<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.3 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-quic-manageability-00" category="info">

  <front>
    <title abbrev="QUIC Manageability">Manageability of the QUIC Transport Protocol</title>

    <author initials="M." surname="Kuehlewind" fullname="Mirja Kuehlewind">
      <organization>ETH Zurich</organization>
      <address>
        <postal>
          <street>Gloriastrasse 35</street>
          <city>8092 Zurich</city>
          <country>Switzerland</country>
        </postal>
        <email>mirja.kuehlewind@tik.ee.ethz.ch</email>
      </address>
    </author>
    <author initials="B." surname="Trammell" fullname="Brian Trammell">
      <organization>ETH Zurich</organization>
      <address>
        <postal>
          <street>Gloriastrasse 35</street>
          <city>8092 Zurich</city>
          <country>Switzerland</country>
        </postal>
        <email>ietf@trammell.ch</email>
      </address>
    </author>
    <author initials="D." surname="Druta" fullname="Dan Druta">
      <organization>AT&amp;T</organization>
      <address>
        <email>dd5826@att.com</email>
      </address>
    </author>

    <date year="2017" month="July" day="03"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document discusses manageability of the QUIC transport protocol, focusing
on caveats impacting network operations involving QUIC traffic. Its intended
audience is network operators, as well as content providers that rely on the use
of QUIC-aware middleboxes, e.g. for load balancing.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>QUIC <xref target="QUIC"/> is a new transport protocol currently
under development in the IETF quic working group, focusing on support of
semantics as needed for HTTP/2 <xref target="QUIC-HTTP"/>. Based on
current deployment practices, QUIC is encapsulated in UDP and encrypted by
default. The current version of QUIC integrates TLS
<xref target="QUIC-TLS"/> to encrypt all payload data and most control
information. Given QUIC is an end-to-end transport protocol, all information in
the protocol header, even that which can be inspected, is is not meant to be
mutable by the network, and will therefore be integrity-protected to the extent
possible.</t>

<t>This document provides guidance for network operation on the management of QUIC
traffic. This includes guidance on how to interpret and utilize information that
is exposed by QUIC to the network as well as explaining requirement and
assumptions that the QUIC protocol design takes toward the expected network
treatment. It also discusses how common network management practices will be
impacted by QUIC.</t>

<t>Of course, network management is not a one-size-fits-all endeavour: practices
considered necessary or even mandatory within enterprise networks with certain
compliance requirements, for example, would be impermissible on other networks
without those requirements. This document therefore does not make any specific
recommendations as to which practices should or should not be applied; for each
practice, it describes what is and is not possible with the QUIC transport
protocol as defined.</t>

<t>QUIC is at the moment very much a moving target. This document refers the state
of the QUIC working group drafts as well as to changes under discussion, via
issues and pull requests in GitHub current as of the time of writing.</t>

<section anchor="notational-conventions" title="Notational Conventions">

<t>The words “MUST”, “MUST NOT”, “SHOULD”, and “MAY” are used in this document.
It’s not shouting; when these words are capitalized, they have a special meaning
as defined in <xref target="RFC2119"/>.</t>

</section>
</section>
<section anchor="features-of-the-quic-wire-image" title="Features of the QUIC Wire Image">

<t>In this section, we discusses those aspects of the QUIC transport protocol that
have an impact on the design and operation of devices that forward QUIC packets.
Here, we are concerned primarily with QUIC’s unencrypted wire image, which we
define as the information available in the packet header in each QUIC packet,
and the dynamics of that information. Since QUIC is a versioned protocol,
also the wire image of the header format can change. However, at least
the mechanism by which a receiver can determine which version is used and the
meaning and location of fields used in the version negotiation process need to
be fixed.</t>

<t>This document is focused on the protocol as presently defined in <xref target="QUIC"/> and
<xref target="QUIC-TLS"/>, and will change to track those documents.</t>

<section anchor="public-header" title="QUIC Packet Header Structure">

<t>The QUIC packet header is under active development; see section 5 of <xref target="QUIC"/>
for the present header structure.</t>

<t>The first bit of the QUIC header indicates the present of a long header that
exposes more information than the short header. The long header is typically
used during connection start or for other control processes while the short
header will be used on most data packets to limited unnecessary header overhead.
The fields and location of these fields as defined by the current version of
QUIC for the long header are fixed for all future version as well. However, note
that future versions of QUIC may provide additional fields. In the current
version of quic the long header for all header types has a fixed length,
containing, besides the Header Form bit, a 7-bit header Type, a 64-bit
Connection ID, a 32-bit Packet Number, and a 32-bit Version. The short header is
variable length where bits after the Header Form bit indicate the present on the
Connection ID, and the length of the packet number.</t>

<t>The following information may be exposed in the packet header:</t>

<t><list style="symbols">
  <t>header type: the long header has a 7-bit header type field following the
Header Form bit. The current version of QUIC defines 7 header types, namely
Version Negotiation, Client Initial, Server Stateless Retry, Server Cleartext,
Client Cleartext, 0-RTT Protected, 1-RTT Protected (key phase 0), 1-RTT
Protected (key phase 1), and Public Reset.</t>
  <t>connection ID: The connection ID is always present on the long and optionally
present on the short header indicated by the Connection ID Flag. If present at
the short header it at the same position then for the long header. The
position and length pf the congestion ID itself as well as the Connection ID
flag in the short header is fixed for all versions of QUIC. The connection ID
identifies the connection associated with a QUIC packet, for load-balancing
and NAT rebinding purposes; see <xref target="loadbalancing"/> and <xref target="rebinding"/>.
Therefore it is also expected that the Connection ID will either be present on
all packets of a flow or none of the short header packets. However, this field
is under endpoint control and there is protocol mechanism that hinders the
sending endpoint to revise its decision about exposing the Connection ID at
any time during the connection.</t>
  <t>packet number: Every packet has an associated packet number. The packet number
increases with each packet, and the least-significant bits of the packet
number are present on each packet. In the short header the length of the
exposed packet number field is defined by the (short) header type and can
either be 8, 16, or 32 bits. See <xref target="packetnumber"/>.</t>
  <t>version number: The version number is present on the long headers and
identifies the version used for that packet, expect for the Version
negotiation packet. The version negotiation packet is fixed for all version of
QUIC and contains a lit of versions that is supported by the sender. However
the version in the version field of the header is the reflected version of the
clients initial packet and is therefore explicitly not supported by the
sender.</t>
  <t>key phase: The short header further has a Key Phase flag that is used by the
endpoint identify the right key that was used to encrypt the packet. Different
key phases are indicated with the use of the long header by using to different
header types for protected long header packets.</t>
</list></t>

</section>
<section anchor="wire-integrity" title="Integrity Protection of the Wire Image">

<t>As soon as the cryptographic context is established, all information in the QUIC
header, including those exposed in the packet header, is integrity protected.
Further, information that were sent and exposed in previous packets when the
cryptographic context was established yet, e.g. for the cryptographic initial
handshake itself, will be validate later during the cryptographic handshake,
such as the version number.  Therefore, devices on path MUST NOT change any
information or bits in QUIC packet headers. As alteration of header information
would cause packet drop due to a failed integrity check at the receiver, or can
even lead to connection termination.</t>

</section>
<section anchor="rebinding" title="Connection ID and Rebinding">

<t>The connection ID in the QUIC packer header is used to allow routing of QUIC
packets at load balancers on other than five-tuple information, ensuring that
related flows are appropriately balanced together; and to allow rebinding of a
connection after one of the endpoint’s addresses changes - usually the client’s,
in the case of the HTTP binding. The connection ID is proposed by the server
during connection establishment, and a server might provide additional
connection IDs that can the used by the client at any time during the
connection. Therefore if a flow changes one of its IP addresses it may keep the
same connection ID, or the connection ID may also change together with the IP
address migration, avoiding linkability; see Section 7.6 of
<xref target="QUIC"/>.</t>

</section>
<section anchor="packetnumber" title="Packet Numbers">

<t>The packet number field is always present in the QUIC packet header. The packet
number exposes the least significant 32, 16, or 8 bits of an internal packet
counter per flow direction that increments with each packet sent. This packet
counter is initialized with a random 31-bit initial value at the start of a
connection.</t>

<t>Unlike TCP sequence numbers, this packet number increases with every packet,
including those containing only acknowledgment or other control information.
Indeed, whether a packet contains user data or only control information is
intentionally left unexposed to the network. The packet number increases with
every packet but they sender may skip packet numbers.</t>

<t>While loss detection in QUIC is based on packet numbers, congestion
control by default provides richer information than vanilla TCP does.
Especially, QUIC does not rely on duplicated ACKs, making it more tolerant of
packet re-ordering.</t>

</section>
<section anchor="initial-handshake-and-pmtud" title="Initial Handshake and PMTUD">

<t>[Editor’s note: text needed.]</t>

</section>
<section anchor="version-negotiation-and-greasing" title="Version Negotiation and Greasing">

<t>Version negotiation is not protected, given the used protection mechanism can
change with the version.  However, the choices provided in the list of version
in the Version Negotiation packet will be validated as soon as the cryptographic
context has been established. Therefore any manipulation of this list will be
detected and will cause the endpoints to terminate the connection.</t>

<t>Also note that the list of versions in the Version Negotiation packet may
contain reserved versions. This mechanism is used to avoid ossification in the
implementation on the selection mechanism. Further, a client may send a Initial
Client packet with a reserved version number to trigger version negotiation. In
the Version Negotiation packet the connection ID and packet number of the Client
Initial packet are reflected to provide a proof of return-routability. Therefore
changing these information will also cause the connection to fail.</t>

</section>
</section>
<section anchor="specific-network-management-tasks" title="Specific Network Management Tasks">

<t>In this section, we address specific network management and measurement
techniques and how QUIC’s design impacts them.</t>

<section anchor="statefulness" title="Stateful Treatment of QUIC Traffic">

<t>Stateful network devices such as firewalls use exposed header information to
support state setup and tear-down. <xref target="STATEFULNESS"/> provides a
general model for in-network state management on these devices, independent of
transport protocol. Features already present in QUIC may be used for state
maintenance in this model. Here, there are two important goals: distinguishing
valid QUIC connection establishment from other traffic, in order to establish
state; and determining the end of a QUIC connection, in order to tear that state
down.</t>

<t>Both, 1-RTT and O-RTT connection establishment, using a TLS handshake on stream
0, is detectable using heuristics similar to those used to detect TLS over TCP.
0-RTT connection may additional also send data packets, right after the client
hello. These data may be reorder in the network, therefore it may be possible
that 0-RTT Protected data packet are seen before the Client Initial packet.</t>

<t>Exposure of connection shutdown is currently under discussion; see
https://github.com/quicwg/base-drafts/issues/353 and
https://github.com/quicwg/base-drafts/pull/20.</t>

</section>
<section anchor="measurement" title="Measurement of QUIC Traffic">

<t>Passive measurement of TCP performance parameters is commonly deployed in access
and enterprise networks to aid troubleshooting and performance monitoring
without requiring the generation of active measurement traffic.</t>

<t>The presence of packet numbers on all QUIC packets allows the trivial one-sided
estimation of packet loss and reordering between the sender and a given
observation point. However, since retransmissions are not identifiable as such,
loss between an observation point and the receiver cannot be reliably estimated.</t>

<t>The lack of any acknowledgement information or timestamping information in the
QUIC packet header makes running passive estimation of latency via round trip
time (RTT) impossible. RTT can only be measured at connection establishment
time, by observing the Client Initial packet and the Server’s reply to this
packet which maybe a Server Cleartext, Version Negotiation, or Server Stateless
Retry packet.</t>

<t>Note that adding a packet number echo (as in
https://github.com/quicwg/base-drafts/pull/367 or
https://github.com/quicwg/base-drafts/pull/368) to the public header would allow
passive RTT measurement at on-path observation points. For efficiency purposes,
this packet number echo need not be carried on every packet, and could be made
optional, allowing endpoints to make a measurability/efficiency tradeoff; see
section 4 of <xref target="IPIM"/>. Note further that this facility would have significantly
better measurability characteristics than sequence-acknowledgement-based RTT
measurement currently available in TCP on typical asymmetric flows, as adequate
samples will be available in both directions, and packet number echo would be
decoupled from the underlying acknowledgment machinery; see e.g. <xref target="Ding2015"/></t>

<t>Note in-network devices can inspect and correlate connection IDs for partial
tracking of mobility events.</t>

</section>
<section anchor="ddos-detection-and-mitigation" title="DDoS Detection and Mitigation">

<t>For enterprises and network operators one of the biggest management challenges
is dealing with Distributed Denial of Service (DDoS) attacks. Some network
operators offer Security as a Service (SaaS) solutions that detect attacks by
monitoring, analyzing and filtering traffic. These approaches generally utilize
network flow data <xref target="RFC7011"/>. If any flows pose a threat, usually they are
routed to a “scrubbing environment” where the traffic is filtered, allowing the
remaining “good” traffic to continue to the customer environment.</t>

<t>This type of DDoS mitigation is fundamentally based on tracking state for flows
(see <xref target="statefulness"/>) that have receiver confirmation and a proof of
return-routability, and classifying flows as legitimate or DoS traffic. The QUIC
packet header currently does not support an explicit mechanism to easily
distinguish legitimate QUIC traffic from other UDP traffic. However, the first
packet in a QUIC connection will usually be a Client Initial packet.  This can
be used to identify the first packet of the connection.</t>

<t>If the QUIC handshake was not observed by the defense system, the connection ID
can be used as a confirmation signal as per
<xref target="STATEFULNESS"/> if present in both directions.</t>

<t>Further, the use of a connection ID to support connection migration renders
5-tuple based filtering insufficient, and requires more state to be maintained
by DDoS defense systems. However, it is questionable if connection migrations
needs to be supported in a DDOS attack. If the connection migration is not
visible to the network that performs the DDoS detection, an active, migrated
QUIC connection may be blocked by such a system under attack. However, a defense
system might simply rely on the fast resumption mechanism provided by QUIC. This
problem is also related to these issues under discussion:
https://github.com/quicwg/base-drafts/issues/203</t>

</section>
<section anchor="qos-support-and-ecmp" title="QoS support and ECMP">

<t>QUIC does not provide any additional information on requirements on Quality of
Service (QoS) provided from the network. QUIC assumes that all packets with the
same 5-tuple {dest addr, source addr, protocol, dest port, source port} will
receive similar network treatment.  That means all stream that are multiplexed
over the same QUIC connection require the same network treatment and are handled
by the same congestion controller. If differential network treatment is desired,
multiple QUIC connection to the same server might be used, given that
establishing a new connection using 0-RTT support is cheap and fast.</t>

<t>QoS mechanisms in the network MAY also use the connection ID for service
differentiation as usually a change of connection ID is bind to a change of
address which anyway is likely to lead to a re-route on a different path with
different network characteristics.</t>

<t>Given that QUIC is more tolerant of packet re-ordering than TCP (see
<xref target="packetnumber"/>), Equal-cost multi-path routing (ECMP) does not necessarily
need to be flow based.  However, 5-tuple (plus eventually connection ID if
present) matching is still beneficial for QoS given all packets are handled by
the same congestion controller.</t>

</section>
<section anchor="loadbalancing" title="Load Balancing using the Connection ID">

<t>The Connection ID is used in part to support load balancing in content
distribution networks (CDNs), which operate complex, geographically distributed
pools of back-end servers, fronted by load balancing systems.  These load
balancers are responsible for identifying the most appropriate server for each
connection and for routing all packets belonging to that connection to the
chosen server.</t>

<t>Load balancers are often deployed in pools for redundancy and load sharing. For
high availability, it is important that when packets belonging to a flow start
to arrive at a different load balancer in the load balancer pool, the packets
continue to be forwarded to the original server in the server pool.</t>

<t>Support for seamless connection migration is an important design goal of
QUIC - a necessity due to the proliferation of mobile connected devices.
This connection persistence provides an additional challenge for multi-homed
anycast-based services often employed by large content owners and CDNs. The
challenge is that a migration to a different network in the middle of the
connection greatly increases the chances of the packets routed to a different
anycast point of presence (POP) due to the new network’s different
connectivity and Internet peering arrangements. The load balancer in the
new POP, potentially thousands of miles away, will not have information
about the established flow and would not be able to route it back to the
original POP.</t>

<t>Load balancers may cooperate with servers or server pools behind them to use a
server-generated Connection ID value, in order to support stateless load
balancing, even across NAT rebinding or other address change events (see
<xref target="rebinding"/>). See section 5.7 of <xref target="QUIC"/>.</t>

<t>Server-generated Connection IDs must not encode any information other that that
needed to route packets to the appropriate backend server(s): typically the
identity of the backend server or pool of servers, if the data-center’s load
balancing system keeps “local” state of all flows itself.  Care must be
exercised to ensure that the information encoded in the Connection ID is not
sufficient to identify unique end users. Note that by encoding routing
information in the Connection ID, load balancers open up a new attack vector
that allows bad actors to direct traffic at a specific backend server or pool.
It is therefore recommended that Server-Generated Connection ID includes a
cryptographic MAC that the load balancer pool server are able to identify and
discard packets featuring an invalid MAC.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>Supporting manageability of QUIC traffic inherently involves tradeoffs with the
confidentiality of QUIC’s control information; this entire document is therefore
security-relevant.</t>

<t>Some of the properties of the QUIC header used in network management are
irrelevant to application-layer protocol operation and/or user privacy. For
example, packet number exposure (and echo, as proposed in this document), as
well as connection establishment exposure for 1-RTT establishment, make no
additional information about user traffic available to devices on path.</t>

<t>At the other extreme, supporting current traffic classification methods that
operate through the deep packet inspection (DPI) of application-layer headers
are directly antithetical to QUIC’s goal to provide confidentiality to its
application-layer protocol(s); in these cases, alternatives must be found.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>Igor Lubashev contributed text to <xref target="loadbalancing"/> on the use of the connection
ID for load balancing.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>This work is partially supported by the European Commission under Horizon 2020
grant agreement no. 688421 Measurement and Architecture for a Middleboxed
Internet (MAMI), and by the Swiss State Secretariat for Education, Research,
and Innovation under contract no. 15.0268. This support does not imply
endorsement.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="QUIC">
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>

<author initials='J' surname='Iyengar' fullname='Janardhan Iyengar'>
    <organization />
</author>

<author initials='M' surname='Thomson' fullname='Martin Thomson'>
    <organization />
</author>

<date month='June' day='13' year='2017' />

<abstract><t>This document defines the core of the QUIC transport protocol.  This document describes connection establishment, packet format, multiplexing and reliability.  Accompanying documents describe the cryptographic handshake and loss detection.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-transport-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-transport-04.txt' />
</reference>



<reference anchor="QUIC-HTTP">
<front>
<title>Hypertext Transfer Protocol (HTTP) over QUIC</title>

<author initials='M' surname='Bishop' fullname='Mike Bishop'>
    <organization />
</author>

<date month='June' day='13' year='2017' />

<abstract><t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment.  This document describes a mapping of HTTP semantics over QUIC.  This document also identifies HTTP/2 features that are subsumed by QUIC, and describes how HTTP/2 extensions can be ported to QUIC.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-http-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-http-04.txt' />
</reference>



<reference anchor="QUIC-TLS">
<front>
<title>Using Transport Layer Security (TLS) to Secure QUIC</title>

<author initials='M' surname='Thomson' fullname='Martin Thomson'>
    <organization />
</author>

<author initials='S' surname='Turner' fullname='Sean Turner'>
    <organization />
</author>

<date month='June' day='13' year='2017' />

<abstract><t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.  Note to Readers  Discussion of this draft takes place on the QUIC working group mailing list (quic@ietf.org), which is archived at https://mailarchive.ietf.org/arch/search/?email_list=quic.  Working Group information can be found at https://github.com/quicwg; source code and issues list for this draft can be found at https://github.com/quicwg/base-drafts/labels/tls.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-tls-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-tls-04.txt' />
</reference>



<reference  anchor="RFC2119" target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="IPIM" target="https://arxiv.org/abs/1612.02902">
  <front>
    <title>In-Protocol Internet Measurement (arXiv preprint 1612.02902)</title>
    <author initials="M." surname="Allman">
      <organization></organization>
    </author>
    <author initials="R." surname="Beverly">
      <organization></organization>
    </author>
    <author initials="B." surname="Trammell">
      <organization></organization>
    </author>
    <date year="2016" month="December" day="09"/>
  </front>
</reference>
<reference anchor="Ding2015" target="http://www.sigcomm.org/sites/default/files/ccr/papers/2015/July/0000000-0000002.pdf">
  <front>
    <title>TCP Stretch Acknowledgments and Timestamps - Findings and Impliciations for Passive RTT Measurement (ACM Computer Communication Review)</title>
    <author initials="H." surname="Ding">
      <organization></organization>
    </author>
    <author initials="M." surname="Rabinovich">
      <organization></organization>
    </author>
    <date year="2015" month="July"/>
  </front>
</reference>




<reference anchor="STATEFULNESS">
<front>
<title>Transport-Independent Path Layer State Management</title>

<author initials='M' surname='Kuehlewind' fullname='Mirja Kuehlewind'>
    <organization />
</author>

<author initials='B' surname='Trammell' fullname='Brian Trammell'>
    <organization />
</author>

<author initials='J' surname='Hildebrand' fullname='Joe Hildebrand'>
    <organization />
</author>

<date month='March' day='28' year='2017' />

<abstract><t>This document describes a simple state machine for stateful network devices on a path between two endpoints to associate state with traffic traversing them on a per-flow basis, as well as abstract signaling mechanisms for driving the state machine.  This state machine is intended to replace the de-facto use of the TCP state machine or incomplete forms thereof by stateful network devices in a transport-independent way, while still allowing for fast state timeout of non-established or undesirable flows.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-trammell-plus-statefulness-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-trammell-plus-statefulness-03.txt' />
</reference>



<reference  anchor="RFC7011" target='http://www.rfc-editor.org/info/rfc7011'>
<front>
<title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
<author initials='B.' surname='Claise' fullname='B. Claise' role='editor'><organization /></author>
<author initials='B.' surname='Trammell' fullname='B. Trammell' role='editor'><organization /></author>
<author initials='P.' surname='Aitken' fullname='P. Aitken'><organization /></author>
<date year='2013' month='September' />
<abstract><t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network.  In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required.  This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process.  This document obsoletes RFC 5101.</t></abstract>
</front>
<seriesInfo name='STD' value='77'/>
<seriesInfo name='RFC' value='7011'/>
<seriesInfo name='DOI' value='10.17487/RFC7011'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAHYMWlkAA7Vc63LjxpX+30/RO65aS1UkpdFkLpZrayNLMx5trLEy0iSb
zaa2mkCTRAQCDBqghp6aqrzGVu2+XJ5kz3dOd6MBcuzkx7psSyKBxulz/c6l
MZ1OVVu0pT3XN6YyS2vmRVm0O10vdLuy+rcfri/1fWMqt6mbVt82dVtndanM
fN7Y7bl8P7hT5XVWmTUtmDdm0U4L2y6mf+mKbLpOL5uWprWuVTn9OFcZ/X9Z
N7tzXVSLWqli05zrtulce3Z6+s3pmXqwu8e6yc/1ddXaprLt9AqrK+VaU+X/
Zcq6oifurFOb4lz/kYicaEcUN3bh6LfdGr/8SSnTtau6OVdaT+k/TY9ztPOZ
/k1nV6V9LKqcP5YN3BTNn834q7pZnuvX92/1f3RNka34M7s2RXmu17h+9hCv
/3VbPMysndl29dPMX+qIJNue6+/LuikM/WWcs/rZc/4yI8ac61en35ylq2d1
V7Xgzd1j0f5km9IwKckGvptBRuu1LcuE/O/oAdXwi58hHnL6desv/n+l9mqm
r5quNQmpV0Ro/xlTeXH/z/cpfXn+/NXZi1+btp1l9Vqpqm7Wpi22pD0KShP/
0vr69vrmnO/1qn1dTYPmRgXSN9a4rrFrW7X6yDT/Xmz1prGbpqC/n754ejY7
PSPNO+Z1erXBP1P/s1efi7Ik7T789fuZ/s5uiRG7w9+PhdeaZgmer9p2485P
TkzzsdjOiCcnZu5Oesr4YjYffXb69MX06dn09Bv68KqolvTB8wEH7i9v9R0J
s81W+iJ7qOrH0uZL7N1pEpC+L9ZkjWa9cXqq35Du0iLyzfV6UxZZQcytK6eJ
z/qWlIA4rd/f3w+ZeHF5oy/r9aYjDuOXdVcVGd+o39ttYR//Dma+nfEGvsjp
9+Q/qnobtC1lFvHq8fFx5oolKciaOeYKcjInuV2YrmxPFkVJf2VZc7IxG9u4
E7Dp5N+6cndyKv9M5cfZbJMvhvx9Pj19qdR0OtUkBbKDjHzP/apwmtxdx9vP
C5d1ZB5Or7/oSdvoSTdeHyfEUroNWyY2ZWZrDYmkWG/oCfShJk0lx/egayLY
y6CotnW5xZdhzcWiyGb6GjeSdle5zcnR5YWtMquJxOEadUMe0Tj9SAqHn1mN
e5iibZETW4hc0+rGlkR7xbR3ziraBh43NY+mseTq8ry08/qjpcXsbDljzShr
k+u5IZPPiLyZ8EsuVeormF5T512GbSjFxH/69E/4+S/X06tZHykimz5/Bv2G
dvB4gHc665qGSCfL6mjTjc7Jzsp6w+IohPTr1/dvNBbVYAGYtmzqbtOzHXt0
3YYXrhfKkbup2iJzYE1lLfGSt/b2/v725CzQO8WfI6Khgp8/k7EbR/fQDj11
RNWmrHdr4THEmoFpvH3aHAnJbFyHcJiD6A9Xt2x39Hmz2+DDOcVU0WDyFLSl
sC75FAfb8pJh2S8bhFV9/8OdCqTS72P2lo4Y29bhGdqQJmzMjsVHGm+YgHXt
WlaOhuJ99LB1NdPfk/VXcQPkuknlpm09pR8HNRzLJwvQ7wqiiWJcWUPSIz3C
sqx8jysycLKGSs8tTH9jM+LEBI+DPtetXlsSE/Ywt2pNgWNeWmIUi9yr+4R3
8VjQw+lTiv816S0vBzYBgoAAXhjr4E77EZagNjU5OFpwNjZxbyJOL7siN7Au
qMaeiQazET/Ad3oZqWisvHBRZWU3WI/uXNWPoAdkNhSQWt5G15Iz+ckO2AhO
KWjQRyKY9cQ7hDplQ2rqdGVpigpa31hSBe+4EaHJp3frjTgYFkH0WVFMRGix
pMeaB6K4rckP5J5rIp7wRNokOTGsDJ9E0nd14hyxPfhn2kCgMOFTNBARHAlX
XGG/PRLKjwugjMbZyaElvIIY4qWdOmLadFG0bgolhGs0W7r1vH+QIhV38Hu8
AfrAmYYcXyPaSOvmcJk7oqddFVB1FkvhIoMdf6Uz27TEW1oOAZOFmfDYTVhV
7EcKsSXR/Vh3Zc7auCatWReicBB/DWWNayusXXcQB8l4sKLXoaicvZLntfVG
QqIi6e40DKggvVONBe8tNsWiNpCkN7ee927F5BHB/jcsRsSaDW3N5t/KXgzF
4HAPmSYcncuaYg7hQYMKARBeHsGohFv7EVFFPSOayN8Vlc1nPkpgJdHIdb32
rm+n1x0RbegjjoWCBMZMIY5IRLOEZck1qjQaDyKCpCsuNRfiTLYy1ZI25OOL
aDFxbqK3hSHjc52VXW46ugfiIRgFwyYn2b7t5tFZ03L+0S1BLfz+SD5IouRX
X+l3dcsSMSUBp4o0j8UD/2NBZu70k5sPd/dPJvJTv/uRf797++OHH66eiKt7
cnPxhyca0blzEkvalBczdd1+LbKAVPHsb0lQ7HKtC4/B7RSQitbA35DLpS93
ekW4hFjNakQkwvkCsfSSwtMo4Lx/c3n29Ok3FAYR79+QGyBw6AYQ6PekvwQq
yVqVuvYkOsuYgMzCJp5CVN6w83e/AKPEGQqZlYdPwQ17vwUWJS56AbTA2s7u
jjSaHZq4PJM9WLIw9ZZMiqlittRk1A02S/a/Nk1Rilfge76GjvQx+xG7LLDL
ibeuR6uEV6xZq6ErN1vKcTiGedgiFPjIiA9hbSlxE4X98PZ2lEMBsDCHYHdp
rL4r4ImiFQXQwJvw8Vmxh8ZSPdWB3Z4AWZADsljETL+tH5HVTGCZJWUBLcf0
tcX3hVvDXcvGDZlFZgkyNHx/bls4POKDfB1QDFHHauu3pbyO8d9lnUWpLQpb
5i5RcRuXqOyybiVTwe7gyxnCkSEr8l6L4iO7lKGHKJxAQcZseoBLSFAUgB0j
zJGig6GEoRA5E5z1+XMCOoRRHI3JST54dQ7PdWL3LJhbEfZb4TWlaQSRyW70
p6823bwEtORvPos7SJQg6kdwUHDGW5vi4G/JuGwwMP0cHIzkK7hx2THvMizn
AgUzeeKiaAgKzot2YIRRN3MkedYNVqILDYmN5OcvY/sUpEIJEqLUCMoI78kz
NYEOQbvpIrTPdrehx5WA/BBZ3jVQEjLNym+R3DyQPOusD6YexAad4PhEqWD/
QOXX95hDB21gCMyA2HsESLMs1gVMvKt6uODvr0kT8evMs401dazA4m3Dl70H
9eh1H91LDAyySvkBr8Razd8C4Sw61pxwsw9mibWS+7dKPN7gUhfTiLXZBaCr
TZ4XPiwJwYToqpRMlSQhnGWNSQyEBTXYbYABDVyRUF7aatmuJoBhrWDTCYnA
MczGYt4q3pCuQAXJwPTLKXTRr3hPK+LDF7/Cp+qy14TrK3z+7Iyv9jb2rlvP
2WmRUOJ3v5M9iL6lGkgKp7bk6NkzC6GImMgjCkCFRWubQ0RGoxjaBHNuj0Lv
xv3y3sK8fVdMbjDDuizrR6h7ajoQ19zGJOBQ/DinRDwVwPmelEQgA77iQhF6
8mDQr8e7/fmsVNTb6ZcDFZhw4Y9LYp77+l3vvSf6knAmLXZdkfoZSiHvbLNl
30hMLeHX39u22cXPLykCNS2lbxNa0N/bf6ZPp6hV3YZ0b6KfDj/QRw8EcjbE
BatPj/3XtNLBC54ei9Bu2TcTIY5gJzicpYI9F6akH3EALh/Nzo1UQkQh+ESs
jRkzumiomF7BotsYaJV+U5olmeoirkHOVx9YpQ242pE0ANEL744JFR5wOCxp
UBYuZN8mirsRxaUdE16OO26dLRcDTD2mlZZbELVBcUfmN3JvY2c12+cyrUe+
g/Az6a4LJIWvKcutUctkhNYCm6SQKtawprGGRathj+8u7gnFzKUuSli/4Tgm
sfXTJ9wS7xBUQJ/G64GGNQj16VkhqRFAV0ydY8o9lCMHJFtwFJunngR0cdFG
whKH2wUZKQJfRfAu+JEBOwOs7aMBo282crAtoAhKDzc1yuAhcHof1XA1McKj
Husx9ZQd++ohVIToZF7FtShyNgS4HfaPoJcVEqHmyG7Ze3kHM2IBay5yWM6b
fLwfipWtb+Axz/VrThGDGzRcpkqkP/SvrEWDj8AOAvOEa63P7xmAB0XpnTYB
3ynSC2TXqEhxYBg4cVpK1uRwnRh1smIMqwN57YUFWir4+QG13k8Xe2DiiNc7
Hvh00J5xs6JXrFfk815MoDzPzngLlDiwastj5Cmc1U17tO05fZ8icCGnOOzh
hApGRPtWGpZg7CW+h5QqMFwMJfokHzPA2hTze14OKNr7/oteBVBLi0NgHgkg
QWAsBfpG79P68oavG/f8htZDn7yBeZ8bU5xhuiJCGyZahTCDPEUpjiEJp6IA
GUc3lBg4NIZN+UpLXwRCra/ICqQunPKPSPUmyuBiqmN0O9/HQIuuYTURjPAb
uvKW4yB77cCJzqUrR6P3MhbmNMVy1fKjpMZr/G1JIbq3GrSBFgvLGFP39EmB
oo9+sZhEKwVWpsCGSJIqf4saZL/gAI5CD/pacHp7LAQgV7sOheOAC3q5JFUN
ytqQRk9jmZnStgtSlVrgOHsu7LVeNmZDGbD0Xz4yF9GCI1DhVsAo+1XzmHup
UDGXArJ4RGSXP4cCpXoe9xA3PFNvRMKTveoyRe2GlVr0K1l9A19edy5GoFBI
Uoc3B2Enu9M7NurQN9pnitduRQEmdyuUMQVKTGKOtjVlge6cRuekGQSGwUpx
hYlyXDAcupsQAfr4PImFIXYZpF+h4hZSeopGaUMEbpPdflEdSM7JlV4g2rdJ
5SmCuLiGkoJwZqDH/v68qTe0Ly4hUHQ3lLLmiQCzlc0eAn4LJRb24fDuXL2m
8MTmlSAgKb4YHzZJq0fRlsT8PgKdT1/1IEZykBGg7VVSiG7SioS3bYPkQTdS
cYyNkKA3qB71XUNEh1gD56LAgnY1bbtNOSgYkO5ULkicEEJjpX8GCCQuwmxI
wTcNoj15QL866FlaLP6thPBIXdwykJRKESPneAmiCr7ta4fsuJF6QigTT2nX
HeC7KCK76q/dRHlGZab3Uuggav/UAzDWI63Y2ZHogmRH7dc8omWh4hOSW7la
r9nr7if0avA4H9MyExu+fUFC0inTHkJhySqzFOJGPBo44zkIM7m+TThXtJzB
Pli74fU4EcmGKXLwEAP+4C7G0LHOJpLtQ8L1rfLPARMarzhmWxcs6bKoHnyP
XoD8nV/85ewFoEAsk4mdDAoIDrW5FBqJdXwBlI2Svj2rGRa8PGr0i4SSWUSb
OkWbz84icHsVoScK4DzkEtGB4qEcxDOQBbHkFKKy3s8z1pVpkDHYZffv2yqj
1YqIQtAqCBlVQ+pXr/Wzp1OphAhMIXdNnixkm1KjG5oasflDVRbk6jGs4tBK
Qela+OB8rjLk8BiiJ5gfNjeMjX2BiZSRLNQMxmD0XrUwLaOra4JKCMoU5vii
UBHsUSKZTCO1QqyEBxxYCAUlHtEIaT7JdNGic+BD67B3eyAxGe1ZpXvWc24U
ElYSaMc24h6KzXAJwJnfcwG0rJ3jgnwWEEZoFMz9EMPozkmS36uwvzkXxzGf
0DfIMQ42jHDizreUMJalYRGjTTlTr31Tqdz5mYjYvQwTKHkHJMv+/eLyN0TD
2nDbDq4DzqatS4qtXHT2YYVundYNcSD213whSb+NeIJLODf3H66U+s8/viav
WDfSHUN5DJBFhj9mf+L7DxSpeIXvIQvUCdTvDiQcofXZF56Whcw4eBe76YFk
n00jfHunFn3ZNpQo09yddHpVM1LxfI/Aj2JBmrGE+HNoF55jY1iVAyh9EbSq
gOuQFMytrVJwlwYChIw1bWuDAZeIl4kvTGHo8YsK+uaPNE8YCKXxlmvvAb3Y
/QrABWIBxNfXUkZccPqX2UAWEyrRGu6aQmjMwULHvZdUinIQVjR63Isw8yZP
wwBDyb51MBtCYHYs+JmOQNyEqMsWbDmeexVWvrwZ5SZOd0Rr8BbcfSqWS/r1
QEaMsoP6BY7sR15udw98koc0Qpm6HmWmTZrPEkERi+A3upX+bWzbNdUUINGH
5ESJxBg84HDDxhEri8CAqDEp2q0ZN3M3+s7PQNAmZWbkpp8ZuTfuwR3uRwcI
EUYoDo2c8LhUPwmpSJtXVfGXMBuAkRffI/a9aGlQs2GtxUFxZXvRlfo+DM/E
Cvq9zAwR5HD+oooIIsgR7wkkhcQlJDoLivKP5FpZTWP6tp99oEEaZuD4GcQB
wtyCka1ppnn9SMry6dO/3t1f3L9+8+GHd6/v7j5/7v29UUtbkRcuySXntuSs
rqimgTBZNJ2HClMHnmTknrndIGyJI99v8c/6eQJTEpPyXYqoYusqtO9AgYx8
rA2HXB7JCUMRTOVMS39fSpvQU6IWsqHHIp4sa9Ksc0wkIHXpyLnB07OHlOd9
CYLrRUMIyGcxIj1sUHNM4npHuFoxiZKNhM54yGNh9lzYHT1ruBTkIy5Pdsui
Uuo7enroc2DxH/m3L+cMUiUxmBzsU2aejcQ011qdTqS8CEfN7TC5YWUpFXA8
L+mKdVEaoYkBV3CNchOvjAYpYv9MnY7pYTzftxvZptnzpf3XiS8i9Z038ZNq
ZSmPY58BncIdXhcaK5zyrj/OBrZpOd5fG0aUpD86ahqldLCuOIS9uazRez89
9H4kidcwO3Ra68WgT73qWsgKbI1zrHtzRpyZqDAKviRn380x/36CZuvj8gQ4
bSqTSycyjXTy7PkzrrD+fTdhbunk7FScUDrNve99Eg9HzidMga+H9wDYUZbB
rgUGtzENZXQtUiZslAf/eJoCM7ECWEyGNrqSodf96ToE1wKDpXVHsnGrum7D
XEj6IFoXGA4WGmbmZFoumJM4qABC/KRESn2YzfS5HPuWjMU2BMGwChTn0lEh
qSMIUqKAu4UGyPwhhrEBmNfx0X41Bt/YhVdR0DmnTVsbEIKMdHDwZ9yo6jmi
vA/PAEVJK8cVMnLIjpMHCnm+j/QOEDQU29l0jUSIiWISwjMJne+tHxsd6QiP
HwYkeI7ldtrvzs/WoCCXPUgemiZZfjhzWDZrw7GDcVfbY6cDsy5rHj9tuor9
5MZr4ZDDKAZV2Q4zeig88VhysVFcuzgiqz5mJ++HfPkcAwofrJjzqBM5stUv
OUxea4LUR3gWe1eHnEDkonSrCQY0pP478ZSUEQYox/NQ5Iswabnf2T7cKCcm
jnvjinvjvQN6F0Ex/Ct7+SF8I7RS6yMDfPyPeI1nL17S4/+xO14dhxRXRpuC
VKX8yUakNsn5ktQ+DWDDlCuye4pK2PwNZlJhwAXLPjRpJ+pA4YB3zKNhXpkz
0zSFZLyDKoLvBPlh3TXRqkKPfiLkpk1OdlYydOsp92j2JCGMDDS39WIhrj1M
Zv1KJrNwdAmHCFhmofPiExr0rUwmh0qEXzzvmNSDyp0ia0ZoHDwdJTLM6doQ
qjkVDxWW6chGp5L7YwIi5X4fowbDivD3AHMylkWuZbcmd0/pv9Ri+aQJ7fcv
HbCJ4+nnONs9XGlOiKWvS7nJgTyDxRZGpylrJMFsUBRnuMVJNVxmuWMlH5Z3
1iYj9EaSlVoftx4+fQpnpT5/9maSYNYApjOup/EUqteGRsrNelRB5TYSGSuS
NB758/Xkde3FgJp8aCZdXdV3+iqWXrDwDfmMpXQDFCtzDIYSJ/aO8aRl6TmS
PNemGJukXqJ9bJ1i6Ea4lQjihPGKFKEp5h1wzZWtOFot2JHQlvURiDsme2tp
E2gF1+sYj1XydLTTUDXtuB/B7cG4xJ0xtISryy45U+CRoF8YB1v6qA15m3L3
U4jtiwItE/ar/ZkJoDuu7JM0cWxCcg7gJjkfoQKPpMgJxEZJy/s3ly9Pnz6F
XV1LWJI+wYbni4k0pFyTtHS/Q+BUSEd9dq+fuKzp5nOx9m3R1BV4/MSPg0nY
F6DE7WXQ7pt4/eRUg6OMHLaeLOs6fxJvkRYNwRpp9jCu7VxLbG/Sp4XZVW7j
k7xYh9ZRa/jJZAGGiw0ltz3CWGtQR0nEoKnMAnUkEyyDxPLzsR/ogHfpA39d
UTq57ktfffqu9tN37zhLuPIF26NvzThdWooUDBgQvLCFVMBpdygEh971xNpg
yFZx+Mg3utN5FMqwjCvIHSa5W/rg9OBcmqzh8FWkZlBp4xnYQBdA614GyE4t
6BCH8MMZgZYqEqp88z5JGnTKZeDWP6yOg1V9ses6ncON2RqarGCORMe+g5Pb
ha1I1d3OtXY92S/pKH/SSgawYccDaSPCGBmHto0aVQH4bFk4NzzdlJ2bDrUJ
zaAkUR+5edpMrHolfXwzqjkRh4LI05wxtHVITXn4SD33vULR/N6HkAPvfAj2
Qd0fpfHDyGIXfJxMc73AYIxGEQPZyIYcTCeoZJiLj30AFXAsWxyk0SkADucf
0s9jsDJdXf145/0iO6mRiPqNSklZbQs5TDM66yUzM5IVSTLiyW9D6QBjUJz6
TPyitMuxJvt0eF7WpICsRVJQ8tsPs+ae2v4gQGCT8tdJ69GhALobnCddoI9F
vPcnzhLLjYXscNqLjQVng2i36zg3F/q9sn3UBOUkzjh9Pv/HUuez02cylU88
6z1Mrl9f3tz6o0jRA8UqZjWoWwwSnGpwYAt//5bcgxwKVjFU/hbBNm48YpnY
A5KJJJzPC4dV0tG/0CKQzmnQ/085wABql3gPQtdk1v/Rn8rkK7DFeAWfuGU/
przbj0WdqGD90T6SjJFzmJz9+kKRJxBHhLuyLYiWj6RhXPdpw5zpWN88k/oL
9p4mAYcugbMrxTDj1cnIqW9JleilkhXFiR+43/1FC6nHIlCrQO0ecd7C+EmD
lrr3l31PBwccQo4oaRaOLSdLSclM6kpBvRAJKMxJrRV2gTNvCOvBJNyodKVv
Lv4gRnCg3k2ekuueoloq2b8ff40ByoS++bAqJYMHGEsQ2BMviq10f6in2j2S
l+BGzoOVXDZMm6AbwViA64eml4JM03Dbsv8sbGuUoxAbvo98jW3Jcb9P7/f7
JLlBWgJso8YjjMcT/ZqSkXKa4WwHS11SyjCgcgRjP+7tPBzyAJrwh4kgegaY
HGXSnlwwvyPEQcH7wu4RixfKR8RjcrZtxuqCvkMriVFlEaqMlNGhDaJiqdkn
xgAc/QvGwF7tB8zZfBfmlMNc3N7A7aevhvPMUtS5HOtIOICFjCcNz8N3AOAK
/4IBxmKcdEgXypf3ji6v3rnjcEpOsgtsA5niRzIuG3qOzMe8T1zUpq5LHniY
E0/48LnYJ87aNngmR5ERPTGC+2wCX6t++EiaVW6DM8GIr9zH8NAssItPBSXz
RcEtxEOx6fhQJZ2IoF2pCOcWo4Z+OFHGb8ZuR2WopFf+CSTGH4azUobLysTd
QUFVGMOPtTkSApQd5BgS3U1YkfviKJioFbmykIZ74C6Ipu+C+AP5tjpMuJ/z
4ZEOhb+bBoEDQSCx/MGMV+xSDz4E1ZNkbJFPZsecaG7DEc1+SoLyRqKCzMQL
IBwhkL+wHnHszuul+EWz5tMjX4JWcnbUb9z36tAFiqewpuzV4REQxfM+XyNt
KItFUmDmrD86Z/QPpJ4wkxwuoQCvIiG15mJz31CrUlQRU3nehnitFaWHuSJH
nGEGXQCvd/zOK4Vde6WAHeB8dHzZR/1Y+UlsDfuTgx39U4oANBL2sKz3/bZn
urzlI4wpJ7tbItyS5fZzKzK4AKGPJuWdTjPuflzX79GXpOtFX5s/uv0RvrpL
gPBjoOxvf/1vlywSSNpyrQIvtgkvAtpYCRykuQh28XD9WEF9TRqPoMcSlKpb
gRZcM6g7h0SMRY/3zGhDAdKPqyKOcDadTnzKyQdu9CWDsWxMPAYxOHjvsb5E
VbLQOZ8oFR8RzYCo2ncRAPNZHfwqo0XvJrVHCt5WYNerQirVnEIDXxglV0x9
94QoHEYCnusadiQHnWQ2t8TJcqWHh1NN1qD9MDxaE6ewAtzwAERKZyGkJ0dr
juWkQjzgOns5OOIKB/CzGyAGdaRa4DNpVO0B/QDFpzVYwnj+pTBRGsnRUAgz
DQyQUh+XjtzxeX9+VWZDOLT0Lwka3gBuQDL4Noa2Qq5EbWuacYmQFX3I4pCp
YazS6b/99X9wALX821//1ye6yLBxWpRrMjJZTRHxUmA7zvpaRbi9yYo4n88d
zDhZk/JH2BZHj/aAAtLVPvke1Do6HpLgRjfG55yve/NjyGXxyvyyEome6sA4
/Og05XiWeEOKhkEGdgySseotXU+hL2RSYMGc7jIZVzX5oACqE7E+xH4wjn8c
FhFerjA8fxHftBFOd3k9/P4LhhTfBWNGI/Q3F5fJSNNeyAyE8NCzdxORwegD
IxvGmw2Cni54ikLKrHiXFI8z0EPIVPCOpot3F6CMX4ni6xajE/MrLjNxGSG8
Egx3yZBNqAaPl/BhGI/dez3WoBpXVCvrq33yoitEDN8ySbJdLlDl4n+TZb52
h8Yuv5XuCa5u7ODof5QXGjFM+bQhn7U1XG3lwncIUQ18aFuMXmfhS5QBDR8a
DqLFiyasyrFtIwONRNm0NDvb9Gfq+hdUkOhO6kbGSsmdbE22E8gW3yEz6o2E
MYMjbqQTcJzICwzq5EhIIkacYnUqeQnY4UmWuCzELOMko8kR7ndVtfpCEUTC
HG8jGlRs+/B0yOCwBSb5RNXF79qPLconkxBVePLdHzUO6/kyc5i7W1uKxrkg
GBUCX7siJ7Jc+XqojSOxvrOD+46ubq+P2TXuyccf5VAwMvEOSKHhule25cYX
7cTrH+PFZMxtrKmwTwK3X1YCihPfevfm5MwAmmElT3SjcueCjyaZELpnu7uE
0iMvIhem1PWShPVDR5hwZbdiEL7Zw0ObRMH+odU6jqXuV5yVryvsvd+Nnjx6
m6B3FgINXeiHlbv9s3KvO1gU+SC8KVDmFXz97i0hmp/or7PTs1O15FTfEIwU
c6rqmX7x6tWvzp4OxlWg9BcNZdKodAZ9NfomvqcuVxHwHd1c3Fz7U9yemLtH
okBa6PBhjW1x7F+yhtd5l/luOw57mwajE4Igq9o3oYVw5jTePAMinz6fnZ69
eOWHRgMoinUFrooqig8kMSvdnf8DLtKiy41VAAA=

-->

</rfc>

