<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.3.11) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hause-asip-00" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ASIP">ASIP: AS-Structured Internet Protocol (128-bit)</title>

    <author initials="J." surname="Hause" fullname="Jordan Hause">
      <organization>Independent</organization>
      <address>
        <email>truixprojects@gmail.com</email>
      </address>
    </author>

    <date year="2026" month="April" day="16"/>

    <area>Internet</area>
    
    <keyword>ASIP</keyword> <keyword>addressing</keyword> <keyword>ASN</keyword> <keyword>IP version 8</keyword> <keyword>routing locator</keyword> <keyword>transition mechanism</keyword>

    <abstract>


<?line 84?>

<t>ASIP (AS-Structured Internet Protocol; IP version 8 on the wire) is a 128-bit network protocol that defines a new address family alongside IPv4. ASIP is NOT a wire-level superset of IPv4: an unmodified IPv4 device cannot send, receive, or forward an ASIP packet. Interoperation between ASIP-aware endpoints and legacy IPv4 networks is provided by a defined transition mechanism (stateless translation at AS boundaries and encapsulation across non-upgraded transit), not by wire compatibility.</t>

<t>ASIP's addressing architecture arranges the 128-bit address as four 32-bit fields (ASN routing locator, zone, subnet, host). The ASN locator is used as a routing hint rather than a hard identity binding; multihoming, ASN transfer, and cross-ASN anycast remain possible through multi-address semantics defined in Sections 8, 11, and 14. This structure is intended to reduce operational friction during transition (familiar dotted-decimal notation, clean aggregation at the ASN boundary) rather than to achieve wire-level IPv4 compatibility.</t>

<t>This document specifies the core protocol: address format, packet header, address classes, routing behavior, transition mechanisms, and security considerations. The Zone Server reference architecture (Section 16) is Informative and non-normative. The Cost Factor routing metric (Section 17) is OPTIONAL and is specified in a separate companion document (draft-asip-cf-00); Section 17 of this document is a one-paragraph forward reference. Interplanetary realm reservations (Section 3.12) are reserved allocations only; delay-tolerant transport is out of scope for this document. Operators MAY deploy ASIP addressing without any of the above.</t>

<t>This specification extends the ASN-locator addressing model of <xref target="I-D.thain-ipv8"></xref> to a 128-bit four-field address format; see Section 1.3 for the relationship between the two proposals.</t>



    </abstract>



  </front>

  <middle>


<?line 95?>

<section anchor="introduction"><name>1. Introduction</name>

<section anchor="requirements-language"><name>1.1. Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="design-philosophy"><name>1.2. Design Philosophy</name>

<t>ASIP is built on three premises.</t>

<t><strong>First,</strong> ASIP is a new address family with a defined transition mechanism. It is not a wire-level superset of IPv4. Any packet carrying Version=8 in the IP header will be dropped by unmodified IPv4 routers, hosts, and middleboxes; conversely, ASIP-aware nodes receive IPv4 traffic only through the transition mechanisms defined in Section 12. The goal is not wire compatibility, which is unachievable without changing the framing layer. The goal is a transition path that minimizes operator-facing churn: familiar dotted-decimal notation, natural mapping of existing IPv4 host addresses into the ASIP host field, and stateless translation at AS boundaries so that legacy IPv4 endpoints remain reachable by ASIP-aware peers without application-layer changes.</t>

<t><strong>Second,</strong> the address format should reflect routing topology so that aggregation is natural and deaggregation is visible. Arranging the 128-bit address as ASN/Zone/Subnet/Host makes the default aggregation boundary obvious and provides a single-lookup inter-AS forwarding path for the common case. The ASN field is a routing locator used as a forwarding hint, not a globally binding identity; Sections 8, 11, and 14 define how multihomed, anycast, and transferred ASNs are handled through multi-address semantics rather than through a one-ASN-per-host rule.</t>

<t><strong>Third,</strong> a protocol specification must not exceed its scope. ASIP defines an address format, a packet header, and the routing behaviors those imply. Operational tooling, management platforms, authentication frameworks, and forward-looking realm designs are Informative only. An operator MAY adopt ASIP addressing without adopting any of them.</t>

</section>
<section anchor="relationship-to-prior-work"><name>1.3. Relationship to Prior Work</name>

<t>This specification extends the ASN-locator addressing concept of <xref target="I-D.thain-ipv8"></xref> from a 64-bit two-field address (ASN / Host) to a 128-bit four-field address (ASN / Zone / Subnet / Host). The dotted-decimal r.r.r.r notation for the ASN locator, the concept of encoding Autonomous System identity into the address prefix, and the Zone Server management architecture described in Section 16 (Informative) are derived from that prior work. The extensions contributed by this document are: the 128-bit address format with Zone and Subnet fields, the stateless translation mechanism defined in Section 12, the ingress-filter mechanism defined in Section 14.1, the byte-level encoding specifications in Section 12.7, and the security-considerations treatment in Section 14.</t>

<t><xref target="I-D.thain-ipv8"></xref> remains a distinct proposal with different addressing semantics; this document does not supersede it and does not claim to. The two specifications MAY coexist as parallel proposals in the IETF process.</t>

</section>
<section anchor="what-asip-is-not"><name>1.4. What ASIP Is Not</name>

<t>ASIP is not a wire-compatible extension of IPv4. It is not a network management suite. It does not, at the protocol layer, mandate specific authentication mechanisms, logging formats, route-validation registries, or device firmware behaviors. Section 16 (Zone Server) is Informative, Section 17 (Cost Factor) is OPTIONAL and deferred to a companion document, and Section 3.12 (realm reservations beyond Earth) is reserved allocation only. The core protocol's correctness does not depend on any of them; a compliant ASIP implementation can ignore all three.</t>

<t>The core address-layer specification stands alone: the packet header of §5, the address format of §3, and the link-local, mesh, and realm scopes of §§3.10-3.12 are self-contained and do not depend on any companion protocol. Inter-AS routing, route-ownership validation, and transit across non-upgraded IPv4 networks require the extensions named in Sections 8 and 12, and those extensions are REQUIRED for the use cases that depend on them; they are not part of the core address-layer specification.</t>

</section>
</section>
<section anchor="motivation-and-problem-statement"><name>2. Motivation and Problem Statement</name>

<section anchor="address-exhaustion"><name>2.1. Address Exhaustion</name>

<t>IANA completed allocation of the IPv4 unicast address space in February 2011. Regional Internet Registries exhausted their pools between 2011 and 2020. CGNAT has extended IPv4's operational life at the cost of added latency, broken peer-to-peer protocols, complicated troubleshooting, and centralized failure domains.</t>

<t>The address exhaustion problem is architectural and cannot be resolved within a 32-bit address space.</t>

</section>
<section anchor="routing-table-growth"><name>2.2. Routing Table Growth</name>

<t>The BGP4 global routing table exceeded 1,000,000 prefixes by 2024 and grows without architectural bound. Prefix deaggregation for traffic engineering purposes is the primary growth driver. No BGP4 mechanism structurally prevents it.</t>

<t>BGP4 has no binding relationship between what an ASN advertises and what it is authorized to advertise. Prefix hijacking, route leaks, and bogon injection remain possible because route ownership validation is not enforced as a condition of route acceptance. RPKI and BGPsec have seen limited deployment due to operational complexity and incomplete adoption incentives.</t>

</section>
<section anchor="transition-model-failure"><name>2.3. Transition Model Failure</name>

<t>IPv6 required dual-stack operation: every device, application, and network supporting both IPv4 and IPv6 simultaneously. This model imposed cost with no incremental benefit to early adopters. Organizations that deployed IPv6 still required full IPv4 support for the foreseeable future. The absence of a forcing function allowed indefinite deferral.</t>

<t>Any viable successor must provide value to individual adopters before universal adoption occurs.</t>

</section>
<section anchor="requirements-for-a-viable-successor"><name>2.4. Requirements for a Viable Successor</name>

<t>These are the goals ASIP sets for itself. Wire-level IPv4 compatibility and zero-modification deployment are not among them: both are unachievable at the framing layer once Version=8 is used, because unmodified IPv4 forwarding elements discard packets whose Version field is not 4.</t>

<t><list style="symbols">
  <t><strong>R1.</strong> Defined transition mechanism. ASIP-aware endpoints MUST be able to reach unmodified IPv4 endpoints through stateless translation and encapsulation mechanisms specified in Section 12. Wire-level IPv4 compatibility on the Version=8 code point is explicitly not claimed.</t>
  <t><strong>R2.</strong> Single-stack operation on the end host. An ASIP-aware host MUST be able to reach both IPv4 and ASIP destinations through a single ASIP socket API; dual stacks in the application layer are not required. Network paths in transition will carry both IPv4 and ASIP frames; that is unavoidable and is not called "dual stack" here.</t>
  <t><strong>R3.</strong> Expanded address space sufficient to eliminate exhaustion and CGNAT dependency and to reduce forced renumbering for the common case of upstream-provider change within a fixed ASN. The requirement is "reduce" rather than "eliminate" because the z:s:h identifier triple of §3.1 is stable across ASN transfer and locator rewrite, but the r.r.r.r field of any affected address changes per §8.3.2, and in that narrow sense some renumbering events persist. Residual renumbering events include (a) ASN transfer between organizations (§8.3.1), (b) multihoming add/drop where the set of r.r.r.r locators advertised for a host changes, (c) locator rewrite at an AS boundary (§8.3.2; not visible to most applications per §3.1's identifier/locator separation), (d) acquisition-driven merger of two ASNs into one, and (e) RIR policy revocation of an ASN. Common-case provider-change (an enterprise swapping upstream ISPs while keeping its own ASN) produces zero renumbering under ASIP, which is the benefit R3 claims.</t>
  <t><strong>R4.</strong> Structurally bounded global routing table in the common case, with multihoming, anycast, and traffic engineering preserved through the mechanisms defined in Sections 8.3, 11.1, and 14.</t>
  <t><strong>R5.</strong> Route ownership validation defined at the protocol layer (Section 8.4). Because route-ownership validation is a core guarantee, it is REQUIRED for any deployment that relies on the structural routing-table bound; it is RECOMMENDED but not REQUIRED for early deployments that accept BGP4-equivalent route hygiene.</t>
  <t><strong>R6.</strong> Implementable via software update on existing forwarding hardware (line cards, NICs, kernels, middleboxes). Hardware that cannot be updated to parse a 40-byte Version=8 header is incompatible with ASIP and MUST be replaced or bypassed via tunnels at the deployment boundary.</t>
  <t><strong>R7.</strong> Human-readable addressing consistent with IPv4 operator familiarity.</t>
  <t><strong>R8.</strong> Incremental adoption value at the AS boundary. An AS that deploys ASIP internally and at its borders benefits before universal adoption; transit across non-upgraded IPv4 networks uses the mechanisms of Section 12.</t>
  <t><strong>R9.</strong> No flag day for legacy IPv4 endpoints; they continue to operate unchanged and are reached via translation. There is, however, a per-device software-update flag day for any node that wishes to participate in ASIP forwarding or origination.</t>
  <t><strong>R10.</strong> Clear separation between protocol-layer requirements and operational recommendations (Sections 16, 17).</t>
</list></t>

</section>
</section>
<section anchor="asip-address-format"><name>3. ASIP Address Format</name>

<section anchor="structure"><name>3.1. Structure</name>

<t>An ASIP address is a 128-bit value composed of four 32-bit fields:</t>

<t><spanx style="verb">
r.r.r.r . z.z.z.z . s.s.s.s . h.h.h.h
|       |  |       |  |       |  |       |
 ASN       Zone      Subnet     Host
 Locator   ID        ID         ID
(32 bit)  (32 bit)  (32 bit)  (32 bit)
</spanx></t>

<t><list style="symbols">
  <t><strong>r.r.r.r</strong> -- ASN Routing Locator. A 32-bit value drawn from the Autonomous System Number space and used as the inter-AS forwarding key. The ASN locator is a routing hint; it is NOT a globally binding identity. A single host MAY be reached via multiple addresses with different r.r.r.r values, and a single ASN MAY be advertised from multiple locations. Rewriting of r.r.r.r at ingress or egress is permitted under the conditions defined in Section 8.3 and Section 11.1.</t>
  <t><strong>z.z.z.z</strong> -- Zone Identifier. Identifies a network zone, region, or organizational division within the AS. Allocated by the AS operator. Locally significant.</t>
  <t><strong>s.s.s.s</strong> -- Subnet Identifier. Identifies a subnet within a zone. Allocated by the zone operator. Locally significant.</t>
  <t><strong>h.h.h.h</strong> -- Host Identifier. Identifies a host within a subnet. Its value space is the same as an IPv4 host address so that existing operational practice (well-known host addresses, DHCP pools, broadcast conventions) carries over without reinterpretation.</t>
</list></t>

<t><strong>Identifier/locator separation:</strong> r.r.r.r is a routing locator only, not a host-identity field. Binding ASN identity into the address as a hard property of the host would break multihoming, ASN transfer, and cross-ASN anycast: a multihomed host reachable through two ASes could not present a single identity, an ASN transfer would force every affected host to acquire a new identity, and a single anycast service could not be advertised from multiple ASNs. Under the locator-only semantics defined here, a multihomed host has one address per upstream AS it is reachable through; an anycast service has one address per ASN it is advertised from; an ASN transfer rewrites the r.r.r.r locator of the affected addresses without changing the underlying host. The z.z.z.z, s.s.s.s, and h.h.h.h fields collectively form a stable identifier within an operator's scope; r.r.r.r is allowed to change as reachability changes. Section 8 defines the routing-layer consequences; Section 14 defines the security consequences.</t>

</section>
<section anchor="address-space"><name>3.2. Address Space</name>

<t><spanx style="verb">
Total:           2^128 = 340,282,366,920,938,463,463,374,607,431,768,211,456
Per ASN:         2^96  = 79,228,162,514,264,337,593,543,950,336
Per Zone:        2^64  = 18,446,744,073,709,551,616
Per Subnet:      2^32  = 4,294,967,296
</spanx></t>

<t>This is identical in total size to IPv6 (2^128) but with a fixed hierarchical structure that directly encodes routing topology.</t>

</section>
<section anchor="ipv4-mapped-asip-addresses"><name>3.3. IPv4-Mapped ASIP Addresses</name>

<t>When the ASN Locator, Zone ID, and Subnet ID are all zero, the Host ID field encodes an IPv4 address:</t>

<t><spanx style="verb">
0.0.0.0 . 0.0.0.0 . 0.0.0.0 . h.h.h.h
</spanx></t>

<t>This form is analogous to IPv6's ::ffff:0:0/96 IPv4-mapped address block <xref target="RFC4291"></xref>. It is a representation inside the ASIP address space of an IPv4 destination; it is NOT a wire-level IPv4 packet. An ASIP-aware host that wishes to reach an unmodified IPv4 endpoint constructs an IPv4-mapped destination and passes it to the ASIP stack, which either:</t>

<t><list style="numbers" type="1">
  <t>Forwards the traffic as a Version=8 frame to an ASIP/IPv4 translator at the AS boundary (Section 12.2), which emits Version=4 on the downstream IPv4 network; or</t>
  <t>Encapsulates the Version=8 frame in a Version=4 packet for transit across non-upgraded IPv4 infrastructure (Section 12.3).</t>
</list></t>

<t>An unmodified IPv4 device cannot send or receive a Version=8 frame directly. The IPv4-mapped address form exists so that the ASIP stack and application layer have a single address type for both ASIP and IPv4 destinations, not so that IPv4 hosts are silently reclassified as "ASIP compliant."</t>

<t>An ASIP implementation that receives a Version=8 packet where r.r.r.r = 0.0.0.0, z.z.z.z = 0.0.0.0, and s.s.s.s = 0.0.0.0 MUST treat the h.h.h.h field as an IPv4 destination and forward it toward the IPv4/ASIP translator selected by Section 12.</t>

<t><strong>r=0 with z≠0 or s≠0.</strong> The IPv4-mapped form above requires all three of r, z, s to be zero. The partial form (r.r.r.r = 0.0.0.0 with z.z.z.z or s.s.s.s non-zero) is not defined by this document and, consistent with the AS 0 reservation of <xref target="RFC7607"></xref>, is not a valid origin or destination for ASIP traffic. ASIP implementations MUST drop any received Version=8 packet whose source or destination r.r.r.r = 0.0.0.0 is accompanied by a non-zero z.z.z.z or s.s.s.s, and SHOULD log the event.</t>

<t><strong>Realm containment exception:</strong> Section 4.1 defines strict scope containment: an address in realm X is not visible outside realm X. IPv4-mapped addresses (r=z=s=0) are an explicit exception to the terrestrial-realm containment rule because they represent a legacy IPv4 destination that has no realm of its own. IPv4-mapped traffic is handled by translators at the terrestrial/realm boundary and is never forwarded natively into a non-terrestrial realm.</t>

</section>
<section anchor="asn-encoding"><name>3.4. ASN Encoding</name>

<t>The 32-bit ASN is encoded directly into the r.r.r.r field as a 32-bit unsigned integer in network byte order:</t>

<t><spanx style="verb">
ASN 64496   = 0.0.251.240  (documentation, per RFC 5398)
ASN 64497   = 0.0.251.241  (documentation, per RFC 5398)
ASN 15169   = 0.0.59.65    (example: Google)
ASN 13335   = 0.0.52.23    (example: Cloudflare)
</spanx></t>

</section>
<section anchor="internal-zone-prefix-1270008-in-rrrr"><name>3.5. Internal Zone Prefix (127.0.0.0/8 in r.r.r.r)</name>

<t>The r.r.r.r range 127.0.0.0/8 is permanently reserved for internal zone prefixes. These addresses identify network zones within an organization's private addressing space and are never routed externally.</t>

<t><spanx style="verb">
127.1.0.0 . z.z.z.z . s.s.s.s . h.h.h.h   (Internal zone 1)
127.2.0.0 . z.z.z.z . s.s.s.s . h.h.h.h   (Internal zone 2)
127.3.0.0 . z.z.z.z . s.s.s.s . h.h.h.h   (Internal zone 3)
</spanx></t>

<t>Internal zone prefix rules:</t>

<t><list style="symbols">
  <t>MUST NOT be routed beyond the organization's AS boundary.</t>
  <t>MUST NOT appear on WAN interfaces or public internet links.</t>
  <t>MUST NOT appear in eBGP-ASIP advertisements.</t>
  <t>MAY be used freely within an organization's routing infrastructure.</t>
  <t>Provides 2^(24+32+32+32) = 2^120 effective internal addresses per organization (24 free bits in the r.r.r.r field after the fixed 127/8 prefix, plus the full Zone, Subnet, and Host fields). The same 127.0.0.0/8 prefix space is reused independently inside every organization; the 2^120 figure is a per-organization capacity, not a globally partitioned one.</t>
</list></t>

<t>Organizations may build geographically distributed, multi-region private networks of arbitrary scale without external address coordination and with zero possibility of zone-to-zone address conflict.</t>

<t>ASN numbers that encode to the 127.0.0.0/8 range (ASN 2,130,706,432 through ASN 2,147,483,647) are reserved for internal zone use and MUST NOT be allocated by IANA for public internet routing.</t>

</section>
<section anchor="inter-organization-interop-prefix-12712700"><name>3.6. Inter-Organization Interop Prefix (127.127.0.0)</name>

<t>The prefix 127.127.0.0 in the r.r.r.r field is reserved as a standard inter-organization interconnect DMZ. When two organizations need to peer without exposing internal addressing:</t>

<t><spanx style="verb">
Org A                               Org B
-----                               -----
127.1.0.0.z.s.h  &lt;-&gt; XLATE &lt;-&gt; 127.127.0.0.z.s.h &lt;-&gt; XLATE &lt;-&gt; 127.2.0.0.z.s.h
</spanx></t>

<t>Neither organization exposes its internal zone topology to the other. Each controls exactly what it publishes into the shared 127.127.0.0 space.</t>

</section>
<section anchor="rine-peering-prefix-1000008-in-rrrr"><name>3.7. RINE Peering Prefix (100.0.0.0/8 in r.r.r.r)</name>

<t>The r.r.r.r range 100.0.0.0/8 is reserved for Regional Inter-Network Exchange (RINE) peering fabric addressing. RINE addresses are used exclusively for AS-to-AS peering links at IXPs and private interconnect facilities.</t>

<t><list style="symbols">
  <t>MUST NOT be advertised in the global eBGP-ASIP routing table.</t>
  <t>MUST NOT be assigned to end devices.</t>
  <t>MUST be filtered at all eBGP-ASIP border routers.</t>
</list></t>

</section>
<section anchor="interior-link-convention-2220008-in-hhhh"><name>3.8. Interior Link Convention (222.0.0.0/8 in h.h.h.h)</name>

<t>The h.h.h.h range 222.0.0.0/8 is designated by convention for router-to-router interior link addressing within an AS. This is a soft convention, not a scope boundary.</t>

<t>Two distinct filtering behaviors apply and MUST NOT be conflated:</t>

<t><list style="symbols">
  <t><strong>Route-advertisement filtering (Section 14.4):</strong> eBGP-ASIP border routers MUST NOT advertise prefixes whose covered addresses have h.h.h.h in 222.0.0.0/8 as reachable interior links. This prevents interior-link addressing from being exported to other ASes.</t>
  <t><strong>Data-plane filtering:</strong> Border routers MUST NOT filter data packets solely on the basis of a 222.0.0.0/8 h.h.h.h value. The host field is locally significant; other ASes MAY use 222.x.x.x host addresses for any purpose and their traffic must transit normally. Filtering h.h.h.h values at border routers would break legitimate inter-AS traffic from operators who use this range internally.</t>
</list></t>

<t>Conflating the two would cause legitimate external traffic to be dropped whenever a remote operator happened to use 222.x.x.x host values internally; the two behaviors are therefore kept distinct as a normative requirement.</t>

</section>
<section anchor="private-asn-reservations"><name>3.9. Private ASN Reservations</name>

<t>Consistent with RFC 6996:</t>

<t><list style="symbols">
  <t>ASN 65534 (r.r.r.r = 0.0.255.254): Reserved for private inter-organization eBGP-ASIP peering.</t>
  <t>ASN 65533 (r.r.r.r = 0.0.255.253): Reserved for documentation and testing.</t>
</list></t>

</section>
<section anchor="link-local-scope-1692540016-in-rrrr"><name>3.10. Link-Local Scope (169.254.0.0/16 in r.r.r.r)</name>

<t>The r.r.r.r range 169.254.0.0/16 is reserved for link-local addressing, directly analogous to both IPv4's APIPA (169.254.0.0/16) and IPv6's fe80::/10. The familiar range was chosen deliberately so that operators immediately recognize the scope.</t>

<t><spanx style="verb">
169.254.0.0:0.0.0.0:0.0.0.0:h.h.h.h
Compressed: 169.254.0.0::h.h.h.h
</spanx></t>

<t>Link-local rules:</t>

<t><list style="symbols">
  <t>MUST NOT be forwarded by any router. Link-local addresses are valid only on the physical or virtual link where they originate.</t>
  <t>MUST be usable without any prior configuration, DHCP, or router contact. A device that has received no configuration of any kind MUST be able to generate and use a link-local address.</t>
  <t>MUST be used for neighbor discovery, router solicitation, and SLAAC-ASIP bootstrapping (Section 3.14).</t>
  <t>The h.h.h.h field is self-assigned by the device (see Section 3.14 for generation rules).</t>
  <t>Multiple link-local addresses MAY exist on a single interface.</t>
</list></t>

<t>Link-local addresses serve the same critical bootstrapping role as fe80:: in IPv6: they provide a communication channel that exists before any infrastructure (DHCP, DNS, routing) is available. Every ASIP interface MUST have at least one link-local address at all times.</t>

</section>
<section anchor="mesh-and-ad-hoc-scope-2400008-in-rrrr"><name>3.11. Mesh and Ad-Hoc Scope (240.0.0.0/8 in r.r.r.r)</name>

<t>The r.r.r.r range 240.0.0.0/8 is reserved for mesh and ad-hoc network addressing. This range is used by devices participating in self-organizing networks where no AS infrastructure exists: disaster recovery, battlefield mesh, sensor networks, and similar environments.</t>

<t><spanx style="verb">
240.x.x.x:z.z.z.z:s.s.s.s:h.h.h.h
</spanx></t>

<t>Mesh scope rules:</t>

<t><list style="symbols">
  <t>MUST NOT be routed beyond the mesh boundary.</t>
  <t>MAY be bridged to AS-routed networks via a mesh gateway that performs address translation for unicast traffic. Multicast is NOT forwarded across a mesh gateway in either direction per §10.6 rule 5; application-layer relay is the only sanctioned path for cross-mesh multicast delivery.</t>
  <t>Devices within a mesh self-assign addresses using SLAAC-ASIP (Section 3.14) with DAD.</t>
  <t>The x.x.x portion of 240.x.x.x MAY be used to identify distinct mesh domains.</t>
</list></t>

</section>
<section anchor="realm-architecture-and-interplanetary-addressing-informative"><name>3.12. Realm Architecture and Interplanetary Addressing (Informative)</name>

<t>This subsection is INFORMATIVE. The reservations described here set aside r.r.r.r ranges and nothing more; no delay-tolerant transport, no inter-realm relay, and no non-terrestrial routing protocol is defined by this document. A compliant ASIP implementation MAY ignore this section entirely except to filter the reserved ranges as unallocated.</t>

<t>ASIP reserves ranges in the r.r.r.r field for network realms beyond the terrestrial internet. A realm is a physically or logically distinct routing domain where light-speed delay, intermittent connectivity, or governance boundaries make standard BGP convergence assumptions invalid.</t>

<t>The rationale is forward-looking: deep-space networking (DTN) is already standardized via the Bundle Protocol <xref target="RFC9171"></xref> but has no native IP-layer addressing scheme. Reserving realm prefixes now costs nothing and avoids a renumbering event later. The reservations are held unallocated until a companion specification defines how they are to be used.</t>

<t><strong>Realm Allocations:</strong></t>

<texttable>
      <ttcol align='left'>r.r.r.r Range</ttcol>
      <ttcol align='left'>Realm</ttcol>
      <ttcol align='left'>Status</ttcol>
      <c>0.0.0.1 - 96.255.255.255</c>
      <c>Terrestrial (Earth)</c>
      <c>Active</c>
      <c>97.0.0.0/8</c>
      <c>Near-Earth Infrastructure</c>
      <c>Reserved</c>
      <c>98.0.0.0/8</c>
      <c>Cislunar / Lunar</c>
      <c>Reserved</c>
      <c>99.0.0.0/8</c>
      <c>Martian</c>
      <c>Reserved</c>
      <c>241.0.0.0 - 249.255.255.255</c>
      <c>Future Celestial Bodies</c>
      <c>Reserved</c>
      <c>250.0.0.0/8</c>
      <c>Delay-Tolerant (DTN) Relay</c>
      <c>Reserved</c>
</texttable>

<t><strong>Realm properties:</strong></t>

<t>(The bullets below are descriptive guidance on operating characteristics; the RFC 2119 keywords within them are normative only for operators who voluntarily deploy into the named realm per a future companion DTN profile. None of these bullets imposes a conformance requirement on ASIP core implementations, which per the section opener MAY ignore §3.12 entirely.)</t>

<t><list style="symbols">
  <t><strong>Near-Earth (97.0.0.0/8):</strong> LEO and GEO satellite constellations, space stations, orbital infrastructure. Round-trip times up to ~600ms. Standard TCP is functional with tuning. eBGP-ASIP peering is viable with extended timers.</t>
  <t><strong>Cislunar/Lunar (98.0.0.0/8):</strong> Earth-Moon communication. ~2.5 second round-trip. TCP is marginal; DTN overlays are RECOMMENDED within the scope of a companion profile. eBGP-ASIP peering within that companion profile would require hold timers of 30+ seconds.</t>
  <t><strong>Martian (99.0.0.0/8):</strong> Earth-Mars communication. 4-24 minute one-way delay depending on orbital position. TCP is non-functional. Any companion deployment profile for this realm would necessarily use DTN store-and-forward; eBGP-ASIP is not applicable and a delay-tolerant routing protocol is needed (out of scope for this document).</t>
  <t><strong>DTN Relay (250.0.0.0/8):</strong> Addresses for DTN relay nodes that bridge between realms. In a future companion profile these nodes would participate in multiple realms and perform store-and-forward routing across light-speed boundaries; this document defines no such behavior.</t>
</list></t>

<t>Each realm operates as an independent routing domain. Inter-realm traffic is forwarded by relay gateways that bridge the appropriate delay-tolerant transport. The realm prefix in r.r.r.r allows any router to determine the destination realm from a single 32-bit lookup and route to the appropriate relay gateway.</t>

<t>The remainder of this subsection is Informative guidance for operators who elect to experiment with realm-scoped deployments; normative MUSTs and MUST NOTs below are normative only within such deployments and have no effect on implementations that ignore §3.12 entirely per the opening paragraph of this subsection. The normative core-protocol rules that cover cross-realm scope violations for any deployment are in §14.11 and §10.6.</t>

<t><strong>Realm identification is implicit in r.r.r.r.</strong> There is no separate realm-ID field in the ASIP header (§5.1). A border relay determines the destination realm by looking up the destination address's r.r.r.r value against the realm-allocation table above; the source realm is determined the same way from the source address. No packet-format changes are required to carry realm identity, and no companion protocol defines a realm-ID explicit field in this document.</t>

<t><strong>Mesh/realm and mesh-as-relay interaction.</strong> A mesh node (§3.11, 240.0.0.0/8 in r.r.r.r) is by construction scoped to its mesh domain and does not hold an address in any non-terrestrial realm range (97/8, 98/8, 99/8, 241/8–249/8, 250/8). A realm relay is, by definition, a border node that holds addresses in both the terrestrial realm and the non-terrestrial realm it bridges; a mesh node holds neither (its r.r.r.r is in 240/8) and therefore cannot be a realm relay. Operators who wish a physically-mesh deployment to participate in realm-crossing SHOULD front that deployment with a terrestrial AS boundary (a mesh gateway per §3.11) and attach that AS to a realm relay via standard terrestrial peering. A node SHOULD NOT simultaneously hold a mesh (240/8) and a non-terrestrial realm (any of 97/8, 98/8, 99/8, 241/8–249/8, 250/8, as enumerated earlier in this paragraph) r.r.r.r address on the same interface; dual-homing across the two scopes is NOT RECOMMENDED and should use a gateway node with two interfaces if attempted.</t>

<t><strong>Delay-tolerant profile for core ASIP machinery.</strong> Several pieces of core ASIP machinery have implicit sub-second-RTT assumptions that do not hold at interplanetary distances:</t>

<t><list style="symbols">
  <t><strong>SLAAC-ASIP DAD (§3.14.3)</strong> expects a probe response within RetransTimer (IPv6 default 1000 ms); at cislunar RTT (~2.5 s) DAD timers require at minimum 4x extension and at Martian RTT (minutes) DAD as specified is inoperable.</t>
  <t><strong>NDP neighbor-cache aging (§9.2)</strong> inherits IPv6 defaults (ReachableTime on the order of 30 s); link-level reachability assumptions break when a "link" is a light-minute.</t>
  <t><strong>PMTUD (§12.8)</strong> assumes ICMP-ASIP Packet Too Big arrives within a data-flow RTT; at realm scale PMTU discovery would stall.</t>
  <t><strong>Translator per-flow state (§14.15)</strong> ages at TCP/UDP-scale defaults; per-flow state for a cross-realm flow would expire before the first round-trip completes.</t>
  <t><strong>eBGP-ASIP hold timers (§8.3)</strong> default in the single-digit-minutes range; cislunar is tractable with tuning, Martian is not.</t>
</list></t>

<t>This document does NOT define a DTN profile that adjusts the above. Until a companion DTN profile is published, §3.12 realm reservations 98/8, 99/8, 241/8–249/8, and 250/8 are <strong>reserved address space only</strong> and should not be deployed over the public internet for real traffic. 97/8 (Near-Earth) operates at sub-second RTT and is the only realm range for which the core ASIP timers above are tractable with standard tuning. This restricts interplanetary realm use to reserved-address status until a DTN profile exists; that restriction is a scope choice, not a protocol defect.</t>

<t><strong>Cross-realm authentication (Informative guidance; core filtering rule is normative in §14.11).</strong> A packet arriving at a terrestrial realm relay with a source r.r.r.r in a remote realm's range (e.g., 99.x.x.x claiming to originate on Mars) is trivially spoofable within the local realm unless the relay verifies the packet's origin through some mechanism outside the ASIP header. This document does not define a cross-realm authentication mechanism; the companion DTN profile should define one (e.g., BPSec <xref target="RFC9172"></xref> over the Bundle Protocol carrying ASIP as payload, or a relay-to-relay IPsec/ESP tunnel anchored to published realm-relay identity). Until that profile exists, a realm relay SHOULD treat packets sourced from a remote realm as authenticated only when received on a physical or cryptographic channel that is itself bound to the peer realm's relay (e.g., a preshared-key IPsec tunnel to a specific named Martian relay endpoint). Unauthenticated packets carrying remote-realm source addresses SHOULD be dropped at the terrestrial-realm ingress under this Informative guidance; the normative MUST-drop rule for scope-boundary violations in general lives in §14.11 and covers this case by the scope-containment principle.</t>

<t><strong>Design note:</strong> These allocations are deliberately generous. Reserving entire /8 blocks for bodies that currently have zero networked devices is intentional. The cost of reserving address space now is zero. The cost of not having it when Mars has a permanent settlement is a protocol revision.</t>

</section>
<section anchor="documentation-and-testing-range-2540008-in-rrrr"><name>3.13. Documentation and Testing Range (254.0.0.0/8 in r.r.r.r)</name>

<t>The r.r.r.r range 254.0.0.0/8 is reserved for documentation, examples, and testing. This is analogous to IPv4's 192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2), and 203.0.113.0/24 (TEST-NET-3), but provides a substantially larger space suitable for complex multi-AS test scenarios.</t>

<t>Addresses within 254.0.0.0/8 MUST NOT appear on any production network and MUST be filtered at all border routers. Example:</t>

<t><spanx style="verb">
254.0.0.1::192.168.1.1    (test ASN 1, host 192.168.1.1)
254.0.0.2:0.0.0.3::10.0.0.1  (test ASN 2, zone 3, host 10.0.0.1)
</spanx></t>

</section>
<section anchor="stateless-address-autoconfiguration-slaac-asip"><name>3.14. Stateless Address Autoconfiguration (SLAAC-ASIP)</name>

<t>ASIP supports stateless address autoconfiguration, derived from IPv6 SLAAC <xref target="RFC4862"></xref> but adapted for the 32-bit host field.</t>

<section anchor="overview"><name>3.14.1. Overview</name>

<t>SLAAC-ASIP allows a device to configure a routable ASIP address without contacting a DHCP server. The device learns the network prefix (r.r.r.r:z.z.z.z:s.s.s.s, 96 bits) from Router Advertisements and generates the h.h.h.h host portion locally.</t>

<t>SLAAC-ASIP is OPTIONAL. Operators MAY require DHCP-ASIP-only addressing via a flag in Router Advertisements, identical to IPv6's M (Managed) flag. SLAAC-ASIP and DHCP-ASIP MAY coexist on the same network.</t>

</section>
<section anchor="host-identifier-generation"><name>3.14.2. Host Identifier Generation</name>

<t>The h.h.h.h field (32 bits) is generated by one of three methods, in order of preference:</t>

<t><strong>Method 1: Stable Opaque Identifier (RECOMMENDED)</strong></t>

<t>A stable, pseudorandom 32-bit host ID derived from a hash of the interface identifier, network prefix, a secret key, and a counter [RFC7217 adapted]:</t>

<t><spanx style="verb">
h.h.h.h = truncate_32(SHA-256(prefix || interface_id || secret_key || counter))
</spanx></t>

<t>This produces a stable address per network (the same device on the same network always gets the same address) without revealing hardware identity. This is the ASIP equivalent of IPv6's RFC 7217 stable privacy addresses.</t>

<t><strong>Method 2: Temporary Random Identifier (Privacy Extension)</strong></t>

<t>A cryptographically random 32-bit value, regenerated periodically (RECOMMENDED interval: 24 hours). Analogous to IPv6 temporary addresses <xref target="RFC8981"></xref>. Used for outbound connections where tracking prevention is desired.</t>

<t><strong>Method 3: MAC-Derived Identifier (NOT RECOMMENDED)</strong></t>

<t>The lower 24 bits of the MAC address (OUI stripped) with the upper 8 bits set to a hash of the full 48-bit MAC:</t>

<t><spanx style="verb">
h.h.h.h = hash_8(MAC[0:6]) || MAC[3:6]
</spanx></t>

<t>This method is NOT RECOMMENDED because it exposes hardware identity, analogous to the privacy concerns with IPv6's original EUI-64 scheme. It is defined for constrained devices that lack a cryptographic random number generator.</t>

<t><strong>Reserved host values:</strong> h.h.h.h = 0.0.0.0 (network identifier) and h.h.h.h = 255.255.255.255 (subnet broadcast) are reserved and MUST NOT be generated by SLAAC-ASIP. If Method 1's hash output or Method 2's random draw produces one of these reserved values, the implementation MUST discard the candidate and regenerate (for Method 1, by incrementing the counter and re-hashing; for Method 2, by drawing a new random value). The probability of this event is 2/2^32 per draw and does not meaningfully affect the DAD retry budget.</t>

</section>
<section anchor="duplicate-address-detection-dad"><name>3.14.3. Duplicate Address Detection (DAD)</name>

<t>Before using a SLAAC-ASIP-generated address, a device MUST perform Duplicate Address Detection using ICMP-ASIP Neighbor Solicitation messages (analogous to IPv6 DAD <xref target="RFC4862"></xref>). The device sends an ICMP-ASIP Neighbor Solicitation to the tentative address using its link-local address as the source. If a response is received, the address is in use and the device MUST generate a new h.h.h.h (increment the counter for Method 1, regenerate for Method 2).</t>

<t><strong>Collision bound and DHCP-ASIP fallback:</strong> The 32-bit host field is smaller than IPv6's 64-bit interface identifier. Birthday-paradox analysis gives the following collision probabilities on a single subnet with N concurrent SLAAC-generated host IDs drawn uniformly at random from 2^32: <spanx style="verb">P(collision) ~= 1 - exp(-N^2 / 2^33)</spanx>. At N=10,000: P ~= 1.16%. At N=50,000: P ~= 25.3%. At N=65,536 (2^16): P ~= 39.3%. The 50%-collision point is N ~= sqrt(2 ln 2 * 2^32) ~= 77,162 hosts. Modern datacenter leaf subnets routinely approach the tens of thousands. Accordingly:</t>

<t><list style="symbols">
  <t>On subnets expected to carry fewer than 10,000 concurrent devices, SLAAC-ASIP MAY be used as the sole addressing method.</t>
  <t>On subnets that may exceed 10,000 concurrent devices, Router Advertisements MUST set the M (Managed) flag and devices MUST obtain addresses via DHCP-ASIP. SLAAC-ASIP MAY still be used for the link-local bootstrap address.</t>
  <t>DAD retries MUST be bounded. After 3 collisions, a device MUST fall back to DHCP-ASIP or report failure to the operator rather than re-rolling indefinitely.</t>
</list></t>

<t>Operators deploying very large flat L2 domains (&gt;10k hosts) SHOULD segment those domains into smaller subnets rather than relying on 32-bit SLAAC uniqueness. The trade-off narrative motivating the 10k threshold, including the birthday-paradox curve and the relation to IPv6's 64-bit interface identifier, is summarized in §18.7.</t>

</section>
<section anchor="slaac-asip-sequence"><name>3.14.4. SLAAC-ASIP Sequence</name>

<t><spanx style="verb">
1. Interface comes up
2. Generate link-local address: 169.254.0.0::h.h.h.h (SLAAC-ASIP Method 1 or 2)
3. Perform DAD on link-local address
4. Send Router Solicitation from link-local address
5. Receive Router Advertisement containing prefix (r:z:s)
6. Generate host ID h.h.h.h for the advertised prefix
7. Perform DAD on the full address r:z:s:h
8. Address is ready for use
</spanx></t>

<t>The entire sequence completes in under 2 seconds on a typical wired network, comparable to IPv6 SLAAC.</t>

</section>
</section>
<section anchor="address-usage-summary"><name>3.15. Address Usage Summary</name>

<texttable>
      <ttcol align='left'>r.r.r.r Range</ttcol>
      <ttcol align='left'>Usage</ttcol>
      <ttcol align='left'>Scope</ttcol>
      <c>0.0.0.0 (with z=0, s=0)</c>
      <c>IPv4-mapped</c>
      <c>Translated/encapsulated per Section 12</c>
      <c>0.0.0.1 - 96.255.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Global (eBGP-ASIP)</c>
      <c>97.0.0.0/8</c>
      <c>Near-Earth Infrastructure</c>
      <c>Realm (reserved)</c>
      <c>98.0.0.0/8</c>
      <c>Cislunar / Lunar</c>
      <c>Realm (reserved)</c>
      <c>99.0.0.0/8</c>
      <c>Martian</c>
      <c>Realm (reserved)</c>
      <c>100.0.0.0/8</c>
      <c>RINE peering links</c>
      <c>Link (IXP only)</c>
      <c>101.0.0.0 - 126.255.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Global (eBGP-ASIP)</c>
      <c>127.0.0.0/8</c>
      <c>Internal zone prefixes</c>
      <c>Organization</c>
      <c>128.0.0.0 - 169.253.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Global (eBGP-ASIP)</c>
      <c>169.254.0.0/16</c>
      <c>Link-local</c>
      <c>Link only</c>
      <c>169.255.0.0 - 239.255.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Global (eBGP-ASIP)</c>
      <c>240.0.0.0/8</c>
      <c>Mesh / Ad-hoc</c>
      <c>Mesh domain</c>
      <c>241.0.0.0 - 249.255.255.255</c>
      <c>Future celestial bodies</c>
      <c>Reserved</c>
      <c>250.0.0.0/8</c>
      <c>DTN Relay</c>
      <c>Realm bridge</c>
      <c>251.0.0.0 - 253.255.255.255</c>
      <c>Reserved</c>
      <c>Future use</c>
      <c>254.0.0.0/8</c>
      <c>Documentation / Testing</c>
      <c>Never routed</c>
      <c>255.0.0.0 - 255.255.254.255</c>
      <c>Reserved</c>
      <c>Future use; MUST NOT be routed</c>
      <c>255.255.255.0 - 255.255.255.254</c>
      <c>Cross-ASN Multicast</c>
      <c>Per-value assignment; see Sections 4.2 and 10</c>
      <c>255.255.255.255</c>
      <c>Broadcast</c>
      <c>L2 broadcast only</c>
</texttable>

<t>Most devices on most networks use either internal zone addressing (127.x.x.x) or their organization's public ASN. Link-local (169.254.x.x) is always present on every interface as a bootstrap channel.</t>

</section>
</section>
<section anchor="address-classes"><name>4. Address Classes</name>

<texttable>
      <ttcol align='left'>r.r.r.r Value</ttcol>
      <ttcol align='left'>Class</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>0.0.0.0 (z=0, s=0)</c>
      <c>IPv4-Mapped</c>
      <c>Legacy IPv4 destination; translated/encapsulated per Section 12</c>
      <c>0.0.0.1 - 96.255.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Earth internet, public routing via eBGP-ASIP</c>
      <c>97.0.0.0/8</c>
      <c>Near-Earth Realm</c>
      <c>LEO/GEO satellite infrastructure (reserved)</c>
      <c>98.0.0.0/8</c>
      <c>Cislunar Realm</c>
      <c>Earth-Moon infrastructure (reserved)</c>
      <c>99.0.0.0/8</c>
      <c>Martian Realm</c>
      <c>Mars infrastructure (reserved)</c>
      <c>100.0.0.0/8</c>
      <c>RINE Peering</c>
      <c>AS-to-AS link addressing only</c>
      <c>101.0.0.0 - 126.255.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Earth internet, public routing via eBGP-ASIP</c>
      <c>127.0.0.0/8</c>
      <c>Internal Zone</c>
      <c>Organization-scoped, never routed externally</c>
      <c>128.0.0.0 - 169.253.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Earth internet, public routing via eBGP-ASIP</c>
      <c>169.254.0.0/16</c>
      <c>Link-Local</c>
      <c>Single link only, never forwarded by routers</c>
      <c>169.255.0.0 - 239.255.255.255</c>
      <c>Terrestrial ASN Unicast</c>
      <c>Earth internet, public routing via eBGP-ASIP</c>
      <c>240.0.0.0/8</c>
      <c>Mesh / Ad-Hoc</c>
      <c>Self-organizing networks, mesh-scoped</c>
      <c>241.0.0.0 - 249.255.255.255</c>
      <c>Interplanetary (Reserved)</c>
      <c>Future celestial body allocations</c>
      <c>250.0.0.0/8</c>
      <c>DTN Relay</c>
      <c>Delay-tolerant relay nodes (reserved)</c>
      <c>251.0.0.0 - 253.255.255.255</c>
      <c>Reserved</c>
      <c>Future use</c>
      <c>254.0.0.0/8</c>
      <c>Documentation / Testing</c>
      <c>MUST NOT appear on production networks</c>
      <c>255.0.0.0 - 255.255.254.255</c>
      <c>Reserved</c>
      <c>Future use; MUST NOT be routed</c>
      <c>255.255.255.0 - 255.255.255.254</c>
      <c>Cross-ASN Multicast</c>
      <c>Per-value assignment; see Section 4.2 and Section 10</c>
      <c>255.255.255.255</c>
      <c>Broadcast</c>
      <c>L2 broadcast, MUST NOT be routed</c>
</texttable>

<section anchor="scope-hierarchy"><name>4.1. Scope Hierarchy</name>

<t>ASIP defines a formal scope hierarchy for addresses, drawn from IPv6's multicast scope model but applied universally:</t>

<texttable>
      <ttcol align='left'>Scope Level</ttcol>
      <ttcol align='left'>Boundary</ttcol>
      <ttcol align='left'>Example r.r.r.r Ranges</ttcol>
      <c>Link</c>
      <c>Single physical/virtual link</c>
      <c>169.254.0.0/16 (link-local)</c>
      <c>Mesh</c>
      <c>Self-organizing network domain</c>
      <c>240.0.0.0/8</c>
      <c>Organization</c>
      <c>AS boundary</c>
      <c>127.0.0.0/8 (internal zones)</c>
      <c>Terrestrial</c>
      <c>Earth internet</c>
      <c>0.0.0.1 - 96.x, 101.x - 126.x, 128.x - 239.x</c>
      <c>Realm</c>
      <c>Celestial body / region</c>
      <c>97.x, 98.x, 99.x, 241.x - 249.x, 250.x</c>
      <c>Universal</c>
      <c>All realms</c>
      <c>Not yet defined; requires inter-realm relay</c>
</texttable>

<t>With the one exception called out immediately below for mesh, each strictly-nested scope level in the table contains the ones below it. A link-local address is never visible at organization scope. An organization-internal address is never visible at terrestrial scope. A terrestrial address is never visible in another realm without explicit relay. This containment is enforced by routers at each boundary.</t>

<t><strong>Mesh scope (240.0.0.0/8) is orthogonal rather than strictly nested.</strong> A mesh domain is not contained within a terrestrial AS and is not a non-terrestrial realm; it is a self-organizing scope reachable only via the mesh-gateway bridge of §3.11. For scope-boundary enforcement (§14.11) it is treated as a peer of "terrestrial" and "realm": mesh addresses MUST NOT leave the mesh domain natively, and terrestrial or realm addresses MUST NOT enter a mesh domain natively; a mesh gateway that performs address translation is the only sanctioned bridge.</t>

<t>IPv4-mapped addresses (r=z=s=0, Section 3.3) are the single explicit exception: they represent a legacy IPv4 destination that has no realm, are handled by the translators defined in Section 12, and MUST NOT be forwarded natively into any non-terrestrial realm.</t>

</section>
<section anchor="multicast-prefix-assignments-rrrr-255255255x"><name>4.2. Multicast Prefix Assignments (r.r.r.r = 255.255.255.x)</name>

<texttable>
      <ttcol align='left'>r.r.r.r</ttcol>
      <ttcol align='left'>Assignment</ttcol>
      <c>255.255.255.0</c>
      <c>General cross-ASN multicast (includes all well-known protocol groups; see §10.4)</c>
      <c>255.255.255.1</c>
      <c>RESERVED for a future per-protocol OSPF-ASIP group encoding; MUST NOT be used by current implementations (see §10.4)</c>
      <c>255.255.255.2</c>
      <c>RESERVED for a future per-protocol eBGP-ASIP peer-discovery group encoding; MUST NOT be used by current implementations (see §10.4)</c>
      <c>255.255.255.3</c>
      <c>RESERVED for a future per-protocol IS-IS-ASIP group encoding; MUST NOT be used by current implementations (see §10.4)</c>
      <c>255.255.255.4 - 255.255.255.127</c>
      <c>Available for IANA assignment</c>
      <c>255.255.255.128 - 255.255.255.254</c>
      <c>Reserved, future use</c>
      <c>255.255.255.255</c>
      <c>Broadcast</c>
</texttable>

</section>
</section>
<section anchor="asip-packet-header"><name>5. ASIP Packet Header</name>

<section anchor="header-format"><name>5.1. Header Format</name>

<t>ASIP uses IP version number 8 in the Version field. The base header is fixed-length (40 bytes), drawing from IPv6's design decision to eliminate variable-length options from the base header. Additional functionality (fragmentation, routing options, hop-by-hop processing) is provided via extension headers identified by the Next Header field, identical in mechanism to IPv6 <xref target="RFC8200"></xref>.</t>

<t><spanx style="verb">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class |           Flow Label                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Payload Length        |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Source ASN Prefix      (r.r.r.r)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Source Zone ID         (z.z.z.z)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Source Subnet ID       (s.s.s.s)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Source Host ID         (h.h.h.h)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Destination ASN Prefix (r.r.r.r)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Destination Zone ID    (z.z.z.z)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Destination Subnet ID  (s.s.s.s)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Destination Host ID    (h.h.h.h)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</spanx></t>

<t><strong>Field definitions:</strong></t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Bits</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Version</c>
      <c>4</c>
      <c>Always 8 for ASIP</c>
      <c>Traffic Class</c>
      <c>8</c>
      <c>Differentiated services (DSCP + ECN), identical to IPv6 Traffic Class and backward compatible with IPv4 ToS/DSCP</c>
      <c>Flow Label</c>
      <c>20</c>
      <c>Per-flow identifier for QoS and ECMP hashing, identical semantics to IPv6 <xref target="RFC6437"></xref>. Enables routers to identify packets belonging to the same flow without deep packet inspection. Source-assigned; zero if unused.</c>
      <c>Payload Length</c>
      <c>16</c>
      <c>Length of payload after the base header, in octets. Does not include the 40-byte base header itself. (IPv6 semantics.)</c>
      <c>Next Header</c>
      <c>8</c>
      <c>Identifies the type of the immediately following header. Values are drawn from the IPv6 Next Header registry for protocols that are identical under ASIP (6 = TCP, 17 = UDP, 43 = Routing, 44 = Fragment, 59 = No Next Header, 60 = Destination Options, 50/51 = ESP/AH). ASIP-specific protocols receive distinct assignments; see Section 5.3 and Section 15.5. ICMP-ASIP = 143 (to be assigned by IANA).</c>
      <c>Hop Limit</c>
      <c>8</c>
      <c>Decremented by 1 at each forwarding node. Packet is discarded when it reaches 0. (Identical to IPv6 Hop Limit and IPv4 TTL in function.)</c>
      <c>Source Address</c>
      <c>128</c>
      <c>Full 128-bit ASIP source address (r.r.r.r : z.z.z.z : s.s.s.s : h.h.h.h)</c>
      <c>Destination Address</c>
      <c>128</c>
      <c>Full 128-bit ASIP destination address</c>
</texttable>

<t><strong>Total base header size: 40 bytes.</strong> This is identical to IPv6 and 20 bytes larger than IPv4's minimum header.</t>

</section>
<section anchor="design-rationale-what-was-dropped-from-ipv4"><name>5.2. Design Rationale: What Was Dropped from IPv4</name>

<t>The ASIP header deliberately omits several IPv4 fields:</t>

<t><list style="symbols">
  <t><strong>IHL (Internet Header Length):</strong> Unnecessary. The ASIP base header is fixed at 40 bytes. Variable-length options are handled via extension headers, not inline.</t>
  <t><strong>Identification, Flags, Fragment Offset:</strong> Moved to a Fragment Extension Header (Next Header = 44), identical to IPv6's approach. Fragmentation is performed only by the source, not by intermediate routers. This eliminates the performance penalty of router-path fragmentation and the reassembly-based attacks that plagued IPv4. <strong>Fragmentation happens at the inner ASIP layer only, not at any outer encapsulation (§12.3).</strong> ASIP-to-IPv4 encapsulators MUST set the outer IPv4 DF bit (§12.8) so that outer fragmentation is suppressed; any too-big condition is reported upstream and fragmentation, if needed, is performed by the ASIP source. This eliminates the ambiguity of where fragmentation occurs in a translate-plus-encapsulate path.</t>
  <t><strong>Header Checksum:</strong> Dropped, identical to IPv6's rationale. Link-layer (L2) and transport-layer (L4) checksums provide integrity verification. The per-hop header checksum in IPv4 was a performance bottleneck on high-speed routers (recomputed at every hop due to TTL decrement) with no security benefit.</t>
</list></t>

</section>
<section anchor="extension-headers"><name>5.3. Extension Headers</name>

<t>ASIP uses the same extension header mechanism as IPv6. Extension headers are chained via the Next Header field and processed in order. The following extension headers are defined:</t>

<texttable>
      <ttcol align='left'>Next Header Value</ttcol>
      <ttcol align='left'>Extension Header</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>0</c>
      <c>Hop-by-Hop Options</c>
      <c>Options examined by every node along the path</c>
      <c>43</c>
      <c>Routing</c>
      <c>Source routing and related functions</c>
      <c>44</c>
      <c>Fragment</c>
      <c>Fragmentation and reassembly</c>
      <c>50</c>
      <c>ESP</c>
      <c>Encapsulating Security Payload (IPsec)</c>
      <c>51</c>
      <c>AH</c>
      <c>Authentication Header (IPsec)</c>
      <c>59</c>
      <c>No Next Header</c>
      <c>Nothing follows this header</c>
      <c>60</c>
      <c>Destination Options</c>
      <c>Options examined only by the destination</c>
      <c>143</c>
      <c>ICMP-ASIP</c>
      <c>ASIP ICMP messages (to be assigned by IANA; distinct from IPv6 NH=58 to prevent dispatcher ambiguity across header-stripping middleboxes)</c>
      <c>(reserved, no assignment requested)</c>
      <c>Mobility</c>
      <c>Explicitly out of scope for this document. No Next Header value is requested in §15 for ASIP mobility. A future specification MAY define Mobile ASIP and request an IANA assignment at that time; this document does not reserve or request any code point for it.</c>
</texttable>

<t>By reusing IPv6's extension header numbering and semantics, ASIP benefits from the extensive implementation experience and security analysis already applied to IPv6 extension header processing [RFC8200, RFC7045].</t>

<t><strong>IPsec (AH/ESP) over ASIP.</strong> AH (NH=51) and ESP (NH=50) inherit IPv6's semantics [RFC4301, RFC4302, RFC4303] verbatim, except that the AH Integrity Check Value computation covers the full 128-bit ASIP source and destination addresses as written on the wire. Because the r.r.r.r locator is allowed to be rewritten at AS boundaries (§8.3.2), AH's immutable-field assumption does not hold for r.r.r.r across a locator rewrite; AH-protected traffic MUST NOT traverse a boundary that rewrites r.r.r.r, or the ICV check will fail at the far end. ESP is unaffected because it does not sign the outer IP header. Operators who require locator rewriting on AH-protected flows MUST use tunnel-mode ESP or re-establish the SA after the rewriting boundary.</t>

<t><strong>Enforcement at rewriting nodes.</strong> The "MUST NOT traverse" rule above is a prevention rule, not a suggestion. A router that would otherwise rewrite r.r.r.r per §8.3.2 MUST first parse the extension-header chain of the inbound packet; if any AH header (NH=51) is present anywhere in the chain, the router MUST NOT rewrite and MUST drop the packet, emitting ICMP-ASIP Destination Unreachable (Type=1, Code=10 "Administratively Prohibited by AH-rewrite policy"; exact Code per the §15.5 registry). Silently rewriting an AH-protected packet produces an ICV-failure symptom at the destination that is indistinguishable from an on-path attack and MUST be avoided. A middlebox that strips AH before rewrite to avoid this check is a downgrade attacker; endpoints that require AH integrity SHOULD additionally verify via an ESP-protected channel or out-of-band attestation that no rewrite-capable intermediary is on the path. This is a classical downgrade-attack concern inherited from IPsec and is not unique to ASIP.</t>

<t><strong>Ordering with ingress filtering.</strong> At a border router that both implements §14.1 ingress filtering and performs §8.3.2 locator rewrite, the ingress filter MUST run on the received packet as it arrived on the wire, before any rewrite. The rewrite MUST occur after the ingress filter has validated the original source r.r.r.r against the peer's authorized-origin set. Performing rewrite before ingress filtering would either (i) validate the rewritten value against the wrong peer set, or (ii) fail to validate at all; both outcomes break BCP 38 semantics.</t>

</section>
<section anchor="flow-label-usage"><name>5.4. Flow Label Usage</name>

<t>The 20-bit Flow Label enables per-flow identification without transport-layer inspection. Semantics are identical to IPv6 Flow Label <xref target="RFC6437"></xref>: the value is opaque to the network, source-assigned, and used as an input to hash-based path-selection functions.</t>

<t><list style="symbols">
  <t><strong>ECMP hashing:</strong> Routers MAY use the flow label (combined with source and destination addresses) as input to ECMP hash functions, ensuring all packets of a flow traverse the same path. This is the primary intended use.</t>
  <t><strong>QoS classification:</strong> Middleboxes MAY classify traffic by flow label as a hint only.</t>
</list></t>

<t>A source that does not use flow-based path selection MUST set the flow label to zero. Routers MUST NOT parse structure inside the flow label, MUST NOT make security decisions based on its value, and MUST NOT rewrite it in the forwarding path.</t>

<t><strong>Relationship to external path-selection metrics.</strong> Any path-selection metric external to this specification (e.g., the OPTIONAL Cost Factor of §17 / draft-asip-cf-00, or a future operator-defined metric) MUST NOT be encoded into the flow label and MUST NOT cause a router to parse structure inside it. The flow label remains opaque regardless of whether such a metric is deployed. Where an external metric drives path selection, the flow label MAY be used as an ECMP hash input that pins a flow to whichever path that metric selected — this is an emergent property of hash-based forwarding, not a structural use of the flow label.</t>

</section>
<section anchor="socket-api-compatibility"><name>5.5. Socket API Compatibility</name>

<t>Existing IPv4 applications use the standard BSD socket API with AF_INET and sockaddr_in. The ASIP compatibility layer intercepts these calls transparently. The application requires zero ASIP awareness.</t>

<t>New applications MAY use AF_ASIP with sockaddr_asip:</t>

<t><spanx style="verb">c
struct sockaddr_asip {
    sa_family_t    asip_family;    /* AF_ASIP              */
    in_port_t      asip_port;      /* Port number           */
    uint32_t       asip_asn;       /* r.r.r.r ASN locator   */
    uint32_t       asip_zone;      /* z.z.z.z Zone ID       */
    uint32_t       asip_subnet;    /* s.s.s.s Subnet ID     */
    uint32_t       asip_host;      /* h.h.h.h Host ID       */
    uint32_t       asip_flowlabel; /* Flow label (20 bits)  */
    uint32_t       asip_scope_id;  /* Interface index for
                                      link-local and mesh scopes;
                                      zero for all other scopes   */
};
</spanx></t>

<t>All numeric fields except asip_family are in network byte order. The flow label occupies the low-order 20 bits of asip_flowlabel; the upper 12 bits MUST be zero on transmission and MUST be ignored on reception. The asip_scope_id field is in host byte order and carries the interface index disambiguating which link a link-local (169.254.0.0/16 in r.r.r.r, §3.10) or mesh (240.0.0.0/8 in r.r.r.r, §3.11) address refers to; it serves the same role as sockaddr_in6.sin6_scope_id <xref target="RFC4291"></xref>. asip_scope_id MUST be zero for non-link-local, non-mesh addresses and MUST be ignored by the stack for those scopes. An application operating on link-local or mesh addresses across multiple interfaces MUST set asip_scope_id to the correct interface index; a bind or sendto with asip_scope_id=0 on a multi-interface host for a link-local address is implementation-defined and MAY fail with EINVAL.</t>

</section>
<section anchor="ipv4asip-coexistence-processing"><name>5.6. IPv4/ASIP Coexistence Processing</name>

<t>When an ASIP-aware router receives a packet with Version = 4, it processes it as standard IPv4. When an ASIP-aware router receives a packet with Version = 8, it processes the 128-bit source and destination addresses as specified in Sections 3 and 8. If the destination has r=z=s=0 (IPv4-mapped form, Section 3.3), the packet's endpoint is an IPv4 host and the router forwards it toward an IPv4/ASIP translator at the AS boundary (Section 12.2) rather than attempting to dispatch it on h.h.h.h alone; the source may be either a native ASIP address (the common case, §12.7.1) or itself IPv4-mapped (the IPv4-to-IPv4-over-ASIP relay case, rare). A Version=8 packet is always a Version=8 frame on the wire; the r=z=s=0 condition on either address is an addressing form, not an alternate forwarding mode.</t>

<t>Routers, hosts, and middleboxes that are not ASIP-aware see a Version=8 frame as an unrecognized IP version and drop it. This is not a quiet no-op; it is a hard break. Every forwarding element in the path between two ASIP-aware endpoints must either be ASIP-aware or be bypassed by the transition mechanisms in Section 12. This cost is the reason ASIP is specified as a new address family with a transition mechanism rather than as a wire-level IPv4 superset.</t>

</section>
</section>
<section anchor="notation-and-address-compression"><name>6. Notation and Address Compression</name>

<t>ASIP defines a colon-separated field notation as the canonical text representation, with compression rules that eliminate consecutive all-zero fields. All compliant implementations MUST accept both compressed and uncompressed forms and MUST be able to produce compressed output.</t>

<section anchor="canonical-notation"><name>6.1. Canonical Notation</name>

<t>The canonical ASIP text representation uses colons to separate the four 32-bit fields. Each field is written in standard dotted decimal:</t>

<t><spanx style="verb">
r.r.r.r:z.z.z.z:s.s.s.s:h.h.h.h
</spanx></t>

<t>Examples (uncompressed):
<spanx style="verb">
0.0.59.65:0.0.0.1:0.0.0.10:192.0.2.1     (ASN 15169, Zone 1, Subnet 10, Host)
0.0.251.240:0.0.0.0:0.0.0.0:10.0.0.1     (ASN 64496, flat network)
0.0.0.0:0.0.0.0:0.0.0.0:8.8.8.8          (IPv4 compatible: 8.8.8.8)
127.1.0.0:0.0.0.5:0.0.1.0:10.0.0.1       (Internal zone 1, zone 5, subnet 256)
</spanx></t>

</section>
<section anchor="asn-integer-notation"><name>6.2. ASN Integer Notation</name>

<t>The r.r.r.r field MAY be written as a plain decimal ASN integer instead of dotted decimal. This is the RECOMMENDED human-facing format for public addresses:</t>

<t><spanx style="verb">
{ASN}:z.z.z.z:s.s.s.s:h.h.h.h
</spanx></t>

<t>Examples (uncompressed):
<spanx style="verb">
15169:0.0.0.1:0.0.0.10:192.0.2.1          (same as first example above)
64496:0.0.0.0:0.0.0.0:10.0.0.1            (same as second example above)
0:0.0.0.0:0.0.0.0:8.8.8.8                 (IPv4 compatible)
</spanx></t>

<t>All compliant implementations MUST accept both dotted-decimal and integer forms for the ASN field. Implementations SHOULD produce ASN integer notation in user-facing output.</t>

</section>
<section anchor="zero-field-compression-notation"><name>6.3. Zero-Field Compression (:: Notation)</name>

<t>One or more consecutive fields whose value is 0.0.0.0 MAY be replaced by <spanx style="verb">::</spanx>, analogous to IPv6 zero compression <xref target="RFC5952"></xref>. Since ASIP has exactly four fields, the compression rules are simpler and less ambiguous than IPv6.</t>

<t><strong>Rules:</strong></t>

<t><list style="numbers" type="1">
  <t><spanx style="verb">::</spanx> replaces one or more consecutive all-zero fields (a field is all-zero when its 32-bit value is 0x00000000, i.e., 0.0.0.0).</t>
  <t><spanx style="verb">::</spanx> MUST NOT appear more than once in a single address.</t>
  <t>When multiple runs of consecutive zero fields exist and are of equal length, <spanx style="verb">::</spanx> SHOULD replace the leftmost run.</t>
  <t><spanx style="verb">::</spanx> MAY replace a single all-zero field. (Unlike RFC 5952's recommendation for IPv6, single-field compression is permitted in ASIP because each field is 32 bits and eliminating even one saves substantial notation length.)</t>
  <t>The host field (h.h.h.h) MUST always be written explicitly. <spanx style="verb">::</spanx> MUST NOT compress the rightmost field. (Rationale: the host field is the most operationally significant for debugging, and omitting it creates dangerous ambiguity with IPv4-compatible addresses.)</t>
  <t>The ASN field (r.r.r.r) written as integer 0 is valid. Both <spanx style="verb">0::10.0.0.1</spanx> and <spanx style="verb">::10.0.0.1</spanx> expand to ASN=0, zone=0, subnet=0, host=10.0.0.1 and are semantically identical; the leading <spanx style="verb">0</spanx> before <spanx style="verb">::</spanx> is an explicit-field form that the expansion algorithm (§6.5) collapses to the same wire value as the <spanx style="verb">::</spanx>-only form. Implementations MUST treat the two as equivalent.</t>
</list></t>

<t><strong>Compression table</strong> (all possible positions for four fields where h.h.h.h is never compressed):</t>

<texttable>
      <ttcol align='left'>Fields Present</ttcol>
      <ttcol align='left'>Notation</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c>All four explicit</c>
      <c><spanx style="verb">A:Z:S:H</spanx></c>
      <c>No compression</c>
      <c>Zone is zero</c>
      <c><spanx style="verb">A::S:H</spanx></c>
      <c>z = 0.0.0.0</c>
      <c>Subnet is zero</c>
      <c><spanx style="verb">A:Z::H</spanx></c>
      <c>s = 0.0.0.0</c>
      <c>Zone and Subnet are zero</c>
      <c><spanx style="verb">A::H</spanx></c>
      <c>z = 0.0.0.0, s = 0.0.0.0</c>
      <c>ASN and Zone are zero</c>
      <c><spanx style="verb">::S:H</spanx></c>
      <c>r = 0, z = 0.0.0.0</c>
      <c>ASN, Zone, Subnet are zero</c>
      <c><spanx style="verb">::H</spanx></c>
      <c>r = 0, z = 0.0.0.0, s = 0.0.0.0</c>
</texttable>

<t><strong>Note:</strong> Because <spanx style="verb">::</spanx> can only appear once, an address where only the ASN and Subnet are zero (but the Zone is non-zero) cannot compress both. In this case, write the ASN explicitly as <spanx style="verb">0:Z:0.0.0.0:H</spanx> or compress only the longer run. In practice this pattern is rare.</t>

</section>
<section anchor="compression-examples"><name>6.4. Compression Examples</name>

<t>```
UNCOMPRESSED                                    COMPRESSED
-----------                                     ----------</t>

<t>Public host, flat network:
64496:0.0.0.0:0.0.0.0:192.0.2.1                64496::192.0.2.1</t>

<t>Public host, zone 1, subnet 10:
15169:0.0.0.1:0.0.0.10:192.0.2.1               15169:0.0.0.1:0.0.0.10:192.0.2.1
                                                (no zero fields, no compression)</t>

<t>IPv4 compatible:
0:0.0.0.0:0.0.0.0:8.8.8.8                      ::8.8.8.8</t>

<t>Internal zone, flat:
127.1.0.0:0.0.0.0:0.0.0.0:10.0.0.1             127.1.0.0::10.0.0.1</t>

<t>Internal zone, with zone and subnet:
127.1.0.0:0.0.0.5:0.0.1.0:10.0.0.1             127.1.0.0:0.0.0.5:0.0.1.0:10.0.0.1
                                                (no zero fields, no compression)</t>

<t>Internal zone, zone set, subnet zero:
127.2.0.0:0.0.0.3:0.0.0.0:172.16.0.1           127.2.0.0:0.0.0.3::172.16.0.1</t>

<t>RINE peering link:
100.0.0.1:0.0.0.0:0.0.0.0:10.255.0.1           100.0.0.1::10.255.0.1</t>

<t>Loopback (all zeros except host):
0:0.0.0.0:0.0.0.0:127.0.0.1                    ::127.0.0.1</t>

<t>Multicast:
255.255.255.0:0.0.0.0:0.0.0.0:224.0.0.1        255.255.255.0::224.0.0.1
```</t>

</section>
<section anchor="expansion-algorithm"><name>6.5. Expansion Algorithm</name>

<t>To expand a compressed address, an implementation:</t>

<t><list style="numbers" type="1">
  <t>Splits the string on <spanx style="verb">::</spanx> to obtain a left part and a right part.</t>
  <t>Splits each part on <spanx style="verb">:</spanx> to count explicit fields.</t>
  <t>Inserts enough 0.0.0.0 fields between left and right to bring the total to exactly four (ASN, Zone, Subnet, Host).</t>
  <t>If the ASN field is a plain integer, converts it to a 32-bit unsigned value in network byte order.</t>
  <t>If no <spanx style="verb">::</spanx> is present, all four fields must be explicit.</t>
</list></t>

<t>This algorithm is deterministic and requires no lookahead.</t>

</section>
<section anchor="flat-dotted-notation-wiredebug-format"><name>6.6. Flat Dotted Notation (Wire/Debug Format)</name>

<t>For diagnostic output, packet dumps, and wire-level representations, implementations MAY use flat dotted notation with all 16 octets dot-separated:</t>

<t><spanx style="verb">
0.0.59.65.0.0.0.1.0.0.0.10.192.0.2.1
</spanx></t>

<t>This format is unambiguous but not human-friendly for routine use. It MUST be accepted by all parsers. Implementations SHOULD NOT produce this format in user-facing output; use canonical or compressed notation instead.</t>

</section>
<section anchor="cidr-prefix-notation"><name>6.7. CIDR Prefix Notation</name>

<t>ASIP CIDR notation appends a prefix length to the compressed address, separated by <spanx style="verb">/</spanx>:</t>

<t><spanx style="verb">
15169::/32              (ASN 15169, all addresses within that ASN)
15169:0.0.0.1::/64      (ASN 15169, Zone 1, all subnets/hosts)
127.1.0.0::/32          (Internal zone 1, all addresses)
::0.0.0.0/0             (Default route)
</spanx></t>

<t>The prefix length counts bits from the most significant bit of the r.r.r.r field. Common prefix boundaries:</t>

<texttable>
      <ttcol align='left'>Prefix Length</ttcol>
      <ttcol align='left'>Boundary</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c>/32</c>
      <c>After ASN</c>
      <c>All addresses within one AS</c>
      <c>/64</c>
      <c>After Zone</c>
      <c>All subnets/hosts within one zone</c>
      <c>/96</c>
      <c>After Subnet</c>
      <c>All hosts within one subnet</c>
      <c>/128</c>
      <c>Full address</c>
      <c>Single host</c>
      <c>/0</c>
      <c>None</c>
      <c>Default route</c>
</texttable>

</section>
<section anchor="design-note-on-notation-choices"><name>6.8. Design Note on Notation Choices</name>

<t>The choice to retain dotted decimal and use colons only as field separators is deliberate. IPv6's hexadecimal colon notation (2001:0db8::1) is compact but unfamiliar to many operators and a common source of transcription errors. ASIP notation is immediately readable by anyone who can read an IPv4 address. The <spanx style="verb">::</spanx> compression symbol is borrowed from IPv6 because it is the one piece of IPv6 notation that operators already understand and that solves a real readability problem.</t>

<t>The requirement that h.h.h.h always be explicit is a deliberate safety constraint. In IPv4 troubleshooting, the host address is the most commonly referenced field. Allowing it to be compressed away would make compressed ASIP addresses actively hostile to operational debugging. The upper fields (ASN, Zone, Subnet) are structural and rarely change during a troubleshooting session; the host field changes constantly.</t>

<t>This is an explicit trade-off: ASIP addresses are longer to write than IPv6 addresses but shorter to understand, and common compressed forms (like <spanx style="verb">::8.8.8.8</spanx> for IPv4-compatible addresses or <spanx style="verb">64496::192.0.2.1</spanx> for flat-network hosts) are concise enough for routine use.</t>

</section>
</section>
<section anchor="dns-integration"><name>7. DNS Integration</name>

<section anchor="a-asip-record-type"><name>7.1. A-ASIP Record Type</name>

<t>A new DNS resource record type, A-ASIP, is defined for ASIP addresses.</t>

<t><list style="symbols">
  <t><strong>Type:</strong> A-ASIP (IANA assignment pending)</t>
  <t><strong>Wire format:</strong> 128-bit ASIP address in network byte order</t>
  <t><strong>Presentation format:</strong> Canonical notation with compression (Section 6)</t>
</list></t>

</section>
<section anchor="resolution-behavior"><name>7.2. Resolution Behavior</name>

<t>An ASIP-aware resolver SHOULD request both A and A-ASIP records. Resolution behavior by address-family hint:</t>

<t><list style="symbols">
  <t><strong>AF_INET (IPv4-only):</strong> Return A records only. A-ASIP records MUST NOT be returned through an AF_INET query. Legacy applications that call gethostbyname() or getaddrinfo() with AF_INET receive the A record unchanged.</t>
  <t><strong>AF_ASIP (ASIP-only):</strong> Return A-ASIP records preferentially. When no A-ASIP record exists but an A record does, synthesize an IPv4-mapped A-ASIP (r=z=s=0, h = the A record, §3.3) and return it; the stack routes such traffic via §12 translation or encapsulation. The stack does not synthesize an ASN locator for an IPv4-only destination.</t>
  <t><strong>AF_UNSPEC (both):</strong> Return both A and A-ASIP records if present, with A-ASIP records ordered first. Applications using Happy Eyeballs <xref target="RFC8305"></xref> or equivalent MUST treat the returned set as an ordered preference list and MAY attempt connections in parallel. The resolver MUST NOT silently drop A records when A-ASIP records exist; doing so breaks dual-availability semantics.</t>
</list></t>

<t>When only an A record is available for an AF_ASIP or AF_UNSPEC query, the synthesis described above applies. An A-ASIP record MUST NOT be returned to an AF_INET application.</t>

<t>RFC 1918 addresses MUST NOT be published as A-ASIP records in public DNS.</t>

</section>
<section anchor="dual-record-example"><name>7.3. Dual Record Example</name>

<t><spanx style="verb">
ns1.example.com.  IN  A    192.0.2.1
ns1.example.com.  IN  A-ASIP   15169:0.0.0.1:0.0.0.10:192.0.2.1
</spanx></t>

</section>
</section>
<section anchor="routing-protocol-behavior"><name>8. Routing Protocol Behavior</name>

<section anchor="multi-tier-routing-table"><name>8.1. Multi-Tier Routing Table</name>

<t>ASIP routing uses a tiered lookup model derived directly from the address structure:</t>

<texttable>
      <ttcol align='left'>Tier</ttcol>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Scope</ttcol>
      <ttcol align='left'>Function</ttcol>
      <c>1</c>
      <c>r.r.r.r</c>
      <c>Global (inter-AS)</c>
      <c>Routes packet to correct AS border</c>
      <c>2</c>
      <c>z.z.z.z</c>
      <c>AS-internal (inter-zone)</c>
      <c>Routes packet to correct zone</c>
      <c>3</c>
      <c>s.s.s.s</c>
      <c>Zone-internal (intra-zone)</c>
      <c>Routes packet to correct subnet</c>
      <c>4</c>
      <c>h.h.h.h</c>
      <c>Subnet-local</c>
      <c>Delivers to host (identical to IPv4)</c>
</texttable>

<t>When r.r.r.r = 0.0.0.0, z.z.z.z = 0.0.0.0, and s.s.s.s = 0.0.0.0, the packet is IPv4-mapped (§3.3) and the lookup yields a route toward an IPv4/ASIP translator (§12.2); the Version=8 frame remains a Version=8 frame on the wire until it reaches the translator (§5.6). The tier structure above describes the lookup ordering for ASIP-native packets, not an alternate wire format.</t>

<t>In practice, most backbone routers perform a single Tier 1 lookup (32-bit ASN match) and forward. The remaining tiers are resolved only within the destination AS. In the common single-origin case, the global routing table contains one entry per ASN; multihoming, anycast, and traffic-engineering more-specifics documented in §8.3.1 add entries on top of that baseline, and §8.3's "honest bound" paragraph states the realistic table size.</t>

</section>
<section anchor="routing-protocol-extensions"><name>8.2. Routing Protocol Extensions</name>

<t>ASIP extends existing routing protocols rather than replacing them:</t>

<texttable>
      <ttcol align='left'>Protocol</ttcol>
      <ttcol align='left'>ASIP Extension</ttcol>
      <ttcol align='left'>Scope</ttcol>
      <ttcol align='left'>Status</ttcol>
      <c>BGP4</c>
      <c>eBGP-ASIP</c>
      <c>Inter-AS (Tier 1)</c>
      <c>REQUIRED for internet-facing routers</c>
      <c>iBGP</c>
      <c>iBGP-ASIP</c>
      <c>Inter-zone (Tier 2)</c>
      <c>RECOMMENDED for multi-zone AS</c>
      <c>OSPFv2</c>
      <c>OSPF-ASIP</c>
      <c>Intra-zone (Tier 3)</c>
      <c>RECOMMENDED for intra-zone routing</c>
      <c>IS-IS</c>
      <c>IS-IS-ASIP</c>
      <c>Intra-AS (Tier 2/3)</c>
      <c>OPTIONAL alternative IGP</c>
      <c>Static</c>
      <c>Unchanged</c>
      <c>All tiers</c>
      <c>Always available</c>
</texttable>

<t><strong>Note on existing protocols:</strong> ASIP does not deprecate any existing routing protocol. Operators MAY continue to use RIPv2, EIGRP, or any other protocol within their AS for IPv4-compatible traffic. The "ASIP" extensions add awareness of the 128-bit address space. They do not remove any existing functionality. Operators MAY additionally deploy the OPTIONAL Cost Factor metric (§17 companion draft), which has no effect on conformance to this specification.</t>

</section>
<section anchor="ebgp-asip"><name>8.3. eBGP-ASIP</name>

<t>eBGP-ASIP extends BGP4 <xref target="RFC4271"></xref> with:</t>

<t><list style="symbols">
  <t>128-bit address family support (AFI/SAFI for ASIP; see §15.2).</t>
  <t>WHOIS-ASIP route validation integration (Section 8.4, REQUIRED where the structural routing-table bound is relied upon).</t>
  <t>An OPTIONAL Cost Factor path attribute specified in a separate companion document (§17); eBGP-ASIP conformance does not require CF.</t>
</list></t>

<t>eBGP-ASIP operates alongside BGP4 on the same peering session via multi-protocol extensions <xref target="RFC4760"></xref>. eBGP-ASIP does not replace BGP4 for IPv4 prefixes; the two AFIs coexist.</t>

<t><strong>Prefix granularity and table bound.</strong> The nominal inter-AS aggregation boundary is /32 in the r.r.r.r field (one prefix per ASN locator). Prefixes more specific than /32 in r.r.r.r (i.e., subdividing a single ASN's address space at the inter-AS boundary) SHOULD NOT be advertised across AS boundaries; they MAY be advertised when operationally necessary to support the use cases in Section 8.3.1. Aggregation less specific than /32 (covering multiple ASN locators under a single prefix) MAY be performed down to /16 for internal backbone use but MUST NOT be used to obscure origin at peering boundaries.</t>

<t><strong>Honest bound.</strong> The routing-table entry count under ASIP is not equal to the ASN count. Approximately 74,000 ASNs exist globally (2026); any bound that simply counts allocated or announced ASNs (e.g., a "~175,000-entry" figure derived from allocated-but-unannounced ASN counts) would conflate "ASN count" with "routing-table entry count" and ignore the reasons operators deaggregate today. The actual entry count under ASIP will be larger than the ASN count whenever:</t>

<t><list style="symbols">
  <t>An AS is multihomed and injects separate more-specifics to steer traffic per upstream (Section 8.3.1);</t>
  <t>An AS uses anycast across multiple origin locations (Section 11.1);</t>
  <t>An AS splits traffic engineering announcements for failover;</t>
  <t>An AS has legitimately acquired address space from a transferred ASN and continues to announce the old locator.</t>
</list></t>

<t>Forbidding these use cases does not remove them; operators would respond by splitting into additional ASNs, which grows the locator count rather than shrinking the table. The realistic structural bound is "substantially smaller than today's 1M+ BGP4 table in the common case, with a long tail of more-specifics driven by the traffic-engineering use cases that ASIP cannot eliminate." The specification records the trade-off in that form because a single-number headline figure would omit the deaggregation drivers that an implementer must size for.</t>

<section anchor="multihoming-anycast-and-asn-transfer"><name>8.3.1. Multihoming, Anycast, and ASN Transfer</name>

<t>Because r.r.r.r is a routing locator rather than a host identity, the following cases work without re-coupling identifier and locator:</t>

<t><list style="symbols">
  <t><strong>Multihoming.</strong> A host reachable through two upstream ASes is assigned one ASIP address per upstream (e.g., <spanx style="verb">ASN_A:z:s:h</spanx> and <spanx style="verb">ASN_B:z:s:h</spanx>). DNS-ASIP publishes both A-ASIP records. Applications use happy-eyeballs-style selection between them. The host's stable identity is the z:s:h triple under its own administrative scope; r.r.r.r varies with reachability. Server-side operational impact of a client presenting multiple addresses is addressed in §18.5b.</t>
  <t><strong>Cross-ASN anycast.</strong> An anycast service advertised from multiple ASNs is assigned one address per origin ASN. Each origin ASN advertises its own <spanx style="verb">ASN_n::h.h.h.h</spanx> prefix. Clients use DNS-ASIP to obtain one or more candidate anycast addresses and the routing system steers each packet to the nearest instance via normal BGP path selection. This is strictly equal in capability to current cross-ASN anycast (Cloudflare, Google) and is not artificially constrained to a single ASN.</t>
  <t><strong>ASN transfer.</strong> When an ASN transfers between organizations, the addresses using that ASN as their r.r.r.r locator also transfer. Operators MAY renumber affected hosts by rewriting r.r.r.r at ingress (Section 8.3.2); the z:s:h portion remains stable and no application reconfiguration is required for hosts addressed through stable identifiers rather than bare ASIP literals.</t>
</list></t>

</section>
<section anchor="locator-rewriting"><name>8.3.2. Locator Rewriting</name>

<t>An AS border router MAY rewrite the r.r.r.r field of packets on ingress or egress when the rewrite is a pure locator change (z, s, h unchanged) and the mapping is published in WHOIS-ASIP (Section 8.4) or equivalent. Locator rewriting is used for:</t>

<t><list style="symbols">
  <t>Stateless IPv4/ASIP translation at AS boundaries (Section 12.2);</t>
  <t>ASN transfer renumbering (Section 8.3.1);</t>
  <t>Privacy rewriting of internal z.z.z.z and s.s.s.s as described in Section 14.8.</t>
</list></t>

<t>Locator rewriting MUST NOT alter the transport-layer payload or checksums in ways inconsistent with the translation rules of Section 12. A router performing locator rewrite MUST enforce the AH-rewrite prohibition defined in §5.3 ("Enforcement at rewriting nodes"): any inbound packet carrying an AH extension header (NH=51) MUST be dropped with the ICMP-ASIP administratively-prohibited code rather than silently rewritten. A router that rewrites AH-protected traffic produces an ICV-failure symptom indistinguishable from an on-path attack; the prohibition is normative in both §5.3 (from the IPsec-interaction perspective) and here (from the rewrite-implementation perspective), and the two statements are semantically identical.</t>

</section>
</section>
<section anchor="whois-asip-route-validation"><name>8.4. WHOIS-ASIP Route Validation</name>

<t>eBGP-ASIP routers validate received route advertisements against WHOIS-ASIP, a route-ownership registry. A route advertisement that cannot be validated against a registered WHOIS-ASIP entry SHOULD NOT be installed in the routing table.</t>

<t>WHOIS-ASIP is functionally similar to RPKI <xref target="RFC6480"></xref> but is scoped to ASIP's locator model: the registry maps each r.r.r.r value (and any legitimate more-specifics permitted by Section 8.3.1) to the ASN authorized to originate it. Because the common case is one prefix per ASN, the registry is substantially smaller than RPKI's prefix space; the long tail of multihoming, anycast, and TE more-specifics is registered explicitly.</t>

<t><strong>Normative status.</strong> Route-ownership validation is a core guarantee of this document (Section 2.4 R5). Accordingly:</t>

<t><list style="symbols">
  <t>Deployments that rely on the structural routing-table bound or on the "one route = one authorized origin" property MUST deploy WHOIS-ASIP validation on all eBGP-ASIP sessions.</t>
  <t>Deployments willing to accept BGP4-equivalent route hygiene (no route validation, hijacks and leaks possible) MAY defer WHOIS-ASIP validation during transition. Such deployments MUST NOT claim the structural routing-table bound.</t>
</list></t>

<t>The structural routing-table guarantee does not exist without route-ownership validation: a deployment that accepts any eBGP-ASIP advertisement from any peer inherits the same hijack, leak, and bogon-injection pathology as BGP4, and no "one route = one authorized origin" property can be claimed. The two tiers above bind R5's REQUIRED/RECOMMENDED status to the property the deployment actually relies on.</t>

<t><strong>Chicken-and-egg.</strong> As with RPKI, WHOIS-ASIP adoption provides meaningful protection only when a critical mass of originating ASes publish records. Early adopters SHOULD publish WHOIS-ASIP records even when few peers validate them, and SHOULD default to log-only for received advertisements that fail validation until peering partners converge on enforcement. See Section 18.6.</t>

<t><strong>Bootstrap transport.</strong> WHOIS-ASIP services MUST be reachable over IPv4 during the transition period so that new ASNs can bootstrap their ASIP routing locators without a pre-existing ASIP path. After ASIP native reachability is established, WHOIS-ASIP services MAY be reached over ASIP. This avoids the chicken-and-egg failure mode where two new ASIP-native ASNs cannot discover each other's r.r.r.r locator because the registry they depend on is itself only reachable via ASIP.</t>

<t><strong>Response authentication.</strong> WHOIS-ASIP responses MUST be authenticated: the structural routing-table bound and the "one route = one authorized origin" property both depend on a validator being able to trust that the WHOIS-ASIP record it retrieved reflects the registry's actual entry. A companion specification (draft-asip-whois-00, out of scope for this document) is expected to define the signature and trust-anchor model; an RPKI-style X.509 hierarchy <xref target="RFC6480"></xref> is the working assumption. Until that specification is published, eBGP-ASIP deployments relying on WHOIS-ASIP validation MUST obtain records over an authenticated channel (e.g., TLS with HPKP-equivalent pinning, or signed zone file distribution) and MUST NOT accept unauthenticated WHOIS-ASIP responses as a basis for route acceptance. Without authentication, an adversary in the IPv4 bootstrap path could inject forged locator-to-ASN bindings into a validator's cache and defeat the entire route-validation chain.</t>

<t><strong>Service discovery.</strong> WHOIS-ASIP service endpoints MUST be published via DNS using the SRV record <spanx style="verb">_whois-asip._tcp.{registry-domain}</spanx> and MUST be reachable at the IPv4 address(es) to which that SRV resolves. Registry operators MUST publish their SRV records under at least one well-known registry domain delegated by IANA (see §15.10). This resolves the bootstrap-discovery gap: a new ASN needs only a working IPv4 DNS resolver to locate its regional WHOIS-ASIP service; no pre-existing ASIP path, hard-coded endpoint, or out-of-band configuration is required.</t>

</section>
<section anchor="ibgp-asip-and-ospf-asip"><name>8.5. iBGP-ASIP and OSPF-ASIP</name>

<t>iBGP-ASIP distributes external routes within an AS. OSPF-ASIP extends OSPFv2 with 128-bit address support. Both are specified fully in companion documents. iBGP-ASIP and OSPF-ASIP conformance does not require CF awareness; where an operator deploys the OPTIONAL CF attribute of §17's companion draft, iBGP-ASIP MAY carry it transparently across the AS. Neither iBGP-ASIP nor OSPF-ASIP defines CF behavior in this document.</t>

<t>Neither is mandatory. An operator running a single-zone AS may use OSPF-ASIP alone. An operator running a flat network may use static routes alone with ASIP addressing. The protocol does not prescribe internal network architecture.</t>

</section>
</section>
<section anchor="icmp-asip"><name>9. ICMP-ASIP</name>

<t>ICMP-ASIP extends ICMP <xref target="RFC792"></xref> to support 128-bit addresses, incorporating the Neighbor Discovery functions from IPv6's ICMPv6 <xref target="RFC4443"></xref>. ICMP-ASIP is identified by Next Header value 143 (to be assigned by IANA; see Section 15.5). Both ICMPv4 and ICMP-ASIP MUST be supported simultaneously by ASIP implementations.</t>

<t><strong>Why not NH=58.</strong> ICMP-ASIP MUST NOT reuse IPv6's ICMPv6 Next-Header value (58). Reuse would create a dispatcher ambiguity: a middlebox that strips or normalizes the outer ASIP header while preserving the NH chain would deliver the inner payload to an ICMPv6 handler that expects 128-bit ICMPv6 semantics, not ICMP-ASIP. Because the message-type registries, Neighbor Discovery option codes, and checksum pseudo-headers differ between ICMPv6 and ICMP-ASIP, the collision would silently produce wrong behavior rather than a clean error. A distinct Next-Header value (requested value 143, subject to IANA assignment) eliminates the ambiguity.</t>

<section anchor="core-messages"><name>9.1. Core Messages</name>

<t>ICMP-ASIP carries full 128-bit addresses in Echo Request/Reply, Destination Unreachable, Time Exceeded, Redirect, Packet Too Big, and Parameter Problem messages. Path MTU Discovery is extended for the ASIP header.</t>

<t>The initial ICMP-ASIP Type values used normatively elsewhere in this document (§12.7, §12.8) are listed here for implementer convenience; the full registry is established per §15.5 and follows ICMPv6 <xref target="RFC4443"></xref> numbering unless otherwise noted:</t>

<texttable>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Normative use in this spec</ttcol>
      <c>1</c>
      <c>Destination Unreachable</c>
      <c>§12.7.3, §12.7.7, §5.3 (AH-rewrite drop)</c>
      <c>2</c>
      <c>Packet Too Big</c>
      <c>§12.7.4, §12.8 (PMTUD)</c>
      <c>3</c>
      <c>Time Exceeded</c>
      <c>Hop Limit = 0 drop</c>
      <c>4</c>
      <c>Parameter Problem</c>
      <c>Header malformed</c>
      <c>128</c>
      <c>Echo Request</c>
      <c>§12.7.2</c>
      <c>129</c>
      <c>Echo Reply</c>
      <c>§12.7.2</c>
      <c>133-137</c>
      <c>Router/Neighbor Discovery (RS, RA, NS, NA, Redirect)</c>
      <c>§9.2, §3.14</c>
</texttable>

<t>Values not listed above follow the ICMPv6 registry <xref target="RFC4443"></xref> until §15.5's IANA action establishes a distinct ICMP-ASIP registry.</t>

</section>
<section anchor="neighbor-discovery"><name>9.2. Neighbor Discovery</name>

<t>ASIP adopts IPv6's Neighbor Discovery Protocol (NDP) <xref target="RFC4861"></xref> in full, adapted for the four-field address format. NDP replaces ARP for ASIP-native address resolution, providing:</t>

<t><list style="symbols">
  <t><strong>Router Solicitation / Router Advertisement (RS/RA):</strong> Used by hosts to discover routers and obtain network prefixes for SLAAC-ASIP (Section 3.14). RAs carry the 96-bit prefix (r:z:s), the M flag (managed addressing via DHCP-ASIP), the A flag (autonomous SLAAC-ASIP permitted), and prefix lifetime.</t>
  <t><strong>Neighbor Solicitation / Neighbor Advertisement (NS/NA):</strong> Used for address resolution (replacing ARP), Duplicate Address Detection (DAD), and neighbor unreachability detection. All NS/NA messages use link-local source addresses (169.254.0.0::h.h.h.h).</t>
  <t><strong>Redirect:</strong> Used by routers to inform hosts of a better first-hop router for a destination.</t>
</list></t>

<t>NDP messages are sent to solicited-node multicast addresses derived from the target's h.h.h.h field. The solicited-node group is formed from the low 24 bits of h.h.h.h, mirroring IPv6's 24-bit L2-multicast form (IEEE 802.3 33:33:xx:xx:xx:xx for Ethernet). Collisions on the high 8 bits of h.h.h.h cause two ASIP hosts to share a solicited-node group; the NA reply carries the full 32-bit h.h.h.h and the requester discriminates at L3.</t>

<t><strong>Collision-rate difference versus IPv6.</strong> Because ASIP's h.h.h.h is 32 bits rather than IPv6's 64-bit interface identifier, only 8 bits of the host field are elided into the solicited-node group (versus 40 bits elided in IPv6). Both protocols use 24 bits of the host/IID to form the solicited-node group, so both partition into 2^24 groups; under uniformly-random SLAAC host IDs, the expected number of other hosts sharing a given host's group is <spanx style="verb">(N-1) / 2^24</spanx> for both ASIP and IPv6, where N is the subnet's host count. At N=1000 this is approximately 6×10^-5 on both protocols; at N=10,000 approximately 6×10^-4; at N=1,000,000 approximately 0.06. The solicited-node collision rate is therefore not materially worse on ASIP than on IPv6 at realistic subnet sizes. The 32-bit host field's distinct collision concern is the full-identifier birthday collision (two hosts drawing the same h.h.h.h value); that concern is covered quantitatively in §3.14.3 and addressed by §3.14.3's DHCP-ASIP-at-10k threshold. The solicited-node-group concern and the full-identifier concern are separate collision mechanisms operating at different layers (L3 group membership vs. L3 uniqueness) and MUST NOT be conflated: the group-level collision is negligible at realistic subnet sizes, while the identifier-level collision becomes material at N~10,000 and above.</t>

</section>
<section anchor="arp-asip-compatibility"><name>9.3. ARP-ASIP Compatibility</name>

<t>For backward compatibility on mixed IPv4/ASIP L2 segments, an ARP-style resolution mechanism for 128-bit addresses (provisionally "ARP-ASIP") MAY be supported as a fallback. On pure ASIP links, NDP (§9.2) is the specified mechanism and MUST be used. An ASIP link on which neither NDP nor a specified ARP-ASIP is available is a misconfiguration; this document does not define ARP-ASIP wire format, and a companion specification would be required before ARP-ASIP is interoperable. ASIP-only deployments that depend on ARP-ASIP before such a companion document is published are NOT INTEROPERABLE and SHOULD NOT be built; operators needing L2 resolution on ASIP MUST deploy NDP per §9.2.</t>

</section>
</section>
<section anchor="multicast"><name>10. Multicast</name>

<section anchor="scoped-multicast-model"><name>10.1. Scoped Multicast Model</name>

<t>ASIP adopts IPv6's scoped multicast architecture [RFC4291, RFC7346], adapted to the four-field address structure. Multicast scope determines how far a multicast packet is forwarded and is encoded directly in the address.</t>

<t>ASIP multicast uses the low-order 4 bits of the z.z.z.z field to encode scope (values 0-15), mirroring the IPv6 multicast scope field <xref target="RFC7346"></xref>. The remaining 28 bits of z.z.z.z MUST be zero for scoped multicast (r.r.r.r = 255.255.255.0/24). Packets received with non-zero values in those 28 bits MUST be dropped at ingress (not merely ignored by receivers), because forwarding a packet whose reserved bits are non-zero would create a covert-channel and scope-bypass surface that a future assignment of those bits may not resolve safely.</t>

<texttable>
      <ttcol align='left'>z.z.z.z Low Nibble</ttcol>
      <ttcol align='left'>Scope</ttcol>
      <ttcol align='left'>Boundary</ttcol>
      <c>0x0</c>
      <c>Reserved</c>
      <c>MUST NOT be used</c>
      <c>0x1</c>
      <c>Interface-local</c>
      <c>Never leaves the originating interface</c>
      <c>0x2</c>
      <c>Link-local</c>
      <c>Single physical/virtual link</c>
      <c>0x3</c>
      <c>Reserved</c>
      <c>MUST NOT be used</c>
      <c>0x4</c>
      <c>Admin-local</c>
      <c>Administratively defined (site, building)</c>
      <c>0x5</c>
      <c>Site-local</c>
      <c>Single site / campus</c>
      <c>0x6-0x7</c>
      <c>Unassigned</c>
      <c>Reserved for future scope levels</c>
      <c>0x8</c>
      <c>Organization-local</c>
      <c>Single AS / organization</c>
      <c>0x9-0xD</c>
      <c>Unassigned</c>
      <c>Reserved for future scope levels</c>
      <c>0xE</c>
      <c>Global</c>
      <c>Entire terrestrial internet</c>
      <c>0xF</c>
      <c>Reserved</c>
      <c>MUST NOT be used</c>
</texttable>

<t>Routers MUST NOT forward a scoped multicast packet beyond its indicated scope boundary. Routers MUST drop scoped multicast packets whose z.z.z.z low nibble is a Reserved or Unassigned value, and SHOULD log the event. This is a hard enforcement, not a suggestion.</t>

</section>
<section anchor="intra-asn-multicast-ipv4-compatible"><name>10.2. Intra-ASN Multicast (IPv4 Compatible)</name>

<t>Packets with r.r.r.r = 0.0.0.0 (all upper fields zero) and h.h.h.h in the IPv4 multicast range (224.0.0.0/4) are treated as intra-ASN multicast and MUST NOT be forwarded beyond the local AS boundary. This preserves full compatibility with existing IPv4 multicast deployments.</t>

</section>
<section anchor="cross-asn-multicast"><name>10.3. Cross-ASN Multicast</name>

<t>Cross-ASN multicast uses r.r.r.r values in the range 255.255.255.0 through 255.255.255.254. The single r.r.r.r value 255.255.255.255 is reserved for broadcast (§11.2) and MUST NOT be used for multicast. The z.z.z.z field encodes the scope. The s.s.s.s and h.h.h.h fields identify the multicast group, providing a 64-bit group space within each scope level and each r.r.r.r assignment.</t>

<t><spanx style="verb">
255.255.255.0 : {scope} : {group-hi} : {group-lo}
</spanx></t>

</section>
<section anchor="well-known-multicast-groups"><name>10.4. Well-Known Multicast Groups</name>

<t>The addresses below are the canonical well-known groups. They use the general cross-ASN multicast r.r.r.r prefix 255.255.255.0 of §4.2 with IPv4-familiar group values in h.h.h.h, so that operators who recognize 224.0.0.5 and 224.0.0.6 from IPv4 OSPF see the same values here. The per-protocol r.r.r.r values 255.255.255.1 (OSPF-ASIP), 255.255.255.2 (eBGP-ASIP), and 255.255.255.3 (IS-IS-ASIP) in the §4.2 table are reserved for future per-protocol use (e.g., a protocol-specific group-ID encoding that does not overlap the IPv4 224/4 values); an implementation MUST join the 255.255.255.0-prefixed groups below to participate in the listed protocols, and a 255.255.255.1/2/3 address MUST NOT be used in place of the addresses below until a companion specification defines those prefixes' group-ID encoding.</t>

<t><spanx style="verb">
255.255.255.0:0.0.0.2::224.0.0.1       All ASIP routers (link-local)
255.255.255.0:0.0.0.2::224.0.0.2       All ASIP Zone Servers (link-local)
255.255.255.0:0.0.0.2::224.0.0.5       OSPF-ASIP all routers (link-local)
255.255.255.0:0.0.0.2::224.0.0.6       OSPF-ASIP designated routers (link-local)
255.255.255.0:0.0.0.8::224.0.0.10      iBGP-ASIP peer discovery (organization-local)
255.255.255.0:0.0.0.14::224.0.0.1      All ASIP routers (global)
</spanx></t>

</section>
<section anchor="multicast-listener-discovery"><name>10.5. Multicast Listener Discovery</name>

<t>ASIP uses MLD-ASIP, adapted from IPv6's MLDv2 <xref target="RFC3810"></xref>, for multicast group membership management. MLD-ASIP operates over ICMP-ASIP and uses link-local source addresses (169.254.0.0::h.h.h.h) for all messages, identical to IPv6's requirement that MLD use link-local sources. This ensures multicast membership management functions before any global addressing is configured.</t>

</section>
<section anchor="composition-of-multicast-scope-with-realm-and-mesh-scope"><name>10.6. Composition of Multicast Scope with Realm and Mesh Scope</name>

<t>§10.1 defines a multicast scope nibble (link, subnet, admin, site, org, global, …) drawn from IPv6 precedent. §4.1 defines an orthogonal scope hierarchy including realm (§3.12) and mesh (§3.11). Neither section states how the two compose. The rules below are NORMATIVE for any router enforcing either scope:</t>

<t><list style="numbers" type="1">
  <t><strong>Scope = Interface-local or Link-local (0x1, 0x2).</strong> Never cross any boundary, including realm and mesh boundaries. Confined to the originating link.</t>
  <t><strong>Scope = Admin-local, Site-local, Organization-local (0x4, 0x5, 0x8).</strong> Confined to the originating AS. MUST NOT cross an AS boundary, MUST NOT cross a realm boundary, and MUST NOT cross a mesh gateway. "Organization-local scope in realm A" does not imply reachability in realm B even if the two realms share an operator.</t>
  <t><strong>Scope = Global (0xE).</strong> Confined to the originating realm's terrestrial scope (or, if originated in a non-terrestrial realm, to that realm's internal global scope). "Global" is <strong>realm-local-global</strong>, not universal. A multicast packet with scope=0xE originating in realm A MUST NOT be forwarded into realm B by any relay. No "universal-across-realms" multicast scope is currently defined; the <spanx style="verb">Universal</spanx> row in §4.1's scope table is reserved for a future inter-realm-multicast specification and has no encoding today.</t>
  <t><strong>Realm-boundary ingress rule.</strong> A router that receives a multicast packet on an interface it classifies as being at a realm boundary (i.e., the packet's source r.r.r.r lies in a different realm from the router's local realm) MUST drop the packet regardless of the packet's multicast scope nibble. Realm boundaries are hard drops for multicast; no multicast scope permits realm crossing in this document.</t>
  <t><strong>Mesh-boundary rule.</strong> Multicast packets originated in a mesh domain (§3.11) MUST NOT be forwarded out of the mesh by a mesh gateway, regardless of scope nibble. Conversely, non-mesh multicast MUST NOT be forwarded into a mesh domain by a mesh gateway. If a use case requires a mesh to receive a copy of a terrestrial multicast, the gateway MUST terminate the terrestrial multicast and originate a new mesh-scoped multicast (application-level relay), not forward natively.</t>
  <t><strong>Link-local unicast scope (§3.10) and multicast.</strong> Link-local multicast (nibble = 0x2) is the multicast analog of link-local unicast. Both are bounded to the single link and are not affected by realm or mesh boundaries because they never reach a boundary node's forwarding plane.</t>
</list></t>

<t><strong>Interaction matrix (informative summary):</strong></t>

<texttable>
      <ttcol align='left'>Multicast scope</ttcol>
      <ttcol align='left'>Crosses link?</ttcol>
      <ttcol align='left'>Crosses AS?</ttcol>
      <ttcol align='left'>Crosses realm?</ttcol>
      <ttcol align='left'>Crosses mesh gateway?</ttcol>
      <c>0x0 Reserved</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>0x1 Interface-local</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>0x2 Link-local</c>
      <c>Intra-link only</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>0x3 Reserved</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>0x4 Admin-local</c>
      <c>Yes (admin scope)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>0x5 Site-local</c>
      <c>Yes (site)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>0x6-0x7 Unassigned</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>0x8 Organization-local</c>
      <c>Yes (AS)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>0x9-0xD Unassigned</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>0xE Global</c>
      <c>Yes</c>
      <c>Yes</c>
      <c><strong>No</strong></c>
      <c>No</c>
      <c>0xF Reserved</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
      <c>Drop</c>
</texttable>

<t>Rule 4 is the load-bearing rule: no multicast packet crosses a realm boundary natively in this document, regardless of scope nibble. §10.1 multicast scope and §4.1 realm scope are orthogonal dimensions, and a packet may satisfy one scope test while violating the other; Rule 4 composes the two so that realm-boundary enforcement dominates every multicast scope nibble and no combination admits a realm crossing.</t>

</section>
</section>
<section anchor="anycast-and-broadcast"><name>11. Anycast and Broadcast</name>

<section anchor="anycast"><name>11.1. Anycast</name>

<t>Anycast is a routing property, not a distinct address class. Two anycast cases are supported:</t>

<t><list style="symbols">
  <t><strong>Same-ASN anycast.</strong> Multiple origin sites within the same ASN advertise the same ASIP prefix. The inter-AS routing system steers each packet to the nearest origin by normal BGP path selection. This is the straightforward extension of IPv4 anycast.</t>
  <t><strong>Cross-ASN anycast.</strong> An anycast service reachable from multiple different ASNs (the current Cloudflare/Google model) is assigned multiple ASIP addresses, one per origin ASN, and is published under a single DNS-ASIP name with all its A-ASIP records. Clients use normal DNS-ASIP resolution to obtain the candidate set; the routing system steers each flow to the instance best-reached through its chosen destination address. This preserves the operational capability that BGP4 anycast delivers today.</t>
</list></t>

<t>The cross-ASN case is the reason Section 3.1 defines r.r.r.r as a routing locator rather than a host identity. An anycast service host is not "owned" by one ASN; it is reachable through several, each with its own locator.</t>

<t>Ordering and selection among anycast instances uses standard BGP path-selection criteria <xref target="RFC4271"></xref>. If an operator separately deploys the OPTIONAL Cost Factor metric (§17 / draft-asip-cf-00), CF MAY additionally influence anycast instance selection per that companion draft; CF-based anycast selection is not required by this document.</t>

</section>
<section anchor="broadcast"><name>11.2. Broadcast</name>

<t>The r.r.r.r value 255.255.255.255 is permanently reserved for broadcast and maps to the Layer 2 broadcast address. Broadcast packets MUST NOT be routed beyond the local network segment.</t>

<t><strong>Note:</strong> As with IPv6, ASIP RECOMMENDS using multicast with a scope no broader than required instead of broadcast for most use cases. Broadcast remains defined for IPv4 compatibility. Link-layer resolution on ASIP-only segments uses NDP (§9.2); any ARP-style fallback (§9.3) is undefined in this document and MUST NOT be assumed interoperable.</t>

</section>
</section>
<section anchor="compatibility-and-transition"><name>12. Compatibility and Transition</name>

<section anchor="deployment-model"><name>12.1. Deployment Model</name>

<t>ASIP is a new address family on the wire. An ASIP-aware end host runs a network stack that originates Version=8 frames for ASIP destinations. For IPv4-mapped destinations (Section 3.3) the stack emits a Version=8 frame whose r=z=s=0 source and destination are handled by a translator (Section 12.2); where no translator is reachable, the host MAY fall back to emitting a native Version=4 frame on the same interface. That fallback is a dual-stack kernel data path by any reasonable definition, and this document acknowledges it as such. The single-stack property claimed by ASIP is narrower and scoped explicitly: applications see one address family (AF_ASIP), and sockets above the kernel are not duplicated per version.</t>

<t>"Single-stack" in this document therefore refers to the socket API surface exposed to applications, not to the kernel's forwarding behavior. During transition, an ASIP-aware host's kernel will process both IPv4 and ASIP frames, and forwarding elements in the path will be IPv4-only, ASIP-aware, or both. That is unavoidable.</t>

<t>Networks that have not deployed ASIP continue to operate as pure IPv4 networks. They require no modification. They are also not reachable by ASIP-native traffic except through the translation and encapsulation mechanisms below.</t>

</section>
<section anchor="ipv4asip-stateless-translation-at-as-boundaries"><name>12.2. IPv4/ASIP Stateless Translation at AS Boundaries</name>

<t>ASIP-aware AS border routers MAY act as stateless translators between Version=8 frames carrying IPv4-mapped addresses (r=z=s=0) and Version=4 frames. The translation rules follow SIIT <xref target="RFC7915"></xref> adapted for the ASIP address format:</t>

<t><list style="symbols">
  <t>An ASIP-to-IPv4 translation strips the r=z=s=0 address prefix, emitting an IPv4 packet with h.h.h.h as the IPv4 source/destination.</t>
  <t>An IPv4-to-ASIP translation prepends r=z=s=0 on ingress, producing a Version=8 frame whose addresses are IPv4-mapped.</t>
  <t>Transport checksums are recomputed per SIIT.</t>
</list></t>

<t><strong>Origin advertisement requirement (normative; see §14.1).</strong> Operators deploying this section's stateless translation MUST originate the 0.0.0.0::/96 IPv4-mapped prefix via eBGP-ASIP from the translator-owning ASN, so that the §14.1 ingress filter at every downstream peer treats r=z=s=0 sourced traffic as originating from a legitimate peer rather than as spoofed. Without this advertisement, reverse-direction reply traffic (§12.7.1, common case) will be dropped at the first non-translator-declared peering boundary. This is a deployment requirement, not a wire-format requirement. This requirement binds only to operators deploying §12.2 stateless translation; operators deploying only §12.3 encapsulation (ASIP-to-IPv4 tunneling) MUST NOT originate 0.0.0.0::/96, because they do not serve that prefix and originating an unserved prefix is exactly the hijack pattern WHOIS-ASIP (§8.4) rejects.</t>

<t>Translation is stateless in the data-plane forward direction: any Version=8 frame with r=z=s=0 can be emitted as Version=4 using only information from the packet itself. ICMP error translation and reverse-path locator reconstruction require a stable mapping between the IPv4 literal and the originating ASIP source's r.r.r.r value; see §12.7.1 and §12.7.3 for the mechanisms. That mapping MAY be per-flow state or an administratively configured static mapping; the forward-direction translation itself remains stateless.</t>

<t><strong>h.h.h.h addressability constraint.</strong> An ASIP source whose traffic is stateless-translated to IPv4 emits IPv4 packets with Src = S8.h.h.h.h (§12.7.1). Reply traffic from the IPv4 destination therefore targets that h.h.h.h value as an IPv4 address on the public IPv4 internet. For stateless §12.2 translation to work without a NAT44-style rewrite, S8.h.h.h.h MUST be a globally routable IPv4 address owned by the translator operator and reachable via the translator on the return path. ASIP sources whose h.h.h.h falls in RFC 1918 private space, CGN shared space (100.64.0.0/10), or any other non-publicly-routable IPv4 range MUST either (i) be assigned a publicly-routable h.h.h.h from a translator-owned IPv4 pool for egress, with the translator performing h.h.h.h rewrite (stateful NAT44, as in §12.6 CGNAT behavior), or (ii) use §12.3 encapsulation instead of §12.2 translation. The constraint is load-bearing because the IPv4 return path has no ASIP locator information and can only reach the h.h.h.h literal; a non-publicly-routable h.h.h.h simply produces unreachable return traffic.</t>

<t><strong>Path-asymmetric traffic and multihoming.</strong> The h.h.h.h-ownership rule above also constrains return-path routing for multihomed ASIP clients (§8.3.1). Because reply traffic is addressed to the IPv4 h.h.h.h that the forward-direction translator owns, and IPv4-side routing steers that reply back to the translator that announced the h.h.h.h, return traffic inherently lands at the same translator that created the forward-direction mapping. A stateless translator at a different ASN's border that receives an inbound IPv4 packet whose Dst is not in its own translator-owned pool MUST silently drop the packet and MUST NOT synthesize a forged ASIP source by guessing a reverse mapping. When an ASIP client deliberately switches outbound traffic from ASN_A's translator to ASN_B's translator (e.g., uplink failover), the client's ASIP source address changes (new h.h.h.h from ASN_B's pool, per the rewrite or multihoming model); existing IPv4-side sessions bound to the ASN_A h.h.h.h do not survive the switch and MUST be reopened. Session-continuity mitigations are covered in §18.5b. The translator's behavior is strictly "drop what you don't own, do not fabricate": fabricating a reverse mapping would inject forged ASIP source addresses into a downstream path and violate §14.1 ingress filtering at every subsequent hop.</t>

</section>
<section anchor="asip-to-ipv4-encapsulation-across-ipv4-transit"><name>12.3. ASIP-to-IPv4 Encapsulation Across IPv4 Transit</name>

<t>Where two ASIP-aware sites are separated by IPv4-only transit, they MAY tunnel Version=8 frames inside Version=4 packets. The normative encapsulation is GENEVE over UDP <xref target="RFC8926"></xref> using IANA-assigned port 6081, with ASIP frames carried as the inner protocol. An IANA-assigned ASIP-to-IPv4 protocol type is requested for GENEVE's protocol field (Section 15.9).</t>

<t>Rationale. GENEVE/UDP is the encapsulation of choice for modern virtual networks (VXLAN, NVGRE are similar but older): it is stateless, adds 16 bytes of UDP+GENEVE overhead on top of the outer IPv4 header, is supported by commodity silicon, does not introduce per-flow TCP congestion-control interactions between unrelated tenants, and does not require a handshake before the first packet. HTTPS (TCP/TLS) tunneling is NOT RECOMMENDED for general transit use: TCP-over-TCP introduces nested congestion control and head-of-line blocking across unrelated inner flows; TLS handshakes add round-trips on every tunnel re-establishment; per-packet bytes above the inner L4 payload are ASIP(40)+IPv4(20)+TCP(20)+TLS(~29) = 109 rather than the 76 of GENEVE/UDP (ASIP(40)+IPv4(20)+UDP(8)+GENEVE(8)). HTTPS tunneling is retained only as a last-resort traversal option (see below).</t>

<t>Operators MAY use alternative encapsulation methods:</t>

<t><list style="symbols">
  <t><strong>GRE or IP-in-IP</strong> for high-throughput backbone links where UDP NAT traversal is not a concern.</t>
  <t><strong>WireGuard or IPsec/ESP</strong> where per-tunnel authentication and encryption are required.</t>
  <t><strong>HTTPS as a last-resort traversal option</strong> for environments that block UDP and non-HTTPS TCP. HTTPS tunneling is NOT RECOMMENDED for general transit use because of the overhead and congestion-control pathology noted above. It is MAY, not SHOULD.</t>
</list></t>

<t>The 8TO4-ENDPOINT eBGP-ASIP attribute carries the IPv4 tunnel endpoint address automatically. Tunnel MTU and Path MTU Discovery behave as defined in <xref target="RFC8926"></xref>; operators MUST account for the encapsulation overhead when sizing MTU (see §12.8).</t>

<t><strong>GENEVE option TLVs.</strong> This document defines no ASIP-specific GENEVE option classes. ASIP-to-IPv4 encapsulation MUST use GENEVE with no options in the baseline defined here; the 8-byte GENEVE header in §12.8's overhead budget assumes zero options. Implementations that receive ASIP-to-IPv4 GENEVE frames carrying unknown option TLVs MUST process them per <xref target="RFC8926"></xref> §3.5 (critical-bit handling). Future ASIP deployments that wish to define option TLVs (e.g., for per-flow telemetry, inter-AS traffic-engineering hints) MUST do so in a companion specification and MUST request an option class from IANA's GENEVE registry; inline invention of TLVs by operators breaks interop and is NOT RECOMMENDED.</t>

<t><strong>Tunnel endpoint authentication and reflection/amplification.</strong> UDP-based encapsulation on a well-known port is a reflection/amplification surface if decapsulators accept packets from any outer source. ASIP-to-IPv4 decapsulators MUST maintain a configured allowlist of peer tunnel endpoint IPv4 addresses (learned via the 8TO4-ENDPOINT eBGP-ASIP attribute or administratively configured) and MUST silently drop inbound GENEVE/UDP/6081 packets whose outer IPv4 source is not on that allowlist. Decapsulators MUST NOT emit ICMPv4 error messages in response to unauthorized outer sources (doing so converts the decapsulator into a reflector). Decapsulators SHOULD rate-limit per outer source. Where operators require cryptographic endpoint authentication rather than source-address allowlisting (e.g., when the outer IPv4 path is subject to spoofing), WireGuard or IPsec/ESP MUST be used instead of bare GENEVE/UDP as noted above.</t>

</section>
<section anchor="transition-value"><name>12.4. Transition Value</name>

<t>Unlike IPv6, which offered no incremental benefit to early adopters until a critical mass was reached, ASIP provides localized value at each adoption phase. These are not "phases of global deployment"; each benefits the individual adopter.</t>

<t><list style="symbols">
  <t><strong>ISP backbone adopter:</strong> Reduced routing-table churn on the subset of the table that is ASIP-native, assuming WHOIS-ASIP is deployed (Section 8.4). Early adopters will not see a full 1M-entry table reduction because they inherit a transit environment dominated by IPv4 prefixes, and the BGP4 table their routers carry is unaffected by a parallel ASIP table; the per-adopter benefit grows with ASIP adoption across their peering set.</t>
  <t><strong>Cloud providers:</strong> ASN+Zone addressing eliminates VPC address overlap within and across cooperating ASIP-aware tenants; cross-region routing inside a cloud's own ASIP deployment is simpler than the IPv4 overlay-on-overlay model.</t>
  <t><strong>Enterprise:</strong> Internal zone addressing (127.x.x.x) enables multi-region private networks without external address coordination or RFC 1918 conflict management. This benefit is realized entirely inside the enterprise and requires no upstream ASIP deployment.</t>
  <t><strong>Consumer ISPs:</strong> For customers whose reachable destinations are ASIP-native, CGNAT can be bypassed. For customers whose destinations remain IPv4, CGNAT is unchanged.</t>
</list></t>

<t>Each role interoperates with non-upgraded peers via Section 12.2 translation and Section 12.3 encapsulation. There is no dependency between roles. Organizations adopt at their own pace, but the claim "each adopter benefits fully regardless of anyone else's deployment" is too strong; the honest claim is that each adopter obtains localized value and pays localized cost.</t>

</section>
<section anchor="ipv6-coexistence"><name>12.5. IPv6 Coexistence</name>

<t>ASIP and IPv6 MAY coexist on the same infrastructure; neither supersedes the other. An operator already running IPv6 MAY continue to run it and adopt ASIP as a parallel address family, as a replacement at the AS boundary, or not at all. ASIP does not claim to be technically superior to IPv6; it offers an alternative transition path whose costs and benefits differ. See Section 18.5 for a candid discussion.</t>

</section>
<section anchor="cgnat-behavior"><name>12.6. CGNAT Behavior</name>

<t>CGNAT devices that are not ASIP-aware are IPv4-only middleboxes and operate unchanged on IPv4 traffic. They cannot process Version=8 frames. An ASIP-aware CGNAT MAY translate the h.h.h.h field of IPv4-mapped ASIP addresses in the same way it translates IPv4 source addresses today; it MUST NOT modify r.r.r.r, z.z.z.z, or s.s.s.s during translation. CGNAT operators without a publicly registered ASN MUST NOT originate non-mapped ASIP traffic onto the public internet; they MAY use internal zone prefixes (Section 3.5) for subscriber addressing and MUST translate at the AS boundary.</t>

</section>
<section anchor="stateless-translation-reference-packet-level-walkthrough"><name>12.7. Stateless Translation Reference: Packet-Level Walkthrough</name>

<t>This subsection is NORMATIVE for implementations that perform IPv4/ASIP stateless translation per §12.2. It supplements §12.2 by specifying the byte-level behavior for the cases that translator implementations most often get wrong: ICMP errors carrying truncated inner headers, fragmented inner payloads, the IPv4 DF bit, and ICMPv4 Fragmentation Needed. Byte values are hexadecimal; offsets are zero-based.</t>

<t><strong>Notation.</strong> ASIP source S8 = ASN 0.0.59.65, zone 0, subnet 0, host 192.0.2.1 (compressed: <spanx style="verb">15169::192.0.2.1</spanx>). IPv4 destination D4 = 198.51.100.1. IPv4-mapped ASIP destination D8m = <spanx style="verb">::198.51.100.1</spanx>. All checksums shown are illustrative placeholders denoted <spanx style="verb">cksum</spanx>; implementations MUST compute them per <xref target="RFC7915"></xref> (transport) and per the respective protocol (ICMP).</t>

<section anchor="simple-tcp-data-packet-asip-ipv4"><name>12.7.1. Simple TCP Data Packet (ASIP -&gt; IPv4)</name>

<t>Inbound to translator: Version=8 frame, 40-byte ASIP header + 20-byte TCP header + 100-byte payload; S = <spanx style="verb">15169::192.0.2.1</spanx>, D = <spanx style="verb">::198.51.100.1</spanx>.</t>

<t>ASIP header fields on the wire (big-endian):</t>

<t><spanx style="verb">
Offset  Bytes                         Field
0x00    80 00 00 00                   Version=8, TC=0, FlowLabel=0
0x04    00 78 06 40                   PayloadLen=120, NH=6(TCP), HopLimit=64
0x08    00 00 3B 41  00 00 00 00      S.rrrr=0.0.59.65, S.zzzz=0.0.0.0
0x10    00 00 00 00  C0 00 02 01      S.ssss=0.0.0.0, S.hhhh=192.0.2.1
0x18    00 00 00 00  00 00 00 00      D.rrrr=0.0.0.0, D.zzzz=0.0.0.0
0x20    00 00 00 00  C6 33 64 01      D.ssss=0.0.0.0, D.hhhh=198.51.100.1
0x28    [TCP header 20 bytes]
0x3C    [payload 100 bytes]
</spanx></t>

<t>After translation, the translator emits Version=4 frame:</t>

<t><spanx style="verb">
Offset  Bytes                         Field
0x00    45 00 00 8C                   V=4, IHL=5, ToS=0, TotLen=140
0x04    00 00 00 00                   ID=0 (see note), Flags=0, FragOff=0
0x08    40 06 CC CC                   TTL=64, Proto=6(TCP), HdrChecksum (CC CC = computed)
0x0C    C0 00 02 01                   Src=192.0.2.1 (h.h.h.h of S)
0x10    C6 33 64 01                   Dst=198.51.100.1 (h.h.h.h of D)
0x14    [TCP header 20 bytes, checksum recomputed per RFC 7915]
0x28    [payload 100 bytes]
</spanx></t>

<t>The r.r.r.r=0.0.59.65 source ASN locator is dropped because the egress IPv4 network has no field to carry it. Reply traffic from D4 arrives at the translator as Version=4 with Src=198.51.100.1, Dst=192.0.2.1, and is translated back to Version=8 with S8' = <spanx style="verb">::198.51.100.1</spanx>, D8' = <spanx style="verb">15169::192.0.2.1</spanx>. <strong>The translator MUST maintain sufficient state (or an administratively configured reverse mapping) to recover the original S8.r.r.r.r = 0.0.59.65 on the return path</strong>; without it, the reply is translated with S8'.r.r.r.r = 0 (the IPv4-mapped form) and arrives at the original client under a different source address than the one it sent to, breaking any per-address state at the client. This state is implicit in the SIIT <xref target="RFC7915"></xref> model when one side is IPv4-mapped; it is stated explicitly here because the r.r.r.r locator has no IPv4 analog and a translator that omits reverse-path reconstruction will produce source-address mismatch on every reply.</t>

<t><strong>IPv4 ID field:</strong> set to 0 when DF is off and the packet is not fragmented. When DF is set (see §12.7.4) or fragmentation is needed, the translator assigns a 16-bit ID per RFC 7915.</t>

<t><strong>ASIP pseudo-header for transport checksums.</strong> TCP, UDP, and ICMP-ASIP checksums over ASIP are computed using the IPv6 pseudo-header format [RFC8200 §8.1] with the 128-bit ASIP Source and Destination Addresses substituted verbatim for the IPv6 address fields, the 32-bit upper-layer packet length, 24 zero bits, and the 8-bit upper-layer protocol identifier (Next Header). The pseudo-header is never transmitted; it is a checksum input only. Translator implementations performing IPv4&lt;-&gt;ASIP translation MUST recompute the transport checksum using the IPv4 pseudo-header on the IPv4 side and the ASIP pseudo-header above on the ASIP side; incremental update <xref target="RFC1624"></xref> is permitted only when both pseudo-headers are fully known to the translator.</t>

<t><strong>TCP options.</strong> TCP options (Timestamp, SACK-Permitted, MSS, Window Scale, etc.) are part of the TCP header, not the IP layer. They pass through IPv4&lt;-&gt;ASIP translation byte-for-byte unchanged; only the TCP checksum is recomputed. The MSS option value (if present on a SYN) is end-host-visible: the translator MUST NOT rewrite it, but the ASIP and IPv4 sides' PMTU discovery (§12.8, §12.7.4) jointly determine the actual usable segment size, and an MSS advertised for a larger IPv4-side MTU will be clamped by the normal PMTU path.</t>

</section>
<section anchor="icmp-asip-echo-request-icmpv4-echo-request"><name>12.7.2. ICMP-ASIP Echo Request -&gt; ICMPv4 Echo Request</name>

<t>An ICMP-ASIP Echo Request (NH=143, Type=128) from <spanx style="verb">15169::192.0.2.1</spanx> to <spanx style="verb">::198.51.100.1</spanx> is translated to an ICMPv4 Echo Request (Proto=1, Type=8). The identifier and sequence fields pass through unchanged; the payload passes through unchanged; the ICMP checksum is recomputed. Return direction reverses the type mapping (ICMPv4 Type=0 -&gt; ICMP-ASIP Type=129).</t>

<t><strong>Return-path locator reconstruction.</strong> The ICMPv4 Echo Reply arrives at the translator with IPv4 Src = the original D4 and IPv4 Dst = the h.h.h.h that was emitted as the IPv4 source on the forward Echo Request. To deliver the reply back to the originating ASIP host with the full S8 = r:z:s:h preserved, the translator MUST apply the same r.r.r.r reconstruction state or administrative-mapping rule specified in §12.7.3 (forward direction is stateless; reverse direction requires mapping). Because Echo flows are often short-lived (single exchange) and high-volume (traceroute, PMTUD probes), translators that maintain per-flow mapping state SHOULD use an Echo-specific short timeout (RECOMMENDED: 60 seconds from the last forward Echo Request) to bound state growth independently of longer TCP/UDP flow state. See §14.15.</t>

</section>
<section anchor="icmpv4-destination-unreachable-carrying-a-truncated-ipv4-inner-header-icmp-asip"><name>12.7.3. ICMPv4 Destination Unreachable Carrying a Truncated IPv4 Inner Header (-&gt; ICMP-ASIP)</name>

<t>This is the translation case implementers most frequently get wrong. An IPv4 router upstream of the translator emits ICMPv4 Type=3 (Destination Unreachable), which includes as its payload the first 28 bytes of the offending IPv4 packet (20-byte IPv4 header + 8 bytes of the next protocol, per RFC 792 semantics and RFC 1812 minimum). When this error arrives at the translator with inner Src=192.0.2.1 (the IPv4 form of the ASIP originator), the translator MUST synthesize an ICMP-ASIP error whose inner payload is a reconstructed ASIP header, not a pass-through of the IPv4 header.</t>

<t>Inbound ICMPv4 (bytes after IPv4 outer header):</t>

<t><spanx style="verb">
Offset  Bytes                         Field
0x00    03 01 [cksum] 00 00 00 00    Type=3, Code=1(host unreach), Unused
0x08    [inner IPv4 hdr 20 bytes: Src=192.0.2.1, Dst=198.51.100.1, Proto=6]
0x1C    [inner IPv4 first 8 bytes of TCP: SrcPort, DstPort, SeqNum]
</spanx></t>

<t>Outbound ICMP-ASIP (NH=143):</t>

<t><spanx style="verb">
Offset  Bytes                         Field
0x00    01 01 [cksum] 00 00 00 00    Type=1(Dst Unreach), Code=1, Unused
0x08    [reconstructed inner ASIP hdr 40 bytes]
           Version=8, PayloadLen=copied from original,
           NH=6(TCP), HopLimit=copied,
           S.rrrr=0.0.59.65, S.zzzz=0, S.ssss=0, S.hhhh=192.0.2.1
           D.rrrr=0, D.zzzz=0, D.ssss=0, D.hhhh=198.51.100.1
0x30    [copied first 8 bytes of TCP: SrcPort, DstPort, SeqNum]
</spanx></t>

<t><strong>The inner ASIP header's S.rrrr field MUST be reconstructed</strong> from the translator's per-session state or administrative mapping (the r.r.r.r=0.0.59.65 of the original ASIP source). If the translator lacks that state, it emits S.rrrr=0 (IPv4-mapped form) and the originating ASIP host's ICMP error-correlation will fail silently for any packet where the host tracks error association by full 128-bit source. The normative consequence is that <strong>stateless translation is stateless in the forward direction only</strong>; ICMP error translation requires either (i) per-flow ingress state or (ii) an administratively stable source-locator mapping. Implementations MUST document which approach they use.</t>

<t>The ICMPv4-to-ICMP-ASIP Type/Code mapping follows RFC 7915 §4 for the common cases (Host Unreachable, Net Unreachable, Protocol Unreachable, Port Unreachable, TTL Expired, Parameter Problem).</t>

</section>
<section anchor="icmpv4-type-3-code-4-fragmentation-needed-df-set-icmp-asip-packet-too-big"><name>12.7.4. ICMPv4 Type 3 Code 4 (Fragmentation Needed / DF Set) -&gt; ICMP-ASIP Packet Too Big</name>

<t>When the IPv4-side MTU cannot accommodate a translated packet whose inner originator set the ASIP "atomic fragment" intent (analogous to IPv4 DF), the translator converts the ICMPv4 Type=3 Code=4 error into an ICMP-ASIP Packet Too Big message. Because ASIP-to-IPv4 translation shrinks the packet by 20 bytes (ASIP base header is 40 bytes; IPv4 minimum header is 20 bytes), an ASIP packet of size X translates to an IPv4 packet of size X-20. To fit at the IPv4 next-hop MTU M, the ASIP origin may send packets up to M+20 bytes. The reported MTU to the ASIP originator is therefore <spanx style="verb">IPv4_next_hop_MTU + (ASIP_hdr - IPv4_hdr) = IPv4_next_hop_MTU + 20</spanx>. This is consistent with RFC 7915 §5.1 MTU handling and symmetric with the IPv4-&gt;ASIP direction rule in §12.7.6 (which subtracts 20).</t>

<t>Worked example: IPv4-side link reports next-hop MTU = 1500. Translator emits ICMP-ASIP Packet Too Big with MTU = 1520. The ASIP originator caches MTU=1520 for the destination; a 1520-byte ASIP packet becomes a 1500-byte IPv4 packet after translation and fits exactly. Implementations MUST NOT report the unadjusted IPv4 MTU (doing so causes a 20-byte per-packet efficiency loss) and MUST NOT report <spanx style="verb">IPv4_next_hop_MTU - 20</spanx> (doing so causes a 40-byte per-packet loss and diverges from RFC 7915).</t>

<t><strong>Fragment-needed-on-fragmented-inner corner case.</strong> If the ICMPv4 Type=3 Code=4 error arrives as a response to a translated ASIP packet that was already a fragment (NH=44 fragment header present), the translator emits ICMP-ASIP Packet Too Big and the originator MUST re-fragment at the lower MTU at the source, not via intermediate-router fragmentation (§5.2: ASIP fragments only at the source). This preserves IPv6/ASIP fragmentation semantics.</t>

</section>
<section anchor="fragmented-inner-payload-ipv4"><name>12.7.5. Fragmented Inner Payload (-&gt; IPv4)</name>

<t>An ASIP packet containing a Fragment Extension Header (NH=44) translates to an IPv4 packet with Flags.MF and FragOff set from the fragment header. The 32-bit fragment Identification in the ASIP fragment header is truncated to 16 bits for the IPv4 ID field; the low-order 16 bits are used. This is a lossy truncation but matches RFC 7915 §5.1.1 behavior. <strong>The translator MUST NOT perform reassembly</strong>; it forwards fragments as fragments. If the IPv4-side link MTU cannot carry the translated fragment, ICMPv4 Type=3 Code=4 is returned upstream and handled per §12.7.4.</t>

<t><strong>Fragment-ID collision attack surface.</strong> Two ASIP fragmented flows whose 32-bit fragment IDs differ only in the upper 16 bits collapse to the same 16-bit IPv4 ID after truncation. On the IPv4 side, a reassembler may mis-associate fragments from the two flows, producing a fragmentation-based injection or corruption surface analogous to the RFC 7915 §5.1.1 caveat. Translators SHOULD assign the IPv4 ID field by hashing (source address, destination address, fragment ID) rather than by simple truncation when per-flow state is available, to reduce collision probability; implementations that use simple low-16-bit truncation MUST rate-limit the number of distinct fragmented flows translated concurrently, or MUST refuse to translate fragments above a configured flow-count threshold.</t>

<t><strong>IPv4 -&gt; ASIP direction (fragments).</strong> An IPv4 packet with Flags.MF=1 or FragOff!=0 arriving at the translator is a fragment of a larger original datagram. The translator MUST perform per-fragment translation without reassembly: each IPv4 fragment becomes an ASIP packet carrying a Fragment Extension Header (NH=44) whose 32-bit Identification is the zero-extended IPv4 16-bit ID (upper 16 bits set to 0), whose M and FragOff fields mirror the IPv4 Flags.MF and FragOff respectively, and whose payload is the fragmented upper-layer bytes verbatim. Reassembly occurs only at the ASIP destination, never at the translator. Fragments arriving out of order are translated in arrival order and forwarded independently; the translator MUST NOT buffer fragments waiting for earlier parts. This preserves the "stateless in the forward direction" property of §12.2 and matches RFC 7915 §4.1 behavior.</t>

</section>
<section anchor="ipv4-df-bit-handling-ipv4-asip"><name>12.7.6. IPv4 DF Bit Handling (IPv4 -&gt; ASIP)</name>

<t>When translating an IPv4 packet with DF=1 to ASIP, the translator:</t>

<t><list style="symbols">
  <t>If the IPv4 packet fits in the ASIP-side MTU with added overhead, forwards it as a single ASIP packet (no Fragment Extension Header).</t>
  <t>If the IPv4 packet does not fit, responds with ICMPv4 Type=3 Code=4 (Fragmentation Needed) to the IPv4 source with next-hop MTU = <spanx style="verb">ASIP_MTU - 20</spanx>. The IPv4 source reduces its sending size.</t>
</list></t>

<t>When DF=0, the translator MAY fragment the IPv4 packet inline on the IPv4 side before translation, or MAY translate-then-fragment on the ASIP side with a Fragment Extension Header. Either is compliant; implementations SHOULD prefer DF=1-respecting behavior for all IPv4 traffic because it matches modern IPv4-side deployment practice (PMTUD relies on DF=1).</t>

<t><strong>Header-size delta with fragment extension header.</strong> When the translate-then-fragment path adds an ASIP Fragment Extension Header (NH=44, 8 bytes), the IPv4-&gt;ASIP header delta is +28 bytes (ASIP 40-byte base + 8-byte frag ext, minus IPv4 20-byte header), not the +20 bytes used elsewhere in §12.7. A translator that emits fragmented ASIP output from a non-fragmented IPv4 input MUST account for the additional 8 bytes of fragment-extension overhead when deciding whether an output fragment will fit its ASIP-side MTU; the PMTU-reported value on the ASIP side is reduced by 8 additional bytes relative to the §12.7.4 <spanx style="verb">+20</spanx> formula in this case. This is a translator-local accounting concern; the ASIP originator sees only the end-to-end PMTU and does not need separate knowledge of the translator's fragment-ext decision.</t>

</section>
<section anchor="icmp-asip-error-back-to-ipv4-originator-reverse-direction"><name>12.7.7. ICMP-ASIP Error Back to IPv4 Originator (Reverse Direction)</name>

<t>When an IPv4 originator (S4 = 203.0.113.7) sends to an IPv4-mapped ASIP destination that reaches an unreachable ASIP host via the translator, the far-side ASIP router emits an ICMP-ASIP error (e.g., Type=1 Destination Unreachable) whose inner reconstructed header shows S8 = <spanx style="verb">::203.0.113.7</spanx> (the translator's forward-direction synthesis) and some non-zero destination. That ICMP-ASIP error transits back toward the translator. The translator MUST synthesize an ICMPv4 error whose inner header is a reconstructed IPv4 header matching the packet S4 originally sent: inner Src = 203.0.113.7, inner Dst = the IPv4 h.h.h.h that S4 originally used as the destination. The outer ICMPv4 source address is the translator's IPv4 address (standard ICMP-originating-router semantics). Without this reverse synthesis, S4 receives an ICMP error referencing an IPv4 destination it never addressed, and IPv4-side error correlation fails. The translation uses the same state or administrative-mapping requirement as the forward ICMP path (§12.7.3): the translator must recover the original IPv4 Dst from the ICMP-ASIP inner header's D.hhhh field.</t>

</section>
<section anchor="port-restricted-inner-icmp"><name>12.7.8. Port-Restricted Inner ICMP</name>

<t>Some firewalls drop ICMPv4 Destination Unreachable messages whose inner TCP/UDP header indicates a port the firewall considers policy-blocked. When the translator receives such an error, it has already committed to forwarding the error back to the ASIP originator; the translator MUST NOT apply secondary port filtering on the inner payload of an ICMP error unless explicitly configured to do so. Conversely, if the IPv4-side firewall drops the error, the ASIP originator receives no feedback and its PMTU discovery or error correlation stalls. This is a pre-existing operational pathology inherited from IPv4; it is not created by ASIP and is not resolved here. Operators SHOULD disable aggressive ICMP filtering on translator-adjacent firewalls, identical to the advice given for IPv4 PMTUD.</t>

</section>
</section>
<section anchor="path-mtu-discovery-and-encapsulation-budget"><name>12.8. Path MTU Discovery and Encapsulation Budget</name>

<t>This subsection is NORMATIVE. ASIP PMTUD is semantically identical to IPv6 PMTUD <xref target="RFC8201"></xref> extended for the ASIP-to-IPv4 encapsulation of §12.3. Operators who deploy ASIP over non-upgraded IPv4 transit MUST account for the overhead below, or applications will experience silent truncation, black-holing, or PTB storms.</t>

<t><strong>Encapsulation overhead budget (single-level GENEVE/UDP/IPv4 over Ethernet):</strong></t>

<t><spanx style="verb">
Ethernet frame payload (L2 MTU)        1500 bytes
- Ethernet header                        -14
- Outer IPv4 header                      -20
- Outer UDP header                        -8
- GENEVE header (no options)              -8
- Inner ASIP base header                 -40
-------------------------------------------------
Available for inner L4 / application   1410 bytes
</spanx></t>

<t>On a standard 1500-byte L2 link, an ASIP flow traversing ASIP-to-IPv4 encapsulation has a <strong>1410-byte inner payload budget</strong>, not 1500. Applications and middleware that assume a 1500-byte MTU will emit 1500-byte inner packets; those packets will either be silently truncated or trigger Packet Too Big storms, depending on the encapsulator's policy.</t>

<t><strong>Jumbo-frame paths.</strong> On end-to-end 9000-byte jumbo-frame paths, the budget is <spanx style="verb">9000 - 14 - 20 - 8 - 8 - 40 = 8910 bytes</spanx> inner payload. Jumbo-frame paths are not universal; any path segment that does not support jumbo frames reduces the budget to that segment's MTU. Operators deploying ASIP-to-IPv4 across mixed-MTU paths MUST NOT assume jumbo MTU end-to-end.</t>

<t><strong>Normative requirements:</strong></t>

<t><list style="symbols">
  <t><strong>(MUST)</strong> ASIP-aware hosts MUST implement PMTUD per <xref target="RFC8201"></xref>: on receipt of an ICMP-ASIP Packet Too Big (Type=2), the host MUST cache the reported MTU per destination (and per source address, see below) and MUST NOT emit packets larger than the cached MTU to that destination until the cache entry expires.</t>
  <t><strong>(MUST)</strong> ASIP-to-IPv4 encapsulators MUST set the outer IPv4 DF bit so that intermediate IPv4-only links trigger ICMPv4 Type=3 Code=4 rather than silently fragmenting the outer IPv4 packet. Translation of the ICMPv4 error back to ICMP-ASIP Packet Too Big is specified in §12.7.4.</t>
  <t><strong>(MUST)</strong> The ASIP minimum link MTU is 1280 bytes (identical to IPv6's minimum per RFC 8200 §5). On receipt of an ICMP-ASIP Packet Too Big whose reported MTU is less than 1280, the ASIP originator MUST clamp the cached PMTU to 1280 for the affected destination and MUST use a Fragment Extension Header (NH=44) to carry larger application payloads in 1280-byte pieces. Implementations MUST NOT set a cached PMTU below 1280 regardless of the reported value, and MUST NOT emit ASIP packets smaller than 1280 bytes on the wire except as trailing fragments. The "&lt; 48" degenerate case (ASIP 40-byte base header + 8-byte minimum upper-layer header) is equally covered by this rule.</t>
  <t><strong>(MUST, per-source-address cache)</strong> Hosts that hold multiple ASIP source addresses (multihoming, §8.3.1) MUST cache PMTU state keyed by the tuple (source address, destination address), not by destination alone. The forward path differs per source address because r.r.r.r steers inter-AS forwarding; PMTU to the same destination via two different locators MAY differ. Flushing the cache only on destination change will cause PTB storms when the host switches source addresses.</t>
  <t><strong>(SHOULD)</strong> Encapsulating gateways SHOULD probe path MTU proactively (e.g., using Packetization-Layer PMTUD per <xref target="RFC8899"></xref>) rather than waiting for the first ICMP Packet Too Big event in the data flow.</t>
  <t><strong>(MAY)</strong> Operators with strict application MTU requirements MAY configure their ASIP-to-IPv4 transit to use GRE (<spanx style="verb">-24</spanx> outer: IPv4(20)+GRE(4)) or IP-in-IP (<spanx style="verb">-20</spanx> outer: IPv4(20) only) instead of GENEVE/UDP (<spanx style="verb">-36</spanx> outer: IPv4(20)+UDP(8)+GENEVE(8)). IP-in-IP recovers 16 bytes of inner payload per packet versus GENEVE/UDP at the cost of losing UDP-based NAT traversal and per-flow port entropy for ECMP hashing. The choice is a trade-off between payload efficiency and outer-transport properties.</t>
</list></t>

<t><strong>Deliberate non-resolution: outer PMTU vs. inner PMTU.</strong> When an ASIP-to-IPv4 tunnel reports a path MTU via ICMPv4 on the outer path, the encapsulator MUST translate that to an ICMP-ASIP Packet Too Big on the inner flow (§12.7.4). When an ICMP-ASIP Packet Too Big is received on the inner flow from beyond the decapsulator, the encapsulator MUST NOT re-generate an ICMPv4 error on the outer path; the inner error is propagated to the inner originator directly. This is the standard IP-in-IP tunneling behavior <xref target="RFC4459"></xref> and is restated here because translation-plus-encapsulation paths combine both semantics.</t>

</section>
</section>
<section anchor="application-compatibility"><name>13. Application Compatibility</name>

<section anchor="legacy-applications"><name>13.1. Legacy Applications</name>

<t>Existing IPv4 applications require no modification. The ASIP socket compatibility layer intercepts standard BSD socket calls (AF_INET, connect(), bind(), etc.) and transparently manages the upper 96 bits via DNS-ASIP resolution and routing table state. The application never sees an ASIP address.</t>

</section>
<section anchor="new-applications"><name>13.2. New Applications</name>

<t>Applications that wish to leverage ASIP addressing directly MAY use the AF_ASIP address family and sockaddr_asip structure defined in Section 5.5. Libraries SHOULD provide helper functions for converting between ASIP canonical/compressed notation strings and sockaddr_asip structures.</t>

</section>
<section anchor="url-and-uri-representation"><name>13.3. URL and URI Representation</name>

<t>ASIP addresses in URLs use canonical or compressed notation enclosed in brackets, consistent with IPv6 convention <xref target="RFC3986"></xref>:</t>

<t><spanx style="verb">
https://[15169:0.0.0.1:0.0.0.10:192.0.2.1]:443/path   (full, no compression needed)
https://[15169::192.0.2.1]:443/path                     (flat network, compressed)
https://[::8.8.8.8]:443/path                            (IPv4 compatible, compressed)
https://[64496::10.0.0.1]:8080/api                      (documentation ASN, compressed)
</spanx></t>

<t>Parsers MUST handle both compressed and uncompressed forms within brackets. The host field h.h.h.h is always present per Section 6.3 Rule 5, which prevents ambiguity with bare IPv4 addresses in URLs.</t>

</section>
</section>
<section anchor="security-considerations"><name>14. Security Considerations</name>

<section anchor="asn-locator-spoofing"><name>14.1. ASN Locator Spoofing</name>

<t>ASIP border routers MUST implement ingress filtering validating that the source r.r.r.r of received packets is a legitimate origin for the eBGP-ASIP session over which the packet arrived. The legitimate-origin set is the union of the peer's own ASN locators and any ASN locators the peer has validly announced (including multihoming and anycast more-specifics per Section 8.3.1).</t>

<t>This is consistent with BCP 38 <xref target="RFC2827"></xref>. Because the locator is carried in the address rather than inferred from prefix ownership, the check is a direct field match rather than a lookup. Note that the check validates the locator, not the host identity: an operator who rewrites r.r.r.r at an internal boundary (Section 8.3.2) MUST ensure that the rewritten locator still passes the ingress-filter check at the next external boundary.</t>

<t><strong>IPv4-mapped source (r=z=s=0) handling at ingress.</strong> An incoming Version=8 frame with source r.r.r.r=0 is by definition a packet emitted (or re-emitted) by a §12.2 translator: either (a) IPv4-to-ASIP forward, where the translator prepended r=z=s=0 on ingress, or (b) IPv4-to-ASIP reply to a native ASIP client, where the IPv4 source gets lifted to <spanx style="verb">::S4</spanx> (§12.7.1 reverse direction, the common case of every reply from an IPv4 destination to an ASIP-native originator). Both cases produce legitimate downstream traffic whose source locator is 0.0.0.0. The filter below treats them uniformly.
A border router MUST accept r=z=s=0 sourced Version=8 frames on an interface if and only if <strong>both</strong> of the following hold: (i) the peer's legitimate-origin set on that eBGP-ASIP session (or administratively configured adjacency) contains the 0.0.0.0::/96 IPv4-mapped prefix; and (ii) the receiving interface satisfies a uRPF-style reception check for 0.0.0.0::/96 in the sense of <xref target="RFC3704"></xref>. Condition (ii) prevents the one-bit-flip attack in which a transit peer that merely re-advertises 0.0.0.0::/96 thereby unlocks blanket acceptance of r=z=s=0 source packets across <em>all</em> its customer-facing ingress without applying BCP 38 to its own customers; condition (ii) restricts acceptance to interfaces consistent with the route for the IPv4-mapped prefix. Transit ASes that re-advertise 0.0.0.0::/96 MUST themselves apply §14.14's intra-AS BCP 38 rule on their customer-facing ingress, so that a downstream customer cannot spoof r=z=s=0 into a transit AS that is itself trusted by its upstream peers. Carriage of the 0.0.0.0::/96 prefix is expected to be propagated by normal eBGP-ASIP advertisement from the translator-owning ASN outward, exactly as any other originated prefix; transit ASes re-advertise it and MUST include it in the outbound legitimate-origin set they present to their own downstream peers. A receiving border router that is a transit hop several ASNs away from the originating translator will therefore see 0.0.0.0::/96 in its upstream peer's advertised set and, provided the packet arrives on the interface associated with that upstream route (uRPF condition (ii)), will correctly accept r=z=s=0 reply traffic. This preserves the §12.7.1 reverse-direction reply path across arbitrary-length multi-AS transit.</t>

<t><strong>uRPF mode selection (normative).</strong> Condition (ii) admits two modes from <xref target="RFC3704"></xref>: strict (packet accepted only if the best-path route for 0.0.0.0::/96 in the router's RIB points out the same interface on which the packet arrived) and feasible-path/loose (packet accepted if any route for 0.0.0.0::/96 exists via the receiving interface, whether or not best-path; loose mode accepts if any route exists in the RIB at all, regardless of interface). Leaving the mode unspecified would produce implementation divergence: one vendor strict-mode-drops legitimate asymmetric reply traffic, while another vendor loose-mode-accepts exactly the one-bit-flip pattern condition (ii) was written to block. Accordingly:
- On single-homed edge eBGP-ASIP interfaces facing stub customers or transit-free peers, routers MUST apply strict-mode uRPF for 0.0.0.0::/96; strict mode is the mode that actually closes the one-bit-flip gap.
- On multihomed-customer-facing interfaces and on transit/core interfaces where asymmetric return paths are expected (e.g., a customer multihomed to two upstreams advertising via primary but receiving replies via backup), routers MUST apply feasible-path uRPF per <xref target="RFC3704"></xref> §2.2 (packet accepted if the receiving interface is <em>any</em> reverse path for 0.0.0.0::/96 in the RIB, not only the best path). Feasible-path uRPF tolerates legitimate asymmetry while still requiring a per-interface route association, which continues to block the one-bit-flip attack from an interface that has no 0.0.0.0::/96 route at all.
- Loose-mode uRPF (the "any route anywhere" variant) MUST NOT be used for 0.0.0.0::/96 reception on any eBGP-ASIP interface; loose mode degenerates condition (ii) into condition (i) and reintroduces the one-bit-flip acceptance gap that condition (ii) was written to block.
- During a transient RIB state where 0.0.0.0::/96 is absent (BGP flap, session reset), condition (ii) will fail and legitimate r=z=s=0 replies will be dropped for the duration of the absence. This is the same transient-drop behavior that RFC 3704 uRPF applies to IPv4 BCP 38 and is accepted as a standard operational cost; operators SHOULD minimize 0.0.0.0::/96 churn by configuring the prefix with eBGP-ASIP dampening disabled and with a stable originator.
The mode selection above is enforceable at configuration time: the operator knows which of its interfaces are single-homed-edge vs. multihomed/transit, and per-interface mode configuration is standard in every eBGP-ASIP-capable router. An implementation that cannot determine the correct mode per-interface MUST default to strict mode and reject r=z=s=0 traffic on any interface where strict uRPF fails; this is the safe default.
On any eBGP-ASIP session whose legitimate-origin set does NOT contain 0.0.0.0::/96, or where the uRPF reception check fails, packets with r=z=s=0 source MUST be dropped: the all-zero locator is not a valid origin for a peer that has not propagated the IPv4-mapped originator prefix, and an attacker on such a link cannot bypass the §14.1 locator-match filter by forging r=z=s=0 (which would otherwise evade the filter because no non-zero ASN is present to compare against). Operators who deploy stateless §12.2 translation at their AS boundary MUST originate the 0.0.0.0::/96 prefix via eBGP-ASIP so that downstream reply traffic flows are not black-holed by peer ingress filters; a translator deployment that silently serves §12.2 without this advertisement will see its reverse-direction replies dropped at the first non-translator-declared boundary. Operators deploying only §12.3 encapsulation (ASIP-to-IPv4 tunneling) without §12.2 translation MUST NOT originate 0.0.0.0::/96, because they do not serve that prefix; originating a prefix one does not serve is a hijack pattern WHOIS-ASIP (§8.4) is specifically designed to reject.</t>

</section>
<section anchor="internal-zone-prefix-protection"><name>14.2. Internal Zone Prefix Protection</name>

<t>The 127.x.x.x internal zone prefix MUST NOT appear on WAN interfaces. Border routers MUST drop packets with 127.x.x.x as source or destination r.r.r.r on external interfaces and SHOULD log each violation.</t>

</section>
<section anchor="rine-prefix-protection"><name>14.3. RINE Prefix Protection</name>

<t>The 100.x.x.x RINE prefix MUST NOT appear in eBGP-ASIP advertisements or on non-peering interfaces. Border routers MUST filter these prefixes and SHOULD log violations.</t>

</section>
<section anchor="interior-link-convention-protection"><name>14.4. Interior Link Convention Protection</name>

<t>Border routers MUST filter received eBGP-ASIP route advertisements whose announced reachability would treat the 222.0.0.0/8 h.h.h.h range as an externally routable interior-link address. This is a control-plane filter applied to route advertisements only.</t>

<t>Border routers MUST NOT filter data-plane packets based solely on the h.h.h.h value being in 222.0.0.0/8. The h.h.h.h field is locally significant and other ASes may legitimately use any h.h.h.h value for any purpose. Per Section 3.8, route-advertisement filtering and data-plane filtering are distinct and MUST NOT be conflated.</t>

</section>
<section anchor="rfc-1918-address-privacy"><name>14.5. RFC 1918 Address Privacy</name>

<t>RFC 1918 private addresses in h.h.h.h remain non-routable on the public internet, consistent with IPv4 behavior.</t>

</section>
<section anchor="prefix-granularity-enforcement"><name>14.6. Prefix Granularity Enforcement</name>

<t><strong>More-specifics than /32 in r.r.r.r.</strong> Prefixes more specific than /32 in the r.r.r.r field subdivide a single ASN locator's address space across multiple route advertisements. Such announcements SHOULD NOT be accepted at external eBGP-ASIP boundaries. They MAY be accepted when they are explicitly listed in the originating ASN's WHOIS-ASIP record (Section 8.4) as legitimate multihoming, anycast, or TE more-specifics (Section 8.3.1). A blanket "no deaggregation ever" rule would force operators to split into additional ASNs to achieve the same traffic-engineering granularity, which grows the locator count and does not shrink the table; the WHOIS-ASIP-authorized-more-specifics model supports the real use cases BGP4 already supports without this perverse incentive.</t>

<t><strong>Less-specifics than /32 in r.r.r.r.</strong> Aggregation covering multiple ASN locators (less specific than /32) MAY be performed for internal backbone routing but MUST NOT be advertised across peering boundaries, because such an aggregate obscures the per-ASN origin that WHOIS-ASIP validation depends on.</t>

<t>This resolves the tension between §8.3 aggregation-to-/16 and the "one route = one ASN" property: aggregation is a routing-table optimization internal to an operator, not a peering-advertisement practice.</t>

</section>
<section anchor="header-overhead-and-ddos"><name>14.7. Header Overhead and DDoS</name>

<t>The 40-byte ASIP header is 20 bytes larger than IPv4's minimum header and identical in size to IPv6. In volumetric DDoS scenarios, this increases per-packet overhead for both attacker and defender. The net effect is approximately equivalent; the additional header bytes do not create a meaningful amplification vector. Rate limiting and traffic scrubbing operate identically to IPv4 and IPv6 at the transport layer.</t>

</section>
<section anchor="privacy-considerations"><name>14.8. Privacy Considerations</name>

<t>The r.r.r.r field reveals the origin ASN of every packet. This is functionally equivalent to existing BGP prefix-to-AS mapping via whois lookups, but encoded directly in the address rather than requiring a secondary lookup. Operators concerned about origin AS privacy at the packet level may use VPN or tunnel encapsulation to mask the outer ASIP header, identical to existing practice with IPv4/IPv6.</t>

<t>The z.z.z.z and s.s.s.s fields reveal internal network topology to external observers. Operators who consider this unacceptable SHOULD use XLATE-ASIP (address translation) at their AS boundary to replace internal z.z.z.z and s.s.s.s values with a public-facing address before packets exit the AS. This is recommended for all operators as a baseline privacy practice.</t>

</section>
<section anchor="slaac-asip-security"><name>14.9. SLAAC-ASIP Security</name>

<t>SLAAC-ASIP inherits the security properties and risks of IPv6 SLAAC <xref target="RFC4862"></xref>:</t>

<t><list style="symbols">
  <t><strong>Rogue Router Advertisements:</strong> A malicious device on a link may send forged Router Advertisements containing incorrect prefixes, redirecting traffic or causing denial of service. RA Guard <xref target="RFC6105"></xref> adapted for ASIP SHOULD be deployed on all access switches.</t>
  <t><strong>DAD Attacks:</strong> An attacker may respond to every DAD probe, preventing legitimate devices from configuring addresses. This is mitigated by limiting DAD attempts and falling back to DHCP-ASIP.</t>
  <t><strong>Host ID Tracking:</strong> MAC-derived host identifiers (SLAAC-ASIP Method 3) enable device tracking across networks. Implementations SHOULD default to Method 1 (stable opaque) or Method 2 (temporary random) to prevent this.</t>
  <t><strong>Temporary Address Rotation:</strong> Method 2 temporary addresses SHOULD be regenerated on a configurable interval (default 24 hours) and MUST be regenerated when moving between networks.</t>
</list></t>

</section>
<section anchor="link-local-scope-enforcement"><name>14.10. Link-Local Scope Enforcement</name>

<t>Link-local addresses (169.254.0.0/16 in r.r.r.r) MUST NOT be forwarded by any router under any circumstances. Routers MUST silently drop packets with link-local source or destination addresses received on any interface other than the originating link. This enforcement prevents link-local addresses from being used as a side channel to bypass scope boundaries.</t>

</section>
<section anchor="scope-boundary-enforcement"><name>14.11. Scope Boundary Enforcement</name>

<t>Each scope level (Section 4.1) represents a security boundary. Routers at scope boundaries MUST enforce the containment hierarchy:</t>

<t><list style="symbols">
  <t>Link-local traffic MUST NOT exit the link.</t>
  <t>Mesh-scoped traffic MUST NOT exit the mesh domain. Conversely, non-mesh traffic MUST NOT enter a mesh domain natively (§3.11; the only sanctioned entry is a mesh-gateway-performed translation).</t>
  <t>Organization-scoped traffic (127.x.x.x) MUST NOT exit the AS.</t>
  <t>Terrestrial traffic MUST NOT be forwarded into a non-terrestrial realm without explicit relay configuration. Conversely, a terrestrial router receiving a packet whose source r.r.r.r lies in a non-terrestrial realm range (97/8, 98/8, 99/8, 241/8–249/8, 250/8) on an interface that is not a configured realm-relay ingress MUST drop the packet. A terrestrial router MUST NOT accept such a packet on general peering links; realm-sourced traffic is accepted only on a physical or cryptographic channel configured as a realm-relay ingress. Without this ingress-side restriction, an attacker in a terrestrial peer's path could spoof a non-terrestrial source r.r.r.r and bypass realm-boundary controls that §3.12 authorizes only at designated relay points.</t>
  <t>Cross-realm multicast is governed by §10.6; no multicast scope crosses a realm boundary natively in this document.</t>
</list></t>

<t>Violation of scope boundaries MUST be dropped as specified above and SHOULD be logged as a security event.</t>

</section>
<section anchor="extension-header-security"><name>14.12. Extension Header Security</name>

<t>ASIP reuses IPv6's extension header mechanism and therefore inherits the same security considerations [RFC7045, RFC8200]. Implementations MUST:</t>

<t><list style="symbols">
  <t>Limit the number of extension headers per packet to at most 8 distinct headers and the total length of the extension-header chain to at most 256 bytes. Packets exceeding either bound MUST be dropped at the ingress node and SHOULD be counted. These limits make the "long chain of extension headers" IDS-evasion attack <xref target="RFC7112"></xref> ineffective while preserving realistic legitimate use (at most one Hop-by-Hop, one Destination Options before routing, one Routing, one Fragment, one AH or ESP, one Destination Options after routing per RFC 8200 §4.1).</t>
  <t>Require the full ASIP header chain, through and including the upper-layer protocol header, to be contained in the first fragment of a fragmented packet. Packets that violate this requirement MUST be dropped. This matches <xref target="RFC7112"></xref> and prevents first-fragment-only inspection bypass.</t>
  <t>Drop packets with unrecognized extension header types at intermediate nodes (unless the header is a Destination Options header, which is only processed at the final destination).</t>
  <t>Implement rate limiting on packets with Hop-by-Hop Options headers, which require processing at every node.</t>
</list></t>

</section>
<section anchor="flow-label-security"><name>14.13. Flow Label Security</name>

<t>The flow label is source-assigned and opaque to the network. Routers MUST NOT trust flow labels for security decisions. An attacker may set arbitrary flow labels to manipulate ECMP distribution or QoS classification. Flow labels SHOULD be used as hints for performance optimization, never as security-relevant identifiers.</t>

</section>
<section anchor="stride-summary"><name>14.14. STRIDE Summary</name>

<t>The preceding §§14.1-14.13 address individual threats. This subsection consolidates coverage against the STRIDE categories (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) so that gaps are visible in one place. Normative statements in this subsection that are not already covered elsewhere are load-bearing.</t>

<t><strong>Spoofing.</strong></t>

<t><list style="symbols">
  <t>ASN-locator spoofing at peer ingress: covered normatively in §14.1.</t>
  <t>Intra-AS source-address spoofing (a host on the internal side of r.r.r.r faking a different z:s:h): NOT covered at the protocol layer. Operators MUST deploy BCP 38-equivalent ingress filtering on internal AS-access segments; this is a standard operational control and is not specific to ASIP, but is named here so that implementers do not assume §14.1's border-only filter suffices.</t>
  <t>DNS-ASIP response spoofing: mitigated by DNSSEC at the DNS layer; ASIP imposes no additional requirements. A-ASIP records MUST be served over DNSSEC-validated zones where the deploying operator relies on A-ASIP-vs-A preference for policy decisions.</t>
  <t>WHOIS-ASIP response spoofing: covered normatively by §8.4 "Response authentication."</t>
  <t>ICMP-ASIP error-source spoofing: an on-path or off-path attacker can forge an ICMP-ASIP Packet Too Big or Destination Unreachable to poison a host's PMTU cache or abort a connection. Hosts MUST validate that the inner header of an ICMP-ASIP error corresponds to a packet the host recently sent (source address, destination address, and at least 8 bytes of upper-layer header, identical to RFC 5927 guidance for ICMPv4); errors that do not match MUST be discarded.</t>
  <t>NDP / RA spoofing on link-local: mitigated by RA Guard (§14.9) and by NDP cache entry validation; no new normative text needed.</t>
</list></t>

<t><strong>Tampering.</strong></t>

<t><list style="symbols">
  <t>In-transit modification of unprotected traffic: not addressable at the IP layer; relies on upper-layer integrity (TLS, QUIC, AH, ESP). §14 makes no additional claim.</t>
  <t>Extension-header chain tampering: bounded by §14.12 (max 8 headers, max 256 bytes, first-fragment inclusion).</t>
  <t>GENEVE option tampering: mitigated by §12.3's "no options in the baseline" rule; future option-class additions MUST define their own integrity story in the companion specification that introduces them.</t>
  <t>Flow-label manipulation by intermediate nodes: forbidden by §5.4 ("Routers MUST NOT … rewrite it in the forwarding path"); an on-path tamperer can manipulate it, but doing so is classified as a QoS/ECMP impact only and never a security-relevant change, per §14.13.</t>
</list></t>

<t><strong>Repudiation.</strong></t>

<t><list style="symbols">
  <t>Translator logging: §14.15 (below) requires an observable counter of failed ICMP-error translations; operators SHOULD additionally log stateful translation session establishment and teardown at rates compatible with their incident-response workflow. This document does not mandate a specific log schema.</t>
  <t>Locator-rewrite attribution gaps: when §8.3.2 rewrites r.r.r.r, downstream logs show the rewritten locator, not the original. Operators performing rewrite MUST retain a (timestamp, pre-rewrite, post-rewrite, peer-session) audit record for the period required by applicable policy; failing this, post-incident attribution across a rewrite boundary is impossible.</t>
  <t>CF telemetry attribution: CF is specified in a separate companion document (§17 / draft-asip-cf-00); attribution of CF values to specific peers is a CF-companion concern and is not pinned down here.</t>
</list></t>

<t><strong>Information disclosure.</strong></t>

<t><list style="symbols">
  <t>Flow-label as a side-channel: covered normatively in §14.13.</t>
  <t>Extension-header chain as a fingerprinting vector: a responder's choice of extension-header ordering (AH vs. ESP placement, presence of Destination Options) can identify the implementation. Implementations SHOULD NOT emit optional extension headers that are not required by the packet's function; this is an RFC 8200 best practice restated for ASIP.</t>
  <t>Translator state as a timing oracle: a per-flow translator that differentiates response latency between "first packet of a flow" (state creation) and "subsequent packets" (state hit) exposes an observable that an attacker can use to probe another user's flow existence. Translators SHOULD minimize the timing delta between state-miss and state-hit, or SHOULD apply a constant-time pad to external-facing response latency.</t>
  <t>Multicast-scope network-topology disclosure: a receiver that observes which scope nibbles reach it learns the network's scope-boundary topology. This is not a new threat class (IPv6 MLD has the same property) and is accepted.</t>
  <t>Internal zone (127.x) address leakage: covered normatively in §14.2. A packet with 127.x source arriving on a WAN interface is a configuration error that leaks internal topology; the MUST-drop rule in §14.2 prevents propagation.</t>
</list></t>

<t><strong>Denial of service.</strong></t>

<t><list style="symbols">
  <t>Translator state exhaustion: covered in §14.15 (below).</t>
  <t>GENEVE reflection: covered in §12.3 "Tunnel endpoint authentication and reflection/amplification."</t>
  <t>ICMP-ASIP amplification: ICMP-ASIP Echo Reply is 1:1 in size with Echo Request and does NOT amplify on its own. However, ICMP-ASIP Destination Unreachable messages whose inner payload is set to the maximum permitted 1232-byte quotation (<xref target="RFC4443"></xref>-equivalent) do amplify a small triggering packet to ~1232 bytes plus headers. Routers emitting ICMP-ASIP errors MUST apply rate limits per (source, destination) pair, as required of ICMPv6 routers by <xref target="RFC4443"></xref> §2.4. Unsolicited Neighbor Advertisements and Router Advertisements are link-scoped and do not amplify across routers.</t>
  <t>SLAAC DAD storms: a malicious host that responds positively to every DAD probe can starve a subnet. Mitigated by §3.14.3's bounded-retry rule and DHCP-ASIP fallback, plus RA Guard per §14.9.</t>
  <t>WHOIS-ASIP query amplification: WHOIS-ASIP responses can be substantially larger than queries (especially for prefix-to-ASN enumerations). WHOIS-ASIP servers MUST apply per-client rate limits and MUST NOT answer unauthenticated bulk-enumeration queries over UDP. The authenticated-channel requirement of §8.4 ("Response authentication") restricts large-response queries to TLS-authenticated clients.</t>
  <t>Flow-label-driven router-CPU exhaustion via ECMP hashing: flow labels are source-assigned and an attacker can choose labels to maximize cache-line contention in an ECMP hash-bucket table. Routers SHOULD include a random per-router seed in ECMP hashing so that an attacker cannot target a specific hash bucket without knowing the seed.</t>
</list></t>

<t><strong>Elevation of privilege.</strong></t>

<t><list style="symbols">
  <t>Multicast scope escape: covered by §10.6 composition rules and by §14.11 scope-boundary enforcement.</t>
  <t>Realm-boundary escape: covered by §3.12 "Cross-realm authentication" and by §14.11; supplemented by §10.6 rule 4 for multicast.</t>
  <t>Internal-zone (127.x) addresses leaking externally: covered by §14.2.</t>
  <t>eBGP-ASIP route injection by a non-authorized AS: covered by §8.4's WHOIS-ASIP validation where deployed; where WHOIS-ASIP is not enforced, operators accept BGP4-equivalent route hygiene (§8.4 "Normative status") and an injection remains possible, same as today's BGP4.</t>
</list></t>

</section>
<section anchor="translator-state-and-icmp-error-attribution"><name>14.15. Translator State and ICMP Error Attribution</name>

<t>§12.7.1 and §12.7.3 require translators to maintain a mapping between IPv4 literals and the originating ASIP source locator in order to reconstruct ICMP errors and return-path source addresses. This mapping is an attack surface:</t>

<t><list style="symbols">
  <t><strong>Memory exhaustion via ICMP flood.</strong> If the mapping is per-flow session state, an attacker can exhaust translator memory by opening many short-lived flows and solicit ICMP errors that force state allocation. Translators SHOULD bound per-session state, apply LRU eviction, and log state-table pressure events.</t>
  <t><strong>Stale-mapping misattribution.</strong> If the mapping is administrative/static, a long-lived mapping entry can survive past the originating ASIP host's address changes (locator transfer, ASN renumbering). Misattributed ICMP errors are a low-severity information leak but not a traffic-injection vector. Operators SHOULD age out administrative mappings on ASN-transfer events.</t>
  <t><strong>Observability requirement.</strong> Translators MUST expose a counter of ICMP-error translations that failed for lack of mapping state; a sudden increase in this counter indicates either an attack or a misconfigured mapping and SHOULD be monitored.</t>
  <t><strong>Short-flow state lifetime.</strong> Echo and single-probe flows (§12.7.2) generate high-rate, low-value mapping entries that, if aged at the same timeout as TCP/UDP flow state, amplify the memory-exhaustion surface above. Translators that maintain per-flow mapping state SHOULD apply a distinct short timeout (RECOMMENDED: 60 seconds) to Echo/ping-class traffic and MAY apply the longer TCP/UDP default only to flows carrying a transport connection. This caps Echo-based state amplification without harming correlation of legitimate traceroute and PMTU probes.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations"><name>15. IANA Considerations</name>

<section anchor="ip-version-number"><name>15.1. IP Version Number</name>

<t>IANA is requested to assign version number 8 in the IP Version Number registry to ASIP (AS-Structured Internet Protocol), the 128-bit four-field protocol specified in this document.</t>

</section>
<section anchor="address-family"><name>15.2. Address Family</name>

<t>IANA is requested to assign:</t>

<t><list style="symbols">
  <t>An Address Family Identifier (AFI) for ASIP in the Address Family Numbers registry. This is the AFI that eBGP-ASIP (§8.3), iBGP-ASIP, and any Multiprotocol BGP <xref target="RFC4760"></xref> usage MUST carry to announce ASIP reachability.</t>
  <t>A Subsequent Address Family Identifier (SAFI) for ASIP unicast.</t>
  <t>A Subsequent Address Family Identifier (SAFI) for ASIP multicast (for MP-BGP carriage of the cross-ASN multicast prefixes defined in §10.3 and §4.2).</t>
</list></t>

<t>eBGP-ASIP conformance (§8.3) requires the AFI/SAFI assignment to exist before interoperable inter-AS ASIP routing can be deployed. Until IANA has assigned these values, experimental deployments MAY use a pair of Private Use AFI/SAFI values agreed between peers; such deployments MUST NOT advertise prefixes over assigned-value peering until the formal assignment is completed.</t>

</section>
<section anchor="reserved-asn-ranges"><name>15.3. Reserved ASN Ranges</name>

<t>IANA is requested to reserve the following ASN ranges for ASIP use. Each /8 in r.r.r.r spans 2^24 = 16,777,216 ASN values; a /16 spans 2^16 = 65,536. Rows below that span a single /8 or /16 carry the corresponding 2^24 or 2^16 Count; rows that span multiple /8 ranges (241.0.0.0–249.255.255.255; 251.0.0.0–253.255.255.255) carry the sum, and the partial-/8 row 255.0.0.0–255.255.254.255 excludes the 256 values reserved for cross-ASN multicast and broadcast per §15.6 and §15.7:</t>

<texttable>
      <ttcol align='left'>ASN Range (decimal)</ttcol>
      <ttcol align='left'>r.r.r.r Equivalent</ttcol>
      <ttcol align='left'>Count</ttcol>
      <ttcol align='left'>Purpose</ttcol>
      <c>1,627,389,952 - 1,644,167,167</c>
      <c>97.0.0.0/8</c>
      <c>16,777,216</c>
      <c>Near-Earth infrastructure realm (Informative, Section 3.12)</c>
      <c>1,644,167,168 - 1,660,944,383</c>
      <c>98.0.0.0/8</c>
      <c>16,777,216</c>
      <c>Cislunar / Lunar realm (Informative, Section 3.12)</c>
      <c>1,660,944,384 - 1,677,721,599</c>
      <c>99.0.0.0/8</c>
      <c>16,777,216</c>
      <c>Martian realm (Informative, Section 3.12)</c>
      <c>1,677,721,600 - 1,694,498,815</c>
      <c>100.0.0.0/8</c>
      <c>16,777,216</c>
      <c>RINE peering fabric</c>
      <c>2,130,706,432 - 2,147,483,647</c>
      <c>127.0.0.0/8</c>
      <c>16,777,216</c>
      <c>Internal zone prefixes</c>
      <c>2,851,995,648 - 2,852,061,183</c>
      <c>169.254.0.0/16</c>
      <c>65,536</c>
      <c>Link-local scope</c>
      <c>4,026,531,840 - 4,043,309,055</c>
      <c>240.0.0.0/8</c>
      <c>16,777,216</c>
      <c>Mesh / ad-hoc scope</c>
      <c>4,043,309,056 - 4,194,303,999</c>
      <c>241.0.0.0 - 249.255.255.255</c>
      <c>150,994,944</c>
      <c>Future celestial bodies (Informative)</c>
      <c>4,194,304,000 - 4,211,081,215</c>
      <c>250.0.0.0/8</c>
      <c>16,777,216</c>
      <c>DTN relay realm (Informative)</c>
      <c>4,211,081,216 - 4,261,412,863</c>
      <c>251.0.0.0 - 253.255.255.255</c>
      <c>50,331,648</c>
      <c>Reserved for future use</c>
      <c>4,261,412,864 - 4,278,190,079</c>
      <c>254.0.0.0/8</c>
      <c>16,777,216</c>
      <c>Documentation and testing</c>
      <c>4,278,190,080 - 4,294,967,039</c>
      <c>255.0.0.0 - 255.255.254.255</c>
      <c>16,776,960</c>
      <c>Reserved for future use (non-multicast/broadcast)</c>
</texttable>

</section>
<section anchor="dns-a-asip-record-type"><name>15.4. DNS A-ASIP Record Type</name>

<t>IANA is requested to assign a DNS resource record type number for the A-ASIP record type defined in Section 7.</t>

</section>
<section anchor="icmp-asip-next-header-value-and-type-registry"><name>15.5. ICMP-ASIP Next-Header Value and Type Registry</name>

<t>IANA is requested to assign a previously-unassigned value in the IP Protocol Numbers / IPv6 Extension Header registry for ICMP-ASIP. The requested value is 143; any unassigned value in the range 143-252 that IANA prefers is acceptable. The assigned value MUST NOT be 58 (ICMPv6) to prevent dispatcher ambiguity across header-stripping middleboxes.</t>

<t>IANA is also requested to establish a registry for ICMP-ASIP message types, initially populated with types corresponding to ICMPv4 <xref target="RFC792"></xref> and ICMPv6 <xref target="RFC4443"></xref> equivalents including Neighbor Solicitation, Neighbor Advertisement, Router Solicitation, and Router Advertisement for SLAAC-ASIP and neighbor discovery.</t>

</section>
<section anchor="cross-asn-multicast-registry"><name>15.6. Cross-ASN Multicast Registry</name>

<t>IANA is requested to establish a registry for ASIP cross-ASN multicast prefix assignments within r.r.r.r = 255.255.255.0/24, with scope values as defined in Section 10.1.</t>

</section>
<section anchor="broadcast-reservation"><name>15.7. Broadcast Reservation</name>

<t>IANA is requested to reserve r.r.r.r = 255.255.255.255 as the ASIP broadcast address.</t>

</section>
<section anchor="next-header-values"><name>15.8. Next Header Values</name>

<t>ASIP draws from the IPv6 Next Header registry for shared protocols (TCP, UDP, ESP, AH, Routing, Fragment, Destination Options, No Next Header). It requests a distinct value for ICMP-ASIP (Section 15.5) rather than reusing NH=58, to eliminate dispatcher ambiguity at header-stripping middleboxes.</t>

</section>
<section anchor="geneve-inner-protocol-assignment-for-asip-to-ipv4"><name>15.9. GENEVE Inner-Protocol Assignment for ASIP-to-IPv4</name>

<t>IANA is requested to assign a GENEVE <xref target="RFC8926"></xref> inner-protocol type identifying encapsulated ASIP frames for use by the ASIP-to-IPv4 transit encapsulation defined in Section 12.3.</t>

</section>
<section anchor="whois-asip-registry-domain-delegation"><name>15.10. WHOIS-ASIP Registry Domain Delegation</name>

<t>IANA is requested to delegate one or more well-known registry domains for WHOIS-ASIP service discovery (§8.4 "Service discovery"). Each delegated domain MUST carry an <spanx style="verb">_whois-asip._tcp</spanx> SRV record resolvable over IPv4 so that a bootstrapping ASN can locate its regional WHOIS-ASIP service without a pre-existing ASIP path. The specific delegation structure (single global domain vs. per-RIR domains) is left to IANA and the RIR community; this specification requires only that the delegation exist and that the SRV record be IPv4-resolvable during transition.</t>

</section>
</section>
<section anchor="zone-server-reference-architecture-informative"><name>16. Zone Server Reference Architecture (Informative)</name>

<t>This section is INFORMATIVE. Nothing in this section is a protocol-layer requirement. Operators MAY deploy ASIP addressing without any Zone Server infrastructure.</t>

<section anchor="concept"><name>16.1. Concept</name>

<t>The Zone Server is a reference architecture for unified network service delivery. A Zone Server is a paired active/active platform that consolidates address assignment (DHCP-ASIP), name resolution (DNS-ASIP), time synchronization (NTP8), telemetry collection (NetLog8), authentication caching, route validation, access control, and IPv4/ASIP address translation (XLATE-ASIP) into a single operational platform.</t>

<t>The motivation is operational: modern networks require a minimum of 6-8 independently configured, independently authenticated, independently monitored services before a device is operational. The Zone Server consolidates these into a single platform with a shared identity model and a single configuration surface.</t>

</section>
<section anchor="service-delivery-model"><name>16.2. Service Delivery Model</name>

<t>A device connecting to a Zone Server-equipped network sends one DHCP-ASIP Discover and receives a single response containing every service endpoint it requires. No subsequent manual configuration is needed. The device is fully operational (addressed, authenticated, time-synchronized, logged) before its first user interaction.</t>

</section>
<section anchor="authentication-model"><name>16.3. Authentication Model</name>

<t>The Zone Server reference architecture recommends OAuth2 JWT <xref target="RFC7519"></xref> as the universal authentication mechanism. Tokens are validated locally by the Zone Server without round trips to external identity providers. This enables continued operation when upstream identity providers are unreachable.</t>

<t>Operators MAY use alternative authentication mechanisms. The Zone Server architecture is a recommendation, not a protocol-layer mandate.</t>

</section>
<section anchor="why-this-is-informative-not-normative"><name>16.4. Why This Is Informative, Not Normative</name>

<t>Bundling operational architecture into a protocol specification is a category error. Protocols define wire formats and interoperability requirements. Operational architecture defines how organizations deploy and manage their networks. These are different concerns with different rates of change, different stakeholders, and different consensus requirements.</t>

<t>The Zone Server architecture is published as a companion specification to enable operators who want unified management to deploy it. Operators who do not want it lose nothing. ASIP addressing works without it.</t>

</section>
</section>
<section anchor="cost-factor-routing-metric-informative"><name>17. Cost Factor Routing Metric (Informative)</name>

<t>The Cost Factor (CF) routing metric is specified in a separate companion document (draft-asip-cf-00). CF is intended as an OPTIONAL multi-dimensional path-selection input beyond the standard BGP attributes (LOCAL_PREF, AS_PATH, ORIGIN, MED). CF is NOT a protocol-layer requirement of this document: ASIP eBGP-ASIP sessions MUST function correctly using only standard BGP path-selection criteria <xref target="RFC4271"></xref>, and no normative behavior defined in §§3–15 of this document depends on CF. An operator MAY deploy ASIP without any CF awareness; conformance to this specification does not require parsing, emitting, or acting on a CF path attribute. Implementers seeking the CF component set, accumulation semantics, wire-format encoding, and physics-floor rules MUST consult the companion draft; partial CF machinery is intentionally not reproduced here because a partial reproduction could be treated as specification despite not being a complete one, which would fork CF semantics between the two documents.</t>

</section>
<section anchor="acknowledgment-of-trade-offs"><name>18. Acknowledgment of Trade-offs</name>

<t>Every protocol design involves trade-offs. This section makes them explicit rather than pretending they don't exist. Items marked UNRESOLVED describe cases where the design has no clean answer; they are documented here rather than hidden.</t>

<section anchor="header-overhead"><name>18.1. Header Overhead</name>

<t>The 40-byte ASIP base header is 20 bytes larger than IPv4 (20 bytes) and identical in size to IPv6 (40 bytes). By adopting IPv6's fixed-header design (dropping IHL, header checksum, and inline fragmentation), ASIP achieves header parity with IPv6 while carrying the same 128-bit address space in a structured four-field format. On bandwidth-constrained links (satellite, IoT, cellular), the 20-byte overhead versus IPv4 is non-trivial. Header compression (ROHC or equivalent adapted for ASIP) is RECOMMENDED for such environments.</t>

<t>Per-packet overhead in ASIP-to-IPv4 transit is higher because of the outer IPv4 and UDP headers. The total bytes above the inner L4 payload are ASIP(40) + IPv4(20) + UDP(8) + GENEVE(8) = 76 bytes, of which the inner ASIP header contributes 40 bytes and the encapsulation framing (IPv4 + UDP + GENEVE) contributes 36 bytes. An HTTPS (TCP/TLS) tunneling alternative costs 109 total bytes per packet (ASIP(40) + IPv4(20) + TCP(20) + TLS(~29)) and introduces TCP congestion-control interactions; GENEVE/UDP is preferred because it avoids both the extra 33 bytes and the TCP-over-TCP pathology (see §12.3 rationale).</t>

</section>
<section anchor="rigid-hierarchy"><name>18.2. Rigid Hierarchy</name>

<t>The fixed four-field address structure (ASN/Zone/Subnet/Host) imposes a specific network topology model. Organizations whose networks do not map naturally to this hierarchy (highly flat networks, mesh topologies, multi-ASN single-logical-network deployments) may find the structure constraining. The Zone and Subnet fields are locally significant and operator-assigned, which provides flexibility within an organization. The r.r.r.r field is drawn from the global ASN number space and is constrained by external allocation.</t>

</section>
<section anchor="asn-dependency"><name>18.3. ASN Dependency</name>

<t>Every ASIP-routable address requires an ASN locator. Organizations that do not currently hold an ASN must obtain one before deploying ASIP with public-facing addresses. The ASN allocation process is well-established via RIRs but adds a bureaucratic step that IPv4 and IPv6 do not require for basic internet connectivity. Organizations using only internal zone addressing (127.x.x.x) or link-local addressing (169.254.x.x) do not require a public ASN.</t>

</section>
<section anchor="transition-realism"><name>18.4. Transition Realism</name>

<t>ASIP is not wire-compatible with IPv4. Every router, OS kernel, NIC driver, firewall, IDS/IPS, load balancer, and middlebox in the forwarding path of an ASIP-aware endpoint must receive a software update to process Version=8 frames natively; hardware that cannot be updated must be replaced or bypassed via the Section 12.3 encapsulation. Until that happens for each deployment segment, ASIP-to-IPv4 encapsulation handles transit, but encapsulation adds overhead (36 bytes of encapsulation framing per packet: outer IPv4(20) + UDP(8) + GENEVE(8); total bytes above the inner L4 payload are 76 with the 40-byte inner ASIP header included) and operational complexity (tunnel MTU, PMTU discovery, endpoint discovery). The transition is incremental, not instantaneous, and not free. The abstract and Section 1.2 state this plainly rather than claiming "no modification required."</t>

</section>
<section anchor="relationship-to-ipv6"><name>18.5. Relationship to IPv6</name>

<t>ASIP does not claim that IPv6 is technically deficient. IPv6 is a well-designed protocol that solves the address exhaustion problem, and ASIP borrows extensively from its design: the fixed 40-byte header, extension header mechanism, flow label, traffic class, SLAAC model, scoped multicast, and the elimination of header checksums and router-path fragmentation are all IPv6 innovations adopted wholesale. ASIP's residual contribution is the structured four-field address format (ASN locator / Zone / Subnet / Host), the IPv4-mapped address form, and a more structured relationship between the routing locator and the registered ASN. Whether this narrower contribution justifies a new protocol version rather than a set of IPv6 deployment guidelines is a legitimate question that this document does not claim to settle. Both protocols MAY coexist indefinitely.</t>

</section>
<section anchor="a-unresolved-multihoming-under-an-asn-shaped-address"><name>18.5a. UNRESOLVED: Multihoming Under an ASN-Shaped Address</name>

<t>Section 8.3.1 handles multihoming by assigning one address per upstream ASN. This preserves capability but has a real cost: a multihomed host presents multiple stable addresses to applications, DNS-ASIP, and any system that identifies a host by its address literal rather than by name. Applications that hash or pin on IP address (legacy configuration files, certain rate-limit systems, session-affinity middleware) will see the same host as two hosts. Happy-eyeballs-style selection helps on the client side but does not solve the server-side identification problem. Alternatives considered and rejected were: (i) a separate non-locator host identifier field, which would have required a header redesign; (ii) identifier/locator split via HIP or LISP-style mapping, which would have added a mapping-service dependency on the critical path. Neither was compatible with the "familiar dotted-decimal, no new control plane" goal. The chosen trade-off is documented here as a cost the design accepts, not a cost it resolves.</t>

</section>
<section anchor="b-server-side-multi-address-operational-impact"><name>18.5b. Server-Side Multi-Address Operational Impact</name>

<t>The multi-address model in §8.3.1 creates concrete operational consequences for any server-side system that derives identity or state from the client's source IP literal. This subsection names the affected systems, prescribes mitigations, and states the normative status of each mitigation. It converts §18.5a's acknowledgment of the multihoming trade-off into deployable operator guidance.</t>

<t><strong>Affected systems (non-exhaustive):</strong></t>

<texttable>
      <ttcol align='left'>System</ttcol>
      <ttcol align='left'>Failure mode under multi-address</ttcol>
      <c>HTTP session stickiness keyed on source IP</c>
      <c>One user is routed to different backends across requests if the client switches between its per-ASN addresses.</c>
      <c>Rate limiters keyed on source IP</c>
      <c>Effective per-user limit is multiplied by the number of upstream ASNs; DoS defenses under-count.</c>
      <c>Stateful firewalls with per-IP state tables</c>
      <c>Return traffic on a different source address than the forward flow is dropped or mismatched to a different state entry.</c>
      <c>IP allow-lists / IP block-lists</c>
      <c>A client reachable via ASN_A is allow-listed by its ASN_A address; the same client arriving via ASN_B is not recognized.</c>
      <c>TLS session resumption keyed on peer IP</c>
      <c>Resumption tickets bound to the ASN_A address fail when the client reconnects from its ASN_B address, forcing full handshakes.</c>
      <c>Abuse-reporting, audit logs, SIEM correlation</c>
      <c>A single user action appears in logs as multiple distinct sources; incident investigation must cross-reference.</c>
      <c>CAPTCHA / risk-score systems keyed on IP</c>
      <c>Reputation does not aggregate across a client's addresses.</c>
      <c>Path-bound PMTU caches (see §12.8)</c>
      <c>A host must track PMTU per source address, not per destination, because the forward path differs per address.</c>
</texttable>

<t><strong>Mitigations.</strong> The following mitigations address the above failure modes. Normative status is assigned per mitigation; operators deploying ASIP servers in the public internet SHOULD implement the normative ones.</t>

<t><list style="symbols">
  <t><strong>(Normative, SHOULD) Prefer session-token stickiness over IP stickiness.</strong> HTTP load balancers SHOULD use cookie-based or JWT-based stickiness rather than source-IP hashing when serving ASIP clients. This is the single most effective mitigation and the one operators can implement without any ASIP-specific support from clients.</t>
  <t><strong>(Normative, SHOULD) Group by ASN in rate limiters.</strong> Rate limiters SHOULD include the r.r.r.r ASN locator as an aggregation key in addition to the full 128-bit address, so that clients from the same enterprise ASN aggregate into one bucket. This is effective for the common multihoming case where a client's two addresses share the enterprise's two transit ASNs. For clients whose multiple addresses come from disjoint ASNs (e.g., a home user multihomed across two retail ISPs), ASN-grouping does not aggregate and token-based identity (cookies, JWTs) SHOULD be used instead.</t>
  <t><strong>(Normative, SHOULD) Export z:s:h as the stable-identity triple in logs.</strong> Where logs must correlate a user across addresses, the z:s:h 96-bit triple under the same administrative scope (§3.1 identifier/locator separation) is the stable portion. Logging systems SHOULD record both the full address and the z:s:h triple so downstream correlation is possible.</t>
  <t><strong>(Advisory, MAY) DNS-based address preference rules.</strong> Authoritative DNS-ASIP servers MAY order A-ASIP records in a consistent preference order per client (by ASN geography, by peering cost, etc.) so that a given client preferentially selects the same server-side address most of the time, reducing but not eliminating the multi-address fan-out. This is advisory because it depends on DNS resolver and client cache behavior that the server cannot control.</t>
  <t><strong>(Normative, MUST -- see §12.8) Per-address PMTU cache.</strong> Hosts holding multiple ASIP source addresses MUST cache PMTU state keyed by (source address, destination address), not by destination alone, because the forward path is a function of the chosen source address. The MUST status is defined in §12.8 and applies identically here; this subsection does not weaken it.</t>
  <t><strong>(Advisory, MAY) TLS session resumption across addresses.</strong> TLS server implementations MAY accept resumption tickets regardless of peer-IP continuity when the ticket includes a client-identity binding (PSK or channel ID). This is advisory because RFC 8446 does not require IP continuity and most existing implementations already accept resumption across address changes; the note is included for implementations that currently check peer IP.</t>
  <t><strong>(Advisory, MAY) Firewall session reconciliation.</strong> Stateful firewalls MAY use a client-identity tag (TLS channel ID, QUIC connection ID, or application cookie) as an auxiliary state key so that return traffic on a different source address is matched to the existing forward-flow state. This is advisory because the firewall must be in the application's trust domain to read such identifiers.</t>
</list></t>

<t><strong>Deliberate non-resolution.</strong> The normative/advisory split above is deliberate: mitigations that a single operator can deploy without cooperation from clients, DNS, or other operators are normative (SHOULD); mitigations that require cross-party coordination or depend on application semantics outside the firewall/LB boundary are advisory (MAY). This distinction is not a design escape hatch; it reflects what a deploying operator can actually control. Applications that cannot tolerate multi-address semantics at all SHOULD pin the client to a single address in DNS-ASIP (publish only one A-ASIP record per client) at the cost of losing multihoming failover — this is a deployment choice, not a protocol defect.</t>

</section>
<section anchor="whois-asip-adoption"><name>18.6. WHOIS-ASIP Adoption</name>

<t>WHOIS-ASIP route validation provides meaningful security only if widely adopted. An eBGP-ASIP router that enforces WHOIS-ASIP validation in a network where most peers do not publish WHOIS-ASIP records will reject legitimate routes. The same chicken-and-egg problem that limited RPKI deployment applies here. The simplification from one-route-per-ASN reduces but does not eliminate this problem.</t>

</section>
<section anchor="bit-host-field-and-slaac-constraints"><name>18.7. 32-Bit Host Field and SLAAC Constraints</name>

<t>The 32-bit host field (h.h.h.h) is substantially smaller than IPv6's 64-bit interface identifier. This limits SLAAC-ASIP to methods that produce 32-bit identifiers rather than the full EUI-64 derivation available in IPv6. Birthday-paradox analysis (§3.14.3) gives approximately 39% collision probability at N=65,536 and 50% at N~77,000; the 10,000-host DHCP-ASIP-fallback threshold sits well below this point (~1% collision probability) to give DAD retries a large safety margin. Modern datacenter leaf-subnet populations routinely approach or exceed 10,000, so the threshold is operationally material: the collision region is reached by real fabrics, not by theoretical corner cases. Section 3.14.3 specifies the consequence: deployments expected to exceed ~10,000 concurrent hosts per subnet MUST use DHCP-ASIP rather than relying on SLAAC-ASIP uniqueness, and DAD retries are bounded to prevent indefinite re-rolling.</t>

</section>
<section anchor="interplanetary-address-reservation"><name>18.8. Interplanetary Address Reservation</name>

<t>Reserving large ASN ranges for celestial bodies that currently have zero networked devices may appear wasteful. The counter-argument is that address space reservation costs nothing today but prevents painful renumbering later. IPv4's failure to reserve space for mobile devices, IoT, and cloud infrastructure before they existed is a cautionary example. The reservations are deliberately generous and can always be narrowed later; they cannot easily be widened once allocated.</t>

</section>
<section anchor="complexity-budget"><name>18.9. Complexity Budget</name>

<t>ASIP is more complex than either IPv4 or IPv6 individually. It combines IPv4's addressing familiarity, IPv6's header and extension mechanism, a new hierarchical address structure, SLAAC, scoped multicast, and forward-looking realm allocations. Each feature is independently justified, but the aggregate complexity is a real adoption barrier. Implementors must understand three protocol generations to build a compliant stack. This specification attempts to mitigate complexity by making most features OPTIONAL or RECOMMENDED rather than REQUIRED, but the specification itself is long. A novel routing metric (the OPTIONAL Cost Factor, §17) is deliberately excised to a companion draft so that the ASIP address-family specification is not burdened with a metric it does not require.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>
<reference anchor="RFC3704">
  <front>
    <title>Ingress Filtering for Multihomed Networks</title>
    <author fullname="F. Baker" initials="F." surname="Baker"/>
    <author fullname="P. Savola" initials="P." surname="Savola"/>
    <date month="March" year="2004"/>
    <abstract>
      <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="84"/>
  <seriesInfo name="RFC" value="3704"/>
  <seriesInfo name="DOI" value="10.17487/RFC3704"/>
</reference>
<reference anchor="RFC4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
    <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
      <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
      <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
      <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4271"/>
  <seriesInfo name="DOI" value="10.17487/RFC4271"/>
</reference>
<reference anchor="RFC4443">
  <front>
    <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
    <author fullname="A. Conta" initials="A." surname="Conta"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
    <date month="March" year="2006"/>
    <abstract>
      <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="89"/>
  <seriesInfo name="RFC" value="4443"/>
  <seriesInfo name="DOI" value="10.17487/RFC4443"/>
</reference>
<reference anchor="RFC4760">
  <front>
    <title>Multiprotocol Extensions for BGP-4</title>
    <author fullname="T. Bates" initials="T." surname="Bates"/>
    <author fullname="R. Chandra" initials="R." surname="Chandra"/>
    <author fullname="D. Katz" initials="D." surname="Katz"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <date month="January" year="2007"/>
    <abstract>
      <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4760"/>
  <seriesInfo name="DOI" value="10.17487/RFC4760"/>
</reference>
<reference anchor="RFC4861">
  <front>
    <title>Neighbor Discovery for IP version 6 (IPv6)</title>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <author fullname="H. Soliman" initials="H." surname="Soliman"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4861"/>
  <seriesInfo name="DOI" value="10.17487/RFC4861"/>
</reference>
<reference anchor="RFC4862">
  <front>
    <title>IPv6 Stateless Address Autoconfiguration</title>
    <author fullname="S. Thomson" initials="S." surname="Thomson"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4862"/>
  <seriesInfo name="DOI" value="10.17487/RFC4862"/>
</reference>
<reference anchor="RFC6437">
  <front>
    <title>IPv6 Flow Label Specification</title>
    <author fullname="S. Amante" initials="S." surname="Amante"/>
    <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
      <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6437"/>
  <seriesInfo name="DOI" value="10.17487/RFC6437"/>
</reference>
<reference anchor="RFC7112">
  <front>
    <title>Implications of Oversized IPv6 Header Chains</title>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <author fullname="V. Manral" initials="V." surname="Manral"/>
    <author fullname="R. Bonica" initials="R." surname="Bonica"/>
    <date month="January" year="2014"/>
    <abstract>
      <t>The IPv6 specification allows IPv6 Header Chains of an arbitrary size. The specification also allows options that can, in turn, extend each of the headers. In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain. This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7112"/>
  <seriesInfo name="DOI" value="10.17487/RFC7112"/>
</reference>
<reference anchor="RFC7607">
  <front>
    <title>Codification of AS 0 Processing</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="H. Schiller" initials="H." surname="Schiller"/>
    <author fullname="K. Patel" initials="K." surname="Patel"/>
    <date month="August" year="2015"/>
    <abstract>
      <t>This document updates RFC 4271 and proscribes the use of Autonomous System (AS) 0 in the Border Gateway Protocol (BGP) OPEN, AS_PATH, AS4_PATH, AGGREGATOR, and AS4_AGGREGATOR attributes in the BGP UPDATE message.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7607"/>
  <seriesInfo name="DOI" value="10.17487/RFC7607"/>
</reference>
<reference anchor="RFC7915">
  <front>
    <title>IP/ICMP Translation Algorithm</title>
    <author fullname="C. Bao" initials="C." surname="Bao"/>
    <author fullname="X. Li" initials="X." surname="Li"/>
    <author fullname="F. Baker" initials="F." surname="Baker"/>
    <author fullname="T. Anderson" initials="T." surname="Anderson"/>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <date month="June" year="2016"/>
    <abstract>
      <t>This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 6145.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7915"/>
  <seriesInfo name="DOI" value="10.17487/RFC7915"/>
</reference>
<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>
<reference anchor="RFC8201">
  <front>
    <title>Path MTU Discovery for IP version 6</title>
    <author fullname="J. McCann" initials="J." surname="McCann"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="J. Mogul" initials="J." surname="Mogul"/>
    <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="87"/>
  <seriesInfo name="RFC" value="8201"/>
  <seriesInfo name="DOI" value="10.17487/RFC8201"/>
</reference>
<reference anchor="RFC8926">
  <front>
    <title>Geneve: Generic Network Virtualization Encapsulation</title>
    <author fullname="J. Gross" initials="J." role="editor" surname="Gross"/>
    <author fullname="I. Ganga" initials="I." role="editor" surname="Ganga"/>
    <author fullname="T. Sridhar" initials="T." role="editor" surname="Sridhar"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters. As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components. Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8926"/>
  <seriesInfo name="DOI" value="10.17487/RFC8926"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC792">
  <front>
    <title>Internet Control Message Protocol</title>
    <author fullname="J. Postel" initials="J." surname="Postel"/>
    <date month="September" year="1981"/>
  </front>
  <seriesInfo name="STD" value="5"/>
  <seriesInfo name="RFC" value="792"/>
  <seriesInfo name="DOI" value="10.17487/RFC0792"/>
</reference>
<reference anchor="RFC1624">
  <front>
    <title>Computation of the Internet Checksum via Incremental Update</title>
    <author fullname="A. Rijsinghani" initials="A." role="editor" surname="Rijsinghani"/>
    <date month="May" year="1994"/>
    <abstract>
      <t>This memo describes an updated technique for incremental computation of the standard Internet checksum. It updates the method described in RFC 1141. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1624"/>
  <seriesInfo name="DOI" value="10.17487/RFC1624"/>
</reference>
<reference anchor="RFC1812">
  <front>
    <title>Requirements for IP Version 4 Routers</title>
    <author fullname="F. Baker" initials="F." role="editor" surname="Baker"/>
    <date month="June" year="1995"/>
    <abstract>
      <t>This memo defines and discusses requirements for devices that perform the network layer forwarding function of the Internet protocol suite. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1812"/>
  <seriesInfo name="DOI" value="10.17487/RFC1812"/>
</reference>
<reference anchor="RFC1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
    <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
    <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
    <author fullname="E. Lear" initials="E." surname="Lear"/>
    <date month="February" year="1996"/>
    <abstract>
      <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="5"/>
  <seriesInfo name="RFC" value="1918"/>
  <seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>
<reference anchor="RFC2328">
  <front>
    <title>OSPF Version 2</title>
    <author fullname="J. Moy" initials="J." surname="Moy"/>
    <date month="April" year="1998"/>
    <abstract>
      <t>This memo documents version 2 of the OSPF protocol. OSPF is a link- state routing protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="54"/>
  <seriesInfo name="RFC" value="2328"/>
  <seriesInfo name="DOI" value="10.17487/RFC2328"/>
</reference>
<reference anchor="RFC3810">
  <front>
    <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
    <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
    <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3810"/>
  <seriesInfo name="DOI" value="10.17487/RFC3810"/>
</reference>
<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>
<reference anchor="RFC4291">
  <front>
    <title>IP Version 6 Addressing Architecture</title>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <date month="February" year="2006"/>
    <abstract>
      <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
      <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4291"/>
  <seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>
<reference anchor="RFC4301">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="RFC4302">
  <front>
    <title>IP Authentication Header</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4302"/>
  <seriesInfo name="DOI" value="10.17487/RFC4302"/>
</reference>
<reference anchor="RFC4303">
  <front>
    <title>IP Encapsulating Security Payload (ESP)</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4303"/>
  <seriesInfo name="DOI" value="10.17487/RFC4303"/>
</reference>
<reference anchor="RFC4459">
  <front>
    <title>MTU and Fragmentation Issues with In-the-Network Tunneling</title>
    <author fullname="P. Savola" initials="P." surname="Savola"/>
    <date month="April" year="2006"/>
    <abstract>
      <t>Tunneling techniques such as IP-in-IP when deployed in the middle of the network, typically between routers, have certain issues regarding how large packets can be handled: whether such packets would be fragmented and reassembled (and how), whether Path MTU Discovery would be used, or how this scenario could be operationally avoided. This memo justifies why this is a common, non-trivial problem, and goes on to describe the different solutions and their characteristics at some length. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4459"/>
  <seriesInfo name="DOI" value="10.17487/RFC4459"/>
</reference>
<reference anchor="RFC5398">
  <front>
    <title>Autonomous System (AS) Number Reservation for Documentation Use</title>
    <author fullname="G. Huston" initials="G." surname="Huston"/>
    <date month="December" year="2008"/>
    <abstract>
      <t>To reduce the likelihood of conflict and confusion when relating documented examples to deployed systems, two blocks of Autonomous System numbers (ASNs) are reserved for use in examples in RFCs, books, documentation, and the like. This document describes the reservation of two blocks of ASNs as reserved numbers for use in documentation. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5398"/>
  <seriesInfo name="DOI" value="10.17487/RFC5398"/>
</reference>
<reference anchor="RFC5927">
  <front>
    <title>ICMP Attacks against TCP</title>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document discusses the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP). Additionally, this document describes a number of widely implemented modifications to TCP's handling of ICMP error messages that help to mitigate these issues. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5927"/>
  <seriesInfo name="DOI" value="10.17487/RFC5927"/>
</reference>
<reference anchor="RFC5952">
  <front>
    <title>A Recommendation for IPv6 Address Text Representation</title>
    <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
    <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
    <date month="August" year="2010"/>
    <abstract>
      <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5952"/>
  <seriesInfo name="DOI" value="10.17487/RFC5952"/>
</reference>
<reference anchor="RFC6105">
  <front>
    <title>IPv6 Router Advertisement Guard</title>
    <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
    <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6105"/>
  <seriesInfo name="DOI" value="10.17487/RFC6105"/>
</reference>
<reference anchor="RFC6480">
  <front>
    <title>An Infrastructure to Support Secure Internet Routing</title>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6480"/>
  <seriesInfo name="DOI" value="10.17487/RFC6480"/>
</reference>
<reference anchor="RFC6996">
  <front>
    <title>Autonomous System (AS) Reservation for Private Use</title>
    <author fullname="J. Mitchell" initials="J." surname="Mitchell"/>
    <date month="July" year="2013"/>
    <abstract>
      <t>This document describes the reservation of Autonomous System Numbers (ASNs) that are for Private Use only, known as Private Use ASNs, and provides operational guidance on their use. This document enlarges the total space available for Private Use ASNs by documenting the reservation of a second, larger range and updates RFC 1930 by replacing Section 10 of that document.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="6"/>
  <seriesInfo name="RFC" value="6996"/>
  <seriesInfo name="DOI" value="10.17487/RFC6996"/>
</reference>
<reference anchor="RFC7045">
  <front>
    <title>Transmission and Processing of IPv6 Extension Headers</title>
    <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <date month="December" year="2013"/>
    <abstract>
      <t>Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7045"/>
  <seriesInfo name="DOI" value="10.17487/RFC7045"/>
</reference>
<reference anchor="RFC7217">
  <front>
    <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <date month="April" year="2014"/>
    <abstract>
      <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7217"/>
  <seriesInfo name="DOI" value="10.17487/RFC7217"/>
</reference>
<reference anchor="RFC7346">
  <front>
    <title>IPv6 Multicast Address Scopes</title>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="August" year="2014"/>
    <abstract>
      <t>This document updates the definitions of IPv6 multicast scopes and therefore updates RFCs 4007 and 4291.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7346"/>
  <seriesInfo name="DOI" value="10.17487/RFC7346"/>
</reference>
<reference anchor="RFC7519">
  <front>
    <title>JSON Web Token (JWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7519"/>
  <seriesInfo name="DOI" value="10.17487/RFC7519"/>
</reference>
<reference anchor="RFC8305">
  <front>
    <title>Happy Eyeballs Version 2: Better Connectivity Using Concurrency</title>
    <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>Many communication protocols operating over the modern Internet use hostnames. These often resolve to multiple IP addresses, each of which may have different performance and connectivity characteristics. Since specific addresses or address families (IPv4 or IPv6) may be blocked, broken, or sub-optimal on a network, clients that attempt multiple connections in parallel have a chance of establishing a connection more quickly. This document specifies requirements for algorithms that reduce this user-visible delay and provides an example algorithm, referred to as "Happy Eyeballs". This document obsoletes the original algorithm description in RFC 6555.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8305"/>
  <seriesInfo name="DOI" value="10.17487/RFC8305"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC8899">
  <front>
    <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
    <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
    <author fullname="T. Jones" initials="T." surname="Jones"/>
    <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
    <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
    <author fullname="T. Völker" initials="T." surname="Völker"/>
    <date month="September" year="2020"/>
    <abstract>
      <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
      <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
      <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8899"/>
  <seriesInfo name="DOI" value="10.17487/RFC8899"/>
</reference>
<reference anchor="RFC8981">
  <front>
    <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <author fullname="R. Draves" initials="R." surname="Draves"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8981"/>
  <seriesInfo name="DOI" value="10.17487/RFC8981"/>
</reference>
<reference anchor="RFC9171">
  <front>
    <title>Bundle Protocol Version 7</title>
    <author fullname="S. Burleigh" initials="S." surname="Burleigh"/>
    <author fullname="K. Fall" initials="K." surname="Fall"/>
    <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
    <date month="January" year="2022"/>
    <abstract>
      <t>This document presents a specification for the Bundle Protocol, adapted from the experimental Bundle Protocol specification developed by the Delay-Tolerant Networking Research Group of the Internet Research Task Force and documented in RFC 5050.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9171"/>
  <seriesInfo name="DOI" value="10.17487/RFC9171"/>
</reference>
<reference anchor="RFC9172">
  <front>
    <title>Bundle Protocol Security (BPSec)</title>
    <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
    <author fullname="K. McKeever" initials="K." surname="McKeever"/>
    <date month="January" year="2022"/>
    <abstract>
      <t>This document defines a security protocol providing data integrity and confidentiality services for the Bundle Protocol (BP).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9172"/>
  <seriesInfo name="DOI" value="10.17487/RFC9172"/>
</reference>

<reference anchor="I-D.thain-ipv8" target="https://datatracker.ietf.org/doc/draft-thain-ipv8/">
  <front>
    <title>Internet Protocol Version 8 (IPv8)</title>
    <author initials="J." surname="Thain" fullname="Jamie Thain">
      <organization>One Limited</organization>
    </author>
    <date year="2026" month="April"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thain-ipv8-00"/>
</reference>


    </references>

</references>



  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA9S923IbaZImeM+nCFPbWALZAIgTT+BqbJkileK0RLFJqrKn
2tSpABAkowREoBEAJWar2+Z2r3fN9nbv+j1632SeZN0/d/8PAVBSdk2V2Sqr
MikC8cd/8N/P/nm73d55GCWDnVW+mmWj5NnJ9fnlKDm5bl+vluvJar3Mpsl5
scqWRbZKLpflqpyUs6TR6x+2x/mq+WwnHY+X2QM/cn65My0nRTqncabL9HbV
vk/XVdZOq3zR7nZ3JukquyuXj6Mk+7zYyRfLUULvqFb9bveo29+p1uN5XlV5
Wdw8LmiIvJhmi4z+Vax20mWWjtw8dj5mj5/K5XS0k7TlvfTfdDpdZvR4cSe/
veD/nF8mD9mSx0wO+e/Lcr2ibySzkiZTLvlXq2VaVPmKvzLPJvdpkVfznZ10
vbovl/yCnYT+5EU1Sv5bJ3nFC8JvZJn/jWaRFsGvy+UdjfBbyuPxhP0S+NNs
nuYzrDr/vFiWf8omq+p/v+NfdiYlvbUol3N69CGjFydXL1/0e70j/fGwdzC0
3x72D/THwUHXfjvsH/Tsx+FwYD8e7Hftx8P9nv+xrz/uDwc22EGvZ7+lp9xv
j3p7Ngc6Kf+jDXZ41N8f7ezkxW1t9gdHNlxvv2/T7B26l/SOeoe2pEHffhwc
9uwlg6PDfbe6Izf5QTf4se9/dGse7tmu7dEQ9uOR27W9oz23/F53z+3Eob14
/+jIXkwbbF846PfcpgyG7gt7/owGbrDDofvC4eGR+8LRoU39qHcQ/IjpnLdP
O6v7NC/a+eIB004SvZabN/APRtZJ4/zy4bCJbzuqxZ+2I9sbHlV/60g3nedZ
7ZOYet8WWfI6n+erbIpvTOn+jpJ+t7/f7g7xmypb5lnFJ2/vtIm2T5kBGB/w
q2I+gHWly7uMPr9frRbVaHeXxk7pJk4+ZstOnq1uOzSVXeImu/UBdnfaxLL4
X0k6rviR1c4O84Ck8Q2mdRxxg4T+tbrPkk/5MmsmeZWkifK0hB4i7vIxWdhe
09tXyTS7zYuMv1dkn4zbJLe0i7PHJJ2VxV2VTzN6x8OwA6bEg168vaEH+B3t
WfaQzZJqvaAZ0KzKW3x1lBD7WBfzcprf5jxr+h296iGfZMkkLYpyRZtcTFvJ
MptkdLVadEYJXbRP6XLKj+JFC963VUeWXNILcIDJmNaRZfKddkpPZAkNtSjz
YkXLKKbJLLtLJ4/yTl10xbOmhT/QWqbJmFamC59uZZRJo6Jzy2a8Ffh8Jq+m
/Tq5TsblupimTCJ4XVZM0kW1tq9MliU9VZRFe724W6ZT/4pmK+GF09t55xJi
jQt6ZpzP8tVjR077hypg+Em6nNwTmeLk6S80yh29k4/XztTOK6UjK9fLZNDH
r2nPZ9OKSeeiLhtayW9lQftNYon2ppXcl9WqyVcpY+Fi3+LtIt4/5YFTN8Q9
bXFCp3CfLZl4aLHJPR9YzpKAFpGMSbjRF4+T+Xq2yu/LOf2lhXGxBbcZvZ63
DHvU5t+nxeMkrWhUliFFsqDf5+NZRsPTS+/uZaC2LbOib9GbJpU7PXrmmjaI
dr5KDltJrycv6A15SbSIym4Or4imz1KLDqSkF07XRIyOrNJZcrvMMVIyXS95
uQFlNHAh8nSZTMsVMY72NJvkc3qGDhSPt5LJLOMdubtbEvkZtax0W5VkHpvR
9tE0UjphukHhXQLd1okDiyHGsZ7TVifVgl5/mysxTEpant3qkb/DkFstvUbJ
fUa0yPuvH09maVVlVcud7ji7Tx9yppBtV6KSja2yCW0OHfWEdpzOXTavEgL6
I1EWHceSuBHtL502XY0spuKGnlbS2wd7OvfiFePzvXHqgoz6gig0eUkMkcjS
5jrPVnRYwWgHGO3t5c3524uT1xiKT1/3CXSS0uQXKU1Yr16Bo7YtbQhHhlI3
uSV+3jxO/OjM11bREYC10nrbPCTd88W9419u6cq6FrOUrhqdPn2Szub0bxIw
D7JxfgmDTq/fTJibyed8+Wa4jvheWcwej4nsZ+lje1XOaONpEjioRbnEdGhr
eJrVhGia5xJPuJO8BamXyyp5c/LfaaTFrHwURhuwnE85iVoaiO6lrJmOZVzS
USgJ6o7KrEjh5QtVGZm3jXsEA5IIIJqmof4x1gPeg/odI2Pu1QbbqtHvMZ1a
5k+iM9Cl8TYJy63u84UTCvwBcXy+DsRL0llFE4dUnefT6Szb2fkbGoOPZVnS
/efH6Vf8O/rtVfbPa7qGvFtV8pqY7Tq9y3jdWUKaecKqeZU8e/Pu+uZZS/7L
gpB/vjr7+3fnV2en/PP1q5PXr90P9o3rV2/fvT71P/knX7x98+bs4lQeZsFa
+xUd1jO5e8+MvJ8xOcfkyHRDGzrOwOSWi2W2Eu49zarJMh/LFfjpxSWxxuQf
VQd/j59YBX+ffLrPCnkNU5r+lXaTROVikRHj4xs0m5H0XuQr2tcWD17dl58K
4ixLpg9sY7+TnJLqdFckl/f5rKzKxf2jKjI03fE6n61ERVlmzLMyMo0yPqMf
f3yZL6tV68cfnZKxVSNh+vyG8KbjxX1gWftVJYX0GaJyZY8Tkq+PTLCqgT4/
lE1m1Ud5J41FG0BbPCXiWogeUddxmEHRACJXlWcK6Y3Lz1l1zHyTlbVs9tgK
NZiCrkll2pAMRWu7pZsm52HyEPS9jT1vkYh0uYSD3pUkqXRHNlWPFh12PrmH
yC9EHqUsgo0V8BvuIA9pqNtlOoc2kT6SShuNnoYTo+HvRcGkr5Oy/RutrlQG
1L5NJzzG5H69JH3826K1SEl20G/mRIr8IJ1f9jmvIAmwVbzZRikZ5HypPIkP
jz8Ea1ER9n2qXVXK/ENt0uuZqq8QQ6ft4d0aP4bHucjojD0zXSxmyjLb2DjZ
UyV8Oq2SVGGifHDbiPvxDVvPIFJmdKhO/q2Iu83Ku0c3y1Dv4JPWHeP1TrPa
hw85dCwif6iUdrRbdEri6bss1HevoS3uvuKtnKcfVfEgkktJP4tebppOUo5J
mViLiqyaN9MIC4UZ3ciy/LheCLMiRdBkJ88FpGNMnih1TqOSjph5JVXkRB6q
piZ5vNIajMh6a0v5wd2sHBMfc7qqU16Pn1Ak9WIRGX1yam0GUoLmKl8z9ZYt
NJphBX5MZ0z3fvpNXTZSCfW7oluwTKVL0wYJL9ezDARDgngJekm9LRfL5fma
vs/rzT5PMuYJRLHQC9SEc0ZfsaEtphv6Ii+PxW1NTWQSKCuSN/PF7NG0C1Gk
V2U5g+ZPKyQRCgFFStCK38E8kcx53nOdLLOUDEaavEwPDiTCLxSlaQqpIhsb
Ko3MHZmRO+4C7SadlovV08oNfwoDy2k5cxNgA9YDAsWCOMnlkpab/EIz/M8q
QXTBJ9litVUNul2Wc9r1/SEuH+kuNTUIRtxuwlev+U2dSb8MRXw3kVtrD8v9
qTHZZQf/OGbrLl5gDLb0Jro1kG5b4u6crFdlUc75ml8/Vqts7k1Bx4NtaiTs
b/PPnp5CYyGgk8haiJQXbzkkjYACRGcmUs1ZZcZugiMucGpMV7JwHFOF+01L
IfNhvF6JDN/QpEZb+aFyZGggmDyvRLdYDG7ZqO3yxfsWtgpqeZT2lF9Fhzpb
8bZ89ZlhpydPjR9XpuK4k4lItKopBQf+FMyea8f2HE09S1di6ESv3NnZIGAR
hcxyp5DJk5XTvmWzSD+CQbQKr4Rjf8e1/Z+WmWgqqq5NaVtWIsjsEzJdczrl
Ug6W1f3acpkFTEroCCwM2ESbzWh7nFXgdLuzm5f82wnNyjgA6YW/3KfKPc6r
5KJceQ02UCpNiZoFtOVVy1AHNc9bQObVmogc37JVtcxf4Hg6VAUwUXZRujXW
+WdoopNOAHkutKrGfdZ+SGf5VL5Ngpp2hTUc+NzUJ3ebL+dQXBx370T3Lbis
dbO9FZrJjcBY37TIp5mKSLCxTSNcyDI0iJPGFpN5nD2SwpScpcvVPV6yxWBW
uXBTd4/8wLef5jBZFXxDHUlJQINNk0AmHOssSTstlB5Y2uEE5S0TkqAklvgN
bBzBrOmIyYjXKsGr1hfLDeITLDbYx6ocJ5K8PIn/+Pe91jatEB8N/C0mafsR
cmdG5JJV9/KJbB3kfiWP0EOdXreNneXTJjPklm/+KgV3kUu2ZT/8Udk+qmuD
VTdVDIzWyCKka8ui01NdoCTxXd7iIo2dtUuxxLG2gG+zh7/m8hMlrW9bwQpJ
8ACv0WxzJ9lIRYQ+WZkD3FYqRy42L0yyFXOOlflBvnWg7Gn4m4RMrjcl3Qu1
Kmjky2VJPGKeXLNcYNIBn+mzx+FEj/XsM4cUxRtxfnJxIlQnJnxA0rdqj9JW
rYscflOnTRLtsPxIXmbj5Zr17363B5/GnehkLm5w5RgA7RReCxU1y5fJgvS2
yrlSeAAsoN/tdzvJi58vTm5Ip61U4dFD+6GKfKiz/DYzRjZhXkCTpjnSl0kO
knQia3O8LD/S8GwitVdlm//ryIqYklw4DqoyxZRr2jsygkohMTiPaQuJn5NJ
SeI+zWdQFErIIL16timZ21Z+AQ6BjQavYaiFpBGJMVxv5Yw5CQsu+AzVox7t
c0dPkM76SrXiGxiBPy/LT6t7mcRPP18O1drwZlsq0oKVcnpJr9Xtdvn/qhzR
kYz54PpDTOuORguMyGjaMLM6RFv8XM3EA6Gr8yBj+452GIbVeknSL0MsRAQN
qYBEKXeYdTJlDYps+otS5u61D3Oiw26iqT7AQ5avaB/wTSaKonQW1VbH3CdY
qQX0ynRKL1qx5wfrxEe5uFQR6cPRsoyw77mF3ud/Ih7puQ1Z56nZDePyju3b
4k8qP+ohhXE24Xi2PriNTZnEzli6TcyQZOs8twsoD6cTVoVTuHivLv/uHO+n
rSBtijbjgRkrLXkmQUZ1tYpys4abLrwxctU/s84Mr3Vhd1/NFKyJaZ5OpzLK
Iyvlxjtb3sDH+lLuAnGQy4d9Y6H09nU6a5OsmXz0rx0ldIZ08iL9W6GDQvbS
NBbSwdi9DLuvJBoB7+Ev4B1VziZtWmRkAIi0pQ0Uhy/JyZJNcfAAaIFEILQO
ca8yAWcFneiKdyNLlxxr5NVmrHi8DcK1nknTFmb23hU74twKb9czjZrodB2r
p/+SapDh1t2u2aQQlSAdVwhNMHPiL8EddbsuhHCY5X6CoIHaTWeomks64zAd
ycOHHENW6wkrjvQyGNzq5WCCkmPm+0C/WTOb0dXRunlSzL/ZDWifgLompIq7
Ex7W/NG8pDT5g7z42l4MVlNl4v5VX1wlmkqV6VNk/JOYJ6X2ayEmHOpv2bJs
iz9TRU5AuiYS03kpDqP5SGgixXICx6Gy/8hVmLD1GPpWJb7Ycrey7kgN3DfZ
TPeA7IsJB1hETyLWCHlvKQPOK8SzZEulnfz441Wv8+OPyelX3cVbA8lw74+Z
VGaZxAtphRuz9N83x80T3sWNOHHguY2iVKHv9usnppF+v6dk+hFT5+nwLmSf
+U7nK7pazmbKph3ZlT7vyrW44mq8wcZlpYj9TnCuBFsEX9T23YlZhHqa2CR0
V9mcW+IFVEItofWeXJ4fg1klmJAz0QLepKRklGgMgESWpTakq3t50B80nPbw
7m+bH5xPsEHTlXrAH0oSB6DjwpHThO3HafLMz++Zhj2wnQPezrPPpCOzWI91
smrNgjjnK8S8joVCweZcoJzwi0S9sryqiVxIH6dWgURW9Ho+FnG+xUXKDG29
qNh4n7eVHZmz2as0rGnATSnMcOnZDC/3mbzxWeSWfObm/czdWH73b6NqdK9O
H6Jg1jtyEl5qoHR6CMKK1qNaf5gMINka6i5bZp+WxGqJI6yFf5hrSu41s2ri
vKTV0AUJNlk96aROLumVhyQZ1RgA+dChFnT05SdON6E5V+U8izZRdRn2NORM
61dZJQx7y5dIfM3WdMUaaTNehuk4ZSS4GjKdXrOVNMbNMCWCJ7/LQSQOsynn
1riULVp3pfI60FRFAO6frppGnjTrO5iYouV98TqV/jGIWf3/TF1zBE78DbN9
pGmTYu/PddfeoSF0+iova9qkYyXqkavWhgbJrG15J/Yru2bgDoc3EHknfDSN
rJlcnV8Rr6L3clT8ITBxREckewNk3QZZGym3lZQb9KVM4pw5n+onDQwZ7Sfn
15csHvIZh24zfMY+cI5W0uBNHpCJvILIi86adozmzrwhiIvBy6YKy9VAeGml
d38IVhpqyNh2Oq+tyr9yteDStkQ/ilJm6sGFTV3e+TzCyOBXw4FkLXcGHNno
+CQZWcIeL+HqabXYxtrqoPIZDIedYbOT/BSq2Vu9ARK5gTl9R6ZqSgdJmyAG
QGSt84UPNBBcZzIu2HRVIeUtE9vmtmwzzuDYDeoi6uAufAmiF4kG6l+lWqeo
+bCG2swkaQk8D7EB7h/viKmbBNjnLTx3ziGeAimJxG9uV5Ca6wV8eAgXaOQy
DFDRf/G1xoxDTazk0N2+OH9B//7IZjsbxkEYuckpu/oIZuotWHkRRAfdVFYN
k2G3zS7iQFNQDxNSogI3JuhQgiZEHibjl7QtKQsf2qjx44KzhqZY3Gpd8MyM
LIKTMsajm3PAm/NqPU+LNt1OFa5RdISZLz+IGUBCu3COhYeRB4XhDrHXgS3h
VGjRvF3elZ+H6DChLaFaMgKQBa4trxmGKCnp5XIqyjru/Fe09uPf4dVaVxo3
Da4pMbxA45P1HfH6yAq/naV3yTR9BIluDUOrt4o9eHkRmpY8VeGV4tWTtCLS
0ezovG4KJQD5cZy08IkNQ0QBiduqc9iIuK1EHM2L7ygnL8jefsqre14kiG9F
as+CH8g1oTOgeHqS7Pw7VQ114b0ur/zFjNNNvKBx4tX4jjrflqF5hMSVwKpe
Zsxhs2JaS7Oqkt5+i9PFxFs30ICoOeJewr8KE2zADjqXeMt2XxRPjHNrhfD4
KsHqpVPdTMcc7ex8+PBhxyR8J/mtg3/op6qDf+in+w7+2fmiqctf8L+v/bgD
XUT+wE2PPxqX4j8c/NtJXqsAT5LzU8uL9j/RjzuNQT/h2ock+dpPWAOOSxdC
J9ZGYYLzhemraGttA2R7psv0U2ERumxL8PACUlj1Zj5Ri+ZLbGwzVeBj9rg1
dTVOWTUxIFnLTyYA8HzVLhEb5+S/C/vz1wYyeuG5V1bVI1x2ulixOqYCc+fC
Rg3VOt4QN7LL+GNdlPU5TXixgZlDSZSQ71B2Z7RItD/PObSrGoyGbMVztTU7
iLSBKN7CioFcRCVMOVnQ1LnTBDv+5yoIbUlS8RLe5pbcbq8L031kR0gl5his
EGHQtOXi3rZALLi2sf4OKImPikP/cEoUK5mhXhiZodL6k3OUVGdv//Bct7yZ
f/0979YrKu9GRsyTb74375ekn2IeHPSr9Eao114IvCJLFB7HYjOpyeX5OO0h
ZHYLLhdgTt34lM1m7Y8FsvKinKhWcvrqxaV4+OGCT6eIHyAdrQCNNGElQ7l6
QLKb+J2XmcsotDDHjz+ef80yGNHWGLluTdLh2Jzl4/A02y5rAJySdEi9mnxh
ns4ogHcWCegLlAesXMqq7Dsyp8Z0fz/+7nz0UZIGyT4yns/1cio3zJuMQ4r8
KgSMWC9nb5ndeZt+y5zfzmqU+cGwV3esM27xPmSHSxxMUiHDoQKuYin0bA+g
vsJN5mt8hs2yTvLO8Qo9mzayDTfz7FlFaG3ZFHb9IxfCsjxoOGeF0V0Wzrux
dcdIPapNfNtYoAAJDcQrOd7YTzV/q8h54EhOc5lr7oOs2p7mCB46Qz6o+MBY
yChbbJm4lnNQdmA1F6SfcKYe6YkzKEic26MekMBNYjzBpy39oBlax9HVUU80
kYJavqnbTHECWiKh5+ouuStI2rKsQ7rlpDSx67sKstuH0SNRhr99u6MqUd/H
LK+Zd4lKc1OSFj5K/J/+P5FilDxPBsNuq3/Ybw3291tH/W7raHDYGu4P8P/B
wbC13z1oDQe91sH+Yavf67WGe/s7l3Lqo2Cwo/2EBjs4avX7h63efr+11xu2
+vvD1mBw0No7GrT2hoPW0V6X/i7P/xEhdff8/pCf79G7h/utg+Gw1T0YtA66
R629vV5rvyfPiBQZ2TOk7tAz9JqjYeto/4D+uy+qD4IcuTlHJpz7ypUcbIdU
+W/QwRGkaGATmjA4NWtZHG/3RAAI5k3gS7T6FLFNck5NIMpBIg9nBNcSPu0g
SHFlIdF+kyITOVRis2pn55f7zGTsheljLRXlp60wc4l0wFSzF9gXIukGItVO
1fVmczHBpHdH9dluB/+Q7rrtJ9Nn/dbhTjBtk+Qq71j70x2jGzAa3dKfUXfU
3aUzxwLnskDjCWO60B+Rts6lk+8tzyZlK1VYr7oYkM3kk4Bjn6y4mbQozTmo
Yz2xXpFj1WhbvOE100ec4VsK4Mxuw9XCwbtNtXUG05HM2VQymiEO3GrggTb/
VJazn5ZOg+yVl6IbV5YnDr8R5KQ3/uHyhnSRlexatjkswnK5xX4OCm36nX7T
vXnOtrGNPDSnzJTUD/PDBQbwMemEO8RAzlwcRDlOfWpQlvyomhWjUe2v29p5
QUP4OxVOe9BE8O47qhIT+FIlE39z4+yKikzYRqOgcChqXm+Lj04E+EZgA6Fj
L9d1uNWj1vMgfOHcM3XqrUSjshc6FVKyYKqcXVczdrai8Es2gCgDlfE+y6nz
zFu6tVwndb9hX2KK0hMSZ7aJr+fGBVrO0A1+hUR8tXrdr8XlhNRDUeNC0Rqq
xvVbYpVXuCb4yRJldrGSgLirbCYaAGn9oeeFlNrl865w6t/+5//x/3SZCir+
gX0S9aMWwc6FUeaGqHwCGMw1WjUpClqTw5xV6AVuEa415AEaG3ul79f94hno
HjGp8yhNi0iZYraZv8pltXWXmt7nbphIh2xkLYp/3/LZinDUqndGUgT9ZjMZ
2o4yb+lsoxQNniLAwe4hpZnpNoopEZRZsw5ce9Xm3jCfn2gqmlXx2r5s2TMV
c1JuRaJGopps7eC0r5Adp8lv2DnOy1mYAWO0Mez0nHrEaVOTlVbYBU+OwkR6
qQqhof/BttTiLSTKIZT048425kFvaSyf//a8et6VxGaOdGgk10/QhMGK0yl5
VumsvdxYDxcMhNG6Ry8kaedCh2K477jmmtEjYxKdaPAknrLJF1qmlTowNbq7
5jzDwTR3ZUgnWCzGygaQXWMap0hVg4bRJ8ccjCITM10IhekXLFeQ+yzpV+p5
gv1QqQoz9fqVMybjKCNEpT66Ltj0h89klXFAi07W3B3wp8NJrFoQv2d/OGRN
VSm2v9fr9IfdJGnY1dT8GjZr6NolDOLQdA8e1B7sfc+Dvb3e/pF7cO+os7/H
2msj+5zyjRwlP5cliRL98mAw2PNfJkE+iL/8Ylaup7czojr18mF39zTVkx0N
UCA1FavR6x/IxdxFqZxuZFO237YVNetJ9FXxVaWFySONYyFVxV4EX4wlxYFz
VqHTTS2px8j9VIVWVeB9+oFrDzghMwo6eCcj0glAfwjsTJHfKDGBjhwuT7+n
Cu1XnLa8mefRCnpNPNv/zzzbl2cH/5lnB3qA51v2E2yBlfd2YiWscHPK2jW3
mm9GbQ/DcEr4rJaHEuf45eRCTvA25dAqnediPZ4xg7DcU85TrrY9TaeW/fTz
ZVt1dbX04drH18VpuhbjP8u0EHTrWZvFFKuCPMqlVaH1/6nRH/7toC//a9KN
YFutm2TwDrDa5wjR0xzfvvBVZOANMRl2i7tslRo7uV2pe0VMPzpQugFWCbOY
rUUBRgLbH+FBvVZYBibMV65wsdLiHbgIw8ukR+r8iMsMexRgDIHXQeyIjylc
AsJHuvbb/E5REiT2Ey2VFPZ0As9TrYgO6gx/hYMeHAzdiZP35ukjin6nyV1W
oko+F6/qFDnIKMFpaWGcOI/dXXVhMzbWlrTHS5YXFT3uS1PtpvpskLLkyIDX
DEWfYgVB8kA1deoWN4LTj38LPU4kPW+JYFdA47hIJCtAg8EiQkzyhocgPA6l
V/1Wb9BtHXT3W8NB3/kJ9ZPhQWt4OGjtDw9qdf6brI8ltovB6g1NQ4c1ssRv
t1wxJX+TjfuWqB+eiyGqRKxcV6T8Wwkr+GA7hUfVF5X4uphHTDVeE5ERfkV7
XHAp6+mbP3KhDfspPpW11Jki0wh2FjiiSQ0qK7nZ8anT71QK0yKTk+Trf/g7
PzEkQLv9jW/iO575E/utmNn+b+3/mvzD65ObM/wU7JB+YfPzvv9U+PKF2Owx
P8H6YOtXNWpw1b5KfCU/TIY0uxlQy8Zp+yTGodlYNjUIAy4Jp+tU9+lSuJA7
1CCffdA56CRX5xdnyaUmmTjy6Ha/W9KHX61iEo9rEdqWtHf22bJ6+OVNHDry
I9IxY3z4Q9bZeZaMxIoKEntCvNT5XBnnja42SSwbC4KH1dHzf7i0kmRhMxFN
cmE6MYgcDs9YPgbuZ70Imt7j5VaU6NOpP1+pNslJgKiFYreDF4ZjlhFc9Sd5
NmxM+pElH8HABey4DvVuc53ja1pg8sIFc0g49fvhmamqoGdmioOcWfTVSitt
jdH4ABF2VqbAuys/yf7xDHiL68W2IqA5zmdeU0mJCUY1kSJGldcwdm6IK7iC
QtmauPyY/SePG1wSLJwnP9IEYKQhRSpFMFojKG0cNtnue2rTA5XFxvJVG2LH
TjhuFplycOjYZtNmhDudhmGRaBcr3S5faaGftut7jJDOOEOO4mfOfBf6An9A
ZEoilqfpKm0DhcYvndf60xMr1PJTBi9zudZVOePbpS6+cVrlIpmjNdlSEd0U
lcWjL/DxzzaDqsfBdKHosezjQT/zP3VoB0s50VoWq4DLfcULUvHNUQgoIVbk
k5fuzKNJginUTjoMHJKVTPxg7jgFMxV7E3bf4jcggkQsbWZ8uFk+u4gI+oVQ
poWYWOrJm8RAD97k1Bp7k3iRDHaEsVlgr7DXe16ufNSaCI6+oVxmyz7qkv20
jt1UgnslGalLSXn6yBlw7h5CxDt8pjAFx5jSEdfqCGtFTkhQuIktiNxSbM0K
KOGOpJDs7+0NhnW/WH9vj/5P11NHU3EScfBY0fCXWAVAJxh/sH38QX38yPoW
QoObxOlWvW4HfLeNVIHkGhysQRY5zxY3orf/TXlZ+3ZNZPrCzuDat7wbIwqi
uPR2ttYuzy9P6pNputId+sZtdtgdjXZ5ETwth8Ii8/qUcmo13TDO/pzlYySV
zTzeiCf7fD7Pprl8yllXdLF/05RmIE6oCe0nMlINwf3XYkQvyvkC13w6Cvdl
5L4A3em135Ltlqz3IrGHkP2PuNd6VtFmqg6hHs/C87fF/WOF+BydwUO+XK1R
2kjM1yVsP7r8tSyU4esqws4BqwJjZ7nEJpb6cjgbA3kyKkbht5tweMkCEs4P
59ynRRmPYjnxH/MgW9MqMu6IDSARUPOo2OO3sf545kpzRZbf3Y/5AuQVRNpj
y2ZZlXBEBoVi169PTl6YvCxXjFwpqdghrtmwyS8KFQ8nEFCB7HQjzcTRHWiE
yF88DKanC4OLmM8fY79x6VPbzpilioABlEWQmWGuik5EVP4x3EOfmjPhZKwJ
ai/DhZLyjbC83Ce+73zBRkIjVhKGOvI5inbFoCaNt8hmQU6PyzHlE62HsYRa
Ti+uHVqfYHs+pPkMymZyBuPep7TyuuRoJajEOEYpNmDbHpnGSfLHx/q5fPhN
Vt1Lscy0/aqcGI/rD7/bIIi+WuNucxs9nbbvaXTz5oUq/00gTRWTcmyFi1WQ
ZSqGodCTygL+lfMiyMUtSiSlxNsr+z9ieqffIpPE6H6crlazTKhVCuu5jgSX
ZBVA1lQ5MU/inVlBzKIs1G8FfsXrhwQeqQdvpP67mKtho0UH/l7/HHYvcsmJ
l4yspumdqABkB+lzbh84jTGVZ++IPXxKH4UIiZ8DnseHHYPyNT4sqzh3kR/c
OfxKY+ae8Wp8tvYedvKJ3SvyC94elJuQENqXcMXe8Ra0LC4ofrQ0OUlQSqVW
M5t6uChJ4sIb525qLLz4KHl/TpVoXEIevhtwoODur6FfB9wt5meivpyenBpj
EyULtbLCmN25R85LLgo137VTqjANX8Eul49ryxEqOYlAYItpHVPyxJsDESyO
YRWtx5XOnHE7Ll6+vXpzcnP+hzMr/gqANTzcDi4LlySlErEKr3SlQJ28iYzv
uMy4rOhJaMqWVP6yjmZYHvRFLTMuNyM7akS7IpO8ejLWydLy6/gcvPeKz4En
bSv4CJassUhIjc9FjZ7VfeCYs/WiLtDcbwrVa9+q7Ftb/WO3nldI0KoKr3C4
cPPg8aJko8QXq5oI6yacznYXOFBBPbZhQkDK52YkwlftapEhpQT7jfGRIiwJ
KAVc3XDqslRlhldwRXuIgcdQb96jR0q1whfeCbBrVa3nCyGdvIASpQAMlpkK
nl3D8yI+m2WLtrisdWtAvKc3FyLVZlwk8ujeCzQAFC0wqsKaA40eL/wfFXP8
PfKsNGwp0UOSw8o/wrDP5J7Io6OavocXc6Z8UX5C0XrlKBwCiotCJc2oVhYI
XIvllsuE7CAmgYB06OdVPouwb2JMGIs0M9icAyIR64/5RxC4PvHYsGTK7+x8
cYR3BWH5RdnHF+COkIHwZedLu912/6cHRDD3knZytK9GEP5Pz9wEhNlQoJ0v
yYkER/jZI+/+/pJcZOmyjW8xMFAoWr94kwpPHQZPvcirGe3NMtlNXuO/9S8f
BV9+g7yJov6d/rCnyQFt+vmotoqXKPlPXnA9NrIufiqnTNb1Qfa6wZtOwcdu
jI8JWV5BAkXPuZPQ5GMaGAfRYEoYr2ezDDrdjE4ydVBmC2zg3Tqf4qqVlv8p
cJgp53ETbVWGi5XBQmao1kR7Q1RBAv1cK6FDKDwwnNgn8VDSNpOoyF2Jm/cI
C6KOXgF4FAQmISBQWj8vkdhjxtggRaa5tJVfpYA9KFYGJBAvLqwrLjWlCEV/
tWwRyyZbKPc1Hl2yJ2MZsnDUpfYd8+40xcUXkF/D0yW8ea/P3uL+/kz/rdhG
neWAfy4q/tner4Xabj4lh5vAkqMQIhe4FNM2lziLppysgQ/4b/vd7pxTcI1R
3rwAVpgBShgO2opUKFZpN7wTAsrpDEcPsMNvWaoTz67LrlyWhr9LWCnW335T
snERmhqd5N/6nT3eVBY6S7eCjs1yni7ZjJ0d46RZDBCpG3SSr5sM6jZETYXz
LwKGEhLZXJ17lAsV6w+oD8wQn+7LmS2b3zDo/q1OXXfB+EDDc4dw+emyqi9/
2O4PGYQW1a1F1mZNFCJRi+1RTFG4M+cYk5bFvVDEt6LtT1IwgwPoMl/0aAty
0NtyrWR9JG1JAsklZGuc97qiK5q1iWbaKiKPg82zdCxRhg2OIK2rWdvUpULQ
hRpfBwRvqm/45kK5WyPgg9jTk8jryl8URVywinGcYmu4Cj3RcDgssY2T2AYJ
85BRZHdqxYKuSEE1JsRrxD7Z3DS3BWp0hKqPV2U2UAZV0JK2UK0ZukLdnyRh
EVbTzCcppqw09zAIq9fULouyymNBYlTkjJLtU3Mo3kFFuiBRsmRf2pPatCka
XmcJDHCpF6gCpxezp2kGxa/I1LcSpNhhGAUgVa+IJj8pPm8qPGPl4t7hHKPl
mOYH0CWFr1ttMUAC6FYnBjdlFpI0ESr7TL/P585jjCm3QdIhsFJ1HMhBNpur
KDAUCuKavFTmBCIIC8BR2sGuE6IQyQthLlFPdBTYkK3SyckzlmOCa2yNAja3
Ro7VT43lZNvdaXgEjH+y419M3QDfj8RHqeJsW+U8r5sWSYb2sKOgbmJ0Bwql
VadMXI1+Pte8Q09hmgsriSJ8d6yjgpyLKxlwFX4ePL3xH/++1+k12byxeIty
YSXP6gn6pItjUMAsb2vfUd2eE3/C0sskvWNzWpFEMLkASU8RSTh/V9QsTUF1
dpeb1NT7/1hwuOJVfcD8qFyuLZGytkI0Gi6JJHooUhXX8QCJZhls+cobw5s4
i0F/HrfFLh802OvQKuYzZX+S5loCgp7+2k6ZZOBJYV6VCuExnxcPBKq4G6Di
Xit5wsUHFP9HX8AAE0ZuI/s26OIE3owYtRWiPU6UleLxLamdllNzdLB72CKz
Af8+4n+Txr97+D//x/9J2j7+usfSytvM5ipqiZcQ8F3irDaq88XqPKEqzCos
JIRSt8z9NkJl3jrf3Dh5dWyOJbxI3lGo36vBGxTUd3FIeMgLsNE16ObhHNJw
XWEPD+aSXHISuQjE+xVCZmwU4gsVgYHAwyXp0UTXBrARPK1lS+Fqo6KQmn/P
Qcf0mgqmsGJRuhIwXQF9DU8JABmmM4cvsaAdnSo20bfMqEHOKU3JNBrBVj6R
MczAMcj++j66Qo8LNvihBUwBE5JLIjBunOPoTS+BlbgNn0TqWdQhL/hWbQMB
En3FArCK06q+1FD1hodZ+gBIIMc2HJsjpsWnMky9zG9587P5YqU+g9NYnQhV
VZhkYNRzxnAr2FmK/HcSNHwWeTYR+NgtXxQJ6eQEybO2aOvtq5ubyD8kpFUG
jGClnUqcI5M9WqwOVJq5EThfT09OlTMNO4MmZ2mQWoDqKQB7wvOy4HJFE+dX
GTSmGzYk0Elu3zUr6DHe5rxqHvMUJuaD4Pk2xFJq4nVqg5hdYo0s1vNk+DnA
e1bQEDNLMIwYGzpOGuG78ZWHpqMZQmS8nl66iFt7wlADJLrgD/uPfz/q9Hmx
eUGMgTlHuI4qaVxZ+ggv0yhOmBxMp4QXKcEelLFFhaPh4UiqA6cV0IY+4yee
ifNRdGlZj0z38s3NO5xFr9855MlhHCKQ8xdv1HK5lNqOm7JMfsq5idkSBUPO
685pJe1bVsdot3AKpsiww5Bf4COPah8QYcxmMoEbX8rDaaoYB5h7mBSpN3uY
1Z1kdpANt/vu9LItY9vWHdcfFWStUKvCh/JyorUcyNi3pWJ13XKrmsCWdnC9
aqR6Ky40ZwWEi2dnpGj2tODwTfO73DZbncrHnkBzRGQmK+8lEHdCy9GeWIwb
vcIgf5mlaB+LNPToyL1Mp39aVythRdLtKXm34agMn2Lep+mF05YpvluQur/C
YAEsvIdEKNrVH3/0WaRxpSbp6HyengWqYHSIoFCIEbOvZcIiXS3zWTQdcP2k
4d1FzcDAC7kXrrFWpriQU6iX8NDitBKYDWOMetJSGAbXbXxkXtqpK0iim5kU
FlV1jiivRE5R6YISvoGI+HXNpRyej0Q0j61kT4Z3yFtav3RfAvtV0u9CfTOb
iA75IrgPNcz5xjY77lh2wmfXIaIHsrSveiOkKZqnFoKBSUAormoKR6gwqD5i
yrrpUYVPhMK3f7CAcSPr3HWY/jQSB9w2qab22RvMONlv1JQrRtOQDLVFWd66
k9ObqmknciyFoHzemyFMdOh78sm6GBxb6ugcPCgDEHpkZSsJqxlLShibPRHc
HZ48fTZu9GOlzm03WC+TjsdeXd2sny6vs4mFVfrv/fWqR15cwyyp2WBt6HFW
plOEk1LZE+SJYnPOGRt59+z6UlHD6HoRAapN5HiJaqeqxKt11DRupG09QhJv
1VRK1RSlhNSnLq4BnqmOjpBU4Njx25cF3c983g2SRsKMoMnycbGycoY4lyOv
FG9X1GRzmyCR3RGnuNtkv1NAhiAxu81d5rBRtklQmV3fB3HWG7uXUaykHJsU
r8SW7w5KFm5ug8iAJfLSrQvyDDer9/RZAyAypKEn/DrHai+Ffpk2qkLBGJiJ
ghW1nUUReDHozkimDydePYh1FvovoB9U8nJgRGrukIwYlkEuiBdN2J2omjAi
/XSZspE4M6osarQowZog5Q3TIHMjDBqKkychcQJAgkrrs6e589Osl0upvoGK
jAoUDXZmLvnb9SQ13/LNvUfNX7qXxRKRA5R5FZQU2wNQrdMHwboUEoY//D7V
mh6pueOw/mrm4F4D1r/MBKPJ5SAMOsnpRhLkjSRBapixoUl635UKFH61lgpU
K3XUmkRNr7G8S59FXsOO4IzH3hHnIdP/d/vDpHFzRrR2cXbTZvjV3tFhZ6/X
QW1C/CljGUiLA66z69GKa18YNAWQNuxgth6zHF+JnJilADs1rN9cpL0YVgB2
1+omNoAzBruZZKTO5SVnengHu8qYcIe2FNhJNqE1rvTpUkH6X72GoFY5kJxp
sacmJ+n7eqMRb19v/7BD24SqUEwWZaPSyzAJvtB0D/Y1iXNAA1g4OXi239J6
RBtDvxPWl3Kr3msHmm3oMgwOFyc7Nrw92NQMDIV7rwLQbZfQVn++FbeIgimF
EQVM5HC/LykE6TRlq9mhK6s/3Kex43boxHud5O0D39Ls085OYK+aH97lcvrM
zUzxsEAmETSJAyKSVFDcfEHtwj3RHAMdkTESC1E1fF9vqdbRS1fPNyM9aB+l
ik3ZgSsJEJxExZbSd0JTR6sIhAE7YAlOmsffiVYdtPupd5s1M5qXgy8LzlSQ
mCF5aYCWZPt92+RaAeaOx4x5kzTeoK/StInHO2HWFi/HvTNqCxU6aHQHw5Pt
d+rQbsnPLvE0LqIRL6ziI4oaaTuIqI8LmXOt6DyjQ2ZwV2ArqKm+cB2DR+K7
5e8kvRHfCyaTt4v0n9chCB/Z/t4/1OSsgxMFmWoliypbT0viuFM65JB6z0/j
K8DYadW9IWP5rFEPU9Wq0VYLPZQnS1LYSVUxGLIJSW8+LGBJ9HsHdoXeK5Ox
fXpOatm6YN3k10G/cf3qpN3f228o1X754mfwaz7lv8ubfmWliP6mb2k2Aygh
h+LsILZC6DCbe8Ods96dLUdPNxYhubtsFYLxyWjNAAvvgRSgCLHXo0eacHK6
fAAZLG3BmFw5oQO7pDNGFcPk0StinYAE+iMSt3O6dKwcXcmRhlRwqQ+fmT9K
aSFSUCGmYnpAiARwjY5QOcxG+ot8OyQvOZcHBvjqM6LMesnVyCd19KZk5Sbq
dUq0Fz46ZJymd5ZeTvsoqrHloLHSpWn1S2nuYpVParFyQdpSHZm6MYMRXeYX
7VOl53BPat5T7MgNbLdP9DEtAeXaSvU0iO+d+PbdOSA+WPltetwUEjL04KE8
xzmR0MrDu4P67aEgwdKIG3TP3/31sEEf/WN3tP++yfTMfxnQXwJyFt6wzQNs
IB75ylWJbhBgK9aKYHUoeaB1I4sLg1fed4YpsdKzd+ft/aHLjBNALUu5FEWG
gz3SIsw0V2mNCyijmjmklCZpcsYJEVjnSKOqfEE1EmvhfqsM66VhF9Nzo2YE
t/c8CXK9kO/VUJxPB25Z76ZeqxSMmLSXGbQDt4mx4B8qPej1asHZFEv7pC9O
Bl4pw9p6VhQlSLl3GxwsOG0tRRVYOdrZBAY7DZtPrXTD39Gkcevf30OAyzXU
saIy48XyZJvnTh8dJ8GTfQmN0aRFw2BkSV0JZqlQA+xXT325POwsSXikH/q7
AMjje4HVR3G+eZayc4svhUFaYm7sDSeGzn041lNitKG4ZUtjrW2/nA54mq00
caBBz5LS95OicFcyc39mbX+WeptbXvnCBlv6yNfeIuN6R/aFFcJcB2UvHGuq
4F5ubCDYYYlOnWxGCluFHrEMYPWN8R20Dwjkwcs0mR4zoW0FHFUQlgYJpz4o
kvsioridoIQg176OMtozX0IEIrGb13BUF5FcTJwB2Ya01xTHYjmbCRqwSIJY
S7slETQmzqLm+aYGjrohLuu07iTK0bSF7jZNhiFll6v7afrY5qDdtPwMbvnI
Vax3cC+Aj5estwskvc3Q3wNtO+AyZQJY4eQCPFZsfqVLT5KqfVUKgL0uciZF
vhwru3lQyPhOjZIPlw339mbyb88TTtAlrt9oX/xTP9nlbw2aH0gCr5KL5z20
jxsll/gi2Wf/RT/YCz/o73UG9sH+XmtvIOiU+039fHCEz3mz97r/pR0s3poJ
XfDXqn9erhr9ZEZ2avIjZov5HRwwJqdgzXXQi2xZIMgzQYsONlVudbMMnYXd
KsgkSicWbi9UJtN14raYNNvJBFged7NHBATfFm4Qif6F+RS32ScjBtmS8DxU
ZrVCwyAsynB3J25LIOK4E79aWtqnj9ZZ+ytv225g4WZBi2D1o2a7CCNVEYtv
luMVEimcSsV2krsrnfqSpDNaWM0Ht7XnF652LSwBNM6cZ77vlTYxoXMAhs3A
X4kN3noLRwPrAnQe/h4j/CLt2LRLo8FXWLVy2GGIpNWS34AyLuu7BgvTW5IS
84G1yLFBuF5431bJ674V0CSN/9rrfhRqbJpTs8rulF9xzbh9E1nQxkgcgUZz
EghgrvoRJiQeA7rBjIuLxB++NCtGoGyXt7doNiRce65NQFUw85zYAqw4ItjS
VkL24bjOm4iWHjxPtn6KgdH7FVYHJL9qPZ+n0kdR/KaHnYNQ3g4jyrlWmF8t
1dVkRow7KSXPmYE7fzaOvil/thfshj4bJxuYLvrNHZL4lyaTifzYp7Ax6g5P
k8Ey9CpFchIsc8sze+ynFfDObTfQEPLUzBCPyei3UdXc2Q+WaBazM/L1KgUw
IPL0zsHGQpxJYGIW44/udw49erKkB08lX58uq5kBmbmWDXrZx5YhquFx71tO
tMij1eMCPpFPyDFTxVkaqaZLqwf2Di/n3t3z03nHKk1yDap53FZMIl/4ogWg
T9WSkN4ugEvPu60EEIZfIsTAL4mF77Ppru+HJ+ZnAMeZ/I7yFPYzvtPaxC/J
zwLK0nAh+ObvLVdBmpAp7s3vLFvZ9tBT5Stbvhui5nwRlJsYueaLALw0zv/h
EhEqe8xXv/T6f/YmhZhWXzzoX4TFRx9ESFLy3KGfBtjA4M+aRgyJ8CWs29d9
gPPQf3fPKoAG9Qqg3/3yMO3xi5Q/73LxM5cn6981t/G7y48mrvxo/D3lRy4f
32hFM8Tlq8H7/C7r+/yo9mrW7OW5YfiKKKaz6yI6fDMCGER5cC94ob1s+LUX
Hm8rW7ax7P/xeBiTr5Zrw+Bri78wd21rTi+qdHnqx0mADVAlNCHpaNbdeJPM
9CfX8OIL6wq+/4VS0s6bsnKqG3NVNMYLOzdZ6XKMzBWoiwBRQ55BMxFhkS83
cCglRQX97QKqdjAdeBglkPBGGlgrF6xC4/HyHjE9r8xpDFqaGg09X38xSwUQ
3nP0P2Arv8hHqHfTwjS5zU/x9Q2W/sZY+uvtQLLHroL8L8XrhYVbvk/Ldtcq
M1hT9plYX5MCVin5+uztblwpVgdi+B65YKMFFVnfGGabpLBREML9+vNbpIch
uH3xUGh17CjPQ/+TUuR3b/8T8gWgsrFY0QKP1lO4rH+W2Pn9894qkF6rQJIu
urK92timBmY8fnTQUn+ezPrdM39Kmr2CNLt+AiujJeUCmtb/bTlXAyRoXHnq
3CoDH6N8i6+LwFricliAVrsFf2nZuCUevxmLr/7/IzWd0HSs+PcKz9b2ObN1
gdC42AqvtN3JowbtfUELMoZmmo5oXVG0q6DvWxV0jVPj16N7yKPScR7Be66W
RJm99mmE78isltfIgqb1WLrRF0uHiM2dbbXyUDvdZbdksN0IG2qDUzS8eSo0
ihv45MVzmmV8b3fqKndUhBGz1UaknlTy1pCh1JlIUpO9n1uQB59VFvBfic1+
Vkb1GeOZaHoRX+pdbf+WQNB+5vIK/PuI/80c5LNyj88or9DB3rmWml8Y08BK
Pkk+l6vkMXONDo59o4UNMBEmul8sXMfSxAPla+NuDt6GQGVSDmgYRK0EHVsk
TXb22KadY1IW6pLceU0AlZituhAsOTiz8sIc4B1bvPMO4d5aATCCWnimApXG
vWXCX7frSLdbBwqzZW2c6JdPPowKLEFf1FplD7UrFR1adoTwZJhTB0h97Uke
iDcGs5JG8A7GU0rRdC9D4CgouiXRYnknHTsDx5udRCInERSp6RWxtuwypWzq
qwtqxUpBD/cnaoKs60+6gR2lcEwOpBMakwGRQERaIY6aaNb1XBrx1JMbdcOw
fw3LgtaXI2HVIJSRLEpjPQvm+gwreYYZPxspcpYHODM+PMtShSwLd8u6KVg2
nd+B0k5+y1jivU+3juSK3L4fQ+oJ+CbZOiKUrzfDaAVAcIOmYVRaKGazQ4bi
r/2nGl60BLslaGkhPl7X1mJLM82edp3fDkRYa2fxVNVjR2VnPwTXUhDmEyfF
qxC/MpTWn5uhnfcleCQUaBs6xRf1es6CNohexDa06730twn6S7q00Tu6/YtK
dAtUFQ+bG4pEj/Wes+uzqz9Ya2+DB+BKHDfU2+vLl6K9YlDBXEcAO9xXA4Gz
iEu9KLvxtZn0v28mMYpF2xck/cUmNvi+iZ1ft+l/f9k9Gtb0TNIwmJwMbRCz
AwB9GlFY7ZnDrdqqab8tW53Xw7+id8KvsafdhrTA7BVKJXBl9ljdlL+7Fs74
Klpu038fpPOQZaUcmjzXjkTWd/RGoI2zoEE6Gje0Z1lxx/Aywy5av1TNlsug
CDVTgc6m/0wkfsoABjMuOeGQwkO6BMaLDVZq9Z2rKQ/eDA9OruAxHn2EkzEa
t8v0LkiVNutPh+NM20V7/Nim//AdnYi5D2mrScyCpuVrGOWVlY8hOaZ3QV+y
fcUWteK2h76QxSIMyPjqd7vvFf4w6W4B1u9t+V1/y+8G/HiPPhokw2Qv2U8O
6OSOfs/vdv62/Wf+s/NFaQSxC8B6mOfM/3nJ2t/rlLTAzUV8+V8xBzfapRTZ
kC0DGrJ3JNFRYW6v6PxfE+2t/pfPQf9cSwUJiwuVUfhjwqn5F92HeA7a2NL9
uqG5z3/NOfh+mjoHzbv+a87B+na6fTDY/7/GHE4DnSogir8qPYRzCIjir0oP
4RwCovir0kM4h4Ao/pL0gAD2jz++RIaWR94wdEL5PQl1TmD7VtTBxPKXZAi3
AKIhh777ILwaNW4M711+i0T6VQ5rShtLk7Zzev3iMvnb5OzFRXNLFUFtLNbj
OZ0F6FKIoq9yV8IL8+GmvN7FkDyRgPmTFtNV3xsKyIOOzzz3vy/FID178eYy
0dzMcDq+7XYoTveHg4P33DaVlYfK2dohlKyV+rEbQptYlz6NXWrZ1bRn8E2r
us0Lri0U/CHhIA6K+1hK1vLbZF0AeRJLrUkfdnghACT6zK2VgAZ9rwKdRmoe
JquM08ROLVtUzQt8edhto7FepIKhmrKjIA5uhzqitYZST0jApYIrssbjInMl
DoEDyKf6mcL1B20HweV/3uXIz+HN4ZvYz1VxIqu0IRDNXHPDfEo2n6jkawiA
8D6ZazeM4907oJ/endJPwwH9dCUKHP1tSH97qdpdK9k7or9elOGbW8l+l34Z
3u63pvbtdXf3evTh2fXl7smrpujKbVc86qdprW2Dpg7OtIw9xGyURB7iPXQD
dAmsz5MeraAh+KQhiDsbB00hGa+G6BXNNHlUvtlzPiO1luEPLadZx9R8TkaX
7GhtfZHAL8VIGVXSZcLYuM7+na5R7s3NayY/U6WVfEyFUXcFYkpwy5OpSz9q
B0muNIuqZb0BPnJ9+UauL9/INdvBOyKx+M0XbYG2EqxR9FiPbgZ3Gx8lZpEI
Mle9NbntiNQ4yjetZNFSZ7l40rBN9DKoUdXvJFoue2WAvqPkF6byX9IqOdUy
YTOAhpK/FGJ+RXW05VwKKARXBqcize0U7+X81WvrY+isO+UtgCN8VxiIovZe
lq4DW8w1pim3L3Sxt9tdoZNnq0HUUgY1ywtFPzmPMNJaxPrTO/qa3dnk7e1t
la14sm/KB8lPTf2nrkrHFtcImcpzuv/bhNMPlUuV7bixnEtNXW5WuG5F0CBX
mf9Y0waU9/lSUFCLM08VtkCGAyrfIqMDl+x/7fokUOvRFHyOIicazMezxzaf
iII/fVSmuKB9WmdyFTu0j/EypGmN6xabF4XxTIFv1qgqu3Clo4ak9fmcApQI
AJJmILASzPlWZVubrtvXymUt/VbGwbdOX3J9jwO28X1O8JXb+rZz5Sk8lCQo
eUarsqQ7zHnjhZjtkuCnLZnWC22Hjl7VsflOElbwOlvxcepJBtxn+4mlc3rv
Wqs0pIwqnm05mayXgrbmMzLa3HuyHWRlAEZfiFzp8cV9Rue3njM161XfTp0O
7NtyWnBojdd9RTUz6Er3wbCZTHRw55OQJrtLXofgaBh8641QJdwZes3tYe21
MUSzmjSi3XHJNe7ELzgmn9znd/eKCGraU4N7PMwXCFmyBIJvj98xXSNdkuXF
1ESVFoMB75A2kyc5psFv85VxykFn43ZXoQvK6WJ1JhO4UFIBeApHMs8Msyr6
GpzOFoDY8M1oWzt4fMQ5jQJTbe/j9J1Nv48gHsCljWhpOLJlC23wrm8mDiWQ
/eyJYnGsagrneehPXOJvqP6y/YAzS1mDVQgVVjFpqCFco+rmckLbwb6i1Eky
i0y8Sxh+yMaD475fasxTnjOuhQf2eNKMUfKFm0kbc2GUPDt2U4AbgOkQAb/H
zu2TV/yvGIjFuHz43SNENmt664UizcshKaiF0gc/td9NvmxT+rbtZigGQmUC
mSfYSa+/fRH2wr8Iypq2q3PHQTM+V0B/8er53iEQXKRgk79DxzbhQJ5nTAp0
JwtqS4UlCizyKQnfcfnZAtUuowM9IwLnMod+EQnklJI3pZalMVVK3GcGmfAV
sONOfdMlNSKv/NCaKL/nrcy5vojjqeqsjtH6ueJCEXQwKSvoL6Y2LAq+ap7y
VIEWGSxqA5bYzCLdCQnQ2VBcyUlXRKpy0DR2xUr2zk8c6NLqNeHJG2zGdy0A
lJaZUS1VooSbBb5oHeBho1xRAHml/wNG0pvhyqmsfYPlYpgKujEl75x2XuMW
l0cfdId77xE5FiycxskrBg5qChQRyl5Yxr8i9YnIT7Em+dbi792m4eXZXnir
GqV5g24Pr6Ef+vbD4D1LnTGtcN5yLUHuVR+hN5074QSpqFxRBIg2dDI4Gk39
32o9oLhnQ78XeOlPS7TmsPoBzuXvJD9p3e8qwFJB5lS5lDRRLmqeaoOIZWZj
CN5m0MdDoOc6jHZy8uoH9GwTBIq2tb03MMAaXCsw1Aza0pr62AzkhUTDJ68Q
n9KaLPWluGgU/YL3JkPCqsbCFZgMzztE1JbmzRJD+oMIedoG2ksuHzLl8BZd
lqYdHHiOviyoMEVrJFck7RYB4yVU9Zy5HyOpGj5FvDSt/YmWdwsOjcXhZADU
1OYUJEwJz7YzFPczOiu/+/okcIj4kaMkibMgOcBtjdnCatxlybONTX0mWEqC
OKdwPq52nj9y/VXXd3dMe6xTnTh0cD4GQTlEGsinvLIZeoITWFfQj9Z7Af5w
kS6VMt3NbjsFjXMFHLCEFHmKz+kY2KTEyehWGTC0XuPcJzzTF0SV1TAdBpTS
VZ252wibrQu+A2DKQ7DRfeamN3FlbyhL3xU+w6Nx87jInhN/eEG7/rzXTZ6d
TNk05iRrjeBfLsv7nG62SEYiDZvAgouTHp8dSyNmjOAgwFmudPac36jZSa7z
mcBD+ZNOa5SmTjoPcsG1w39oWzFd9Ug3lmE8Vhuy3iGRFSKzSQxXskAB/mAu
I8acWGkRghBa3aDwzwtoGRGSu+KTUyxMWzqbufyUonHh5oIWp+Wn4o6L4/RF
2fLYIZZVxgTk5tGo3gTQsr3UxUBnahZI/g0tgO5asFUGwSbwEu3yloxQASDO
qlWwJ8jwwJzb3NLedd6FbbxEizHlvzCHgq7FE/YMw/Bxa2rr5im6gokd7xFh
4RXkH0nVoLRlIxnGt/4tK+jWIsPBqjkARci5lYeuDm8tkKqdbK4UG21zjLB5
QuXucY2FKzBB9KwQxHLtRJLDwzPMRoa6U3jXaSi3WmErQ32D9S0QgpHSVjZM
A85Yez1n5KCnFDR78HBDrKgBQIZQ75yt8YNg+pWof2wrAGPFnbW0UE/A8GQq
OtXNfVPwVwPubrrJBGyche0m3PynJZswyOKqmAGV/DwNADlGx+8GEoyuYzlL
OlspthQ03p9eXCaDw8DhrZbmsBMGHFCWJ363fhcKR/BhphGDRT0coeqrhQTq
FnoUFnDKU+zYNq0ueJ2LVSD3ymvYpaAXWcchK0+s4oBDyxqVTl2zDUbcoKc4
UKJOJb6V7QrNIZC1YeZeRzyIYVyF3RZX1thau0pDgeAJzzDhBu332GUPflNL
a4LibVbuXX4WJGqKai2XjtQWC8qgUQ5e6zQh5w6I2YxitsxTLfVBDyCauPhl
OHokbMhOEI5Gb0QJvpV849HpYSSlgjXDU3KfF1L51AFwlKxbEbpVceLt4seC
jU/8xkdetGB02hfBJXQ7b2JatAVfwkI0Zrin/vkgoVw6z5lxYQk1VSLTYf/a
qjIYoyjvzu517uCVg8CCOLkARKM4k/f5QtqMaKJtjcLmXBU/gf7FfX+2fhq0
6y5FAsZWogJ98lQMHo20A+IVL0lPKJeSNdo7SHY57nS7ohuRL9qT2zabQ2Ea
mJXNty39UF7fjPK+kA0GY1bvW3j24T6JrpwGfWKeOKJce84EA0mTF3ezSa2h
/QX8nvggwTLRUSW1Pcqtep81i1+g26WF3zn91lSgwmNqa9XXUcNuYG3AXUa9
n3A68xTt5pWC14z0ZwwvQA7yWnkVjfY//8f/JScIjEnSHNHqcGUt3uBjDdiR
pyynZevuceivcoFHP3fj4nsccIUUPbk8T15ojBnehp2ds8+itYlzM2iHWjku
5nsyXp/SBXYjgZGdvPz1/OJMEKz5M+Zgv+ZFEDSZhC9MjOvTWbDlWyl4EafO
awovkQa0VRkimJFPyke4WNwfDEsFcISdnYvsU7wAY8U0R3xZOa9Okklf0LMm
O7KV8WfJv+xwukKV/op25Y+/cnIT9yhd6C+O+e+7P7rhoz8/7uLpvPiVhZ08
q0/zL47l7/T0JYNWaKrgxuNr2qhB356Wx9Oq0Kf5cdNLOAnGFK2vPs61Gv7t
FlGMk5q+8rhAV9jSLQwZ5yN95XGGOvBvN8CDOJXoK48zcYO2j/nxl4F45YAj
EBG/Onl22P2aT4/xdg88wSAgn/mG7STf9SesutCGN9pS4/g7RwAFI/GWhLdU
RWhPDizgX48lxYWLVNAShBiHxC/NYxTQoXVcssoepDWE7ni/TawGLyxdgSWu
6Pq6edAeatvsQel6gjnpbDcsgTVxvrTzvHItKuwL0qoKApTV+YWPsUSH4XGW
aA2AwvALEPRlVvt1znntzLiNNny/4jsXnHypPg1PqVErlvLgwdpRoIs6atfa
ZQvKcMu3mzGkDQbS5NwYVHVof16nbVmr9oAp7ncq+pdfOFyE/SNGLIx3JNpi
dPXl9tRuOS38vVaWsW3nLUIL01H81IxJI5SGCqCQvfruoDFAimue7t8l3jnX
Oi/oBuO0tXhFqiBMyiU3464fI1d4kHI85VcxdhlLUMDvh2M87woCiUAc+xEE
qwvKy/ZqqNip7DQabBhJCFhKeN3Z+cUfTl6b2NzvQCbugre/ECRXuKIvnS95
Z+cX9DGRhqNtCCNTctSChZdMbFi8w7LNnifDFpONxdDEvq28sJXw9Z8x/mFt
fCADqaf4e5zEQSeZwqMfSJLOIVDf6q4gtqK1hAYpVK7Ehu3guKimFXjNOISg
fhrVhaCL4FxdyF9j46IEYbNWJXLm9OtyTL5wxlxVUQ8pX0DT6TejIjDtYKTZ
bBZZ4tfwulRMcbgw7uHG4FxjB9eQWjPoCGq5IYQ/n6NCsMqYkdAEDjo98BxF
8A+3q6GJYEPLK2izw7+tjcC5BlHGWRI5oB2ZHvrzQ5ds52Ad0uDD22Xqe/ew
80TWYkfm8wk49KJL8tfId1OT8CEfKRRR+v0MqvUqsn/YTU13Sa0zAeVWjPUg
GOcT2XisgMw5N2xz8qKCrwuOqN8VwJwKKi5Az+ySFTtCdGtRlklzzNgn1y4X
vgiPcU3FBdJJzhAWDuafGW69d9K53qPcAiuYq3czztdEtLp34yz8TolfjB8X
aVXVKr3yuJVGFdd6uYrIamV2O4eSS+1ynIc3FRY34yfauamGYM3Vtrwtvgb8
PFOGdnHCRazWC3YkrATwY5/Dm0FY26F/kJoP4mDI6lrx9aScMc6C9m80iV+4
YWRVk5TEmjh8OHjqyuk0eQVrmPi3hJ0qfeEL48eSJS9glrNZW0QoVKcOan4B
cZWnW8qUILrSCdQreMnsZSos1kXwC609DH3ZCn6lPvTwaUF0FcGyz+VDL9xS
bS/Fr+a3QNjZ5j5Iigc2FGm5rimmeB/WS0OPszWjw6xTscyRyE5KkzTTcrUC
2u4kn6czBRR+Atjd0NZEPdWKduJx4d40R/iUVai9o87+nsL29+y/3ZG1T5Da
nAaQ//dIRWuJHdJrmUHR67ZgHDQxGqMukHKm4/j/+m4ANtr+cHi03xK4PlWL
ZYjwMfvvYQf/eOUcsitIxh4l+pXmDte/94KnZXG9+iQSSy407J6eNifYaxmU
Z39v33cm2Of0R544gr90G2OyMCNPjlFdEi4ACxVgxlEwPUKMlOtI7CnO0inr
9vFBx67AEAH6fj1PizYpV8boU1GwFALEaQlKKv9Cr/vXP4NQcPTfIhLZ1Epl
gEQFtXGHBCSbOzj0rxNHfRxtwVUb6DtI5AlKaXqz7XfwGTmXtp0ewjh6esJm
DBCQz1WrB89rg2oUy5hPSAGOzwr87tJONuZKg07yR+KVbamdCLh50hiNHD02
d3beFhBmc/QODbit2qefYGI4h7xhOinREjObpVrI/2E0+lADEoebHyw7ZPRs
J+0d7fXfcyizmFjab1pJ+BMZ9mu9HYp7vSknoFPgKMSqlA4esB3xcsP2FZct
P4JiEmLWPE+buGJub1l+Tdhww1LHdd1nmlJeRdj42KbPXf1DWnsn67Rs45od
RsPEFOqgMHNpEYgI60QAFqxG3eGtDtSE8F3O14U22PRTD6ctDSsQ0FzCp5j9
MzBHkM7ckokoremWiC8hu10BxozG7zCUpswY3TjkW35u0UZ1ksa7YpZ/zNCs
gE8ZTatYXyatStE3SyTOEkPX7oWyseEZSzorB9/FXtFMI3E8Z5EI1N4ZWKPp
DdD3HpARw+Y7m1VB5x1/g2QbOk0G/mTGHOBE+3Inud+ifgd8OnP5Y/XztIWI
bsdtMOe+A0zSCPLhV/E7lXfj22q9awCb41yICmjy1jQbr+/u4DzmdZeWpkA0
OAEcRJVMGY6Ge08F2XSuCqkdlCb57hGAMb0JGVNQgRfIJ+NEXZ4xIpKd5Cfm
fB+6vpfPB8zsQ/gL2rJU+prRCxiXgWUosOEgQ/kn3o3njscb3VokE3vhAonH
Sqop9PsP3Q8WkMVxqBteT0lpDFCrLjsL8xFLY3ZX0vru55zutN/ZawKyOF3A
0A7KoViXtqitHBa/SxrS8NibjBxUIT3lYCB8KtEY2LX3UFBzT/rIrfrxR2I4
HAfkVsto9VGKoi/CI+CPmrdtNq3DaYnEstXQVVxYWUlGq9P6GVoIqPtbMnFZ
8uFlDiXjS/LhZPTH0fXo1QdJRw2vLT8ClU+bjMm37cu/BT0aUEEjmlP03T+O
5LtV7bsYFfVE8hBTRfCG+vitjQGYpPl5GSh42k2PyyiYJjcfFD22te3do6ee
rc+ATvlC+8ZZZh7IdAJ+L5jmAg02QVjSt3bC+eIrpjNs24fGeC0UZvvPPkX+
pGkdwR1bYiWFcZoT1wCvlWgyjr7A8zYmVrrVf3SqEy239NTl58Wp1+zGInnB
Qy/QIx7SBM2uVyukuVRwcpiOQnIlpHzTKkUNfXdBGuzl1dn19dnphqK25Y//
9k7b//ku773/+s7OpSjFzIdig2P0lEK6qdfKH/m6/7w2ttkRlZlGo9+hOePP
t77+nbEL/6dRlKHygEzq4Ho3BWgntKR+h26NPyP7mIYKDSrZ6tGGPfZ1vT/x
X3efbwwsoNLGPmS3N1/0pOFXf9FTX/9LbHa8EKwBSUFKMvy0rKQfTG3gt+yA
u+7V1rL59eB7Ozsb+NH0gm5MYtGZCFxh9AL39eDznZ3XZbkAzj/kGk/dxb74
PjS3kZKh023D/CBSch/v7DjIo9FOBFC0MWS/P4yHjL/uPw9s+T0uqzFN4cQ0
BTLlS9No0si35LrIFDVbcQT745p4q3UKWy01PgNZwK2FtWcDNHBOq1DlXfRI
/AIWhA4CVRjfwhgfpFvgughg2NRxxKbDOdkI3PIwK9BP2ISTKhLmDMWbUYeA
V3KC+NK6DaxQSYqkl8BSa2zISHXzwHTQyILXKXPv4VBNkgHniwfMLdceWWpR
kXkjpSRqWm0Ni7L6fs5NTJ3mpy62FuKxobYEh+7Yo35Zy3OvACLbhPM6kbub
T1xJBlIV6B2zsvyYcv6xibF9TqsjQXEq/hinWDV+oUd2T1lVV2QhutQM7jbN
07uixOBitLfM0T9dzxfqVA/ctrHLkBsA1pVMzYyAvFK3kDNyxFnMdQX7WkLP
X/HuW3X7gK2xf6+j99f+S/9zEsU3HFM/kqTRO7OblRAUAIjLiYs9pqIaW/cW
5KRxozDnZ4XnRFwIkvq2rFBj+oRLBBlh6hZZhTPZ5g05xrZ4N2wZKsahJwVO
NTvQA9JLzk+vDIXEO+8kdsgfeWc3159ONXmev62Vwi5CuskXvOOcvSa7H/QA
RJyPdgc1OKPQn5r6zhC+8yvsGfpSs6ZAjHb3h5tDmEuWh9LGJbvS8SQQivEs
Np2f0TyaOyPjr7sxZFPjNLtNiTVLvK/pG1XEewWOVYkZ76qIYAWHdi+zA02K
ihyoUCLngNTFoL52BYaPHqKDnQgQXJ+2e3j5X7R9De+dWEIbO8+7cXINM4H3
2p5QVOqT+g6Hj2En8eDRvntQlXp5dOMRFft4KMAAcKX+hjALjwK+1YWJhslE
J6FIu/ukiVmVPhsnLEQc93pxXzL+iQYy8Bcm6mUGARX7ni3/1gIZYtBUyu+V
3rleBszV6vo7VmV1T9LERsII/no1+t0uKR7T8SHJe9R5QPucrMBq1gUCYnmK
JMQ56rtdbY4TzEwbGuBl+uGgmSs+zZbLkpkNbrbnB1UE+MFFaQgHMYsqHnlD
ufBngjY/qYtZOzcdfChi3QXmTfU4H5czHntc0ls/Re2EgwIkB3ZJ1yTPZNL4
jpueVJf7hWrVHABDEAbSODvXXZQzSSpgkEhdiGTucXMy4q8dDUmIgNNORwxq
6YLk5vhyGoWUZ7hjTKr0Nls9+laPK1iA2JEVkRvnkd+XpeCUOI9XEIl2t13O
ChuuPW2ndsVPrARZ9INxzFkZRVRy7pH7G3wUhu6R6aKlODyHXAJ8gafN+9Xk
DCVTyjzAG1qOYIkGeZtQFVJu/YSykruMBLrkdNd3gi4FqOK47gOU5yrZzRSJ
kypxY4eWbxw12ljk0pnjnHmjlr36w4Pv8Q2i+Sw1h9eTjyggluNQD5I24N79
4Ey5D+bQ3e5VZJn7oW4LyzOsrrRNn9OuW6n44SdcTaZ6al17QNyaZPTpxbVW
V6p4/hv+NWnYJ5JbcZVxF7iE67I4V53j6PwITUtrQORzhvlp6TOtev/SeGu1
VoBHZEeOvqdRr9JljYBxE/FlVgJVR+FnouJOdwm2qbV4+jKMFftRfMA5VvNC
fuPSY/abujV9bm9FHGGNX/+U3acPebmkvYkTkjIwjaWPC0gNMWJbJ5IkYMkr
vIFVNOpYRwWvlOW1NWuBSwcUr8XSjCWtCF2JUHSR0T0quMZQRpZCg9rrYuR4
PIEinyWIhZOrdHCaNsO9aI+RKJUYLI7dydy1mSlv/EhabNZACg/9imeeF7dl
oxmnRRv+EQwaI6B1IZd22rG1CVm4XuXR2uK1WPtujkvwUhHdISMj+ppEceTC
pn57UHFB6uRjwUnX+W+ZCSJLPDL6dDjIaKQdTF2SIAdNtXEwwXx1HGQZQl2o
JCHfqkK4jI5zniKI5rIGqiIMVAbxJbXRVMMcZyT86ewhAoJENLet7y6uL89e
JA2mxHBPn6RMLhh1pqAcZPw5LhqkDHE+IrQ4X5759Cvaysfk7DEbI6Ud1eaD
7t57LNg36a65+R1ZSuokyib1Vb5hezKz2Bzbb5qyFrW2Jr7AqtNsls2sCE7v
prsDlRWDIlHK3xyEJmurBRkd03FAAJWSKkX8bp3O2qkg9IpuEFaOgSJFoQtI
j4VRhOkr986aN/rDwiUUuW+nD6xb0sDGLLpRfCz1/pLCGlP+9rtehtc8uNic
n/byRdI76h1uQyWnMZDzUN1LblWdWApLiSAx0VGeie7CxGdVmKiPWiy2oup1
NNegQ5y3kyTnFwntEXvBnMn8xJfaWmPwTScubCYSeIcdh2NyaYDOnoX/DX+h
p9jf7RtGDbRv3/AZqe1qwCfIOiKlJAdJskdjvdBeGFPtiz7NObWXjXezyExa
uTIf2Fd4l8do1CZ/ZJpIZVvduFIDi3FPPNq4NVST7gwn100FbUE9Dxwj8GtJ
sjFSQJeGb8J2mlU9oGOR63ugo7Gh9dXxnCXGACdWASERp3iwZfrtwQIbje1B
06It2OVa0Z2S+vygUIzQ/hr1+khga8vt85DtLrhkSw5+Bfe2Tj/4tU/M5Usb
5aUGzF9COCCDR1F3tbzrW3m5gnrVb4rQqOd3WrXXV9NWSYCSLh5C87lUSveO
vc6+9sRmmg0qzYSBGEOpwoWUViFtilxb83m1unJLvusnr6xxWwEfx2qJhcIe
7DHTi2FBWW9wlw6B69CzKTTUjQlcfE5Blt3WtFTj6XPtKcpLq5JAB1NIHufn
ifOzT641iufykTWfQsuWJbLHH9/J/bLbX+tEgq4nBWNSLsTdcSz5JfflXDMM
HqVlj0JysRLQzhgrVOMEnLni0CI9Io3h4nDZeI+5B96irbBXJK3gzeF6dJoo
A+XJG/DAD1Xy7J7bo6zEn/MMgpA0/QX3WnEIZmzVipdW1sSqRUe5YX8Lw3RQ
VIawBfwJE42o7dZHAszLqKsvZ7+oN3yu/iUdWxGRPNqVZ4bXNOP1RmsgZYU/
/XzJrCLoviWlTNx4rSHkBJZz9vfvzq8U399a8Ji3M+wRltNAifwnHg+MTkbs
y4g+RxDtbCA7fgucWtxT4YE5rG+ugMGUE+pgg22DeX7ptpRHRAuC5EvYisBG
dMvt72JEV/Bq15Ov7vnPApzLO5pzI7J3pnyr10zukAP+9UqKC8EjHd6O2x3z
SLH/vLI6Za/7BLX2xePTBBLCwaCImq5VXkjROnt0roht9lvJ2fnPV5dSlMte
KpCUa8zgL3jOF3CrQa0XT3jGM57qM4+egrYpvnrS/KRmbDrJTZxP4BRIXywV
LGoODSxcYtQ0oL6+CFhD6nKfrk/WItkGipSxmAJAQVys3GxpfZf2T8kAxpPA
5VA4NL6tddF2xUk5c9dmZ8ffILvVuFpSlnXQe49thgFa3xc1UBmZkcs3Gycv
z3ev6V9OcrgOJXsk6tge+eXVW6NfEZMKzCDRBOeT8Eb4YWfY8ndYkjo0BGje
I6WstrAyQb4Bypj0JVuUBV5NOvLWvTZQFpKDPKGo3if1ieXBKRhyGI6HJLjf
wPAEAlwxgVt58bITbrb4z9DkpSzuUPeNfVcJL1gFKinU6wUTUtiN75riaRkn
drDffR8cbzgNyUDES+ymuCbDxy7Nis6P3WigamRZaSSAjqYgI1WRx6ZJsN2G
lVSw5EObCuXD6d0dV6qLh8MCCHQ2HCdQyRwndTd842OTqmbrkh5zaR2RkfPp
cJYhYnRIG64h6aOkV07zh3wqzkTVNWjQH6r4cnsgVJ25zbYZxs/GUTNyLf+L
YL+wjY+W5ht8GXZlnJzooHVRwKB3CIWmiL1VWVQBA22ALL1gR2cy/fouNACM
BgXD0l2DbawUINvthux20+bs4VAZdYenxpWiXngCEVm1OZ4oO1c2uuAgIl9N
AKEgShVaVcms/G6BvF4F6ooRUnylRcmS+HyA7q1FTZKZq3FDXii+CKfEsvyc
zyUWcTBsdbtd/tySe0W5o48a/W5/vymgssI9JATA0eJHC7Jp+8xsKqKooN9O
4Cen8RRtIk2e/VvvYI/f08aUnxFR362B9Cm2oUBB2Uht2rr2uogG09c11S3P
/ARQsc/cZ8/EIfPsyS2StmVS+xqUSVVB5GOa2cVkQTFNDWRggsaKT2w3cOHo
gEMo62jLQeOcRAlZAecon5HpxFo+lBd/IoquPGOtacF8F1aM42NuM2YDDs23
EV2H5rF7kVjmonFvFOYqDfoGqL4EsheNUmmOib46VNbtmAT6CW54UpH4pvnH
WSLPsjuS80p16QSsf1pjNkIHYqrdckeyqctPNDWoEm+NvFMCW7Op3eEO8iHG
+XSqKnUVMo2A40NHYZX7ODh9IS2azoKLPsaPsmrJg0avNN8Gicnb1I27peCk
esQ+OfWoieA97dVHl/XCpGnGmhkcgeB2ovpZkGXO+sScXXdGYkyfxK57b/5W
RNdKMcRCA06TMaW8T9BsuZyZ1Lm6jcUXsQjKDjeMMr+Pmh/AYl0yQV15XeeZ
eGkjzBlzh+nAEmRKLM8A1q5FK433thXwgrNi2JAzfqHwgIymL8ZrKEexhKVV
jAa5UoxsvEbw/zcY49D2/sYEx5vQND0JTVMmvRslxZ0dy7I1QZqbSwOZbYZh
FhZLiiNG/DAr9Vl67GPZS8RoDPyKToRIh4iOKc6360A5irxAwx3BnKUfJd7k
sQMteMFqi2MRJ9eZBP0MTVcMsyBsFHMUYd4faBd+PRn9NqpG95qCz7/5SX/T
RNhMu9OpL7RSB3otqHNSB49hrPXHdqau8Ha1emSL2yEauWJauqa+nOIH1MCD
0nVjLeSLCSWMCzjLlD8DtOIT5z6HyIkCcHDsTvJBgElxS3QPFWv3mkEblm3o
oGFYN5eUAaBpTUibBiwPwgKRduFdxrlTqxy472FnbyyRCN80Wfm0QDw5rq2t
Y0KtCYwy1GI2TzY8VOXz9D0t+PS/8KNWbrtwwsXIavQ+qCrUSV5grXJ67th9
lmFU+0SkoshyJnwiLIqV12aS6pEk21zEm8tBNE/oCkBtKXenRF4VbAjW9wtp
2czeiRikyVcuut6togvBh7WwoAR7WbUj4aR+AknjxaxcT0nHYAjBn8uSmFIz
BFBMlwCvE77sMhWszYLXpzXWRCObUOPD9bAN/vc+YTJsu6v1an7vJIpkKVpa
NZIvNyB50xm3DbB31mxuWrQwWAdYK8lB4xAD1EEarhwiYaRlmI9W7h0r6cLt
xUOrl5S3jPGzI5gm1t6YobvkGLUEJUQuU/HXxZhZdO1v4ZYJ2e2Y/ZzSqSFf
cVuPKuDz/U7yWjfmyhaoceoaoKVsjy9fiM0w9BVSKL3CbQuH7u6suMIAKhX6
DZl86wDOVxM5Gr+REcYRVBft9Y5z9qdDBlRBfImIN3AShH6AZhw79Ev1Z5lX
Yn/cqghhd1cGM2nTCY8sxA3U5ggbA5pdQLuOoPhdW1TRSxLNHDMPoIxvvdlk
sYcw4JCGQb0Q72DYOexw9nd9hb76cWYgnnUsSesIVS6Dng80Nhx7ecG3GBgu
CpUSBg18nShNPMRecPDFCw/nWQM0lalpx2WxDAKkXoXwhQLjW/lygGKQNJ59
HYr5WXME4yyGNQYg0qND8d0EOzeQY8uYnWrzHLdqD06c1iCH2wsPOQz890jJ
jXGE6a11eGeHsr0Vpftb6MLfCyEsbCncWTBtDsIARF4D/LrHQWutKptIhC6V
A2ZcC6CPPijzh5fNP2H4vTVY+vCxlrvUrIsh0iCG0tNliOaMZHgff+ERIWSw
d/UKhh4z89Y7MFcHjyu+RCfi9dWKD+tHb1l0rk3in0ZiJEoDiHZnGA9jKS8w
AMZZAI9rw6c6BELCwUrEjI69RxDss5kQf6gaiKm0sxM8zynazqGMWtZ5PpOM
zavLvztX7NfD7nu4YFgLYHVvamDHpEDaBUWAeqRHqW3UiPeqCuLVQ64UaEga
5GNgx9ZtKF9hTHI0ZoKhG8bjAUN1EiDhlYBbhiD7gQknYNB1B2ArnnkeFSXX
zUXemh8qGwHm9rErtPNW4ZNxupuz+nIht90BB+XLEhix61YhVtUxCNyAwkIX
t8DA0J24W6fEc0kTlJhD2JDCCZZ+Z5hc7TG00YRtC1a2HiHWThE+ECpXhsPt
OIrv8Ywz+ql88ZkLyCbPRZX2JybH9cyjcArOu4QtAiIN1oZy4LCLtzqtq05t
xuxIUoQphX9gu74dZAXJpO4f70gNz1DxVQ8WkEaR/wnNrgTEgPNxrOi3aU1C
iCa2T1WzSz0OEJlAnKk1DWbpy9JnaT7/jp3VjOAnv+RP3DloxBHpzOIn6WaE
xGGbm1r+EwEORQTK7XnMu1RuPAowtoKlB+B8soct7J+Q/7i8IyEjPjrweBI3
5ay8Q1o6H1PLVN3fRT2c8s25x7yVmcbvWVBo5B65CEC+u9qjy2vhnt0wOCr3
yxiMG1n8I25rxIUJ2TyTiLkUit/npDIUbZp7O7sTZ4JawswwWiGdpFPpVmdt
sqpkLvUOt+tZotJc6J1TDGDhkGGVSw7KPJUoorE7JjM4JFTB9W6Cs3TJDkJ+
Ge+BAZfo18I4mWWhseMK77vNPuFEqwgffS5HowNNtW5hxYVXd67S3ovMmrAU
JxWzx+CeSIKJ+e25Xo5pU4vO7iQi7DU39iP4RpZk+AuIyE9luWLNauEVVdiG
foWuZ6xpat7Dg/4zCFTZnY3RwrgxTjl1reM4VxleAhCcf7EGiINMLhcNsduH
QqS2i+WKpwdQ4VbOwpUOwutD7wnzdNd7hDHVty7MYF84T2cadNUREx6dHBT9
K6bUxJRDdDvR8CddHFmoT82xRSMAn1eIAIl4R8j8h2rDcB6HfW5MtiJ4Rdcp
KwTwuzJcPi0vsGNhv4TrqHAFT3IlHMD34qod8lK/5U85+Ho2HX2P7DId83fx
HsEWcmtKjcCxBzAfFLGM3l0FPYg2rqBkWnEmDlTO7HaGQEa4gT9UURCFdUof
N65BlAfI45/uy7wS8PGvttRCIQ93gxJ7orROWNi6/I5oAaldSDeitRARTe5N
/+P4FpidOiD/obPXPSIJQFbAcnL/GKiT6mdkly22xzUq6iTvwBAkPBatJjTh
W2H0OZCorKRo2e52sSwtKsTH5jKNH+AZjonFNR9R5+3N62th5q8u/+4yVCQW
eVFAx2NEVfEZIrXmlmtY2MpC0J/LxmOkdtVL1kX82q3kDOCxcVpJSaXZEBiA
fXhk3RiHia6HglWwK196D6hxRqzOMy5YexNEA0Qm8yvuMucnZ2RM1rVZdtI6
Kw3geBL/gbnC5N4wTm8t0ZrnYSCq7eAI0PUHt/pavbHGTR63M+0A9NHutffl
MJvg0hFz5pF0uPqD3aYPvwrZ8w3o/LqaLDr/YteoPS3Zu/avHyJkQc9+dBFh
8ViDm0UY5LxQqLxLKrm41kJ5nA+EYWCTuCIj/PxcnHzF6hEjC3H5WjabtT8W
7Dx2PFPmyoVdCKi67n1Jw+W+9LpN5fQ2H8zfnXPbbXJyly5GCl7JB8t9Sq0u
0N1I6Z6qJTlIa4eUn4h1JeYK/Pebx3XMqtt2QdcCDmhbehnYqbbq/X2e9Gma
Ob/XCVLo+AmXA7ez4z9wdy+rfEcCLZrQrK5UMjV9Cp1lJ2l2HS78RqaWpFEo
rlK6DPN5uEkcLtpmKk/15KS/ldLjk8eOVTynhSMxZX9VLdHrZZBupJ0ofqjq
aV6tYEbIj2NvV5Jb6xjtDmChbjG6O8mFgq76Zwuahl+NgZHSHFzFUV7EUgY9
BHSYiqtDwUkeUWXgVrZcg7P6UKblPzIWMOsV/p3AC37q6RAqxj1bSZai0gOe
1zKUIIznqg1dKpQ7Hg5Swafqna/2ChZ2Oavw66VWxB0F7dV3drxP0MgNrTpZ
Oh4c9d+HqTo12uOaIvauLulDUfz5UGgn7+7HtORTd8V9x1RXx/qDvOZhX3K4
hsPB+7Dpu+svDjom/rLZVvMrXeHjBvPcFa2p9wPvHILg/cuM3eoyuRgnZ39J
WmTlupJOpzKrGGgAUuOX+0ecALqUssSojSvtYviM42XzgtrRghp7h03m2vxd
TYYBQhubwls6njLT3N47DbjxHEIj9VBLhNdOoVdXMUkNyYQCm7Sje6Vd9eT1
Uyk90DSxInC0S12NrkTam6sjWHS1ypGKfifoBcqb5fYodoxpe9g2F1qauMmZ
yrbQlJqszLwVB8N1bF5U2Xpatq3z8DS/vQUqswThdEYRCRh25GyGDkC6fuf2
NhQJ6bnl2EicEzAhoall4qwFu0a2Ww7at4N1pIzEPeg7XNQRl4k2n2zHLSLo
CMjC7GN7o/11w1ttXRSijqFBALtIzkhnJrrDnHaviIE/tp5qXkiaZz7PkrPP
E20nfpVJ+U8ruZQYxU1ZJj/lCjd4mXIJB9PepRSRuw7AHfqM7uObm3fBmeba
U3aqAUPh8b6fpvib8iIHOKNfIpfZylZqNMzFBDhCPKuyoM9j5HcUQHYFZj+U
mmLO2sk0IoAkwCDbBH6AAo1pxceKTQ0dtYFhrD0t0ZRRajmk8XKd7wVtc9eF
NDhaWZtMuizaLxtr/JJcsBeLsRrMCwssgMKnPm/BqOjVGjuHzSi/GCj9wMHT
Yz8QQQnCWRxKaro6qvis/SBD28qkcUlHe9p05VIR2UjX7uR1zvk+z5OulCRa
KdQm0Xwxzk88TVM1sS5AW4TU62fS128c+W9wbmP988Gg3RscWJ3WcncLo2lc
XROZnxATov9enHiSb2K0o05fO4QMuXLgD0KFzOSUkMTXJ4fvgnB0/o5qPCGI
90lIhiUF2IAIMU9XlcgDYS7+DriojrKEfmcL19RaFvjgKhNIW9bsSlUaF6eX
TZnh4X7vPVMakzzd7mkKLB67pgydZH1+LVdeqqMSGsKj6J5cXW5UWfm+KlYc
3lJXJLfYk8QoOZ/kukQsQuh4V08tOYl8wHRgu1cnKPt9p4j7knkgDR7EU2SR
NYCiigFuCpMliGOe169PTl7UIvN81iypTyrVUXkDjvbBWDUM01hyGpV2u3jD
Ot9d0iARmN751Ei+8LAXX72QM9Svn+jXyXoui3LOaEnBLFwsSiOQBpCT32bc
61vSUtyR1vbL/b62YxfXuxfBjqFMd+NQWG5ZURMdI73/dC3JH5lrBnCambO4
cXpyqlMs7K3rIvIjTu3LAtCPSfgW8czYgr4u1rnECa6wtY/LaGrK+u2KhjRg
J05UkMPAUapArhcpB2gzwtXd7XtiRr7vCCIRQYn5DtOzm6VEewuI7Uo2O5u2
OYgvIbdaglSUFy0Zo8s7dEKxAlCFMUFgJR7vjua0SBTHKhyDGUt/6Do56Ugt
0g5ZGcl9w/b+EDT6ut/2c8NONM7Pzs6Sw26fuP5gMKL/ff7s/odNOGORxEgm
rGmomuT62N7T+SaH9Qlo9z9rmeEvYXXPu5ZuXZ+I1YsTcIzHqAUUZK2WSTrQ
GUs4U41qiRu+dNoSaaSvB4qcq7NuIwdblEIU17NDai3csBOArmpIOcDLNQDp
UO/Tnd2XnQ3aG7lkppY4M/z2rGIcF/QRmeVRP8WtJ9/QiQ61aZd7CJMwC8eX
I/IiArKw1+6en5/yKSjC8faXtVD1j/E4Ic6qlcqk/080JL5C5r/4i9ZFzmPN
HmlniynRJLiVLPH8VPPcnA9X89M4YoRdFKpgkhDz+A7pypoQ6kj+Q+Oi3WsS
B+P3CyaMpKKa+0JgwkXPuzCHrtRY8yEKaJBUSZBK/rzHpRGuCWNUN7H///7f
ve4/tfeSUtNJ3I4eMznxsyis2PrU0L7DX9nyNeJV+1svt7c9QJ6ygKWgVLMy
wc8vJfpPQqpCJEqSuwQHXiF7VmHeuVSYc3K0Ik3Z5XHE90PlVQk/A9dr2t+7
dpC1PM6Xq/spNyNyTzT4kstJTpfpJ7MnJeSqFwj6OTIL01X4CshjIox/XrOF
uDK1HblSLGk70nnKpw0SL7dPaP5OerbTVbvX/chZhQyetJ2JtoWi7PXGPupL
dJ+Du7t6OFtu0LHH905jQEVlKivpdkky6vVAaXieMdlLlJtOg34vnbrZj1Zz
xQOySqpgNEiEIRTi0c8CCN53s/wuVw/x9qNvqa0PK94tcWO0cSaNoY3QQMf/
ZrReqB5r2uWgwyqAaCS1xqKMW8n1UgADiHuA8taRZjUNchNf92mD7+CRRHyA
R5VwTaB4+J5FfPE3bdgGtMXK8oae2dSeuRov79pB8OKWvsdz7CRvC0ni1PzS
4iN7G0jAN6DZNx0ncT5VP5fQU89Wp4CS2Di8WHHNF+pa5GEL6BN+NLeJEUwK
kmbmrKoGrufjmvEalB8jJOaGCqAJWh7bbmtITvwcY4fqNjVg/HBeEGqgcxS3
OLCiKNQljZ1dzNE9r+Npn94tJaVRKizfN74C5xc3Z1dvL8+uTn56fRYG+fV+
jNf5bBVW+HDUgC8hkVNAN8Yjw1QePgUxzNlGgj+019ViEVaIQOAMZdqRovyp
/yh5w2HFrTaUZqIFKl/gdXX9Hlvc6+JgMNx/7w0o66C8aT856IpgdhonNdzZ
jEXbJyLnpfVHxJc8iofiR1glWuVaNzvQFg3DucYhsjo/1tpaCPquobFOYUm+
MnlG/MUrdKYNdct02729ZqiSajhrP3iVxoAxzj/aTtWhL/pekbI3b3TN3DiN
hgdGiWCcd/v/X2nvmt1GkqSJ/tcq4nLOHAGZAEiQIMXHaOZQJFXJborikMys
rttHNxUEgmSUQACFACSxb06d2sPcNUzvo5fSK7lunz3cPAKQsrqVVZkiEfDw
p7k9PvuMDLkrAX4bUgSed6XFV8cSJopK3GgP6ihbD6fHlV0ApOZqcsoL5mQY
KhrBFZ6LBR3xHvbN0jdLgZVal2ruYVyhi67GiAG3pinoctW5cPpYKWUYlZb6
djx0WEp6J15FQQmO+SDYBtpGoP8igc5F2HWX5R17kJS8IhKmNlxQW1+JYfRa
R/RbM4GWn+orBwX11zhwLlGoYlzkGkf0YKOoc3MT5J+6iHajkZ3OHp8rQixt
fg76C0rbkJTm7+z8rs6Bt5Vw09b0cQ1FbUjvVhUOfwdyCgR/0sIuurMo6n2j
p4NyO8yfZsz+EZ7d6259fQXeCgtvuE4iHZPXkY8N7nP9LvnF3rtkk/r7jm/C
23w2inzvILzz9D/4zrNIz/RbdsbR9gWlepITX1PklfJo6+vb7065VpCMn8lZ
oRu0fsLl5NwVz5TiSbuYAAIMYuDOan57L0vahetxTXNa1Ep3PRnaE971uKKt
/2Fi3JRBYCTYtPGUBR4h2lyFSilE6RBlVuJ9+fBATgdlsCCC/J7Rn1y6C4Er
kZ1MYyWyFyrPOO+tTgnFvPoJYSlX/wAOXq1dB86IszLnBBelvt/aHLDLHHR2
rFuV1kV3F9a023gpyXJpiu3YV22VaZIQlQYwUoUSIyySSvbxtU49sUkMemtM
ynN3fvxl7eZLsOKVgdgxEclVYtlM/rfknmIrhM9dijxPn9xlbIE7a3fzaT7i
Rf63f+33SR2tT6Xm/sRu8/vSS5lvZNFkaatLpzQlxy287AgxFNi1GadEfAPm
nA07VTwfbOVwsrfAGQDGc4KCC295AH68gXrMk5fO6GH2/+Lr/4v+xjbQY+l+
GE//lxVfCGtLaRWEVvlHoFXiCfkDvBUcO3KctgWd5lwYAyLxuwO8sJtDWHA0
RvkQTDZC6w1X7Bgdl/hk09EA9zDobbvaWsZJzbMX95i58BTm6XLZH6eZFcHN
9ChyhEl/2rM4+wCoBITDzSCX15B7QeAEwRw0SEFtw/sx9LOWYRyCBpNs36xl
EDjx+vqPd4KYMh6ntp4ing5JJ5wX6eaXiybpG62BUU/oby1xQczk81Pe75ZN
aYYSaUljBsfy3IT52hzISEGHUYvw81H781T6m6xnV8IEI9kmsqGoDix5zIbl
DH4c/qaEgsyTpHZZMrub25s7pvw3DjlxToLNRtTu+k7m2NF6U09xMKznaYzj
ZXPSVh1FoZvcPmyURSHHfZKq1Io++/b3GtmuNwI+fM7N/vta2pWWPAZn/B/q
016jpVHBSFPNuvo9De67mZJKBxGghNyECIBrTRua2upG+4PG/Denn0le2l4w
7noD8gKZkEUzKIjr7t3FqeaNaYDPIXbCp5+3YZrt7Pe3ghGb3DxNTxcHvBgp
ry1HFihGuseMRK4MUP0Hgj4cpglToWGZTlYnydx7acC9mFES+rQ6zFSJ8lFM
gulUVG6MK0fnAE7i76AUFOFSdNE+eDvZpaPwwbA8e1zcTOr20fmOq8WmFadt
FPlYnE5F9cifvHgRFAPaDLHkdt2cFn0VO1YLQnU4/bOTsZUS9l9HetvJ/v1v
/6cNJ+7EFR0gfrtihHUkoe3eR0ntQaQ8AH3Jb4wI63IyHC8hiOfoPHhE+6LG
PNEo+Df9dsTxVRI/FO7GRwmak4N5iFlSfhUk7cZb/PL99bvj2/NfzoRkWAN+
ol1TJ/QN1EuusPTDDzzBrxtGZ2jDGZGtYJl2yLZsU4SIzVGGIRqFUk7kxfUB
2zgdA1RY7Mm9MgrUjVlaJZRtij1zFmfHGY+dVQZe6OeA+rlL/9pHZ7/1NsJP
xqwvGY/XwTuNj2Vg8YFEI9WHMGbCBn8hpqWNFT3lrQLYO7V3vBGvaWahSjNO
9Lk3nBRU3tumwO8rjSlGxCXqWMVZVOLgYKd+d1rQZJAX3noVb9Z03qGXW26n
cOaRY8Y/jRY63LY45qlBw2aKaECjYe9vcO82SED88AOe5mnq8oM//MB24XIC
7xGV8D5u2r6QEmjyNVnjqY9E53mNIYbYnk4xFy+h7AVavctptmEv7jL6tsuz
vtGQNiThmHojOkM4pPvxZ23jYziZXzi+E0SJOk+V5ahmA5m3innqeG7cWxMd
B4aMcESaCgi2LyovRrAA+nak5RNvHYkSZttJU9rhrKtWeVbxLh/tXVCmXxDy
9yXnR0iezaJxYJSmDyl9aIwmQMpMaMJSyVZA7gJK3EpMUEdHJeNZ9lvbOTRi
8wQMCms8dmSf9t7Vd0VPrhpHEkFnC64KarxKr30A7OstMUqlkm5jz8g+rAGv
d2ld6EKLy6LL8a7hjakfO4gZyUbQm2TNBpc0I0GZPmKPJ2KqU5uodEZOkABY
FQSNpMOOb8ZBf+NQpb1svBb16HLj4Mqsfpw8hmPJpSRIt589M17FCxvrhlA4
c8NSaABhAsmXXP0thkBZsjpnYtC7u003umN7sYpzQUi0WType24i3tAeVYn+
4Qd3jy4nfpPwkm2JOmAOjLD07ivu7aLKvMZFbPWA3DiooDzNz7jxRpcegX0W
Bb94ZuAM1irS8MEpgQ789rSLwVKb3OU+pfBZyinj3iJEkW5nCju/rLyfP9hx
kwKglHPHSfGUh4X5Svzx9zHFfvn0RJScqEj/WyMM9Bs7s0Rn/h/u5+Mb/xP6
73/hd+D/WMU27dz2zkl7Cpjmyv+I936F737a+Je46RMnPbs2JXAKoOaK7+z8
PZ0Z1Hz1fyLzAXqv3Lur37GbOujxLVKT1zzOXvrEX/69ju2vds3jTVzRYMV7
2DP/d73nLLrjqW39N1E4hCPm2n77e6f1xXUQzdlAjx6lAnTvCkbukNQ+TK8C
Za2RTde4CicO65FcC9+WxWLy1K8cZoQn44RfI78FIatZKKPySbiD1QUjnaSY
VxX6U90/cwk91kkIU8zwic/ldByTXIBdOspkPsQwqUwprbziF2825+inC0Ew
agW8AGvsNuEeCG+4U/g27eFFnE69XCWWTYy5yssWvvtGfchsbfZ78XOiyeIH
E8ZDTSPWUIQBhNQ1BU0nGGFUoF4aYMpDoGUUaCG43Zv8qagz4L2rsZRWpUuC
MzdlQmHnf00eFKGt43QAITD+u0nn5PV3z7+HcU6StXMqdasXXSRg4sp7Axvl
30X/F9H4Kftf1P6YdBeOaiG2iyx2m0xixznP7YQt0PEI+uJkHaacSegDOwoQ
iGCMGmuy0QJS/atYK5a2Yp0Q0rMJytTatx08I/ILigteeAWrQipLfWNF78XZ
yrlJQh54F1a1q5QDGo+hDg7J6TlJamK4EoxJlAmn2zFCel5BOtJgZNUVHMXi
LLAyuASmLbsy/DBClTiJM4chNydKDIf8fcSjvVWbiZ9gS3qDqFVGG7TDOVfx
8kjqRjYZRSsSQ+RWwPRieZU1MnLwvtdCKYAYGKFn/jTF70SayHJU7M5DoUA6
LXq6uvGLxCJCaLNIvc/6sEucVPid4Y3quaXrighsZo5vYHjf3doKaurJ22Zp
gqBwjZdAAtdH4IY4U7OwlrR6FJrsUlmSkVsJ/VKZ5M6OmIQ3zTtlobzd84Ia
7q3vRQrJwgpqpNCyrYwaQq0m1is5Jxcgy9v2T+ghsLebrZXU0yJrc0W0VjMm
BMHX08IZh45thoG5zHSm5DaaHx/vPCEylqtvyl2MtVRk/qT6MknbOAYYo1OO
1/JF5IejrJW+VCMkdRJI7okyiglqAsgY7qY4Rd7WDiTIROoRuajoQv58p821
rx0JYArkq8d0QT/B5qPD3fHtvt1L4ZbM4GXsMLyftumSj/xTCWwNVz1ZeLWK
Fq7KkuEYpcwjQfqYhng54W/LqqNkH4cn1Xys6uWbqlgc00nfsERvtXKJ1Jjy
n/pUmzB9fPXSywrRfOo1ogQwxdULLWowGaUSH04MylXlEuJJ4aiUBVOA5JOp
f8aLTVefluQJrThAr8C/PQm3eK7sOdrdQVrSCvqMOZHoJgIjkWweLp5LFfd4
7J8IPRM02HyRs5Jibjq6WCDLscVK5doY1ffZkMLaYfQPYASm64ZgmR6gIK+K
LFZMXxUToINAy1GSeB5RZp4i7jCtnklxZ09ZLJutJQUAJVJcTVnkcKYczYyM
VW3xkeYZcU7lZ57OcCQ2bly3N5pHK2LoUUvRJCG/MTu+OjdsXBjDVAo5+CGw
Fixf426lxrxmA1P1vxrHGgOa40GSpAYZHKoLhJmmkhicaHCuqemYaz4+ncyV
AUMQYyz8VaI2YStopQKritlx7wWjBb1AdhikEQiYRLBc8oEWEG8YTqFljYIE
KaQ7vlqRhPBoBwE8jY6LWFC8hBJGkEU4HcWCPPwpnPVEZMz3oyojss80MdCq
EnwFOY2Rnysj1ji6fZOSoh6gjwhRTwXjds9hzyNX7m2DIfeNOXlYcMoS1lmF
pdLRkE+TtRelRiR/bghGY3P1YtCFOkWcsXusJkIkoaPJYit5pjfn57dC4dDf
/dDI1kzI4aVYsJWwCINdTLtSlTu2L+QC0GVF0BoTOcyxjpN8UtXbRyYsZauK
AAyW1Ju1Eq7HUt4VVD81/uLwqhlIKrQPka25I3n6LHpXXxFp7Ws38fTeW2Vr
cyzCjEshZWGp4ofmFqrOeyn0kuRS+iBzy/LQrSzUoNdH/CnSdvMxY8cC5XDz
RfRy1XaKlFHmrqWpFGDf4eHmwV6ymQSHREmmkaAqph7aJiUKRo4HXkbIESN0
qMMWKLkvQcFMNA/wWVC9HCkqMOMCJkW+qGr3cKQBzqskKCU1QRztKhpJDB7K
aZ9O7ym5QkmlMEvJnJO7CN75LqPacRqQPqhvlkT/Xr/jyVfbJjcdhBtgfEoD
5aBenKNRMSRze1Sv6vPs8ZyOmNFtBHWlkHbV5ePmPzampLhziN5KWJBM3qab
hatprt4kRyu/gdbwtZ2auGylh35JKHKglk0tjRvOb7ZO6gCXQnGwRXgPyQb0
EQYRD0GVZJNFHgH1Q46MBM4o/TMUEap1PE/50anq46AdZgtVdcjmdqej9MdG
K2EGjakLn7tFKGyfMM12Q1YAOCu7WJg8C2EAzisni9mMwcSa2346iUdMEzFA
Kcj8NswQ0ri/dAfjOo8841yAYKl7mq/UXBnzlU7eFdRguSpE+Zbflgb9iRwL
R/NlDd9qUgpnRTyqzA5hV0e8WkWd0E7EalpdOGewDlw7qsE27mAwSn0kzQit
Bq+TO89+voSh0RUk4AWHULZrhiW9+m6skoM64dw0yN2gwsLvIRMArBlictkI
cfebWLo382H2OrvZ72kXTOqA1sfLI0dNTkSfzkiJGitnhqtS5pMopU64J4NT
k0LKUuMjBdyzrRWPhUgOP6NEI+fr1eTZ5fHtYGCZeOAA6fixGaVlrCpGGhG2
ZdqxLxP1fCSles3Bw7vf82zWn9TCCyjhLgylcfUUpG8IZpRfD2ffCnzPqEgB
Ch3mVJ/35A+XDBcZCV651d/a6u0BU7bZJy9RUnuTrgGeVspwTsbIMHCuAsDY
olbZTgip8qz5Veuoq4ll17AkR2bh1hvjzBWi2zQqF0yT0gTaqPK1tLDeROCL
lewwNp/Xfo+m4PjWTBcecasMfSdZvvKKcK6X5v5hZTQeMTpCSXDIU6/yzMXF
VMQGZ06K5PPSFNxO+cQxsvIVISMWWXckMJz18y3l7awYwdLR4Eh/tHQqikCS
qzKvnp/Eq2hajAarY5mm29gdz7NPwSEpW0+mjs1PJa9jYa8OXwNVcOU4NrrE
kd6S2sjtyJeVKjhJGSKxVjHROnhT6daLVjpqXzQwBjUS5ZHMCc/ed4lr0cvV
4VHblVKmS2v8ubXq1OaZCbrZhxnu51GlChg8I/Umh5JlsnoUcn8QMmqVHcZY
nCSi8rJSW66G95lY3Y3EiIGUOY3e9XJiHvLGGcbxhWAwErE6Lidx+1XPk/AR
6pjlynjqb6ggPx+WgiLNVVmIY45lh2zTIDZxV4jrvAriAwXTw2JKxUd/FaEU
2MtkvlBU4fLXN+lvBX2PUmafrB6gENfwi19WSc8taohaOJQaWXxJRaC+huas
I472WGfHnQq4jBHlOkqTfnijKvu+lrS0wgy/HtsLVUVdzj+X4mviqanxrobb
aUJGxw232RXvB2kS4fYvH8S/Rdah8he44l+JbQ5K2kg96WpXbWBLfKHN9zxd
hr5NXi5oO3W0m/f53Rx+r41D+/vKHSAJoSlj7opVKIwv15tuKLAyGUmIe43V
J3g2NvyoHAUxrkyITGJm3pWdXuo+OEuukGNGh+ITcVm/ePFHI/h2XhYOCHvy
BaZ2VO+W+tg6bHeQ5slGS9PJEqQt7Y2osovK1pPyvYq0qd12VfaHs8uzX84Y
pP7zKfNh7h9s730QpZ/Iubp2z8NrsLe13+842k7n5ynZcuBo5cRV9IazPW0r
mULLfQEnoliJzB1IFwb3EuU/5DmpKuzILw/aYYGuJZ5Z9OQ7mzQoiU2mgw9X
/PBxSrHEe6HSnlMdZk6aVS9f1vrlny6OLzvZ5S9/uD7jtZJyLVScZToO32of
SrTRBDIBz4OU7++F5VxwzaXQjR/dXD9CySCNdKZ4PcZk8m0GGrgOV0RRRoe7
ZzbqR3Q6g7gth1McIYUTTxZC32imye0J/JmSYYnDPZ9KhmpuQH62qUhLEP2/
mORCUzFqEuPmiC0EvfJToUkA0ZXAm66X/XR7e0XF60+uNm8vbtrR1KYR0T3g
6z/Q7Gu2mWx40s8OqftdmqsujcOGRyQIFZdv0pFlOjIucRQUsul9F2U374Ki
xVznfCjjKHl70jRVR6AZt2Fx6fg5CdeuEI1ORB7I6SOWZeWpIzfGEadvSWou
Vjz6+PlFFwMjFdUyb63BVvtHWu7WdvhLGCP/9+Km9dftg3YwsfpbB4mXiFp7
tUfbxW3tVrOp8OvWflt2W/hbWxckWYagonDBP+agJq/OOAeuoEK56nnOMGZl
IAXpNbzMdM7ScnwofToG6HuFlAmK5eN0VAlSho4RYmLdchLOflArUTOvfHjs
iuN7Fg6WVaIGV4nEqWi8pNDHvmkxQ2WyYUDKH8NG/cOSHCB4UVUMN89u6E3c
DC2WrGTK3K4e9vnzzCJpkQWbWuZ5/O5kyaCKSRAn04ljDsF+xDgY8DTpcoth
9Vcu0u88K2Z4qChRCSPE3nUJEIu/gHhTOG+yc0ixsKDsyOOkbkF77N++H3RD
J67en1/e+ro0RnjtOcycg80Yx01FIsI/uo5QNixcUPwYUaQyl2qDLxVaRcEl
9Sy4bBfVUZ34PR9y/WJ15dTEvs4NKq4EVRROnfC+ljmF9tuwjFRc82a4vfil
YiMoYacRbIsYdjFJM/0ysGQUzUguvbRj6DstonxV2DmkCXPzEQgDsk3ngvY0
u5P2uyR89PvCgKzW8P7LKo79bjl6IN0cIXhOjNf3hG2Q0j8nZkM6AHlTPdCz
nHBisZs5oeSXMGDo7BM04KhtEEZ6N2tpvR0m8KIoNjloe9lbzo5olJ5A376U
jCAXhiD/WlHk79mLwNfiArHFBScyCahuVcHoxxIF2znbAGBHoPHXZZ6aZi2q
C8N74vJLnlnQgV6a2qVspkehaSxqScS7qp5gBHe+sMHdHAWxBDKhWLaalMDm
va0fvqakk0In4cfNPCx5jF0Sm+TplcB9aqeHZsDljkMhZFzlmtYs8lzehwXS
tmgwUotDnYtW04oVIdboaycmbQCzTc5RgOty723NKTxI6cioeIqgTW1CvPeO
7LVxkc/BaiGeue8LPLCHrnX4OhKD1DZWozte4pukUde4OJw2KLaN3HVTqTtu
IyQMTGNWaEuQA1eZ4Nkbb3SeSJSS4j7h4HA5FK2z46Y/zMtoCq/IVIpDSV0c
vxBqa8kOmM7b9S4JPQhZON0x2JCBykzWmS2kuNVV4cRtPH2Y57NHCpGv2c9J
GU+02LXrRieKxiHywMrcummGfcg1CJWgHEE5EkCdbLVOkRCjJbgt0h2cmgbf
X7xq1ZIk2oxY8wqkyi9e/BxEwafCqB6JW20Kfw4g0mXQT1g6U0hvEkQeulqk
VccsTT6pX/YlF2wPUZoLwlhKoQHphvUX3/uCEZKxaNpjLjmpVWGIlQ38FgaO
5PpF4bxxxC1IJ9UqHJXhhUskDKOvPVYLz8NkmtInHxG+7rogpX9Uqxo1fCT3
muKLyEq3tKeFwD0ZAeJgFh2+7mgXpMU4DQCS1CRuFHJDEJUDf/BegWf+XZer
gS7EvTpaau13FzCU+nzqBA9/c5qhIeTN9jfWglh7FWhcHRmqZQssQ4qHAOri
MnkIOjWn4pmSNo+vSlnZcOHJmGz/PMyJsN0X4pBFj0VIyrkFhMNkC/CbwNm6
heYV4JA3lz/+3w4KxVAe46n95eokRkyEpsKqwoz0dcNppJt07hIxTI8yzc18
wMkXv614QKhAQejVS3ZY1vQFHG9wXziTClPOnXnuBiVZ/souOB7oGd23s3lZ
AfJ5bnWfawNt9bdf9b7SP+2wwjTlknuofdUIjXkXNBBllXLMjThFXVC5dOcx
yAPKzHK4SEgHoJPqYjJ+j88yV4NC2Bazw+qwDka0AMnEC7JlORNfWW3eZLnD
dRHUxSD+bq6w2BRvGy6roM0X88rY3DTWkCAd1ei1s8ihGQk6M38bOSJXNZk0
xNFQLJo2gt0vNciDNDkD9c50XDhkqSZewORazsJtMhKEQ4UL38MiGzFr92Et
XARxOJerWWghwwPP5lWhbgSN2idCVXy6JARQIhiRccTubrkQBzMVJt2I8jce
1UqKHaWJQ0Froq1IJSBeVl4Ew/M1pbrNVNLjSNCc5ECRl5SiQifv4myFFXcC
SnQ/+w+G02pht9luj2kUTqZwWxPWXFkkhbqYCx7xxzV4aDAijAnyyMhEqyUV
oy6U1QmhyrTiUD4OW270bJWH3Gsiki98CCgoCHZp9rlXlReUKXizI2kKTOiv
9cvZ0+5oAVCDBh+FRiReaz4zKTCL2j2LYvg4kUrZGFTJwQfqLrIVcMUjKuM9
Kb4iJhCQOBFDUBCjrKtuCw75NCp17kp2OWedgI1lWQmqlBeNaDlwjN6I7/7F
C/55VHCJS9Y25cJ34tiQZXAgWYmeQooNCHbSTqaQNw8s+MgISSltqZZh3bFd
B2lz1+AJV8RCEiVlt7CkKSk+LE0Lynz2FWUQa+mtMcSEV7njd5D4gnUy9Rpw
z2dFlnSUi4xLEgrlmK9HrCKDh+CYrmKdUonpZq4sNQjcmvAkJGe70WmYa6rU
6oKQUHDEUQwhcCUVf4VZJQiHR99lthnSrVBwa+4vOrNs4iI0D4ftsFe9NRDU
60K46Q+Fm7R7gWTrP+bjT+ILJOeT1AWPySYpB0q5yl0hkAGHgl0NM5TaNYyY
XcDbrsBjif8HbYrt/GdNiiQni6SFW7xLfU2cIchRaAepr3UReRzT+yAhM3LD
oN7SoYNNOV9KEImTofNYS7WnDp0P5GnYJ+JfFiJ6LiX4lphOO1YEKvzqrXyN
h3+JOjW97M3zwgjTAOEuvobXDMsnAhwEyVQVQs1KniJ2DGgWjLkMfBzuZp8Y
XcLWBWnVQW9vt8NbbUu5eehvyCvoH2wTMxWxrpFnhWP7h9nH/m5/7+Dw0D7+
2O41YUSnA/KTHwQ51+8RuqXfax785Pn9p/CFj9Rs/M5HrssRwbDVI93JNNyg
8i/VumdeskeEfOiSZXvuI77z8aixxjgfAqhNHV6MVW5Z0WT2FMSAMG03fqGV
p6HFa+NAyYki2ma8EUGeU0qWkGJFCAhk3f+OiWi/eHE+iXFi25GHdUHbyQZb
7D301dN+zLblt/QW+2WYNf6tbLmj7IZmtbFinex01WyLTiDNCROjS8zJWnfl
Q7CrRmU+aR8yTdt77MEMG7XK1v15S2292Pq6BS6y/a1sS//X/GMT0AmDex12
49vx9MtFfleMX29REwN6KHzz1X62tUfFKJp/rnj4F8XkdX87tHD50+s9Cnq1
O1T3CWWfXu8NqLF9aSz8b+dNNuhnsWfauZvePPx57Q7MTe9fwp/XgkQNzTDF
WvLNE/7bdrbV12aq8Ee/RI08hj+vbVGomf1GM43enMbeoJnTel+2V/RlL9vZ
yfYG1pfTWl9OtS9xN1BL6M4/ux0W2kYU7UP4dOcEn2rwLHxJPwPzG5fwdhK9
U4fpMIyxllfwn9hVg10Z7/7Jql31Opgl5z9dvA7rdzu9oX11O11ghwySbfWN
nXl++nqLoxEkYtq0M/OHCls0CO/QZ96gmLawL8PuPDmh/zX/3N5ehA3Y4TpX
cW+O5idaQ7DFX32tkmrUpqbRVmNrJX9u5sPXTnSr/hU0r5u2bdXGjkj+nFaL
ZC8krZyilcG6rdGJZRBraQtkKUPCxq21bvO4BNR47vQKo9vLYHqVQec9xI8x
i0lakKL8jCVeq7uuhMaG64uCZp8LQ4R5JJfftYq8TSasI1Moq2C57Q7Mq9i1
KO65pf2XKyRzaI9/35DkxG+Tgn1qzvdqSaMCIIsB0a3vI6Jr4J62kABNtRan
aLtjwuOm9M68UE3A7A8/HJk6LbAZwfCls6Jz4Jtl3gGvPZAC2RaynGSRrGMC
QVMGgQi7q4HCzNdEKlC50EpaHY7nsEb9LJ45LYrglGp+jbh5+BNKxHjibES1
Z2q5UHBfsaMbRB/k/ikrP8AjD1vx2Y1cFNLvdKPskgMhu1wy+cBHxDQjdTDj
VOixHOq/hvbX/EBAV2qu+6eyeqJ6sBGBgdVkTiF69/kpnzTyRlXMfLHFYw6q
b0m+kXvzocZqEcCcmfossEL+AjXSctkBgzaZc/eJ0lxyHQ7yoTeOLGGbyG/Q
5zJ5oX9eJqHj7Hf3tVvZemhmZSHcfHLVoWhcVOKl3KlpqzgvbOICpieyMJZm
Z2rL+gspOQfh1+0gFQl32/8Qwddae4bzB2OesS+veWzGMVlni3KB14bO3IXP
n8wi4oJN6luBssfzJlWawNAuKemyRONi8kBly7cHHJmmag3RF77f/Jrqya60
UctVUm4L/3MyBVjFz6o8cNaLnog83i7lhOAo5OLome26wqJzEHXamP+t+98b
KX0SG3YmwYo1T5dtUOvz1Hms2dstc7JiTzECSb7Btln4xlESP1rOQERC26C/
tz34oIQLnAIEvw4OE9cHS8sN02ZjXyRHghsAaQ5Dn1wZsIB3s+EZWlQrNcie
p1nQUo9P/rF7pW/uZO9ubijkNhlRjucwp0T0YjHsMQ0/EU9rtCeqBpLBjOnh
ulTiYUJpEM2pXbc4sOnDCrJdY06rI8lNkzfFXVE5tYN3V+iyhvul/HF5z3wr
EyZSzG7+dNnm2jSjLpm+XarldEd0UosVVysX1GZwMN1l6hz2/lTeBdXLjKrQ
eqplRnx0nBQjdm8mq5SSOmgsHwLtuKzgsRfmB9TTEt6oCcZlaYhKVjmmpJ25
AyXT+zXLcDgOaxqTYYQZB11EVoszY7d9MfSkwi0ZsOyx8L8mLqd132gF8wsV
pqmEcDDI9tusZDW1Gdqrdd2npiG4yt+D2mtYme7Le/ZFuDjRw6Qxf2GuFTFv
k03othdfTKyeIgay9il4h9ZtwGvWgXxeKG5coeoiTK1CqFsyKPR+S+c5FpgO
M3fA+Kdrl72xOlVPk0LSeSJ9a71aa2UBJJEsUahOB3FrUwrC68S5y2CfoHq4
JMUoD/mWEoGnGZB+6cJCTZNi7830jkYCIVxUdi0i5gvfFureHj4aoVJTF2Ao
2mwm4gPeZlWjaipQTCFMtOWuLhkybGIxNUV0Ubpiq5HqmQCRj0zJ9ltDAn6q
d8dkG8wWMLFMKAcPZfUYLqjuGBWjWkKSVXzlvSnVVAi8+Xk6XoYhkltrWCA8
3cGZP6Xr+a5AkWBHF7DgnEoxHwybpUPmKRHcCOClXL89AuzQrYxqAZO233L4
p8Nsb4vyy6eUaROrxwqJTmNbwO5gHxm/laLhBAWZaECP5CbRbRKQck4XASAd
MfuToy6cTrDrxdtOT4/GurrkJ+rnzYN2oZ5eVm3h1JWC4C1/TNviFBdUu7/G
mIkrVnIXV/P9nLMYwjjM39xT/gFlA7bgrwIp6j4ULzjCzlszpLZiVpgknHmC
6esq5iJcnCqMKT4epy+YT5ORlbgRbbClPkgHjc9+zGrfnZC6p4pgx2ndVHjx
iUpuDjkwhUj6fn87o6P2tHxqi/6PfHuGSX1HeLG7veYAMTmEsIN0igsBiEyZ
av5QXUj4pCh/u3FnOOKXuPgVcGdCRF3dXhPKcZ8oplp75OawF33DsrItwa7f
GyaKdwY//59xxW7tkAvon3F3fai7v3hDdbKTYLG+7rcgciVpMczYzxPCVpnD
6595Jngco+gQOkwXpNPwLpkXjBxD/ZN6W7wj3aYKxxxtXgUxg9b4LzfFXy7D
GNiB9F6zzOKiiRbyn5qs/vcmq9+iy/FnmyOeueZcpVuER8sbJczcwJxhrifO
K+6828PprNQaGXpXd/zXVnm++UvJY+t93B1zXK9wWXufobQQPdIdczOvczDv
YOL+WQfxH1lo9n75CcSReFnJkMTfFxPr3LxTMkCTi+QlLK2uJPOtUwGi1ua8
MM5XqYJT9ScXg2uDYrAmb8ZBpMrdizd2yOBl6a5rw5XWmj6wterRy8pFLrvD
6RwpNubaoeTJiIDVohWWbFpIAhFOPekOn0wKV9V0WKp5Jng78UsoaDRNbqNJ
V71bgS0//LA68LuKQaOpS5H1R07FNYwWpkq5tHhTZTSv0JYWmeerfKJCcyHO
L1W1Leu1jscXQLpkIPBli/LbkjKOIl6StsGSHfjpRMvfJJFhu4vZlCrzUxHB
cAxpRyaZYLT/NI2ShxniLovaL67UHZP+ltS15De3txfZ2dcZZdeQtKG4DN02
4evh46ck3Dnoee0j24HEy8KNtSqcnW2SM++mCJpdYt1IgPR2Os3elA/IyYz+
lGjGCiKFskgo247J4p1pmORJs0iIVzx7IfXq3wi/eoKzn3u5AeAFMSax03S6
rIxu4/RtUz1IINep+gWRr7huBmBP1o5Vgd9R019Pf/U4R8aV85iGw6e3rESX
CQCQRT+a3iRHUpqQFSv3gH69bVRxVmHiHt6G7J88BEcG43RAe6y7vQUzjoCO
+SKqNKT+dR+nM6zgu05d+2Le62IyMpT9ckavefejdk2q7RSSbEnNWGZ1osSl
Nes/0tt/pbf/Gt7+K33tR56kX+mO7aJ39FdK6Fv17PbWx0isRAIMwDmxOd15
pLJ09A3NiWEvg7E2mImKvcz+LWfyLYGGVLNxL2ux1KiWdyRyF7RCdN7+OJ1/
QiSAMjiKQ3cwkAfPs1Olk/066+9ubSXO0WgurNyM6Kt+Feu5YpaHOfL4w2Ov
6SGTRg7NQVQY9JnDLVh5VC7ynqNvznpQToJ61JjZB6nXws60RuqyUw4eW+rM
cpKP/ryszGZDGllMmMiXzAevXXRZooWEy4bPwaysqlrFS3nFis3VpQ2z6h2D
5jvGXOiI7rMgRSjtA3qIbip28qgA7XJIgwDQMTTSZfEW7nT8hxIACP98/z15
ZAYU2ykx0SQRpH7FzLWjcM7chCZU6sEg/ixyRXyrTan5ne1XV2bUDCPOMn2F
iJYxGECRmSiEHbii2cAi3DBwdE/FqKTMFrGj02BRi47u9qFlygu3Lifd+kbb
DYpuipxsJt8TEa32rL8hd3sG7aLdiHUTDZ69B4wGOk7FL2FkpeB4bt8Pl7Ly
vav7ASvQ/raMxrEGVKH37i1mWeAKuBNNBa4tI59+iQXZZ+fiTR0qK0+UxPVt
AL+tek5CryjpHjjpGH+KccIjXVYp8a4Pk7drWbErXznu6Pg8a9tQQpfksWJ+
kVQyB9kc+VFXR8rpWCsokahswyLesW5Zmluqchskdz+YJl+Tx05bYZiBPwiw
17iBzuqzWipBD0UL1fnDtaWYPdjAkaSAJcIizGdQ8MYlNkm+AJuu5PnBJyw8
Fx6kyG5F1poay32qAGYlmWPxiuLNukb0wnzGcsQ8qhpnlUVWwa5r1sve10Jm
HS4owfNfzKEYPJVVV62Nwq1BNNu+iFs05d5MjqWkSzI3iWRtkDG0nCVZkIni
R203dtIw/1zkC3+hWgIdx5eb25pUtMe8eoSlmGIPOquqAXT81LeT5DmCuzKw
0O18BAFrjHd0Rj4H205ooqec/FS4fUF+X+Gla8IjIfBJE5W30ZmUxXQvZsEc
0wbh6VtSaUpSCa1kR2ObuUNAzABaqg3YbBH290vZSgZhdoeP2aw8WIXa7XJe
+eIxzCHhQCMOIQjYmsrVstbawsS3Vla+7lO3RFj+X8Q3S9enENHU7jZIJls8
1MiSWJz5AIgH8iEYU3V6HknBFhmE1dR2vCak+JkopA45O4TdZPoVU7FqF0r0
Z3//OkmEQV3kswkCvDHqj4xUyYrQilYqIBQAAg80tfwuuYUkEvdUshmvZ2jl
jRVBuGOp/cgtOgesv8sgQCMegU0lRUKgzpxMZTYdhs2YXv91kHJHcAmNxY83
fBW3iBR84+uMi9Tb1qesOnoOdT5HEpn0ddtcgONobRD6bgnBHE/Hl7w0JjdK
Oy3hmZ4vVhcZ2fi+m2UjMrFH3j2u6tC4bQf+rnX6z17PIO9vwu74Sc2klj+f
bTX6db+v4XA+pTO54Dusrl6CxsTdx/pFWA9OUfFx8QV4OglSIQQMnXjlM0O9
lZ/xh6k1ma4/Re3e6n5Y9tF9CcZgUr5HWqRilRqw0ofSTtj1lD8UGXSp8fcR
tq6ZJix0/Jf4WuAQUCXhHbLle7IWYa63mnERKjZg0qk2QqFKaIBhlI7Ig4Gl
LTsU3fCVaOE04DFaoGPtrPeyM3b1wVonBF5O/D/1203u6xno+LGduipSHJe+
1XP2eVGGuyujtinkVFH9cymtM1A5Eb0nR1vnBepqTjGzfTbyuO9duFBGxXiR
8zhtGmKBJ1HKw41l3rF1c8d8asRzpXfA9yR+R93u7ZijIr4KUea5c2Fuf7TY
IHuc1LyF5+lHZTqhvlDnO+RzWgoSV61tiVpFXJD5ejhbn7Il2f8cPSPZcQPB
yNakk/TsqVguCBcm3KaTxGpWWlp6YCUhTSzL4+MQ2kDXldtKuGooIQfHJ/yE
PUgEI9oPmXl2uZcLrlflxRALeNojXfNyMVCpcQhgGHDafVAH931/ubfs4f9s
qrgaCdnHH8k9QQrGcpxbnYqhMAeoZeVoJLnAjkwQjU2InI5Wut6qoqgiIotw
VIspJYowuCjhKyN3htHqZVYRpBncflklM49ZtgRJuVxeJTAl6A9vBDWCtX4f
u9i6FsDFqd5ueunoRePG07qh/KXtrR2qdN/f6b1qQ0R663ptKpMW3oOAyCcJ
zWuErjR5hvno3edz3hlcrExKiHPZmWYMWlgzOPa4DsvQTlziaehRjjclVlUM
oPl4eOjG/ZEDXOmqNLhPNVAu7rIqKKA4egCJ+uIKzNhdH4Xk0laK+IESUlex
VunMzQC9Mar4IUeHRD0475ELkOmK8ZQb7cZ2BdKDw1Y8jCiDdId05IOIjmry
36bNQdjlStuSTJLxn/CQaqj1Gr4Ei5JwXres5hmm2kUH1Rdmrqp2rbCBwpJs
STvUa89N60Juc8kT9eqaPwrlQlVm5Qauk/tyOz42SWHJFdVFloqZg3fhu8As
V8pAZliVW3QfV6TSo++0G0DPpyVKd61IeTAEXKRQt93sd1tYEg56s3njhdZ+
DzG37nXBTKzmFqSWXry4odNzH3r/BUTioCb6DljJ6IP8rlc4lNGNjUDlitR6
9ZPrazjAAfjwbDouh89dEOIZBr82PbYdqH4TrTyWETHrR+cqpjgd4wGD2HQl
hHBHYOE9xK92p6y3exi7xzgyqmqK0USSWLk1U2AOuBj81l1OYPm43ArnUyDK
MuIVS+tul3Vfn80eVyW3YTWiXOmkURZSuAQxdiQGBclXwwmTAdc4GWHTj8eV
v69nRHipRMS+aGTkERSKGwWJUOcVTA/3pHBaa4EtSVRiYtFqOv4sPHY9VzBG
dOjQW2y+/AHhdNI6ML/pSkSNIh/9OR/SgbS93RFwLmkasgnyEYpIPoTWJrFW
HhRoS1un89PkIqSep3y/b8Cl9+1EdWGGYA0daSYsF7kwo+8d0iX4OcnO6H/I
zAHiCxutoRFUC3rHz2U4sGIzyH75LIz/xoUSA8HlGq01kgcSCShXD/BF0KB6
ho0eFgUIDMZ8OG9eJ7sj/EkwHskyRwNXt2/CfgvqIhe1OFvN1ChshQI+ldR7
R59mDD7ZGenFk2LBlcQJuqO/kZInelBbF9u0sG3FFVGckJXbYFXbd0SmrfnT
7Q/Cw+/rtL1rHt7esoeduFzX9H54OOVxbEUqyPaKh88jNslH5xsND0I3/t4/
L47V0cuEC8pou+k3AE3ioK+TyPC4CddwYR0hhmLD3FP8IoIBmJaRSVSN9Gn1
9obgz374gd7FraUSmPfKDz+w2ceh6WO/TeFXAlkJk0qB3QQ8mEm42BIawKIX
f69vA4qALg92C2p9FPoCOwjuioh6igEqqKHlwwOic0lYko9BR1iE3A0Tx8+o
MVycOC7/sHy6m3Z1Yy8ekWITJt0ZRgdb2vE/1x/m60POVpBJH+nZrBtWEa6c
8K99+f9gK6ia+we6uB/TKe9ljX4YXcxyUjIx7pGgvlB0Wt06ufNWCc81d1MZ
RdV35Dq6kLJd0spLQAR6K+uMJbtIqMWeyq/FqKupKC6qL1uAX0+fx0kUpgtF
mTmlr4KYIW6sFjXUFhYMVwdR3mD+IYXEK/cpiffDDFCycG3PFk6DWBm8bsEG
2277wpwgmiA7UJMaIoRlBp9K1OZayjRRDxJFcucUiYDdr9tbIg2WzTrkCtSG
laH1dC9jDkJ7MGOmvAKIr6q3YtqaJ974LBVW5fgamdzE6rj5ULzjJWL+aD1z
Kx2gCXekARXFJ6CKZEIUySznnspmmmAiUq1z7WKSIrAiq2NQmxuDxyiwyoK/
oYH+9r5hsxqKxMvKvqOAeEn33G0jNPo7d51Su7mdRaVvLLWZOrFaG+XNSQlh
fsdcyZZB580rpvyFScBSNyNyQH4PREFT7mWz+htKGXJorunVgpgpwySsoD2O
RUsKMIy7ruOkcO9TIrbkAMK71llxnpyPP+yAJ6Ifm8eJVI+gI0SRwqA5Apvl
mKsKGjiA9sfGf8sG+xth6pgdfMFMRKucpzGBgn+pG8QHsMR1imTFvyyhpGr5
D63tTZAyt087jGZO07cxZbSDf4Ik5Apf07HUFZqpo6pBttVylVA6mdYE8oIO
q8DW+afi2RXeWlKrvycELn7hu+f0w/F0IrBiNeRxZzE4oVohOs1dr7ldUj/I
mKWjQXpk+94cDP7dcNV9mToWAUECM8e+Ery9HS8r8x/xbEDQTSdJa5yfxRoJ
dzDq2pH+FheIFc2pL4SsLxtitI5OPw8deAjT/4XoAC3aMb2TQr24ewiQLAhn
racD7Y6Fi9Ahdrlae+1a3D84+JDiEnzQUVwKFbv46sKq+Aymz1gUEeql7tXj
P7WTsqQIhLCDJJEVNAJ/0yulINvu1HY5X4GiZTJesLhfn2Wtj93twUe+OxhN
iQIN4aPWoN32ZRDw6FbjUSxt2xML+9IPH7s7e83WV5R/sLeIryktTZIq0LOY
h09PLquExlgIKZi/jCBStCaRLDytziDKBqNGoN2RCjCdcRrAGa2doFb4yEk5
Fo0RjIou8Tcol6Z20EEnQTRIw+/GTHoJJZcFm5SnVh4K9m4sen8oVzrO5Ocg
Rnka6EcLf+X1OsFa/4NxsHnc7HR45fKfemZpeqDTUOPr5HnMF/dtCHfib8KM
tiy7O1bG+pauIZ6h0Yqm4LS5K56ngo309N7rus9A1a5dOHXXeGMejtxbBbeO
gj6z/EHBe/EBp0NwAGDsCtBCfprvWTd3rJxhAVYSJoPB7sEH9TjNC2E7SSlO
oibXnQX52k1tTjYVhtOnO9SUmcKIiRjMF/8l6+8kVmbQLJ/Cl0oGP7FDaYc4
2y6CthD2rTdIX7w48zW+Up/Kt6qL6+UpQE73QqY/4CuIFIcqTtabm1P7Cvy+
VKP+/PLslioGh+kbLlrhZqSyvPRf4VzgMmrhfOVSxI65hysH0jsQDA6dg9NL
4daOh42ZhoWpWbJdOHOWBuLlLjvyEehT74DcRz2dx+1edll8qU1iYuMnVSHI
XRSUpbQaOPVD95WxYkKBffurf07YYCXeNPxEv/41r8pZZmS1viiJ8mfuEh73
orybo7S6uyCJKTvsvTHN2f1yIkWY7mOuh69zy0QveZBbpNRvRnpEUl3UWUsu
0Opb/YsTFzbpz9cXePbn63PK1GcINZpSpl5PkxqeRrA8doJRjc1+hAMTLgOe
hLs5q7adRj4DnJsYKNe4oOO5c7C/90GyJR8Xi1l1uLn5z0zZwMRxff3vVqRw
+HA4GOxsQvpmWYtSw0ids57xRgKOpd7mmjaaf1r34fQrrVfHDdo1eXi438M/
32lLm8QB16NKsMmVre4NBgd7oaMy7A+H+1v7W5v5rFzTqqaCCS0PFTf37cIV
d5XPq0KNacb3siBzi0n7ImzJ+It7VhaZn11XlY8sFEfGnmroka7tMfRBZT1B
FXk5EXu9neya0lB2NT98NoemFr4V5OoDag5ik9wpsXBzL4qwHVDC/XA5p6+c
SERJ5cB/wef9HvjbLiSV7kbqOMgel3KYyqFf89A06wEGQ64c5eIKSED7pvVP
7+P1qpYdo8hj2XdJRbKyRFZSRJNA4cLmyXHBYU6mEJaZ2JyEW2GdypW4nDhX
BJGbGwv+ZbQlmNblOf2lfgHuVQwXMk9rm7Y4lx+FKV2RSmlqSMwKT9OgCyg5
Q5UsvZR0jawFdbHw5uQq29mHNNje3371IaapLYDWNxI+LTEoyr3KaG8nlJNg
Jc01DiVV161YrRTwJBYVKWSPO0B2MnON+dYoC2D6aTkLN87U9DRrQfaFXITS
z4g3whlhn8zi+ZDLAQlpOcVjhNwn1iZHOdlIzaw8yr4sRbj8xA4uJtVy7nrE
rRFfh85X0CmIWU1JZQrd2F3e2DIG+TroE6wKgaNwZoCzolBk17ekaHzbpaPZ
wRG4c0mShD5ZWXU+PT6vt2g1YIuHY8p057nufyV7aSG42ZUf21zmolakmZht
NRc3b7MbMCjvHGRgQ7zjko5d2DfslBnH2GRsGfJOpCo1YWDuau1JZWJKahKy
dr6vQdbn3+LRkCh1Pi7vRd/9eHh4EwxEq6DepGuRHRtzcOl8Oy48LZvUREWw
PeGKLngminDEIP2R1Kvse05WubqpiktkJ6CMwx1KoXcVrwnvLXaQ0fcXUu0r
yCa6Toi87zgVwBZtJBeXTj6/ZtQsdApdkg+JVpWCFYi0kftg4tOtFnagSEHO
bEY1r+l4dIgMbScdV4tTRVc1JXTr2zWfMgk+D4PNLqlVfPRkjg4PN4Oi7A8U
C6gjjAH54XyW6SbhoiY6ziq8rbovgatYXl+9tZr1NG3s8KHjTJdL8jIluy8m
vHWgcr3aGnwA6IBxffxmu49htU0KQtkH0z2okpLgU0402dx8HVxZC1Q+BeqM
zMn7J2RhVdoTOpVFOLTLCWE+KgoGT3C/YeVzChnTLZpsALtLJXzzQ7BZfgCS
QYuEdMPs8EzxrW1s+oTeoA/kcgmnQatYW32RI1okPwVzgcpUvlP0TV2G5t2F
9aJ9nCScpcvb0yJP4TQqO7yfqHSe2DcQzkxVjIGFAg6F2YUGL+FZnOfkWZSR
IbmXje1yvm5eOhYnSWoi69OaRoaCV7YGUtdrYZ3PtKxSmMpifE9xzUpgHSVy
qrXUMrlAeyA3KvMIukyGKVdzCXAMO/65UobzCNw9K3ucq7+mswZlbQWzBpUm
5/DfJTkfWOZLWi+g9lRiDleElVOI53DhFypZo9KVMhdqoyySr1q98dUSZQEi
QlGL2c8hlV98gWqetWN3/lNBqbMfl4Rw+BXsW+L+uAwfUUELmxTP15GwGI3H
fBwBmKfYX11mNJbzZeVZACsu7N5RkzZhWNXsX3MzqQyzHLuRnh3KAdO38Clq
kXCrnUtK6IEfm1BKvIzpbTH31Mors1DqF2zX86HRlxnNzlImnwfRF0z35y4z
kUoRJy4TSfMOvQgdJWR+mI2xZn0ZGQmyvmoSlm4Okq9f4M3RfGyTyIfqh27p
RGKURbzdEAcPMkqIdE3srJL4vGfCsl2fv8lQM6/KpsIhKSV3dF2mk7VWB3t/
7oscTJV472ZQiSm0VO8kbuLndb0CfqwyPPKKK65juHYpqmMjPcr4lZhsfl+V
vk5al6HTiLkiT6cWn7OXtckXl3/WOApaXk5iNJYLzatilKZ3aD49CpcQt3K4
NkdQuGn1utRWl6F6TqHKI1dDslthDRO8bcIySdrCgLkpHbCKsMb1HKaI9Pb6
ZUbZ9GoTkGSlWzdIl+EQlcUexs+HBEiaSOJRN9h0lBRBGPkobN3FJ/dJtVje
uQpdEVbdvZ8XrFeFyyYxrQVIGWcHCkxjixzp9scjYtLi73xvgaqU1C1yNK3Q
Uh7yWY9HpDZqMeo2r0MbEKuN2v3N4XRe+I9Zf0+WzXjGGeBi95ZEt/J4ncYe
QNp/iaXVohiFZ6EkdGXYIVTleLlwx4I2CWl79AQBCZaz9sppTY4mT6xG0SBU
guQjA2nVaV2napakZ02efzBjBE2vkzPhsHWkMKlsTjq3+A7V7W12bzEdS0W2
FcfjWY4DG6/s/uZ0UgokxT7ysXcUUepV0qpfle35tfqsWk6xVY5QM7d5MlZ5
HVf5Cpvswo4njwnZCxtRHoW/Yf9sZJ/zOaWItV0+pVQLbUxo1OVh5DyvOoeJ
KIzR/qp++KG6+d+1pdgfaY/TiKpK5yUqveEw8Wz8HqESJuR0KcvEx4nUHJLC
HKLno5RuHkqyhjbUCoPM7sf5rGNWFt3cxOtRf7fRieWJopWoAWVRGRGx1mww
7pjlPEHroAfDohZXorvRRgFBHuNJmBKC0dDZ4qVH8KKIPE6ilUu8yc4b53hq
GMaDqCmY6muYS7AAuAxKOUnmjQuf3kWj0zJJWJ2GXhX3zYiYmCcc7ACMmr28
kuUovGPRLdADZ1hNp+FkePBWh4kcFozGXlgPxNtQPgmRtTm5KOmqsgK2GefH
RvFLmqe7erq4eigQG4XnpgjnjoWS41lFL9M+lC7QVWrFAJuM7jCfcZVWSFHw
n9Yudt7xbAqlRNmievJb044wHVtxn4duo2iwu8X4zKGcsG7SWKkNZzy2w6dE
vs03JOWoHDHexnbnfaEv6wFgm8gJPUHsq1ltiwBySYJIPBTJBoOrK7qu0I2G
j4G61XGgV9JFU7NdiRDlBPLGCLKTU7Wc84iZSuFI9f7x3HkWWB4vkkhxzcx2
wWI+B8ZezqIevCKSRcLoOVlkLjyqFgLllkvfuuwLVncWEAsPuJdloMKgxXoi
VLcvZCUWn3Mps2qeMPZkhxvFUtXIMi0rbw8iJkTqxgO5jBbtNdj9mEpf83sy
DYuhUqLvGAsRywaus8JJy3C7SMGc0Tadp8VrjCIak6iofrbYsXJpEKU6SkuD
uPRlBvMq6lIsNhndF58xltr9EPFkuPryIqlNR0JZb4Dc8pCCakLr4NwFo2I4
zgFtU6/3SjQx1BvOrKhB0lsrMCKoZ6P9X7FYK0o6pscwKSA9mkrh6flnUVLU
X+Et/NzCHZPCAavxJXgNHss/k96j9oKrgt0ikN2g7RCpnJoSjNTyYcJaLMux
nobYiLpfQxWo+HzFLyf2R14FZqC0msgri04m6VZFjnP6x+NLd1GQp7oZrsO1
nEig+J7ckGzTFP1swbpJDHXUDAK5fKmgDUhPwq3PK2bj3ukFzebybO1wt7ak
G3hqzSjpdlrt0YJJReFrgqJIwe3vTYaImgVKs1sxz9pwbCSVDWUgS0iazQVJ
xZMYmvfj+sY7LegZhyMacDoovpBiRFGSChmuwkIU0QIc0+3tbT4Lm/sWXZ4D
zgj3nS3emNVtXOqlDKQL8a6QEZfERrfdfDruzsb5xKQzK2+8vVd1G3VfVk8A
raa0QiBDaVe3JMPhqiATGZqJeKAMhbPu7wpeWj9aia0ntWxLKbdM0jGcRRzN
Cfsi2WMAVyXRWMXrnrN+oRukLzX63eV8NqWk/CsXp92hiiEYY7fmZLVIOFLs
42jdB4SDUTqmBPF8x1oaGGls5+32YkVzqSMUdlz5OR8+v3hhn2i59AQHYBuC
C4ED1KebQCa6Vvt2JQ5lkLLIUKf2enqo/xB2W5DuABicsdZLE0Fev3dpnBtR
4s2dbeqZiBdy/F3pIXyCg1VrFvinYX2LQOKVrpZ3o/IzF7E3NhgL0sMBK8XB
ZvCmSkaLYqlXbeBedsOps3zueFOLUJDFiRaKCwDH0yyXYikMqQyW8l9TLPGz
+kQ00XVcVosYq0+poy/DaNz1Q7DUoLO7QHe4i/LEQZBAwgV0AGX19qyOPWjV
gAfZscWaNlCmHamkDwJcCtO1wTEUFkNYbWeOkUYfxrSQaEikwoC/nX41fCyL
z0ViPJKW1C0mYcQiwh/ijlJPBZWZSJADGedbJjQWTMfLEQ7a4oyhjFPXzZdB
x5hTLfZubRq4AJzkVVXi7UGxHy1THBZ5YFnU9mCidc1Ie5gj2ZuSaoOoh+/7
gnAE3z0Fx26egTs2AMks3dthzca8sWsHpa3bTWjLxJiPGIkgbu9Im1Bs4d1y
kYgeF7OQ86KXatzYUdnSPHPdIGEf3FVDwtBJ0JgQ/ZdqqEARc7tYYUJA4s/A
4wG94ZYJD5DmLJQKkruiQD+kOGRuW5I2udnfM67SDR1jkb2Gehe6EVmzDv1X
hX+C56MrcjGYb08CuI+TxwAB3elWNYLnp3YFKMuQCctXPc28ea9puigQdzq9
YUVoVT1hRwWdJJORPHa5SlrBjFwoltJE1iu5QyS1iVSXjGvOwDtLL86qsEfD
kk6R20gXP9U6Y4hDpMW1tGLaScDAmZGIo1dQERIlJp0wVy8Z8GXFLOtf9Yol
52RY82LC1dW9bJAR8EhFe+cc+DDDT0VOLpn75TgjnuXIefc5vIY4SK7pORAe
6p2rhlc1nC/v7mIafhEniLEoUpFxJGX3HIUcwPFcF03XkDLc+dJtwOhuG7cT
GVn5uHLCnCOsikaxrDjRuBTdip7FqaJOGpcAuf5YX2VUjRHSkz0aVEboPoS/
qrj+WbC7phRsNOTuN4Bg3nccSRwUzhUtPCEcIgFxBzI9HRurH0Pj6bPihJR9
TvoWSYxfri4RA+HEgNQuDCN9yqtPGh8uktIRNVICmxKj8zJFZRPbnZfkX3r4
h+G+PfyjvIa8PvF0a0HaxXTGFA14i3wYxBoL9rqjQQk6+PwsJ+ISJiHiijH9
08Xx7ZlYjlbjNFq37dW+CNiQKKLuTMEVA5I69OKkZGVO4zcx6wqha1W3w/Qp
mWLcgSiQ9hSJE4hCI97rcMiSmg4yOV3rhpw7CCrUxfHxCY9WYacvXrhfCveF
OOgUmBrzUNgLWFafEILEwcS3OTthf2/7wyEnEV9PH4KOfi17JVHkqMDpcdhO
pFwReeyoAIEFcHKweIzgnhxVYcArW/F8z4TPY5+mWowULBUXCuMF2E85R/4Y
fMjFpKTNcw+nAs1Sdn2c/WFJ/lYay15/a/dDWKIciiFNOU8ab5w7pa3jDBRa
DdpddO1LAhrnaJ0en2bHkMg8aufEo0EKoyG2MwQPPY/Us45CmKivHsuGuZJo
u/ebx0Q32zMkcw17YiKYXkFOk6fZglfzPvQeSoSk+J7+dML6Mg8BRTLOTwn2
M6TyvjSOd2G7hIMFY9khQ6liIKmscTu9K4L+Ncp22kGc4ODJWi+kMVVk5ICv
yFxV5pTok5Y2+6BsYo0g/8uyQAqafLadtWiAU8I9kLU9mj4hm1bmFAKBR3dr
j6npdi1pABinNhdbi/Zb3Apzi13xboiufLPmibe0pYPYHoRZW849U36tFRgi
T9PPPoPC5siA4Vs9uDq6FyCeuxmGQ5qaePhUaOliRmp/76C3vTuAmd7fc3pu
GtiL5KqETtVw4FwrRIdfDMv5cPlUIcoWlu7auxTMDdr0bo1jr1b7tmJffZpX
GmGYxtuxbpJR+3IKijgbERM4XjUrkjVG31eSsZwZBCn7lC5EChGyi73CTDtr
0lak35NleKMXRbIeZ+SG42/z1Wvm3YCSgueaxFLxPc/CN7pydYLJy1zrggKp
2eLjKA/EI9PLh4OZz4ePzxDObleoYIw53Xr5YBLDw++K6rGLt42+8fRTeCro
huTFSAmgyKWBD5vfncBp5b8q2OMxir4Gc7d/JHFd8hflrIKRew7cCzAN6Mtd
yd3tRrvK39/AUcwfgpoqSbq1wbTM2dpeMbBwB4fv3xIMn6JZq6YsOSoCM4Rb
3n2JjNUns0bVsQDuyec08JdOX54lrfABjDgHw5UneGYrcF6yl2ldd9gN2Tp4
tbnfyQ728e8D+vf2oL+5/+9/+9/bA/5xd2tzv91AKyuCj00tBxxG610em8ZO
oqM7qp9gKG0OL/qXGRgnoS61eCYZi8mxWb+gxTiS1yrYWpfJx601tzw09vhc
WQrY/Hm2mD7M89ljeF5PuwdCMwliY1A1GkBNSYDQUPQt0Bw+dof18KMWQCIw
JUN4bRi42ly12vLS3SECiTtnyqm4hwWdi6O0nZlzJTJ2c0QEFw4PjKF1tONP
6Fru8j6BlwOJMWGUD2RyTvhS+Ld/DVfQ3hEyOu0Zlky41gubuKg42xFXQlXN
+ApC9Bd160MtWynhHBIi94wjwnIfwwR35Ip6eDBJrtIUd0AU2Nu9Jv1GVIzF
oQciReEgqdMLBxFEW6asntTBIUjUVJMGA6P2YZgYqFA3X20NdjuZlLD/sJrA
Q4R3s3ZAvU+VT3wnebTg0qn70a1tlc/FKbOYUg11gYgKpMSa1TLsYaDlxDe4
vbunFaeuzHoZFgWyq5Q7ClDixuItfBpP2EGj+urBgSipYpW4ECg28Imvtw2q
YCs9WjUFG0FnvekWn3Nf1gMz3e9vfwgvZk8IpZIwSkswtoxXy8nhG6SB07zJ
VmzpwMlt9dN01r177ob/dPCzZ5p8L3XhxbQTDxY/d+1/UBIY/un4JxJIZzdX
61vkqiDqIqwx4QyQm9ZFNeBSYA+oNegdV5gzcipxMVV4piwlbqFZ0MKeolVo
zdJnXLsoF9ElztHotJiDY5FWga+7BIKJo3hFJiSqkX60tllEl1MC8biIANKo
VoceGHN1V2qvME85uSchKQHvaiikRDc8nD5MyPPcPOBUcbzK6qxME4CeW8KJ
iZCYo8xdtXI6g1JRWMRwmOChpKxqXB+FL2IDTI5vKZ3zxKGGjH43lLgpa++t
9MWahi8vlnw3Nj9pUFE27hBBy/RLdpHfhQsxSkXkRtEHY3xQaoi6yyVdBJfF
VpkSIYjxUjMS6JZH3oVrjzPITVYqhXXVa1jPAO4rvD1pAd6qSTlbYn+BnIMk
37y84wz+8IL/Ob0hLqfQ40hE8NY1EQWRmgOPgJ1T50TR5DQf5462aheV9Z80
hiCEJomJHKeYsn9vr89Pz7Kb5RMhZ3l2Z6Ti4Tz+278ylqeLBYl0xhNE15ak
jz4iM00OiePspFtmqkmdCFlQ+oqgcrAo8mpi83uY4o5taXZxJ7sluN0cf70u
ZsuRQlPPJ/ecFwDweEUI5qAldcKWrzlUOtkZDV3vc/JKBTlLddYVk/OQzxh5
87kEsJaECeAU5FejNFWlqQNWiL0+qja4gTKkWgA8kUiXOZ4iMz49QaQr3bsi
p3Eh+KPj7TH53fHNpdUsreQjOh4eB3RobVuCBKszvFI4rZrWVCORsiZbOftN
fFoJHXvojpS1pO7qnL0kjkjpXw6rw8f2oaDeuCPq1VVhza5x5w4VXB+AVwzq
7Do3djNL3IdWjm+66ttinkIH41sLA4UC6qlxYzhMS5GQE5w+zJ+UwsTo73zR
d4k4CKchz3HQwzibiMW8QBeqJWn87HrzvB1csU/n/jD1i4UHb85OdAbDTzx5
R3xlhp4AoD9JoqWeSymIJR/3jWoqnNJcJUVe0tUc6xFQQ5XDJjpoliJOY+0L
fkH3c9U9lioc4KSFJAKBphOSYehJLLox+FV7F6r8fm+QbVzrF8haYJc+ROMG
beqUgl4sLdc0BeAmDI4n3M/9Pf/dZPYwn7BH99vcQPO1nN3kwZuWFSw4qdZ8
xXXjwBw2JytgLsbohIVDT/jasCo6/5llmidk93XiQEcnLYVnYNtblUfJiidZ
LYA/goD/rpJlQHRS/CVP63c3ietqsRVS9nYPtl9lD8swFN0GzFXUPuIuV4p4
xMFh8KepVEFiw1NBO+Xy9CrbJLe3yaXQx+gdq50Uc4+3cAgP2mKBohnPihlj
xzANJ8UXV9d6Qcn5zGcCAWzXjEjgc8EzlouEJQiTM5kxkCua94csG3haFczN
iFo9x/Ec+ckl6fYABaN1e3HTyf7nz+cnnaB/d0j7bvcgZ2Bs1M9+0BnKJ5q8
szXWkY7nkC0fs5TJ2MxaT/nXsN6mktGPZkR1ajosq+WVqoBCocy8yf49ySox
qjOcjI3IsaxKukaIGCNyFEwDcP7wU11oQzZUuzPuBTYuOZ5x4oh/z6KWAP2C
ssMwl/FuTvM0MHukanVZfzRNjdX0FWr2IW3yu3IUDgIPcTfIqtZGQ5X897/9
H2WicOmsjkWf5NFG+8hLKp5HkU5OaSSgPt1QVp2WKDtEX1SnQtAhN6Fchmsi
H0rWEB0KUQNXaIFMZdjRcpTQsukYOBVLDoKrQUyODKw0f2M3awm9rdVspwEh
DIozwKYzBBrh2wupadGo+V6tSNWIW51gT9MH1r0ovp9U1hZsfoEQTFk9ctkI
ciYE5Yqw1nQQNZtHOYIsy7ykAziEYOvaHUX2AdgNWZO1ovCGH3oiTQOoA1Mm
0MEgeZ5yzmRivLvugXDzmMpPuuYhx1WYhHO7QVrS8SDx0HKFGi8CNqoxkkRm
FC1z4dUtMRDYl8B9kUqNSFLIsxalmFS09xDo0x6HH8KN4n4qiIiU5zqI27BD
Foov0zwgEgLTke4EjtUwfRhNOOsHR9gGbN5TdRK8RBcgmSVNGrZum9+O9D1S
hqCow0P4NiP8Pie6uTYO6ZM6G3AeyxdFSWErTBfKq3ATjYJQX3SJ8as7vO9u
bdFJdZ0L2zk0LRF1QNlkF8yYpZT6ffK2G18gcAivhs7oxh9hoblIA1hhVpo0
cg6dpLKYUFe8xN8xBXa+cU+gLbpzi3mwjDjOy5iZQ6szzTVRhEnSO7m0KejA
sCeOf0K6Ubi82HpinxKHk/jLK1wSbQg9MUw53zFNIlobjjX6X747CGXZ8EEm
ZpnfnzEC8DJCa5xNMYkuLU6/VBiJER5qOL6XyknO0MPMklFO+kz4KhV/zyN3
Z70mmllWZc7lwEQc0S1AvJwaft1gF5eGIeDgCu1tIAxN+5rMcD6nYbttwD79
y5KLy8FBY08+los2xYBgWaSSm+dskurMUtyVKWk1tzr8EoWlaEgA3Ej2X7PQ
riXfwc/L88K16XRo6Fb3qZQS6/zjY8mYVL0XkKEL1ZpMvkWXJFgY2shjcRTZ
Up9EBBI1QsABOPUIdQ3TE08enwBEfmWRBOOjGXjSQnkX5qxi/D1d+EGdngtJ
jbT+UoK1XQfc4ddFmATHr0hLZVcKX/MguNvL3oWhP+bOia84xXY9K1LsfpcV
wpHFtjltQvc+5Q/Ft4XGNkXFfP1ONGJ0xlYqlWRqklximQEuiVBu/Ec2NT5V
Hi/J08ARVrqcODsU4GHrS/SuasIaZ48QFW0dPtPQWnizF18f82XFF4OO2wSk
aTJOvw0GrmRr1r9A2Uobt4pOGyFYVTNUJUlRW9hMMIk1Kzb57NAXxQsSl3xe
Y9x6/cO+4TWxIPJxONuVAzgjYIkWEWIUfh4yP7+QMthx7f9dJalcld5KS0YU
ZDcoE74wivW3qfYwgVT/slQiyxZTxg52PjhvT5sMQ+1pzpTtWlOAdWQNG/2V
2hTblJhkVbJHJy74y8D2mhrNSVZ/dFhzXEos5MQybofXlmGS8ireFIQvI7t2
z3JVwt1hIwIXwKAXJpCcnEOUa7osyofHu2kDKUaLtBpDBp8gGbwCCuDlZJGg
U8QqkfSBNioD3ghHxRTkJK4img0+AaFFErdBkPSlHPMm0gsiPpyVOap0h2tj
QoGSd6lNt0Ou4h24vWBTBhWR1C6cVkCVFbMFNBchuTq8ZGa0m8FxUPMRhX1M
Clx6GFb4kCp0lBxb4WajG6BkE8FBn6kpeJFRHpY/v7c8VobFXoajG7Q+iX0S
23N8leA4/eaha5tZ6JJ9lGTlBInzBbgkJwto4pbjT133MuseXHI/n14JYa//
kip2STgKVaj22eRc7R/b8HRbmJFo1uhbw8rfXtx00z7y0KrUIg6SGLW8eMt1
T65+dlIUcGJPN36YRD6Qib4iGlPXKYIMQ1a1i5d8ZS0BnpwugKTkxpUUuhLg
D3tv927JUoIEV5QHoisopVQu2DusolVRZHnuhxD5vNJewsSi2Vx4m4++lMn7
FVFD6fkavqQ3cAWuleEHuaje1QALRTXMZ+5uNngDDBYcYMq6XI4FA2tOnX5d
w3CYM47FJtiMle8BQGPDYy5q+6v2yiNkuIiP3PcVAmGAQ2eIDK+YdFcpJgWr
JojZWzZifSZIMwkN1VMjy8mfLcAqkJWYxRN09Foz4RSl2VIuz4S94QqrPZKf
3bOiq8n8jjoeAM1QIUoC8oEN7uPj80M4ZYUkBmcbaVxpWW209YjE0XBGHkR3
xfTG0P5IE5yO8ueXnHAUA3m7XvXObtgQmUjpTK6yexxN2RcvjMOLHtKimhab
XTgtHmeznIjjQJMKVHVHjsQ43H5zymdQNEeaoBbLkhhZwYRNR4axW3VXV+xR
gN6gCWJHWaOghkbluUNsuAnOIijxpJIKFPxd8TRFsaREhnHhw/F0OqL0Kin+
7lozg019TdAnOw1JJs0mpUj5hWHHTYUx5InAo9UjlRAdA08qWf9gGmcsnh87
hBFDKcWmHGPqYBKvMLEY4zKLzhrrLC6xi+sgwT9HNNgoOtYkqQks1eSLZXWb
sclhF41jfdZgnjlnyOo5S+k8N+kNxMpFzL+TBxm5Ps6+eigfy6DBfyZjrlqs
3j4SbLFaOHBiUqKb7CfM/T1puXTBzwuGJhFvAGky1m9xRNoOo6BsRtceaP/I
p1w6TwzJJLhg2UDTTMR4RjXFqFFmEzSNxJuZTIeOnGNqN5dd7XUy6e/FGOds
bqcG0Iz7pWfALax42F3mcl3ja5VNxf5YEtDENEHP64JgPxxBB4SnWxO+LOSt
74hlaQViFQ8e6EaeqMCnoRe1+RRd9TSdlGEYbLaGrYajwcdtwXrWfUEWPo0a
Bg+OClPcsNrKJ0jZfrfbmRXPeAxaeHeO/U+Ly9naftuVQhyK+rD5Qwxgc8pp
eC1Wr7J6vLFjHdPLGXZMB73rJItIHsYDpmeVqV1VlJp4Saa/7u0wvBxkh3Wt
dX128v7du7PL07PTw2xvS5KyKiQZ0HRtUpMSUVEkKnTW4z9J25wrS+4/G6Wm
BzD52FRmGBXAHB8Vct98gPOWy9LPKrxZiteI2EpS8lRZeszZNe0L5VIBnIh1
o/SMQtm/pE4YVl1Z68N1d358ebySsX6XGOuD0BC64+wSwuDFC3xBkF5FJRyp
rKSiOg89K5jGfY3dNJqhLAk60c+KIyDGku6N1ocYiaYTVMMrAUNIecH+9j6R
g4WTtwwLjyxAg0skruo6KJWHRG4ZkX5vUUXjm+PBxXc8qX0lOzcIEJUqOW/H
tCIZbu15HnJlY07JvUILWY3aGRrOThhxqb9S8qBnVnhtyJStCFv61d7Wh2xJ
fgetSTbnydU8+0yswMhxQSLjOLuJDs5vDPMmHedyYirpf7CFCDRu0e+CqKWh
DGvsvLDZYW3G541MxNU4gdq8I0pYUHGJ2T9OJ0lRxXnJ1MaQmyzBJvVPlv3J
54Qq9hMuN2iqlgxEyCDToXES2bJW3Ze8GlRuEjsMRWLVlGNaFA6BdKRAMbzz
Y8dDVFkRmBxuFZqUK6Gf+LlyvZZQSv4wJ6PMalMVIDkC7D5p1Oxt4xG2KZ0y
7I17KRJf4fmxdOY98x+7ySo5PDguIqHGLlhpCoHP0BJeQ9tYc+CEGVfaV4J0
qCGspMS9RxwhyMDZ3HdJT8RAEW7n7f9ne5C9zvp7nVevXnW2+3tog2eILmXK
lNInw19fZ3u7nd2dPbJ9v1TKEQ/+pxlqLQjpRXhVeD99WQ6W8q/BNURdxYvD
M2j2hK74o0zYFLQ1oxkIrcmoWtuDPjOtcJ5Gb3t3V/9/lG3vug93d/yHbdeR
avnUMZthls/JpdOld4Sx0OOxCf36gP5LGG+y7/kMEHxBNtJcVw01gFYcQVix
82k+4gPJLqnd3p5aQbu9V0F0/hZXnXLmhuFOGrez32zBzqKB9xvPWPjvFbPA
ZL+9+K3b7Sb/Dw32O3vbrzo7+wedg91tqgvc2RsMOv29V/T/8O2DV0bS85vf
A79ll0U+756FuXkk5XSex1JJbKi3LHj4OSgnkX6mHzQiebO9aZ/fvLfVOQi/
29nfoTfvr3vzSVmNl5M87J7sAv/93S+0Fwz4haHJV9v9zu7BAb3wYN0L32EH
TH7/e6TdPS613Nk7GHQGB/ud/f4uNb21te5FzCYl4uE+vyPOA2pyu9Pf2eq8
2trrDHZolcLPg1edwf5OmENaJXJbrGkyjbyYXOJW93f7nYOD3dDKPlrd393u
bO31O32sQC0d8jc52eEvLlGOnUTU3KCztb0XHuh39gc07vDzYKezs3XQ2dql
cW8P1o6bcumo0Pio+zgdpk1aE3tosh+mcmdrJ/T6AE3Kcabep2edXrEbljs8
H5Y8/PSWMT1Dotaj8xxs0xF8sm452/JWfkt4+xYPZLvf72zt98N/MZDdtQM5
vb2UjKHmXtHGY2M8pO0w4YN+mPy9HTTuhpRKqPBpGNHOTh/r9Vu8C0iqCGRp
WenMxWYH/JpX+2FcW52tV5g5XteVY0gqTTF0hWkLpGFtaF8mh6Y4HOOtHW54
1/U/FY/yor3w+NY3+t9CbqTKxk2TizSBchMOekCkCsL0mpEfVPD529o0ytaB
pYUTxvh7lMegCraiRxLsKj+xogLcK7uaSe+3UM9l8XXRlZypX3Dl0yxS90JX
WWP9Xj8pvkhRk/FzN4g41XJYf4gmgKryphBvMvNAI3PLjAMFRXIeO/z8sQPS
fJX1Bztcy33duzlDMjzW3Q7XBi5kjIdRuFUM/7IbHOGEtCGfJbq7Hw4KIlpJ
MnqwMWdIbZm76mESdeKIW5dCC+oFGo3Gxd30K0wxndx8XE3TGTZgFkLpq2ZF
w42c3xJMBqpVhJDNbMoYOK1sgPyXVGmRSuCfB5yNcyDJOBKvi0G66IutXJKR
xelu2PcmmQWrw3cdDd2lD6+L6WGQjoGA4XjSMEEMSFV9tg0dFLgTU1RiTOA7
+3ft7LLZsNb4cKqv1aJTrea1kyNBtmxuDzpSXgr3hOrq1aoDGoyYvg3pVS97
YzoWCx8pivhNBXp1P0ieCfyBKdSs5bSS5S4R8JBAyLxAqCSFcjTPv1SxlAcO
r384mcPqEQymaqqGq+v2JNixP59edTg1jlC6lkQXE+hWAJzCnpr6F1H54IUO
v/L+nUgpGA+IJeeT4GvXCHmYReTyp9e7+0iKKygyCe7T1ed58b2zzLN40FMc
xDmF/7sm+o6j0aQbTWlavydkpUEUoz7Y3vvAyIKu+QIg9hUFxj46pf6BBUZR
ZS5YRW+mq0tAXCtLRqe8Qas263Zvx8ZLHBYuxKPnLtzOIAQ4DWrMw7d274gf
APk7WVHgKPxSjMddCglO4s5ihgEeQi3kTNAykwwWJbqpf7LRFvNR3zlS2gLn
OAl74+OvYHsCjrH362I4+5jdXP+idyxzpzFvCRnNUlBN4p9BW5suyGHNO4Rk
CPkG4GdXfuAHBtytGITViwKm1GiY8AzFcPiGskDqyCbXFYBtieH6MJ7ekVeB
R0jYQvKYXp9f60yCYHdc3MPjgbVRS5IeIraiZbhRngXXl6LCzYkidRbE/es6
xC4UblE+dZN4J5TZbjJHQh/Pu5BhSuSpDAIejL43wBaEDabpM8fz4WNJ2QQY
tVdgheVO08vCX88v376/fnd8e/7LGaonPgrd6aL2XG5SS9IMfPzAp2Md/0mz
seqFfG0Ng1riO54an3J+9sjVekIo19mCMweTrzCQVwec+wHjJE/Y6ansWnYW
CooUkbvxuNkeOZRAQIgIE/+HIKcLmr9MyyzExEONGTmnT8vQKu0O0r8yV1y5
pZlb5LcliGH1PBk+zqdK35G1Lm+v9ulDAx+H6baaRZfF4mL6QJ/XgGEEa8CF
wW7tGHfuKHOTJK11lHJusJkUT/bw91YkDWsr5YecG58Gp9MihGdP00X52XgN
3YOH4LecR4ofCwTnxiM4vc/2uuS3YjpGzjiKYZ5O7ZMEZlL/0II/uuSWqJ4r
QVPaQRYcfi8ka8xeyXQebEtofQa+1bWEqDB6wjmtX0mxixLJsZ2+3ctUJJ/K
Bs3eUSNBx9Bea1iENdTc9xiwAFAPxO3OrJaFQ0+dirCX6DcgqFXsoYF6HPcY
w7n07BgusTTMc0UiI3N44Kd8sszHteESuIGzojDXcRkof/852VZKU0cLW1tn
OjHdeGLoV8yC0TZ3tKbKA0HM/uh8KAKTZ5rqv6eHR+a5vgnWyBbjqquy99TQ
dvYPf7xlQ2G3T+XrrcIvhX3IIZy+zRg1wlRMPxUTyRG25EmlkBYtxPdIpecc
AXnStKqEK9C2n9R6myuMgenJKiu54/JZOWnESrs1m0D3lhHIGSYyFfVwxY/R
BYjLdeOtmucsmVgR6DK7mnLOTKfpvSOpMrakg6BlPT7zUM+rLHHthfssplq/
ePFmKVVw/ZZLu8EHvR4+GzrKVkkpf+ZQf88seLVewkLNJR4gaD4XJmmE3o3Z
cUVnuD2CXX4J+l+kedJyB2g8TAcsXWQeRa45ZhZhum9Nr5acEaFTiL/nXKYg
hTWDK34UjMFPBZVkRUofIKS+OSpXuqzS8TTPUn2hQRVZPWqq2dr8uqky60Uw
FHFffqFkM73gefganZJ5KReNwhwMfMVXCU0/RakPKDu9pp6Ce0rPG8oIkrr1
ivSRIFze5oTNUDONiPTIydtQs4rk6dbJ27bFxIQL9+/MJGqkEPUkHYn2F7Ix
mXb//dXt+fvL4wsphziiKFolt3bQlLuxZFA5mS0pmPc8FfXWMt4p8GjQlmCm
Xrw/Ob749er67C3hYH69Or4Nhur76/M/nF92sndnp9YXBNG+oSpyFNOFoQ95
+hu1cbR+geTQuKKSbJ4yc5rvb21wQ0rympc5u2y2X/U/8AZGhRdFyVnFqCRw
+m//uvPvf/vf/d1GZx1hdBgvaDssqb2u+HptN8xN/iUcxnCauZqtxV4Bem8Y
EZYXaIwm+byCiqewdOSv5EMlSqHssExT0nnVXIITCfKqKD4pjPTkLSM/Jzji
xLwf9MTlkxq2VfFEGOgh8aqEl3d5XzOrb8m87iOhGasIaEIZ/QCPsrEY1g50
lknqLDbvkUbiqAdP0FoLyb9TNC5uPx65VHUUAgXl/s6tDX1CtgfRi90VXJ4i
odDSOQ0KTrmQUjgFo040QEuqkpLIGL38J+qlzYXFkJFq9GVqe0JxI/tUtJEs
83ExMqag23k+KrrT+/vqxYsz5l/Wq4UZysLIPwvhuD2qfCeykTlVm7KLHbue
c9gEg5jOvywuuQMmLxdsZZJPqHgiJOP8U5iTny+vz27eX/xyRqSjVTggd0ox
7+ka0C2prjccFxTyBQr9iJvHnSJj18Xx3XlEMrNcz/tkxdUIyFfwjhOw5/eQ
j2ct/aj9bdrxrDXQB3vZG6I2pWw+yuZgqjMKoY001VCG3AInEx766aITKaWK
4SeLJpcToMc1jZ0TPDpyg3CBAfVs0z5F1RQhiN4TMi4DPRkqTPE7ad0IvhAi
+sehe/hA9qiG5l3o1ZdyFCQfQ12ZuQq0gVmrIgL0MdJtz6e3HYqcjam6geCG
tmUJjGmddNZlxTMNRDIRFpSfS7KSZBHpxMy1yvr1+59OSA45WHKdVRiuFAcp
Yzco4S+KyecyaPJ6hK5WML+D33uFH66sAMRzZbsEG8NOcyNXJ+SZJfbcGhUc
7y2m1YtMGRcDS0iiLU4vDpuonf2I9sLGo7+GFlv79Bd2PNLfX2evjOQgdCNW
6OVmE3oyMsPlStX9aa6l1LlIXklkv2IweLG9tZ00tGM8deE2+un29uoGXuXN
24ubdqxylSjpQ/CG9LcOkglxxHqt1aMPzerfLm5af90+aLdVwVUShPAI9e6h
qJh4QdhynC0WLkAeBoCBXF/tnqggR7aadBY+T8tRxbz/Qtg3z7Odndqkhdd1
abt06b10/3G+ZYtKjklanerWRdtkUrC3r8uHcpT9pOSxwvxFUsEfNDuR0Yd4
fHO5Scrt5g3SmTaJg6VtZDoul6NB7A63QC8hbNV8OHOOGLHJjNgkgwEt9QKg
IxjVbdai7U8ZSGG32Jc7zDcr70PBDC2Ifan4VvogiMuuds6BoNogHgtakKqC
OmQTLFCWTbkH6BZzoNT2zEK1pgaSqEmWuqPXrZialO4briytNMXxI0ogdrMl
wc6k3AEpZ/P8yyRGYMS7S4OWiLDU4eGcVi8m756j+exg8LpNyFkQWjkV9xLV
POI7HELJqhlZVQPHWOGKptRX3BPYDJfzOfutyMbSLz4R5n96BywvzbS4NyKR
kumXq1n3pQYQ2orDUlY8mgREESzSRxHdoCdfn19XAKWHZkC6HxY/Xw7p/AzD
diik0mxaukIGonoqanUEEyVWdTLH1WeCV9bmwqnyadU5Z415EmOCljcYrvkh
QbrgsVqntDgBTYgt7kAQ1Jz8dA1azCeJ6Uk2DpTfOsUHDb+X8T7gvK9gCN1k
n2iw4052eX6SIcdtDsqb4guqm5+f3myeX910QNIWJmhMuv+cVQoLla0hdRHu
Jq4i9AXFm9QRh40irjwSPdP7BR5YzpgKamprLkjj1/sa7lKu2iOCTI/wLV9V
9U4bGfFLwOEO9gWq4imMk7JvEMBwAbD0JlPAp9QInc0KiVQVeQLCVAa2Tnrl
p7di0AOpRrwqAlZtxD2CzWsaREtvR3BMrLxh47V36PSHtff90d+jRATNQHlh
TOFtqgWSUzhqO0lZCtkc2SdfweUktUve3f7cYdS6Re86cUfY79qi8MQtrnV2
GFPLzrWSCQ/ySTFdVmoeE9dpoZCPOxKWUivOFrm3LSB8rj01DoKKk6HNCACV
FM0uUTUlZFeaA93b0JNIReYEq189ljNV4TW+rqYwmjQRhNLUi2L4OLESmOEV
JYJR+nHOcs6KY8aoMOCnsc6TSnCXbEEpAcF45jmRCmtzYFeFDQQpz7h0yO3M
7+D6uaxF6HIr1dl6cuWOy3LtWEoFEiw6kpAN1aGTSSa3QS8iwlVD9JLvULNd
JOONc265Srw3YDhbaTyWiQsC4LPIZ5hNBJahqrFVTkAgmouXwMMyR6eporLH
Et1hpTIl7oSWuyOzTdYpNlWj2AS3ndgpvoSwb0QSAKR4X3zn3O8mb7ar/03f
qrPHkXSkctIVkf3xsZCtDBJHWnevvdNI/0z75B5VY8CvYXtL0z38acjBb6BF
ZZzMI6Y70JYJxY/LUwEQoFSascVq2ig5E1Nqf0Gr84b05QgvIZ/UcMoBZ4qT
3RMSqhg/2y24m/ecV+CQYUJcvi/IbS6GgYSymyC6aXp4+l+8SGr3mVx21f+Q
NAtdj6/4eMpI4FrIAfMNd4eQVCMZf6ae8rslF5ZmrnUYLqAksNLjzElgtSUM
Tl4luhnnqAt5lMBnNBgb00iq57AJRMQYpW0lhIygb1vEoK8kpibrfPeMmG84
JO5NevNVoI6cQafLXPC1RcCAYa1UAvF+kgIftASogeQU7oIgQHoZPhNHaZfk
xQRxR2gSdJe3Y+Fl8zJgEBSf+jLF34OS+FOYkedu8VwEjWRcdavF89hXlH8s
xrNKeVyFqQAsrkwep6UPSY5KdjqikXhE5y/qniROw8xEM7QysnhJ5OfKxSRu
CiLKaZVt7xInb4Qe3FphHrYFUgfeY/65iIQbuYrE8ANE9VFoPrQf29iM3LhU
RZIUm5/CKlHJ3fObK5kbSahb8aawmniNPNGNgAM1Hmwi5yW7rBi2cimJjl/y
lXRy2cY95Q2V+TzMOLGhdCVroKP8k2pio9TrRvYw1Zj2kEzLSfQrZk6EqONO
AjCVglQYVgXcZ6XxN3yMmC9fmVF43PU0An1Da/6OrU3Z1z6sdQ4SQYEK4Cnd
/RwrL5W5ri/l97je2xyu2ZR8lyPNQ0Fs4di6beePMFdxqmJU04h7zFbkTf3S
ClETtSaf6ybn9AR6M9QF0OsTxECPIskfuFOtMhXLGKOcEuamWnY+lFJSg+OX
gOIbokzKAgXWSUZTfnLDtbx4TKqt+nWeWCgsCZ8ZsSooJI5ro2DQtqpAn4v2
IbFJ/Jbd8JT+lr3NyzH5A2jJpFJSupYuPyV8j1xRLsG9pKJY9NSnQiqLxTn/
LXs/KSRoL3Q0jICzWCPRviDwopQ1inMs7xPpJBXK7NYXYh64QJx1TP2L1Rsp
PLKyV2dWR4HaQP9YBpd205SR9y0WrfC3W3WUUclLlKukewgT10W+M/fjRkko
1VyU+Cy9ksJhrGhzCJ8Q90RbEKu+TRIC7ZTIILMSUmJSsqIJlwmXqiBUYdBA
AelkYGUa+10I7y33lC6tMahcSpp6Qqpnd0FsfpJf/JYd60JE5icSpGEafhUw
t36dp42Whz+ULh/F+0paMlowbeiNmuexsAF37/bixvZbaGv5xGyytrIgOse6
XsdPaV+iEDijKqYC/nRdQl67lU+OAxS/RhWNAO6dESETyQKygKhKBWlI1SNF
crizx3dhO3WDTT2dcziPGTCJmjMo/edn75IUZppZwelgF7InVarUgwMXnJ65
U4Biejf2RJhZY8Usg3SpVOCwfT8UfhYBvXAfT46vbk9+Og4LTVURiUdqXpi0
sGmVGZ0tF7XYZazOa9SbJm9rZ/GKQre8BJH1unJu3P025gD3/pNQYgw/SfY2
ufhqzNTgwyyS0muxfLA/EbCGeM+zZmol6X9DGfEozUGSkGRiOlHvjpwk6GPb
qLis6oz/S1b4NaGCXhxb89S1Naef0kiVKyuoG0mRVdRIbx1iZu8xcUnr0iXA
4VttVEMHjRHrlQsCKHnJLaBe9yuaE8j5xK9V+Rqkw+n0U1lI6n6QN//wx1vL
47eWvRItFE/nkUIJZ08L2HAagnBLJUnjckBQxCZWwInTGilkJh5SAp5QmzAf
tYcjyvz5UnhbylNGcqvVc/mHcIvNSMTRzSMKvN02NG3p9VNjl1o4P7c3kxng
4atIh2OISKFQG6sEg8ypxRU7hsWW3kc9CAIXQIHZnJKfcV3a8YU+AUf0Mq0d
HGdZk64IvzWdJHoJBZglvuwEAFkh0TgDglKiYNoJeUhjfnSV9rK3lH0rvefQ
iQm82FrohOh4QQj+GX4xFIFvFb2HXgf23JMIUmdIipCid4LLOGitN1cVgruX
3QdaTrCLrpBuuDjCWZF9bfpmi/d+mPiw6at2ve4KOd+CUbJ+D519xYZDVQxF
FrJd27V3EA6QaS3pBqCN9UdMNe4DFu1yj9D0y+XB0ljni50s/JaDPewYaZWV
PNsgNc4ZTt7hcoYrDSm23ChCHh1DQt08Z133gtm/7VKRGVIovAb/sJsNbS2n
mDssPa2mnuDaX51lJLqSmT4efS6rKblN3x3/qQ0/AC+cOSgi+BO4FprVY2b+
WvDQrQSH0fod/0lop2olM0qpmVqBxnbh2+bnSfSLTtEScfFQcMm+0MO7Z0sm
JjOskxWLYa/tkioeQKcnDWjjkuzGlnxSpS1aStEAq8ycIIgtqgsvobgoQZE5
FwW0kGr99/mkGyRmlAq5zK8P5zrclOZvjhWLLJ3nMgsGyLLciEpQ2RyYEGu3
eWiAPep2M68yEKZAuxn1ClxaiIBT0A0XucoQTygW5YnkwFD30AorxqwA3T3/
rrIYbVZJ7p7TD8fAHa3VS+ATNASc8n+wWZ++lC1+rk5r6kVKBhJmhD1d5Jsy
s5id5yQyNJslWrwm674U+ScYU6tP0BrFuy5noEDhUU65qJcBJP4g5rqbN/Vz
krXzEQqSEeNhwcaRQJoRMlYFnb+hV2nUOqPMvCsZLdW6uvlHVMkUYszz0/Y3
djGIuweDvSY4L+0IYnrQQTRJqT5SrePUHG06ZUpGdiRq3KKQIA6iRbhz603z
9W5RZQQA1PBZvXhvxep0K0iuF3I5QUaHRVthoUYWlvrkLvIH1B1xs8olSByx
E35H6kx0k4qe2FYVZ/kVTq/neNhM6M3/HhPYiuuZcWfLIkfNUYN9Y/U5sCNT
pSFR0cLdMEhpQdE3SS5DEmpQjYF4SsukEdH0uLwrzLkZM4XU1DDNfdP6w95J
tjBwxLWJw8QckdshSdyZMqmgYFRV0Q3zbtkAXrWFgxyrxKTsjpBy7m2Klmgr
R8336/lg45Jgm+TlnlJoWyJVc7kYMjZmbTNE1GXoIq4rP/+bF29i8QbErnR2
WrSltciGGMCagQJfpng4mak0GBhhZxyxb/Oe78ovPHErilbR3AW7ewmBqdfQ
Ck+/krtOx7y06W0ZR0bvCXtJVJ5ZmbgXfLpRLIwX9Y6WYOi17m+d7iBqFW0l
oBvKRT+eVnbniYpOpiqMu3//2/+XxfpnLlDFhRrqGRnwag0X5hDeSxJej0dc
QeHFC0+5XEtRi/ifpyKnUBHJGauQyMiQ+7BZRxRulXAkkG41tlZRGIRAdR0P
K1eMFuwT2yQQ1VxlQ2AjOrUJUTRrc4iqcJjCx+rQA7mD2Xf1SJfQpBvugm7x
8KDhD+4jG32j7PrqH8/9HOvFjNod3FaZkNzheIa1Zr7hrvo1oa8VVRqViTnb
HKOX+Iuu1KtetrPdfRN2/k9IUuAALcX4EW8+UZDUomKnPRGwh4fhf+Fobuux
h3+g26e82eBdd7BdAtzuDdCAo/Q3YSjnVeivHb8B0cMWQUqN5GQJIFw748Rp
4kAwi+Hs5/Pu3oDjAKJwfQ47XcjK0LNe9qacLx5HVGI9GCuj6dcwC/n4Oajr
YtkMiBntgXPlZqEHX7HkYZQ7B/8V6ZmoTocJ1qBl6Orla2HaoTnd3fqv+N1f
X70iPhq+zvtb9PcuZtSS9LpKcZ5RvYYKoLCKZoWADMbEBZOGrNrWX/tr+gAW
jgeYKsdkTzExZc6A6rBH7wuKF4YfqKj9O87QDGckH8L+Jn7S+y7ztStlBgQc
B9BxFGkuKHRBSB7URZYRiZehcCNIEy4pSTNHZsb4UASTDoATwDkRPsedfcc0
PMKkVJkWHb43DaNCHC0czQkMBLgTHZtTWDpLsKnkVRY/OkwI4IhubqgMGDyc
v/J4EIhihYrDpuxv5LmBwk3qQUyzTKkUxs+SoOG29XJSUhesWF6yQvPCaqs5
HpUYu8+oohJNGIp88mHe7zFHFCKAC7oUNQaXUGRcWxFo3gU1IrkGrVJNl0SY
81+K+VQFKJEEFJxiS8hRdkZTHBPKosQgmde1G164VFY81k0SrPs89lPAyZKc
xZTUEG2xXkeQS3RLOC5eFGOZA/lDJNzqenUUIPwekIdP7wiGL10XZDzbodPl
qM6EJthLZD5wLZqRpgFCVQPv+VciIy2Ui8eGwssZVbQwiSCSpVIKeCFpFOMv
+TPFqxRnMuKxSLKFKBNFXhF35F2Bm3ACx/vQqJuNX3CfODZOImbszXL0UCwi
qBFAGcGU8Q6V4DOgdtO5AoC0AO/4WcKRT3fAqMj0OtylBqfD2zoq6iXSTiOM
oCeHdmLAjIKZS4fkjCAeAT6tgzyp6j4mo0Gqmj85rGsldBb3Ra5Jh2mauMJ3
RgwhhBZvDj2HuisNepKLNpPdUUQKm01tL1KKYRLAX4acNEg/V7VWCIRZS5yG
d5Z03/KbypyDbcNPGnRO8pbyxaII5iGzpUvpDN/FO5KnmAWoMjLkKqYBUq6i
S8DwAur6LFhm12encRZqCa+LqhgDOEB8vkSaMAl64rieyNiib9r7XNpjhxwP
r9qppTKmEzMsK4041pLEzM5bKDGP7I7uPTOoNnJycScs53wwJCdfUywXDXM9
nJX/HwDANUkqqwIA

-->

</rfc>

