<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-li-sidrops-stealthy-hijacking-01" category="info" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="Stealthy BGP Hijacking Risk">Risk of Stealthy BGP Hijacking under Incomplete Adoption of Route Origin Validation (ROV)</title>

    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>yh-chen21@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>

    <date year="2025" month="October" day="10"/>

    <area>Operations and Management</area>
    <workgroup>SIDROPS Working Group</workgroup>
    <keyword>Resource Public Key Infrastructure</keyword> <keyword>Route Origin Validation</keyword> <keyword>BGP Hijacking</keyword>

    <abstract>


<?line 159?>

<t>This document describes how incomplete adoption of Route Origin Validation (ROV) makes certain forms of BGP hijacking less visible on the control plane while still capable of diverting traffic. We explain the underlying mechanism, define the form of the threat, analyze an real-world incident that exemplifies the issue, and discuss potential countermeasures to mitigate its impact.</t>



    </abstract>



  </front>

  <middle>


<?line 163?>

<section anchor="introduction"><name>Introduction</name>

<t>BGP hijacking occurs when an Autonomous System (AS), accidentally or maliciously, mis-announces an address prefix it is not authorized to originate. ASes that accept such announcement may divert traffic destined for the prefix to an incorrect AS instead of the actual prefix holder. To mitigate this risk, Route Origin Validation (ROV) <xref target="RFC6811"/> was introduced as part of the Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>. ROV-enabled ASes validate route announcements using Route Origin Authorizations (ROAs) <xref target="RFC9582"/>, which specify which ASes are permitted to originate specfic prefixes. The best current practice <xref target="RFC7115"/> suggests configuring routing policies to drop or give a very low preference to routes deemed invalid by ROV.</t>

<t>However, ROV adoption across the Internet is incomplete and expected to remain so for the foreseeable future. In such a state, invalid announcements may still propagate through non-ROV ASes to a certain extent, before being dropped by ROV-enabled ASes. This limited propagation creates a situation where some ASes never receive the invalid routes and are therefore unware of the ongoing incident (e.g., potential BGP hijacking). Yet they are not fully protected either, as the traffic they originate, along the data forwarding path,  may traverse a non-ROV AS that has accepted the invalid route. This non-ROV AS will forward traffic towards the incorrect origin AS. As a result, the traffic originating ASes unknowingly fall victim to BGP hijacking, unless they conduct active measurements (e.g., traceroute) or receive alerts from other network operators who spot the incident. In effect, BGP hijacking becomes stealthier in this case, due to incomplete adoption of ROV across global ASes.</t>

<t>The objective of this document is to highlight the side effect of incomplete ROV adoption on BGP hijacking, which results in highly stealthy BGP hijacking that is invisible to victims on the control plane. This document defines this form of BGP hijacking, explains its underlying mechanisms, analyzes a real-world incident, and discusses possible detection and mitigation approaches.</t>

<t>The rest of this document is structured as follows: Section 2 details the side effect of ROV in incomplete adoption. Section 3 defines the resulting stealthy BGP hijacking. Section 4 analyzes a representative real-world incident. Section 5 discusses potential detection and mitigation strategies. Finally, Section 6 concludes the document.</t>

</section>
<section anchor="problem"><name>Side Effect of Incomplete ROV Adoption</name>

<t>This section explains how BGP hijacking can still succeed and even become stealthier under incomplete ROV adoption. <xref target="control-plane"/> illustrates the control-plane behavior when a malicious AS initiates a BGP hijacking attempt. In this scenario, AS G (the hijacker) announces a (sub-)prefix legitimately owned by AS E (the target). ROV-enabled ASes B and D filter out the invalid announcement, so only AS C and F may accept the hijacker&#39;s route into their routing tables, depending on their routing policies.</t>

<figure title="BGP hijacking under incomplete ROV adoption" anchor="control-plane"><artwork><![CDATA[
          <==           <==           <==           <==           
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                        <~~       |     ~~>                       
                                  |                               
                                  |                               
                                  |                               
                                  |     <~~         <~~           
    ==>  E's announcement         |         +------+      +------+
    ~~>  G's announcement         +---------| AS F |------| AS G |
                                            +------+      +-Hijker
                                         ==>           ==>        
]]></artwork></figure>

<t>Consider AS A as an example. AS A only receives a route to the legitimate origin (AS E), since its upstream provider AS B rejects the invalid route. As a result, from AS A&#39;s control-plane perspective, the only available route is valid, and one can expect traffic destined for the target to be correctly delivered. However, as shown in <xref target="data-plane"/>, from a global perspective, AS A&#39;s traffic is forwarded through AS C, which accpets the hijacker&#39;s route. In this case, the traffic is silently redirected to the hijacker.</t>

<figure title="Discrepancy between control plane and data plane" anchor="data-plane"><artwork><![CDATA[
   (Route in A's table)                                           
   ---------------------------------------------------------->    
                                                                  
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                                  |                               
   --------------------------+    |                               
   (Actual forwarding path)  |    |                               
                             |    |                               
                             |    |                               
                             |    |         +------+      +------+
                             |    +---------| AS F |------| AS G |
                             |              +------+      +-Hijker
                             |                                    
                             +-------------------------------->   
]]></artwork></figure>

<t>Because AS A lacks a route to the hijacker, it remains unaware of the attack unless it conducts active measurements (e.g., traceroute) or receives external notifications. Its local control-plane protections are ineffective in detecting or responding to the hijack in this case. This highlights an unexpected side effect of incomplete ROV adoption: it prevents certain ASes from observing invalid routes, making ongoing hijacking more difficult to detect. We refer to such BGP hijacking, which compromises traffic forwarding while remaining invisible to affected ASes on the control plane, as stealthy BGP hijacking. An AS is susceptible to stealthy BGP hijacking if:</t>

<t><list style="symbols">
  <t>It has no route to the hijacker due to ROV filtering, and</t>
  <t>At least one non-ROV AS along the legitimate path accepts the hijacker&#39;s route.</t>
</list></t>

<t>This vulnerability applies to both BGP hijacking that targets a prefix and a sub-prefix.</t>

</section>
<section anchor="definition"><name>Definition of Stealthy BGP Hijacking</name>

<t>From a control-plane-only standpoint, this section defines stealthy BGP hijacking under incomplete ROV adoption.</t>

<section anchor="notation"><name>Notation and Terminology</name>

<t>In this document, we use the following notation to describe BGP routes:</t>

<t><spanx style="verb">
p: V ... (M) ... O
</spanx></t>

<t>This notation represents a BGP route to prefix <spanx style="verb">p</spanx> as observed from a vantage point <spanx style="verb">V</spanx>. The sequence of ASes from <spanx style="verb">V</spanx> to the origin <spanx style="verb">O</spanx> may include one or more intermediate ASes <spanx style="verb">M</spanx>.</t>

<t>The symbols used are defined as:</t>

<dl>
  <dt><spanx style="verb">p</spanx>:</dt>
  <dd>
    <t>The IP prefix being routed.</t>
  </dd>
  <dt><spanx style="verb">V</spanx>:</dt>
  <dd>
    <t>The vantage point, i.e., the AS from which the route is observed (typically via a BGP route collector).</t>
  </dd>
  <dt><spanx style="verb">M</spanx>:</dt>
  <dd>
    <t>An intermediate AS, representing any AS that appears on the path from <spanx style="verb">V</spanx> to the origin <spanx style="verb">O</spanx>. There may be multiple such ASes, or may be none.</t>
  </dd>
  <dt><spanx style="verb">O</spanx>:</dt>
  <dd>
    <t>The origin AS, which originates the route and claims to originate the prefix <spanx style="verb">p</spanx>.</t>
  </dd>
</dl>

<t>We also define the following terminology for clarity in later discussions:</t>

<dl>
  <dt>Conflict:</dt>
  <dd>
    <t>Two routes are said to be in conflict if they refer to the same prefix or to overlapping prefixes (e.g., one is a more specific sub-prefix of the other), but their origin ASes differ. This indicates a potential inconsistency in prefix ownership or announcement.</t>
  </dd>
  <dt>RPKI-invalid:</dt>
  <dd>
    <t>A route is considered RPKI-invalid if its prefix matches an ROA, but the origin AS does not match the AS specified, or the prefix exceeds the max length specified allowable for origination. This typically signals an unauthorized or misconfigured route announcement, which may lead to BGP hijacking.</t>
  </dd>
  <dt>RPKI-valid:</dt>
  <dd>
    <t>A route is considered RPKI-valid if its origin AS matches an ROA for the prefix under RPKI, and the route is not RPKI-invalid.</t>
  </dd>
  <dt>Risk-critical:</dt>
  <dd>
    <t>An AS is said to be risk-critical if it chooses to forward traffic towards an invalid route to the hijacker, while it also has route to the legitimate origin in its routing table.</t>
  </dd>
</dl>

</section>
<section anchor="stealthy-bgp-hijacking"><name>Stealthy BGP Hijacking Definition</name>

<t>Given a pair of observed routes:</t>

<t><spanx style="verb">
p1: V1 ... (M1) ... O1
p2: V2 ... (M2) ... O2
</spanx></t>

<t>A stealthy BGP hijacking is said to occur when the following conditions hold:</t>

<t><list style="numbers" type="1">
  <t>The two routes conflict, i.e., <spanx style="verb">p2</spanx> is equal to or a more specific sub-prefix of <spanx style="verb">p1</spanx>, and <spanx style="verb">O2</spanx> does not equal to <spanx style="verb">O1</spanx>.</t>
  <t>Their authorization states disagree, i.e., the prefix-origin <spanx style="verb">p2-O2</spanx> is RPKI-invalid, while <spanx style="verb">p1-O1</spanx> is RPKI-valid.</t>
  <t>The invalid route is invisible to the victim, i.e., vantage point <spanx style="verb">V1</spanx> has no observable route to prefix <spanx style="verb">p2</spanx> that is originated by <spanx style="verb">O2</spanx>.</t>
  <t>A risk-critical AS redirects traffic to the hijacker, i.e., there exists <spanx style="verb">M1</spanx> such that <spanx style="verb">M1</spanx> equals <spanx style="verb">V2</spanx>.</t>
</list></t>

<t>Under these conditions, <spanx style="verb">O2</spanx> is a potential hijacker that announces the prefix <spanx style="verb">p2</spanx>, which is owned by <spanx style="verb">O1</spanx>. The invalid route does not propagate to vantage point <spanx style="verb">V1</spanx>. As a result, <spanx style="verb">V1</spanx> observes only the legitimate route to <spanx style="verb">p1</spanx> and remains unaware of the conflicting route to <spanx style="verb">p2</spanx> originated by <spanx style="verb">O1</spanx>. However, due to the presence of a risk-critical AS <spanx style="verb">M1</spanx>, which appears in the legitimate path and also has a route to <spanx style="verb">p2</spanx>, traffic destined for <spanx style="verb">p2</spanx> is silently diverted to the hijacker.</t>

</section>
</section>
<section anchor="example"><name>Real-World Incident Example</name>

<t>This section presents an real-world incident consistent with the definition of stealthy BGP hijacking in <xref target="stealthy-bgp-hijacking"/>. The incident was last observed on April 24, 2025. As illustrated in <xref target="incident"/>, both AS37100 (SEACOM) and AS6762 (TISparkle) observe the prefix 203.127.0.0/16 announced by its legitimate origin, AS3758 (SingNet). Meanwhile, the sub-prefix 203.127.225.0/24 is announced by an unauthorized origin, AS17894 (Innove Communications). The two origins are located in different countries and have no link between them ever observed during the most recent month. According to the APNIC&#39;s ROV filtering measurement <xref target="APNIC"/>, AS37100 adopts ROV with a 100% filtering rate. Therefore, it discards the RPKI-invalid /24 route. However, traffic from AS37100 (or its downstream customers) to the /24 prefix is still hijacked when it transits through non-ROV AS6762, which accepts the /24 route.</t>

<figure title="A real-world stealthy BGP hijacking incident" anchor="incident"><artwork><![CDATA[
  Route to 203.127.0.0/16                                           
@------------------@------------------------------------------>     
                                                                    
+---------+        +---------+        +---------+        +---------+
| AS37100 |--------| AS6762  |--------| AS7473  |--------| AS3758  |
| SEACOM  |        |TISparkle|        | SingTel |        | SingNet |
+---------+        +---------+        +---------+        +---------+
ROV-enabled        @    |                                           
                   |    |                                           
                   |    | +----------+   +---------+   +-----------+
                   |    +-| AS15412  |---| AS4775  |---|  AS17894  |
@: vantage point   |      | FLAG Tel |   |Globe Tel|   |Innove Comm|
                   |      +----------+   +---------+   +-----------+
                   |                                                
                   +------------------------------------------>     
                    Route to 203.127.225.0/24                       
]]></artwork></figure>

<t>An examination using AS37100&#39;s looking glass &quot;lg-01-ams.nl&quot; <xref target="SEACOM"/> corroborates the hijack. The command &quot;show ip bgp 203.127.0.0/16&quot; shows a valid route via the path 37100 6762 6461 7473 3758. Meanwhile, &quot;show ip bgp 203.127.225.0/24&quot; returns no matching routes, confirming that AS37100 does not have visibility of the route from the unauthorized origin AS17894. However, a traceroute from AS37100 to an address within 203.127.225.0/24 shows that the final hops traverse AS17894, indicating that traffic is indeed diverted to the illegitimate origin, demonstrating a successful hijack at the data plane, even though control-plane filtering is in place.</t>

<t>We emphasize that the incident, while in the form of stealthy BGP hijacking, is likely caused by benign misconfigurations, given that AS17894 and AS3758 have business connections through their parent companies <xref target="SingTel"/> <xref target="GlobeTel"/>, We reported the incident to AS4775 (Globe Telecoms) on February 10, 2025, and received confirmationa that it would investigate. The original looking glass output is provided in <xref target="looking-glass-output"/>.</t>

</section>
<section anchor="measure"><name>Detection and Mitigation</name>

<t>The definition of stealthy BGP hijacking naturally enables a practical detection method based on inconsistencies across routing tables. By comparing routing data from multiple vantage points, one can identify route pairs that satisfy the conditions outlined in <xref target="stealthy-bgp-hijacking"/>, and thereby enable timely alert of ongoing incidents. The routing data can be collected from self-operated ASes or public platforms, such as RouteViews <xref target="RouteViews"/> and RIPE RIS <xref target="RIPE_RIS"/>. The incident discussed in <xref target="incident"/> was discovered using this approach. In fact, an existing public monitoring service already applies this method to track stealthy BGP hijacking events in real time <xref target="Chen"/>.</t>

<t>We emphasize that increasing ROV adoption across global ASes remains essential for improving BGP security. As the adoption rate increases, the feasibility and impact of stealthy BGP hijacking are expected to diminish significantly.</t>

<t>Meanwhile, immediate countermeasures are available. One such approach is ROV++ <xref target="Morillo"/>, which extends the standard ROV with proactive rerouting and blackholing capabilities. In this proposal, when an AS enforcing ROV++ detects an RPKI-invalid route, it not only drops the invalid route but also initiates a route selection process that tries to find an alternative route that does not contain any ASes appearing on the invalid path, thus avoiding any risk-critical ASes. If no such alternative route exists, the AS blackholes the corresponding prefix, as operators arguably prefer controlled blackholing over potential hijacking by malicious actors.</t>

<t>Similarly, Cisco&#39;s patent <xref target="Cisco"/> describes a poison-path routing policy that can mitigate stealth BGP hijacking. In this proposal, when a BGP router detects a route to a hijacked prefix, it searches for alternative routes that cover the hijacked prefix but share no ASes with the hijacked route. The router then selects such an alternative route, avoiding ASes that might divert traffic. While conceptually similar to ROV++&#39;s rerouting mechanism, this poison-path policy is applicable to any AS, not limited to ROV adopters.</t>

<t>While the aforementioned proactive mitigations are available, they tend to be overly aggressive as they nondeterministically overwrite normal routing policies at runtime. Considering the cause of stealthy BGP hijacking, the lack of transparency into dropped routes is what makes such hijacking subtle and less visible. As such, it is important to note that dropped routes often carry valuable signals of abnormal events in the global routing system, yet these signals are simply dropped along with the routes. Therefore, improving transparency of dropped routes presents another viable approach to mitigate not only stealthy BGP hijacking but also more general routing anomalies. For example, an information-sharing platform, such as a dedicated mailing list where ROV adopters can publish digests of dropped routes, could help potential victims identify risk-critical ASes and determine response actions on their own. We anticipate drafts on such a scheme in the future.</t>

</section>
<section anchor="conclusion"><name>Conclusion</name>

<t>This document formalizes stealthy BGP hijacking, a threat enabled by incomplete ROV adoption that evades control-plane detection while still diverting traffic. We define its conditions, present a real-world case, and demonstrate how it can be detected via routing table comparisons across vantage points. While broader ROV adoption remains essential, mechanisms like ROV++ offer practical mitigation by enabling coordination among ROV-enabled ASes. Addressing this risk is critical for improving the security of interdomain routing.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>This document includes no request to IANA.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The stealthy BGP hijacking behavior described in this document can be actively exploited by malicious ASes to divert traffic with less likelihood of being detected. While the success of such attacks depends on factors like accurate knowledge of ROV deployment, their impact can be significant, particularly in scenarios involving non-ROV transit. Detection and mitigation strategies are discussed in <xref target="measure"/>. Network operators are advised to adopt ROV where possible, explore collaborative defenses such as ROV++, and monitor both control- and data-plane behavior to identify and respond to suspicious routing activity.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC6480">
  <front>
    <title>An Infrastructure to Support Secure Internet Routing</title>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6480"/>
  <seriesInfo name="DOI" value="10.17487/RFC6480"/>
</reference>

<reference anchor="RFC9582">
  <front>
    <title>A Profile for Route Origin Authorizations (ROAs)</title>
    <author fullname="J. Snijders" initials="J." surname="Snijders"/>
    <author fullname="B. Maddison" initials="B." surname="Maddison"/>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="D. Kong" initials="D." surname="Kong"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="May" year="2024"/>
    <abstract>
      <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9582"/>
  <seriesInfo name="DOI" value="10.17487/RFC9582"/>
</reference>

<reference anchor="RFC6811">
  <front>
    <title>BGP Prefix Origin Validation</title>
    <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <date month="January" year="2013"/>
    <abstract>
      <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6811"/>
  <seriesInfo name="DOI" value="10.17487/RFC6811"/>
</reference>

<reference anchor="RFC7115">
  <front>
    <title>Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)</title>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <date month="January" year="2014"/>
    <abstract>
      <t>Deployment of BGP origin validation that is based on the Resource Public Key Infrastructure (RPKI) has many operational considerations. This document attempts to collect and present those that are most critical. It is expected to evolve as RPKI-based origin validation continues to be deployed and the dynamics are better understood.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="185"/>
  <seriesInfo name="RFC" value="7115"/>
  <seriesInfo name="DOI" value="10.17487/RFC7115"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="APNIC" target="https://stats.labs.apnic.net/rpki">
  <front>
    <title>Measuring ROAs and ROV.</title>
    <author initials="G." surname="Huston" fullname="Geoff Huston">
      <organization>APNIC</organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="SingTel" target="https://en.wikipedia.org/wiki/Singtel">
  <front>
    <title>Wikipedia - SingTel.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="GlobeTel" target="https://en.wikipedia.org/wiki/Globe_Telecom">
  <front>
    <title>Wikipedia - Globe Telecom.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="SEACOM" target="https://lg.seacomnet.com">
  <front>
    <title>Looking Glass lg-01-ams.nl.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="RouteViews" target="http://routeviews.org/">
  <front>
    <title>MRT format RIBs and UPDATEs.</title>
    <author >
      <organization>University of Oregon Route Views Project</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="RIPE_RIS" target="https://ris.ripe.net/docs/">
  <front>
    <title>Routing Information Service (RIS).</title>
    <author >
      <organization>RIPE NCC</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="Morillo" >
  <front>
    <title>ROV++: Improved Deployable Defense against BGP Hijacking.</title>
    <author initials="R." surname="Morillo" fullname="Reynaldo Morillo">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="J." surname="Furuness" fullname="Justin Furuness">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="C." surname="Morris" fullname="Cameron Morris">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="J." surname="Breslin" fullname="James Breslin">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="B." surname="Wang" fullname="Bing Wang">
      <organization>University of Connecticut</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
</reference>
<reference anchor="Chen" target="https://yhchen.cn/stealthy-bgp-hijacking/">
  <front>
    <title>Stealthy BGP Hijakcing Incidents.</title>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="Cisco" target="https://patents.justia.com/patent/10015081">
  <front>
    <title>Poison-path routing policy.</title>
    <author initials="J." surname="Heitz" fullname="Jakob Heitz">
      <organization>Cisco Technology, Inc.</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>


    </references>

</references>


<?line 351?>

<section anchor="looking-glass-output"><name>Looking Glass Output</name>

<t>All commands were executed on &quot;lg-01-ams.nl&quot; <xref target="SEACOM"/> on February 10, 2025.</t>

<t><xref target="output-1"/> shows the output for executing &quot;show ip bgp 203.127.0.0/16&quot;.</t>

<t><xref target="output-2"/> shows the output for executing &quot;show ip bgp 203.127.225.0/24&quot;.</t>

<t><xref target="output-3"/> shows the output for executing &quot;traceroute ip 203.127.225.1&quot;.</t>

<figure title="Output for &quot;show ip bgp 203.127.0.0/16&quot;" anchor="output-1"><artwork><![CDATA[
#################################################################
BGP routing table entry for 203.127.0.0/16, version 3804070796
Paths: (2 available, best #2, table default)
  Not advertised to any peer
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.17 from 105.26.64.17 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external
      Commnuity: 37100:1 37100:13
      path 108E73DC RPKI State valid
      rx pathid: 0, tx pathid: 0
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.1 from 105.26.64.1 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external, best
      Commnuity: 37100:1 37100:13
      path 0AB3654C RPKI State valid
      rx pathid: 0, tx pathid: 0x0
#################################################################
]]></artwork></figure>

<figure title="Output for &quot;show ip bgp 203.127.225.0/24&quot;" anchor="output-2"><artwork><![CDATA[
#################################################################
% Network not in table
#################################################################
]]></artwork></figure>

<figure title="Output for &quot;traceroute ip 203.127.225.1&quot;" anchor="output-3"><artwork><![CDATA[
#################################################################
Tracing the route to 203.127.225.1
VRF info: (vrf in name/id, vrf out name/id)
  1 ae-2-21.er-01-ams.nl.seacomnet.com (105.26.64.1) [AS 37100]
      0 msec 200 msec 0 msec
  2 ce-0-0-11.er-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 200 msec
    ce-0-0-11.cr-01-mrs.fr.seacomnet.com (105.16.8.201) [AS 37100]
      [MPLS: Label 4474 Exp 0] 204 msec
    ce-0-0-11.cr-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 20 msec
  3 ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
    ce-0-0-2.br-02-mrs.fr.seacomnet.com (105.16.32.253) [AS 37100]
      24 msec
    ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
  4 213.144.184.130 [AS 6762] 24 msec 20 msec 24 msec
  5 213.144.170.125 [AS 6762] 40 msec 44 msec 40 msec
  6 ae10.0.cjr01.mrs005.flagtel.com (62.216.131.154) [AS 15412]
      [MPLS: Label 7391 Exp 0] 172 msec 172 msec 168 msec
  7 ae1.0.cjr02.sin001.flagtel.com (62.216.129.181) [AS 15412]
      [MPLS: Label 3621 Exp 0] 168 msec 156 msec 156 msec
  8 ae18.0.cjr01.sin001.flagtel.com (62.216.137.165) [AS 15412]
      160 msec 160 msec 172 msec
  9 80.81.75.186 [AS 15412] 164 msec 164 msec 160 msec
 10 112.198.1.185 [AS 4775] 204 msec 216 msec 204 msec
 11  *  *  *
 12 120.28.4.38 [AS 4775] 220 msec 220 msec 216 msec
 13 202.126.45.138 [AS 17894] 224 msec
    202.126.45.134 [AS 17894] 220 msec 232 msec
 14 202.126.45.180 [AS 17894] 208 msec 216 msec 224 msec
 15  *  *  *
 16  *  *  *
#################################################################
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA91ceXPbRpb/n5+iy66pSGsSJinqsGoyFVo+okwceSRPvHPV
CASaJCIQwKAByYzt1H6N/Xr7Sfb33uvGwUOSHU9VdhnHJsBG9+t3X41er9cx
hZ+E//TjNNHHqshL3YmynL+ZYtjvP+kPO4FfHKsomaYdU04WkTFRmhTLDONP
n795oTp+rv1jdZbp3C/wk1GYUb3yE3+mFzopOjezY3Vx+uz87PWFepvmV1Ey
Uy/ztMw6nTANEn+BmcLcnxa9OOqZKMzTzPRMof24mC978+gnP6Bnev1Bp1NE
RYzh55G5UulUXdhR6unL1+pbN1KVSahzdZoE6SKLdaHVOEwzgo2eOU9L3DnL
o1mUqB/9OAoZbLVzfvbjbsefTHJ9fbxtZlq4E/sJtqSTTpCGEX0tTc83QRR1
rm6OO0r11Lk2aZkHWr0uJ3EUqD/qJcCZ5r4BYoOizLUM2wwK/9Zat/NQ4Sds
fNgfDnt9+qN6Pb6nIqOmURzrEDRSflmkC0wS+HG8VJOlereIh/k0UNFUJWmh
ZtE14O5g2DzNCVb69Oy/CjOYY/UnT30fVbeEPn+KmvfSHJt+YwDYvPTVnxNM
mpuoWFYDsE2twTV7fXWBIcnsX4y81A+rIQHGH6unOvqJ9lfdTUOsNuj3+0ej
xs0yKXKMPplHiV/d1gs/io/Vv+KoP/imsNB4Oiy9INm8s794mEInK3v7SzT3
0/YPv6kNLue9AMANB9/QtfHutdU/euo/y5WN/lE37/2m9viuvNL3o+FfiTtX
d/bXeZkWIGLzl9/U/n4WAOOovN8uv/PU29VNfhf5SUYgvv2NbvInC+A3gc4T
XbgNdpI0J510rUnhnL84ORgd9e3XJ/tHQ3f3aDCwXw8Hg/3jTodsTuPJ8esf
Tk9EZ1kz8Er7psx5Q2djsTtQ4h4Paas4i9aXnvoWhi1dVQEvdTqdrv7EuOVF
+ZYo4Fd+HszV4KhLqnhfgPHzGaF4XhSZOX78GCa1MF7sT4znZ0kUeMDF4zy7
Iv15AWDf6Li1i7fRVZTpMPKh9e3v3qetqBPvxk3iAezHdPWY5ip0jCdexulE
37YsD1AYoWEyv8jiPOM/7Yy08efjk7NXLQC+T1PxBWLfGBWTge/5C+Mlre2/
0JO89PMlWPEWIOKZZ7SPpYjvZEU2rj9G+sa0eeb8jRK2UuenT4Vp/vz62fjN
c7OZcZgNaskiF+Is1zN4DGK+eQn1Ok9/0kHRAHwjrAA1p6eu6SHGFkF6+vr5
P89PL1pw0uSEnVMnBFjwQufXEbyKHQzevQVamlD9cHJyFzSEuTwyXg7qMZfC
HzME0as0h0uRtgB6ANF69AhO3yLL02u4G890FqdLfxJrfJ3qxGjlz3zIWdF2
XrwHGyGtNZ4VznPPrdv4ReTzXC8TPw7TDQM2kOckTRLQIgrKol5NrS4HFfui
zMtEG7O23nfQBPCmNvx+3+VWVzvhzQHZa2ud4O8cxF37+XOXwsae5trEUbK+
L/xtNvz6uUuNoU91/vNE57O1tcaLKN/06+eu9RQm0U/W13nKJrH9yz3WqMRi
wJdG55E2ZHEchz47OyX75w1Gh8Ph4yQ0xqPR3nA02jsibiKPsSUhazHDVSAS
HEQhAqEt+mVto6te6i1+6h0OwB2iv5yTXwkT/biKtiazrI64SBOcRCZY0QOv
08ikSS/zi7nKrZbK4NoEy/tK+nfENlHx8wb+vEona7/xHhkQmKhgnqRxOlt2
Ca9ea5uDo43bBKCM/Z9IqH2yDvbWY3g3g/3+EeJKXJEX1HnY6fQQWMF2F7kP
dd55M0d8BbVYUiirQm2CPJpAhubpDfZSBZj+fQNMtfCv8Dg8pAKqki2RoYeI
ZSrEqxhKR11HJiLlikeLuYbvBdcrjVWG8FOrm3mEn7ChOFaBn7EWxjQh0Z8p
AvinUzgf6q1W+h0eimQajo3jJQ1ZAJl+EplFFxubRpiVBhBINBV9L+aI7Ysu
jKQfL3/GNhOFG3HvJs1jijeFsTEM1lS/00BGNIUY8bORMaXusn0NQbsSO8pS
Qnvkx+JI6nzBDhw9kKpFVEQzDmgLo6JFBvR7Qo1FFIax7nROCQEh4mfC5vuH
UePyY+frxqfTaaMzDYIyN8CZTmgLYwTJSbpIS6MulmD9hdoZX+wC1ED2w7Fz
moNUYOoIw2Jw2yJCkJ8kgDvQ5DWA5GFOZMpy4O4doKZInGJsYf/oZ5hIbCtl
PsC+PDW+YNQAV1hJZ4UyJZwrNykz2MJfWho6AhLPgaCYDIRhxNoFMTegIB7M
cyg2zE7CBUEOHfWAwRK4tuPnaQzKe+pNA9UFcTeszlX3Dq59/9566B8/qhsf
9LG4B1i4ynzAaxe9O/WBKV//8dTNiVjg40eP/PaeToiNQ8HTtYCgWcXoFpaM
Ko1EMQ2QxxbrNge1QxGBXYOCjI8fuyQzwLfJdBBNl/aK1/IBVAZujIpihWg8
mqggSNQG+MMmoQEKBZ7KiWYZaQpyy3gxil2AJFPOZhhkSGyn0UyilJa2jITt
Kd1FzEaZGeUrkH6pYigXWlBjfsyLUYwEKCINBJDgMXYov8PxTufb9EbjyS5d
1rrID/LUiDCekrTBwyMebaotCCeUA9hH9p1TJJcok1bMhn+10Zr1y7Qk8nmY
zHKuolAHMu7gaROJeFkUFBzGzLcMh53M5pCTpEewikiAkyuNqN+RjugCxbQ0
/iGEEZIQYNgNtxiFCIJNxRGoh1tuKdp/QMqLyKtgEUu5Bx2AWU260LJ2QnjD
vgNN+Ge9ZTdjUU4oIv4o6EEGqUxu6Ibl9zSZpQRipQx3tDfzug1d19JFu576
iyaNCbGgWUhhTEtSOIC8EELA/M2JmL7QzikCfqbiTPwcp6TnMQJy4hOlAFfI
/AXT3FVMADxMHgGxVo1zUUJzzC+KiIi/unOL18ZDN0RKu0oNVEqXVuNXuii1
MnkBpUf4Bw+VMYja3I7bCQHMpCiTqyS9wSWQMYUOhgGEXC2IPVoo7GIkG0hG
COSLbAApO6KgtSjCgZYUZMo1b2qXJM0R24/BckZN8xT2jjAOZihg2a5Uyrns
lE1GChWQFm5/TGKWAD2dYqfdFcM9oXAXe7EOVYRJ2e4Ck4FvQLSwZHne5jqQ
+IrUzhBAg3mYxckNAadNKMIkyJn1mn5JxEI0j2bzGP8LtAawWijpgcaKLSWB
PyvYFcUoJCNtIfMu3Z6WK1tmXmK14hwWgCKkMxt9F8tZDaeKfA8jW3LexwpM
1oMx7BxscmFM5aQIv605KS1PRJMvYgTaUJPYsb7EAGsa+TKDSPpwkR0BctL6
m3BfmTa2htMUEeoN3NwLO++Q1qDU7Sa6EDGiZBNDeNUEew0caUsZ2v1mitTP
jdo4yUiVw71hHtqAovrB/RainCLbiilylgs9i0gbv4BMx+QwubkOiPpBXIYW
fIc4IPWCUPG8QsVpm0Wros37hyAESLVoe3nbP9ZtNxaCinnIaW8zb+An1kbB
ogWaCEgm8RqOoohyU5KlrLRFkDyYf8vmPWZzOAGYtxTcmKYYyO9YYO5fR1BI
4pfW7qa4ckCvtV5tkH04KYtMlBBzoglgD/Mo7dJzL9UOrSTDdb6rGj6r2jHl
pLdr/cEYBIOMYg3ydm8SMa+Y4rlMIWHU7gbX7Ckj6RmVneBVKCjWlvloegFd
8iXSJOaJT/i5F2yXrAfchPUrY309OJcp/RLllcdU0PKG4pRMJ2zjRLM0hjin
Cnz1S/1phJG///pr9TlXmOJRjz+P5ManX2GKD4SBsfogd/jqaevqpHX1rHX1
XH3YDAVx4LZ1G7+9YVo2cNH+/P6XX+y3D/z3L7/8YcvIrVPUnw93/P5/bIoa
N+3vdoqvvwaqnn9l2mHcOhRb+cJi++W2KexQxwkvWnzxkvni/p9VKL6NfoLg
3X8K3u2mq5bIvT9WD9uqjlNHXz9oK7Jb1emDj53OCQK5iMaw5Pgcdet3Po32
5B5rFuvPsY1j/SHao6HgnD+6Q6KEQB/RYyB5hjKjApm/IO/72q31FFOSq2U2
ecUtf5Z9R4LkK7Oi3OFBUuhIprZr4wSA6l/DDeBYymo6G+eKc5LiuYD3SE9u
TwCIZqZtTsimsMuNyUMdU+ZAh56q4kEgzcDqkX8B+0RxgjNOFnjfOZotgGlL
//Nf/20qGMQzI1efYwUJ4khpOXcR+jzTFmOrCr02VeIDN6MAsl9RDIZnQoZR
XsWizZnWdfrOuTUVjHs2D7ufIAg0Re+zP39wU/zKz/9/y1J/7qOQt2P80X2n
2BlL0mslGt61T/86s/CbnOIWy3L7FL/Osqzs4XMsy11o4M/tUzzq3fEhUV0z
TrUedJbpGcIdBEh+EiyhVIsbDY+8nXDn6JHyLHxJ5umpDvzSaJG+GHpqzQI5
9dWl7LDk1ih69Zv5I7jzGONSGhhnExrm0zMahpNnOeIvSitFUK+SDIX+xaNx
GnDivWWlJOckXXs5qVMJTGldqFYb8JG3TYuYLBXfu7W9VoLDxvZVJoJtdplU
Ocb7JSWOCQ8IU655zy4zyLGHZGsmhirhnHVrJuu6VF2R4ECScrWzsaDMXRiR
zYHl5sQrb47rI5xqpXuc1tyYDiE4sXREEbGzXQ0dI+UYIbGFq06G+LxfFz1t
SomIod4SzY8TDggxoDQUNLlpt+Rjoulxp9MDyTnBl6SbWdIlogjtEsfxZsHl
9PC4gPfkU7Yj0c0UYJ1ybDhXXAiUeG6L/bfx+HUZJzr3J1FMNVk/y2KbA5+k
xXxTVkkcHRIrG7NyMlZRFCs3MHPnGaVGIpdB29K3+f5hWA27Xxah03kh/lFL
YnrsxnHTbAYO45RmI9Pg0jRbSHN7AqHT+SEt/Cq/8oYKElLrBPiJ/eljx2k2
qoe1U1HgVa1II0ninrJQtKp7VJheCpgMmAgNuOXy8rKTHasfled5aufVLv97
xrc7Ngtsp6iSSC4vUTGXpdBldkm8LBJKPqsg8dpPCn8GXiGkqcsfL6WOYvS/
Si5xgHK1eONnx67Wcb88u+SsQSSJJGZLKtClrLO4kBhStkQmuXx1aTN2ZrmY
pDHVi7Rk8YVAlKajbWeXx51jBuT0tduAFBx4WyFmASxuTGsPUOme9sSXhWAw
3KIpOEXnvPsKDzvFMrNdudeR30JeAEqBf9J8l9Z7xeuNk9V9dWvccxYoWVaJ
fEiS9vNKs7A8bkckYx6oIHyCERaUS8yollzaclhXap/8K2SfxBePOSxUqX2n
GauKhGlsnRg4iH1KAbfKaY36JbCPmd9SHt6k7QK049yiIQIU/GDGnFQH1o99
Sj3ZLCXZr2OOF6dxFBQM6k1VNCO6Gz8KbcAUsWXngdQVzUWEygBwgtZfVECm
fDdFLBUDy+xN2kKgM8XEihFJAzOjFBdhG2odVRWKqMSA4HMi6bIor1FJlT2Y
Jq7OzjmVHpLt5pC2Tr+S3kBADN1CXgoedPPfQKuaecRlxGYOAeilSmvPGknm
q5o1AxtdgzmbowgnFBnbyaHhKQNOZvz8bFxBX8MO7aOl7s1DnUBYROiQualB
dv2O0qzCKwuf0pDJrJjX48EOoL7UG9O8rhJRhpWRUwuSiWbwdayL0ai6E/tS
t4gUXnW4oYTsmJfYPKaS+WqRyeHuPphr4a1GTBt1q+V7sQX0vAT/LbVB6GwS
haCJzFUPupt7+62KsG5Bzdt5c5BApIJ5mhqxs9uKd9xH0HCk1v1X8W8wGwsr
ORZ3pFroT2Ha+VvK+G82zw0b/v7h5mak2vBt/XQ6L+l4AwmNT+I1rdVv29QN
YOsG1tgNrLUbdLIhbg/t7aG9PRQrON7qbdX45y4TSea31Rh59JE42dSEASgG
Yv6KWkk5leTsymU2vKTJYSBBSdahd+iYy2xwKax0eYZnK7GsZrg8G5DGHfLa
wI/f7JiQUj7pIePPcq2b9k3W6DkTkg17ZwJck0UdjwCMHhaqfnb8uydbbvPZ
atmQVpPSoVt/1XHAzNatFdo2kmlNJwTwubpkZXy4vkG4ATQjjwS6JS0QJpeA
Mg0JWQ3kHFZyaquKqMPj8hWAYuvJS/IlIx0//cir/ZllHQ8Z3WCGrhAqamv5
ykEX015Vb1qWc3jpFBht0NVumMAbsFyxQqMPI92A2ZXkJiPbSpCR/OWKrFd4
J95j1tsS5DrurlwreQi7X6UOQVFlL22MYrdunKfor1OOkF6lIq07ZBve1iIV
iiGcFvPb4HQ3J12dMFaZSmnR2pinPKe66luuq7rGT/VcktbQbTZ9fVcIslLA
rH3uzf13lV9QqJuoEBsctsKibdqLssJb9O1Hx0p2EWr7ijkmdEoVU4+zPIrV
cCSt+cxAddEzlPndDJRz5khvfLF3OOj31Y4cCthlkowvDg4PhmrnzelF5udX
lM61CzVZf9jf8wbDQ6/v9R8PDirxYOYhe7NmiLq82v4RFsOmfuCC5ivtJ6ys
RL011Kibfoi99B8PRyyczTXWXQ23yODw6MlI7ZxiNEA+SReLMnEJmN1a3csD
4pRSRsZiSdw/oSUdsYls59HcvyYnXMVRclUlpgD0QnHfUkWKUBrM2KlKTcEZ
IWonROw6B1WCIM2bmRs+1YLwvBX9NzNNIBuPIZo5cnGgKs8wl/l0Ouh3jedz
X9qGbKMUZ73IQ68ahFp+JqHXlgcqga8yK1JXsWwCCSTahlB0tloT0EmdBbze
Xbcjms11Yhpb0rdSGYpNjriiAkHhLMVqGxoxX6OWUeUyGlCu1iDOneZYYcr7
fzrfrDsxG27dltv8InUITFInUh+t51bveavzoaLZB3fzgxPs9q3D0eHeyi2W
UvUBk4haaOSHP1RKob7ljkqplVsQcUzyRbbTbHywn29koU9A7IZ796oB3HOS
RgKc9vBoy9WWioCtAxD6B/ujgaUSXY4OD/fdVaXdgNhvjlcch2onH9SL78cv
lSPJh+pMGV819OLGwoKd5Ats51M+mya5s6RQf24RwDXlUJmULZCs1ijq5nqp
UIybln+rOZdnqDoxllq5jZ1tx7QVz6+oGiCH72Z8+O5B8/TdAyh/EcGPH7m8
nE7SuodJVhODFoCaZKUeGD4OkSl4ECva8AHXnw2nAGuPlFJgVapKNAYriYPR
wUCxbiBt0LLUG9dwSH0A5BRlnnBgwHF35WnCzeZMAGWSbFrZKanKL2Yry2GI
pKat1yqwsi2SkxNrht9JRrPi3ijOtO2YNOy7YwNkQjHBGnsIuiT9TVEktdMh
bMxM3cprF+26PFGdL6+L6viJutlWHVV6UcCahxRq+AnssnFmUVrhjJmWzoQq
C0xd/+pKjxzQQWa0XVSqHQKGgx4I2HzSSZRFBrcbGKx3WDdo2iSDC5+lEXQz
q3cV93xfUe8aV+HYO5voJJolzeSPbyMtfu+Bo74oM3E62eow/SckIkSZwJ4U
o3jdOQqSsIMNEhdtkfkJuWgQFLFCkJT3790xW3KauKqUpXndW+3EOXXadad1
6hauDMR07bRr14ZVXOALHSvztnwb4sI1T0sOB64paJk5L8zFVvGKsIMzs5JD
Y9v0Yv10O6rHo3oyClEAVViafZ+v6r7P9w+ty3ivkoqk5O8Vl0BpgXaU4xP7
KyUgPmbR6kNdaHAgSO8bCUeaKVJ2oaWXut1F6KmnS6Fh61CGNNGTwFYp8Zal
M92qQYcpSWdIRMop22RF1gAxZrp0Qa9L+2BYzNHkrQFXlQjM9cTtHOp/QUzO
zeqc0lo5b2BPpLR2QTBOqsKCq8IYHU970tpe1SLB03JMB0Ja8GG0rj3bYRoH
qOlkS3UBVueD9nTG+Pz0gn6z55fXQkbXRLwWCHIwSb+m3LBkrRMXs1zXNTcN
Tf2AG7cl1cLpdwEXCisqUqafsYei/RgGMmzUFWk2yyCk/XJSZFv4zVaaIwmv
GeeAl45asgCsKy5sBSPlFNKGIzeN5v0qJQLVYlM8lFKI+BQ1PU+QINAvqbLB
ATR3BbgJcz4RJ6uRLWPVSCu7KipIIYflbhEnn5NV9TGfMIIxjMycM+jcJ0BZ
DWy0YW+jhas9rZ7Vo9mqRjZPnSW2duQox6k/OisOFNrz2vXpKz7eY8NBLqNS
ProKKXkC257uOJp2OKH2inkaS8t2JiVkbjd3NVBKbaXGj7v1Kb8LiBBQHVgi
AR5RHJKRb4aiLMYcrpI3wJkufgvRev8f1z84e9Rs0JafDClym69JAzmgwkbZ
Vrmh90L2AGJu0pBtiptI4ypvhKwp9TtIiU8bm9Cqm54rkOScTzEvMeY6jUJX
GFxNjzGi6AVAllBrAEgms6pmOnRXbet5o/lDomzuWKjPyfj5rAQ7LO2xNecR
UOTUpB2J+1quk8/NLBvt7z4VQw2fD1iAy3I6TcDHf7+io4aFpCf4BjRJfSSX
sqjbTiYLikkvVmcfraysdltsY6i6YJvXfFRnD/062+AQBHYymt6fobl5ch3t
lkFYCTbTiGFViwazmbkcExNWqNJ71dDqsJZ20BUErzCjcUdM1xfv1ixTn0td
8Omh9gFUT71lv4xOceiMmuu49MaUsR0kjx5Rq0clsY1zxYLKBlksOUTR46vv
emSY2bssAO4sn21PYV2omSEEElaQlGGiTBXkTY79uXapyj1Z0VRdKfWS+rHV
Mi7rQoXOZuSR85Ewe6gsAa9rqT6T3ZFyIw2/gVARNeCCxevHOYHBHLoS1sNT
rnnZpeWkV+wWh5Zz1WSjKPqgRBV7m1zptcdEs6qQRfi7YYLxaXImci1Mppwg
ZGTF2TxIzsaFhnbtYWXYDTiovjilQLxTRO2l0mlBzXB+Dq8UaqdkirnSK2Xj
JxYdtRGlrVgT6HBk+KB1Vy3l8KOpp+DyPECxSjfjEjC1GVW8LoC0M4uV+Wyh
ik7At6FvpM7ljB9CT9pAZayaJ88r7b/FjlbKn+twM03dTPUWsQLpMD4EBXG3
qf6uVFerl7j0SKCZa6zHVTtcPhSLFP5DRW9U4jcBgP/sodWmLLAqY18IVjyM
5Kjx2u4p9KXIYK7jrKF23eG82o1dsxfS7mhFQNveP8NHysWhdadv0puEW+jA
RZAB0s7yLj8e4k4JQwUu6sBOThFzu0YQl0YCiaC6aMYSq+9fYCzG0c9bW6w4
/uaXFiiXuZsst559lPcWXPuhXm3fr0OM5osWNr9dwbauRHLYuyruWc5rn0aU
BnhBrgu6tbxMonBuu6wNyClL0gpdXNRiWLmJq9mOUZyynoC5ub+gud01T7Tb
OD/J0bT1k1IqRjQCrsZRPxeYSF2bqwq2ZW2Rip+1cjp7LPmOyr8nXuMmCsdu
bW+Y/ULrDUuHKHgwTPlYusUFWOehOh3/MK50rFX37x9GfuJ/XGWayJ0+pF5I
ajgzrPBoBvIx3GJrkzkwPiG43aY33Ek/56yEVdNsBaUlvlgxCnzfZXEa2bpo
82igfW1A+yURrCtZ2XNSJJqnKb8Gwh6ftxzluEOqXpzkYYvEYsp9yMaesGPx
nYojJpzhU3cDMSsd0gZ5Z9qdXg35PVDSVSNKwQYkdkuNIKPLr4qgFlzy6ggJ
7vAiNwKk8bU0LEpVxpZrPPXs7oOn0t3XjjddcgJh6Q9rJ7vZNwhhGsXRYCGR
QISVrTseLEePSd1TNO1zJpQ8hVDeeGXqaJkkR0TbBqdS7HR6pWogXz39SafB
nSKWXA+72tKObDJL98rIEH9QpCivRpmAZp1O+01qZ5Lfef9wY0LnNmbudMb0
OhnJ6sLDkCYHiEEh6ZXtaeJNqSuA+P69rNqj94a4zKZ2GagpW0manoC/LYnc
nGr4mVNVueLmZHv3mKyRz43a0w0erBxMevhrPx0XZdQ6X9MbFxmmNlK6il/1
RMfDj/qj/mH/8MlB5zV8bHOsdoZNv5ffVvJw2LUTgnX9Mi52O0r9QK+rCdmo
OTmAH55pPrlxrqfgxbl6nqX0DkDc2Zqp5xLIoL/vDQ+8g5E3OJSMU+vODl0N
DgD9YG+wa4sm9uUtpy9fky1CqBwocA8fVaAYiCrMXXdEzh1usI9SKSkp+d2V
DNfxwP27Z0dwwDHoHz0/3Ht2whG/uqAuJ5nQDsrf8bgoPKaVi8bVr0PBGga+
HAKEop+Ghv746d7B/ugz0PCu/wXYerW65dSCq26d1ZL391sUwd8fUGnry0rc
7yrjQO4/2WWSkn/fnof33rPTWP+OXb+BUnP+VpXEaOm2zo/nLzhwgTq5zskT
45e0PSZOpGs69m9vEDMPlK97w95w4Om88SbP1ls5RQSsPOyqv40vhFf/YZmw
rxZwugCG/SL/4MehCnSvj/8GMv2wt8iNN803TQ8JO/KG/Scb5v/bq9ffXxyr
7/2JjtVwOBqq5+8y1f9HtSKPq5cKeCd3LrVpK62lRqPDUb3UaNtSX35XbqW9
aiVvcvdCe3vecH9vw0rDdSwN7zXhcNuEG3DxhSAcqeEA3DwCpx3h/70+DybF
/Q+3rBvdAGO/fuoQenq433hqZEeP7NOjaq0D8P4AGsoLfsr7Aw+g9wHnNPbp
/bsC+AFQAMCh+b3B/kgg55aLjVQ83HsycFQcHA5lvfrLwZFb+ZBWtgsPPURZ
fay/ceHhEyBicNfCewfDemG7DIYftL/gySNa+Kja8m0r7x2CZPsbVh4c9N2G
+u0tYsATddT3jgbeIQh+dNB4GKNH7rFR+/kOzKUaDIbe4MmRB0QfCfmo2loL
Hih84Mjv6D4YKPUf8gcXQ/zpe8Mjb+TtHTVnqPil+jJwCBnskc8LNB94I0Bs
n+NKMz3Y4PPWsFF7mJt2z6FhMGqNP+q3xvePVndULTTYb+7ooL74t9m1vY12
7RbnWcza/wKF3GUHhWIAAA==

-->

</rfc>

