<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-intarea-rfc8335bis-03" category="std" consensus="true" submissionType="IETF" obsoletes="8335" updates="4884" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="PROBE">PROBE: A Utility for Probing Interfaces</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-rfc8335bis-03"/>
    <author initials="B." surname="Fenner" fullname="Bill Fenner" role="editor">
      <organization>Arista Networks</organization>
      <address>
        <postal>
          <street>5453 Great America Parkway</street>
          <city>Santa Clara</city>
          <region>California</region>
          <code>95054</code>
          <country>USA</country>
        </postal>
        <email>fenner@fenron.com</email>
      </address>
    </author>
    <author initials="R." surname="Bonica" fullname="Ron Bonica">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <street>2251 Corporate Park Drive</street>
          <city>Herndon</city>
          <region>Virginia</region>
          <code>20171</code>
          <country>USA</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <author initials="R." surname="Thomas" fullname="Reji Thomas">
      <organization>Arista Networks</organization>
      <address>
        <postal>
          <street>Global Tech Park</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560103</code>
          <country>India</country>
        </postal>
        <email>reji.thomas@arista.com</email>
      </address>
    </author>
    <author initials="J." surname="Linkova" fullname="Jen Linkova">
      <organization>Google</organization>
      <address>
        <postal>
          <street>1600 Amphitheatre Parkway</street>
          <city>Mountain View</city>
          <region>California</region>
          <code>94043</code>
          <country>USA</country>
        </postal>
        <email>furry@google.com</email>
      </address>
    </author>
    <author initials="C." surname="Lenart" fullname="Chris Lenart">
      <organization>Verizon</organization>
      <address>
        <postal>
          <street>22001 Loudoun County Parkway</street>
          <city>Ashburn</city>
          <region>Virginia</region>
          <code>20147</code>
          <country>USA</country>
        </postal>
        <email>chris.lenart@verizon.com</email>
      </address>
    </author>
    <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes 35000</city>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="14"/>
    <area>Internet Engineering Steering Group</area>
    <workgroup>int-area</workgroup>
    <keyword>Ping</keyword>
    <abstract>
      <?line 96?>

<t>This document describes a network diagnostic tool called PROBE. PROBE
is similar to PING in that it can be used to query the status of a
probed interface, but it differs from PING in that it does not require
bidirectional connectivity between the probing and probed interfaces.
Instead, PROBE requires bidirectional connectivity between the probing
interface and a proxy interface. The proxy interface can reside on the
same node as the probed interface, or it can reside on a node to which
the probed interface is directly connected. This document updates RFC
4884 and obsoletes RFC 8335.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://fenner.github.io/probe-clarification/draft-ietf-intarea-rfc8335bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-intarea-rfc8335bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Area mailing list (<eref target="mailto:int-area@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/int-area/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/fenner/probe-clarification"/>.</t>
    </note>
  </front>
  <middle>
    <?line 109?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Network operators use <xref target="RFC2151">PING</xref> to test
bidirectional connectivity between two interfaces. For the purposes of
this document, these interfaces are called the probing and probed
interfaces. PING sends an <xref target="RFC0792">ICMP</xref> <xref target="RFC4443"/> Echo Request
message from the probing interface to
the probed interface. The probing interface resides on a probing node
while the probed interface resides on a probed node.</t>
      <t>If the probed interface receives the ICMP Echo Request message, it
returns an ICMP Echo Reply. When the probing interface receives the ICMP
Echo Reply, it has verified bidirectional connectivity between the
probing and probed interfaces. Specifically, it has verified that:</t>
      <ul spacing="normal">
        <li>
          <t>The probing node can reach the probed interface.</t>
        </li>
        <li>
          <t>The probed interface is active.</t>
        </li>
        <li>
          <t>The probed node can reach the probing interface.</t>
        </li>
        <li>
          <t>The probing interface is active.</t>
        </li>
      </ul>
      <t>This document describes a network diagnostic tool called PROBE. PROBE
is similar to PING in that it can be used to query the status of a
probed interface, but it differs from PING in that it does not require
bidirectional connectivity between the probing and probed interfaces.
Instead, PROBE requires bidirectional connectivity between the probing
interface and a proxy interface. The proxy interface can reside on the
same node as the probed interface, or it can reside on a node to which
the probed interface is directly connected. A list of use cases for
this characteristic can be found in <xref target="usecase"/> of this document.</t>
      <t>Like PING, PROBE executes on a probing node. It sends an ICMP
Extended Echo Request message from a local interface, called the probing
interface, to a proxy interface. The proxy interface resides on a proxy
node.</t>
      <t>The ICMP Extended Echo Request contains an ICMP Extension Structure
and the ICMP Extension Structure contains an Interface Identification
Object. The Interface Identification Object identifies the probed
interface. The probed interface can reside on or be directly connected to the
proxy node.</t>
      <t>When the proxy interface receives the ICMP Extended Echo Request, the
proxy node executes access control procedures. If access is granted, the
proxy node determines the status of the probed interface and returns an
ICMP Extended Echo Reply message. The ICMP Extended Echo Reply indicates
the status of the probed interface.</t>
      <t>If the probed interface resides on the proxy node, PROBE determines
the status of the probed interface as it would determine its
<xref target="RFC8343">oper-status</xref>.
If oper-status is equal to 'up' (1),
PROBE reports that the probed interface is active. Otherwise, PROBE
reports that the probed interface is inactive.</t>
      <t>If the probed interface resides on a node that is directly connected
to the proxy node, and the probed interface appears in the <xref target="RFC0826">IPv4
Address Resolution Protocol (ARP) table</xref> or <xref target="RFC4861">IPv6 Neighbor
Cache</xref>, PROBE reports
interface reachability. Otherwise, PROBE reports that the table entry
does not exist.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <ul spacing="normal">
          <li>
            <t>Probing interface: The interface that sends the ICMP Extended
Echo Request.</t>
          </li>
          <li>
            <t>Probing node: The node upon which the probing interface
resides.</t>
          </li>
          <li>
            <t>Proxy interface: The interface to which the ICMP Extended Echo
Request message is sent.</t>
          </li>
          <li>
            <t>Proxy node: The node upon which the proxy interface
resides.</t>
          </li>
          <li>
            <t>Probed interface: The interface whose status is being
queried.</t>
          </li>
          <li>
            <t>Probed node: The node upon which the probed interface resides.
If the proxy interface and the probed interface reside upon the
same node, the proxy node is also the probed node. Otherwise, the
proxy node is directly connected to the probed node.</t>
          </li>
        </ul>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="dontdothis">
        <name>A note on this document's use of ICMP Extensions</name>
        <t>This document defines a unique use of ICMP Extensions <xref target="RFC4884"/>.
Normally, ICMP Extensions are defined to start at a given point and
continue to the end of the packet.  However, when the extension
object is an Interface Identification Object as defined in this
memo, the extension structure (including the checksum) consists only
of that single ICMP Extension Object.  This is done to maintain
compatibility with the initial set of implementations of RFC8335,
which behave this way.
The ICMP Extension Structure checksum covers only the Interface
Identification Object.  Any data following it is not covered by
this checksum but is covered by the ICMP header checksum, which
protects the entire ICMP message (see <xref target="security"/> for further
discussion).
New uses of ICMP Extensions, and in fact
uses of Extended Echo using some object other than the Interface
Identification Object, <bcp14>SHOULD NOT</bcp14> behave this way.  Uses other than
defined in this memo <bcp14>SHOULD</bcp14> treat the ICMP Extension Structure as
extending to the end of the packet as <xref target="RFC4884"/> defines.</t>
      </section>
    </section>
    <section anchor="ExtendedEcho">
      <name>ICMP Extended Echo Request</name>
      <t>The ICMP Extended Echo Request message is defined for both ICMPv4 and
ICMPv6. Like any ICMP message, the ICMP Extended Echo Request message is
encapsulated in an IP header. The ICMPv4 version of the Extended Echo
Request message is encapsulated in an IPv4 header, while the ICMPv6
version is encapsulated in an IPv6 header.</t>
      <t><xref target="ICMPEchoFIG"/> depicts the ICMP Extended Echo Request
message.</t>
      <figure anchor="ICMPEchoFIG">
        <name>ICMP Extended Echo Request Message</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |     Code      |          Checksum             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Identifier          |Sequence Number|   Reserved  |L|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   ICMP Extension Structure
   +-+-+-+-+-
   |   [Data...]
]]></artwork>
      </figure>
      <t>IP Header fields:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address: The Source Address identifies the probing
interface. It <bcp14>MUST</bcp14> be a valid IPv4 or IPv6 unicast address.</t>
        </li>
        <li>
          <t>Destination Address: The Destination Address identifies the proxy
interface. It <bcp14>MUST</bcp14> be a unicast address.</t>
        </li>
      </ul>
      <t>ICMP fields:</t>
      <ul spacing="normal">
        <li>
          <t>Type: Extended Echo Request. The value for ICMPv4 is 42.
The value for ICMPv6 is 160.</t>
        </li>
        <li>
          <t>Code: <bcp14>MUST</bcp14> be set to 0 and <bcp14>MUST</bcp14> be ignored upon receipt.</t>
        </li>
        <li>
          <t>Checksum: For ICMPv4, see <xref target="RFC0792"/>. For ICMPv6, see <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Identifier: An Identifier to aid in matching Extended Echo
Replies to Extended Echo Requests. May be 0.</t>
        </li>
        <li>
          <t>Sequence Number: A Sequence Number to aid in matching Extended
Echo Replies to Extended Echo Requests. May be 0.</t>
        </li>
        <li>
          <t>Reserved: This field <bcp14>MUST</bcp14> be set to 0 and ignored upon
receipt.</t>
        </li>
        <li>
          <t>L (local): The L-bit is set if the probed interface resides on
the proxy node. The L-bit is clear if the probed interface is
directly connected to the proxy node.</t>
        </li>
        <li>
          <t>ICMP Extension Structure: The ICMP Extension Structure contains an
Interface Identification Object that identifies the probed interface.
The checksum in the ICMP Extension structure covers the Interface
Identification Object but not any (optional) data that follows.</t>
        </li>
      </ul>
      <t>Section 7 of <xref target="RFC4884"/> defines the ICMP Extension
Structure. As per RFC 4884, the Extension Structure contains exactly one
Extension Header followed by one or more objects. When applied to the
ICMP Extended Echo Request message, the Extension Object(s) define the
operation to perform. In the PROBE application, the ICMP Extension Structure <bcp14>MUST</bcp14>
contain exactly one instance of the <xref target="IntIdObj">Interface Identification Object</xref>,
and the ICMP Extension Structure
does not cover the rest of the packet; it ends at the end of the
single Interface Identification Object, and what follows is simply optional
data. The behavior when it contains a different Extension Object is not
defined by this memo. <xref target="I-D.ietf-6man-icmpv6-reflection"/> is an example
of a document which defines a different Extension Object and the corresponding
behavior.</t>
      <t>If the L-bit is set, the Interface Identification Object can identify
the probed interface by name, index, or address. If the L-bit is clear,
the Interface Identification Object <bcp14>MUST</bcp14> identify the probed interface
by address.</t>
      <t>If the Interface Identification Object identifies the probed
interface by address, that address can be a member of any address
family. For example, an ICMPv4 Extended Echo Request message can carry
an Interface Identification Object that identifies the probed interface
by IPv4, IPv6, or IEEE 802 address. Likewise, an ICMPv6 Extended Echo
Request message can carry an Interface Identification Object that
identifies the probed interface by IPv4, IPv6, or IEEE 802 address.</t>
      <t>The Interface Identification Object <bcp14>MAY</bcp14> be followed by an optional
data section, which is not interpreted but is simply present to be
copied to the ICMP Extended Echo Reply.</t>
      <t>The size of the resulting
packet <bcp14>MUST NOT</bcp14> exceed the outgoing interface MTU.</t>
      <section anchor="IntIdObj">
        <name>Interface Identification Object</name>
        <t>The Interface Identification Object identifies the probed interface
by name, index, or address. Like any other ICMP Extension Object, it
contains an Object Header and Object Payload. The Object Header
contains the following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Class-Num: Interface Identification Object. The value is 3.</t>
          </li>
          <li>
            <t>C-Type: Values are (1) Identifies Interface by Name, (2)
Identifies Interface by Index, and (3) Identifies Interface by
Address.</t>
          </li>
          <li>
            <t>Length: Length of the object, measured in octets, including the
Object Header and Object Payload.</t>
          </li>
        </ul>
        <t>If the Interface Identification Object identifies the probed
interface by name, the Object Payload <bcp14>MUST</bcp14> be the interface name as
defined in <xref target="RFC8343"/>. If the Object Payload would not otherwise
terminate on a 32-bit boundary, it <bcp14>MUST</bcp14> be padded with ASCII NUL
characters, adjusting the Length accordingly.</t>
        <t>If the Interface Identification Object identifies the probed
interface by index, the length is equal to 8 and the payload contains
the if-index <xref target="RFC8343"/>.</t>
        <t>If the Interface Identification Object identifies the probed
interface by address, the payload is as depicted in <xref target="addrFig"/>.</t>
        <figure anchor="addrFig">
          <name>Interface Identification Object - C-Type 3 Payload</name>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|            AFI                | Address Length|   Reserved    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Address   ....
]]></artwork>
        </figure>
        <t>Payload fields are defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Address Family Identifier (AFI): This 16-bit field identifies
the type of address represented by the Address field. All values
found in the IANA registry of Address Family Numbers (available
from <xref target="IANA.address-family-numbers"/>)
are valid in this field.</t>
          </li>
          <li>
            <t>Address Length: Number of significant bytes contained by the
Address field. (The Address field contains significant bytes and
padding bytes.)</t>
          </li>
          <li>
            <t>Reserved: This field <bcp14>MUST</bcp14> be set to 0 and ignored upon
receipt.</t>
          </li>
          <li>
            <t>Address: This variable-length field represents an address
associated with the probed interface. If the address field would
not otherwise terminate on a 32-bit boundary, it <bcp14>MUST</bcp14> be padded
with zeroes.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ExtendedEchoReply">
      <name>ICMP Extended Echo Reply</name>
      <t>The ICMP Extended Echo Reply message is defined for both ICMPv4 and
ICMPv6. Like any ICMP message, the ICMP Extended Echo Reply message is
encapsulated in an IP header. The ICMPv4 version of the Extended Echo
Reply message is encapsulated in an IPv4 header, while the ICMPv6
version is encapsulated in an IPv6 header.</t>
      <t><xref target="ICMPEchoReplyFIG"/> depicts the ICMP Extended Echo
Reply message.</t>
      <figure anchor="ICMPEchoReplyFIG">
        <name>ICMP Extended Echo Reply Message</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |     Code      |          Checksum             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Identifier          |Sequence Number|State|Res|A|4|6|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   ICMP Extension Structure
   +-+-+-+-+-
   |   [Data...]
]]></artwork>
      </figure>
      <t>IP Header fields:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address: Copied from the Destination Address field of the
invoking Extended Echo Request message.</t>
        </li>
        <li>
          <t>Destination Address: Copied from the Source Address field of the
invoking Extended Echo Request message.</t>
        </li>
      </ul>
      <t>ICMP fields:</t>
      <ul spacing="normal">
        <li>
          <t>Type: Extended Echo Reply. The value for ICMPv4 is 43.
The value for ICMPv6 is 161.</t>
        </li>
        <li>
          <t>Code: Values are (0) No Error, (1) Malformed Query, (2) No Such Interface,
(3) No Such Table Entry, and (4) Multiple Interfaces Satisfy Query.</t>
        </li>
        <li>
          <t>Checksum: For ICMPv4, see <xref target="RFC0792"/>. For ICMPv6, see <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Identifier: Copied from the Identifier field of the invoking
Extended Echo Request packet.</t>
        </li>
        <li>
          <t>Sequence Number: Copied from the Sequence Number field of the
invoking Extended Echo Request packet.</t>
        </li>
        <li>
          <t>State: If Code is not equal to 0, this field <bcp14>MUST</bcp14> be set to 0
and ignored upon receipt. Likewise, if the probed interface resides
upon the proxy node, this field <bcp14>MUST</bcp14> be set to 0 and ignored upon
receipt. Otherwise, this field reflects the state of the ARP table
or Neighbor Cache entry associated with the probed interface. Values
are (0) Reserved, (1) Incomplete, (2) Reachable, (3) Stale, (4) Delay,
(5) Probe, and (6) Failed.</t>
        </li>
        <li>
          <t>Res: This field <bcp14>MUST</bcp14> be set to 0 and ignored upon receipt.</t>
        </li>
        <li>
          <t>A (Active): The A-bit is set if the Code is equal to 0, the
probed interface resides on the proxy node, and the probed interface
is active. Otherwise, the A-bit is clear.</t>
        </li>
        <li>
          <t>4 (IPv4): The 4-bit is set if the A-bit is also set and IPv4 is
running on the probed interface. Otherwise, the 4-bit is clear.</t>
        </li>
        <li>
          <t>6 (IPv6): The 6-bit is set if the A-bit is also set and IPv6 is
running on the probed interface. Otherwise, the 6-bit is clear.</t>
        </li>
      </ul>
    </section>
    <section anchor="proc">
      <name>ICMP Message Processing</name>
      <t>When a node receives an ICMP Extended Echo Request message and any of
the following conditions apply, the node <bcp14>MUST</bcp14> silently discard the
incoming message:</t>
      <ul spacing="normal">
        <li>
          <t>The node does not recognize ICMP Extended Echo Request
messages.</t>
        </li>
        <li>
          <t>The node has not explicitly enabled ICMP Extended Echo
functionality.</t>
        </li>
        <li>
          <t>The incoming ICMP Extend Echo Request carries a Source Address
that is not explicitly authorized for the L-bit setting of the
incoming ICMP Extended Echo Request.</t>
        </li>
        <li>
          <t>The incoming ICMP Extend Echo Request carries a Source Address
that is not explicitly authorized for the incoming ICMP Extended
Echo Request type (i.e., by name, by if-index, or by address).</t>
        </li>
        <li>
          <t>The Source Address of the incoming message is not a unicast
address.</t>
        </li>
        <li>
          <t>The Destination Address of the incoming message is a multicast
address.</t>
        </li>
      </ul>
      <t>Otherwise, when a node receives an ICMPv4 Extended Echo Request, it
<bcp14>MUST</bcp14> format the IPv4 header of an ICMPv4 Extended Echo Reply as follows:</t>
      <ul spacing="normal">
        <li>
          <t>TTL is 255</t>
        </li>
        <li>
          <t>Protocol is ICMP</t>
        </li>
        <li>
          <t>Indicate that the packet is not source fragmented and must not be on-path fragmented with the following values:  </t>
          <ul spacing="normal">
            <li>
              <t>Don't Fragment (DF) flag is 1</t>
            </li>
            <li>
              <t>More Fragments flag is 0</t>
            </li>
            <li>
              <t>Fragment Offset is 0</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>When a node receives an ICMPv6 Extended Echo Request, it <bcp14>MUST</bcp14>
format the IPv6 header of an ICMPv6 Extended Echo Reply as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Hop Limit is 255</t>
        </li>
        <li>
          <t>Next Header is ICMPv6</t>
        </li>
        <li>
          <t>Indicate that the packet is not source fragmented  </t>
          <ul spacing="normal">
            <li>
              <t>Do not include an IPv6 Fragmentation Header</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>In either case, the responding node <bcp14>MUST</bcp14> do the following:</t>
      <ul spacing="normal">
        <li>
          <t>Copy the Source Address from the Extended Echo Request message to
the Destination Address of the Extended Echo Reply.</t>
        </li>
        <li>
          <t>Copy the Destination Address from the Extended Echo Request
message to the Source Address of the Extended Echo Reply.</t>
        </li>
        <li>
          <t>Set the DiffServ codepoint to <xref target="RFC4594">CS0</xref>.</t>
        </li>
        <li>
          <t>Set the ICMP Type to Extended Echo Reply.</t>
        </li>
        <li>
          <t>Copy the Identifier from the Extended Echo Request message to the
Extended Echo Reply.</t>
        </li>
        <li>
          <t>Copy the Sequence Number from the Extended Echo Request message
to the Extended Echo Reply.</t>
        </li>
        <li>
          <t>Set the Code field as described in <xref target="code"/>.</t>
        </li>
        <li>
          <t>Set the State field to 0.</t>
        </li>
        <li>
          <t>Clear the A-bit, the 4-bit, and the 6-bit.</t>
        </li>
        <li>
          <t>If (1) the Code Field is equal to (0) No Error, (2) the L-bit is set,
and (3) the probed interface is active, set the A-bit. Also, set the
4-bit and the 6-bit as appropriate.</t>
        </li>
        <li>
          <t>If the Code field is equal to (0) No Error and the L-bit is
clear, then set the State field to reflect the state of the ARP table or
Neighbor Cache entry that represents the probed interface.</t>
        </li>
        <li>
          <t>Copy the ICMP Extension Structure, ICMP Extension Object, and Data
(if any) from the Extended Echo Request message.</t>
        </li>
        <li>
          <t>Set the Checksum appropriately.</t>
        </li>
        <li>
          <t>Forward the ICMP Extended Echo Reply to its destination. The size of the
resulting packet <bcp14>MUST NOT</bcp14> exceed the outgoing interface MTU.</t>
        </li>
      </ul>
      <section anchor="code">
        <name>Code Field Processing</name>
        <t>The Code field <bcp14>MUST</bcp14> be set to (1) Malformed Query if any of the
following conditions apply:</t>
        <ul spacing="normal">
          <li>
            <t>The ICMP Extended Echo Request does not include an ICMP
Extension Structure.</t>
          </li>
          <li>
            <t>The ICMP Extension Structure does not include exactly one
Interface Identification Object.</t>
          </li>
          <li>
            <t>The ICMP Extension Structure checksum is 0 or incorrect.</t>
          </li>
          <li>
            <t>The L-bit is clear and the Interface Identification Object
identifies the probed interface by name or if-index.</t>
          </li>
          <li>
            <t>The query is otherwise malformed.</t>
          </li>
        </ul>
        <t>The Code field <bcp14>MUST</bcp14> be set to (2) No Such Interface if the
L-bit is set and the ICMP Extension Structure does not identify an
interface that resides on the proxy node.</t>
        <t>The Code field <bcp14>MUST</bcp14> be set to (3) No Such Table Entry if the L-bit
is clear and the address found in the Interface Identification Object
does not appear in the IPv4 Address Resolution Protocol (ARP) table or
the IPv6 Neighbor Cache.</t>
        <t>The Code field <bcp14>MUST</bcp14> be set to (4) Multiple Interfaces Satisfy Query
if any of the following conditions apply:</t>
        <ul spacing="normal">
          <li>
            <t>The L-bit is set and the ICMP Extension Structure identifies
more than one interface that resides in the proxy node.</t>
          </li>
          <li>
            <t>The L-bit is clear and the address found in the Interface
Identification Object maps to multiple IPv4 ARP or IPv6 Neighbor
Cache entries.</t>
          </li>
        </ul>
        <t>Otherwise, the Code field <bcp14>MUST</bcp14> be set to (0) No Error.</t>
      </section>
    </section>
    <section anchor="usecase">
      <name>Use Cases</name>
      <t>In the scenarios listed below, network operators can use PROBE to
determine the status of a probed interface but cannot use PING for the
same purpose. In all scenarios, assume bidirectional connectivity
between the probing and proxy interfaces. However, bidirectional
connectivity between the probing and probed interfaces is lacking.</t>
      <ul spacing="normal">
        <li>
          <t>The probed interface is unnumbered.</t>
        </li>
        <li>
          <t>The probing and probed interfaces are not directly connected to
one another. The probed interface has an IPv6 link-local address
but does not have a more globally scoped address.</t>
        </li>
        <li>
          <t>The probing interface runs IPv4 only while the probed interface
runs IPv6 only.</t>
        </li>
        <li>
          <t>The probing interface runs IPv6 only while the probed interface
runs IPv4 only.</t>
        </li>
        <li>
          <t>For lack of a route, the probing node cannot reach the probed
interface.</t>
        </li>
      </ul>
      <section anchor="caveats">
        <name>Caveats</name>
        <t>A limitation of PROBE is that if probing a link-local destination
with the L-bit clear, and the same link-local address is used by
multiple neighbors, you may get one of three code values in response:</t>
        <ul spacing="normal">
          <li>
            <t>No Such Table Entry, if none of the neighbors are currently in
the table.</t>
          </li>
          <li>
            <t>No Error, if one neighbor is currently in the table, but there is
no indication as to which neighbor.</t>
          </li>
          <li>
            <t>Multiple Interfaces Satisfy Query, if more than one such neighbor
is in the table.</t>
          </li>
        </ul>
        <t>Similarly, when identifying a local interface by link-local address
(the L-bit is set), and the same link-local address is assigned to
multiple interfaces, you will get a response with the code Multiple
Interfaces Satisfy Query, with no indication which interface is
active or able to pass traffic.</t>
      </section>
    </section>
    <section anchor="updates-to-rfc-4884">
      <name>Updates to RFC 4884</name>
      <t>Section 4.6 of <xref target="RFC4884"/> provides a list of extensible ICMP messages
(i.e., messages that can carry the ICMP Extension Structure). This
document adds the ICMP Extended Echo Request message and the ICMP
Extended Echo Reply message to that list.</t>
    </section>
    <section anchor="change-history">
      <name>Change History</name>
      <section anchor="changes-from-rfc-8335">
        <name>Changes from RFC 8335</name>
        <t>This document updates <xref target="RFC8335"/> to clarify the handling of
extra data beyond the ICMP Extension Structure, that data is
echoed in the response packet, and checksum handling in the ICMP
Extension Structure.</t>
        <t>Specifically,</t>
        <ul spacing="normal">
          <li>
            <t>Updated <xref target="ICMPEchoFIG"/> to reflect the presence of the ICMP Extension Object
and additional data.</t>
          </li>
          <li>
            <t>Updated <xref target="ExtendedEcho"/> to mention the ICMP Extension Structure checksum,
and extra verbosity about how the Extension Structure does not cover the
rest of the packet.</t>
          </li>
          <li>
            <t>Updated <xref target="ICMPEchoReplyFIG"/> to reflect the presence of the ICMP Extension
Structure and additional data.</t>
          </li>
          <li>
            <t>Added a step in <xref target="proc"/> about copying data from the request to the
response.</t>
          </li>
          <li>
            <t>Added a step in <xref target="code"/> about validating the ICMP Extension Structure checksum.</t>
          </li>
          <li>
            <t>Added section <xref target="applicationDisplay"/> to suggest human-readable display
of PROBE responses</t>
          </li>
          <li>
            <t>Clarified in <xref target="IntIdObj"/> that the length of an ifName Object is adjusted
when padding is added.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-from-draft-fenner-intarea-probe-clarification-00">
        <name>Changes from draft-fenner-intarea-probe-clarification-00</name>
        <ul spacing="normal">
          <li>
            <t>Changed "NULL" to "NUL" when referring to the ASCII control character,
per RFC20.</t>
          </li>
          <li>
            <t>Consistently refer to interface name and index using their yang names,
not SNMP names.</t>
          </li>
          <li>
            <t>Added [] around the Data following the ICMP Extension Structure in <xref target="ICMPEchoFIG"/>
and <xref target="ICMPEchoReplyFIG"/> to indicate that it is optional.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-from-draft-fenner-intarea-probe-clarification-01">
        <name>Changes from draft-fenner-intarea-probe-clarification-01</name>
        <ul spacing="normal">
          <li>
            <t>Updated the section on ICMP Extension header format to say that different
ICMP Extension Option headers may be present, and if they are, the
mechanism is not as specified in this memo.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-from-draft-fenner-intarea-probe-clarification-02">
        <name>Changes from draft-fenner-intarea-probe-clarification-02</name>
        <ul spacing="normal">
          <li>
            <t>Made a stronger statement about not copying this behavior in
<xref target="dontdothis"/></t>
          </li>
          <li>
            <t>Renamed to rfc8335bis and made WG document</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-from-draft-int-intarea-rfc8335bis-00">
        <name>Changes from draft-int-intarea-rfc8335bis-00</name>
        <ul spacing="normal">
          <li>
            <t>Changed "For the operations in this memo" to "In the PROBE application" to
better align with draft-ietf-6man-icmpv6-reflection</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-from-draft-int-intarea-rfc8335bis-01">
        <name>Changes from draft-int-intarea-rfc8335bis-01</name>
        <ul spacing="normal">
          <li>
            <t>None</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-from-draft-int-intarea-rfc8335bis-02">
        <name>Changes from draft-int-intarea-rfc8335bis-02</name>
        <ul spacing="normal">
          <li>
            <t>Added reference to draft-ietf-6man-icmpv6-reflection</t>
          </li>
          <li>
            <t>Updated some "RFC NNN" references to bibliography references</t>
          </li>
          <li>
            <t>Add <bcp14>MUST NOT</bcp14> exceed MTU.</t>
          </li>
          <li>
            <t>Added details of IPv4/IPv6 headers and avoidance of fragmentation to <xref target="proc"/></t>
          </li>
          <li>
            <t>Added IP address and interface index considerations to <xref target="security"/></t>
          </li>
          <li>
            <t>Add new <xref target="manageability"/> (Manageability Considerations) immediately
before <xref target="security"/>, per RFC 5706 Section 4.3 guidance.</t>
          </li>
          <li>
            <t>Add to <xref target="security"/> details of Amplification risk, Covert channel potential,
On-path attacker modification, ICMP header checksum scope.</t>
          </li>
          <li>
            <t>Broaden VPN isolation language to cover network instances
and logical network elements.</t>
          </li>
          <li>
            <t>Clarify the wording of <xref target="dontdothis"/>, including further wording about
the checksum coverage.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>IANA is requested to update the references for the below
actions from <xref target="RFC8335"/> to refer to this document.</t>
      <t>IANA has performed the following actions:</t>
      <ul spacing="normal">
        <li>
          <t>Added the following to the "ICMP Type Numbers" registry:  </t>
          <artwork><![CDATA[
   42 Extended Echo Request
]]></artwork>
          <t>
Added the following to the "Type 42 - Extended Echo Request"
subregistry:  </t>
          <artwork><![CDATA[
   (0) No Error
]]></artwork>
        </li>
        <li>
          <t>Added the following to the "ICMPv6 'type' Numbers" registry:  </t>
          <artwork><![CDATA[
   160 Extended Echo Request

   As ICMPv6 distinguishes between informational and error
   messages, and this is an informational message, the value has
   been assigned from the range 128-255.
]]></artwork>
          <t>
Added the following to the "Type 160 - Extended Echo Request"
subregistry:  </t>
          <artwork><![CDATA[
   (0) No Error
]]></artwork>
        </li>
        <li>
          <t>Added the following to the "ICMP Type Numbers" registry:  </t>
          <artwork><![CDATA[
   43 Extended Echo Reply
]]></artwork>
          <t>
Added the following to the "Type 43 - Extended Echo Reply"
subregistry:  </t>
          <artwork><![CDATA[
   (0) No Error
   (1) Malformed Query
   (2) No Such Interface
   (3) No Such Table Entry
   (4) Multiple Interfaces Satisfy Query
]]></artwork>
        </li>
        <li>
          <t>Added the following to the "ICMPv6 'type' Numbers" registry:  </t>
          <artwork><![CDATA[
   161 Extended Echo Reply

   As ICMPv6 distinguishes between informational and error
   messages, and this is an informational message, the value has
   been assigned from the range 128-255.
]]></artwork>
          <t>
Added the following to the "Type 161 - Extended Echo Reply"
subregistry:  </t>
          <artwork><![CDATA[
   (0) No Error
   (1) Malformed Query
   (2) No Such Interface
   (3) No Such Table Entry
   (4) Multiple Interfaces Satisfy Query
]]></artwork>
        </li>
        <li>
          <t>Added the following to the "ICMP Extension Object Classes and
Class Sub-types" registry:  </t>
          <artwork><![CDATA[
   (3) Interface Identification Object
]]></artwork>
          <t>
Added the following C-types to the "Sub-types - Class 3 -
Interface Identification Object" subregistry:  </t>
          <artwork><![CDATA[
   (0) Reserved
   (1) Identifies Interface by Name
   (2) Identifies Interface by Index
   (3) Identifies Interface by Address
]]></artwork>
          <t>
C-Type values are assigned on a First Come First Serve (FCFS)
basis with a range of 0-255.</t>
        </li>
      </ul>
      <t>All codes mentioned above are assigned on an FCFS basis with a range
of 0-255.</t>
    </section>
    <section anchor="manageability">
      <name>Manageability Considerations</name>
      <t>This section discusses manageability aspects of PROBE.
PROBE is an on-demand diagnostic tool analogous to PING.
It does not run autonomously, does not maintain
persistent protocol state, and does not require a formal
information model or data-model definition.  The subsections below
address the aspects of <xref target="RFC5706"/> that are applicable to PROBE.</t>
      <section anchor="control-of-function-and-policy">
        <name>Control of Function and Policy</name>
        <t>Nodes that support ICMP Extended Echo functionality <bcp14>MUST</bcp14> support
the configuration parameters specified in <xref target="security"/>.  In
particular, an operator <bcp14>MUST</bcp14> be able to:</t>
        <ul spacing="normal">
          <li>
            <t>Enable or disable Extended Echo functionality on the node.  By
default, ICMP Extended Echo functionality is disabled.</t>
          </li>
          <li>
            <t>Define the permitted L-bit settings.  By default, the option to
set the L-bit is enabled and the option to clear the L-bit is
disabled.</t>
          </li>
          <li>
            <t>Define the enabled query types (by name, by index, or by
address).  By default, all query types are disabled.</t>
          </li>
          <li>
            <t>For each enabled query type, control the source prefixes from
which ICMP Extended Echo Requests are permitted.</t>
          </li>
          <li>
            <t>Control acceptance of ICMP messages on a per-interface basis.</t>
          </li>
        </ul>
        <t>These parameters are local to each node and take effect
immediately; no protocol restart or network-wide coordination is
required.  An operator must explicitly enable the feature and
configure authorized source prefixes before a node will respond
to any Extended Echo Request.</t>
        <t>No MIB module or YANG data model is defined for these parameters.
A YANG model may be defined in a separate document in the future.</t>
      </section>
      <section anchor="monitoring-and-verifying-operation">
        <name>Monitoring and Verifying Operation</name>
        <t>Correct operation of PROBE can be verified by sending an ICMP
Extended Echo Request to a proxy node and examining the Code field
of the ICMP Extended Echo Reply (<xref target="code"/>).  A Code of 0 (No
Error) with the expected interface status confirms correct
operation.  Non-zero Code values indicate specific error conditions
enumerated in <xref target="code"/>.</t>
        <t>The PROBE application described in <xref target="application"/> sends iterative
queries and reports per-query results including round-trip time.
This round-trip time reflects the path latency between the probing
node and the proxy node, not a property of the probed interface
itself.</t>
        <t>Implementations <bcp14>MAY</bcp14> log received Extended Echo Requests at a debug
level and <bcp14>MAY</bcp14> maintain counters of received, accepted, and
discarded Extended Echo Requests as part of their general ICMP
statistics, to assist operators in troubleshooting access-control
configuration and detecting unexpected traffic.</t>
      </section>
      <section anchor="deployment-and-backward-compatibility">
        <name>Deployment and Backward Compatibility</name>
        <t>PROBE is deployed on individual nodes and invoked on demand by
operators or network management applications.  It does not require
network-wide signaling, discovery, or coordination.  Operators
deploying PROBE <bcp14>SHOULD</bcp14>:</t>
        <ul spacing="normal">
          <li>
            <t>Enable Extended Echo functionality only on nodes that require
diagnostic access.</t>
          </li>
          <li>
            <t>Restrict permitted source prefixes to authorized management
networks.</t>
          </li>
          <li>
            <t>Apply rate-limiting to Extended Echo Requests consistent with
existing ICMP rate-limiting policies.</t>
          </li>
        </ul>
        <t>This document obsoletes <xref target="RFC8335"/>.  All known implementations of
<xref target="RFC8335"/> are compatible with this document.  The differences
between this document and <xref target="RFC8335"/> are clarifications of the
packet format and processing rules and not changes to on-the-wire
behavior.  Nodes implementing this document interoperate with
nodes implementing <xref target="RFC8335"/> without any transition mechanism or
behavioral migration.</t>
      </section>
      <section anchor="impact-on-network-operation">
        <name>Impact on Network Operation</name>
        <t>Each PROBE invocation generates one ICMP Extended Echo Request and
one ICMP Extended Echo Reply.  Each query is independent; there is
no persistent session or periodic message exchange.  The
processing cost on the proxy node is comparable to that of a
standard ICMP Echo Request.</t>
        <t>Frequent automated use of PROBE (e.g., by a management
application polling many interfaces) could increase ICMP traffic
on the network.  Operators <bcp14>SHOULD</bcp14> apply rate-limiting at the
responder (<xref target="security"/>) consistent with their existing ICMP
rate-limiting policies to bound this load.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The following are legitimate uses of PROBE:</t>
      <ul spacing="normal">
        <li>
          <t>to determine the operational status of an interface.</t>
        </li>
        <li>
          <t>to determine which protocols (e.g., IPv4 or IPv6) are active on an
interface.</t>
        </li>
      </ul>
      <t>However, malicious parties can use PROBE to obtain additional
information. For example, a malicious party can use PROBE to discover
interface names. Having discovered an interface name, the malicious
party may be able to infer additional information. Additional
information may include:</t>
      <ul spacing="normal">
        <li>
          <t>interface bandwidth</t>
        </li>
        <li>
          <t>the type of device that supports the interface (e.g., vendor
identity)</t>
        </li>
        <li>
          <t>the operating system version that the above-mentioned device
executes</t>
        </li>
      </ul>
      <t>Addresses and interface index values can also give away information
that might not want to be shared. For example, a malicious party can
use PROBE to determine that a given IP address is assigned to any
interface on the probed node, or if interface index values are
assigned densely, it can determine how many interfaces exist on the
probed node.</t>
      <t>Understanding these risks, network operators establish policies that
restrict access to ICMP Extended Echo functionality. In order to enforce
these policies, nodes that support ICMP Extended Echo functionality <bcp14>MUST</bcp14>
support the following configuration options:</t>
      <ul spacing="normal">
        <li>
          <t>Enable/disable ICMP Extended Echo functionality. By default, ICMP
Extend Echo functionality is disabled.</t>
        </li>
        <li>
          <t>Define enabled L-bit settings. By default, the option to set the L-bit
is enabled and the option to clear the L-bit is disabled.</t>
        </li>
        <li>
          <t>Define enabled query types (i.e., by name, by index, or by address);
by default, all query types are disabled.</t>
        </li>
        <li>
          <t>For each enabled query type, define the prefixes from which ICMP
Extended Echo Request messages are permitted.</t>
        </li>
        <li>
          <t>For each interface, determine whether ICMP Echo Request messages
are accepted.</t>
        </li>
      </ul>
      <t>When a node receives an ICMP Extended Echo Request message that it is
not configured to support, it <bcp14>MUST</bcp14> silently discard the message. See <xref target="proc"/> for details.</t>
      <t>PROBE must not leak information across network instance boundaries.
Therefore, when a node receives an ICMP Extended Echo Request and
the proxy interface and the probed interface are in different
Virtual Private Networks (VPNs), network instances <xref target="RFC8529"/>, or
logical network elements <xref target="RFC8530"/>, the node <bcp14>MUST</bcp14> return an ICMP
Extended Echo Reply with error code equal to (2) No Such Interface.</t>
      <t>In order to protect local resources, implementations <bcp14>SHOULD</bcp14>
rate-limit incoming ICMP Extended Echo Request messages.</t>
      <t>PROBE does not present a significant amplification risk.  The ICMP
Extended Echo Reply is not meaningfully larger than the corresponding
ICMP Extended Echo Request; therefore, PROBE is not a useful
amplification vector.</t>
      <t>As with any ICMP message that carries an opaque data payload, the
optional data field could theoretically be used as a covert channel.
The rate-limiting recommended above bounds the throughput of any such
channel.</t>
      <t>An on-path attacker can modify ICMP Extended Echo Request or Reply
messages to return incorrect interface status information.  This
risk is shared with all ICMP messages and is not unique to PROBE.
When integrity protection of PROBE messages is required, IPsec
<xref target="RFC4301"/> <bcp14>SHOULD</bcp14> be used.</t>
      <t>The ICMP header checksum provides integrity protection for the
entire ICMP message, including any data following the ICMP Extension
Structure.  However, this is a non-cryptographic checksum intended
for error detection, not protection against intentional
modification.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC0826">
          <front>
            <title>An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware</title>
            <author fullname="D. Plummer" initials="D." surname="Plummer"/>
            <date month="November" year="1982"/>
            <abstract>
              <t>The purpose of this RFC is to present a method of Converting Protocol Addresses (e.g., IP addresses) to Local Network Addresses (e.g., Ethernet addresses). This is an issue of general concern in the ARPA Internet Community at this time. The method proposed here is presented for your consideration and comment. This is not the specification of an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="37"/>
          <seriesInfo name="RFC" value="826"/>
          <seriesInfo name="DOI" value="10.17487/RFC0826"/>
        </reference>
        <reference anchor="RFC0792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC8335">
          <front>
            <title>PROBE: A Utility for Probing Interfaces</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="R. Thomas" initials="R." surname="Thomas"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <author fullname="C. Lenart" initials="C." surname="Lenart"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document describes a network diagnostic tool called PROBE. PROBE is similar to PING in that it can be used to query the status of a probed interface, but it differs from PING in that it does not require bidirectional connectivity between the probing and probed interfaces. Instead, PROBE requires bidirectional connectivity between the probing interface and a proxy interface. The proxy interface can reside on the same node as the probed interface, or it can reside on a node to which the probed interface is directly connected. This document updates RFC 4884.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8335"/>
          <seriesInfo name="DOI" value="10.17487/RFC8335"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-6man-icmpv6-reflection">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) Reflection</title>
            <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
              <organization>Huawei</organization>
            </author>
            <author fullname="hexiaoming" initials="X." surname="hexiaoming">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Tianran Zhou" initials="T." surname="Zhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="Ron Bonica" initials="R. P." surname="Bonica">
              <organization>HPE</organization>
            </author>
            <author fullname="Xiao Min" initials="X." surname="Min">
              <organization>ZTE Corp.</organization>
            </author>
            <date day="15" month="December" year="2025"/>
            <abstract>
              <t>   This document specifies the ICMPv6 Reflection utility.  The ICMPv6
   Reflection utility is a diagnostic tool, similar to Ping and the
   ICMPv6 PROBE utility.  It is similar to Ping and PROBE in that it
   relies on a stateless message exchange between a probing node and a
   probed node.  The probing node sends a request to the probed node and
   the probed node responds to the request.

   The ICMPv6 Reflection utility differs from Ping and PROBE because, in
   the ICMPv6 Reflection utility, the probing node requests a snapshot
   of the message that it sent, as it was when arrived at the probed
   node.  The probed node returns the requested snapshot.

   The ICMPv6 Reflection utility is useful because it can allow the user
   to see how the network modified the request as it traveled from the
   probing node to the probed node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6man-icmpv6-reflection-19"/>
        </reference>
        <reference anchor="RFC2151">
          <front>
            <title>A Primer On Internet and TCP/IP Tools and Utilities</title>
            <author fullname="G. Kessler" initials="G." surname="Kessler"/>
            <author fullname="S. Shepard" initials="S." surname="Shepard"/>
            <date month="June" year="1997"/>
            <abstract>
              <t>This memo is an introductory guide to many of the most commonly- available TCP/IP and Internet tools and utilities. It also describes discussion lists accessible from the Internet, ways to obtain Internet and TCP/IP documents, and some resources that help users weave their way through the Internet. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="30"/>
          <seriesInfo name="RFC" value="2151"/>
          <seriesInfo name="DOI" value="10.17487/RFC2151"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4594">
          <front>
            <title>Configuration Guidelines for DiffServ Service Classes</title>
            <author fullname="J. Babiarz" initials="J." surname="Babiarz"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This document describes service classes configured with Diffserv and recommends how they can be used and how to construct them using Differentiated Services Code Points (DSCPs), traffic conditioners, Per-Hop Behaviors (PHBs), and Active Queue Management (AQM) mechanisms. There is no intrinsic requirement that particular DSCPs, traffic conditioners, PHBs, and AQM be used for a certain service class, but as a policy and for interoperability it is useful to apply them consistently. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4594"/>
          <seriesInfo name="DOI" value="10.17487/RFC4594"/>
        </reference>
        <reference anchor="RFC8529">
          <front>
            <title>YANG Data Model for Network Instances</title>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a network instance module. This module can be used to manage the virtual resource partitioning that may be present on a network device. Examples of common industry terms for virtual resource partitioning are VPN Routing and Forwarding (VRF) instances and Virtual Switch Instances (VSIs).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8529"/>
          <seriesInfo name="DOI" value="10.17487/RFC8529"/>
        </reference>
        <reference anchor="RFC8530">
          <front>
            <title>YANG Model for Logical Network Elements</title>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a logical network element (LNE) YANG module that is compliant with the Network Management Datastore Architecture (NMDA). This module can be used to manage the logical resource partitioning that may be present on a network device. Examples of common industry terms for logical resource partitioning are logical systems or logical routers. The YANG model in this document conforms with NMDA as defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8530"/>
          <seriesInfo name="DOI" value="10.17487/RFC8530"/>
        </reference>
        <reference anchor="RFC5706">
          <front>
            <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="November" year="2009"/>
            <abstract>
              <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5706"/>
          <seriesInfo name="DOI" value="10.17487/RFC5706"/>
        </reference>
        <reference anchor="IANA.address-family-numbers" target="https://www.iana.org/assignments/address-family-numbers">
          <front>
            <title>Address Family Numbers</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 1014?>

<section anchor="application">
      <name>The PROBE Application</name>
      <t>The PROBE application accepts input parameters, sets a counter, and
enters a loop to be exited when the counter is equal to 0. On each
iteration of the loop, PROBE emits an ICMP Extended Echo Request,
decrements the counter, sets a timer, and waits. The ICMP Extended Echo
Request includes an Identifier and a Sequence Number.</t>
      <t>If an ICMP Extended Echo Reply carrying the same Identifier and
Sequence Number arrives, PROBE relays information returned by that
message to its user. However, on each iteration of the loop, PROBE waits
for the timer to expire regardless of whether an Extended Echo Reply
message arrives.</t>
      <t>PROBE accepts the following parameters:</t>
      <ul spacing="normal">
        <li>
          <t>Count</t>
        </li>
        <li>
          <t>Wait</t>
        </li>
        <li>
          <t>Probing Interface Address</t>
        </li>
        <li>
          <t>Hop Count</t>
        </li>
        <li>
          <t>Proxy Interface Address</t>
        </li>
        <li>
          <t>Local</t>
        </li>
        <li>
          <t>Probed Interface Identifier</t>
        </li>
      </ul>
      <t>Count is a positive integer whose default value is 3. Count
determines the number of times that PROBE iterates through the
above-mentioned loop.</t>
      <t>Wait is a positive integer whose minimum and default values are 1.
Wait determines the duration of the above-mentioned timer, measured in
seconds.</t>
      <t>Probing Interface Address specifies the Source Address of the ICMP
Extended Echo Request. The Probing Interface Address <bcp14>MUST</bcp14> be a unicast
address and <bcp14>MUST</bcp14> identify an interface that resides on the probing
node.</t>
      <t>The Proxy Interface Address identifies the interface to which the
ICMP Extended Echo Request message is sent. It must be an IPv4 or IPv6
unicast address. If it is an IPv4 address, PROBE emits an ICMPv4 message. If it
is an IPv6 address, PROBE emits an ICMPv6 message.</t>
      <t>Local is a boolean value. It is TRUE if the proxy and probed
interfaces both reside on the same node. Otherwise, it is FALSE.</t>
      <t>The Probed Interface Identifier identifies the probed interface. It
is one of the following:</t>
      <ul spacing="normal">
        <li>
          <t>an interface name;</t>
        </li>
        <li>
          <t>an address from any address family (e.g., IPv4, IPv6, IEEE 802,
48-bit MAC, or 64-bit MAC); or</t>
        </li>
        <li>
          <t>an if-index.</t>
        </li>
      </ul>
      <t>If the Probed Interface Identifier is an address, it does not need to
be of the same address family as the proxy interface address. For
example, PROBE accepts an IPv4 Proxy Interface Address and an IPv6
Probed Interface Identifier.</t>
      <section anchor="applicationDisplay">
        <name>Information Display</name>
        <t>For the PING application, the primary available piece of information
is the fact that we received an ICMP Echo Reply.  Therefore, the
appropriate information to display is all of the available information
about the received reply, e.g., size, ttl, etc.  However, with
PROBE, the primary piece of information is the reported status of
the probed interface: the code, status, A, 4, and 6 fields.
It's appropriate to convert the combination of the returned values
into a "human-readable" response.</t>
        <t>For example, an application may perform these steps:</t>
        <ul spacing="normal">
          <li>
            <t>If the code field is non-zero, print the code value as described
in <xref target="ExtendedEchoReply"/>.</t>
          </li>
          <li>
            <t>If the code field is zero, then if the L field sent is zero,
print the state value as described in <xref target="ExtendedEchoReply"/>.</t>
          </li>
          <li>
            <t>Otherwise, the L field sent is 1; print the state represented
by the A, 4, and 6
bits.  Sample textual translations for these bits are shown
in <xref target="BitCombinationTable"/>.</t>
          </li>
        </ul>
        <table anchor="BitCombinationTable">
          <name>Sample translations for bit settings</name>
          <thead>
            <tr>
              <th align="left">A</th>
              <th align="left">4</th>
              <th align="left">6</th>
              <th align="left">Text</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">0</td>
              <td align="left">0</td>
              <td align="left">Interface inactive</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">0</td>
              <td align="left">0</td>
              <td align="left">Interface active, with no ipv4 or ipv6 running</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">0</td>
              <td align="left">1</td>
              <td align="left">Interface active, with ipv6 running</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">1</td>
              <td align="left">0</td>
              <td align="left">Interface active, with ipv4 running</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">1</td>
              <td align="left">1</td>
              <td align="left">Interface active, with ipv4 and ipv6 running</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section numbered="false" anchor="Acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Sowmini Varadhan, Jeff Haas, Carlos Pignataro, Jonathan
Looney, Dave Thaler, Mikio Hara, Joel Halpern, Yaron Sheffer, Stefan
Winter, Jean-Michel Combes, Amanda Barber, Joe Touch, Sue Hares,
Xaio Min, Tony Przygienda, Nick Buraglio and Tal Mizrahi for their
thoughtful review of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1923YbR5Lge31FLvUgsheAebdMz8UQJdn0khRHpNzbx+OH
BJAAqlmowtSFFCxpv2W/Zb5s4paXKlQBlO3uM2e3NdPHRFVlZmRkZGTcs9/v
Rw9n6iiaZONUL8yZmuR6WvZjU077cVrq3Oh+Ph2/ODo6GcVFf/8oGuvyTBXl
JKqWE12a4kw9P37x4vh5lI2KLDH8BL9/HhUlNF+cqYvXd2+iZXwWKVVmY3i9
MsVz/pEtlnpc1h5NzLKcw5Mj+R2nE5MGnxSrRW6mRfAgy8v6E+h2AW2CJ3Ga
xKmpfVEfuKhG/lmaPY/KuEywwc27ty9fn6mhel/GSVyu1DTL1U2ejeJ0pi7S
0uRTPcY+9GiUG0AmNYgQc2dqhz5ITalepzMAwOTY6raUP77Ps2q5Ez3OzgDA
so9tovtH6AJeRg8mrQzibIZfhX0N4bsdRM5qCRDu2J8LHSfw0/b0HS7iIMtn
+G4Wl/NqBG+nJk1N/tUSJmD640Tn8TSGJY2zFD9LcEUBAzvzslwWZ199xZ8P
uPkgztoafrWRZgbzcpHsRJGuynmWn0V9xYT2Mk4S9Ya6h4EBTMBxHhelVtem
fMzy+wJXBRbWADwnxydHgC2jYfILwN1Yqxud3z/qFa4lrMqZutUwtDoHwDSt
7wQX75uT/ZNjXN7czADSM3WukxgWMI35oyotc2j7/nYIPw0jkKf8Hfwnz9IB
EAU2z5AWzCQus9zN4F2WqpdZCsDYCfxYpfHS5G0zODw8OVDnWb7McsAxQa9e
5fGDcRP4ARZ3kqUe+MP9g68PQuB/inMgog2g5yMC57u/MhwDIBYPrflrrO7m
2UIX2/H9fZKNdKLuzHhOoDogX+p0ppMsNwFY/0vnqS71fYD3k9P9g/2j5yGg
F+mEILegAjiDksD5ThMchGoL7Y8mVZdxep89OOR+n2WzxARAHpzu7wM5LOdA
nEAZuVmjiSscXMcpYM48dlMBk8rx/nEd4jpVVHm++m5GMNQgPZ8D9OrSpDov
Lag/AYn+Skvpl39//0BdZtUEegc6gCFWa+AOi/moytOuFbdEcfx1N5hjhGaQ
EDTfPTAYNXCvsjn8dwKEW431RMdu873NYWk9Nb7DXVCoo5P9/f1wtDfw2dj4
ARfc32Bk+/suo45o0DTLF8AiHoiNvXtzjgeF/Ln/4vDU/vn1N4fug9MD+fPF
0fGRfXrs/kSmchbF6TTs+aL/akDc53Sh0348XiwfTvtwIiRmjPxJmh4enNi+
j4/23Z8n31iQXpwcfuP+PNqXP0++3idAL4bXw4GeTHJTFP2pXsTJqp9Wi5HJ
4Zhpfx5F/X5f6REQAZwrURTdzYFU4Kit8HRSE1OM83gEWNYq5T2oYI/M0qwo
4zEcfVmixjpJYLXoTBnI0QJ9FDGMo3P4Rt1cXH8Pp4cq58Ac4xJapGpkVFVA
M3j9H5XJV/DSACnqsipUNlU6Ii4+wUOHj6+eGlXUehJPpwC5mubZYq3rSQaw
plkJ5PkfVQw8YBRP4D+EZOAW4wxIBn484Ck5ggkZk9LISzktdTpRzZGLQXSR
FqXRkx5Pz3ZeqC/rPXJd0jgan39Y+YEGwPxM8yFhC8aKJ0Zl1F1UADnDJOGB
Llz/dVyBACCI9k01twGMP87j8Txqa6lw9WlKycrOB7aOqpOFyFVIexFuGJqO
E67wscJdMGDqWsSTCXDF6BnKInk2qQhfUSRMXWVwDmg4tQqkCPUzLukvu89k
O+whvHjiP2klH7Nw2dQbQAPNsoJDrTBIWTDrYCY9fA2D+kYKZANL0u2EEYUj
EP0VJp1Aw1T9fHF+dcOwI8fYUx8/Cm/4/Fm9Hs8z4FlA7TCZBWxFPTNMxOE4
fiXKrHWFHJE0Pud1Lnih7Wtc8AhWOzGtdLLeCN5iG1i5i2lXk7EBpsaEh/Ot
TUzJxHpAflFuSjgrCDPhh8tkNVB/njd23oYRIt8Q+1VzIHs8OKYxQPa0LRht
3uDqdmnGJC0mbWMgdzmLoj/VUE+biXeYBhmkda3CNs1tphHMtU86eq1haNAE
pb3ff/Dyf/DyNl4+VAkIs7gyyG/HGhkjCCvMGcdzjZKAQXkXqEKWdwqyFfYM
DA3aYBNgaBlyiIDCgOQu43tD62ixaz6YcVW2saWBuig95+Rt/qGE3zCFNo7C
NKJVkgGRhuhZZ9ZR8BYw9MS1afLCD6tIWOGd43StAAJqUYIP+Bx+VgAdgRqd
w2lXAe0ikZS1fuof1HtxQF2gYcGpsdHb0V9hERn+ro8Uf6RieWpCuopazpEa
zdTJDEgPVn+diOhQZq4KOBQ0hSy9gdm1I6MNkb1Gl5549Bh2bkEoAjUX+x+b
CSANGDccU/IWKHEGcj1At9bRBMSSfBGnAoJnTa3bBpfKH11RK8BwFFnClNXo
+ioGpXKM0lK0feiNx66jTo9inJzdaX6OTxgImQ3wlMesSia+JTwqop9RHOtz
cxZlUM3ZGyBkwStENywbbEUghefV8rnaPdjrRZanLrO8LJiTd7EmOafUW/gg
f4wLO5PoSa3j1J1zT0CZZZd0srRxxYgJuoZXu2XXkbdcGp0XfFaBxHpx83Ac
DVm/glUHMbiijXiTZ2g/TNTu8N0NCLJ6lBiRDkG13MPdhW1P1bWJZ/MRsOBz
OPPlE9Qz9/whRSiJwsnBp3pE9r51HK6vAA2uDGrIkTtYzQfg8oDBZ8/UHZFA
lmSzVVNwqArZN9MsSbJHZOBIMAVJRDdNEeSMtkMgxiIEzOfXtj/orCEDGIQd
pmRMwL5o6aolIJTOunaZiCwStN62l5AFrQGVBX2tb11UqxunD0pBfMbZzrcC
GAKwDl6NpJrwPc5BXVF+p40MHmuKxCsQSMM+tuOpbVMM0FwwbeXWnWQvxwKN
gAxWKSe89Bqbh/Z3UmRhR3zoB5TKfdQbdR41De2EaPYdi25kR1eXOp1VsFJ8
XN+bFXC3HIhu5+r97d1Oj/+rrt/S3+9e/9v7i3evX+Hftz8MLy/dH5F8cfvD
2/eXr/xfvuX526ur19evuDE8VbVH0c7V8C87zDx23t7cXby9Hl7uMKsINxWq
mTCzkaz6Eg4cmJ0uIiumk7j18vzmP//vwTGIXf+D9OGDb0Du4h8vDr4+hh+P
cOjyaFkKaOOfgK9VxFwKewEBCc71ZVzCkvSQ9Rfz7DFVsBCkSvyMmPnlTP3T
aLw8OP4XeYATrj20OKs9JJytP1lrzEhsedQyjMNm7XkD03V4h3+p/bZ4Dx7+
07+id0X1D178678w9QyRBYocHqzMczZDwMFZF9UK9fHZBASQSYaff17XrqYk
X2hVpTFs085OPoqR8fPnQXSNJkLSOJufIXlwl7QBgBPkQDPw/2oGh16qllmM
RJROIhSK4rQydp8YJAXZ2Xp8b0BaVD9kjwaU2R6RB39lh4oykRY3Cp5WpgTa
sVAJRUcLs8h69T7RpCxS7W6cjpNqQmcGfAKn2/i+qBZ7uL8LOHwKItuIAMZz
Aj5M1oRkK/WyFYqwntJ8FzomoTkiv1gZ83GoHuOSuV+cxmUMIkphSN2JF8uE
uAXNiYQjsdf2ImaZIzPXD4YJ4lGvBg3Rvymyy2xgMg+oxdIOLEPRPGpFI8xk
mK7URJc6OFNjWgQ8lqk7NG2srE4m45DWXATv/fk1B5XW5O7TnuiFwDVLGLEQ
0iiBXfL39lzbLYwBogSlrsoBd8BR0Hk4rXLk09EkLsZVgdMGAfDaPLIssE7W
zIGAJKZoRbYf1cXhChdXFRkcGUJzGY6BC58+BWs95TnG2kIp9Z4GdT1GDTpV
SKe2h5LcdBvVMeDERM9Muh1bC/dDsKEtExiQrbNbYfz4zD7Hx5+3KpiBDGJn
hYs0gtlSswcywJKi8nA6UKSEayCwcKF7W5SvYJDIpHBaFBV6Wgl/yBgshXlt
B0ZFqke0CVLqMlQL9K0dQz/cNdGsWCp5LpEdoLPtqQUrij5+xEY49JuL72kx
lrGl/O55W0ssdPB/4B8IJErtq/V/By3PDlueHUkPB/D2SB2rE3WqvlYv1Ddf
8gz7+J/93/l/2MkngulutTQMHf8+R2Er+M0PLZMJ/336gyHhf3Z7w1b1I93i
eqRw8lyTZwq/B1XK5A+wYOrT5R8LSaeZpjaI/frnV8CpB4PBL0wiH8/Us4DU
FIVh/PPzDXvrimnsOWz1CHbSD8yrAQHJBLUolOZvsyqHyYsWyQJ9/VmbQYe1
gsCmcwGDofAGcqVWDzqJJ7zDgF3QbqnQ+Q4QiTeQFIlXACKo08Rqa+O3vGgB
4sNqAwjr47E9xc39T0SdZ+2IY2YD06gMcTxhO8ANjg9Rg2l5e4pvD073aWbn
pBtZaFAKAE6+T2eVfRjP0gzPUtJqyFC1ZCXP7ocz8iLxyD3Fp6X4d0CE8y9P
g5fs8aFuPK2fwaEfkj5aJmNiZQtdjud4zqwrocuEMJ2146cYqCuN5mnF823s
IQwJajzaNKrXxr9sVLtNz1g+o6VtR3qIbNKIPbov1S5ZdveY9C77I5aHsH28
1cCDkUY1BXRQ72WckCrU0U+McSUbNU9v5PxTJ+84U5uFRW/fRd17i6DNlqo2
C25oLeQd4MRDsUc1QCgCEEhMrctaqgMClDVRGEVBYjdbsltkj4VWgo4lV9rS
t+w2gQMMJIEWgagFrMhhZqCGhcKQJHQbY7ueFya6cGg+aFor0AMi/6HlqwQY
y8eoKMAOXQDZidRZiO8R1OMk9pbs7ZJREyzG026xJ7OkbtiXja+hX/gbg0CA
JfLCsGmOBmZcN4WyxnRxD0Uy53DKsNCgEOKmFsHr5y3k9MvuM/jiYgK/9npb
XRHePkgEQ9/mhj1GXvb9FhUWdt+UDek4smrcZqhYaXgMaEmxrxHN5pbiIiQ4
3s0k88ewmqTFxqHjRRyJqIg3F0iUKqcPkNIk+sAAiHVLZA4QMavGgH9UH1FV
1V7tZ7XRK/8b4LBoH2c5YBM4IKoWkZ2Ut2OHrK9X36wdWxV9NsIrVu2eQJg0
xlb10BthPpBL0Z7Iqjks8cpe9JSBicnbkVt5VAQj+7Nfhvqdnivl++wxK5Jf
1lupcXHxsMO1St3HEYc+8Zkty9mzTjsQKzbrRdj3WOf5KnqCneQp7BtRc0FC
xQVJDyhIvH79Wr3YP/SLg7ocW0stnKdb1CwH51PsOQhntAVO9QQ4RYXdRi7D
v7Az2fNngLG204Hox8wZeWeJRSS0kYoRRPgEPES7PNtSgVkuPU/v9MkJuEX8
q+Og0EuVlLghRbO3JlAglLER93JWlbOsHm9xdfee/Sfb5v7RceDPT0PWE6in
c0s7CwDbQ1rNaRShEzqdZVw5RJFbyZMbvUoyPWEmXPvKt6+7hwLp/jzRRdG/
Rjl6y4xDYR/W94il8D6rBz/hYzaL7h7seTG6CHoFjFwTRnYP9wKxpvnNBeML
J7h71NkVdDAMdKRLk84w5J//a6kmE0wujC6qnO0SGYiOZYHLEhg+obet6I3+
SP7IpFH6BZNRnFxe1vxN+Dk7H5zR7Gfx/P7iTohGT+w8xt2ZWZ9OxI5kXUqM
ytEhHSojjB7ROQdWWQCWQK0wEtlqh7fnFxfq+v1l5MJP0KQ4+WuFCiibjgXz
egznJ6KVtvEfhzDZRfg64ZFCB/cL7xWT2VvKp3MyxqwCaB8g7W902HkAUCop
xMhlJDYHP3wTz0j1ZGvW7zRl/V471u832IR2IzV8c9EE8pOzTDCB1O1GaMH6
g2EgOGRIpQbwz1uFBP/OIrRl6fvC3gBxsqnQQmT3FzPRmidIF1ZSJt5qwXhD
ck1oW9gFTO2JPn5wSpuQ1XJPbaIyY4IOyUnSV27kRPX+BTsM9QDaWpIwl8Yu
XGAYkfrwekh5AaByrrDTBoBsgijUrn7QcYIBCdgDhnWBGN4du/75M7JzxAMb
tKxFn+EJEWG5tNg6AIIinqWEdxARRiuMJZKN66bnGb2d4O5dc9Je01jvDy3v
irgZcip6Ntj7w8wigT0O+njQeYxo6wuL4j7dktExboVdwFhRZOOY7OXOI7Ye
TSxsStfmS7wduqhxd/XF3B16oJF/NXlGbpEuvwhKcnWvCD3b5BoJIrD+Vo6R
+hB/mFukAfnfySlC4z7FM1KH8B9+kf9mfpHbEhb7EzCXT8NPx59O/5v6RSy1
bXSOIJltcY2sO0bOWcVziRNtTgpmYmKMQufEQ3a/Zl9vavjdvpDmkA2/zG8d
7YmeEEqX6PSDHG32gxwEfpBQh9rfU9eZep3nGXAY1KiudIK2Shj23zCEn5Qo
/OS2Ai3cCTI9GAyVJvvijqIKX2NUoWhUx9AVatLL0P5XqFtAaTFdced/K/9K
c52C/RSukVshdHi0rpEEzrS6VNaIoeFg+TJqCEfCjX2G5/G5BMNRiKZVQfZ7
gdSzJkfgcd+QJJwcERiRtnhSoBcb3VeLhN0w8CYBph7s57oQ46qPxXZWmOG7
Gw5UpYxPFxarKCyWg1efKNX8ZAVUS+1WGmNqv0gxYgiz1ZjQ33E0LdoDkbxh
KehPIOZXJtErIvuTPQ65FEI/3QOxFk7mifWBfZmcV5fyQGCnaGbxfg1bvF+W
KOoEIRGUT44V7wruREptDckuQ3DINEwQH6tdFFIE3uMWeF0jigPFFzj2BfMt
JJIqTXFfeCAbS9gA4ngdiFMC4lSAOP0SIE5/GxCnTSCcRCvnGJIIZiNgpx+f
YaLCZ0mMkBB0lwtRSxbptDpTbhEa8qZR3cQ2Rv8Bh7GhQ2nF8NEQRHsFkGaK
/iIM4dI5rXoUI9lja+ne5bRxloTPtxpnoOb8ujFuRtlOikGtF0yc49hydHPF
CIJJcWtN2gOtp1UqOVcYyW67cpAGbRpZNzrPY/K51I9j0mu1i6ULwODyDjAt
1hK80wPogsxMAdNeH70ZmvB3hrQdpEYAPWvzu/HADHreCojWLTFQkZnYW5T2
3CwaIo07KOv0YkF1cR3IYAMraVfQyIbutFqguLDWWbDxHjdsny63DVm3aSNw
Gj7LA16tYtdQVxcomDZsLXd3lwju4cmJxN5zZgc8otQ1lEQk0Uf5vBV2JQjS
CkbxNNezBdtXcHMvqoL97CPUqvtLjWq9/8QdcX7ns+0FgEL1ACTWLH1eYs0D
aqJ2X73ZU9NEz0j+sx9dof/bflO49/v2vWv+djotGGR4t5FxNR1RIebZc13H
/GkL5te7aMH8D9kSJJgF813B/7X54EzpsgSgGP+WRfBoFEcTWu2NU6QtYpie
xesRXaTKxORawVTInvUgiU834MKTrL547BLJlqtWPcKKlJuPhDIT092Gndbu
9AqGbtWaNo7vGb51r7XzjK6hbw2vx6t4Or0FUYyqhXAYO/T38/ntvuQ9nXxz
vFdrQRyPdPWWiKS1mYVC/1MRKmx/a99rsv6TBsDlyp6EG5LxWIAk236QCfLx
I+JLlB77PakM0gAlQoaWYp2c9BNIT178IzmG9acpCcRu9DdsJg7kzIaueLi3
HqUg2geKzq3qhRMteywQW9jQmFxk7iF0w1JeDUxEBYg4ebbMUey3UDfw1QWx
68sCjJViKMIBn6YOngYqRUfZoKLASQpdtaooxHsCq2yraFkn2g67SzMxpBY5
g9YXVExiinLYeyI11gnOGrcCBAtNguL9KHJjt3UUMBWXRKmWm7CpInCtc+Yb
O9fVb3Guo3c9IM2agE17go3EAS00lK8W84ZinFkQu8VqJyFvkNWd3BweHigU
qLYlHaz32Aj7WusvjHbbGjq4vX8fLwinPFUXSCkmKWjbCJx0EWObh0bJeXss
CfmacVSRSd2gXDsiLgKPw8Iu22DrIreZq0QNjGrRpFsz8T3+bWSTTgOHrOzu
DhV7O6Dt5jOrsRKo0RrmnXum5m/bshxuIj4V0InBT0xXVlQXQgS4OrPbPtOn
2AKj2k7coOCerdHmkxaz5vCkMFDKN+IoytYljVuWdOOu2Lw2nQG2C72kGOuF
QxGtC5wvNljfpYWr4HiJTUM9KjcvQnAWsgPuPeyrcyr68fGZLeZBIi2ddWOs
yxZnBdUIQSepgfXouYIxvlYTxplhjiMHtYJQ6ssI2ENTyr+0cIGKghaRNKkL
LPwiii4XRJGCTRQ5i9mrDixMXwXWZTZUa4k21IIJE52Lgc+LrPUW/bbKMkgY
CZxv8MHGuj9Vyn5tsRzebe0XTZiIqtYIdbSUpnjkENPsKOqBNhmr0SRxet/n
IireVYwL4rgFZdZp3iwzqrIIYxZjWPrJmrbfUr2pgh3LOSeckNxVfIrNbwVD
hd8+odPTL+j02HeKTgRcGibHHEQNn7Feq+XE1q96OadadgtLI4AgXRZRhJV0
QDHlbQ19816IpewCcDa3sCHaA2kpcvo98xaRTC1nob2wvmBERQUniDrukQqz
gC2yyirgLis1w7TXVASx3BhSucR+gHyKVdaCzYCtLh2YQup6CMbgKmlVnrON
MbYJGHRmDKQ70RigD+zCtiX+GbT07bgqFJKxpGSkma2egvjVhS/bYDujobae
MQRDnfcXVdALG79DUKDfW655hZZVjjcXYUCWs16FCOWalo2129SU9p60tsDi
4hlnfvv19QyBF/gRi9PiCmu3jt5aRAtt8RJ144Ua1NEscbdhcgzrbhRhirSB
mQ0AoipzPYVDjbJd30tFQHhn0zh8Wsjx4LSZGAIb44FOW+2KUUn6+Mjmf1vz
ciT2TPubN5cPc950/O9x5cLIl12YtNUh6ba920/XalOFQRyk3QNMiVRTAbUK
64uqH+B3BiIO8Qx6JEYWWyBxrdKKYJEwhR8ApqBzLmXMM4VuJgkbqzFBOdec
kTMyq2yLKCSx8vQ5RrPAPIwTVxwJsYbGZOoUBTdokGEUtes2tUJ6uDuZMiaq
mZ7bULJZWfYpLa16r9gZMNZKDn7KDqkPU8utpnEQt3HWmhy1rhVZYwYjF6SD
UVagHKBHcGyoefboVewuvcGlzbDu20icGbRjJYjP+SLUwBhB1noHdoYUa6tB
KjNLtiaRa+qzzArOduJrXJHAmhFy61TI/FyISDq6ZAOVdEmhetpF725Fe9Cn
pABgPKtPlXoVF8tErxg7RTWbIWTzCnN24MCeEGOa8DcoEk1dHSQGuZBYdCno
SPC6gPzP3lqcuPhuzKmZYjx5kEfEEckc14Zngo36o1cTEuiaW50Lj3PBbld6
fLleoby/v89REdh2onau319e7uBc8a8dHg6IwuR5UJCA46ZtWTQXO40kLAl1
hzYRlqpt8JlL3ZDpphH/TdoLhjFzqQYYIc7VSqN8BO+LngQE3l7DWtKTYNH+
/ed//wWkAlKByMxbL26xWUdLm9xB9mDX7ohrVn4+XW0aye9ag4Nwb9IpLbSY
rZX2m9tkQ3ZyAFFqsfy5HLBoLaDqLQEpbQsS0kZ2gwvTZTvACiUs6+BfAK/W
aVwsnP8NhAnms5aD24S23zP5QxKmNBqwMGk0gz5yNn7y0Un7mvkbswsa1mXl
kRD48WNQI+czR0akVM0bmZqruM+uLxzqz9+7468LdgC69aKH+oaxtX5dBmZR
wwzvpa5EzB3WpEDXKzE5IwHxi2Wj4N6A9vzALwX6gIXj1Hxpw0O/12gD04kA
c3oChJ6kqfrKDoof19fXO74jEtxGIHvF2SzXy/kqeCXjrhlt2TprYQLtX8cJ
14YB3eurwOPHq60fMjgQ5Bib1txqMLY9kHyHFzdOJGbG5ARSYlFUP2jilpq6
8EVsLMypeYTngBYQ06RYHnCQ3avwATNH19WeihdAr2wJJ5qYouYQ9t5z6cpY
eV15MfdIzSqepMVME7AQT8MF0J+zCuVxcd8DWEB0KJGVw35N1DJDnh3rBHnv
W3EP67JEQQKzmieufa+1DBCr7QTMyzyDV6n66eYa2EiW8KiJVE0jMZPEFmvp
sTnGhfDiJJuhVOfeGy6lVAz8ycoS6iPn57DEH3KDMCdKCgy5j4m5iBJZL6vE
LotnnFxQXypMqoOnaL3Cl3FhRRZmNyxNiyjjCN0GVJBhi1Qb7EmyEGpitzsn
m1VuaTS0qUiCt5wV/rSTXkmvFnKufyDn9453bUpuxI7LnxAHP/87PuxwyuI3
mwagvqF1v709XqiC98q0DhqaDp80E9jxzzEC5fmW2Ryc7m+YjvwbWrc+inUo
R1ZxMccyzWKPcxcskKRLEjsB6nuwCqPVubl2mG42reUBcBTtnC4gsf9GOJzT
yb14TDreweGL/uEJlrp/ykrgzP8uS/Ekojpq8+k9kaSOWuYBrZ8+i+Dxun8u
fNvm2Anft/tTwi+e5If4Ywn8oBO1/2+T98H/j2SxXuuBsp5dchj/BFhGfaSe
LqqhbOQtLr2uZTjnnh1YbixMMqTRYcNi4y0D7GxcJRtE3VilTdnYjSXbmJTd
xEXHtzZ8kjDLCZQPPrXBUTLlqL2J8wKWA8Ve/hNDj4zafXP+5hazCtVIF1hC
EGV9LTQPgsu+ED3mOqJZo7A2JDR5jDL0jzSHShX22dJfFPT3TG0SPUGeqYuq
Yh+0SqhUY0Roar1oVAbLwlk9BpFzRJC5uz8xC+QRzdseoBOQ6rKqsBc7DKKL
8NqFKsVI1CzNFvANGsLdK1d4c4m5aGRYQJMuu49JZWSu1LzCQWlWmJMoYFIo
x4KsC3IZ2p/6/Ivy+WKOKOGQkmokeCis7CbqAflgPQpIikPB3Np1aKlY1xPz
tWCJI0vYeAIN30gkMkF+k8H3sP2vafW5OGm1xKLababjWhCzBGDz1xGb49Np
PKukMtBS57AxMMe9rsWHesIAd2oEX8JiVQn7hJzz1ddX4/mQnPk6FX89kgkz
vA0gijWUS2Wpl8gXAeMa2GFv+/yoTjONMZGkKVv/CCXiRVyiAF4LrS5oED8E
K+qi/MHYNgrL+UpsyLi1wbuPxfcefoywd4Bju5FrSYgh7tYCo4OoaB9/vNcA
F13QYReUkx0OSRVl0G24PmDP2efInsQxk0vQLeIPoviTNRGdLt0+CR7SIdfa
9KhbvP5g6cpB1VwncpcFG34sA0UGxbEbZO53tIgjsCsKsEyT4WtJcAX0PeBy
OsUTKNCOv0XXkdv2aOnGKsWZ0yH7j1gvfJyRjse0D6slrGBCVXA9TVMg9FrS
AB9zRlvrdmS3kgmD5JtYFZ1dIpfJUybhuVjnH8NNumL6QWS4uniJHKnizfSX
4fX3bBdnvtRINS4bWBxEQ27CX4uBLyirgRVu8PPSeLePeFWmlfhQgC1dZSle
5GiDAvC2PnY9vrXmrSg656Atb/HyZm8phOQvSVpRCX7ubtNlK8F1KW71sVRS
nForrg81idb8EQ3/2K71CeB+GnJLPAzV7nUWkbi3512WsPRGKllYUpUYElry
fFEoiVLzRdag22s43jC9nHt3vm2xDwt/HbPwHMQURSYF3Ofalc5w0bV3bfbB
Zixu8ApOGb7dIC4JqgcTcZX+Qi4S4YsYcBMyU+BoyCIwhpDVvF/m8VKV8cIM
+NRvPK2nzZEhCNO+03H79UR+79ZimXqSv4HRniYvXdzVWhxFXBYmmaKxo1E0
G4s4gdRg8wEmnQwLh5mYUTWLEvNgWIfBxlZ24AsbqW721PXWE3ZGf8F2leyl
DcMUuPusiy3O1cyksA4JEzlSEF1kVPBNQEVBzmYXxIQ7D/AMjKaYZ1nJthsM
L+0L047qRzfJNAYrauOnVeqINvCFP4MDaJlkKzaaQ4OXenxPobTnYZXyyAtp
E/qe5Ugk3Yd4gpHMKYkebPx8yO75vYhycFr5WXiOK4IhD+1pFI/fi5YLtWp8
GmVZjV7eHgmaaHtb0ckYMnDo6K0dN2K4ERM8Fa6uHUojm0UQCmmVaUoIHsOl
QlGVF8RmWcJ+AJbnxYwm68dV9geDRwf6ruQSWbbNYkyhQgbQpxge0ek6qGzs
/GfEsKAzujrF5WPV+1mi7MhxenX/vr8iMTA1Im+EA+o+xTsZ1kvUR6FVksJu
hIoSF+8RWidZWLYuKDTfeu5Qu3+C3GuNnkN/kE3osAXRxNElIWo2BDuHY5Jp
lBxD4s4ARAJbhsZAWXhvm61xiOyaQiztLJ0XKTgLgSUwafP8onS9SQg4foOO
KTzVYRfCOrFO4XxmWe4AQHNIPJOzg8u20X3aSIb2NsrggH2NQpDsUtiBchQw
g+E7zTbGkSD/6vyEsvoVjeDinlEYXRq6S/xbHweVUiFRS36FKbi2SI5P4wwO
OheHYj7wAjARRMEyjbOiXI9V5rsEFiiOiGJEu5Cu7EPj/wSZ1toVj4C4N2Rn
RyoC9XBBh6hcd8HY2jWDGWcg6nALhgcq7BGKKFnguvnYJrwYAsuKweGYG10I
8oS7RlZr4aUKeZGt7K9btjW79iORALE6Uqhp7TU3t5wjtQ0etW9w8pqJyxuj
P7mM2zP0CFHv6/q9G5cFjcBlgNK3mUH/iE93zwJf7Y4MC119tQhbJwXpJIy2
TRs5JrV2rGdYkb2wCxWWCN9jfVlCvlIuVxx26YJmQY0HLKD5gPRUsx4TDAyP
TnofkhLq/c1CnI0OV+vd2XMpqkcuYCQv7G8MYJEPSHNsxDew1unGiHgMkdDt
BgDwTB6G0NTgHbbOg/qQXA1aqlDZSidwuAIXw5WY+3JbE/MQu8ux2FLAgp1v
K2vzAAyBQxTJHFau9mxfQgB4qcYKyHfh6g65aBYyVfW96YpHpdOLb9aL7LVl
pt3LKvI0LgRl0OPlM0o/0nzd/CMaDxjrnMMDHrWtx6mKuSZNb/tCR/WFDig9
uPUm8AnXwySR+wdEUU/nZ7mXMk66JqjxhkbbHeAZZF+uZ4Uz98Bg9FeDYTGf
sLd51i+peo/chhipKE8wRXTzFm3x9Kg9j5K4mAfcBauz5lbmkWsOYbLbDDQU
Ng8yG3svDa4UrLqoqtJ5L5S7vsiyFdmv6xbouqDM9poikAW/smap7dCHppcw
kepLjFHWENM0Q3Vaoeo2KA4J/hIr1EYoavanlvT8ttz8bzH44A8zQk0CG11o
fApMT53lcJw5ad0I5cZ0O6JXO25M6QvQtnUpFVqs0jf4XcUyfDRYxGFKYiri
K7SYan2VurYKGf5Oz1uqNSRRkmjpkcCNgdXbXOI+UMJ9yA5hMnkGG7UZSGEL
5ZFicIfSHRqpNpc32CBZelHuCVf3aY6y85FpP8V5iTrmTR4/oLwh0i9Q5083
18Vebz0MRITuk8NvMJIDTqSugBD74dE+fmitzIxzvla10waFshuJYNZcg8mP
Lqu3zeM3oMwlx+vkuiuxY8I2Iu0Qq/E29CoWFwOx7ik1P8KKJ3LpqtWobRlq
XasQqdcifEQ/65y9BPgtjEaD27TC1BvQymbhPVn1AvLd4IoOwVTmjA1Sv6Mw
0HlUB/ABUEc5FUPrwWrUSlQSei/1TJDNa7zrjuyjUpiWgxZtNKaEFEsRTZTs
4S0AVHKEuLs6HBOUON7HBT/x5Wt1wRsr0ywWPFX2w9GmYtGpnOdZNZsvq9IW
fscsj8h1Fw1TV2LDxVDhAU9xVKtNCw/EyB58n4SQWWJ22bPrlsua8MiZCEgE
lAxCkpGgOUkadnuSxXit5DpB77UiBolDzUjFEJKvmX9dPxISheZ2lPJB+2Bz
wvHR/gHwNVGaZBEGQbXNZhyZy9doHdjm7rVcMBcGfen1S+9a4tmDi0F8gp4L
b8B8pP44Xy1LjlTEO8r9/SdSFQfhYRYixjqMj+Nt6mDWMyzoyouWilAfBtRh
smS/3wcRfnyPOp23Cw8DNfbjs9AU3GU95uMNkYfE6b0FVPmAKZ9MoWzzNGwV
xSSjbCmCNEiZVA7G3t8oDeoFwQbqbUqncSS2aF+DFLtyd7Iv4nLLCdOLJmZs
b1YNxnMAo0VaEtUedYyXqtzN20Q7dz2B6Ec8ri/RQZGhzboaXDy7C0Bkk5T5
Y+mHMqnqfUbNSh3Ish7wILBpAYle1fan7GYjZYG1uxjO1jiAHZIHGaNZKnLP
JkwTaiIbcUg4I4n8wxK3SW5mIHYkUjvFykow7bbQIZeUxBNxJ5Alrbow7klM
Ks5UGF79J/VnACi8ZNnHVbigCi6441rwXcet313iIRvcRLweWoK1cqgn3rpL
zKRBDZKYCEZ/0jXHIuGGpf9l/Ma97akr64yoFN1FDrZSbHJyCBA7aqq/uDQo
Yep4M0Do7VpgUQyy9gfAsQR8MOAuGtBNqjohNEeXLRPcFRABP4ZTnBaza0Fc
iAAP0l5zp9uhx/uyu/e1m9qiMOi6fr9LzaLSUQXB+Z6sJ62dfJp1IoJ+g5u5
n3Apk7uXG/0bJJKPbPEmZ9GKmpfQYfmY2F15S1WibYX9Fg4Jr51WQA0j1/B0
c8PToObKJSeMItWNsgx0hpRJigCHx3fv3r8OynN+WAXJ4FFgbqDa1nITt6Dd
3cJdK1fIE3wzvLx97deia5tuvWoMoMRpB7nA9ZpWa9a2b+WpDotLBZfxKK7x
Hlog7QUz9nYZjHk/fkHq9dXwnNTj02P7c+9bxaGwlKflKolIYaCNUw3LpBOe
nBSfGk66HblZEm4bIOvg6sNQx7LUBTpx5IxddS5t6a1rW3C5R6baDXMQ30Vw
ekl6XF0esTlzUWSTY6jSwtoFZMs8XmgsrWrL8qtlbDicJDTzxXLKaHvB0aPx
XmB3WofujUDLJX7siwzVjl627BL8VKozcSzUARTCwYlIFKNqR88NlcBkWsLi
QzBgmcCDcly7/hr9SbQi9Ym3TVfJdNmBj55Ga2NvvWLrTMQkNDXylz017Klj
lpFOpcwzBtg9r5Wz4sSLlBQf7mExssEy7m4ikUzk1gUYE6M0durZjzthembz
hqtQGEVrtSQuiE0SUzhZUJDtM67V1UolxKKH+EpL/wUf2GGlMnIVNHJwuZL/
50Fn/9x3SWqNFMGRl6RS2y+o0q0dn2tyrQOwefhG1ZTmMAffro0QXIfB5jh8
FawrPiTxV90StlVpPpBhhVyRiVgbfKTQKJZYrmKePaYWXS/j8tyvO4UrE8Sf
1FB9Usfwv1P43x0WPfwED/eV/19Q6ygVpw1+ctD6iS3C5tL+l3xKwn9PXS3c
sPlBd/PWNgebh6Tx2tpsHueY9eH6gFhtvgVvtuC8XY7mMoTW4OfqM1XEGY7R
+Z6YiZTH/Pis8eQzjmartvzzTprtkKqn03syBNxmjygyqp9A6p7A05760Uyn
6getgQmc6zzJCnWD0RWlRkr/EXRNuqL8MoPzFNjWKyy4At0lyKOu4vs4g7a5
xi9NAn8msF2h079A61TdzjEQDz68LUE0TaM/x6yY/QgiRf8KJCdogkhBZWeI
sSJavdT5iD7JYJisGs+hMewbGAOTev+3hvGuYhjgLoPz+Sb/dTWLYfvA+Nfx
+F69BLl2lsQZLcIdkPZV/Guu57Gl6hgrRKHMXU4rtLk9xOaRWVcta+q/AMwp
+InImwAA

-->

</rfc>
