<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-sidrops-rtr-yang-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="YANG Data Model for RTR">YANG Data Model for RPKI to Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rtr-yang-05"/>
    <author initials="Y." surname="Liu" fullname="Yisong Liu">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street</street>
          <city>Beijing</city>
          <region>Xicheng District</region>
          <code>100053</code>
          <country>China</country>
        </postal>
        <email>liuyisong@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <street>8 Yongjia North Road</street>
          <city>Beijing</city>
          <region>Haidian District</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="H." surname="Wang" fullname="Haibo Wang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>rainsword.wang@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Roy" fullname="Jishnu Roy">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <region>Sunnyvale, CA 94089</region>
          <country>United States of America</country>
        </postal>
        <email>jishnu.roy@hpe.com</email>
      </address>
    </author>
    <author initials="J." surname="Haas" fullname="Jeffrey Haas">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <region>Sunnyvale, CA 94089</region>
          <country>United States of America</country>
        </postal>
        <email>jeffrey.haas@hpe.com</email>
      </address>
    </author>
    <author initials="H." surname="Liu" fullname="Hongwei Liu">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>liu.hongwei3@zte.com.cn</email>
      </address>
    </author>
    <author initials="D." surname="Ma" fullname="Di Ma">
      <organization>ZDNS</organization>
      <address>
        <postal>
          <street>Floor 21, Block B, Greenland Center</street>
          <city>Chaoyang Beijing, 100102</city>
          <country>China</country>
        </postal>
        <email>madi@zdns.cn</email>
      </address>
    </author>
    <date year="2026" month="April" day="07"/>
    <area>Ops</area>
    <workgroup>SIDROPS Working Group</workgroup>
    <keyword>YANG, RPKI, RTR</keyword>
    <abstract>
      <?line 116?>

<t>This document defines YANG data models for managing
   Resource Public Key Infrastructure (RPKI) to Router Protocol
   (RFC6810 and RFC8210).</t>
    </abstract>
  </front>
  <middle>
    <?line 122?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC6810"/> and <xref target="RFC8210"/> describes a protocol to deliver Resource
   Public Key Infrastructure (RPKI) prefix origin data and router keys
   from a trusted cache server to a router, referred to as the RPKI to Router (RTR)
   protocol.</t>
      <t><xref target="I-D.ietf-sidrops-8210bis"/> describes version 2 of the RTR protocol, which
   adds a new Autonomous System Provider Authorization (ASPA)) PDU type.</t>
      <t>This document defines YANG <xref target="RFC7950"/> data models for
   managing RTR protocol (<xref target="RFC6810"/>, <xref target="RFC8210"/>, and
   <xref target="I-D.ietf-sidrops-8210bis"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="model-overview">
      <name>Model Overview</name>
      <t>Two YANG data models are defined in this document.</t>
      <t>The ietf-rpki-rtr.yang data model provides the methods for
   managing RTR protocol. It includes:</t>
      <ul spacing="normal">
        <li>
          <t>Connectivity parameters, such as RPKI cache server IP address and
destination port.</t>
        </li>
        <li>
          <t>Session parameters, such as purge time, refresh time, response
time.</t>
        </li>
        <li>
          <t>Session status and statistics, such as session ID, serial number,
number of received and transmitted messages.</t>
        </li>
      </ul>
      <t>The ietf-rpki-table.yang data model provides the methods for
   managing records of RTR protocol and the corresponding state hash which is a hash value
   used in the Canonical Cache Representation (CCR) content <xref target="I-D.ietf-sidrops-rpki-ccr"/>.
   It includes:</t>
      <ul spacing="normal">
        <li>
          <t>Validated ROA Payload (VRP) records.</t>
        </li>
        <li>
          <t>Router key records.</t>
        </li>
        <li>
          <t>ASPA records.</t>
        </li>
        <li>
          <t>CCR state hash, which is optional and is used to verify the integrity and consistency of RPKI data
originating from the RPKI cache.</t>
        </li>
      </ul>
    </section>
    <section anchor="rpki-to-router-yang-module">
      <name>RPKI to Router YANG Module</name>
      <section anchor="tree-view">
        <name>Tree View</name>
        <t>The complete tree of the "ietf-rpki-rtr" YANG module is
   represented as following. See <xref target="RFC8340"/> for an explanation of the
   symbols used.</t>
        <artwork type="ascii-art"><![CDATA[
module: ietf-rpki-rtr
  augment /rt:routing/rt:control-plane-protocols
            /rt:control-plane-protocol:
    +--rw rpki-rtr
       +--rw sessions
          +--rw session* [server-address]
             +--rw server-address           inet:ip-address
             +--rw server-port?             inet:port-number
             +--rw local-address?           union
             +--rw local-port?              inet:port-number
             +--rw enabled?                 boolean
             +--rw preference?              uint32
             +--rw description?             string
             +--ro session-state?           enumeration
             +--rw enable-authentication?   boolean
             +--rw authentication
             |  +--rw (option)?
             |     +--:(md5)
             |     |  +--rw md5-password?   ianach:crypt-hash
             |     +--:(ssh)
             |     |  +--rw client-identity
             |     |  |  +--rw username?  string
             |     |  |  +--rw public-key!
             |     |  |                   {userauth-publickey}?
             |     |  |  +--rw password!
             |     |  |                   {userauth-password}?
             |     |  |  +--rw hostbased!
             |     |  |                   {userauth-hostbased}?
             |     |  |  +--rw none?      empty {userauth-none}?
             |     |  |  +--rw certificate!
             |     |  |                   {sshcmn:ssh-x509-certs}?
             |     |  +--rw server-authentication
             |     |  |  +--rw ssh-host-keys!
             |     |  |  +--rw ca-certs!  {sshcmn:ssh-x509-certs}?
             |     |  |  +--rw ee-certs!  {sshcmn:ssh-x509-certs}?
             |     |  +--rw transport-params
             |     |  |       {ssh-client-transport-params-config}?
             |     |  +--rw keepalives!   {ssh-client-keepalives}?
             |     |     +--rw max-wait?       uint16
             |     |     +--rw max-attempts?   uint8
             |     +--:(tcp-ao-keychain)
             |        +--rw keychain-name?  key-chain:key-chain-ref
             +--rw vrp-limit
             |  +--rw max-number?              uint64
             |  +--rw threshold-percentage?    uint8
             |  +--rw over-threshold-action?   enumeration
             |  +--rw reconnect-interval?      uint32
             +--rw aspa-limit
             |  +--rw max-number?              uint64
             |  +--rw threshold-percentage?    uint8
             |  +--rw over-threshold-action?   enumeration
             |  +--rw reconnect-interval?      uint32
             +--ro statistics
             |  +--ro total-vrp-records? yang:zero-based-counter64
             |  +--ro ipv4-vrp-records?  yang:zero-based-counter64
             |  +--ro ipv6-vrp-records?  yang:zero-based-counter64
             |  +--ro router-key-records?
             |  |                        yang:zero-based-counter64
             |  +--ro aspa-records? yang:zero-based-counter64
             +--ro connection-data
             |  +--ro flaps?                        uint32
             |  +--ro last-session-up-down?         yang:timestamp
             |  +--ro last-update-sync-timestamp?   yang:timestamp
             |  +--ro last-full-sync-timestamp?     yang:timestamp
             |  +--ro last-serial-query-timestamp?  yang:timestamp
             |  +--ro last-reset-query-timestamp?   yang:timestamp
             |  +--ro last-eod-received?            yang:timestamp
             |  +--ro last-config-change-timestamp? yang:timestamp
             |  +--ro last-error-timestamp?         yang:timestamp
             |  +--ro last-connection-error-timestamp?
             |  |                                   yang:timestamp
             |  +--ro last-connection-timestamp?    yang:timestamp
             |  +--ro error-reason?                 string
             +--ro protocol-data
             |  +--ro protocol-version?   uint32
             |  +--ro refresh-time?       yang:timestamp
             |  +--ro response-time?      yang:timestamp
             |  +--ro purge-time?         yang:timestamp
             |  +--ro hold-time?          yang:timestamp
             |  +--ro record-lifetime?    yang:timestamp
             |  +--ro retry-interval?     uint32
             |  +--ro expire-interval?    uint32
             |  +--ro session-id?         uint16
             |  +--ro serial-full?        uint32
             |  +--ro serial-incremental? uint32
             |  +--ro in-total-messages?  yang:zero-based-counter64
             |  +--ro out-total-messages? yang:zero-based-counter64
             +--ro pdu-counters
             |  +--ro serial-notify?    yang:zero-based-counter64
             |  +--ro cache-response?   yang:zero-based-counter64
             |  +--ro ipv4-prefix?      yang:zero-based-counter64
             |  +--ro ipv6-prefix?      yang:zero-based-counter64
             |  +--ro end-of-data?      yang:zero-based-counter64
             |  +--ro cache-reset?      yang:zero-based-counter64
             |  +--ro reset-query?      yang:zero-based-counter64
             |  +--ro serial-query?     yang:zero-based-counter64
             +--ro error-pdu-counters
                +--ro corrupt-data?      yang:zero-based-counter64
                +--ro internal-error?    yang:zero-based-counter64
                +--ro unsupported-protocol-version?
                |                        yang:zero-based-counter64
                +--ro unsupported-pdu-type?
                |                        yang:zero-based-counter64
                +--ro unexpected-protocol-version?
                |                        yang:zero-based-counter64
                +--ro no-data-available? yang:zero-based-counter64
                +--ro invalid-request?   yang:zero-based-counter64
                +--ro withdrawal-unknown-record?
                |                        yang:zero-based-counter64
                +--ro duplicate-announcement-received?
                                         yang:zero-based-counter64
]]></artwork>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <sourcecode type="yang" markers="true" name="ietf-rpki-rtr@2026-03-31.yang"><![CDATA[
module ietf-rpki-rtr {
  yang-version "1.1";
  namespace "urn:ietf:params:xml:ns:yang:ietf-rpki-rtr";
  prefix "rpki-rtr";
  import ietf-yang-types {
    prefix "yang";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-inet-types {
    prefix "inet";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC 8349: A YANG Data Model for Routing Management
                 (NMDA Version)";
  }
  import iana-crypt-hash {
    prefix "ianach";
    reference
      "RFC 7317: A YANG Data Model for System Management";
  }
  import ietf-ssh-client {
    prefix "ssh";
    reference
      "RFC 9644: YANG Groupings for SSH Clients and SSH Servers";
  }
  import ietf-interfaces {
    prefix "if";
    reference
      "RFC 8343: A YANG Data Model for Interface Management";
  }
  import ietf-key-chain {
    prefix key-chain;
    reference
      "RFC 8177: YANG Data Model for Key Chains";
  }

  organization
    "IETF Secure Inter-Domain Routing Operations (SIDROPS)
     Working Group";

  contact
    "WG Web:   <https://datatracker.ietf.org/wg/sidrops/>
     WG List:  SIDROPS <mailto:sidrops@ietf.org>

     Editor:   Yisong Liu
               <mailto:liuyisong@chinamobile.com>
     Editor:   Changwang Lin
               <mailto:linchangwang.04414@h3c.com>
     Editor:   Haibo Wang
               <mailto:rainsword.wang@huawei.com>
     Editor:   Jishnu Roy
               <mailto:jishnu.roy@hpe.com>
     Editor:   Jeffrey Haas
               <mailto:jeffrey.haas@hpe.com>
     Editor:   Hongwei Liu
               <mailto:liu.hongwei3@zte.com.cn>
     Editor:   Di Ma
               <mailto:madi@zdns.cn>";

  description
    "This module describes a YANG model for the Resource Public
     Key Infrastructure (RPKI) to Router (RTR) protocol management.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2026 IETF Trust and the persons identified as
     authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2026-03-31 {
    description
      "Initial Version";
    reference
      "RFC XXXX: YANG Data Model for RPKI to Router Protocol";
  }
  typedef ipv4-pfx-len {
    type uint8 {
      range "0 .. 32";
    }
    description
      "IPv4 Prefix Length.";
  }
  typedef ipv6-pfx-len {
    type uint8 {
      range "0 .. 128";
    }
    description
      "IPv6 Prefix Length.";
  }
  typedef subject-key-id {
    type binary {
      length 20;
    }
    description
      "Subject Key Identifier.";
  }
  identity rpki-rtr {
    base rt:routing-protocol;
    description
      "RTR protocol.";
  }
  grouping records-limit {
    description
      "Limit of records that can be received from the RPKI
       cache server.";
    leaf max-number {
      type uint64;
      description
        "Configures the maximum number of records that can be
         received from the RPKI cache server.";
    }
    leaf threshold-percentage {
      type uint8 {
        range "0..100";
      }
      units "percent";
      description
        "Configures the threshold percentage for record maximum
         number.";
    }
    leaf over-threshold-action {
      type enumeration {
        enum alert-only {
          description
            "Generates alert messages.";
        }
        enum discard {
          description
            "Discards excess records.";
        }
        enum reconnect {
          description
            "Diconncets with the RPKI cache server,
             and tries to reconnect after reconnection
             timer expires.";
        }
        enum idle-forever {
          description
            "Diconncets with the RPKI cache server
             forever.";
        }
      }
      description
        "The action to taken when record number exceeds
         threshold.";
    }
    leaf reconnect-interval {
      type uint32 {
        range "1..30000";
      }
      units "minutes";
      description
        "Time interval for the reconnection timer.";
    }
  }
  augment "/rt:routing/rt:control-plane-protocols/"
        + "rt:control-plane-protocol" {
    when "derived-from-or-self(rt:type, 'rpki-rtr')" {
      description
        "This augmentation is valid for a routing protocol
         instance of RTR.";
    }
    description
      "RTR protocol augmentation of ietf-routing module
       control-plane-protocol.";
    container rpki-rtr {
      description
        "Configuration parameters for the RTR protocol.";
      container sessions {
        description
          "Parameters of RPKI sessions to cache servers.";
        list session {
          key "server-address";
          description
            "Each entry contains parameters for a RPKI session
             identified by the 'server-address' key.";
          leaf server-address {
            type inet:ip-address;
            mandatory true;
            description
              "The IP address of the RPKI cache server resembling
               a session";
          }
          leaf server-port {
            type inet:port-number;
            description
              "The remote port for the connection
               to the RPKI cache server";
          }
          leaf local-address {
            type union {
              type inet:ip-address;
              type if:interface-ref;
            }
            description
              "The local IP (either IPv4 or IPv6) address to use for
               the connection to the RPKI cache server. This may be
               expressed as either an IP address or reference to the
               name of an interface.";
          }
          leaf local-port {
            type inet:port-number;
            description
              "The local port for the connection
               to the RPKI cache server";
          }
          leaf enabled {
            type boolean;
            default "true";
            description
              "Whether the RPKI cache server is enabled.";
          }
          leaf preference {
            type uint32;
            description
              "The router's preference to connect to that cache.
               The lower the value, the more preferred.";
          }
          leaf description {
            type string;
            description
              "Textual description of the RPKI cache server";
          }
          leaf session-state {
            type enumeration {
              enum idle {
                description
                  "The session is down.";
              }
              enum connect {
                description
                  "The session is waiting for the underlying
                   transport session to be established.";
              }
              enum establish {
                description
                  "The session is up.";
              }
              enum ex-incr {
                description
                  "Incremental update of records in progress.";
              }
              enum ex-full {
                description
                  "Full update of records in progress.";
              }
            }
            config false;
            description
              "The session state.";
          }
          leaf enable-authentication {
            type boolean;
            default "false";
            description
              "Whether the session is secured.";
          }
          container authentication {
            when "../enable-authentication = 'true'";
            description
              "Container for describing how a particular session
               is to be secured.";
            choice option {
              description
                "Choice for session secruring methods.";
              case md5 {
                leaf md5-password {
                  type ianach:crypt-hash;
                  description
                    "The password for md5 authentication.";
                }
                description
                  "Uses TCP-MD5 to secure the session.";
              }
              case ssh {
                uses ssh:ssh-client-grouping {
                  reference
                    "RFC 9644: YANG Groupings for SSH Clients and
                               SSH Servers";
                }
                description
                  "Uses SSH to secure the session.";
              }
              case tcp-ao-keychain {
                leaf keychain-name {
                  type key-chain:key-chain-ref;
                  description
                    "Name of key chain.";
                  reference
                    "RFC 8177: YANG Data Model for Key Chains";
                }
                description
                  "Uses key-chain to secure the session.";
              }
            }
          }
          container vrp-limit {
            description
              "Limit of Validated ROA Payload records that can be
               received from the RPKI cache server.";
            uses records-limit;
          }
          container aspa-limit {
            description
              "Limit of Autonomous System Provider Authorization
               (ASPA) records that can be received from the RPKI
               cache server.";
            uses records-limit;
          }
          container statistics {
            config false;
            description
              "Statistics of the RPKI cache server.";
            leaf total-vrp-records {
              type yang:zero-based-counter64;
              description
                "The total number of Validated ROA Payloads
                 received from the RPKI cache server.";
            }
            leaf ipv4-vrp-records {
              type yang:zero-based-counter64;
              description
                "The number of Validated ROA Payloads for IPv4
                 prefixes received from the RPKI cache server.";
            }
            leaf ipv6-vrp-records {
              type yang:zero-based-counter64;
              description
                "The number of Validated ROA Payloads for IPv6
                 prefixes received from the RPKI cache server.";
            }
            leaf router-key-records {
              type yang:zero-based-counter64;
              description
                "The number of router keys received from the RPKI
                 cache server.";
            }
            leaf aspa-records {
              type yang:zero-based-counter64;
              description
                "The number of ASPAs received from the RPKI
                 cache server.";
            }
          }
          container connection-data {
            config false;
            description
              "State information relating to the connection
               with the RPKI cache server.";
            leaf flaps {
              type uint32;
              description
                "Count for number of flaps observed on the
                 session.";
            }
            leaf last-session-up-down {
              type yang:timestamp;
              description
                "This timestamp indicates the time that the
                 RPKI-RTR session last transitioned in or out
                 of the UP state. The value is the timestamp in
                 microseconds relative to the Unix Epoch (Jan 1,
                 1970 00:00:00 UTC). The RPKI-RTR session uptime
                 can be computed by clients as the difference
                 between this value and the current time
                 in UTC (assuming the session is in the UP
                 state, per the session-state leaf).";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol";
            }
            leaf last-update-sync-timestamp {
              type yang:timestamp;
              description
                "Time of last serial sync with cache server.";
            }
            leaf last-full-sync-timestamp {
              type yang:timestamp;
              description
                "Time of last reset sync with cache server.";
            }
            leaf last-serial-query-timestamp {
              type yang:timestamp;
              description
                "Time of last serial query sent to cache server.";
            }
            leaf last-reset-query-timestamp {
              type yang:timestamp;
              description
                "Time of last reset query sent to cache server.";
            }
            leaf last-eod-received {
              type yang:timestamp;
              description
                "Time in microseconds at which last EOD was
                 received.";
            }
            leaf last-config-change-timestamp {
              type yang:timestamp;
              description
                "Time of last host, port, VRF or local interface
                 change.";
            }
            leaf last-error-timestamp {
              type yang:timestamp;
              description
                "Time of sending/receiving protocol error to/from
                 cache server.";
            }
            leaf last-connection-error-timestamp {
              type yang:timestamp;
              description
                "Time of last connection error to cache server.";
            }
            leaf last-connection-timestamp {
              type yang:timestamp;
              description
                "Time of last connection to cache server.";
            }
            leaf error-reason {
              type string;
              description
                "Reason for error in connection.";
            }
          }
          container protocol-data {
            config false;
            description
              "State parameters related to the RTR protocol";
            leaf protocol-version {
              type uint32;
              description
                "The version number of the RTR protocol.";
            }
            leaf refresh-time {
              type yang:timestamp;
              description
                "Configures the time a router waits in between
                 sending periodic serial queries to the RPKI
                 cache server.";
            }
            leaf response-time {
              type yang:timestamp;
              description
                "Configures the time a router waits for a response
                 after sending a serial or reset query to the RPKI
                 cache server.";
            }
            leaf purge-time {
              type yang:timestamp;
              description
                "Configures the time a router waits to keep data
                 from the RPKI cache server after the session
                 drops.";
            }
            leaf hold-time {
              type yang:timestamp;
              description
                "Hold-time for this session.";
            }
            leaf record-lifetime {
              type yang:timestamp;
              description
                "Record-lifetime this session.";
            }
            leaf retry-interval {
              type uint32;
              description
                "Number of seconds between poll error and cache
                 server poll";
            }
            leaf expire-interval {
              type uint32;
              description
                "Number of seconds to retain data synced from
                 cache server";
            }
            leaf session-id {
              type uint16;
              config false;
              description
                "When a cache server is started, it generates a
                 Session ID to identify the instance of the cache
                 and to bind it to the sequence of Serial Numbers
                 that cache instance will generate.";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol
                 RFC 8210: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol, Version 1";
            }
            leaf serial-full {
              type uint32;
              config false;
              description
                "A 32-bit strictly increasing unsigned integer which
                 wraps from 2^32-1 to 0. It denotes the logical
                 version of a cache. It resembles the latest full
                 query.";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol
                 RFC 8210: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol, Version 1";
            }
            leaf serial-incremental {
              type uint32;
              config false;
              description
                "A 32-bit strictly increasing unsigned integer which
                 wraps from 2^32-1 to 0. It denotes the logical
                 version of a cache. It resembles the latest
                 incremental query.";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol
                 RFC 8210: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol, Version 1";
            }
            leaf in-total-messages {
              type yang:zero-based-counter64;
              description
                "The total number of messages received from the
                 RPKI cache server.";
            }
            leaf out-total-messages {
              type yang:zero-based-counter64;
              description
                "The total number of messages transmitted to the
                 RPKI cache server.";
            }
          }
          container pdu-counters {
            config false;
            description
              "Counters of PDUs that are received from cache";
            leaf serial-notify {
              type yang:zero-based-counter64;
              description
                "Serial notify PDU count";
            }
            leaf cache-response {
              type yang:zero-based-counter64;
              description
                "Cache response PDU count";
            }
            leaf ipv4-prefix {
              type yang:zero-based-counter64;
              description
                "IPv4 prefix PDU count";
            }
            leaf ipv6-prefix {
              type yang:zero-based-counter64;
              description
                "Ipv6 prefix PDU count";
            }
            leaf end-of-data {
              type yang:zero-based-counter64;
              description
                "End of data PDU count";
            }
            leaf cache-reset {
              type yang:zero-based-counter64;
              description
                "Cache reset PDU count";
            }
            leaf reset-query {
              type yang:zero-based-counter64;
              description
                "Reset query PDU count";
            }
            leaf serial-query {
              type yang:zero-based-counter64;
              description
                "Serial query PDU count";
            }
          }
          container error-pdu-counters {
            config false;
            description
              "Counters of error PDUs that originate from router
               or cache server";
            leaf corrupt-data {
              type yang:zero-based-counter64;
              description
                "Corrupt data PDU count";
            }
            leaf internal-error {
              type yang:zero-based-counter64;
              description
                "Internal error PDU count";
            }
            leaf unsupported-protocol-version {
              type yang:zero-based-counter64;
              description
                "Unsupported protocol version PDU count";
            }
            leaf unsupported-pdu-type {
              type yang:zero-based-counter64;
              description
                "Unsupported PDU type count";
            }
            leaf unexpected-protocol-version {
              type yang:zero-based-counter64;
              description
                "Unexpected protocol version PDU count";
            }
            leaf no-data-available {
              type yang:zero-based-counter64;
              description
                "No data available PDU count";
            }
            leaf invalid-request {
              type yang:zero-based-counter64;
              description
                "Invalid request PDU count";
            }
            leaf withdrawal-unknown-record {
              type yang:zero-based-counter64;
              description
                "Withdrawal of unknown record PDU count";
            }
            leaf duplicate-announcement-received {
              type yang:zero-based-counter64;
              description
                "Duplicate announcement received PDU count";
            }
          }
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="rpki-table-yang-module">
      <name>RPKI Table YANG Module</name>
      <section anchor="tree-view-1">
        <name>Tree View</name>
        <t>The complete tree of the "ietf-rpki-table" YANG module is
   represented as following. See <xref target="RFC8340"/> for an explanation of the
   symbols used.</t>
        <artwork type="ascii-art"><![CDATA[
module: ietf-rpki-table
  augment /rt:routing:
    +--ro vrp-tables
    |  +--ro vrp-table* [name]
    |     +--ro name                      string
    |     +--ro ccr-roapayloadstate-hash? ccr-hash
    |     +--ro ipv4
    |     |  +--ro vrps
    |     |  |  +--ro vrp* [prefix max-len asn source]
    |     |  |     +--ro prefix       inet:ipv4-prefix
    |     |  |     +--ro max-len      ipv4-pfx-len
    |     |  |     +--ro asn          inet:as-number
    |     |  |     +--ro source       union
    |     |  +--ro total-records?     yang:gauge32
    |     |  +--ro records-added?     yang:counter64
    |     |  +--ro records-deleted?   yang:counter64
    |     +--ro ipv6
    |        +--ro vrps
    |        |  +--ro vrp* [prefix max-len asn source]
    |        |     +--ro prefix       inet:ipv6-prefix
    |        |     +--ro max-len      ipv6-pfx-len
    |        |     +--ro asn          inet:as-number
    |        |     +--ro source       union
    |        +--ro total-records?     yang:gauge32
    |        +--ro records-added?     yang:counter64
    |        +--ro records-deleted?   yang:counter64
    +--ro router-key-tables
    |  +--ro router-key-table* [name]
    |     +--ro name                     string
    |     +--ro ccr-routerkeystate-hash? ccr-hash
    |     +--ro router-keys
    |        +--ro router-key* [ski asn key server-address]
    |           +--ro ski            subject-key-id
    |           +--ro asn            inet:as-number
    |           +--ro key            string
    |           +--ro server-address inet:ip-address
    +--ro aspa-tables
       +--ro aspa-table* [name]
          +--ro name                       string
          +--ro ccr-aspapayloadstate-hash? ccr-hash
          +--ro aspas* [customer-asn]
             +--ro customer-asn        inet:as-number
             +--ro server-address?     inet:ip-address
             +--ro provider-asns* [provider-asn]
                +--ro provider-asn     inet:as-number
]]></artwork>
      </section>
      <section anchor="yang-module-1">
        <name>YANG Module</name>
        <sourcecode type="yang" markers="true" name="ietf-rpki-table@2026-03-31.yang"><![CDATA[
module ietf-rpki-table {
  yang-version "1.1";
  namespace "urn:ietf:params:xml:ns:yang:ietf-rpki-table";
  prefix "rpki-table";
  import ietf-yang-types {
    prefix "yang";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-inet-types {
    prefix "inet";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC 8349: A YANG Data Model for Routing Management
                 (NMDA Version)";
  }

  organization
    "IETF Secure Inter-Domain Routing Operations (SIDROPS)
     Working Group";

  contact
    "WG Web:   <https://datatracker.ietf.org/wg/sidrops/>
     WG List:  SIDROPS <mailto:sidrops@ietf.org>

     Editor:   Yisong Liu
               <mailto:liuyisong@chinamobile.com>
     Editor:   Changwang Lin
               <mailto:linchangwang.04414@h3c.com>
     Editor:   Haibo Wang
               <mailto:rainsword.wang@huawei.com>
     Editor:   Jishnu Roy
               <mailto:jishnu.roy@hpe.com>
     Editor:   Jeffrey Haas
               <mailto:jeffrey.haas@hpe.com>
     Editor:   Hongwei Liu
               <mailto:liu.hongwei3@zte.com.cn>
     Editor:   Di Ma
               <mailto:madi@zdns.cn>";

  description
    "This module describes a YANG model for the Resource Public
     Key Infrastructure (RPKI) to Router (RTR) protocol data
     management.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2026 IETF Trust and the persons identified as
     authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2026-03-31 {
    description
      "Initial Version";
    reference
      "RFC XXXX: YANG Data Model for RPKI to Router Protocol";
  }
  typedef ipv4-pfx-len {
    type uint8 {
      range "0 .. 32";
    }
    description
      "IPv4 Prefix Length.";
  }
  typedef ipv6-pfx-len {
    type uint8 {
      range "0 .. 128";
    }
    description
      "IPv6 Prefix Length.";
  }
  typedef subject-key-id {
    type binary {
      length 20;
    }
    description
      "Subject Key Identifier.";
  }
  typedef ccr-hash {
    type binary {
      length 32;
    }
    description
      "Canonical Cache Representation (CCR) state hash.

       This represents a 256-bit SHA-256 hash of the canonical
       representation of RPKI data as defined in RFC YYYY.

       The hash provides a compact, verifiable representation
       of the complete state of RPKI validation data, enabling
       efficient synchronization and consistency verification
       between caches.";
    reference
      "RFC YYYY: A Profile for Resource Public Key Infrastructure
                 (RPKI) Canonical Cache Representation (CCR)";
  }
  grouping aspa-overall-records {
    description
      "Autonomous System Provider Authorization (ASPA) records
       received from all RPKI cache servers.";
    list aspas {
      key "customer-asn";
      description
        "An entry of ASPA.";
      leaf customer-asn {
        type inet:as-number;
        description
          "The AS number of a customer.";
      }
      leaf server-address {
        type inet:ip-address;
        description
          "IP address of the RPKI cache server.";
      }
      list provider-asns {
        key "provider-asn";
        description
          "Providers of the customer.";
        leaf provider-asn {
          type inet:as-number;
          description
            "The AS number of a provider.";
        }
      }
    }
  }

  augment "/rt:routing" {
    description
      "RPKI tables augmentation of ietf-routing module.";
    container vrp-tables {
      config false;
      description
        "List of tables containing Validated ROA Payloads
         received from all RPKI cache servers.";
      list vrp-table {
        key "name";
        description
          "Table of Validated ROA Payloads received from
           all RPKI cache servers.";
        leaf name {
          type string;
          description
            "Name of the Validated ROA Payload table.";
        }
        leaf ccr-roapayloadstate-hash {
          type ccr-hash;
          description
            "CCR state hash for the ROA payload.

             This hash represents the canonical state of this
             specific ROA entry as defined in the CCR specification.
             It is optional and can be used to verify the integrity
             and consistency of ROA data originating from the RPKI
             cache.";
          reference
            "RFC YYYY: A Profile for Resource Public Key
                       Infrastructure (RPKI) Canonical Cache
                       Representation (CCR)";
        }
        container ipv4 {
          config false;
          description
            "Container for IPv4 Validated ROA Payloads table.";
          container vrps {
            config false;
            description
              "Validated ROA Payloads received from the RPKI
               cache server.";
            list vrp {
              key "prefix max-len asn source";
              description
                "An entry of Validated ROA Payload.";
              leaf prefix {
                type inet:ipv4-prefix;
                description
                  "The IPv4 prefix of the Validated ROA
                   Payload.";
              }
              leaf max-len {
                type ipv4-pfx-len;
                description
                  "Denotes the longest prefix allowed. This
                   MUST NOT be less than the prefix length.";
              }
              leaf asn {
                type inet:as-number;
                description
                  "The origin AS number of the Validated ROA
                   Payload.";
              }
              leaf source {
                type union {
                  type string;
                  type inet:ip-address;
                }
                description
                  "String representing the source of the records
                   in this record-set.";
              }
            }
          }
          leaf total-records {
            type yang:gauge32;
            description
              "Number of prefix policy records.";
          }
          leaf records-added {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively added.";
          }
          leaf records-deleted {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively
               deleted.";
          }
        }
        container ipv6 {
          config false;
          description
            "Container for IPv6 Validated ROA Payloads table.";
          container vrps {
            config false;
            description
              "Validated ROA Payloads received from the RPKI cache
               server.";
            list vrp {
              key "prefix max-len asn source";
              description
                "An entry of Validated ROA Payload.";
              leaf prefix {
                type inet:ipv6-prefix;
                description
                  "The IPv6 prefix of the Validated ROA Payload.";
              }
              leaf max-len {
                type ipv6-pfx-len;
                description
                  "Denotes the longest prefix allowed. This
                   MUST NOT be less than the prefix length.";
              }
              leaf asn {
                type inet:as-number;
                description
                  "The origin AS number of the Validated ROA
                   Payload.";
              }
              leaf source {
                type union {
                  type string;
                  type inet:ip-address;
                }
                description
                  "Representing the source of the records in this
                   record-set. Either a server IP or a source file
                   of static records.";
              }
            }
          }
          leaf total-records {
            type yang:gauge32;
            description
              "Number of prefix policy records.";
          }
          leaf records-added {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively added.";
          }
          leaf records-deleted {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively
               deleted.";
          }
        }
      }
    }
    container router-key-tables {
      config false;
      description
        "List of router key table received from all RPKI cache
         servers.";
      list router-key-table {
        key "name";
        description
          "Table of router keys received from all RPKI cache
           servers.";
        leaf name {
          type string;
          description
            "Name of the router key table.";
        }
        leaf ccr-routerkeystate-hash {
          type ccr-hash;
          description
            "CCR state hash for the Router Key payload.

             This hash represents the canonical state of this
             specific Router Key entry as defined in the CCR
             specification. It is optional and can effectively
             verify the consistency of BGPsec router key data
             derived from the RPKI cache.";
          reference
            "RFC YYYY: A Profile for Resource Public Key
                       Infrastructure (RPKI) Canonical Cache
                       Representation (CCR)";
        }
        container router-keys {
          config false;
          description
            "Router keys received from the RPKI cache server.";
          list router-key {
            key "ski asn key server-address";
            description
              "An entry of router key.";
            leaf ski {
              type subject-key-id;
              description
                "A router key's Subject Key Identifier (SKI).";
              reference
                "RFC 6487: A Profile for X.509 PKIX Resource
                           Certificates";
            }
            leaf asn {
              type inet:as-number;
              description
                "The AS number of the router which the key
                 belongs to.";
            }
            leaf key {
              type string;
              description
                "A router key's subjectPublicKeyInfo value.";
              reference
                "RFC 8608: BGPsec Algorithms, Key Formats, and
                           Signature Formats";
            }
            leaf server-address {
              type inet:ip-address;
              description
                "IP address of the RPKI cache server.";
            }
          }
        }
      }
    }
    container aspa-tables {
      config false;
      description
        "List of tables of ASPAs received from all RPKI cache
         servers.";
      list aspa-table {
        key "name";
        description
          "Table of ASPAs received from all RPKI cache servers.";
        leaf name {
          type string;
          description
            "Name of the ASPA table.";
        }
        leaf ccr-aspapayloadstate-hash {
          type ccr-hash;
          description
            "CCR state hash for the ASPA payload.

             This hash represents the canonical state of this
             specific ASPA entry as defined in the CCR
             specification. It is optional and facilitates
             consistency checking for AS path validation data
             originating from the RPKI cache.";
          reference
            "RFC YYYY: A Profile for Resource Public Key
                       Infrastructure (RPKI) Canonical Cache
                       Representation (CCR)";
        }
        uses aspa-overall-records;
      }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to the RFC Editor - remove this section before publication, as
   well as remove the reference to <xref target="RFC7942"/>.</t>
      <t>This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft, and is based on a proposal described in <xref target="RFC7942"/>.
   The description of implementations in this section is intended to
   assist the IETF in its decision processes in progressing drafts to
   RFCs. Please note that the listing of any individual implementation
   here does not imply endorsement by the IETF. Furthermore, no effort
   has been spent to verify the information presented here that was
   supplied by IETF contributors. This is not intended as, and must not
   be construed to be, a catalog of available implementations or their
   features. Readers are advised to note that other implementations may
   exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
   to assign due consideration to documents that have the benefit of
   running code, which may serve as evidence of valuable experimentation
   and feedback that have made the implemented protocols more mature.
   It is up to the individual working groups to use this information as
   they see fit".</t>
      <section anchor="juniper-networks-hpe">
        <name>Juniper Networks (HPE)</name>
        <ul spacing="normal">
          <li>
            <t>Organization: Juniper Networks (HPE).</t>
          </li>
          <li>
            <t>Implementation: The following leaves/parameters in description are implemented.</t>
          </li>
          <li>
            <t>Description: YANG model leaves that are supported:
            </t>
            <ul spacing="normal">
              <li>
                <t>Ietf-rpki-rtr.yang</t>
              </li>
            </ul>
            <artwork type="ascii-art"><![CDATA[
     Server-address
     Session-state
     Total-vrp-records
     Ipv4-vrp-records
     Ipv6-vrp-records
     Refresh-time
     Hold-time
     Serial-incremental
     Serial-full
     Last-session-up-down
     Las-update-sync-timestamp
     Last-eod-received
     Last-serial-query-timestamp
     Last-reset-query-timestamp
     Flaps
]]></artwork>
            <ul spacing="normal">
              <li>
                <t>Ietf-rpki-table.yang</t>
              </li>
            </ul>
            <artwork type="ascii-art"><![CDATA[
     Ipv4 | ipv6: 
       Total-records
       Records-added
       Records-deleted.
]]></artwork>
          </li>
          <li>
            <t>Maturity Level: Ready-for-deployment</t>
          </li>
          <li>
            <t>Coverage:</t>
          </li>
          <li>
            <t>Version: Draft-03</t>
          </li>
          <li>
            <t>Licensing: N/A</t>
          </li>
          <li>
            <t>Implementation experience: Nothing specific.</t>
          </li>
          <li>
            <t>Contact: jishnu.roy@hpe.com</t>
          </li>
          <li>
            <t>Last updated: March 30, 2026</t>
          </li>
        </ul>
      </section>
      <section anchor="new-h3c-technologies">
        <name>New H3C Technologies</name>
        <ul spacing="normal">
          <li>
            <t>Organization: New H3C Technologies.</t>
          </li>
          <li>
            <t>Implementation: The following leaves/parameters in description are implemented.</t>
          </li>
          <li>
            <t>Description: "ietf-rpki-rtr" and "ietf-rpki-table" YANG modules
have been implemented in New H3C Products.</t>
          </li>
          <li>
            <t>Maturity Level: Ready-for-deployment</t>
          </li>
          <li>
            <t>Coverage: All data nodes of "ietf-rpki-rtr" and "ietf-rpki-table" YANG modules.</t>
          </li>
          <li>
            <t>Version: Draft-03</t>
          </li>
          <li>
            <t>Licensing: N/A</t>
          </li>
          <li>
            <t>Implementation experience: Nothing specific.</t>
          </li>
          <li>
            <t>Contact: li_meng_limeng@h3c.com</t>
          </li>
          <li>
            <t>Last updated: March 30, 2026</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section is modeled after the template described in Section 3.7.1
   of <xref target="RFC9907"/>.</t>
      <t>The "ietf-rpki-rtr" YANG module and "ietf-rpki-table" YANG module
   define data models that are designed to be accessed via YANG-based
   management protocols, such as Network Configuration
   Protocol (NETCONF) <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>.
   These YANG-based management protocols (1) have to use a secure transport layer
   (e.g., Secure Shell (SSH) <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>)
   and (2) have to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in these YANG modules that
   are writable/creatable/deletable (i.e., config true, which is the
   default). All writable data nodes are likely to be sensitive or vulnerable
   in some network environments. Write operations (e.g., edit-config) and
   delete operations to these data nodes without proper protection or 
   authentication can have a negative effect on network operations.
   The following subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
      <artwork><![CDATA[
  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:server-address

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:server-port

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:local-address

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:local-port

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:enabled

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:preference

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:description

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:enable-authentication

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:authentication

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:vrp-limit

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:aspa-limit
]]></artwork>
      <t>Some of the readable data nodes in these YANG modules may be
   considered sensitive or vulnerable in some network environments. It
   is thus important to control read access (e.g., via get, get-config,
   or notification) to these data nodes. Specifically, the following
   subtrees and data nodes have particular
   sensitivities/vulnerabilities:</t>
      <artwork><![CDATA[
  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:session-state

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:statistics

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:connection-data

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:protocol-data

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:pdu-counters

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:error-pdu-counters

  rt:routing/rpki-table:vrp-tables/rpki-table:vrp-table

  rt:routing/rpki-table:router-key-tables/rpki-table:router-key-
  table

  rt:routing/rpki-table:aspa-tables/rpki-table:aspa-table
]]></artwork>
      <t>There are no particularly sensitive RPC or action operations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="rpki-to-router-yang-module-registry">
        <name>RPKI to Router YANG Module Registry</name>
        <t>IANA is requested to register the following URI in the "ns" registry
   within the "IETF XML Registry" group (<xref target="RFC3688"/>):</t>
        <artwork type="ascii-art"><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-rpki-rtr
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace
]]></artwork>
        <t>IANA is requested to register the following YANG modules in the
   "YANG Module Names" registry (<xref target="RFC6020"/>) within the "YANG
   Parameters" registry group.</t>
        <artwork type="ascii-art"><![CDATA[
   Name: ietf-rpki-rtr
   Maintained by IANA? N
   Namespace: urn:ietf:params:xml:ns:yang:ietf-rpki-rtr
   Prefix: rpki-rtr
   Reference: RFC XXXX
]]></artwork>
      </section>
      <section anchor="rpki-table-yang-module-registry">
        <name>RPKI Table YANG Module Registry</name>
        <t>IANA is requested to register the following URI in the "ns" registry
   within the "IETF XML Registry" group (<xref target="RFC3688"/>):</t>
        <artwork type="ascii-art"><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-rpki-table
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace
]]></artwork>
        <t>IANA is requested to register the following YANG module in the "YANG
   Module Names" registry (<xref target="RFC6020"/>) within the "YANG Parameters"
   registry group.</t>
        <artwork type="ascii-art"><![CDATA[
   Name: ietf-rpki-table
   Maintained by IANA? N
   Namespace: urn:ietf:params:xml:ns:yang:ietf-rpki-table
   Prefix: rpki-table
   Reference: RFC XXXX
]]></artwork>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Job Snijders, Santosh Kolenchery,
Ebben Xavier Aries, Tapasee Ratna Goutam and Haiyang Zhang for their
review and discussion of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3688.xml">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6020.xml">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC8341" target="https://www.rfc-editor.org/info/rfc8341" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8341.xml">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-25" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <author fullname="Tom Harrison" initials="T." surname="Harrison">
              <organization>Asia Pacific Network Information Centre</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-25"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4252" target="https://www.rfc-editor.org/info/rfc4252" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4252.xml">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC7942" target="https://www.rfc-editor.org/info/rfc7942" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8040.xml">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8340.xml">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9907" target="https://www.rfc-editor.org/info/rfc9907" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9907.xml">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="March" year="2026"/>
            <abstract>
              <t>This document provides guidelines for authors and reviewers of specifications containing YANG data models, including IANA-maintained YANG modules. Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.</t>
              <t>This document obsoletes RFC 8407; it also updates RFC 8126 by providing additional guidelines for writing the IANA considerations for RFCs that specify IANA-maintained YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="9907"/>
          <seriesInfo name="DOI" value="10.17487/RFC9907"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-ccr" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-ccr-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-ccr.xml">
          <front>
            <title>A Profile for Resource Public Key Infrastructure (RPKI) Canonical Cache Representation (CCR)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Bart Bakker" initials="B." surname="Bakker">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Tim Bruijnzeels" initials="T." surname="Bruijnzeels">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Theo Buehler" initials="T." surname="Buehler">
              <organization>OpenBSD</organization>
            </author>
            <date day="4" month="December" year="2025"/>
            <abstract>
              <t>This document specifies a Canonical Cache Representation (CCR) content type for use with the Resource Public Key Infrastructure (RPKI). CCR is a DER-encoded data interchange format which can be used to represent various aspects of the state of a validated cache at a particular point in time. The CCR profile is a compact and versatile format well-suited for a diverse set of applications such as audit trail keeping, validated payload dissemination, and analytics pipelines.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-ccr-02"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="M." surname="Chen" fullname="Mengxiao Chen">
        <organization>H3C</organization>
        <address>
          <postal>
            <country>China</country>
          </postal>
          <email>chen.mengxiao@h3c.com</email>
        </address>
      </contact>
      <contact initials="S." surname="Kolenchery" fullname="Santosh Kolenchery">
        <organization>HPE</organization>
        <address>
          <email>santosh.kolenchery@hpe.com</email>
        </address>
      </contact>
      <contact initials="H." surname="Zhang" fullname="Haiyang Zhang">
        <organization>H3C</organization>
        <address>
          <postal>
            <country>China</country>
          </postal>
          <email>zhang.haiyanga@h3c.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+09+3vbxpG/86/YY36wlBK0XpZtpq2jUHas1JZVUY6T9uvd
BxFLETEI8PAQzaS6v/1mZh/YBRZ8SXRzPfNraorAzmtnZ2Z3Z2c9z2sNkyCM
b3qsyEfes1YrD/OI99jPJ+ffs1M/99nbJOARGyUpu7z4yxnLE3aZFDlP2UWa
5MkwiVr+9XXKbxvaXF22gmQY+xMAGqT+KPdCDpiyMEiTaealeerN/fjG23vS
Gvo5v0nSeY9ledBqZbkfB36UxNByzrNWVlxPwiwLkzifT+G3s5dXr1rTsMf+
DmR0WJYALD7K4Nt8Ir4Mk8mEx3n2j1YrnKY9lqdFlh/s7T3fO2j5Kfd77N00
a82A+cHZ6eW7iwH7kKQfQRrs+zQppq2PM8FUh1jvEDMtv8jHSdprMebBf4yF
cQZvddmbsKC/R0UUCXZ/DrMEYKkHSXrjx+Gvfg4c9Fh/HMYoqOsw4vQ4A+p5
3mOHB+ynwo9nBZDOPvAsZwN6Qi8NwxzE8x0PfwEq6ZeU3xC8n8LhmAO20xAA
hUP5OvRDj+3v7e09OZQ/FHGOEib09BOf+GHUY1FYzIneb4f4aEKEdUGCNqN9
ZDSuMNofQw/OfOI1dvB6zmfs9WGfXfHhOE6i5CaE7jR5fsZ+Bsy/hD47h14c
g4b5wRJ+X/thEPpxE7/Pj5byGw8V2d29o6P9o2/Hh8M6w6+77IMvcZccA/br
pHxgs/u68Gc8rHPbTEzqA65ZkgZdJOfbMQGo0/JDFyQzr5DyQ5iN40I/qJBy
8dIS9P7+4SE7i+Pkll4ADuaWVAdFHM9v/Yh3WP+EPT/ae/bcJv19HOY8AJWE
sZqxZMROJhzEb3HzC1HUTZP5t+OpQ4eAjde+n1X54KNRyuflo98DJ4Km7hho
cvPy2jXwX4Myowa4R/7frl6yfpJOk5R+WD4uu2MB7/DbX3MioTuMbSpOu+yt
XyHiNFS/VdCfng8sSb6KEjDUB/sd9l2UDD+y7zpg/jiPIzC/rA/2k6fGWISx
nqDBVoOyg8NtHwzqYjYmfhB++2sQZ0g7+Bx4Lbwu8pohfduFtrxqYN6CZfsU
+kn5rKIch/0l+NE4dicSjHukD7rsL0nEwSzwtDrIBn6cJ9m4+oJbRSXKTLTp
ftRtGlXob2OniSE5l8/W5flXbAm6S3B8zXQrTtIJALnlKPvLV/2D/f3n8uvh
8bNn8uvx3sGe+vpsX319+vyJ+vps/+mR+nqgX3h2eLSPX8+8067l6fGd6zDr
tcJ4VCHg6ODJgUJ1IJoTqiP167O9IwO+/np0dCy/PgeTr74+33vqJCCdfgy9
4RA0ruV5HvOvYQD44DhQZFfjMGMQp6DTzVnAR2EMRoECmgADmgkGNBlFNBM/
9m+kN7rkWVKkQ84uiusoHLK/gP06i0epD6CLYV6knO1g6LDrCpug/Y4ULsOh
JuW42xX0TcIggNCg9RVAzNMkAHhoLbDZb7/Jdnd31JL+xrbwd8CzIQwtoN5n
U4kKsQP9IPBUk4xwllI9hTgq/ASKFwLHQhKILxWcfORzstSjNJkANoquwKIO
fVB2lvEU0QFmX77fAds84mkKr+CvGcvhtUpMuQMh1i7CVKR3JcNN6mRxDAgx
PGQHaM4J+tWlhtRhszHESAjODwIUTwxhyQnYoDiZJEXGBnMgf4L9cxsGQMsJ
BXpyvLGdk8HFye4uuzh9zzD+7C7TG+oUHC5Ioq1D2FKpkUUj2zG6tmP2awcF
v0wUqDpffQWBRzoJKfKYSyI59hXDACNj7bfvB1ftjviXnb+j75cv//r+7PLl
KX4fvD5580Z/EW8gGPj73fs38hX8Vjbuv3v79uX5qWgPv7LKT29Pfm5rDtrv
Lq7O3p2fvGmD/YNuMiUIUTlqwzWHR6APoH+oUaArqpMDJiLM7/oXbP9ISAjt
FwhZSAuMEnyfgbknhCyJo7n8EzRizvzplPspYvYjGoNDfxrmfgTTBUCTjZNZ
zMBWY/9+Jecx70CvbkM+E8KcJXW7gGSLzg9qPHV1H1CnkRWCmUqXjHsJBHUA
9U4MiwkH3QsWK0uXneWAbRgV0KpHWL6GwCKOOViKW3DWbOqn4EpAjjgpKoZj
5JAGnDVEzy5wQKQ8y1QPMRR3Dt6ENB8CFcnE12zAaQLmhDwt0hvovXDCaaQD
wLH+K5smcSbmOfRbFR7M9fKC8NNXiOnDoQE6k6+dnXaQ6tCPWFxMrsGmCJDi
Dxz1KR9ysHMBgQL7HmeTMEcdmgAI/4Znru7I/WuY62zUIYCPRhWgtgYyoYd2
8FRwj5Ns4o2zsQ+SIWPEQrRD9DeEqgUJqMiUEnHW9+Mkhpg0gm/YY5ccRkQG
SiVtUr9/ucswmMKx47AMyuXd3XURtENffvSjEHgGlJfvTtiFP49g6sV2fry8
2FW8qb661Fa/+gRNY/U3IM1gt1Pym0yRdl+ICP4mfmHMgyqGozmxjWP/JkUN
xneAvwwUAmKoOYkZFRi7SXS98E0gDxAvOSLtVUjJaRhXnAwNXxjaBblXsJcQ
7bIf9QCnXptMI1BvhiGyciZta/y2BZgJgQE+WjT3kN0jbNYoiaJkBoR1Qc+5
tE8QvoB9wkACJq/80xSibNGZAguCyeaT6yQSkgH6/wc+AG4Yhp6f5i2BsWdb
E2jmFzdkQh+neQ8dLuDFrxRqJ5GHiLin9FPMsNSn+b0evfcHz0tnzMDFyl/l
0DQBWg++Zn8XdsaTRuYfFmr9svmK8RhMat4Lp+rJgrZopl5Yj6kt/uwJ++Bq
DDMeP1LQzeZFrOZmzhZ1bCuh4zGamqDSEj7XCcwSfCfCKYVNoP680qyAcXJ4
4GoivCUNNLsNrpXI2YTVJFHd5dGYNRtx4IYbU1UnRx6uioH2ga1SSBdwZL9s
v/FP9dKOMBS7L2rPBZzeziR4sut6qEHAC97Uz2hlBUkKYawNx71hOp/mHpql
RtBZNl4MehiFwIEH/gH4yOcN7+rXYSinOK174e6CeoMpheYeGNv/aH619vkN
8aB0PdEemt855WehkhLaEJFsvRzPOMnyax9s2maIdPPlmMBpKhXmkym4kRIK
PloOYMjTPByhfvK1iAW1GU7iHvzjfXqy99xDOFkjOtv0LR4TFQIRAwoEFSRb
QKJkxxeU/MfaJGoQnG8KQrSnUIyMI4WO2RKpIg5PjrFqUw9c1Si8WYLwI+dT
H6e8SLIFr3zSCIJpC+J/8mZ+qE09mtz941Va+RB1gu6RT8FWzxptTT4E95Zg
Tw7Hfhg77Q4r2RJvedKawN8e/dDT3zzwFy6re5tOvSiEcLjB4CLVwnM5/Mzx
UUOrfIyBfhIF3pSnQwxNb8TYczMtGiWo8WVLf6icRqOz0U0xzKQpjkczRAib
X5RUur2hn039/4+cJ8ZcygkzgaAYpr4eaoYM318wnAb1fuVp4pG19Wh9kacN
YkhYOL09siFsAuL4niDEEhMOIg2k9qbLZNNnXWSkUOsKTDSVXYiRVjmHqSEY
Rf40qweJ8uPqb9008sErqGCumHpBMjNiQKIVJ+CgGZPpIhDFFKeFXjaPh55u
8GItELiW7QCwDggx2ff+u+Dp3IKyOgickeUOCGuA4EngqYUFq1dWByF8lkdb
jtykYw0q0jRJq6JcmwqlfVVoq4+WTflXmG0OVgIhiE25n1UnNPhpntSoaeyi
sabfkavHymE3jjC5tkV8KGJW4kItg5ktV2pIK2sWvhUbko+x261KKho3cJoj
rpuv2DCHcWY7qIXS5J+mYcrtFgsbKNsWGkOxISxTDciGoDV6YTZYgIEahPEw
5bikglQtbAAxl3CkapFxAwcG/qsGZC3PMg0K9UKTt5eMxQlMbuZln65BJa2p
eUqRX2wAgcIFsa9kDoF1o4V7QeBx4CUjMgobQtBy4PmGEAy3tCEE0ze+WAeC
aVObtUa/iEvYxTTfQFysHCA5rn9Ewuuso3kaRBFnxRRngfBuzWTX2tw31HOj
BVnh1t9W0YE9BD/5eZmME+pcz7/1wwiX81Y2Pazs4VvcSYAhAfqY5WtYBg1i
FubjIPVnoCZF/DGGuFXG2FvkPCimES3zeH4cw7tDMvhlsFdr1vhpxozr97TP
YO070Ko+NmqpLQRzPZ/91hIgVe+z9n53v/0N/IoTf5h/DDlrF2ncw2Y9sTDS
+zSJenHWI1LszQpsKDfz29aP4QSVWyAnfKjgGaEvW+ADepsxvRYtJdO+fNVn
z5/v7/dYP5lMgNAyC/QKQVG7uwomXCp3YsIHD4pJ7oTYaNJ8AYpnh0fPe+zE
nc0qob3F7T9SlbqC7Jy/PT1hP4pu260RBS29cgG6yj4tUC8SwNPD/adN1MkE
hpI4p0TKlbAKcniwUPTHR0cyx5eyY0EOIiFmMHjN+gRQbODi3wNa1GzqfBgX
I1DgWuePFuGHfjls4vxMgVzGvF4ks1Hrnxfh33/61J3jjPkzfWyt+G3ZuVoE
pY3pyiCXIabXEL3eaTJBSpRSvZvK9Z+M7ch8ZLkWaGUlA44Wo01fX2a9tj98
zz7w6x58/eM4z6dZ7/FjtOeY3vSRp7Ql3AWCHs9uHsud4cd/lpC/Z2/CLIem
KgP6j5g7lic9+eK3qvGfW6LFyyDErD34VklvNj4KRmNO8Z+rsOoZxE5wTSm7
NXiV/FwHsMaU2xqsSoKtA1Y94bUOpJrd6gLjyDatc1bJLXWL3ZUyWgNVZog6
gJgJm38WOmfsKgq9o+wn6b7MvDO1My7HB+3I25lyAusq6XKUEVbmVUz0+O5K
hbSzmx5hVtOjjvgXE5Twu8puwu+U1KS/CBDyNZHVVH4rm+tkJvyzkt/0SOag
PHp78vMjkXP0SGU4PVo9w0kAMdOcVI4TJgkyzHHaFV8xxWnXmeEkYNTTnBbk
OFGLfjKdp+HNOGc7w112sHdwTIcr2BVm9OlUFjBPGRonsec5Cg2yxZmITGVK
YBp+l50AYoKa0WQHHEKgEF7ygNL2rwtKfUAMRYYSYVJL8JdrMBnpHDVoAoRj
dMgSuamOf4B6oI6JbTqA0sFkkimmvlG+z7RIs8IHgeeJEFNWXP8CkTX8rcXE
QBM5zGMZdMQkEzZV5nB1pNbehpie8t3gFAaceDeTRzGQMCAJaB6IhS121B0q
CZTie5SxN/zGj0ReoZEqcckjkbUC2kCvn0oVkc93lCkXeZW8NOOSag8TaXeV
SEnaXGJAMggmMn52cn4i9pOzMSZC0XgFbv0YtXAEcapM+vJzop1G74VO8KKM
euisObuhQzE2cbPZrItRCxHmZ1l4ExMPjymYLNPEdsvhGpaJmiStMKuk0mB2
WU6pPqDtP8HnGxA6V9kxlOTLwjzj0YjMCy7ssIhkjCsbEFd0hb1S4iCN9vYO
vcN96farlgzdcxzmmFcmA7dFkQiStNYJKR2KYMgb8JFcBBl98iKuIhF8JHaO
5A+AHNeKWXuPdbvs8EBSdNfIwMXtEWCkeOYNj2/ycdeF93g9vPsHz1ZAfLwM
sRx8FH+FgYlajnKFOyIA0GNLkA7kaCYXogxSWiJWiRnMmlExhpMzVmZI6Vn2
N02IrIxLDf5GRsAq601sLzZr1xt6LPITyU/lYxhtcgjqnEUrf005ZjNXsyv7
IuL+yNi11NLTnXl89I38qU4MkNOn3QjwtzK50f8UToqJnUZZJbMMFNz0Ogm9
K8l1bZfWCS+1sNTDbnd/b6+tGLqT/xYwYDPWlsDa6/CrSWEGKTh+BdtKHiXH
QjAOppzbuTZXxsauwRv+Cq6Zp7lH/rt84maB2PiexwgJYyxsWea0au5L8UgU
4GeHfhqsBv9UvJwx/mmIaXgqpbMZvN6TXhUBvj7k0HHkz52607FDUpHIG2LX
JQY+f4QWVv9d2zbHjYpU7i4s4iAMIu5B3/NbYxzdnwmbGAnfRcbdIr3F2Fbq
FDCf+x/BbGOkpxRVDljsLh4Y8wqtkQ6VracR1Efh4UF9GO53u4d7e80DcRLG
4PSyxQPxCnqFabxqcmD2oug4k278TyW3tlfLbn3c1ij/wNqN77UllyTSdsBT
tGoeWjUvST0MMHagLUoFwn7lSB7ttrVwGjoNs7oFwWLYY8SDq6Mi7ZepNamp
cRJIfGBKmvugWjKd3O69Jc7JRgkArPUvEVxpn+IUh0Kn4uC06jyXWFd5XKCM
HPXkr+ZDbTQqh9hQOvfoaxthqUoF143zxBqB1qCH2DfXpwjMUY4zx7adfWw0
W2AFXgIqsCAYF0tGsirrvkWgbRGMSdS1SHp/ZFPxCEnrWrTQ8K1kSv9mgaUB
XEmZ/sZ6Y4Jn6mH+P8fjWtx+1sSrNETGORF1vKp2lgQnehOYadTXXXwlB4ul
uwb2aMWuiTcjx3otBlI+SXJO51m0aja5D0YG18XjYvqtfHIXB5RXXnmwSsep
d0Y9vX6KiX72S3friINIxV7d4eDG6CAQzCAS+vd4V/c1yAHn5qMkrUnIkl+j
wLpizjfx51YUKT7goBGLODAh6YBw09S1tJyFSRxVILglgjoJDbVwuqv001bU
TMh1q1omjxG4SJdp91WKR34RgfvEQd9emZsPY04d4h7r0KeSjiWyLg8wOAcE
xRvrDWSaXj/KTMi5zq0TMqV5Cx0AqkhcdNFMskXHrsRizwSCNAkxXcqTQaGL
KZGStDpT/FNegNKYUJts7DL7aRzjcFHmno6Ijw6Ia08WUS84IPqEf6Xlzlnc
bVct2J0Ln2sCsQlKTNOmQ2ByzBUxBHTR3OGKSBYqqVyDEIuymNwkV8pWpF+3
uDcHxXRVlJ8oOWl9hGdlShMTCZ7mZD+MMUq7Qau7OiG0+rY2Ia+w1b0osP8S
6ZVs5EfZekGNEj+NlyVj3nnUaX0bTERuZoQNZcloJ3GBmSrD64UEi7lPt/vY
zd2f2CP0GY9Wp7ev8eJIlBsaODDHyQxrEvgpAC8iP3UHxgyZE2PRySIwNk5C
nCK5jO9ixWv3RVMkTHc8H6ZFSlMkccS3rnhDXDOcBE8cai4W4oxjZo53VExR
PXxWRbOMeuIAdVbjonIUQJfdZ3UG6qN36QB9D/JhV/0L7+3pE+wO0RemEi43
ESS3zGkYCwQPj3rGuRy9puoSYXUhvkLuOgkKTgjGp5q/sJjJ1SSJMO8jxcoZ
oSZNtE4HNatiw6GhjRTyXMbeOJEmSC71W6n/Vk6wWCyv1TqkTATZqFvMv9xG
V5+2qnTDAsupNwnch/IXrsmLzxor8+pDI9HaxVjBoegDVRswt2rFlSpvogDL
Bhsomv4HlkJ5uKoihY2CkUEJrSnyrxIttlWqJ7jcawuN6YlVPV/oP9H7EEJj
q8iprPVc4k10867ObvW02ba5XcanSD+7uK0nmMrcMqFXD8P58e+R8+Otc14/
2/f5eDdKXa1oZhYbGgd75mnCz8cYWtOHZ8ltKSuHHh/KXOI6nSwll+CWWJlP
s3jNrXnXzmlh6TCmu2Nca1fLpiDYdzR2yr4QGJJrkSTFkti1yMmaYhOHSrkO
gS5QLX2oa019wpmaagp9EVAmvdxix40+8tFOVlDyHm4LqWkYUiwWZULEJhLg
QEgw/OqtpYN8fyGn7bSmRyt5NHmU6BVZ9faTcJgmGW46BpnUm1u1tox1QT+x
l9NkOGY7P0B8sd+pA9h//nSP7e316H/s/VV/V9BQY6uYIiWu8USBC9YZKnKx
BzRUMxTBQRCOGiPma57POJeZhYJvXW+qSFPcKHWjBZkCsWwHJpDFhMaKvagg
y069v3AoH0q6gwkTZiO5zohKt1uPmZuDfgr4qaykkNvSOoqLJm2NJRZXHCjO
o84PP1xCMVEiTZdFzBClMEdr+oym89XbpZrOrN2TaPeJ7s8ibcLJMhoeyUbE
O8+Sfw6Z35908wz7digG42EZVrD9ougb8fHy3Smb1XPfy3nBqow0nKTfbi9g
rZ0O7el12I+Xr9AziW0+vd/osPFE4cr9Y5/H3xo7oEMBJc+Q2M00FHEiFPTr
MQaD9w5rlxQc2G5/GdvSiqv70v/5KV+fZrNOgptM18bkEvIuBTgMWYUsYaCX
VK4/G7CKMjzcXGBqZqxHNF1Vm+tG+pErwK+etH2wWJ/CUgmzjPabM6LqUtM5
e2XJiQdXv2pyLOJQNZtpV5XiQhlzumYlorYpRIZhAlMA09vKrM0HmypbFTT+
FYKQCXxWPVvzI7JSlUh8JYsktfz4Q4qkrA3yr5AHcILl1Fi9vgp+mld9pKCM
mUS9NZ0/XEECusjJgwvgtYYskgrCbI05eKWEyoMTd1mBvzZ5ZqGWBzN559rM
qTBQTVanSaRCDKrqi9rgsiakHvjyCu7Orh2zRSYo9Rz9lygQjVMguWi2eAAv
56EsZ9NM/v5xbUu60U8uYe0Dbvf7tUQuUD8scdFhYc5uylMGdeZUwe6zU5SJ
zGJVVZvL5GVainD3MK1UJHjuJ0Bs0hZmWDdCNh4Ioyl6wTFjKJO7SpyzELRL
Uf77W4moN6Idz4Mto+2o42xsfxVN1HWS1hlJG6viCTs88K5BBcQFTtGcUcUl
P0PXWcR4lJCWAXN+g/5GXd5gf2YpLp2Sozn4T4C3j1LYo9L4oJuJWo7EW5hg
ulZvb5xElKOC2so8ZtUaR0NOBw3rEMilf9G4e2icUWjri+I5FK/e2JTYF/3b
WP9qdds+9965xlvbh3OIb4Od03pRuX8Zh+ZdHO4s/jVZbFhcMOqZPcTaQl/B
Al4uTt/LvBMs4mB3GVHtWlywau5tU/oyapKI8JoigrNcSeyaftskUVxiojGt
QaNRNXCbBNIJGIlmPeqOPwd1gGYD6oxqh9uk7iWWIhmJ+dEm2sfrRwC2oXqA
Zg3qjA2fbVJ3aSwOrUGduZf2GUzL6vS5bXO94uRDW2ixvFDaaXU5EBdGWixd
VfmDFgum7EJJjRKYW9VSgWftQWTX19yqDZKYSlGvSuOiAp7bpPh9ibfc6lJ4
N6VfVgL9XHSrSwdXp7WxjOh2SVZo7yXpWjnSbdJ8nsh7LTWytcadVfV0uwNP
lBBQqNagsrGw6jbp/aCRomGWeFXdijWIX1KhdZssnCrUzERdBv7reUK74Ico
bHEnisP+1pN1z7Bwmjfx048waP4kDuuaT/BUx5/sa+i+LWtb0QWG7Tt94d0V
afP9L7uj2xF/R9fdET0t54V35XV1CR3AoFfFCvI/a79/zf6OAv2Heqxb0uEZ
58e4acBsMBym8I8/lZnRuB1NJ7xe0BN90ZjZBCc0xo8mdZn9u/kISJbxPxZ/
wiJefqZq5v2j1kwjk23ER1YZ0POp5mYKh2hmlCxrboLk6A9h8jPzOjxnI7kQ
JD7lvXsVyYh1jPKGGCZrLt+AHnBZmr/SRB3o8INAXdxBTeyq0A2NAo6DInix
qFFZkN74kTX0JdusL9kKfXlc70u2uC+PHX3JNulLtkZfsvX7km3Sl7VGi/uy
doOQy2xUH69vPRYaDwSOhwxWsR0lKZmTaf0Y7978GFJH4vE81z2cZiV12YPQ
wqTaqtzX0MZSlcXKotsgRYukY9FkF71xXQpq3MxkdJ/jgdVx5ivNZr9+w0zZ
dQh4meGvEpIBDcMiy5MJMpXFjitRAbjxwgLBLpTUi7LVojtUE3XXMSHLyDKV
f1eoc7ZxUbd23ftcx/oPVPleRC7Y1Kp9X/78pfr9Z6l+3/pSD/1LPfQKkC/1
0B+kHnqZePelMvqXyuhfKqN/qYz+pTL6l8roiyqjK8RqhrIcpUq9akTZ9+Mk
xjQnJrZZL9XCoFjq2+n3wWWJk6KIUSm8VHm9jIiu8uDJMaVmgQ/y4Du9XyaU
SjSqeWrjURVhxXp+hhW3pM2igfEzfEzUghg1jUHkuBIKQWQHRyFIjaYjNg7V
WptzuXQqmFME3IqCCUgT0tIRlcOMGSQENuGQrmDCTOJxmqjQWKRGg50CuwKD
ay4psS+FVxnVtGupM+SdAxJ5xnAextsIYk0xFDfIvJJhyCodrRVN13OiuTdW
SgeHWyl04FCmVevDVArClDphpuWgi69lFWmRUVVgmpBrlad6wObUW6/tO0sf
n8SyBrCsqFAmLIl9Y3MOX+5UlDVG9Wy53EFoqHyM+noyMDKrfA29RHpnIm+s
FLy42GwD/hWq/zroQAFbawsGGSRq82F7KRFKE8p4qiaC8kxXuThh7hEtlP2C
es8O+SsczWXd79T011W/vN08BoS3pGWsVcp61wt3l5sfmnlXcoVTp3ECTPIV
7SVQxLas1M86Y08qhya0qhi42LNcIcQeV3ONGosis0OXEae2oqt11BoOUTaq
jSqPhsrqLutF3LsvKBA2pGFzqU6W8ugrEQam2nDJ5bwUKJOoSl8pPuSs6WXD
Y1t+uXSDGLvarbMpH6InIwzCZtouGiERUfJFUcvQBnKWYxAsKj8COnGOiIJ1
3DzE+JL8pTqPkvObNMwryxRVD4tOG0iioEHlC1Ed2eaKOCJd29r1dadbr+OD
605X8uxcEKh44qbGjQ5afEpVK00HRuCWbjVlZTWrllUBlKLvhuFZ0/2KDXuQ
BLFVTMNGReOUAavlIEjP1rC5V0vVX3xYwYgwnJzUU/910W1HOqrt/fUmcBXE
SqWLzWxZl4lzKWUj0dUyjvqKo3JCVufCmCyuzcGpdUoD5nUUqhAzPiYy8EAU
rndxoZbQ0PJEVCR/7AsLJiFExmxvKZfVEMXksDFQWYlH7CVh0+zYZQtdJe1Z
Ax/uWw/0Y3dVAlsKzRcjbFADdEAIS0emayEJLqSIKlML86NWL+Up34znm5YM
Nao4uovAlRlNcnt8ZctXnmOVajlNwNnMXfc6OWiydtwbaWpIrdqcKojpJ4Uo
yRXNGSFfkVC5y/8vIrWqJZKaJtobXO/xA7ve4/87rtd9YPjf1vUe39P1Hi9y
vQ/uZ4+/+NkvfnZ9P3u5koNV3tQlHcPBspfyfiBVuODsglE9FgkUZ1cuEFjH
ASdAQ7fjqzP2xVWvRtX/M1ddrulZd+RV8wY3X3Eriw0L97xwQa0k1b2yVqXr
ngtszYWQm8hyELaNVbWq0JYupdVSLbe0kibowt2VLS+olYgWrKu5G4tFtqZ1
NT4a4QZ+fcgYq2yVpbTvvr/I+NDslHppKHnRpiv6+3ddVDNSdu8X4F8urUe+
YMmqYhcq1ldchdmYL9xe2RSbcXOpCM7a2oiuGq0IY2Bti68XthtIH2XMvR/O
dgbQ4+uXzTh69rSqdj91n+w9ZyD5n7QGNmkOfvo8zcXQ41WZOovDL7ossjFi
XVqnoRamqrJuVLE1F5ljdTauOYbwWA9rheoTdRXbvAhlpVOleoiBDj0L4zkR
lbDX7tJnx3vPespunUQ3EMfnY8yrQoV5ReXls86ye4MG4U3skymRLZZLZ+FF
rqsF5EtqGayxYVunctXwx8i4v/dWY8O1BOvFPSVB94x4lpPyeQIcpGOl0MZ5
FGE7wQ3RtN2whlA8YEAz8odhFCLiCkYzgoFOHX5Ut0iCjZz6+biazmO3btwy
/HcMaOiaJFc6zzc1G3Hvw62k8e7jrWeYdVUmRWD93yIjLTzHC55VeVWQqkju
Zh7d/Xyri2SKrNRrPqIrX0m4MlNW5O3OOIxzPytbcfsOYjrb+vT50cHdXVee
ozXglldUicSwgiybOAAdWqQr04wgypRuqep0LziCNVVbpaLmsmb0NMlI9Yyx
JEo08Nw7Tf1RLlJ8AQydhMa7RShxBdrp+2ZlUrXFFBMZcpULaavUq10QxTld
IQEjKaDNeASCia9ZXmb+QgusGxsAS5SACqQM8f5n6+5PZChA4jMJBQjLuuwC
LF3GMZW1vFqEbL4UgB/P6RaS2zDAy3RtYhEMZnazIAFkAIOe45QpSNJMnOyW
N7EjoV32qkhxtQlvBe7A+zgZSlJKcAbbBrrDY+wZUZDfyjoor6Qpj0cTZqJZ
1sDH2g6RvP2dBIMeldK+gRp5Y3Yo6VQS9UUcwiaYew5PEM61mIHhaBJlNYFY
rCeX+1EihKLrGtRUj0x5SInjI07RC2C+5D4lWGE2vh+IJG+AWwo9oTW4KrCJ
T6aJf4LuEEPiZIijQKZxG7rVYW3SGarYSSvAlI7MZ4QV2JvJ0z2UP0jCyhMm
EqhZUMgZZ6DuMIZn6gSBLPoy9uWQveYxDCUMMBBIWsSUxITGpiPjXLyTnHw4
3T6OyVyyBCmGkiQ0LGiRhpYWkTPhPLj2hx8NjBOQm9AAJRqjDEYmbpeekJRp
dAkPVUyVtTIU1xaAuoCdhGZql1AkOtOASeDAabtL5+1+KOIQ72k55zmCytjO
64uXu9QpX7N3xkGsXsOrXfmubWdF3T59yh/jjluePTbqrmN5XMNgoAoZwlBQ
T8tXeubRGAGvLLCmy5+IU/1Ij1n5gPyBDD0qNQNKzzawgmzrgXF/jfH7VfU6
PePZWeXuOfvRccOjS6N2u/Gzri1tU1uph1l/WClC+sZx05P92H29TRWEeT1I
HbzrypbqW867UYyXXuElV2V3teqdKmLcVboVe4L9k/alesyKaq7M1XnryaW5
Ru58opaBK0R+zd7isA3zOXvDb3nUIxs592AkQpNplMzpKKR4tU+B0Q3vyb/l
oYkeI2cMkYz8XZyZwZIV7PzxiXO8SduDJqmHgc0YB50KBroaH5177LH6mTuF
CW+VEDoQ9ICVFOze4V6Hjn6QuTjnM/b6sM+u+HAcJ1iwlGdOY+F68TOaCrvw
SZvs8MIyJbL/yTqTvzYtMxCg+IGQO4C4WfOySXfTKSPKIYyTQExl16e3+7mV
Jgr/C1re/FeEHu5GnR5dTXHE2V0UU990yFk9HhaHImFwBUbZ/5wD3TgLtGJQ
dWDssPu0u4+AQI4UOzx/vve0DLZ5TbjmOamlgkYgIsoWXUbUGZ4HSBI1gMVx
RH9IIWrAbkNxllNUFUIo5aHL0tV3wHOBqCCikF6VqYsUdAihjj+xnfOXV/13
5692BZfHB0f7d3fEwOXLAT2RdXT2sI6OCsszbpDhpIHt7O/KQEhED76+5Bjr
sNIJ8cifixoCO7x70+2os9iDMU5+dgaD15Koo4MnFLZdvRlIYo6OjvEHJPOv
78/6sof29oDEXRUh7RzYBEyKHGObylXluj+dosIYEtevUF9TkJY4TrZzftJ/
u6vrC4HA5PRJHONB5ZpwYFIU7Rc1nmUf0qzauIFeSl+entQiB3pTao5TJT5U
12DQSUks1IhhNQavOrRugKOndEl5lF2mH+f6nO4VzQ0o3DaWZA1TYi99yL7X
hxVRaUnmAGAGwxHpeYzVrMU38mlE407Y5dDLcm0OJwwqChZ3JspB4RdRviuO
qCpwJjGIJgo/4n6vGBwZpysbbzEBgt0WEVbgF/WZxKFVmKbGsm95fBumiTgF
2WUfADo3JSPVkMOUXV7ytauWXYVnNl8WUXNm0abOvuL0Vt4zJM0JkEYyspSP
trhIRQEAvxGXQIotL5wmK6pLpHpWXDo2UAismiW61SCFwBqKpqQE/4EfVGLC
9Sj4u6cW0JQ566kvj/UvMsTLar+IHxQA+t0KebcAGq3Hg8Klq9S2QrGA/OAE
03k+8AAPCXNaLg4+JFhzZffhReDZQ+pBMWwRNM7U6Jb3hyUYF0ZLsIPESFKA
ELJqSt32HJckrsl8qnUO9DtuI7vEwp6RYyDrXmSyLowvb5CUHhXpUr5R2l8M
cm543sH/k3aYyifgjcVJrhcid10muMsGarEyiuaiUoA2lmLZayV7Sa9+TpNp
LgY8KGSMyjPg6mHNWuVC7Qe2Q8b1fA8L2aj8/LC2qFZYWoPXpy0fl3OBXnk6
0vnr4sa1fK+GhxLIChCNLVT3z5U4MU6MoRLNDetwedGnjEgZ9RiRC+6aYLWL
6lztq6+qpRmMal0w8xUFLogAak9HHqgCrZgeiRIYck5XxkXvL8/UVl07ztq6
UgbCwTBNPaOl75/evtGY2mLVk+1QeH94/OwZzCl6taqgAAZQ9NhqdcBARygu
FzjQBOoZMCVTvxx8T7EdEEIz64602YpP4gZtFpGqy5C19BLROqKxrH2or3pv
m3LH7V9DalIax3sHOMOyBIitaEapl1aMZiTKeklVeB0RmDVVpYTe+qEq9IL7
EsDVC3au3iee1xS5KH7RY3Y3yDinp8uYlLXi3JVr/10UUZWu/f2pIqsq1Eaa
aKohAtlAE7WIHk4XNUhLG42+aNRHdjLEbVsI9W9E/aEWdpKq6TRLiiig2bCI
hfz4I/shuWaDOPwF99A6bAAdnGRj9pckAgRgwOed1svraw69599iFtoJXpHa
AYWf+riHc+nnsc++B0PsTyhEeu2HyAz7G9Z5U9kXYdoSO2YiigqzYZFZRYPU
hhgI3PM8hhtVrf8Fa5dR7evZAAA=

-->

</rfc>
