<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cheng-spring-srv6-encoding-network-sliceid-12" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Encoding Network Slice Identification for SRv6</title>
    <seriesInfo name="Internet-Draft" value="draft-cheng-spring-srv6-encoding-network-sliceid-12"/>
    <author fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <postalLine>Beijing</postalLine>
          <postalLine>China</postalLine>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Peiyong Ma">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <postalLine>Guangzhou</postalLine>
          <postalLine>China</postalLine>
        </postal>
        <email>mapeiy@chinatelecom.cn</email>
      </address>
    </author>
    <author fullname="Fenghua Ren">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <postalLine>Beijing</postalLine>
          <postalLine>China</postalLine>
        </postal>
        <email>renfh3@chinaunicom.cn</email>
      </address>
    </author>
    <author fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <postalLine>Beijing</postalLine>
          <postalLine>China</postalLine>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author fullname="Liyan Gong">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <postalLine>Beijing</postalLine>
          <postalLine>China</postalLine>
        </postal>
        <email>gongliyan@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Shay Zadok">
      <organization>Broadcom</organization>
      <address>
        <postal>
          <country>Israel</country>
        </postal>
        <email>shay.zadok@broadcom.com</email>
      </address>
    </author>
    <author fullname="Mingyu Wu">
      <organization>CentecNetworks</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>wumy@centec.com</email>
      </address>
    </author>
    <author fullname="Xuewei Wang">
      <organization>Ruijie Networks Co., Ltd.</organization>
      <address>
        <postal>
          <postalLine>Beijing</postalLine>
          <postalLine>China</postalLine>
        </postal>
        <email>wangxuewei1@ruijie.com.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="13"/>
    <area>General</area>
    <workgroup>SPRING</workgroup>
    <abstract>
      <?line 94?>
<t>A Network Resource Partition (NRP) is a subset of the network
resources and associated policies on each of a connected set of
links in the underlay network.  An NRP could be used as the underlay
to support one or a group of enhanced VPN services.  For packet
forwarding in a specific NRP, some fields in the data packet are
used to identify the NRP the packet belongs to, so that NRP-specific
processing can be performed on each node along a path in the NRP.</t>
      <t>This document describes a novel method to encode NRP-ID in the outer
IPv6 header of an SRv6 domain, which could be used to identify the
NRP-specific processing to be performed on the packets by each
network node along a network path in the NRP.</t>
    </abstract>
  </front>
  <middle>
    <?line 108?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>SRv6 Network Programming <xref target="RFC8986"/> enables the creation of overlays
with underlay optimization to be deployed in an SR domain <xref target="RFC8402"/>.</t>
      <t>As defined in <xref target="RFC8754"/>, all inter-domain packets are encapsulated
for the part of the packet journey that is within the SR domain. The
outer IPv6 header <xref target="RFC8200"/> is originated by a node of the SR domain
and is destined to a node of the SR domain.</t>
      <t>Network slicing provides the ability to partition a physical network
into multiple isolated logical networks of varying sizes,
structures, and functions so that each slice can be dedicated to
specific services or customers. <xref target="RFC9543"/>
defines the term "IETF Network Slice" and establishes the general
principles of network slicing in the IETF context.</t>
      <t>In a network that provides slicing services, the NRP-ID can be
carried in the packet. In the process of packet forwarding, the
routers on the forwarding path can extract NRP-ID from the packet,
determine the NRP to which the packet belongs, and then forward the
packet using the resources associated with the NRP.</t>
      <t>This document describes a novel method to encode NRP-ID in the outer
IPv6 header of an SRv6 domain, which could be used to identify the
NRP-specific processing to be performed on the packets by each
network node along a network path in the NRP.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"/> (Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997) and <xref target="RFC8174"/> (Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017).</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key terms used in this document are defined below.</t>
        <t>Network Resource Partition (NRP): a subset of the network
resources and associated policies on each of a connected set of
links in the underlay network. This term is defined in <xref target="RFC9543"/>.</t>
        <t>IETF Network Slice: The realization of the service in the provider's
network achieved by partitioning network resources and by applying
certain tools and techniques within the network . This term is defined in <xref target="RFC9543"/>.</t>
      </section>
    </section>
    <section anchor="slice-identifier">
      <name>Slice Identifier</name>
      <t>The Slice identifier (SLID) is a network slicing identifier encoded
within the IPv6 packet that allows transit routers to apply the
proper forwarding treatment with associated network resources.</t>
      <t><xref target="RFC9543"/> defines the network resource mapped to the network slice as NRP (Network Resource Partition). A
NRP may be associated with a unique IETF network slice or a group of
slices. In this document, SLID also refers to NRP-ID, which is used
to identify the network resource used in the forwarding process.</t>
    </section>
    <section anchor="slid-assignment">
      <name>SLID Assignment</name>
      <t>When an SR domain enables network slicing, a local policy MUST be defined and uniformly applied within the domain to govern the encoding of the Slice Presence Indicator (SPI) and the Slice Identifier (SLID). This policy includes the method to encode the SPI and the number of bits reserved for the SLID.
When a packet enters the SR domain, the ingress PE encapsulates the packet with an outer IPv6 header and optional Segment Routing Header (SRH) as defined in <xref target="RFC8754"/>. The ingress PE MAY classify the packet into a slice and set the slice identifier as follows:</t>
      <t>o Allocate a source IPv6 address for the outer header from a configured address block designated for network slicing.</t>
      <t>o Encode the SLID in the least significant bits of this source address.</t>
      <t>o Set the Slice Presence Indicator (SPI) in the outer IPv6 header to inform transit nodes that a valid SLID is present.</t>
      <t>The SPI is a local designation within the SR domain. There are two proposed options for encoding the SPI, chosen by domain-wide policy:</t>
      <t>o SPI Option A - Using a Bit in the Traffic Class Field: A specific, agreed-upon bit within the Traffic Class field of the IPv6 header is used as the SPI. If this option is 
used, all nodes within the SR domain participating in slice-aware forwarding MUST be upgraded to interpret this bit correctly. Packets with the SPI bit set may not be forwarded correctly by legacy nodes that are unaware of this new semantic for the Traffic Class field.</t>
      <figure anchor="block1">
        <name>SPI Option A</name>
        <artwork><![CDATA[
  Traffic Class
+---------------+
| .....SPI Bit. |
+---------------+
]]></artwork>
      </figure>
      <t>o SPI Option B - Using a Designated Address Prefix in the Source Address: A specific IPv6 address prefix is configured and uniformly recognized within the SR domain as the
 "SPI Prefix". This prefix is allocated from the operator's existing address space and is used exclusively as the network prefix for source addresses carrying SLIDs. The SPI is effectively indicated by the source address falling within this pre-defined prefix. The SLID is encoded in the least significant bits of the interface identifier portion of the address. This method does not alter the structure of the IPv6 address field itself; it simply designates a subset of the operator's address space for slice-enabled traffic. This option can provide better backward compatibility (see Section 6).</t>
      <figure anchor="block2">
        <name>SPI Option B</name>
        <artwork><![CDATA[
                Source Address
+------------+---------+---------+------+
| SPI Prefix | Node ID | Padding | SLID |
+------------+---------+---------+------+
]]></artwork>
      </figure>
      <t>The format for the SLID and SPI options in the IPv6 header is shown in Figure 3.</t>
      <figure anchor="block3">
        <name>Encoding of SLID and SPI Option</name>
        <artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class (SPI Opt A)     | Flow Label            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Payload Length        |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                Source Address (SPI Opt B)                     |
+                           (SPI Prefix + SLID)                 +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                   Destination Address                         |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
    </section>
    <section anchor="per-slice-forwarding">
      <name>Per-Slice Forwarding</name>
      <t>Any router within the SR domain that forwards a packet with SPI set
uses the SLID to select a slice and apply per-slice policies.</t>
      <t>The most significant bit of SLID may be used to carry an S-flag,
which is used to indicate whether the packet MUST be forwarded
strictly using the network resource associated with the SLID. When
the network resource associated with the SLID does not exist or is
not available, if the S-flag is set to 1, the packet MUST be
discarded, otherwise the packet SHOULD be forwarded using the
default network resource or ignoring the SLID.</t>
      <figure anchor="block4">
        <name>The SLID with S bit</name>
        <artwork><![CDATA[
+------------+
|S|   SLID   |
+------------+ 
]]></artwork>
      </figure>
    </section>
    <section anchor="example">
      <name>Example</name>
      <t>Figure 5 shows an example of network slice packet forwarding using
the proposed encoding method. Assume the SPI is encoded using option
B as the SPI prefix in Source Address.</t>
      <figure anchor="block5">
        <name>Packet Forwarding for Network Slice</name>
        <artwork><![CDATA[
                       SPI prefix: AA::/64
                  +--------------+--------------+
                  |              |              |
                  v              v              v
     +---+      +---+          +---+          +---+     +---+
     |CE1|------|PE1|----------|P1 |----------|PE2|-----|CE2|
     +---+      +---+          +---+          +---+     +---+
                  ^
                  |
         IPv6 Addr: AA::1:0:0 (Lowest 32 bits reserved for SLID)


                 +------------+     +------------+
                 |    IPv6    |     |    IPv6    |
                 |SA=AA::1:0:5|     |SA=AA::1:0:5|
                 +------------+     +------------+
                 |     SRH    |     |     SRH    |
   +-------+     +------------+     +------------+     +-------+
   |Payload| --> |   Payload  | --> |   Payload  | --> |Payload|
   +-------+ PE1 +------------+ P1  +------------+ PE2 +-------+
]]></artwork>
      </figure>
      <t>The PE and P routers are configured to use the prefix AA::/64 as
SPI. The IPv6 address AA::1:0:0 is assigned to PE1 as the source
address used for network slicing. And the lowest 32 bits of the
address is reserved for SLID.</t>
      <t>PE1 encapsulates the network slice packet with an outer IPv6 header
along with an SRH. The Source Address in the outer header is
AA::1:0:5, in which the lowest 32 bits carries the SLID 5. P1 checks
the Source Address and finds it matching the SPI prefix AA::/64. So,
P1 parses SLID 5 from the Source Address, and uses the network
resources associated with SLID 5 to forward the packet. PE2
decapsulates the outer IPv6 header and SRH.</t>
    </section>
    <section anchor="backward-compatibility">
      <name>Backward Compatibility</name>
      <t>Backward compatibility differs based on the chosen SPI encoding method:</t>
      <t>o For SPI Option A (Traffic Class bit): This method is not backward compatible. Legacy routers that do not recognize the new semantic of the designated Traffic Class bit
will forward packets based on the standard interpretation of the header fields. They will not perform slice-specific processing. Successful end-to-end slice forwarding requires all routers along the path to be upgraded and configured to interpret the SPI bit correctly.</t>
      <t>o For SPI Option B (Source Address Prefix): This method offers better backward compatibility. Legacy routers forward packets based on the destination address and standard
routing rules. They treat the source address as a regular IPv6 address and ignore any slice semantics. Therefore, packets can traverse legacy nodes without issue, provided the path is otherwise valid. Only nodes that are explicitly configured to recognize the designated SPI prefix will inspect the source address, extract the SLID from its lower bits, and apply slice-specific forwarding policies. This allows for incremental deployment within an SR domain.</t>
      <t>In both cases, ingress PEs that are not slice-aware will not set the SPI or encode a SLID. Slice-aware transit routers will not attempt to classify such packets into a slice and will forward them using default resources.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The encoding mechanism defined in this document does not introduce new vulnerabilities or attack vectors to the SRv6 architecture. The security considerations discussed herein are inherent to the operation of network slicing and the use of source routing within a trusted domain, and they map to existing security paradigms for IPv6 and Segment Routing.</t>
      <t>o Interaction with Legacy Nodes (SPI Option A): If SPI Option A (Traffic Class bit) is deployed, the risk of misforwarding by legacy nodes stems from reusing an existing
field in a new way. This is a well-understood interoperability and incremental deployment consideration. Networks requiring end-to-end slice consistency must ensure path 
continuity, which may involve upgrading legacy nodes or selecting paths that exclude them.</t>
      <t>o Address Space Management (SPI Option B): The need to carefully manage the address block used as the SPI Prefix to avoid overlap is a standard network planning 
requirement for any IPv6 deployment. It does not represent a new security flaw but emphasizes operational best practices.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+VbW48byXV+719RoB52BiKpmdGdaxs7I41WA8+MmBnJsiMo
QbG7SJbV7OL2ZSjK48BAgiAJ7GQDBAgC5EFPuQAB8hgEcV72v2i9fspfyHdO
VfWNrZu9ToBkFlg1m1WnTp3rd04VB4NBcOXKleCKOEpylSYqH9xP5TQXJzJ9
EZlVIh6rxTKWuQpo0JlK5EKJfK4zMdWxEtPULEREMwa5icxgbYqUhgyWqclN
aOLhIhK5ETOViyyXaa6iIejYNZjW1KQLmQsQ7Fk63/E0vjf4zsqkL2apKZZ4
5lcg1xsyKw9MKnSicy1jkam8WPYFJgqTxGuRKMWrqkjnYBaL6DTLxSQ24Qth
pvio4igjRh7R8F6u81j1eFpG8yZKhHOZzFT0qYhUrHIlenIySdVFT+gprZMK
nkNsZ3OT5kRrP1kLg9VSERoIM8lFKBOiRWyoqC8mRc6kZaqmRSwSk9NiOslT
ExUhxqWpSZmtc0OSYS7FSscxTcMmhSxyA2npUMbgOypSnczs7okvrL0WIC6K
xLFvRXXfJJ9AwkkYFxF2MtjZ6QlIrzcgvWY59pQ4KcWsX+LgWE5UnJXfQEni
A9TjKFomMihhsgYtopAbE7NssXdICA/0NizSlAR1odJMm+RT7AUMRiYkaj1a
VqiXEgao7E4ek+HlziJphUy8SOWCDHWQTsORmOf5MhtduzbT+byYDEOzuBbK
iblWHwU6P4KlkHJSBUqhYl7Ah06tEJySxdIyK0Wkp3ggTq25koTusYhLwYFR
6Jx2QZvDmHBeig72vTV8uYh5Qz88Oe4LlYfD4XCbNgXvY1said5hEpqIVHqq
cpKtOI81uDuKiLcptJ4TeSJyfnZxqwcmrFVi6tH44pZ4EJuVOFEyK1K1wJye
EFfEm7/611//7M//65c/Pzp8/ODrv/ynb37x5df/9h9v/uL1r375z2/+9O8C
J+2R0284V8lskC3JtAZZenFroBxXg8RyNciIKx0NdveI/q/+5R/efPlnb/76
P998+Ytv/vFPvvn5H2Otr//29a///mdf/82/B2BazUy6HsH/oyDQy3Qk8rTI
8r2dnbs7ewFMRY7E5ypRqYyD0qJG4nx8dnT6Ofb4Qq3xOhoJ2mO/vcf+0Xh8
EgQILkn0hzI2CXayVlmw1CPxDCGoLzL4JxSZ4Wm9oIfnQQBHgtuOAjEIBP7g
jrEVwlOlv9BQLNQLOfCXJp3JRL9i4Y/wXidSnJgJdM5fLw3WjkfiQOkfazcl
NAW8eu1G8yu1kBqjWLwrt8hnIX29YFpkq5vsjJVeG3BzIt/KymMEKJ5b4+Xz
AtRfzU3xHm4WcokFLBu5pTMMk002HoDpeSEp/r+VjyeJbrPxYSKBX03n1y0T
BRPp5IH9bUWqOdZdXJyqlXh4/R7kEc4TE5uZhhV8PDextsGTVhru3Lixe+Oz
+fWwWzvHeo0g8rn5XRjKDFRjov9+Izmfy7X4fRmZFx1sHKRGRl4x5XJHWSpV
XF8vA5HhKyLy2cRN6V7tBLyvC/G06NozHFKFLnpZ6Y/drs8LskfAjAi+n1LW
HgNivEcIq2IB62Sijhl81+Lnh4WCP4mnslMLZwWErXxAzcQ9M+yL4xyZ8eNV
Qibxklfb/SxlukNnrAkHeX2hEFHE2YN7e7u7d93jnd3bN/wjQp5/vLGzNwp0
Mm1NvHP7Zjn67p1b7vHuzRvXR8EAWI3+h6APCcowD/bLRHGmMqRl5AoIFdmE
0sTW6dl4mwCKFFkxIfRgGCIIF8aD1M3BiCQSMstMqBEFIkgFAR7eAzAllEQe
w0RJoCZRIX1vaQXwlBclQiiSSKWxXHvqQwE8JMACyTOOCMAwIJBZY3iAXJkV
yyVCNFZTBEuk4ARAi6oEnhhi1g/Gp1g1vUDeyUCZsN9Shi9UHkCAK5ly0gQn
2OpShZQqaWkK/RWOcoxGMpduMsGUgLkiGGaT7JoHEd/0rxsHKARvJPhCJPEN
EjqGDPxiAdAuOMuIC4f5liol3YK2F2JiAL4oQc0EMZDPPUegNAwChjbIxQUl
NaDOLEz1hHSDiRcqFguFjGVRLeVjnjY4uu+JmALwPWAUMFcSwmWlJQwUQBYG
nPTFaq7BSFMhra0H9X2J2r4sLG5sq5JQBqDHuwyc+pu79S83d03mvNBRhBBp
axCGwmS/QcCsewMfp2YGDLcgVp4573gOUchJrKxJhQASbPjYOCRG1pUFK+DA
yjbNMtcLFxrchiIgQLPGfsh6SFxOWHYReOlzcLkPzaipTuywZ85Pn/exwZjw
u0oHbpYXBwFg6Ekus4KgakR26uSVlo7orOvHBKjV2pqVJsCP+soKqWRnCOir
AlayqCv5mQsrz2miSfWMEznhbjYc6MCtVVIKyNnJ1IDTeUeQw1uGYude/AT5
SPQwiAuYi5W4RErS+ZooLMuwA9uerzOqUMpAAwkBERdxrpdcMhkWiaAUXRuW
0foXMl1zTaNfqawPVJfCGoD0AN6I7ykqG1olK92QXYsBqfe8COVWyAvkJigt
2UcPijAhMhACA0otlh9F1+eBVbDdGKS8AKQGXm4i8R4zAcHB6nQ2d6NnDrsS
ZA5pi7yTpCU5p1EmyvXhS1QRwVFScw/eUClhP9Fz3vduQ15v9wpwnabaWmVl
UEP4kf1ovZe4caZWRUumFqRsUZl35lowZVelVcAn5Rq/MBf81Vp9yI2kBdFV
gdO4QLMZQa0W8T7xazEbblBhAw1m1VJTlZbYl/+/B8wr1IT5otC2+MlQpyez
Qs4UyUNRqSSoVspE7+TJ+eNe3/4rTh/x89nh7z05Oju8T8/nD/ePj8sHOyLA
h0dPjt339FTNvPfo5OTw9L6djLei9epk/0c9Vm/QezR+fPTodP/YNRbqaqK4
aAXDYRMFdm5Bgdcf2XLwzEGo52LrIJUR3KsvzoHbet8v90fxFOqgFTCYOwuA
luz4dQGJYwVbyMDZwb2x2L3Rp9GCaPepxQXl7t69e3ubzfKZQ2tY9VjpicQc
WnN/MdGzguIcDOTJEgoNJRa+gOzNyn2wXDBdQTw+JR5bixLpvrj/6Ejs7gzx
fOf2NbcgsbIWezu7t7ethh+zR1ENs670Sm6WWRPsFKvPUORqq1rofhs0HP1v
AUPXxEGI1Rt5lWMxxcWN2DuiDIjAIGOfwB3XLj6WMdDGz/STrHQtcKphBpwV
y0RFLuoHNDdMuXO5jCkPBaFKc8rrtn3FwYvKS/1FoRqJ2lP6sN1daTV2EIhY
zfatLt+KrfPjo/sOxG8klGqYDXBRUGOIA5uLq5xXAFXMCpylMsl0Lnzkp+xP
m7VxODUw73oayAlUsYlx9K3ZwobssK9yj6KeTdsjqeuwtIG0/rVN4ggFlEO2
3m6920OxT0EXZNYUSNoZQsLkSD821TapN8qLgN9lLl3W3AnBBmKHxDLXrmQx
2fThc4K2rhi0K4eNzVYO28yvNlFYY6DV9pE1ZgktHwRPKUE20KgHui0jQMAF
jCIQxa65FhztJ1UwIIuFOCgFxdastZOTL4csfWrRE2hOXCvU9SE9ImThjbEn
fKN8oDVkn+OjbZ/TN4zama/zCceha0Nb09jI0UxmfFSSTIrFxKbmiUa2Iw5S
8mQPp2mBoZOXN3dqF6RZE8pa8IQtpQSIxod1cJ7VgYo1oURsQm1iiQoIk0Dc
52rGXnGGcSSoh3bM1vnZw22bzjbLBcbwdR6QMkUYw3698TgeGC9L7xCJjasc
6trxQVIiZMceBdSpMGI/JntAEsR8a4C8BxlFvKqXm92e2xljOo7jU2S6lMzG
DbcnJtAWTJM9jOa3bHDoVj6safC4wlmxklkuiAB3sCEz1iRbFp2eWCbdgp7W
udvwewyvDuUauuJjFT608PGO4FXmIiGqjFhHjsuMuvwgnw9dDIb1cby1fuX3
TgnnrYUZsi8Dm5Uhv14acnlrKlbipT858+6LcI5BCaUaS2awgladi3hVEieP
mIrYFwPxhFGlFAc69xt/nMopoc57ZETiAfU5Rhjr0SiiA2xNRYNiCRoQe30H
zbncI/HuXpeki3O+bwOeEC+d7uwWaQh3UWw5bAXdJSqbe1EhydwVRGzPA7ki
4dViow9ixRIlf+Qgt4eLdmnaTGjSFLgjXg+RHCyoLksEkh2NIc+hPEFnbZNy
EZAsJ5MOYjWT4bphI3yKZjnzppqoFegtYMIQm3ekDjHCkP6o+oMuG2OCq4Pm
39XgUgzpj3iGcofismNMneJPRuIKe+auPYX8bq9uKr2fik0DOqgZ0P3Knfed
n8PDpvqlN6tz65Puy7pFNYPJ0s3KGqGjkXEgYwPPf9VMOpVJWLMKBO/ActHz
+aKkLl1Mi6rqk3AKBYJPMhSoOmOD8mxlS+nipjde9RI5J9OoBNbekMsKy65C
6myGIlgCVdfcjaBIkdnw7cKDmk5hPZaiTnzDYWLDeJOQmIJ/olIKwG5u4HOE
ZcGRdzHJIboPCaKulJrKZmqglmoNJfsAa2Xr8m5kCFIYAocUQZl333FpBINy
KxwmsLSKp58K8i+9IPBYZojNbnNNU00Fscg5AFhwE1GsJj9xPLroQj0Ih+nh
wTnxOYG3c+8gNAsKJq4NtUWHx+eKG0Ti1vaGGzb/mkbe9Lirb38ib61sVVyK
U0p6UNolglDE4evSavHyI2h2evdeh3cfwLuFTVTuYLmOhNjoabRPPvVioAro
2ZwuduC7B+yz4npLVDttWeFvt+PdXse765i9i2+uixviprglbos74q74iHeQ
2m/5X3D5A3ud4LIVnbecIMX+NvN6aQ/M+apDfQ+X3wYPJbWxXMdGRuJYJTNk
J7+GQHn7MvfAkT6Lh2YpjvUCbvVt8/Cb/YGH35JCBw9Nv6t0crD9G/CwVXPF
q8IWyx/Aw0f+/Z/VBf7u8zGAxbdeJ//TPHzM37ehi85oe91H28Na8dsIqjYE
M7y6IsYqHdjq5EEJXIOAroDZzko33GFs6UBoVlWsDFtpCeTNgG81lRGdzkfp
YkbeKAhtywaZ1d7FKRtzroZZmE20UG7HtU18L5tBDjcbBtNYzvpBo79hobfr
q67miq+31UpVD9VLYE1HNppxddXN3+iJdDX1uZIXVMkHHzWnAjEMBKnFo7OA
Qc2F1DEhi767HOe2yClQ8d273X7HZoJIZyFvpm/v8610purjXGu8UU+Uu6WD
JFnE+eYOiLNZYtKyEOTeRcMam4ghuDwnd+Fdig08Ibrt+Ia34xJOWusiG2Db
hfEe2jt1QeAAwE2GBNTf9Nft2idYavMEyW45cD1XW/SWha4FmEPqahWLqq1T
Q7ZWYBaoBAe1+rIE/kkrV7wH0Lm/igIKl/3R6NqtGx1DWwVW+2PHjMt3f+yY
cfHuj0HJyFXRfnznx6sVh5f3DncvLc+X4/LRftwVjY+He/YjpuxdfhtrN/7+
oEti1TsGoKRGq5Pd0c5oR2zR+Qk89vpeR3OPc3kQbJJtOcHmq80plyUL/kPr
VceU8/3vek5vXna8+vYYQ3p42GKsfBXUiHSRfN8rXvPSIdBLMRh8jxfwkFS8
/ZWf0+QANtZeDna28epwr8ZBZ5S66aOU7dzUkihrv3nq/lNX8YwPOfmNy8ML
6s7UWg8I6IWP1DaGuACA6BJw5+pxu6CtrFHzWTMCtCVEO3UxyYbvwE/htNjV
BxX7rmkdN+3aFsLlfN1h6QhttOBGU7ozBL+1RR3Y42P/PYzINRWakLvRNS2r
wqC07T6NqE7wW7uxVw5qCOXmkGwgnKvwRRZsto/svQ1giIz6BXwvutYJbSlq
iMn9AOSWMiUYZBeo2j5N0vY2QYmXOo4vW5jBkYN6a7cPylsTMFsk75YGus8B
SLSUSA98J+JevRMRBAfdHQp7jTwTE5lVFwJcK5iE0Uqf3Ag2fNut0Qveapa1
UMv2qNHX0RYQbfRJYjVEGcq9zvL8jxBpZHh82axz4qy1O10zp3YSsMFDwD9U
8IItrznUt8qXtOnbspvbOMn1xxH21xlkumv76wdizl2kcC2jjgsXsJ0ipGf6
bYVKokFuBooOT9h3argltdcDuK9YhRJ2HWsOhC5NowFNOm8Gmno/umo3Vy3p
TtUdoGBtOoetXVvqM85K3tXt2lDkOwUf1ao8WfNLrxC+CMSyKWLlRc9nv10N
TUmlS6pmcJO0GU656UoYl8qUtRO9N6LMnZWAU0Byzyf19/JU0i9AVLMRTy4L
tmDNWUETbBMwqpRETcISn/OZztD+oKfVyFcvlxSiqShpKrFp8DXjrkUmNkCd
kMF1CaNfXpAqAyJHKwqVFDlTjpr9WtXWMuD6mbCv4qw1uBP7Kf/QKbT3WfhE
im4slmfyrXuL9k7ZxPDtrYxujVUHjjWRkEfVT19KN8tqFu1Prugw0ZZn57Up
7ZsEJQmZ0y90uL4qTzezAtnEq3zjfLMRObD6wlUHvpSq3zG4Qi3eIqVwes+A
gYjay9TstBihFkLpGr/OFvWz2OatmbJyrH6CRUHvoojpQh/7mbY3BrEl8C4u
YAPG3gawdT2ZfoqElivumdt0m3n+wgZ/gsrKIiOvJC8gvaXUu5/bHxY5mrZd
7oJi+8qHPxUnlIOvnSV63/XWYH9eo6Ly6NtNW9PFCz5r9ycmJadItzLSs4W1
NuvSlOaap9wuqPEvBWVYHon6SHTKXrdVT1Xbo69eH03fm73sVRl7EddW5KnO
+Jd6C53VHKR9VIddEsvwt69ep8raDNewdn+BO66wdyxXYiXXzrX4gHel4njA
15Oy3BiXlFj+Ll1zNOv2vIZqh9XPC2xuIT42MhBPAccJ2F9AQRhBv2GyoSyg
K6E6oWtm/oYJ9Wl0cmHiC5+IiGxj/3SCws0hf2PTeTifd9mz+IVTmk8453z2
ciITObMX5Or6OiB9PebcXzaH6KeKMZkOzagfJbnLAa3TYd+NJQ+/MDpyV7GX
LPKvXpcIoDx/i2XCd7GCtLq199VrMkPKIGyKldyH4qjmtqlyR/dOv6U5T2O5
4l9bIg7NJd8lrhxL0q8pM7poSzbsg8rR/un+ZkA5uB/8N5bbxjgiOwAA

-->

</rfc>
