gfWNVJKXkkcErBB8G
9CRaG5BHrCYZAamKTAtOtUEN456wXnX7O8SYeI6i0IpQGFYYmZSKnbotdGoG
15ascZADe4KzhC0bLIBuzhdqkaekq9XFDeo0ffsJJcRi4Ut5lIsf5mB1Eow1
Yw3Dpcl9yK5IbjFW5hm0Kcs6SStF/lhdcIzU5kxsCOuEEnRsav10UEgBNsMD
KKmk/yigRYrs8/NHQyzfGd2fRhqy1W1Em0bG3+9zvXsqVkq2bVwO5yp6JAYC
dh9kTKJeJYu4DdkHcF/WjXexr0OWIDCWIEDcwqpvboypGHwuQcH9P+IooXk3
BwnEeYZV9AVvkMIX7chUJyzFpPAymjYL6NgIrIVf/4HRoma+2ItZ+Y6+RF1s
tVC6FztN1tGW8OG6EUQKhU1avWzm2740yRIQGkpQYOSbcxa9uXwXPkf6PUb6
Nc07Tvy0GWxDkrUuqW1donpVekspBzSMucKgMxZhIN2tAWEcQPWUYMxhxyVP
BdAJSJs2zDpu2gbEHgx7tgkpncObHeDyUz/ioob+VoxQINENNDkpm5xweh9j
9sba+nvTMieop4EqZ50qTaEmUoNsHQcByXuS6J6qAFcknxrac+8cU/XED0hS
uG1VI3izSakXYZF644A3h3FoICXBfGviJbXiSuIaKVkpXgk/LZZvbVOzBExJ
UJ+1IdDF5N3JMLSKRm1wu1VkoQIpMcK0WDOsauPDvpTNFBaxXbcwxNBI9mjm
l0QGv1d/rpHInZAmfHMKUoXhUy/gDFeB+/EFl0bDvyKbO7QKDV5wCZjUKQV4
ZuFlqOgCGxdfX+BFo0jF2fAMEM7GUw5e8I3o/5ZyjBIJMxbOZFSMBbIRZUoB
5xhzp6ywMAoboHPWGkYa7tER8jberVkrJSdlJn4q5lOrGRwbNizR2Oh0hNZL
5FtUT4J9xefBv3yNb3h8zYCo4hBk1cixuOwwGBnnprZqBFC3do1QXkh4y6ou
hvGUu6Ei6D6T2hmH0zIHbw1/mGi6ZCEP/KIBv4CErdFMcnNAFg8duXJRm/Uv
I7QZVLxVewHjO8sk9AfY0ESTUu2WU5niPVdC4VftsZfA+eYrX6o9jm8VKt8F
QVCchHHRSgToG9scOxo+Ys51Deokq7Tv59udEzSFBEXvZ4VJHcrVk9pbwiSi
VDKePeUYsK7tDglqrRW+nfw9fQ/5OCje4o6U4jSNrDYmtMmEnIG/ldi0vARO
VuBCLrHkA5WtASK+xwKagdGVyIBoC5+4sBkJWRK8VzTwnYaN7olAfAg6rOqC
AEvefu9EgmRVHsFGLfysLWmkkzxDPxz9QlKQpBR9hfCcmfzSYxoDnRv3Od5n
u68tqlvmWABbOKTrmw+vEsCHp6Dkfv75ZzxLctc/vwm6//zmvgd+Uo1iZXrx
Tw88oIYnwuKXyJojde8Dnz0l96pPuuvm16bHuTOmnOJ4kB6KjlOoU9Ajowcn
/v+OHsp36h6cB9HDK3l/8IH/h/QgrmB5vX30MD08alBA/tehR/e+nis9z/10
z7vtPT3P3XzCcx6teybz4AKaM8aJSln7rH/qPzFpH73Oq5eoTmetucP9AYjz
WkKmvSPAHQsAHr7JaY8wxyInUODlnSPM49hLWLfn0H2ibwSDnuXir0BJtBWD
OWZfvyw75x8APLVsFbp2DKMvGQq3D7/lnG27o7ziriqKMNs3KikYL76SvCvG
Flt5ZAod35Me7iaDGakJ0HLRHvRM03y9NgX2VKxmKykbgXnGMFfaejk0Kfty
SjZT0Xfb0QLsynkOcOLPVq6+x5+fBOAZooWNocfyNNdO0oi00PC9VO+Dx0ue
LEOjoZ6sJ2OgMSxE2EXUELpcXKkwxjVjMJOWO8J0OGa1OyxA5YIZBWsNQHIz
H1O4j9Jh9Q59Vd8h9Sv+3457+KbhCbeKPqhEfS9V48wkNtvnCpW5BLtRFyKk
p8wAUdXGaPsKBBoJe6/Ak5hvwXUgdx1NtSnBMdd2USGAHMqTahDvbiS9OAA+
JAYU+VCtDiPGnjvIIcLwMOXJw8+oZePEphTthoXJlnjlPxiObrrQHGMy2PKw
o6+UmvZcO+q59hgfn8JXj9WxeqK+Vk/VM/XN51wb/Cb4H/5vAOoUaFlM1Ms0
XJekXvlv7GLRVL/nnFpsqeNfZw74j7+n8vaOCcAUcIEJhX/QHH7xPz/9o0ZY
1MsfMDZLJbTslGIi5J86h88a4R+2F5juB/7Y7tSwpFMr5eh/cw6rgs1M/yR+
tTl4cPiKdbV7B/9nYU5KAfRag1KtNtt/MB3cG3t1wj9pLz75n58GP/ded8sY
3oAFQwR0B0f9/H9CLgihfodFQ1RR4+ntmVpogo+HH04OARyK9Rura2v+xmxJ
Yx0HsmnLBPFO4On7mbp+fooQ4Gz+eg7f8I1wNUeb76yiFJmAtc2jSlclD9JQ
3lgyOP06gHco0FdpbGpzCF169yJoQ2yGFZalplBvmKRYa4NVlYnEk8H2juAl
d+jC4eJPZ1SjeHQY0IRM9C4xpaxSo1gaxFlrE4W8Y0jnnggkIBBrQpY4YYqA
aXOS/en3E65xYu0wU18f09pfX1+qyuqMv0rvnO8pYe1RgWsHAOMEXXnnhFLL
uRDYRoFn/9BMXgByxWqlnTbJEvqeAqmY1udi6on4S1P1O36h/H0Efxv3UA2z
XFGtlkm0rvDySG59zLcGgLuxlgq9h2ELW96GfPJXcgVYZ8uIPOYDpIgMTSmt
q7Ohje6qtJmn3bztpcg9egqlE2bkI+Rgc9h83xzScLWIgWywe97wq2Nu++xM
nQKdURjc7aE9yILwGVmVkWoHzsi4rmA4LO+FkQ/Cw4dVyuCni5/eOtXVRU+f
oJZY7QTqghh6iP86HM16obqUFMMM/Uo8zS51b/UxLMfdCiPDV6YoGwXqrXvn
FN654LPtnoi8TFIq9O6+kYtgrX9dWueUa/v63SDgBRq8M687xjHl1fCcTih4
To9jssiIEfsYfJY2wDl9aY7oYwGPHByS8jSvBqxC2cvE2Q0r6r6CqTA5XkO+
cZp2PX9+XVkvSzr2Wfm1+ivgTTmUS4f0YvZvUESp5EbKNe3ZfK4/lhMmgeMe
3I9SPQ6mT2BPKMWNE2MD9Hdd5Ipd4KyUhnhcN7fOsPGFImJjuoALC68bokfV
VG2PS6euuUdegDPP7jPJ2MIroOseHlTDkHeP6p9tbeV88e5yfv2tM2hgBo94
wNfnV2ekxzCVg9NmU4dVMGS5DBu4AyEuwTzBsAoOAuYI4aGoZvcWDJo0AGT3
jic8Qhf09d79tVChrWl6b26R2uwbJ/9jVdsuaD4N2eKhTZEysvd6b499+scO
uPLrvd7bIsllkpkCYRx1OF+8HiNpRuBqJ4V9v62p9U7T32FssSDUckUlpf1+
Ta7UxBn9iqwO27PQEe7WX6WjHVhq/wSMbRVFbRLMyE06McNdYW2evtGN7KUH
BWxgprXUMZJgraUe2QtTNU84OBISN761bRu68oGSLyojduIRlnRIAw3LEu4j
djyhgiubJXXcl3A/I2pkwyGZ0IYCzSkLzPwDreP81hjuo2O1yesCHC/KlZra
2h0WPwOrcUnoMcX2MJDJ5V4rAHTcacTEgxyStFwodcIkWPTycbNWTckZgSWm
YbWtgLfxGj8aRJhD6oSHjmM4JCYRtRXVXgc27sXac0Spzp7DWpe2CphiVc6W
vbKlDSJglLLYYoOIjBBXw+w5yy+cXBKSNyZPDQnymuNOcgzqvtNOslquRpl4
ygjPl9BXAn17yU+V6eZckxra/Da8+AUeRUEZQk1i50fRTT7rxWFidcCWHJZ5
gGFItFmsH8ACC+6DKWo0QZi+BStR70xg1pzNphDp1fUV1vVzR8mPHxX1ZeQV
1ruxwoyh1/UHpITLmDk8PKKjXuasilPTDWPdy4BGjZuzRIGBJgAjvcNibYpY
omHqW3EpryaRBG9L+kBtQeSHXgicCiewbnVPyoGWYw438npuQFLIC8UCAW9e
Y4NpuJ5M4sY9ZwTFgoMsc7i+s1wSdoZyv5tit0HLLnRKuZNH4OOpYVk2pGfi
mPZ+xjG0bPONOhCW6uUbZNkkq7kiwyzprt0z88cuV8BdAv9ogYdSHckyaVSN
d4aNMwxUa1hTX6skjw1zPrbnN0bmnEYqijfVN1iTjMImXCoNmAhFwa64k/Ix
KX9m9DsbyhHWEhELeLIgubbGgqhtHHlz/ttRH8a38pljDaU5x0HnU2Rt/niy
UOIx+6TwWZvCzMngCKZ8ltpARA7Z+4oyZFVJAYrmqd7QJG/4aCNzoNGKvzMs
0s2LtPnbNShq9GsExUBKgJMVnG12ZsOgkS7WH75lM2OA+tikT0cGJ5ocm7TS
MCdd6WlgK3vUn1qxhpM+/WMnMqGeqku5iXJOLtbBRT3UkpWtHCWjGIyJR3DH
HDruBkBeRK2+qdthYSPiAz/XODKTPjHFnx3hCimS4J1pPZrIGs48mWypUt3T
hJIeiyZe1tbtD3CvPTQ+GJyJ+fMqhWbqDSoP7qHS6HpgOKdHRcKapKCORNa+
rmsJ3EFlPBhthcra+5kifq6s+HmQ1t3enIJsYokHWXpactrWNC3wwcr2Xn1n
Z8/OuPhcVs+he0Y4kE4kYVwGbmqIPh6Wb2khPv1GZ122eFqFzidyAa3NKGLw
RyBHmFIztGur1Yp8ibXJ1FsFbLut3k7+LvssJ0rotJM/F3apUjylJPWFrsDO
9EEEB7LWAh4dkgOi7VgzecdAWXksYC6s3F9775oZ0yJbw6elDMe29vFTzcJE
ndbCjEkpt43R3ZSX8BU5HWEgD9XmPXGmxW+rBXp7xZWtD8KWoVi4cY+rKFzR
DM7Zkza25wvp0eS9TpNNnsfMfPdZKKaNnI5r2acj7G+G6dYT5oKZmn+KCbIS
48SrbAqXEW9QHpXQGdsxjrljDbVZa9BMZAhtfgKCzyiIgNbGdGhxPnyvwIY9
IksbYaSkA6KVCbdj4zThHW5LxxFsaRmbIYw1Smr+F9Fo8s7vzq6/Pb2af2d7
pjnrVaH+GYqnI5EJc9rP2CtzqDHdi5QgG3KkyyCk+9cg9eMgdMFuE5ZeM8Rh
vyK5SUKDsuSV0mWOVzryGi/18BWKLtUq85kNHdsorM9kvHpxXVfEX/YAGd2X
lO4UVOUpx5a2Ek0T28AiYpdvzRlOjGwzanjDR3AFwjicYSGGV79ivVNAMqX1
78Qbig8a5mg2CBvVMm0x78CNJXvQ/P2XfeDF1sggFjTN3kFyWhVeaHgT+lkG
KqeV4oju7uNtSb+BtlTFJ/12PoPo82bZnBpO1pSrySzfuNoeSwplpnb+SxDT
F6rb6sT35KnUhxGDtEB1fOO8UuOJUh26nMAElnjkXNFmZxwv4tqB0zCpExSv
+cyI5YlJTVkENjd3o0EzYBjQMhZAUxHRzCh9f59c/K4XHKtzsApUq/sORngn
pgLU4Y93weCPpNclDAXT8pIgLz5Qm/52XM9GHbnKhrt2GCXZiJ7dGzx0YTE7
oLekNtXH6qYnUkas2ehbI1EoUAKR6WLXRbyut42vhEs+bd4KFqnhOkcupv18
PiKAfikPW/eGwjswFfG4pYuMjkd4khMP3T/yKtpcqMgG6Zm6V4YiI5qMBHvm
ceNpMQ0mxn1xee6Goa4rZZlHCekuK9PNCGRlY8k6fudwhWGWblB50ljdoWuo
M5o1pPnT1gUKXlZ2pbFZojdD0C4gddRqyc6ivULRRuYYBiU2vNaAJs6b6hXA
h4LfkHirwtjpRF3+8u0/npzkWzoLdiVpIbTaZudNtIcDuWy4DXd05BJvvmcn
TG+0Mtxq8WMfdTxBq2oxSRMW75tLWtC5UMALRpXEE+t18eAebLgr+FLBhk3u
WgNsijFMGJu5ZznGj53ZcLUfqaYOmqAtNnj2hzaZA9fSktGl6UKGs3u/4LS3
1asXsGqd5BlxDIqsAkA0bBEXS9sDTFk92jUoJAaS2it6HRRYEVW1lIainQIY
ju2SGm65eASInAp1fnEyP393efXiJYcyDSLF4GaNJ7nQUeBwOgd30H/MwHlt
L/a+7Xj7iZthbTQ2zMNOIJh0CGeu+zFiejw/BboUTz9m0d7RTWaOEQ6QLnwZ
nlajmH2TA28c4+GzBJnpHKhuRmhGtBVgqdYJ/ugDyjdWvUba2NLn1pae5sAG
GIARo/qATS09mzpWe0zP4/61SUd20HHmfe2yOh2PzXb4CtoCPmqpNfRLb3PK
IRtVZVUTyfl8MWJUiVRG9RYB7Nbd3oLvs/wWVPBac0wcaFeXNlTDbyL0PCxH
TeXH0VaiDP8iDvdHHAMzbxPsZlFRA7Wdmk+OOcVEwU3sTUAi0e6W3bt0TEl4
yx9be2uzZ73KsCE5mEUndGePIp9I+oir9cGZwV9cM4fRKC1j7uxvPSft5r1f
WeBD+jhNEjD6CTeYSbSBHd4k8KYi2uyt1TR9eEzOE97iJyqwTc4CuZpOqpbk
PLHceslNL0Gp0JDA1iAS97sk8pF+etJLHNhWoYWfpTWNNkl95sVaxz6X4O5c
cd5uznm7mTR5wpoD/GE4TwFT3YoNpPqgin68gijAeUI+2d3MB6oLW9QgTrjN
M1LdvZcQtVnHZszFZh1h0pdSWe41mTFcMFNzOkpMFouqP+4uQ8fEUoWo4fkV
qTTqkyVtEJBSjXbSvGGkcfMs8H9XBp6edLofMBJ/SDrV0ARWv55MJ89HfoTi
lvr7rNjA8dFer5uQPf5K1LY991CysDvA3so5kAvL2lyKcsa0Yv5wvSRBwmF7
qIkNMTQ3pCrQq7/hNtviMTVrnbz0umVdgibYbiel3x+Qn8/COy/meLbClnDN
13SynLmur4KVuc79rBffLyCv+VMBtzp8TweDk5Jr1FwByyokDWJGHYsHbC8g
9JVD5thyAGtrJn6uxWsE6/bHa/iIHiNNnIE4p49NzwqipqN+U0thsLuvZ9KM
mlaWfmSTgyCmnzWf6RWWlkNG9JNIH/A3I8M0WIWR5U4QIfe7IdUmp58ukV8F
IcpiLr/b2ch1Vp+YzrF8+Jdy2FKDhJ3fTB76jp9i4h+fsV2b1uGuNLHXmzpF
/uNOxa84YExFgWWUpKlEbTuqI7zJk9j0tDe/7fBIIjswo/U6xRqos9bxLQEl
cozGC+5SXaQ5U+wHn6SQqi5tqwWHGdvxYm43bAPPjTjZRqe7sicBaMLlJiqX
aR1zsow6fPAp4ytNwBejc81e6aafL/b32Msv1NCJ9iRcZ3lpjnChxeFm874K
arZB5gi7x93tEiD2HRHMIeig2d0ktik8tTlG9nMpbte/r9H6YEJdQBsdUZpM
Zw6fiVbzc3/ovMtPgdBPo4Ye12G49hIDDgudMs/OzLGeRqNQhW3obkxmWuTH
i9UgUsKGVzX1RreHhUoz6uQuwRQ3xDy51O7oGJd6hMBmOrCdZwoC9NxqzyBQ
VJUwPXZhPG+APUGpV+NatAYew816Oz8HLfZ7BL4Bf6Y3dNXzk+9bDQRDXqKU
RHZdQiGcg6gWipm7Rvjbo8w3DMypxA+thj82GWOJpXYSlm6fSHtS4W4Tz5kf
IwNN+rH9wz6kCbCzGT1X5VwZT6rcRTs7LcyxSC7C+kcLgA8sG1lXoTywBcQW
2PdgRy/GtajXa9ultuZy+im3fzRZVpyRHZV+vjPmd/eMjA12ttiXBmZSY+M4
mSkVQao/woC3gLNsYwbsZT1qPEQ/LSyJH/vSckMWw0szeom1ehnIjYkuzSmD
ZnGhHDi48klDBaEm8tRb92xaXqRU3YH1ajNFpcSSysKf4sQqX3D6vD+P1PCK
/pyY90n6iByBmY2KltKGEhnr7MXij2qOqBI2gYjfTZGdwN6314BzPwqW+6qv
/LK1Btpe/FFK46OOcao24DJWj+mvZv7tf7CCHoB0z/TvhFNtVmCVl0ifsUKj
teOl9dRQgufhhlvUoK8QPMmmH4im6d7hS5HooWff30WMxg9CSE/nWH6oEDuj
DP4bG8mKQg18AAA=

-->

</rfc>
