<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-cats-security-considerations-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="CATS Security Considerations">Security Considerations for Computing-Aware Traffic Steering</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-cats-security-considerations-01"/>
    <author initials="C." surname="Wang" fullname="Cuicui Wang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangcc107@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>routing</area>
    <workgroup>cats</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>
<t>Computing-Aware Traffic Steering (CATS) inherits potential security vulnerabilities from the network, computing nodes as well as workflows of CATS procedures. This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.</t>
    </abstract>
  </front>
  <middle>
    <?line 47?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The CATS framework is an ingress-based overlay framework for the selection of the suitable service instance(s) from a set of instance candidates. By taking into account both networking and computing metrics, the CATS framework achieve a global of dispatching service demands over the various and available edge computing resources. However, ubiquitous distributed computing resources in CATS also pose challenges to security protection. The operators of CATS may not have complete control over the nodes and therefore guarantee the security and credibility of the computing nodes themselves. Moreover, there are great differences in the security capabilities provided by computing nodes in the network, which greatly improves the breadth and difficulty of security protection.</t>
      <t>This document describes various threats and security concerns related to CATS networks and existing approaches to solve these threats.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the following terms:</t>
      <t><strong>Computing-Aware Traffic Steering (CATS):</strong>  A traffic engineering approach [I-D ietf-teas-rfc3272bis] that takes into account the dynamic nature of computing resources and network state to optimize service-specific traffic forwarding towards a given service instance. Various relevant metrics may be used to enforce such computing-aware traffic steering policies. <xref target="I-D.ldbc-cats-framework"/></t>
      <t><strong>CATS Service ID (CS-ID):</strong>  An identifier representing a service, which the clients use to access it.</t>
      <t><strong>Service:</strong>  An offering provided by a service provider and which is delivered using one or more  service functions <xref target="RFC7665"/>.</t>
      <t><strong>CATS Service Metric Agent (C-SMA):</strong>  An agent that is responsible for collecting service capabilities and status, and for reporting them to a CATS Path Selector (C-PS).</t>
      <t><strong>Service request:</strong>  The request for a specific service instance.</t>
    </section>
    <section anchor="security-issues-of-the-computing-resource">
      <name>Security Issues of The Computing Resource</name>
      <t>The ubiquitous and flexible characterictics of computing resource and the frequent connections to the computing resource will lead to the increasing risks of resource attacks. At the same time, network attack patterns are constantly iterating and upgrading, which will also increases the probability of computing resources being attacked. Therefore security solutions of CATS must support identity authentication and access control against these attacks. Identity authentication is required for clients of CATS. Zero trust is the preferred approach to meet this demand. Besides, security monitoring and auditing of computing resources should be carried out using technologies such as security log management and intrusion detection to monitor the security status of computing resources.</t>
    </section>
    <section anchor="computing-path-selector-security-issues">
      <name>Computing Path Selector Security Issues</name>
      <t>The operation of a C-PS could be damaged through a variety of denial-of-service attacks. Such attacks can cause the C-PS to become congested with the result that traffic forwarding are too slowly . In extreme cases, it may be that service requests are not satisfied. C-PS could be the target of the following attacks <xref target="RFC5440"/>:</t>
      <ul spacing="normal">
        <li>
          <t>interception of C-PS service requests or responses;</t>
        </li>
        <li>
          <t>impersonation of C-PS;</t>
        </li>
        <li>
          <t>falsification of computing service information, policy information, or C-PS capabilities; and</t>
        </li>
        <li>
          <t>denial-of-service attacks on C-PS communication mechanisms.</t>
        </li>
      </ul>
      <t>Additionally, snooping of C-PS requests and responses may give an attacker information about the operation of the network. Simply by viewing the C-PS messages someone can know where traffic is being routed, thereby making the network susceptible to targeted attacks. It is expected that C-PS solutions will address these issues in detail using authentication and security techniques.</t>
    </section>
    <section anchor="computing-service-announcement-security-issues">
      <name>Computing Service Announcement Security Issues</name>
      <t>A computing service is associated with a unique identifier called a CS-ID. The CS-ID should keep confidentiality of the service, for example, using an IP address as the CS-ID may expose the location of the edge node. The mapping of CS-IDs to network identifiers may be learned through a NRS(Name Resolution Service), such as DNS, so it is important for the NRS to support access control for certain name mapping records, and authentication of the computing service that want to be registered with the NRS must be required so that only authenticated entities can store and update name mapping records. Besides, the NRS should be resilient against denial-of- service attacks and other common attacks.</t>
    </section>
    <section anchor="metrics-distribution-security-issues">
      <name>Metrics Distribution Security Issues</name>
      <t>The C-SMA aggregates both service-related capabilities and then advertises the CS-IDs along with the metrics to be received by all C-PS in the network. The service metrics include computing-related metrics and potentially other service-specific metrics like the number of end-users who access the service instance at any given time, their location, etc. Therefore, verification mechanism is needed for both C-SMA and C-PS to ensure the authenticity and integrity of the infomation they received.</t>
      <t>The information distributed by the C-SMA and C-NMA may be sensitive. Such information could indeed disclose intel about the network and the location of computing resources hosted in edge sites. Furthermore, such information may be modified by an attacker resulting in disrupted service delivery for the clients, including misdirection of traffic to an attacker's service implementation.</t>
      <t>The computing resource information changes over time very frequently, especially with the creation and termination of service instances. When such an information is carried in a routing protocol, too many updates may affect network stability. This issue could be exploited by an attacker (e.g. by spawning and deleting service instances very rapidly). CATS solutions must support guards against such misbehaviors. For example, these solutions should support aggregation techniques, dampening mechanisms, and threshold triggered distribution updates.</t>
    </section>
    <section anchor="security-related-metrics">
      <name>Security-related Metrics</name>
      <t>The service and network metrics could include the security-related capabilities which could be used by the CATS Path selector to compute paths with security guarantee.</t>
      <t>The security capabilities of nodes could be one of the metrics for C-PS to computing the traffic forwarding path and form a secure routing path. And C-PS will fetch the real-time awareness of the security capabilities available in the network and computing services and finally provide security protection for users. Clients with high security requirements could choose the service with desired security attributes and achieve dependable forwarding on top of only devices that satisfies certain trust requirements, which will avoid the risks of traffic eavesdropping, sensitive data leakage etc.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations of CATS are presented throughout this document. .</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5440" target="https://www.rfc-editor.org/info/rfc5440" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5440.xml">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ldbc-cats-framework" target="https://datatracker.ietf.org/doc/html/draft-ldbc-cats-framework-06" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ldbc-cats-framework.xml">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zongpeng Du" initials="Z." surname="Du">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <date day="8" month="February" year="2024"/>
            <abstract>
              <t>This document describes a framework for Computing-Aware Traffic Steering (CATS). Particularly, the document identifies a set of CATS components, describes their interactions, and exemplifies the workflow of the control and data planes.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ldbc-cats-framework-06"/>
        </reference>
        <reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7665.xml">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
      </references>
    </references>
    <?line 135?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61a244bxxF9n6/oyA+RhCWhVWTLph071K4ELaBdKdpVDEXQ
Q3OmSXZ2Zpru7iFNC/qXfEu+LKeqLzPDpRAbiABjOZfursupqlM1nkwmhde+
VjMhrlXZWe334sy0TlfKSq/xSyyNxa1m03ndribznbRK3Fi5XOpSXHulLG4X
crGwajsTZ/Ob6y/tVFSmbGWDsyos95OdxH6l9G7i4oJJOVoweXRamIUztfLK
zYpuU0n+QX9mBVaqlbH7mXC+Kly3aLRzWHaz3+CIi+c3L4pCb+xMeNs5//jR
o+8ePS4gvJwJa1iZYmfs7QoXm5kgOYpbtcetCqtbr2yr/OScJC0K2fm1sbNC
TAohdOug6FT8DPlxGVQ663TZ6XTP2JVs9W+sBp6tdSvFu1aXpsFD1UhdzwSp
X5anj57+raTnHT+eli3eKGGLmXim9L80b1earvWkKe80kOL9VLzosgzvu3D1
e05fdvvTb7/5w0cXrbENNt7CAUK8fXH2+PT0u/jz29OnT+LPr588eTSD+dvl
8PWLyfm0rhZlcPrSQmjyQFzz9JtvvsYaIYrpdFoUk8lEyIXzVpa++F/4E/cJ
eA9glDWuvRMb41XrtaxFwpbYdnULZC10rb1WwLU1jfBrJeBnEuMEusZTRGsq
vCGd2Km65r94YVmbnRNmGUC+saZUVWeVm4qbtXYC6O4aHCqwtLR6gQ220mrT
OZwC2EEq2Va9PMB6CZA5YVUNKFfCm7AzvaV+1Y4lkRscJMs1dsNzxMJWkdBO
pU2nAhZjazW6qmpVFF8RfK2pupIAID59hSMnmm59xps30JiPyfYXmiSD7VZQ
xk0W0kEYs1W2lvvBW5QHyFxO1SrsDFPwjU57uajpid3qUhE0vYRy992DYGWJ
R55eT08Qbm2lOZyn4tleeHlLykJII2TJmBML49fJN2wJmKX3UKO81aU7YQkO
9IG5tIKdpFjVZgEM4ORKu430BPdVlrNCLLSVY115n+QvOkpuESeslqpWanAy
jGQ6W5LkL80O59gT0S30L7ACrcVBkGzRkUePLIKO0cu1M4ApHFmuZV2rdhVd
nPABv/tgaAKYEmZDedHYHoIN/NMaL9ZyGwSkREm4gqvrXqsIZuiEK6vgRyVW
nbQSSU5Fl8Yz2cZWVZqjZJ88fBgYuNcABluywSW2M2wE3l1QeK4ImbDEcok7
bdR6dFApN30kQtMtsn4lFvs7R8WFOUZ3a12uwwH1XuiG1gaJBCqQrIAZUoLO
RkKugw5Hbcqx8P+M2yij+6MBjIj9SrxVAJBVJIgTr1AaOrlSIVpRlSj/AKj3
Lt9d39w7CX/F1Wv+/fb5399dvH1+Tr+vX85fvco/ivjG9cvX716d97/6lWev
Ly+fX52HxbgrRreKe5fz93hC+tx7/ebm4vXV/NW94JKh4cjl0G1BkY+6ubGK
zCJR8KNFK1rz7OzNf/59+kR8+vSnWDc+f44XVDlwsVurNpxmWjg3XMJW+wJG
VNLSLggVAg8yTo3gR2Z2a7NrBUEPhnz4gSzzcSZ+WJSb0yc/xhuk8Ohmstno
Jtvs7p07i4MRj9w6cky25uj+gaXH8s7fj66T3Qc3f/ip1q0Sk9Nvf/qxoHx/
o2yjW1Ob1f4Q1I28BfI6wC3G8tLUqGOETLiqAYdAHDx8+DsL7OzhQyHmYFTh
KZIWBAkvJJyLDyjzQiu/nHgl3cQuy788fvp4od1HnI+04FmiUaonuao9SAz2
bKVHUSVpj2VPAkeMM9A+hB8Bz2y8bvRvuQBN3EaVmgRMgiLnQa2KtTb0y1Fx
AC1p7xStqfhHjH7Et9pKsmGoNZxvAfLOhaBXxG5Kqn/QOgs7kWzAdLJLBtyY
WpeaMuanT19iQp8/B2cEEh3kujiH7a8nF+fR+CjUFVGbpUZ6twrB5uiSPJB0
SVmSU3etOaUQAoLFUeOF9tPg93hK2tpQxmZpByk575vuWnZDOIOwpmpYElUD
h9BaA2yCKzRUZ/LSZdeWoZ/4ELneRxJBpH+Hal+yzcV8RSC+fza5vpxnA0i+
yWDS5Ca3obaBSjVxlBIApxw/KPSjasPJHNDpXMg1tAZ2NJaXUGljQ4Wc/kai
oFwz48FrkOPN9YOx6bD2l045z8JRuo7XvC9Ml6B4F2eCQjf3ShfOYRnhnhla
xv7biP1I3QZMg4WvUWhIc5AIYsrwHlQv3fH4SSQAXImEhBFRzFoVHQOtx8U+
L9tpZN0a1TW9o1uwBMnettrd8nH9Id7L8hZAn4fIdkC3QIQClyl0wysCjMxz
KaWIod4PluGy7rkFjKSv26yspNhNuGZxmD9FOSIBADwXsmcux/LHQvGufLyq
mFhFRpTrO0p0FwySeRb6R0T5hjASo4+4EnpC+llynxU4Y4iuxMDkSpK3Y7nP
Zrn4wg6MZWYBAZQpdKMYU/FPZU3oZundoLFCwNKCnH7hoUYpH0s0M1xQbEVt
NQCftWxMCxTZZGPZVZpN9QW7ocp2dUXZr5TWamoQOh/jHYxqzcWHoouTIZXl
dBDuI3G2iNnAFVoiA6QEqVypSMdY7CDSmCiGSP2CWESdBqEyDtaDyArhE0h0
bF4Q44hnanGDapVsICZFiDXdCmowEVQBTXAa2smJWU5SJGeHXrPO4Yo6G/zH
6ZbimA5gbgTxGeOg+cSOdtqHBA1lQFNjabxbrgK3AnFE0UZkAD0tuKUnpohj
HPlU+1SZeBM3zkshuKhNcFDcoWwAD2O9SQwv7Sr0aGOSkNT6ELv6j2jRJ4Hn
lWqTLMn73TmYEysnZ+W+52UNzO9MK4fr+MkS4UxpMj/pvd0nzjhMMGCFXE33
43s0p2K9Btn+ewIcHfBF96FcJXM0DU1CgggNQC1b7RoC2byi6IDcdb1HDLXG
bGKs8Mre0gB31pidQhyDmuuYcexQYiEXFET+EJaDfgfYgs3gd5ThrVa7WKHC
sQ1yjaSu0QFaVHQJeret2RFzHlAQndIejb1UFRs17NiErntwHsLXsVuppFCu
Z1RQesnJi3OP+hVljXsfQlzwfk6bIT1XFU0TYu7Tobhpjnj01TFzHEmhOfA5
q2gy7EGUp7o7b1uQxzKklTvBPj+GIBrpOFNqmSNQio4PGZKqktrxirID0a7Q
fPPPlAVvldpQKC/DIjlslTMFowyufpXUlJ8kdVtx8SZbRoYUHnYmrMCoJqaN
2pQjOPAIghriIE2DbJ8ASMu5dicX9ppkxorSbdtRYrt6e33/iuoy0YvguGTY
Byc5iZ9fXePCUIaB7YBEFEAixGkUhF24qY2l8aD8cQ1TWAG304Ayi22RDEHB
T2LlGWHgzsQhOY+RtqPTQ6tp1QodNtPOnEtJHi7WC9WXUmfCWu4pB6fhEddh
qloUOc4TDQiEgyZTR2UelNJ0YF8a4VbNNTtX/j7riMO0w20uRSInHtP2Ica8
8DL2HOdpnBQ8dKSkMTfGiStYhAZqYXCWWqE0pLhDgckOwCKIO6qCGmARj2uU
qd6qqf1Jdi8VklroDBDoHPzjKU0AaVI4LQdXq7tq4NosW3qDxMqDWzgrmOdO
U5der/VtiJa2axZ4EdBRbTVB6QXyd+vc7AzCsh9ASqIi+9gDBnKK97TNoXci
lC8HBPFEwFR9icr1gSIDPXAVSRsbP7oE6qT6r1pHXS2JkiGYBm5UTFd2kEOo
RsQSQdOPbPJpcPiwhAynjXCI7/HAh1/hV8wB6BKdpkl85CvDXQIT0G0FPWjL
sqZERHLVgyKVyXtsIoZJ6hhnXBtmOsAGpy+cTt3vi86SWxs2qTuUJArbmIoy
WADZoHoGshRGxSSo7TZ0RD/Q5U50nxNUpNAnEXw8ONauQl7oJ9ixSlLP15/0
Z9dDhlI4FRmWMPrgSJM0MiiwQZU5zGCBLhHEim0XsQjFeGac50ijZiZXQs9D
nWzhQwTDlD9TCIdc3Y6O1y7TdBqZpe9dPP406I9PmFI2FADxoxobHoaAXYbz
ldBMxQ8cXMR71ohyVRvt7zrpvpqupnTTbeSuTR0GfKMO+FxUJNjGyo2u6j26
a+65ejox6r5obk3Dm5hfWXl4dKHWcquNJXwN625gH/1eMVfnghWTJkda5hsn
1AhsVBs+MyQaeBJxD3+vDfZA2K1WXH6qYYqO9pyOmvuc6WJWDxjKFWEw00q5
LUVkSJnDjuh4Rg+NcfYNj6hSPshzDJdaI2A9AFhRC752AYGZeuWPA9Mk6LGp
PTAZRvT5VB78LEc1Y5lIeT4yMc4jvQ7JkkYy4aNRSUkzoxePp6B9MasyzVwi
Sac+CoWWQ40HcC1l/szJjsnff+AZV6+DD03RS3HcorkHSIOwYx8WWGWuQUBy
7ODZvGu9GtjYDuf9wYLl2iT+l6DBC2HjQGTyVxofc378UhU/d1UKoK1knIMl
o3JvvSFTMAGqVNAmtIqxI3SZp4XpwlC48dBla3RI/nnsk2fBcqtcZQ3TpZO+
3CCYvCQGeotehWvqaOx18D8bhI+VSdPPh/gbv5zmM9TgxjloT3JD1RqMwqci
BOXF/Gp+/FgtW/n5cIC+Bg9uTVglw6Qsfp1eIN3RhvOSmq6aihxbrPg0C4xE
VX+9R42tuke7Pjsv+N9/AYA1f4J0IQAA

-->

</rfc>
