<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-repository-problem-statement-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="RPKI Repository Problem Statement and Analysis">RPKI Repository Problem Statement and Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-repository-problem-statement-02"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Su" fullname="Yingying Su">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>suyy@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="August" day="28"/>
    <area>General [REPLACE]</area>
    <workgroup>sidrops</workgroup>
    <abstract>
      <?line 89?>

<t>With the increasing deployment of Route Origin Authorizations (ROAs) and Route Origin Validation (ROV), the Resource Public Key Infrastructure (RPKI) has become a critical component for securing inter-domain routing. RPKI leverages cryptographic certificates to validate the authenticity and authorization of IP address and AS number allocations. All RPKI objects are stored in distributed repositories and periodically retrieved by relying parties (RPs). This document presents a data-driven analysis of the current RPKI repository system, including a global survey of AS administrators and an empirical evaluation of repository operations. The analysis reveals that the existing repository architecture suffers from limited scalability and suboptimal efficiency, and is highly sensitive to failures. As the number of ROAs and RPs increases, the growing number of point-to-point connections between repositories and RPs, coupled with the pull-based data synchronization model, significantly degrades the system's scalability and performance. Moreover, a failure or attack on any Publication Point (PP) can prevent RPs from obtaining a complete and up-to-date view of RPKI data. This document further outlines the fundamental requirements for building a scalable, resilient,and efficient RPKI repository architecture to address these limitations.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To establish a trustworthy mapping between AS numbers and IP prefixes, RPKI arranges the Certificate Authorities (CAs) in a hierarchy that mirrors IP address allocation, and five RIRs are trust anchors. Each CA in RPKI holds a Resource Certificate (RC) issued by its parent authority, which attests to a binding of the entity's public key to a set of allocated Internet Number Resources (INRs, such as IP address blocks and AS numbers). CAs can issue subordinate RCs to reallocate their resources or issue ROAs (leaf nodes) to authorize ASes to originate specific IP prefixes.</t>
      <t>As shown in <xref target="repo-arc"/>, each CA in RPKI will upload the objects it signs, such as manifests, CRLs, RCs, and ROAs, to the repository Publication Point (PP) it specifies. These PPs naturally form a tree structure that mirrors the RPKI certificate tree and collectively form the global RPKI Repository. Relying Parties (RPs), as entities that help ASes request RPKI data, periodically traverse RCs from five root RCs (held by RIRs) and access the PPs specified in their Subject Information Access (SIA) fields to fetch all RPKI objects, and then validate them. Finally, the ASes served by the RPs can use the verified ROAs to guide routers to perform ROV.</t>
      <figure anchor="repo-arc">
        <name>The RPKI certificate tree and RPKI Repository structure.</name>
        <artwork><![CDATA[
           +-------+ 
           |  RC A |                   +-----------------+          
           |       |                   |        PP       |
           |  SIA--+------------------>| RC B,RC C,ROA A |-----+
           +-------+                   +-----------------+     |
          /    |    \                                          |
         /     |     \                                         |
        /      |      \                                        |
 +----+\/+ +-+\/+--+ +\/+----+                                 |
 |  RC B | | ROA A | |  RC C |         +-----------------+     |
 |       | |       | |       |         |        PP       |     |
 |  SIA  | |       | |  SIA--+-------->|       RC D      |-----|             
 +----|--+ +-------+ +-------+         +-----------------+     | 
    | |                  |                                     |
    | |                  |             +-----------------+     |
    | +------------------|------------>|        PP       |     |      
    |                    |             |       ROA B     |-----|
 +-+\/+--+           +-+\/+--+         +-----------------+     | 
 | ROA B |           |  RC D |         +-----------------+     | 
 |       |           |       |         |        PP       |     |    
 |       |           |  SIA--+-------->|       ....      |-----+
 +-------+           +-------+         +-----------------+     |   
                                                       +-----+\/+-+
                                                       |    RP    |
                                                       +----------+
]]></artwork>
      </figure>
      <t>With the increasing deployment of RPKI, as of June 2024, ROAs cover 42.40% of active IPv4 address space and 57.97% of active IPv6 address space. Meanwhile, the number of independent repository instances has grown to 63. This document presents a measurement-based analysis of the reliability and scalability of the current RPKI repository architecture. Our study includes a large-scale survey of AS administrators from 2,500 randomly selected ROA-enabled ASes, along with an empirical assessment of repository deployment and operational status. The results indicate that the current architecture lacks the capability to provide reliable and resilient data access to RPs. Specifically, the RPKI system mandates that RPKI objects issued by a Certification Authority (CA) must be hosted at the PP operated by the same CA. As a result, any failure or unavailability of a PP can prevent RPs from accessing complete and up-to-date RPKI data. As delegated RPKI becomes more widespread, an increasing number of CAs are operating their own repository instances. However, many of these instances lack secure, highly available infrastructure, further impacting system reliability. In addition, the growing number of repository instances poses scalability and efficiency challenges: RPs are required to proactively traverse all known PPs and retrieve RPKI data in order to maintain and refresh their local caches.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>It is assumed that the reader is familiar with the terms and concepts described in "A Profile for Resource Certificate Repository Structure" <xref target="RFC6481"/>, "The RPKI Repository Delta Protocol (RRDP)" <xref target="RFC8182"/>, and "An Infrastructure to Support Secure Internet Routing" <xref target="RFC6480"/>.</t>
      </section>
    </section>
    <section anchor="scalability-and-efficient-analysis">
      <name>Scalability and Efficient Analysis</name>
      <t>In current RPKI infrastructure, refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, RPKI Repository has grown from 5 repositories run by five RIRs to more than 60 repositories and is expected to increase dramatically with the further deployment of ROA.</t>
      <t>On the one hand, with a deeper understanding of RPKI, ROA deployers prefer to adopt delegated RPKI to flexibly control their RPKI objects. In the survey, 45.3% of the AS administrators using hosted RPKI say they have plans to run their own repositories for flexible certificate signing and control. The result shows that delegated RPKI will emerge as a trend, and the number of independent repositories will inevitably increase. The work <xref target="beyond-limits"/> predicts that when ROA is fully deployed, the number of repositories will reach 10K and there will be 140K active RPs, the RPKI snapshot download would easily exceed 1 hour (on the premise that each repository is well accessible). Since RPs are required to check the updates of all repositories when refreshing their local caches, the increasing number of repositories will result in higher refresh costs. It may prevent RPs from obtaining routing information in a timely manner, and also prohibits the release of use cases such as temporary ROAs to enable ISPs to perform tactical traffic engineering to ease congestion.</t>
      <t>On the other hand, RPKI Repository is designed without a strict admission mechanism, allowing entities to apply for RC from RIRs or other RPKI CA entities, register as delegated CAs, and then operate repositories with a small fee and identity verification. Therefore, some repositories for unwanted purposes (measurement, attack experiments, etc.) are gradually emerging. Furthermore, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs. For example, a malicious CA can create a large number of descendant RCs and operate numerous repositories to make RPs endlessly retrieve repositories, thus exhausting and paralyzing RPs. Although the most popular RP software, Routinator <xref target="routinator"/>, has set the default value for the maximum searchable RPKI-tree depth to 32 in its latest version 0.14.1, and the RPKI-client has set the default value to 12, neither has provided a value for RPKI-tree width (as it is difficult to set a reasonable threshold). Similarly, it is also challenging for RP softwares to clearly limit the maximum number of accessible repositories. In addition, a series of recent academic works have emerged that exploit repository vulnerabilities to cause repository downtime, thereby preventing it from providing normal services to RPs <xref target="behind-the-scenes"/>. There are also works <xref target="beyond-limits"/><xref target="stalloris"/> that manipulate malicious repositories to attack RPs, thus obstructing the synchronization of RPKI data.</t>
      <t>In addition, with the increasing rate of ROV deployment, more and more RPs will connect to RPKI Repository. It will undoubtedly increase the burden on the repositories. In summary, as RPKI deployment progresses further, RPs will need to access more repositories, and repositories will need to serve more RPs. This increase in the number of bidirectional connections and pull-based data synchronization mode will threaten the scalability and efficiency of the RPKI system.</t>
    </section>
    <section anchor="reliability-analysis">
      <name>Reliability Analysis</name>
      <t>Although the current RPKI Repository is globally distributed, each CA only stores the RPKI objects it issues in the unique PP it runs. If any PP fails (malfunctions or is attacked), RPs will not be able to fetch the RPKI objects issued by its CA, and the integrity of the global RPKI object view cannot be guaranteed.</t>
      <t>As of August, 2024, there are 42,950 RCs and 303,918 ROAs in RPKI Repository. For each RC, we extracts the SIA field that records the URI of its HTTPS-based RRDP file (Since all PPs now support RRDP and serve RPs through RRDP files, the analysis of the RPKI Repository focuses primarily on RRDP Repository). The result shows that there are currently 63 independent repository instances (SIA fields of RCs held by the same entity may share the same PP, therefore, the number of repositories is much lower than that of RCs).</t>
      <t>Next, the measurement focuses on the ASes where the repositories are located, their IP addresses, and whether they utilize CDNs. We uses 2,000 globally distributed DNS resolvers to resolve repositories' domain names, with the aim of finding the CNAME and all IP address records for each repository. Then, we use the IP-to-AS mapping information maintained by RIPE NCC <xref target="routing-history"/> to obtain the AS where each PP is located.</t>
      <t>Typically, CDN service providers will display their information in the domain name and CNAME record, such as including "cdn.cloudflare.net" or specify the CDN in the X-Via-CDN field, cache status field, or Server field in the HTTPS headers. In addition, if CDN acceleration is used, the latency of requesting HTTPS services from different geographic locations around the world will be relatively low. Therefore, it can determine whether the PP services are hosted on CDNs from the following aspects: (1) Whether the domain name and CNAME record contain information about CDN service providers; (2) The number of IP addresses returned by DNS resolvers and the geographical distribution of these IP addresses; (3) Whether the HTTPS request headers contain information about mainstream CDN providers; (4) The latency of accessing RRDP files from different geographic locations around the world.</t>
      <t>Measurement results show that although RRDP enables the use of Content Distribution Networks (CDNs) infrastructure for resilient service, only 9 out of 63 repositories are hosted in CDNs, with 8 being hosted on Cloudflare AS13335 and 1 on Amazon AS16509. It also shows that out of 63 repositories, 60 of them are hosted in a single AS. It means that the accessibility of these repositories is highly dependent on the reachability of a single AS. Worse still, among the repositories whose corresponding ASes have deployed ROAs, there are 14 of them carry the ROA of the ASes in which they are located. It means that once the repository goes down and the RPs cannot fetch its ROAs, the route of the AS that the repository locates in may be downgraded by ROV adopters. Then, even if the repository is restored, those ROV adopters still cannot access the repository, in which case the access of the repository depends on the reachability of the AS it locates in, while the reachability of the AS also depends on the access of the repository.</t>
      <t>Real-world incidents of repository breakdowns do occur at times. On 6 April 2020, the repository maintained by RIPE NCC suffered a sudden increase in connection to service <xref target="RIPE-downtime"/>, resulting in it appearing as down to many RPs for 7 hours (RIPE's services are already hosted on CDNs). On 15 May 2020, the Japan operated repository was out of service for 10 hours due to hardware failure <xref target="service-outage"/>, and between 26 Jan 2022 and 2 Feb 2022, due to full disk space, all ROAs in its repository again became invalid <xref target="disk-outage"/>. During 10 July 2024 to 12 July 2024, we also found that RPKI data synchronized through Routinator <xref target="routinator"/> once again had missing parts from RIPE NCC.</t>
    </section>
    <section anchor="summary-problems-of-the-current-rpki-repository">
      <name>Summary: Problems of the current RPKI Repository</name>
      <t>Based on the measurement and analysis described in the previous section, this section summarizes the main problems of the current RPKI Repository.</t>
      <section anchor="p1-rpki-repository-is-costly-in-rp-refreshing">
        <name>P1: RPKI Repository is costly in RP refreshing.</name>
        <t>Refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, the binding of the repository PP to the CA causes the number of repository instances to increase dramatically with the further deployment of ROA (as the number of CAs that hold RCs increase). Furthermore, as AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, CAs are more willing to maintain the repository PP themselves to achieve more flexible certificate signing and management. The growth in the number of repository instances increases the cost of RP refreshes, the growth in the number of RPs brings burdens to repositories, and both will threaten the scalability of RPKI.</t>
      </section>
      <section anchor="p2-every-rpki-object-is-a-singleton-in-rpki-repository">
        <name>P2: Every RPKI object is a singleton in RPKI Repository.</name>
        <t>Although the current RPKI Repository is globally distributed, RPKI does not provide distributed storage for RPKI objects. The binding of PP and CA causes each RPKI objects to be stored only in the PP run by the CA that issued the object, instead of being stored in multiple repository nodes. Therefore, the current RPKI Repository cannot guarantee that RP can obtain complete RPKI data when some repository nodes fail. Even worse, the singleton nature of RPKI objects also introduces unwanted interdependence between the accessibility of a CA's PP and the reachability of the AS that the PP locates. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect PPs to remain accessible during any incident when corresponding ASes become unreachable.</t>
      </section>
    </section>
    <section anchor="new-requirements-for-rpki-repository">
      <name>New Requirements for RPKI Repository</name>
      <t>The following requirements are identified for a reliable, scalable and secure RPKI Repository architecture.</t>
      <section anchor="requirement-1-push-based-data-synchronization-mode">
        <name>Requirement 1: Push-based Data Synchronization Mode</name>
        <t>A push-based data synchronization mode is needed for RPKI Repository to efficiently serve tens of thousands of RPs in a timely and scalable manner.</t>
        <t>In the current pull-based model, RPs periodically fetch RPKI data from all repository PPs, which introduces unnecessary overhead and synchronization delays. In contrast, push-based synchronization allows repository nodes or intermediate proxies to proactively send updated RPKI objects to RPs once new data becomes available. This significantly reduces the synchronization interval, avoids redundant polling connections, and ensures that routing infrastructure can respond to critical changes (e.g., ROA issuance or revocation) with minimal delay. Moreover, timely RPKI update delivery is essential for ensuring routing correctness and enabling responsive policy enforcement, such as temporary ROA deployment for traffic engineering or emergency response. When RPs depend solely on periodic polling, such timely updates cannot be guaranteed, potentially leading to stale routing decisions. Therefore, adopting a push-based model helps decouple update propagation from RP polling schedules, enabling RPKI to better support high-speed and dynamic inter-domain routing environments.</t>
      </section>
      <section anchor="requirement-2-truly-distributed-storage">
        <name>Requirement 2: Truly Distributed Storage</name>
        <t>A truly distributed storage model is needed for RPKI Repository to provide reliable services for tens of thousands of RPs.</t>
        <t>It means that Resource Certificate (RC) and ROAs are no longer only stored at the repository operated by the CA that issued them, but can be stored at multiple RPKI Repository nodes (PP or other names). The truly distributed storage architecture breaks the singleton nature of RPKI objects. It ensures that any single point of failure in the RPKI Repository nodes will not affect the integrity of RPKI snapshot retrieval by RPs. Additionally, since RPKI Repository nodes are located in different ASes and a single RPKI object can be stored on multiple nodes, the unwanted interdependence between the accessibility of a PP's objects and the reachability of the PP's AS will be broken. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect RPKI objects to remain accessible during any incident when the Repository node or its corresponding AS become unreachable.</t>
      </section>
      <section anchor="requirement-3-admission-mechanism">
        <name>Requirement 3: Admission Mechanism</name>
        <t>An admission mechanism is needed to effectively limit the unconstrained expansion of RPKI repository instances and enhance the scalability of RPKI infrastructure.</t>
        <t>As AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, the number of repository instances has grown more than 12 times in the past five years. The rapid growth in the number of repositories increases the cost of RP refreshes and threatens the scalability of RPKI. Furthermore, since each repositories connects to all RPs in the world, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs because some repositories may emerge with unexpected intentions. Regardless, RPs should ensure they establish connections with trusted and reliable nodes. Therefore, a secure and scalable RPKI Repository needs an admission mechanism to raise the threshold for operating repository nodes. For example, the addition of a new repository node should be reviewed by existing node members or other trusted entities. The review can include verifying node's real identity, the reputation of the node operator, and whether it can provide a robust, secure, and reliable service to RPs, among other factors.</t>
        <t>To implement an admission mechanism, it may be necessary to first implement "Decoupled from RPKI Authorities", because once repository nodes are bound to CAs, each CA has the right or need to operate its own repository.</t>
      </section>
      <section anchor="requirement-4-be-compatible-with-current-rpki">
        <name>Requirement 4: Be Compatible with Current RPKI</name>
        <t>Since the current RPKI is mature and widely deployed, the new RPKI Repository should not modify the RPKI hierarchical certificate issuance architecture and should not affect the existing RPKI certificate validation or the ROV process. It also should be compatible with current RPKI Repository architecture and supports incremental deployment.</t>
      </section>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>This section will outline the ethical considerations regarding the RPKI Repository measurement and the worldwide survey. First, we strictly limited the rate and number of DNS resolving packets (sending 130,000 packets over 24 hours) to avoid causing much burden on the Internet. For IP-to-AS mapping, we used open-source data provided by RIPE NCC. We conducted access experiments on the RPKI Repository from six globally distributed probes (India, Dubai, Silicon Valley, Frankfurt, Beijing, and São Paulo), with each RPKI repository being accessed fewer than 10 times to avoid DDoS attacks on the repositories. For the survey, we obtained the contact information of AS administrators from open-source WHOIS mailing lists and provided an option for administrators to opt out of the survey. We did not disclose any additional information about the participating administrators or their feedback and ensured that their responses would be used solely for research.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="routing-history" target="https://stat.ripe.net/docs/02.data-api/routing-history.html">
          <front>
            <title>routing history</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="service-outage" target="https://www.nic.ad.jp/en/topics/2020/20200521-01.html">
          <front>
            <title>Service outage Roaweb and rpki repository (resolved)</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="disk-outage" target="https://www.nic.ad.jp/en/topics/2022/20220202-01.html">
          <front>
            <title>Service outage Disk full caused lost roa validity</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="routinator" target="https://github.com/NLnetLabs/routinator">
          <front>
            <title>Routinator</title>
            <author>
              <organization>NLnet Labs</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="beyond-limits" target="https://dl.acm.org/doi/abs/10.1145/3603269.3604861">
          <front>
            <title>Beyond Limits How to Disable Validators in Secure Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="stalloris" target="https://www.usenix.org/system/files/sec22fall_hlavacek.pdf">
          <front>
            <title>Stalloris RPKI Downgrade Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="behind-the-scenes" target="https://dl.acm.org/doi/pdf/10.1145/3548606.3560645">
          <front>
            <title>Behind the Scenes of RPKI</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RIPE-downtime" target="https://www.ripe.net/ support/service-announcements/rsync-rpki-repository-downtime">
          <front>
            <title>Rsync rpki repository</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Vc/3IbR3L+n1V6h4lcVyYjAARISpaYi88QKMW0JQohaTvO
3VVqsDsA1lzs7u0PUrCkPEuq8ibJi+Xr7pnd2QVA0766C6skEovdmZ6e/vl1
z/b7/Ud7RamT8D90nCbmVJV5ZR7tRVnOfxbl0XD4Ynj0aC/Q5amKknmqPlOT
pQlu8Fw1W0VFEaVJuc7w6Pmr69eP9nRu9Kn6F5OYXMfqj5evpm/Gk1d/frR3
tzhVRRTmaVY82nu0F6ZBold4LMz1vOzHUd9+2c+zm6ifmywtojLN1/0sT2ex
WfVBZ2lWJin7RNCjvTIqYzx/Of32XF3Wt6up3K6u3O0Ky1PjRMfrIsLUejbL
ze2vfy7WCVZgEppaV+UyzU8f7fXBk+JUnQ3Um+jRnlKypDOd2M9pjmeuiyhZ
LCutvkuiW5NjvjV9F+D3qXppop/wNV9Iq6TMcW2yjBJNV8xKRzF2Io2jUCdf
lXaggQmrQZDU078Z0J4kDQFvovoCU/DvyzRZLCqdBBUo07M017TmB1CB7a4K
o67fnKl98z4wWam++/YAo7r7eEaP1jgKMPNXPy+CWM+6hP44UFdVQ+aPmHKN
f/bi35vUolqvv6I/Bzupfe1TW9mPTKdMiR0N0tXfgrh5tR49f/ZVQA9XPAuT
9mgvSfOVLiFIp3T35evJs5PnI/f389HzI+/6EH+T0vpP5GlVgsT+MiqIsXxN
qVLnCwMVX5ZlVpweHpKyDfIoM4PElIdQ1uJweDQIdan7OosOO4MMluUqtgOJ
VtoblL1BvqvVhj6ovjDy8nz6Sl1MJkouYwo8fjQ8OqHPhclvo8D0MZpemB20
3t3dDcChgQ4HP2WHJjks0ywCwRhkyP8Nnx6N+sPRJpVXMryS4dVlqu/MjPWe
jJBqjJDaz02RxrcmPLhnKd+Mpxfnk846hvQ5jIqb37yII/4PIx09ZBFnmArS
E8cq0BC5UMVpUWI/tLrVMCPW+PyaFRw1YkO6uGMBi6hcVrMBBPXw4g2EBrpb
HDZPtUi+7FzeSguPQiag6NAzos8zs06TEH5jFZXFDpLCeKCD1QCjQYKjQyJo
NByMRidPD4+fDY+Pnr0Y4PfJ82cj1SLvJY8NK0pjq6/TO1hg4quGg1DfExeJ
9AJWAswPqtyoC1PepflNl9JjluFSx3GaR7uopJ3HRiXRe6a0WBfwP4fzKDbF
YWGCo6M5nv+PZaxvdWBuBlk4b1N75cYXl3aW3iWLXIdGjctSk6Pe3MyZgVkJ
++XS9IsArvqBDMTUDQOfgm/DZ4Pjp/j/5GmXgTS+wvjqisdX6Zyp20YMGYB+
CKrLaHWfdtTWCIY7y9K8PHTWQScJjGjAXhsyV6yTYCOKcBO0Cb2kezeU/QHW
anMhcBv9voKMlbkOSvr8AzSCeRAlAaIict4qNFmcrjm8IJZAD4x6l0cLiNKY
54t+hqlOk0LtX74bFwdsjFq3WfnDPXTL9wc9nuIS5qnKYQWm1QwuWH1r1uo8
meca5FRBSTK6TxtwoJa6wP5DTY3SKsijMgoQqOFzhgAQZMFbwOxCqoncKClN
Dt7BJyXOpg9EzmKDWAYGp8Ag66xMIXPZEjMHJi+jOQYt8RX05lboNUwm8RST
ROQteWnaXzSx5HyqdBjC2hYSf12ppFrNTK5IyAPhzUCNYd6YinT2kwmgpAg7
FXka2DtQCnNb5tEMXAubfY2MDJmZPEpDWnW8xre4ESsJ1Yw+xByOZBpLMLQF
0+JgoK7hxBRcYMXbloE2kjNwj91hmMOzJhhZAkVaA60UDMzpdqbSky1R7x7J
RFyFNJtWizidYQ+KKr/FtmEArFqHqyihZYipYV4lCA6yKOcNM+BrVXPNmyDF
+hybronljjBEvUbH2JOlLplE8x7jEwXe0zpHxFEakZiims8Rr6p5nq4UW1rw
qcDsehbFbgeRBqQZNItommPfI5ME6x5/hUmX0WIJNoNjmACMIomYI8DB8LSN
BRNid5gUAjIvIj8tnNqYQkR8kad3RG1zd5ZCPvtl2uc/IMNJAspZe2YwyAbb
srH7GLhHMVcWYy13TkMz+Mv+TJO7pE1VZBaWeZo4wVyloYl7yF8WCct2UmJR
oWE7K2uQff282OAPtoMDMNingXoLCU2hN+CPYwPFgJottUpJjNZWhWXiKa9s
fzo9gDtPSPhuRarsrqSzEqopYkQ6HJvS8LRVRoxhxbuNzJ0zwLy8rkjPqxxL
yCmCiKPELmheJaGmr7GxuflLFeViX9lAzKootsIr641ND3cVWDbu6REBThg2
VaAlY5AHp++YFSEyy5kVYGdVV1EYxoY+fQarVuZpWPE+05XrVBm4WLCsWIIc
zlrhi8vlWq10lhGRThhqYyKiAFMDfs6j9yRhTKTOc2R5lgGTxpA52yxWYUJ2
GVZGQ7qha1jNWpRqFeU5Katvw2qrJSoxJx24PL8Ui8XE4nqAwaEOr3SwVJMx
jc3kLNM4JDtTG3efpP3LCagoikpsF0UqsFuct1pioYV3sMhLEi+wiK2xVjN4
ZmKKtVNkjcs15DYTx3EDC8T3FYZdlF0AJjknX0Ah2YUooKMKHDm/uAQLi4rm
ai1/hodvOpacTCpYyPLM9LMJyUMKCMGbCdMJxbcTE5VRTsJlZ4P4yWNsLPZj
o+cqgX5iU4hw61CwZ1figFL2mzRSkZmA2Ofv/ECREGGgYokIgVj/4QPJah/7
+ulTT5nOntxFcD2wHqmW+MY5oKhk6+CxASofzYnvPTW5fEMiNilECIjwHpFG
A3iKsUPxaWih3IhNh5ZMYQCwpipnL0YGhmXfkBd0Dr8lkxwk0AI8/ywPEEVB
GsdkOm+NG40trvilDlIC/2/95NT3kz1aM0tTZKyTWZo4k20gAwJWNCao13bD
cHOEjMj2s2FjRcnTtORL+xiKxZxUR4IiHQTWaDAzHIfY/4vIXFW8NxQHSQYM
to7lqf2r8/EB5jCkYOSSTEmb1okqZLcoYmlFMauBeg2BAt3imHiFFIuKJgqn
Rb4p56fPWJwQxzKLCRdVFBqOqMga4YJ1E7jhezZ7/1n/2ABUfp705eeJal3+
iDB6osb0e+PHPdL8PGm+7I7S+q22fAdmuyvdZ8FTjL0xW//Lj0Tcyx7+m/TA
AKJT6NixtIevoUXDYU3nn7YMsePHH+HQW+nDh/BGOFTeCA8fgkbgFT750+ET
/EW/aIXyeztHNkcQGXiJ3x+V5bK9NvF29D5ONvu/7S/V/auRBH8ESMHGCG3J
+NJ9B9LO7F38RVvuHFM+MitqYjfFZOeSrHR/3CbQ22R8y10PHuEXJPTjlhv6
HztaYn+6fK3ZsYvsj1s/kQy8lCsyGzPUyZZPeffavQz9aAf2J/1o9/IBYqZa
crZJ9QPkzHJjxyg7ZG2AH+Vx44kTr36XGw8Xr475/DU/Migz/slvHoTXdsnc
+fhXUuJ44rudD6fqMxcKCWDyz4+v7w0jujWVOhYZPP5ETu1BmAjG4FgCf39T
JYax4J44zoByJ3VyNDgZ/o6DUw5ZEM7dntQhZ5HpQKh5+sXgxRed+56170NG
ZnSCKJnyl3YqijDZZAb/gSwvRosSqpdRHEpACuWkCbnvZ8f34AQrLLSS9Mkm
mV20IDdx1EqqvSTyFwAFP5saqHdVDq5X4doCDJT1qpjQtD6Nae4FGTjwOuo9
HQ4V8qAwXXHmToGhRC59k1CmF3LEgz2KU+we59AtaEIXyNkLt58eqd5G0yJr
pIKwD6R8lUUswLgqppA6Ca18OcTC8aCVQcaaUgz+WmeOaRRR5ektB1nM21hk
os5RJc93QWRKEdtAXdkEoYntmNuS21NAHwqqRfS04KcmD9NeksYBp0vGKG88
UCtK+GYGqV1BTLXrgoUTZjQRZIHcG3kHYyTasqTH8ICHG1SJvsUnT1I0jbUV
KZClkr7twgk8fACThtj4BVPE1wUyRFaTYuo78LXADDokknxdbvSHUjzKce0u
4zuJyklhtunTgIB2w9jIipYpYl8YT+NopwWbhLZaZMkyIKb7fLizV6Ma0Soj
/QcBdh89ZRsgOSCLEEmGvh1m2qr9uGQ2wZ4GAVPBElJkCE045U0gXlgcJbTi
qV3GVac/lIHcJMQiymlEYAWgbHaHEhyky6ANoxAwSwiQvXcOQVlaRlP6TEWg
AFzklOKzz2CbPSDnjU4WlV4wrkJ6R6n/HUYu1OO3311dP+7Jb3Xxjv++fPWv
351fvjqjv6++Hr95U/+xZ++4+vrdd2/Omr+aJyfv3r59dXEmD+Oqal3ae/x2
/ONjybYev5ten7+7GL95LImcb1K14EUzI7g0BJB1qNiDNAZ5NJPk7+Vk+j//
NTpBHv8Pl68nR6PRi0+f7Ifnoy9O8OEOGZ3MlibgvnwE09Z7OsuMzhnc4QJa
FpU6LtgdCT4AgTKDvb1//CNx5s+n6vezIBudfGkv0IJbFx3PWheZZ5tXNh4W
Jm65tGWamput6x1Ot+kd/9j67PjuXfz9HwgOVP3R8z98uWcl6Nrk8BlpnC7W
dOW8JJQXFh87FDaGmkwDqR5sj15BPcDTGmvFzq0KizokVAknW+Pt3+Mx9WJQ
/Yuhxq3glxdjXDmNf4xNtuVwAm6aUMW7+czEUCAMX6ZBGqv9y8uz6YF9kGrn
9CBL4Tjplk8geFdSd3JFvxoQk3LmoiFg+OmTaJy66hiIVzUq2nSWgItJ2713
TZlVbGtEfc0m+8QQFcLAKLmlEnXhzAnjs3HcxsBrsIMGqrKwsfDWl3l2uMu9
JuJhj/K0PXJeJeS8GoSTzFMqOFSing03sXiIh3mfSXiBmx3eTy1BBNcINFTL
jbPnnXDx3VggvHeJ4HEQWMwHxySBCW5HGEeuEgLJrU4W/JQ4k3IZGZBwGAIF
xa7qMM3Krg8k3sXmfTQDWZDdMocIia1tM/BcSJFQq6dOng6Of+fCuM2oq+KN
sgGBxBuaYwBiOHiZxToRTLRKtvlQ4iYpiiXNtEJzrliQHIi6Ecl+kMVWzQY0
ncUy0AlPgdCRzB+ji0lYQ2K/FCkTVTwELMhtRPj8ut5goYAK5tCYViEfxhl7
gLCvtESRbeZNIlNSxbELIk3Yjdc3Z85ZMUbDbx3NHLngCziQ0QldlrSAS0JN
sJfoDFwBP8Blhnnv0iqGa0eAg+mpeQcsGmHDEGrvp7LVIHoVFTZS5Wn9oAH0
GExrIzBs0QFCTTDDbA0MAmqv89SzsDB8Z4VLrm75dqHj83vdPOt+XrE4wPxS
XGXyOpYIIJck0iVCjfV99SfX8RN5aCsXSajqHlMxJkm48EXYbVxwALSMZlFZ
uAyIdR/UEWgaaA6vLJSOqA2GV4OXDj+VTESdX01b6GlJW0osgHKRpcV9Cwig
4WI2PUZTQA8QlRGBA99wsHER09E1fBG7KKiSrRliqVQhQWQWlKzO3AaJPA9B
HzR71eOyCYeRDSIOo5JlAq8TWsLsYzuJzzI5TzsZ18+Q4V/AUFD12w/IJ2Mf
mraZQ3dT2fgVKxKcuU3Po1CqPRaOlgyFlRG7nZKjKagtYMOyVMmdTmjirMol
7t33UtqeK1+SLc8jji17Cj5mcMCyTUXSik05WxPuIHgttnzFk4pLu1MznWPK
3Nm6pFWadj7jp1TErbtF1tZIbRCqQ1KI7IGUJCpumhTvNdZj3mvKgKgIC/7A
H6dVQXynvIm0hVIjSZo9naEYBUZOJ1KRaBJYvsnkNEbX0670jeg4Hoyh+17D
Qete4kFFznCpKynJc+VY5wgRfpbVctMDSd5CvOGKurqyNKtAJzn/Ip2Xd5rY
2TRXUSmr/kChDTlwquvRAKGZa1J56iOQSIuH1e+jVbXCXZRjs44Rp/sM8cD0
ki9O1fERqTapbkwGqlQcbkADhoPRyWDUOAl+NpCEe/fkGHF01FOJiawOFi55
h6nwCGwoQQIKSvY1191IOyPSdhoRY9EklDLrIhUrUS7JlKVxyHYX8ajOKb+X
R9kWuWSNeC0z1QzljQxgnPCMFKdbjGoEpDHvrb3tpJhUWGXxYDMccFoTIFhe
wVhxC5k4fXG8NqKGYsVp1IKhbquYOqw5srTCxu1+LbjFtjz1xPfNavPNZroU
CySMZvdAZjt2LZdOY9hDd7rFEN2K0WD9ZgYK6Rve/MOHuvsNrl0KkrCQJLWl
8ZSvqzjWoljPjBvSmYTDLgTuNmi02xtsTN1w/W4L7MiqyxHk915M2ZOYlQSY
/yAWsG2x3SXClk5BFN5R6sJJmFYzWEov2OFpZxUS9kTZaGFDPJA9reDdOM+U
ZTQxLjZoQYAl2WKxmr2GqMRIzGBxLKa4bVgEF+i6e/ccVy3rhVoIs6ZcKqme
iM8gKbm02Oi41W/D9uoBTTQyPSkkuG/D5N0Yio2ZPRBO9paAjAYw9TOplo1s
5VRtdy6lbQonm1axptjPsAC3k3mFc6/Sz3Bf4fhTJdFfKgbxSEcrarw6n0sn
z5TROvKXOp5XiWUWdzBYGTfhgb+fKaODYrX8TG0H2kgmeDJu7C3hIovcQ439
Er48Lu1AAfVM8lyLCm4Gj5mwboUgcLhawBP1LPhe1sp+ctR78XRYe8Dj4XHv
xei5hGWuRcLXDHa3nJ9OoIXUc8btkcJWKhVyDV4sAySL0Sf66rvLc04tqP/2
+np6ZeWK8nXF0MC+BNAU3nAvBOIH2xYqNzGKztJNzIXAsVTUz9vouIvDdyVl
ngYVaV6GuEbnFP9DjnmQ5qaDXQlVwzUriHj82fEvFxb2a75I3yx47dofamTY
BnIUkxdLxsXcN9Op3a95HVztCPyx7BUF2Ii9KOmlLJ3pljkPRBwusGMyihfy
1XyxBo07IO54uV37xuu3LUQ9m6U0DULOQuFZdv2c9SJiiamBZ3J2AVX6wSie
6qg3HA636q06u7hStj/fRo/yoUXI58q2sdJBi8JzCTpa0ZLnti+KW78uxm9f
2Uwl9vuZnIjOnVjnnqxfM454Z+quj/MpYevI+F0jmp8bOeTW2L4WewrChWz1
2Qrym6nNsxyCIKxmAsjqFI7BsmXX68yVMMBC59BdSJVbUwMGZrEADVHezdo4
RmvYxawQpggHmi6npo/1cRAmgyBOq3COAItbtR+TqZPOHJFdoscO/2/97yPd
pwss6j2LZ0khyF3D43S8AZIhdsI+yyYBSkEgYzfAiuY8C3nE2NaXiEN0FMKm
GuR5xLnYtiSiXoasgx+OjSiqNOxBFqbub667kCHZaWXtLsKfOKzBBeSy2iL7
0K1WggUPQVlGaErGUY0v+bSXNQGkNhYTwgJIFYQmRsJSl11qYm5ZnKr90YH6
wRvqvs1jIIi+9Tddzyip3Sov/6T2jw7YxjWGxFdhymmq3ApyWxedX2r4p+NG
dW3gJmUef0TMeNxej2yPayOzO3/PQmj1mMXoFa/JX8uJrMUTg6Y01viH3yQB
jCe89eykK2WSVxDjql2AwlMJjCEurxL0Y4I10aNnPpfc+RK1T5Jw0AGI2Rw1
lU27gT0JY15QWy8NDNezYZithEUiYdYoPocMe5AkiV+t1bA+o+Pj46e8syP6
brzSP9Ovq9Gzp8MXHAtzRuA5wu0E9AgTlu1fdYhB7AgCYppNoCfDEKirLrhM
y6+PF2bDudkKYeNt6/BbU2rr1Uy92X5IqQ4HmxDHcE2r1HqEDvaWMowEp15k
qbgNdoGcujmA0rV51lHA6KRebqDz3HYKvhs30LDElNK0y67Qc55dRlDtpE3a
Wi1SU3Da5yXghYv1JJikiKomTBoQPWjaK+DUg8r8TBmFGzPDM3Dru7gu5E8M
l7MtFidIaSZZ4s5QfApBjmnQ/MRF/2lhu6PXa/Bshug1DApccmVvTDemk50v
du27XTNMcrNEbpmOzX33s3R3ht5FgjjkS6PjvrgIuEtG4YpOYXmGyW6Ir7R/
Kg0QMXJzANJ3MPVdop6pMYLQmE8U9roL3RFLyPkNBlGKKqQE1E/tmvTNZYJk
9T98aJ3HItRIjJjEL8QtKZKK+xFpY6gL+Q7DwrBFXzA6To3BGOvzou3VdEzV
wXXHux3wKkdP1VvIWLPIb3Smk6Y5wlvzHbUIiWFxtNPUo6GdOxRgCcFxSDBO
3Tbx4UP7UKkr+blDAkfPMGnCh7r4+pF6bWb8sefG5NOVdKRTmoh60jhsUyBS
ML89Z0EOamYC8sRRwn3EoME7EEpoypkctwLx31Qxr/9EULHmM0eWLHtz63S0
10/tJduMGtl0ZxcUKNZDaFvqUDGCbU8+FQ6aFikSEeZapqAUp+6o/PazTk1i
RE+95LTNaomfQciBJpt9teq/tp5yy8BQIRJKwhDVnyxegqUWFouLqOHlQUQN
HrlK9nS0+RKAqOCCB8M3BAI2BRanyf8vhViGkNrnNvxjA1N3loAxbM6WdqR9
fpr5V1RcGXltTzEZu6b/FGaOclY3+EEH7sejm0VQlsT7i7WqNMFSOg963WIl
QcYOMvWLla4JyXYtxbGtA9VtM1tYCf9cGNk+AtaWjNbzAL9YYYURhEITowQT
oGI5eLmBo23dj/q4m4gv4fu8cieE/jm4bYOS8Z2RGSks3GhT4S4aOEvx9P0w
nOW46xqaHp2qVxDEdQtHIgjLRk6lZI0b6M9fj8iJgaOwhkIC19LnJ/8UTtC5
d1cgaNTnuq01UwGFGh2x6uoBa9JcZM+RcvRsuYxnbXuDVTMWdYvD0SUZocfb
Ce/GYCkH0c2h1BU50SxuyRufW2oliPdxyQZGNWLnfACnlBYhqJv7GtfApeJ2
Zc/OzE5xQHubUAJT2PmbTeUjRqbWwPq0LbmhuthWNAVC7styATc8jHOqW6N2
DUYiOLD7ck/EVUeluNWGak0BHWRB1CsH1boytBxhtpByd1zpX5X6D1jAHR/S
icJgIqsNOxWvphOKi6YwxwVxwtkteYA9X10lduLYNF70wty12/BqwW17zutW
ot86gUkWTWq5fKaIBtB1m2uvPpFpMVDuVeqKUqtreLM5UME3TqtiaWHXMxKj
qw6c/5bgfNZwlTW37kb+wWsqO1iCuwTRDrjeKG47Jui2JCPGcoBYQCcWD+Wj
wU1jQdMvHRvbZTCwBSBfmbzqhD3NSwO1TqGJP24UR/pmfcdNHqJwxypbCoBQ
GpJCLQrUo04AhRDW4QQm1muBrLgdRxPI7rGvez/3ERSbikslBNK1lQkj8kKw
jO9tVOE3lhaGW3w3gwtX3eM4MIFI8oJdk2/dVGsrQu1zz7BnvOhtdTgmCkEu
XM1tGoUF3yxV8ywV9+uVjcQhNepLRYCmjcRHOMjCWS3jWmf93oKlHNjdN4PF
oGc7hQp6fRA3SCOMtGDNgYQ1FHRQlZP3wT+PbYWJeSQMo3si9nrUp1ZQM3+E
Jxn6JYr9phe2AUGZuNcWMK4jeks0F9RmhPVHwRpfYYTAdk5sbXDx4y2uy2/p
ZSEiON4hCMtOgt36gdulpoXNT2H1YyNFCyfobhvs3HbZrtNoW1kI8pmWsngC
NCHZNoii0m5jcEMTREX92gHnzji1l4PinpSzAvLxUKJUTuM7rkN8MyQmLE2S
iExr0SkQaIcVV29qDrvOPLgaapRxRSACf/pFZozoYbhONJXYt73QAmPdRpBh
Nq7bjCHCn+uc8rAzL+64krhDDGDJX28LS2Spv2j7Ng4rNEg0ScAOO2gr3S1c
aPdhcXf0mP1Hkio6vkGhY13srM8jbLxOojmXsBn7rHqINwXWboInKvS7eKe7
XLFg+3TowXU+cU3GFtJ287J17IMRk+JB8QpDZy0rQ17cgn7y7ggqAFmAwIZ8
26muq7RQSe4G6BZd2z2EttsHZmO2tk08tlAh9ZmiCWI2pvKwP3mniYOiOcTg
/NmtwQ/L2/uQenEnDysR3m8N2KbTz4smCrwnauMbqVJlSyKzPL0xyd8sauu6
tl8RvvFet3nP3rUsNiK7bXHdFnNxfIpddj2Bb11PIBuKZFu3oGcdJAqqT+I3
7UZVArdJ2TKDfFg19N3ve9maUYonWmqHFG9J8Tp+dmA7AP5uCfoD8uKm67zp
Jh8dCTRa40VYgnSer43O3TkynUXhL+fg0YNybyvtkjAXOzPmNtQh6t0uFNN0
NgQShIFfOlCvhGHiv2tPJIOTVHzabP4kvN+2gHP0VCV1v37EVSrx95fY6Zwb
HCWohunjjmlWcClkNK9o8buGBGmil6BYN127v83EWLtUphXvb5hO6BExZaue
EQ91ZKsGdVMge9jmlNpmdt5qGWXDaG242ESKnjsPOQ5wLZj6bcR/1i9c4ntW
Rl5FUztBxwjX/uv6SlzDjjvSKe27azfQ5xRkw8O47t66OlCV2iuxWsvG60zz
dtuFrUq7IATJZDrj9h932K61Nw5uF/FxVTJZwxypB7/Lxr6aJyKuWcB3e6d0
VLqyUpNCETYawb54jz8+M+6tTTYqxMZ7r+V53KvlmHOajYyJ3OlMkPNUOqhd
t9fSgpk5QsaStsN1x7n+XvIF7WOLDYrsG/4TevOdmqSrDIwnTrF8Tzw0hx4S
F7iB81A3jkQvvDPYh83DDgQddI9Yi6RRSIJQ0/VZiM21byeSRMmLBusMqRVQ
sV41o3kBTi23Gye/b5uX0dkGYqrnQY5oJ1u1YKsOQYc5u6CuTcokrrem2r6X
qkmU7HGrV6WsdkI5V+hehCZwilc/YMNo33YlK7TPBa3nqP1e53VXUJfGbjmj
Nt+0efb0D70qJidNujP2vIBz6xY4ZAGjpxvP1LRQSEkmuDFY9z7l8lwkOh5y
K5T7gs/EH51I2UvegUSpN6OcdD/3eLUbUN3JNbFt3TYl18PEDe5J36YTDBDU
bdlemZFbtMA4eieXqd/L4x0GcLNuNNeRHhfR++1NXVTP4XdLYdW6p86qmY56
iB+RRKf8FsSYzla9RpJ6Q3WKnnv3rhirq//971RNdRWnB7aroUF7/bIrY7RC
MlkWU3fCjYY2wqj5eXaWXtmmzWJ7J+9rqwPu4Nedsais3WtuVyHk3GtX2X0Q
32f+D1+/O6f9iTjlhR+14XfTJk9FUsmZCQ1sD8emrG7DaCjknQsj0XfwPoip
Ik8hsq6zlC29NRJw5fQWx0x8Zmc+YQMC9DkM6YwauRuYpzkkKi/1YuCisGes
ZlbuLGxh21r4KII7T+kShC0a/vLMviFufDHufK8+fEZXP9WWoD5TTMYfuTA/
44OsmO//ACd8jRweXQAA

-->

</rfc>
