<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sav-deployment-status-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV Deloyment Status">Source Address Validation Deployment Status</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sav-deployment-status-02"/>
    <author initials="S." surname="Wang" fullname="Shuai Wang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangshuai@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Ruifeng Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lirf@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="He" fullname="Lin He">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>he-lin@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 97?>

<t>This document provides a summary of methods for measuring the deployment status of source address validation, with an overview of its deployment status. It reviews various methods for measuring outbound and/or inbound source address validation, including established tools like CAIDA Spoofer, as well as recently proposed remote measurement methods. By combining results from these different methods, the document offers a comprehensive overview of the status of source address validation deployment across the Internet.</t>
    </abstract>
  </front>
  <middle>
    <?line 101?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IP spoofing, sending packets with source addresses that do not belong to the sending host, is one of the long-standing security threats in the Internet. Source address validation (SAV) is important for protecting networks from IP spoofing attacks. Several techniques have been proposed to validate the source address of traffic, including Access Control List (ACL), unicast Reverse Path Forwarding (uRPF), and Virtual routing and forwarding (VRF) table. SAV can be categorized into two types: outbound SAV (OSAV) and inbound SAV (ISAV). OSAV discards spoofed packets originating from within a network and destined for external destinations, while ISAV focuses on filtering spoofed packets arriving from external sources to the network.</t>
      <t>The MANRS initiative considers IP spoofing as one of the most common routing threats, and defines a recommended action to mitigate spoofing traffic <xref target="manrs"/>, encouraging network operators to implement SAV for their own infrastructure and end users, and for any Single-Homed Stub Customer Networks. However, as a recommended action, not all MANRS members follow this action to implement SAV for their networks, and only 1.6% of all routed ASes participate in MANRS. As a result, there is a lack of comprehensive knowledge regarding the current status of SAV deployment across the Internet community.</t>
      <t>This document aims to provide a comprehensive view about SAV deployment in the Internet. The topics discussed in this document are organized into three main sections.</t>
      <ul spacing="normal">
        <li>
          <t>Section 3 summarizes methods for measuring the deployment of OSAV.</t>
        </li>
        <li>
          <t>Section 4 summarizes methods for measuring the deployment of ISAV.</t>
        </li>
        <li>
          <t>Section 5 describes and analyzes the SAV deployment based on the measurement results derived from these methods.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>Spoofed Packet:</dt>
        <dd>
          <t>A packet with forged source IP address. That is, the source IP address of the packet is not the legitimate IP address assigned to the sender.</t>
        </dd>
        <dt>Outbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the network to the outside.</t>
        </dd>
        <dt>Inbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the outside to the network.</t>
        </dd>
        <dt>Outbound Source Address Validation (OSAV):</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from a network to the outside of it.</t>
        </dd>
        <dt>Inbound Source Address Validation (ISAV):</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from the outside of a network to it.</t>
        </dd>
        <dt>Filtering Granularity:</dt>
        <dd>
          <t>The granularity of source address validation. If filtering granularity is /8, the network allows packets to be sent with any address that belong to the same /8 prefix as its own address. However, if filtering granularity is /8, the network allows to receive packets with any address as the source address that belongs to a different /8 prefix than its own address.</t>
        </dd>
        <dt>Filtering Depth:</dt>
        <dd>
          <t>The deployment depth of souce address validation. If filtering depth is 3, the source address validation is deployed 3 hops away from the sender for OSAV.</t>
        </dd>
        <dt>Authoritative DNS Nameserver (ADNS):</dt>
        <dd>
          <t>A DNS server that holds the definitive records for a domain and responds to DNS queries for that domain.</t>
        </dd>
      </dl>
    </section>
    <section anchor="outbound-source-address-validation-measurement-methods">
      <name>Outbound Source Address Validation Measurement Methods</name>
      <t>To measure whether a network deploys OSAV, a common idea of different methods is to send spoofed packets from the network inside, and observe whether the spoofed packets reach the outside of the network. The SAV research community has proposed 3 methods for measuring OSAV deployment, i.e., client-based method, proxy-based method and DNAT-based method.</t>
      <section anchor="client-based-method">
        <name>Client-based Method</name>
        <t>As shown in <xref target="osav-client-figure"/>, by deploying a measurement client on a host in the audited network, the client can actively generate and send spoofed packets to the outside of the audited network. Hence, it is easy to learn whether spoofed packets have reached the outside of the network. Also, the client can set the time-to-live (TTL) of spoofed packets incrementally, and thus the forwarding path of the spoofed packets can be learned in a way like traceroute.</t>
        <figure anchor="osav-client-figure">
          <name>An example of client-based OSAV measurement.</name>
          <artwork><![CDATA[
    audited network
+---------------------+                          +--------------------+
|   +-------------+   |           (1)            |   +------------+   |
|   | client IP1  #---|--------------------------|--># controlled |   |
|   +-------------+   |   From: forged address   |   | server IP2 |   |
|                     |   To:   IP2              |   +------------+   |
| AS1                 |                          | AS2                |
+---------------------+                          +--------------------+

The client actively sends a set of spoofed packets to the controlled
servers outside of the audited network.
]]></artwork>
        </figure>
        <t>Benefiting from the controlbitly, a client can generate spoofed packets with arbitrary IP addresses as its source addresses. Hence, filtering granularity can be measured by observing which spoofed packets can reach outside of the audited network. Similarly, filtering depth can be measured by observing how far the spoofed packets reach.</t>
        <t>The most famous client tool is the CAIDA Spoofer project <xref target="spoofer"/>, which re-launched in 2015. A CAIDA Spoofer client sends various spoofed packets to a set of servers maintained by the project, and based on the spoofed packets received by the servers, the project is able to infer the filtering granularity of SAV on paths traversed by these packets. The CAIDA Spoofer project employs tracefilter to measure where a SAV mechanism is deployed. Speicifically, a client sends spoofed packets with specially crafted TTLs, and when the packet's TTL expires, an ICMP TTL exceeded message will be sent to a controlled server. Based on the largest TTL among received ICMP messages, the project can infer the number of hops away from the client before spoofed packets are discarded.</t>
        <t>The CAIDA Spoofer project relies on volunteers to spoof from many points in the network. If a volunteer installs the client within a Network Address Translation (NAT) network, CAIDA Spoofer will report the presence of a NAT device, and thus spoofed packets may be blocked by the NAT devices, rather than a SAV mechanism. Due to the wide deployment of NAT, though more than two thousands ASes were tested by the CAIDA Spoofer project in 2024, only about half of them were tested based on public IP addresses.</t>
        <t>The KI3 SAV-T project <xref target="savt"/> also started supporting OSAV measurements in 2024 and has promoted these measurements via crowdsourced testing platforms.</t>
      </section>
      <section anchor="proxy-based-method">
        <name>Proxy-based Method</name>
        <t><xref target="dns-proxy"/> relies on misbehaving DNS proxies to perform remote measurement of IP spoofing. As illustrated in <xref target="proxy-figure"/>, the measurement conducter controls a scanner, a DNS authoritative nameserver, and a domain name, but does not have control over the audited network. The scanner first sends a DNS query for the domain name to a DNS proxy in the audited network, i.e., the destination IP address of the DNS query is the DNS proxy. However, due to the misbehaviors of the DNS proxy, it will forward the query to a DNS resolver without changing the source IP address of the query. In this way, the DNS proxy creates a spoofed packet whose source IP address does not belong to the audited network. If the spoofed packet is not discared along the path, the DNS resolver will communicate with the controlled authoritative nameserver to resolve the domain name. Finally, the DNS resolver will directly respond to the scanner, since the source IP address of the DNS query received by the DNS resolver is the scanner. Hence, if the scanner receives a DNS response whose source address is different from the destination address of the DNS query, the network is considered to have no OSAV deployment.</t>
        <figure anchor="proxy-figure">
          <name>An example of proxy-based OSAV measurement.</name>
          <artwork><![CDATA[
                                            audited network
+---------------------+                  +--------------------+
|   +-------------+   |       (1)        |   +------------+   |
|   | scanner IP1 #---|------------------|--># proxy  IP2 |   |
|   +-------------+   |   From: IP1      |   +------#-----+   |
|         ^           |   To:   IP2      |          |         |
| AS1     |           |                  | AS2      | (2)     |
+---------------------+                  +--------------------+
          | From: IP3                               | From: IP1
          | To:   IP1    +----------------------+   | To:   IP3
      (4) |              |   +--------------+   |   | 
          +--------------|---| resolver IP3 #<--|---+ 
                         |   +--------------+   |
                         |          ^           |
                         | AS3      |           | 
                         +----------------------+ 
                                    |
        +----------+            (3) |
        |   ADNS   #<---------------+
        +----------+

The scanner sends a DNS query with IP1 as the source to the DNS proxy
(IP2). The proxy forwards the query to the DNS resolver, with the source 
IP address remaining as IP1. The resolver resolves the domain name using 
the authoritative name servers and responds directly to the scanner.
]]></artwork>
        </figure>
        <t>Note that the IP address of the DNS proxy is also encoded into the domain name before sending to the DNS proxy, so that a DNS response can be matched with the corresponding DNS query. In addition, there is no need to find misbehaving DNS proxies before sending DNS queries to them. Instead, we can send DNS queries directly to all the routable address space one by one. If the destination address of a DNS query is used by a misbehaving DNS proxy, the scanner will receive a DNS response with an unexpected source address.</t>
        <t>Proxy-based method can efficiently identify networks that do not deploy OSAV in a remote manner, but fails to identify networks that deploy OSAV. This is because, if OSAV is deployed in the audited network, the scanner will receive no DNS response, which is indistinguishable from the absence of a DNS proxy in the audited network.</t>
      </section>
      <section anchor="dnat-based-method">
        <name>DNAT-based Method</name>
        <t><xref target="DNAT"/> improves the proxy-based method by extending more than DNS protocol, identifying the deployment location of OSAV, and identifying the filtering granularity. Specifically, <xref target="DNAT"/> first figures out that the root cause of misbehaving DNS proxies is misconfigured destination NAT (DNAT) devices. As shown in <xref target="DNAT-method-figure"/>, when a packet matches DNAT rules, the DNAT device changes the packet's destination to a preset address, while leaving the source address unchanged. Hence, to improve measurement coverage, DNAT-based method can also utilize other protocols, such as Network Time Protocol (NTP) and TCP protocol, to trigger the audited network into sending spoofed packets.</t>
        <t>DNAT-based method identifies the filtering depth in a similar way to tracefilter. As DNAT devices do not reset the TTL field when forwarding packets, the fowarding path taken by spoofed packets can be learned by gradually incrementing the initial TTL values in original packets. The last responsive hop is considered as the position where filtering happens.</t>
        <t>To identify the filtering granularity, the scanner sends multiple original packets with various source IP addresses. By using addresses adjacent to IP2 as the source addresses, the DNAT device will send spoofed packets with these addresses. Hence, packets that use forged addresses within the filtering granularity as source address will reach the receiver IP3.</t>
        <figure anchor="DNAT-method-figure">
          <name>An example of DNAT-based OSAV measurement.</name>
          <artwork><![CDATA[
                                            audited network
+---------------------+                  +--------------------+
|   +-------------+   |       (1)        |   +------------+   |
|   | scanner IP1 #---|------------------|--># DNAT   IP2 |   |
|   +-------------+   |   From: IP1      |   +------#-----+   |
|                     |   To:   IP2      |          |         |
| AS1                 |                  | AS2      | (2)     |
+---------------------+                  +--------------------+
                                                    | From: IP1
                    +----------------------+        | To:   IP3
                    |   +--------------+   |        |     /\
                    |   | receiver IP3 #<--|--------+     ||
                    |   +--------------+   |              || (3)
                    |                      |              ||
                    | AS3                  |        Detect elicited
                    +----------------------+        spoofed packets

The scanner sends a packet sourced with IP1 to the DNAT device (IP2).
The packet will elicit a spoofed packet sourced with IP1 and destined 
to IP3.
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="inbound-source-address-validation-measurement-methods">
      <name>Inbound Source Address Validation Measurement Methods</name>
      <t>The core idea of measuring whether a network deploys ISAV is to first send some spoofed packets to the target network and then observe whether the spoofed packets arrive inside of the target network. Since ISAV measurement does not require hosts in the audited network to generate spoofed packets, it is easier to measure ISAV deployment than OSAV. The SAV research community has proposed 5 methods for measuring OSAV deployment, i.e., client-based method, resolver-based method, ICMPv6-based method, IPID-based method and PMTUD-based method.</t>
      <section anchor="client-based-method-1">
        <name>Client-based Method</name>
        <t>As shown in <xref target="isav-client-figure"/>, by deploying a measurement client on a host in the audited network, client-based method can use a controlled server to send a spoofed packet to the client. The spoofed packets use an IP addresses adjacent to IP2 as its source IP addresses. If the client receives the spoofed packet, then the audited network has not deployed ISAV. Otherwise, the audited network has deployed ISAV.</t>
        <figure anchor="isav-client-figure">
          <name>An example of client-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                     audited network
+---------------------+                          +--------------------+
|   +-------------+   |           (1)            |   +-------------+  |
|   | controlled  #---|--------------------------|--># client IP2  |  |
|   | server IP1  |   |   From: IP2's neighbor   |   +-------------+  |
|   +-------------+   |   To:   IP2              |                    |
| AS1                 |                          | AS2                |
+---------------------+                          +--------------------+

The controlled server sends a spoofed packet to the client, and then 
client reports whether it has received the spoofed packets.
]]></artwork>
        </figure>
        <t>Both the CAIDA Spoofer project <xref target="spoofer"/> and the KI3 SAV-T project also support ISAV measurements, which, like OSAV measurements, rely on volunteers. When volunteers install the client, both ISAV and OSAV measurements are performed on the audit network. However, if the client is installed within a NAT network, it becomes inaccessible from outside the network, even without spoofed addresses. As a result, client-based methods cannot measure ISAV deployments in this case.</t>
      </section>
      <section anchor="resolver-based-method">
        <name>Resolver-based Method</name>
        <figure anchor="exp-spoofing-scan">
          <name>An example of resolver-based ISAV measurement.</name>
          <artwork><![CDATA[
                                         audited network
+-----------------+               +--------------------------+
|  AS1            |               |  AS2                     |
| +-------------+ |               |      +-----------+       |
| |   scanner   | |      (1)      |      |  resolver |       |
| |     IP1     #-|---------------|----->#    IP2    #       |
| +-------------+ |   From:IP3    |      +--+--------+       |
|                 |   To:IP2      |         |                |
+-----------------+               +------------------------- +
                                            | (2)
                                            V
                                       +----#-----+
                                       |   ADNS   |
                                       +----------+
]]></artwork>
        </figure>
        <t><xref target="exp-spoofing-scan"/> shows an example of resolver-based ISAV measurement <xref target="dns-resolver"/>. The scanner in AS1 sends a DNS query with a forged IP address IP3, which belongs to the audited network (AS2), to a DNS resolver in AS2. If the audited network does not deploy ISAV, the DNS resolver will receive the spoofed DNS query. Next, the DNS resolver will send another DNS query to our controlled ADNS for resolution. Therefore, if the controlled ADNS receives the DNS query from the DNS resolver in the audited network, the audited network AS2 does not filter the spoofed packets.</t>
        <t>However, if the controlled ADNS does not receive the DNS query, we can not assume that the audited network filters the spoofed packets, since there may be no DNS resolver in the audited network. To futher identify networks that filter inbound spoofing traffic, we send a non-spoofed DNS query from the scanner to the same target IP address. If the controlled ADNS receives a DNS query triggered by the non-spoofed DNS query, a DNS resolver exists in the audited network. As a result, if the DNS resolver does not resolve the spoofed query, we can conclude that the audited network deploy ISAV.</t>
        <figure anchor="resolver-network-type">
          <name>Classification of results based on DNS resolvers.</name>
          <artwork><![CDATA[
                                        SPOOFED DNS QUERY 

N                        ADNS receives no query    ADNS receives a query
O  D                  +---------------------------------------------------+
N  N   ADNS receives  |                          |                        |
|  S     a query      |        with ISAV         |      without ISAV      |
S                     |                          |                        |
P  Q                  -----------------------------------------------------
O  U   ADNS receives  |                          |                        |
O  E     no query     |         unknown          |      without ISAV      |
F  R                  |                          |                        |
E  Y                  +---------------------------------------------------+
D     
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="resolver-network-type"/>, there are four cases when combining spoofed DNS query and non-spoofed DNS query.</t>
        <ul spacing="normal">
          <li>
            <t>First, the ADNS receives DNS queries in both spoofing scan and non-spoofing scan, suggesting that the audited network does not deploy ISAV, and the DNS resolver is open.</t>
          </li>
          <li>
            <t>Second, the ADNS receives the DNS query only in spoofing scan, suggesting that the audited network does not deploy ISAV, and the DNS resolver is closed.</t>
          </li>
          <li>
            <t>Third, the ADNS receives the DNS query only in non-spoofing scan, suggesting that the audited network deploys ISAV.</t>
          </li>
          <li>
            <t>Fourth, the ADNS does not receive any DNS query. This suggests that no DNS resolver in the audited network can be utilized to measure ISAV deployment.</t>
          </li>
        </ul>
      </section>
      <section anchor="icmpv6-based-method">
        <name>ICMPv6-based Method</name>
        <t>As suggested by <xref target="RFC4443"/>, in order to limit the bandwidth and forwarding costs incurred by originating ICMPv6 error messages, an IPv6 node <bcp14>MUST</bcp14> limit the rate of ICMPv6 error messages it originates. This provides an opportunity to infer whether the spoofed packets arrive inside of the audited network based on the state of ICMPv6 rate limiting. Since most of IPv6 addresses are inactive, an ICMP error message will be fed back from Customer Premises Equipment (CPE) devices when we send an ICMP echo request to a random IP address in the audited network. If the CPE device limits the rate of ICMPv6 error messages it originates, it can be utilized as a vantage point (VP).</t>
        <t><xref target="ICMP-based-msr"/> illustrates the ICMPv6-based measurement method <xref target="ICMPv6"/>. We have a local scanner P1 in AS1, and AS2 is the audited network. Three rounds of testing with N and N+M ICMP echo requests packets are conducted in the measurement, and thus three values rcv1, rcv2, and rcv3 can be obtained respectively. Based on this, we can infer whether the audited network filters the spoofed packets by comparing rcv1, rcv2, and rcv3.</t>
        <figure anchor="ICMP-based-msr">
          <name>An example of ICMPv6-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                     audited network
+------------------+                          +-----------------------------+
| AS1              |                          |  AS2        +------------+  |
|  +-----------+   |                          |  +------+   |unreachable |  |
|  |scanner IP1|   |                          |  |  VP  |   |IP address T|  |
|  +---+-------+   |                          |  +---#--+   +--#---------+  |
|      |           |                          |      |         |            |
+------------------+                          +-----------------------------+
       |                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:IP1 dst:T                   |         |
round 1|                                             |         |
       +<-------+ rcv1 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:IP1 dst:T                   |         |
round 2|                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |        src:arbitrary IP in AS1,dst:T        |         |
       |                                             |         |
       +<-------+ rcv2 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 1 XXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:IP1, dst:T                  |         |
       |                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |         src:arbitrary IP in AS2,dst:T       |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 2 XXXXXXXXXXXXXXXXXXXXXXXXXX|
round 3|                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:IP1 dst:T                   |         |
       |                                         XX  |         |
       +--------+ M ICMP echo requests +-------->XX  |         |
       |         src:arbitrary IP in AS2,dst:T   XX  |         |
       |                                         XX  |         |
       |XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +<-------+ rcv3 ICMP Error Messages +---------+         |
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="ICMP-based-msr"/>, in the first round test, N ICMP echo requests are sent to a target with inactive IPv6 address in the audited network, and then VP will resposnd with rcv1 ICMP error messages to the scanner. In the second round test, besides the same N probe packets, extra M ICMP echo requests with forged source address that belongs to AS1 (noise packets) are sent to the target simultaneously. The number of ICMP error messages in the second round test are defined as rcv2. Similar to the second round test, in the third round test, M ICMP echo requests with forged source address that belongs to AS2 (spoofed packets) are sent to the target. The number of ICMP error messages in the third round test are defined as rcv3.</t>
        <t>Comparing rcv1 and rcv3, if rcv1 &gt; rcv3, it can be considered that the spoofed packets are not filtered in the third round test, suggesting that the audited network allows inbound spoofing. Comparing rcv2 and rcv3, if rcv2 &lt; rcv3, it can be inferred that the target network has filtered the spoofed packet in the third round test, and thus is able to filter inbound spoofing traffic. The ability of filtering inbound spoofing traffic can be inferred according to the following rules.</t>
        <ul spacing="normal">
          <li>
            <t>If rcv3 &lt; a*rcv1, then the network allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else if rcv2 &lt; a*rcv3, then the network does not allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else, the ability of filtering inbound spoofing traffic cannot be determined.</t>
          </li>
        </ul>
        <t>where a is a factor to avoid potential interference from fast-changing network environments, satisfying 0 &lt; a &lt; 1.</t>
      </section>
      <section anchor="ipid-based-method">
        <name>IPID-based Method</name>
        <t>The core observation of using IPID to measure ISAV is that the globally incremental IPID value leaks information about traffic reaching the server<xref target="SMap"/>. Given a server in the audited network with a globally incremental IPID, the scanner samples the IPID value using its own IP address by sending packets to the server and receiving responses. Then, the scanner sends a set of packets to the server using a spoofed IP address that belongs to the audited network, i.e., an IP address adjacent to IP2. Afterward, the scanner sends another packet using its IP address to probe the IPID value again. If the spoofed packets reached the server, they would have incremented the server's IPID counter. As a result, this increment can be inferred during the second IPID probe from the scanner's IP address.</t>
        <figure anchor="IPID-based-msr">
          <name>An example of IPID-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                    audited network
         +------------------+                    +-------------------+
         | AS1              |                    |  AS2              |
         |  +-----------+   |                    |   +------------+  |
         |  |scanner IP1|   |                    |   |   VP  IP2  |  |
         |  +---+-------+   |                    |   +----+-------+  |
         |      |           |                    |        |          |
         +------------------+                    +-------------------+
                |                                         |       
                |      Is global IPID counter or not?     |       
                |<--------------------------------------->|       
                |                                         |       
                |             Request,srcIP=IP1           |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=X             |probe 1
                |<----------------------------------------|       
                |                   ...                   |       
                |                N-2 probes               |       
                |                   ...                   |       
                |             Request,srcIP=IP1           |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=Y             |probe N
 estimate IPID  |<----------------------------------------|       
 rate IPID=f(t) |                                         |       
                +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                |                                         |       
                |      M spoofs,srcIP=IP2's neighbor      |       
                |---------------------------------------->|       
                |                                         |       
                +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                |                                         |       
                |            Request,srcIP=IP1            |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=Z             |       
                |<----------------------------------------|             
                |                                         |   
]]></artwork>
        </figure>
        <t><xref target="IPID-based-msr"/> illustrates the measurement process of ISAV based on global IPID. First, the scanner measures the current IPID value and the rate of IPID increments. Ordinary Least Squares (OLS) linear regression can be used to estimate the relationship between the IPID and the timestamp t: IPID = a*t + b + ε, ε ∼ N (0, σ^2). Next, N probes are sent to the VP. With these N probes, the parameters a, b, and σ can be estimated using the OLS method. Then, a group of M = 6 * σ packets with a spoofed source IP address are sent to the audited network. Finally, the IPID value Z from the VP is sampled by using IP1 as source address, while the IPID value W at that moment can be estimated using the linear regression model. If the M spoofed packets are filtered, according to the 3-sigma rule, there is a 99.73% probability that the following condition holds: W - 3 * σ ≤ Z ≤ W + 3 * σ. If the spoofed packets are not filtered, meaning the audited network has not deployed ISAV, the IPID counter will increase by M. In this case, Z &gt; W + 3 * σ, or equivalently, Z &gt; W + M/2.</t>
      </section>
      <section anchor="pmtud-based-method">
        <name>PMTUD-based Method</name>
        <t>The core idea of the Path MTU Discovery (PMTUD) method is to send ICMP Packet Too Big (PTB) messages with a spoofed source IP address that belongs to the audited network <xref target="SMap"/>. The real IP address of the scanner is embedded in the first 8 bytes of the ICMP payload. If the network does not deploy ISAV, the server will receive the PMTUD message and reduce the MTU for the IP address specified in the first 8 bytes of the ICMP payload. First, probe the MTU of the service in the audited network. Then, send an ICMP PTB message from a spoofed IP address. If the packet reaches the service, it will reduce the MTU for the scanner's IP address. This reduction will be identified in the next packet received from the service, indicating that the audited network does not deploy ISAV.</t>
        <figure anchor="PMTUD-based-msr">
          <name>An example of PMTUD-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                    audited network
         +------------------+                    +-------------------+
         | AS1              |                    |  AS2              |
         |  +-----------+   |                    |   +------------+  |
         |  |scanner IP1|   |                    |   |   VP  IP2  |  |
         |  +-----+-----+   |                    |   +------+-----+  |
         |        |         |                    |          |        |
         +------------------+                    +-------------------+
                  |                                         |       
          Round 1 |              Setup Connection           |       
                  |<--------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF1, size1          |       
                  |<----------------------------------------|       
         DF==1?-> |                                         |       
       Maybe PMTUD|                                         |       
                  |            ICMP PTB, srcIP=IP1          |       
                  |---------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF2, size2          |       
                  |<----------------------------------------|       
  DF==0 or size2< |                                         |       
  size1 -> PMTUD  |                                         |       
                  +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                  |                                         |       
          Round 2 |              Setup Connection           |       
                  |<--------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF3, size3          |       
                  |<----------------------------------------|       
                  |                                         |       
                  |                                         |       
                  |            ICMP PTB, srcIP=IP1          |       
                  |---------------------------------------->|       
                  |                                         |       
                  |                 Request                 |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF4, size4          |       
                  |<----------------------------------------|       
                  |                                         |   
]]></artwork>
        </figure>
        <t><xref target="PMTUD-based-msr"/> illustrates the measurement process of ISAV based on PMTUD. First, establish a TCP connection with the server in the audited network. Then, send Request1 and receive Response1. If the DF (Don't Fragment) bit is not set, the server does not support PMTUD. Otherwise, send an ICMP PTB message with a smaller MTU. Next, issue another request and receive Response2. If DF1 == 1 and (DF2 == 0 or size2 ≤ size1), the server supports PMTUD. Now, proceed to test whether ISAV is deployed. Use the neighbor's IP address of the server as the source IP address to spoof an ICMP PTB with the smallest MTU. After that, issue another request. If the following condition is observed, the server is not protected by ISAV: size4 ≤ size3 or (DF3 == 1 and DF4 == 0).</t>
      </section>
    </section>
    <section anchor="deployment-status">
      <name>Deployment Status</name>
      <section anchor="global-picture">
        <name>Global Picture</name>
        <t>In January 2026, we used the above methods to measure SAV deployment in the Internet. ASes are classified into three deployment states based on measurement observations: Deployed, indicating that SAV was consistently observed across all available measurements; Not Deployed, indicating that SAV was not observed in any of our measurements; and Partially Deployed, indicating inconsistent observations across measurements, where SAV was detected in some cases but not in others. The same classification is also applied at the IP prefix level.</t>
        <t>As shown in <xref target="isav-as-deployment"/> and <xref target="isav-pfx-deployment"/>, 66.6% of IPv4 and 80.5% of IPv6 ASes lacked any ISAV deployment. Partial deployment was observed in 29.6% of IPv4 and 15.1% of IPv6 ASes, which may indicate that ISAV is selectively deployed, for example at access-facing interfaces.</t>
        <figure anchor="isav-as-deployment">
          <name>ISAV deployment status across IPv4 ASes and IPv6 ASes.</name>
          <artwork><![CDATA[
+--------------------+---------------+---------------+
|      Category      |   IPv4 ASNs   |   IPv6 ASNs   |
+--------------------+---------------+---------------+
|      Deployed      | 1,465 (  3.9%)|   352 (  4.4%)|
|    Not Deployed    |25,319 ( 66.6%)| 6,490 ( 80.5%)|
| Partially Deployed |11,255 ( 29.6%)| 1,217 ( 15.1%)|
+--------------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="isav-pfx-deployment">
          <name>ISAV deployment status across IPv4 /24 and IPv6 /48 prefixes.</name>
          <artwork><![CDATA[
+--------------------+-----------------+------------------+
|      Category      |  IPv4 Prefixes  |  IPv6 Prefixes   |
+--------------------+-----------------+------------------+
|      Deployed      |189,321 ( 24.4%) |  48,864 ( 12.6%) |
|    Not Deployed    |539,649 ( 69.7%) | 277,610 ( 71.7%) |
| Partially Deployed | 45,626 (  5.9%) |  60,944 ( 15.7%) |
+--------------------+-----------------+------------------+
]]></artwork>
        </figure>
        <t><xref target="osav-as-deployment"/> and <xref target="osav-pfx-deployment"/> illustrate notable differences in OSAV deployment between IPv4 and IPv6 networks. Only 11.0% of IPv4 ASes and 11.2% of IPv4 /24 prefixes exhibit consistent OSAV deployment. However, IPv6 networks show substantially higher observable OSAV deployment ratios. This discrepancy may be influenced by measurement coverage limitations. Specifically, OSAV deployment in IPv6 networks is currently observable only via the client-based method, while other measurement methods used for IPv4 OSAV are not applicable to IPv6.</t>
        <figure anchor="osav-as-deployment">
          <name>OSAV deployment status across IPv4 and IPv6 ASes.</name>
          <artwork><![CDATA[
+--------------------+---------------+---------------+
|      Category      |   IPv4 ASNs   |   IPv6 ASNs   |
+--------------------+---------------+---------------+
|      Deployed      |   290 ( 11.0%)|   387 ( 80.5%)|
|    Not Deployed    | 2,272 ( 85.8%)|    62 ( 12.9%)|
| Partially Deployed |    86 (  3.2%)|    32 (  6.7%)|
+--------------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="osav-pfx-deployment">
          <name>OSAV deployment status across IPv4 /24 and IPv6 /48 prefixes.</name>
          <artwork><![CDATA[
+--------------------+-----------------+------------------+
|      Category      |  IPv4 Prefixes  |  IPv6 Prefixes   |
+--------------------+-----------------+------------------+
|      Deployed      |    795 ( 11.2%) |   2,904 ( 96.0%) |
|    Not deployed    |  6,211 ( 87.7%) |     112 (  3.7%) |
| Partially Deployed |     73 (  1.0%) |      10 (  0.3%) |
+--------------------+-----------------+------------------+
]]></artwork>
        </figure>
        <t><xref target="osav-granularity"/> presents the filtering granularity observed for OSAV deployment in IPv4 networks. Prefix lengths between /16 and /24 account for 67.71% of the observed deployment, corresponding to common IPv4 allocation units for ASes. This distribution is consistent with OSAV being predominantly deployed at AS border routers, where filtering is typically performed using aggregated address blocks, rather than at access-facing routers that would require finer-grained prefix filtering.</t>
        <figure anchor="osav-granularity">
          <name>OSAV filtering granularity in IPv4 networks.</name>
          <artwork><![CDATA[
+-------------+------------+
| Granularity | Percentage |
+-------------+------------+
|     /8      |    0.00 %  |
|     /9      |    0.00 %  |
|     /10     |    0.62 %  |
|     /11     |    0.00 %  |
|     /12     |    2.48 %  |
|     /13     |    0.62 %  |
|     /14     |    0.62 %  |
|     /15     |    4.35 %  |
|     /16     |   17.39 %  |
|     /17     |    5.59 %  |
|     /18     |    3.73 %  |
|     /19     |    5.59 %  |
|     /20     |    5.59 %  |
|     /21     |    3.11 %  |
|     /22     |    9.32 %  |
|     /23     |    5.59 %  |
|     /24     |   11.80 %  |
|     /25     |    4.35 %  |
|     /26     |    4.35 %  |
|     /27     |    2.48 %  |
|     /28     |    4.35 %  |
|     /29     |    4.97 %  |
|     /30     |    2.48 %  |
|     /31     |    0.62 %  |
+-------------+------------+
]]></artwork>
        </figure>
        <t><xref target="isav-granularity"/> shows the observed filtering granularity for ISAV deployment. Notably, 44.48% of networks implement spoofing filters at /29–/30 granularity, which is consistent with the recommendations in IETF BCP 38. This pattern suggests that ISAV is predominantly deployed at access-facing interfaces, where fine-grained prefix filtering is operationally feasible.</t>
        <figure anchor="isav-granularity">
          <name>ISAV filtering granularity in IPv4 networks.</name>
          <artwork><![CDATA[
+-------------+------------+
| Granularity | Percentage |
+-------------+------------+
|     /8      |    0.50 %  |
|     /9      |    2.26 %  |
|     /10     |    5.31 %  |
|     /11     |    4.86 %  |
|     /12     |    4.57 %  |
|     /13     |    3.58 %  |
|     /14     |    3.64 %  |
|     /15     |    7.41 %  |
|     /16     |    2.59 %  |
|     /17     |    2.67 %  |
|     /18     |    2.09 %  |
|     /19     |    1.57 %  |
|     /20     |    1.16 %  |
|     /21     |    2.28 %  |
|     /22     |    1.45 %  |
|     /23     |    2.73 %  |
|     /24     |    1.47 %  |
|     /25     |    1.02 %  |
|     /26     |    1.27 %  |
|     /27     |    1.31 %  |
|     /28     |    1.78 %  |
|     /29     |   24.53 %  |
|     /30     |   19.95 %  |
+-------------+------------+
]]></artwork>
        </figure>
        <t><xref target="osav-depth"/> characterizes the depth of OSAV filtering. We observe that 96.28% of OSAV deployment occurs within 2 IP hops from the traffic source, with no observable deployment beyond 10 hops. This result suggests that OSAV is typically enforced close to network edges.</t>
        <figure anchor="osav-depth">
          <name>OSAV filtering depth in IPv4 networks.</name>
          <artwork><![CDATA[
+-------+------------+
|  Hop  | Percentage |
+-------+------------+
|   1   |   87.55 %  |
|   2   |    8.73 %  |
|   3   |    1.21 %  |
|   4   |    0.61 %  |
|   5   |    0.61 %  |
|   6   |    0.52 %  |
|   7   |    0.52 %  |
|   8   |    0.17 %  |
|   9   |    0.09 %  |
|  10   |    0.00 %  |
+-------+------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="deployment-in-countriesregions">
        <name>Deployment in Countries/Regions</name>
        <t>The global distribution of SAV deployment is summarized in <xref target="isav-country"/> and <xref target="osav-country"/>. We analyze the top 20 countries/regions with the most tested prefixes and observe distinct deployment patterns. Canada, China, and the United States exhibit relatively higher OSAV deployment ratios, while India, Bangladesh, and Ecuador show limited observable OSAV deployment. Brazil also exhibits relatively low OSAV deployment ratios with 2,210 prefixes tested. ISAV deployment remains limited in most regions; however, South Korea and Egypt stand out as notable exceptions with substantially higher ISAV deployment ratios.</t>
        <t>Note that these ratios should not be interpreted as rankings, as measurement coverage vary significantly across countries.</t>
        <figure anchor="isav-country">
          <name>ISAV deployment among countries/regions.</name>
          <artwork><![CDATA[
+--------------------+----------------------+------------------------+
|      Country       | ISAV Tested Prefixes | ISAV Deployment Ratio  |
+--------------------+----------------------+------------------------+
|         KR         |                45,709|            73.9%       |
|         EG         |                 9,923|            71.4%       |
|         TW         |                11,757|            68.6%       |
|         VN         |                 9,101|            55.5%       |
|         PL         |                12,921|            53.3%       |
|         FR         |                14,123|            43.8%       |
|         DE         |                17,631|            27.3%       |
|         US         |               180,683|            24.7%       |
|         CA         |                 9,507|            23.8%       |
|         BR         |                26,366|            22.7%       |
|         GB         |                10,883|            18.7%       |
|         RU         |                45,055|            15.7%       |
|         AU         |                11,022|            14.3%       |
|         JP         |                23,134|            12.5%       |
|         IT         |                15,400|            10.5%       |
|         IN         |                16,891|             7.1%       |
|         CN         |                96,451|             5.9%       |
|         ID         |                13,797|             5.4%       |
|         MX         |                11,193|             4.7%       |
|         DZ         |                11,093|             0.9%       |
+--------------------+----------------------+------------------------+
]]></artwork>
        </figure>
        <figure anchor="osav-country">
          <name>OSAV deployment among countries/regions.</name>
          <artwork><![CDATA[
+--------------------+----------------------+------------------------+
|      Country       | OSAV Tested Prefixes | OSAV Deployment Ratio  |
+--------------------+----------------------+------------------------+
|         CA         |                   114|            50.0%       |
|         CN         |                   130|            43.1%       |
|         US         |                   339|            41.6%       |
|         CZ         |                    61|            26.2%       |
|         ES         |                    43|            23.3%       |
|         PL         |                    59|            20.3%       |
|         TR         |                   213|            19.7%       |
|         MX         |                    36|            19.4%       |
|         IT         |                   119|             9.2%       |
|         RU         |                    74|             5.4%       |
|         PK         |                    98|             5.1%       |
|         ZA         |                    65|             4.6%       |
|         BR         |                 2,210|             3.7%       |
|         ID         |                   382|             3.4%       |
|         NG         |                    36|             2.8%       |
|         AR         |                   216|             1.9%       |
|         PA         |                    77|             1.3%       |
|         IN         |                 1,276|             1.2%       |
|         BD         |                   584|             0.0%       |
|         EC         |                    71|             0.0%       |
+--------------------+----------------------+------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="comparison-between-isav-and-osav">
        <name>Comparison between ISAV and OSAV</name>
        <t><xref target="isav-asn-deployment"/> and <xref target="osav-asn-deployment"/> compare ISAV and OSAV deployment across ISP ASes, selecting the top 20 ASs with the most tested prefixes.</t>
        <t>For ISAV, several large providers, including Chunghwa Telecom (AS3462), SK Broadband (AS9318), Korea Telecom (AS4766), Telecom Egypt (AS8452), Charter Communications (AS10796, AS20115), and Comcast Cable Communications (AS7922), exhibit high deployment ratios.</t>
        <t>For OSAV, a smaller number of ASes, such as DigitalOcean (AS14061) and China Telecom (AS4134), demonstrate high OSAV deployment ratios across their tested /24 prefixes. Note that some ASes have relatively small numbers of tested prefixes, which may amplify extreme deployment ratios.</t>
        <figure anchor="isav-asn-deployment">
          <name>ISAV deployment ratio of ASes.</name>
          <artwork><![CDATA[
+----------+----------------------+------------------------+
|   ASN    | ISAV Tested Prefixes | ISAV Deployment Ratio  |
+----------+----------------------+------------------------+
|      3462|                 8,462|            93.3%       |
|      9318|                 7,537|            91.8%       |
|      4766|                26,312|            90.3%       |
|      8452|                 6,523|            84.3%       |
|     10796|                 6,809|            60.3%       |
|      7922|                 9,071|            59.7%       |
|     20115|                10,434|            56.8%       |
|       209|                 8,514|             9.9%       |
|      7018|                 6,559|             9.3%       |
|     12389|                 9,557|             8.7%       |
|      4812|                 6,052|             7.4%       |
|     16509|                 8,371|             6.1%       |
|      3269|                 7,196|             5.9%       |
|      4134|                23,992|             5.9%       |
|      4713|                 6,972|             5.4%       |
|      4837|                23,663|             4.0%       |
|      8151|                 7,988|             1.7%       |
|     36947|                11,064|             0.9%       |
|       749|                 9,636|             0.0%       |
|     45090|                 7,000|             0.0%       |
+----------+----------------------+------------------------+
]]></artwork>
        </figure>
        <figure anchor="osav-asn-deployment">
          <name>OSAV deployment ratio of ASes.</name>
          <artwork><![CDATA[
+----------+----------------------+------------------------+
|   ASN    | OSAV Tested Prefixes | OSAV Deployment Ratio  |
+----------+----------------------+------------------------+
|     14061|                    37|           100.0%       |
|      4134|                    42|            83.3%       |
|     17995|                    67|            77.6%       |
|      9121|                    31|            51.6%       |
|     15924|                    88|            20.5%       |
|     52965|                    31|             3.2%       |
|     52468|                    75|             1.3%       |
|    150008|                   101|             0.0%       |
|     23956|                    54|             0.0%       |
|    395582|                    51|             0.0%       |
|     58495|                    45|             0.0%       |
|     52419|                    43|             0.0%       |
|     34984|                    42|             0.0%       |
|     52444|                    38|             0.0%       |
|     18002|                    36|             0.0%       |
|     45804|                    35|             0.0%       |
|     18229|                    34|             0.0%       |
|     58678|                    32|             0.0%       |
|     52426|                    32|             0.0%       |
|     37403|                    29|             0.0%       |
+----------+----------------------+------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="impact-of-manrs-on-sav-deployment">
        <name>Impact of MANRS on SAV Deployment</name>
        <t>To examine the relationship between MANRS participation and the deployment of SAV, we analyze measurement results for both OSAV and ISAV deployments.</t>
        <t>For OSAV, MANRS-participating ASes exhibit a substantially higher proportion of Deployed networks compared to non-MANRS ASes (37.5% versus 10.1%). In contrast, the Not Deployed state is significantly more prevalent among non-MANRS ASes (86.3%) than among MANRS ASes (51.9%). A chi-squared test suggests that MANRS participation and OSAV deployment status are not independent.</t>
        <t>A similar trend is observed for ISAV. MANRS ASes show higher proportions of Deployed and Partially Deployed networks, while non-MANRS ASes are more likely to be classified as Not Deployed. The chi-squared test for ISAV also indicates a statistically significant association between MANRS participation and ISAV deployment status.</t>
        <t>Overall, these results indicate a strong statistical association between MANRS participation and the observed deployment of SAV mechanisms in both OSAV and ISAV scenarios. While this analysis does not establish causality, the measurements consistently show that ASes participating in MANRS are more likely to deploy SAV than those that do not.</t>
        <figure anchor="osav-manrs">
          <name>The impact of MANRS on OSAV deployment.</name>
          <artwork><![CDATA[
+-----------+---------------------+-----------------+--------------------+
|           | Consistent Presence | Partial Absence | Consistent Absence |
+-----------+---------------------+-----------------+--------------------+
| MANRS     |         117 (37.5%) |      33 (10.6%) |        162 (51.9%) |
| Non-MANRS |         314 (10.1%) |      113 (3.6%) |      2,694 (86.3%) |
+-----------+---------------------+-----------------+--------------------+
]]></artwork>
        </figure>
        <figure anchor="isav-manrs">
          <name>The impact of MANRS on ISAV deployment.</name>
          <artwork><![CDATA[
+-----------+---------------------+-----------------+--------------------+
|           | Consistent Presence | Partial Absence | Consistent Absence |
+-----------+---------------------+-----------------+--------------------+
| MANRS     |         124 (18.6%) |     339 (50.7%) |        205 (30.7%) |
| Non-MANRS |       2,902 (12.1%) |   9,561 (39.8%) |     11,565 (48.1%) |
+-----------+---------------------+-----------------+--------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="spoofer" target="https://spoofer.caida.org/">
          <front>
            <title>Spoofer project</title>
            <author>
              <organization>CAIDA</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="savt" target="https://ki3.org.cn/#/sav-t">
          <front>
            <title>SAV-T project</title>
            <author>
              <organization>KI3</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="DNAT" target="https://datatracker.ietf.org/doc/draft-wang-savnet-remote-measurement-osav/">
          <front>
            <title>Remote Measurement of Outbound Source Address Validation Deployment</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="dns-proxy" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-kuhrer.pdf">
          <front>
            <title>Exit from hell? Reducing the impact of amplification DDoS attacks</title>
            <author>
              <organization>Marc Kuhrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="dns-resolver" target="https://ieeexplore.ieee.org/document/10082958">
          <front>
            <title>The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation</title>
            <author>
              <organization>Yevheniya Nosyk, Maciej Korczynski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="ICMPv6" target="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s49_paper.pdf">
          <front>
            <title>Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels</title>
            <author>
              <organization>Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="SMap" target="https://dl.acm.org/doi/10.1145/3485832.3485917">
          <front>
            <title>Smap: Internet-wide Scanning for Spoofing</title>
            <author>
              <organization>Tianxiang Dai, Haya Shulman</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19y3LcSJLgnWb6h9iSlTXZykwmkG91VfVQpFTFLolik6yq
qZ6daUNmgploIYFsAEmKEmttzeaye94f2MP+wt72tB+w8w/9Jevu8UBEIAAm
Kammq3vS+iECCA8PDw9/hYdHu91+tJMXQTL/YxCnSfiUFdkmfLQTrTP6Z174
3e6k6z/amQXFUxYllyl7zA6X4ewNtNtMV1GeR2lS3Kyh6fHzixePdoIsDJ6y
r8MkzIKY/dPZ89OXB4fP//nRzvUCPkmKMEvCgj1PFlEShlmULNhFkL9hL9Js
Bh0/2pmnsyRYAbh5FlwW7esgWbTz4Ko9D9dxerMKk6INCBebvI1oPdopoiKG
r8/TDQBgB/N5FuY5+z6Io3lQAG7sSDVk59QQcJxOs/AKGh18D6/Nt+zRTgx9
PmVhguCDTbFMs6ePdtow+hyadNgP8PrRDmMczfPlJojUszSDln9YpslisQmS
2SZhL4NpmgVFmt3g+1lU3Dxlz8LoTxFvMEs3SZHBs8NllAQMqLvJQ3bx8ojt
hm9n4bpg3327B2Dlh9QrNgxXQRQ/ZUifHFH4h3eLWRxMO+F805klCt+jDnsZ
ldgeBYn4mzC9yAENaM2+S6KrMMsBu0+CZZHidCT/UIj+bCxfdpCpkhLPl5F6
8LOTNI5m0HUNPc9Mep5tossQeFij6c+LanZZgyiQ9JtQJ2gi/v5ZJ34ZtuPI
Me+PdpI0W8ECvQqf4udnLw77/X4P/o0yRn+Tr9P0Mszo34wVQbYIQRIti2Kd
P93fF287swD4qwND2xffCanAX7N1lv4pnBX8nVrS+Adrc4IcHhwfHfBHIDeg
qd/1+9R/cFXUdP4m6mGXMKD9x/soowqz84Pv2xdbdP3tcc/V8SpIsrym5+vr
6w69pyGDQE3X+f5iE83D/SApIqIKUNwkxquDk7NzdrxaxyHKOy4dv8ZGDchR
Ixd6RycHFzXYwYdBkQWzNzAxUVhcEpIg1/dNkQ5ot7NwlRZhexUG+SYjtNop
vDIRP6OP2KvyI5ZestebYgpMN99O9LuGME/yNkzP25sGKgO7J9FbGkF+kxfh
av8yisN8f5YmwFhhMgv3+Sd5ONtksHy8/j780+u318E6zNpvNssMyLCeXxpD
+uz526hgl1m6giUSx7+FMc43M9SGxTJk0WodzGiQAcxWdBnNxHiO0nMWFAWQ
Nv+sadKCbMa+pZ5b7GKZroKcfbNZAz4g2lqwlrMoLyJQBWdpnqfXLQYGAH6X
wQBBTKTxuxZItmXWLqUDe5bOlpuVSUZPkREon8ZXtcs0CsPwLcxFFnbwn5Ih
Njg1+163O/Yng7FJoAugw2Gc5uEcaMOBs1O+lp4KVpDk0qYZSHac3MEWTZT7
MbwC2R/dBOwkzW/etICUsyj8E/sWzJN3N0n+Jmqx3wd5tGIvwVxqEaVBsp6/
uQa7Bz5/Fqxh+QGz/g6UQBwCHQ+SefYOIBxt5oHFhLTsjw9fnV4NGzgwmed5
O79ZrdM82qyIdNfrNvBfgcTbwNCDeb6P4Pa7/j5+jf/+Y96f/JFYsMp7PwJl
YOo3YIuxKGevbpCwU5g8ja7HgBQ7CYvrNHuTs6soIETZGeAOumQVFfjROcgO
4KYgScK4kSGBWAt2GiQt9rsoWIK99CPIgJZQSi1QmVEM7LggMwoehzdByk4i
ePM16FGgYwSziW9+DNJ3qF6h5cZFzPNXwbpOKMWdYLYSnBcB03U8rz/Y7/XH
g3HP7+D/T7yRSajzFYBTRmv7God7PoPh4uBBTXH9An80jf0CRvaWRncUAPd8
EwBzgdEYg/y2huChXmy32yyY5ig/C/z7YglTJNcKapMrwCJnAcs3q1UAGhdY
fhVCv/OcUFoZS6O0mhm3mvHznK+MQKyMK7UyWuw6KpYgDVgKy+0qCq/x86jI
q3A67LhgYETDNwghi1KA7cYjlYIapMw+vInEAm1AI0pm8WaOjUPobhpH+RLk
QJGmcQ42z5uQq2up3kF+5ewaxCj+fxbOAMv4Bkm1JvHBdQzTdIxEtMOe3YDl
sppGNKOAxiaGwZJYBuqBpTOPLknMqyYtTlY5Hym+xtkAKOssBNmRg8Q0yIff
b0F7ncTBLAPBTC0l83Ukb6yi+TwmT+kxvsxS0BvYHp8cnzKp+lsMtBJRcI2K
GEZFU2t2H2IfQQHDYUlasCm4Qsg3KcdZtF+medFCOQECT44Hv2uT34hfSNUH
r8D5g65gWRu4S1nsGPUuWEl7CB10XpoBxIK4ByavAEmP0BMphGhatCFKTQjg
wyvyNqHJMon+vIFxLQOYhmkI6kzxAYxLdBzyAZpI4dDAPgFlq/PfwWyGLw9T
JHUMcicv2O7B4cu9FtskoJfhzzPsHXjlNAACgx8LqoCa7m7OTl/sceX6fZQV
G8Awg8VAqMOzS+3T789e7DHk9LBDXikIGcAe/q8IF2kWvQP0owQn5hr+C942
GPhqWeH3u6+JjghWLi96fIyPOwzfAi/nM+gvFyb1XHEGdADeeECIEZGRVWAO
A0l7ggtSB74ICW8WvsWphQHxpzSXsDauQZDDvGNvl7BEkMFgjsFiKrirb/cc
ZFl0pbpVQPnM5JITBRYdLg5DYcjCmgUbBv0EWHyw7Oa4EA32MFh2BWyMq3QF
CMlZEPzaEuODViRZQYTAd8D+gGlAiwsxQZ23QN5RHQh2Ye/fky3+008tBgYh
4B4sNMZlKShhdAFpPJE0vxknUobIRRlLrxMMr2TAUBksaBBUhBQggR5XJnDE
74PkBhQvasX2N+kKUDwvNlN2uMkL+CtTOhvcv/QaOZOko2tQLVr0AYhNTtBV
uJoiDS/TOE6vAS9YleXw6xCXy5MjmCYgeb3O8HMyXmPO8NDjwTlQdh1kRTSL
1khEYC/qtcMOOHYoekm4wsixYxYDjyAUU7K+SdLrOJwvQmiyEKsHpxckUGZq
OWL5RplK7ACruLjpVDVtEK1owoTGrYh4Eu/g3W8Ku6eK9EOeBQ8tmuW0Bjd5
TsuZU7jsEAYOBkOQaKsd+BM4N4Bv85BmIidMfw0Sj09MT5gB0KZO/VpmAHpO
gLAFp/8QOMdVOAMUCLMsmuJCIpUfxDfvQk53i07TAOmQcmrp2lnqYVjRQOm5
ro+l4ib99xhE7583EW+Vs5dgY22CRSjFxJvwhgFrwkA+e/Xd+cVnLf7/7OQ1
/fvs+e+/Oz57foT/Pv/m4OVL9Y8d8cX5N6+/e3lU/qtsefj61avnJ0e8MTxl
xqOdz14d/PgZXxCfvT69OH59cvDyM/eMwyxPcTUArwBz4VIJ8h1JQ+KSZ4en
//d/en2QMv/p7MWh73mTn34Sf4y9UR/+uAae1JYf/xPodbMTgM8XoMVFa3EW
rKMiiHOSCPkSRQ4ut87Ozq//CSnzz0/ZF9PZ2ut/JR7ggI2HkmbGQ6JZ9Uml
MSei45GjG0VN47lFaRPfgx+NvyXdtYdf/DYGCc/a3vi3X+1wC+oizFZRksbp
4gYfvH96lYNuCn96tHMuVNUpqSqw6Z+yA6G3uCkFq2MRKisWFI8wJHC9g00V
CVOx8l4qJAELGALFMFlV4QJ0zArFo/Z5kOfRIuH2i7TLwKtDdMsQiFBJhCby
/jQEAyiC9XtNArXU5PM05B0Ka6CiknPkTLniVDPRN0g7VLTUufKzP1XfojOX
FbBF7IdbRAqpFZiGIFrzlbB462yhEoWgZvDcJTJJUI/F8QdiYXVsICWweKHM
q6+zINnEAdriqstF+azR/wCH7lKz1PRmwKL745bBDwGaCLnCl0sxwlp4kDeq
Cxqp5VoEqxBAgm4Fm+stSiP0MVEeqTWkjJfo/lhBL+gFopY2nB8dqyB3+QAa
rgQm0BzAEl/4KqlgbM7EUbgulmoONKU3xxdiIraZB/49jLXXciGseVKR9NKB
j3rgta1hkNfBTclGXHCQVlcWwAFFLKKC29FHJ+fsBOYGDE4Mt+0ewIM9Ifrw
nXhOVFqm8TwXRsEl2eJXIRmZmbAcgHYpmS6omADZdZrMiagICXy0LApzYUeS
C4rfEk4ol7dY4Ho4+BU3C0jzp9KWQPmD9qQugYhAOY2/xU069AdgcQU4JxVv
H4kKGCPlKmu0IiMjckKEIp4SrRQKRH8LAPges6W9wHVJR7yDRhMMHdQ4fKwM
VvBv89Kz7dWYbK9NiwsWUyfstNgsjjDQzu0v3rLFKBBuPKOBYJjfeCpNr0Md
CKc/MZS0LGDi37/HWH5bdHcZLWBS0Ema3gikyEszTD/+LRqFAQUepDEdgDeO
xpEgDV8L4mP0ldFPuQrB+FnQxnPBvSfnvFWluaMD3DxLZjCZEWlowPAGG8Yw
DYmaVBsyxRxoVlFbN8zrQZynlSHkIbcCwAII20XajnFB7V5cvNwjcWH1FSUz
TjKQeTec54rlhi9ILbCwDri0cfGfiDHQmLipGTAUGBRgw/hjSM4bTfh/UT8Z
6TTI9WjnSdv1e8Jqf84GTx7t3FbeIZBbreWut6cDqjSg7zmgW0ng41OPscfw
8taJJ/3g1VePMZaAkR7wMQnybRNGL0AEPJWGoBTJ/NWtFJbHp74OqPrDpxfp
U/hf/LTyyj20g3PPCajmhw38ysOPOGvc4xLEVosR1x+FqsPCxcNiJZYUf7TD
iZbftTpNhnz/lD2uShoexf/ys4OEhW9xH42gGbKP5KMmfjqf/YRDeQYy5DIq
w2EaklOAeUOao1y4SuTY4+NGRwZtMgzUlzZ9mEubx47HKrnjtnnEkhUoz1GS
ck2DH14vI1ARrlXONc1dEu88WkXQD47Ptj8a+wVxzy6DBh2nAncUg7sMVrhX
IAiIMX3SsksrqC83zkGLiE1+VB18jFnYjoNNQnIWxJbf9QYgVK32ogPOg3KH
wsGCJXsK3kNDpAgo1Dm94a4aR4WLWSNsUR0v2Z2qpYDZ0sFQeGsak2MT4S4y
F9rOCRdxLOgNJXmOYpmCzbKDXJm43FpwkzBccbOHhDrviCKapZ1EfhpfDdJD
0exJ4I11GM1oIzo2+J9T18n4+TqcRfg5m+G2P7wGXSbChBii0JzgX+X4Dpbp
OoJlgJ/w3Ub+cBaGczI/8jxYALZRHCtvg+ZPE9mc3h32TJ+kGLcCgfMQHDAf
7fSIaaJuBGRrlpDny+lJNhgcxflwWNaCGNMQVEGVJzDMIzy9cK7WgnumsjCO
eND8Ko03SRGGPGxMMHmHK3Rj1mmUlBstagkfo4eoWqJFivZBriOpYvsiUKxM
6wtguzwWbitYfXulsWXiShOQhbhdIwgGbAhCi/un0BL45iqahZpVYpNkBdSD
KZzGKfytFkvZFKYCJCo3nNG6M1mzw442KixAm7JmXBLg4FSmm8USRA5qAgRC
WyfwMA+QZSkgfY18XwBrlDi4p4WEjN9v8QAbj/oug/hSyNKVCUny3nozjaOZ
IffV9H973DMThFDOBVfFTz+BF5unGMfOEFi+WSOhlTWvaatcokV0Fg4BbnXO
VbBU+xa38GdZej3nKmdO2JKJCHOOKVcqqHqqeQKlYf/+vUqXARxLPl1FOQ/4
oNcLnh1+EfG9m3WYIWDXBixGj8utGtoEAK7a4LZ3wYX6+/fcIyndBjtMDMse
9z5R1HMBQKYGbs/TpgdhExj+baJ8W86bykXFF+CXbIoyRkXGvABM+7lupYlz
KfoEEZ7lhTJ6pJt7IzdL9M644JL0uql1c7jDxr1stdHmCCaWnQldqkBroZR5
uWrUrOG2lAaDmpDXQ6tceBL0moNXeMuMHxIouB5wcS7kRkFt1JOggKASsXAQ
oy2zc2DSEHiA5tKQGqA0wNl1QFZTZgaZKlN17HKDZPyVC2g04zkM0k3FskRO
Gy+G0rkjjvuzXNuZhmwt3/HYFEGyWaLDXsD8knp19zkH5TjDzAYRTFHRNMny
eYRSuJH8JZ/YlorRn2AiAbl0hi/1xxJEXnIEoJWH5kRJBNCcUOEVpTl1rq5D
1YzxARy53ctj4rRQk9QOdjjd1m1/D3dvH+bWai5tszsrSY/+bI07y91YvpZs
77PJjSUX2cLgsY0B//2L7kWyivt6a74V/9LdVt1Vdbitmrt6y3b9PQngg2dB
70KOuldtbiGj6GMCkKP2anuUJJZf9iSA3f6ePe7q9Kj5uWV6x9ZHyAG35crF
8Tz+gj9+whq4vq6/O5qIn8EBjU0OznuV1taIrF8tKbdbwxo6T8yxqd9ub0//
DDHDUDf8H5KujmmeGE+5GSfXY1Xpk1ZA5jB3GoTMVuru0c4urJs9bkjwRSuU
bm5qXVtGt0q9I0BT/pcUohkm4CciDQbQ4B0oNhH/yCt2yQYz9QEU16C2ElM+
shHTV4rJVEiOKI1u0rnjM3oYuiY8c5JSAlfAvQ+3jhNWVc6NaczKmZdJFeaI
pdcm0t3sCQK1mvLeLC0nYyJBQXEIzQrIBGWkSVzaPIBpxFNvCpnoAporCbkm
A1N4XmtPW2jqmygc5RX2AA5IMAfWCEVImSL45Zf6TGFGAOKLQV4KR0gy0g44
pU5hmCcJleVUo6wD0/rciOhE4ByK0OZy3Qhfkm/W2WaEyEXdJOHbNaAd2imj
pOJPq/sWOPQQM7MingkKtkJSRJc3ZSqhnvXITQbObOQYS3dFWFXoFVwGUczT
t2pAlTBwoUVk7kzDWQDEILOJQ9d26Jr2NZzESVKDOjIUhl0BR5Art4nyJc2k
Mq+CqeaZ3+VtSP9P2/LR3T98DJ5ftMKMKCE5HJtGMPOYx8e5tPS+RedFOkvj
liKjI68oTsVhB5GoxD01u4EzWkZhKi1KpXDmjhkXOxRbLsVHlqYY6sFTTZhI
XbP4gMrwCs98EIy5sRQwbLF7RBETEb0gf1bbBiOKcvpo/iwFwQLph3A5khP1
WbaJZTjqqIyKcBdLkl5GznRUyDujeEwhF4lMyoxDPizHJjJGUhHwXBn6PN8P
59nyuDHPdgEfVLYF+S4cCttNEcXROyAnxW/knAMe+Qb4FbSRDDxdRCB9T8V7
tntyccoTWC8OTzVWQeGWRYuF2wHnIl0KRSvMRAxdxVTwUiQIWdlrx0nJeSyc
9sMIAxU4pbnVJiWXcoRTHSFinBHAxyLOaWzHEWItsU1n7NIVwRv4GJbPHft0
8AXw/HxDoVW1DaiODlFWbEw4XAUxpkLDgESGb2wGi2PMXhYCBUXMMl1b7pWw
XfDoCfEXjxSXFFtigplISrzQpGPtEjUFHLeaVpu4iEj9W1hyDaBC97ZPG/L8
fW6xaDsr8z8FMxEbRpfEmenhWl0kbp1bxlK3566dGrWVgCIF5Yi5HxjmMuRa
H+UP7I0gKfplgoBQAmTe/507tjRjn8qx1X8PcmxtAJVHn9yx3f5X49je0ZmG
lsOxtXuo9WnVe8b2/3N961uD9ZVnq+FxW+N+3tW3+OoWncF6CHc/ru9feb7O
1kdhQVtzMZipBW59u4DcNQOWoKrzSoWJISP/yjVVvk4pBLk3ysGobFeQRRzP
alC2AtM4KgJ+ZCpklu0KVm0it0Oo6e8af5CfhHpouhj32EKVA1ZmT9Wnjx0L
a558NhnzB1Ksqpt/gsT8NKJxnqZA22CbPDE6JBOK9DLp5JoAcfMe7fxji0Jl
bDzjmfKUVJXXOACIbF0yg5YJFZm7x8dWWj+Z+9IT2i5/bfAR8tdkaMN6zI/X
2g9Pj4+qqW6nry6+O3p4rlv0yXLdHOMloxCNDcfut8pYrCxWmXBD8MTelcVs
BDNhZq5K1aLScldMg0yECsTY1A5Bla9bfAG42BB5o/TMcZeeuOk1rpDrCH3f
ulZmiw8xlNTvrznTDRuUmW4lH2yZ6SZT43wCXZpiMnHNkzq4tKR8cDiTMFos
p7BQmzFyD60h063y+2vOdKssOpXr1rDkWqXgf7Sjlgju7+dKA0QFcbLannNo
BIc2rQqfLdLfbG0h099SEcm8Mx9LDseRzcCTGHjyQqWjXESvWjzXtJLYgNI8
vjGzYDrsB6SblhYjslsM+k4Rd+oOUatmTGAujkhLKPODaIlrmb/a0QNNlkWq
R2Hu8CwaMJ3K3XrcgwYdR053QCeHIxWPU8dZys3MFoOOErWDLqdZE6fG4UiH
HqDoAMrKGm2cq1NnM2hVHpszdGWp0R4kLbeQkPY6q7FrxRKD5W2tenvB0xeV
ZS7X+m1F9jja22g80dvje2lE49fieyWPb9X/qR2VW7u92hoEaWzLYv43yGCm
ZOHju/AnESy2K0v8n5Qfae0rRGEkeR2ObOVbp6zcfv7YPZ1RcoPv1+T7rT8n
NB9LttoaI7Ub2LSz6ehJMbAtncO367bMdWojX7mFs2XC1ojn9+8r4EASoyGK
23L3gMd4Spf86qefzGwmEBy4Cmt2NgMZ5tL234A55baEdobKZavtwurdazmS
iahTX5mRdrvyBCHfcDmmDQJ3uozcONEVqLYbdxK+Leqacus54RHscuCALlbO
0XQ/8Qn6LNR+w89vXWCQFDfrSg1itTDMYi1PTG7b2CSp3Smy6YNCUdFIJvo6
DYhHOxU1ZyGpuY4lIbWkHLHHSDUE8nyz0vZkbbQ4Ji4vINeylrJQ5oWWe11N
JABKg/+94VaTe19OkEBVnLEqN9AghKuUpEm7wiba4TmxKvQTjMIH14/+Ht8x
4fo6EtsaZQqWE4WWvUTCt1G9C29ZDNFllZ+0eS3z0GS35tzCMLAOSsPMauuw
wx5qQZyfvn794vkRofn7756f/UiQTuo+NykKvMLJWXkT8BePdl4zdtQosrf+
PSG0TipdNXskdS9IU5/Tv4NyEFoLHlRDsW0BkxZj+Q6And+v+2bMThn7ffXF
A0iGFWZhAr5jH4tmAOw5/Vufea3FJsEaIUkFmJNmLxg7u0f3zZgBWj9WXzyQ
zzjHVm0JpdTFEmxjOSBpTxzGWC1A1QvkNgDV0lBJ6bosyIVJ4cq+dvYj0rDx
tAjuA5I2DGiLC32zspJWVZCiO+aUb6KAyAuMo3KlZrKJnr4CiJGDp+Q42VIG
aPkUt5sXC5HiXi++nPaE9GrtlNh0HSZlvZM0mbvwNVU6nRfA8i2fGrcZlUoU
2F0so+weyD2UeFo0nAt/mEZgCZk17bYi8PSKZoZRsozoTSjt7bS/3BYX6Qbz
hpC0dHuNWLAZxuUIcFX8/r2oRovcTpvnc674Y6x7SLhMYRquoznlJxmFvGYi
vE7liPg5Oa24FkeAhVlGYW556ojirfA8SUHVUt2VsieKxeNpCVdTDDhI+GEu
iFmWCATUKf7CI+7qtNm99xpsypsn4AoTQ0I4FhUi5b4EHfyjMx/whRZYxn2X
hB8XLU99GWNUx70u6WTN7A03yVS5q1PwZSKE9fzPm2hNbs3u4elzlYrDJZMy
82QXs2VKWyJ4LIy8kAwmkpeXUwnrNQaWMPGgE7lnRqPN7ztdFC6ymZhKdV0F
SYFDp0NebPf7070Od/wQKmff9irH+FsptUVlK3O3wy54yDiIqyH6ej+EPHU+
oJSrWFm4p55w/biwQZdCHAdwHH7B+lQZ2tY8+1KIDLJbTqj5yZNXVZLnxtk4
eY5HJcVpiBsn27EzkdOSza4AP/hfn38B/+pJYqZTcXoTU1tCcRbZOBKItXmE
iVtdEvdwXnB9Y1WwgHarXDg93Cg2fttsQtw3lq0bG44we7MNpEXf7JwObtba
obVmcE+0DzcJ5b1QIqPalrjV8kNu7wQH//n+VGxeaCv64lbH7sm9sHvMP3wi
40nGYG163W0/1gTg3BsVHzKzd2NUjyTTI2BaoPHEtaJrUPmqDoc8mz3FAOk8
L55e3IUDiRjmfYRRfKFGgcuVD+Q5SelXUkqXA3nigPDhOHz6uajhio85F/5H
HYVTR9xjFDgAo9CC0GDGgD7RXBgc5f9COer2H+0fOz98fnJwdvyaeazyUv1+
AVzdqmPrT742P5Sra9jaN9j65+cHv5kfuHzo/cI1jhNC0w8o9GH88FUdhO35
4W4IDx1FlR+2+306Sdu7j6S1g2imI+XejTN8qZq9OFfgzHbSWkzlfmOqIF8e
6Cm13GwdZHptE7HHQB6VdJUNN7p2f0ilmoApLDbEwH3JE5GrWZo/lpNqHeLj
R/URJfTTDPSnYU6BBrUhcoLBh2lY7u2Eb4Eybr531FCtq8KIvslukkZlsZs9
g0paPmQe4WmCIAnTTR7f8A3NsnSLa7hRzfB42RaqCU5uOSp3VSOprMVaIYqA
V2AIznjx4VTw2a7lgNbR4R4DtxF1jJsfOTg0HF3l4dImEz35Sv6twhr6QX0Z
RXRVxyl3K8sgQJWA28QkRQVQe8Ovwwzs/Qr2Pvuigj2FBgzcrSxezNNSaFfH
Vj8SFdPQKkHdsVXJZzSYRrEoC1WeJKlrUhlHMMPqnNohV17pnYiCB85E9Pj4
ksvXL1jwax7TUJmaBpkrHf+Gt38ew0ItyUpAeg4gKjR8JzSx2X3fwfOaIMDM
BVV5FuFxWe2KisxfgkRNaTkHV2kEM5firTp4gIpKcosrnnjM8TLIi7aqciJH
ESZXUZYmIm8tD4oo58cUuzh2+K/HY0A8Al0mHpfxZ5WCzpPB1dYNP9iETSqx
7SgvmXIRp1PzLBhgT60oVobnxt7kTF2rhunGVL9IEoqiLepkICUzvn+PF+lg
kPDr6IoOKYokx5pQvMgIqcXEOvVFKlYELEs8+XBlWV0tbDO9qdxlosQvYcUP
o+P2grjFhU7I8kNuievEmSr55oYnTpSp5azhYgtlp+blWepGFrWdQ91hB5fA
X7ht4ERQ5J4IQVKSRkclFdrWomOwwEK67mo3uVGeVJZCgn9jpfxNPOcRYTV9
xne/ynkvdNOfOAepX9wQaUVJK6JnXt4hIHQmweIDsJMsfqWP86NkcVfip+rN
tuE2l6+h55RtG0F1ZS7eGnC2C51WMqyfVOBsFTOVLzBeqmWC2/jcGSxV+Dyp
xcemSS0c++3tJ5ivJhycP/llLYzjXAhAY5ng3ZiwmH97Fwy77kjd76s78fgY
YxG/M26mtsDvPD79Up2jvAvGlkP5Wcdypuom4Ox8+Y/ml1wOOY5Bbj0v7fuN
pdPpPHws+Dtp+1x65g+H8cF4/O3yh5nHI/jjBGCgAyJu6IBF/jD+yGT7Ly93
i0ohqAeN5Umbtbf7z5NaGB+Rpq+43ZErzrDODTXD+Cvhj78ymvJf05L7BdC0
ac39YVsY915zH2dEjjCicucawoily1eb0G/CceR16KkcIItmovISAVTZOJr1
0dHz6aQZKICIasDivjTdcRCpZSqHBV8pkx7cqdcYPMDI88sQK4ec/3kTILjd
1y/P9xherRRgIvwCrXZ0M2Vui7h7UUlO6iPklYbzZbSGj4rrUAQHqFOJCV6F
kBdASlY85W++ZMGvC1hvU/jv//vfLfgv+8t/+z/shO12W+zf/vVfsJIaz+w/
kerRjpB9f9phP5QFPeR3ovhzkAWrkPI9ghab8lDNv/2rHIscw1y4ZNgERi+P
CwuHEzzhLN2skYavAOMh+zWCMKvCK8esWqrTRriSdmPUCdUm8A+lJwXmPObV
ERdSGpoMJnjVYiOyQpAF7QcWiDpJq1T36Vw0qE7+Kp2HsfJCXznDfjJ21qpG
pnrtPFqsAopLGbcCTiadUe9zmjMZD1KRkDKchR4mr1hD19Q8hcG0WY/Pw1/+
+/8CSuH//gBMxB/Wust2dLKFqyiRw97q4LI2TdInoHA8rSxYuzg7r8qKuJhP
2wIEv9LQa6EXgQf4YWaopFn5wat9v6PCS/oJdkd8SZY4QHzoslL4nB1hXasr
TAfdpeZ7qkxSefUNhY/5RWjsIk3Zs2gBX1882yujyXdy9RaRE1bGnS5IRpA0
s8v7qfNJOcMLK+fzMmbMd1jGQFEUnOJ7Qn4d3OA92Wqe7z5QJGJBlaNERCSV
nchDT/ONqLuLBJXVnjXMc16W7F6ICgFehngQtiQB3rwwC+vPxZAYMjIeYbYU
0uJ6s2p4S5FHxJ14sCjX+yxrQ9cM2xnD4Zmp1ILXkRJJnaoUl6JMAsK77F6c
gdausJJIwPqeBfdPoP6PaNJfQzRJRom2wedJDT42VZqjSXqTTxdN+lAb+Yyn
udlQzsMCrInDFMjPl08zFPXuI8SUPo7V74QiPJl7QdlyQD/3iEpH5uiFhyca
34Ve9csPmiNXfOnoxZdfer9tf/UhI3oV3EyFUvsEMy1VT4s5/NVf4kyL398o
7/qcd/3qlx+Pd5Fpu2jPUk9fPHBEfIkB63Nz7CPR5WNEfD6ODvD/QwfUQfkF
rKMeX0e96pcfXQd8whF9JCh/ozqghnV/kSPSebfPebe/JZR/B96txmG1uEd9
IFYPjjgisYyHYi1QD43FEhjlxGMQcxpHOUZIsLr1rBTj5SUOTRk2hksvOM/T
8l5CNYWe8uGPXrDdozT5VcFeZMEC0d1j00hdeJSHhRHoUN6yLNolhqBV3asN
KMjgzwqLY2UYDpBR2CjPKbLM01nkiUsX4rzoC9jP7MsvGR/bLlgk+FdpLlDY
jnT/noG8wDmXSJ+k1y0+OTz2TImN8pCfzKAqbzf8LpdlufgOlRG80IMumGxk
lJM283H4LX06hcrpJdoAFkQcSv6hyEUNidQsumKaeBSd1w2dG1QQM4u10/l1
CVMe9HgqVrQkXg/pCcTtlaSGdU+U5idNH+P95bKe53kRFJtcRBi/5nsMp9Gs
gDWAD48T9rsg2eC2gN/1h3Swkof8KWWPl5Dnpcq0LDarZqjg+mOMjiaYvkrX
89HhUFHRIFS3d+ApUK0pnT/W6hsYt8yVCXX5UzEmpJkdPUJsrgNR+Twv+K0R
ksQsmGUphuXjmAVXQRRTxqZeVe43wG/FFuBxchRUuhidkhmxioIJjqqRBlnB
r890Ao6SElljnBJdu9xeKKh+TWUyBYNgZQKsWsuLOOBNF4gjnnlHZhRl4im1
e2ZWlpA3qwTrdYxzU17Gss7Cy+gti8OrMO5Uq6QyqlQY5G1tCkUhQflyfflW
e4sJ9MNhZ/i5OD/ObzscdzuDz9WJcuKWOKC7JJGo9vl/SUydb5AO+mT4E7sP
b9DxzD5kdSssUyTmQtTGkTIlD2N54ljJlxbFRqUmwotkqDJg+zKY8ZnERNNg
FlZT3dw1KO/6Wx1JPQT0FqleVYbGdnB+kpd/D9XfH9yfZFTZn9fqDwdsl7Fe
Z/L5Hn7UG/j4d7/Th79FO33tUDt/0Op5E/iOph3aDVv9SRf+pknn7aqrg916
XssfYH80lXvYv++N4G+ayL0PGJ+z2qbJw8LksIsh5yQ85ZoU5A/5/UmKrcQ+
8L1n3vWkafqp+1Nan6L+DqFQPtmaB+7o2WIEbzxp9XwPZ4ZmHnvuj1vjYR8n
x8fJYrXcMOhNWsM+scOkM6LG/mjUGnrIESOPP6pjCdYftIb+EHlugDyIPQ+7
rUm/z9lCNP6gMTuZw5Rh9+COfXGdK83Mfn8s5KliEhCSaZMETR29G0YsSnjS
YPI2xhk/C2LV2lab8koc8hIlorwa2IVYPMbzOt1SaCrOhsd++RiHJEcBYnAZ
oRWqaS/74sayAKvRJWkRsPSmQLVEzPQS7DXMseT6D0dlDyNDfSU3oPCSzyxc
B8nsRpaai5LLeINEIGvJddkNL+/Blat9w5DdW5RYOOOGLs+0UBYFoUmld/BK
XsrFcNUz53vy3CisVvIQ12yhYiEaEyJys5qU8kweLEGE/tY0CwMZj+uf+I9r
lvHI1BAuWcL8lj9CDTQedMa8HRv6XAhNGjQLfjceck3mi3Y90mRDFCEfUbM4
1raQHTarOWTH35VSwf8ZTQacCXwu2mF+J10U7ZMh8oWhVOYGI4BN4XuokcYj
oVTw53k+n+RmpUJd9/BLj3fDUSKNxLqd3idQKi6xvj1jbKtU9DuJQGnwi90L
+5os/StlQaMkckvDvqY0TqVzkCyKZa50zL43JPwIzxllyRDAIUwON8ERA9WX
fiOEedsiiDu8YiKVaitWt8lhDSx+vQQtDqUPiiyabqRLoyklctxpQNOQTh5l
4TxdRUlAklwxE1jzB+dsykuE4U2K4DW1KtdkYSrNzZorDa38uDhntFhk4YIS
qtSJJ0D7DVZBD0RVIqxyZ/sNojfuf/DTO/KSDzy8meFs0iFO4ZEpdO5QBk8s
VrxlX2sTDksizPAgE2rGCpdX2+Jvf6yt2W6n22Wfs7Jyzv6k8S2sKu0tSGvz
rdfY1i/f+h3ge/NtrxFyv/HtoHzb7/QG1tuheuuNOr2J9XZUth10BvbbcfkW
BFHPejtpaut3G996OmSgnPlWo9Wk07PG6/caIZe0AmE8tmbBb6SVP2x8q9Gq
OoP+uLHtRH87GZlve90myD2Dr9TsN3O7U2jr0lKX2G55WhGZSkBHDgHNi34b
stENluxE28w+IUcArNg+eGVjErOl3YqxCq5O5MFaWQcNpA2Q9i//9X8gCY2r
/dSNpLYc5Rm/KJnDZC7CVDjS5xcv2LPDUzDeZO3CoMAIoFUQUgZX6mVwXUSl
FMVJWCsPRWlP8hQosZZd4i1HYD7/e0vKQYOk9Duwcmol5aDT8+olZb8zttv6
+tvBqF5S9joDW4729bfg1NdKylGnb2OlrX6/KguN1T+0sRrrb7t2W231e5UR
6ZLS63jDekkJdLaljq+37dtSp6e3teW3JimxrY3VQH/btWXwUH/r221H+lt7
9nVJ6XVG9ohKWvkw+71aSelNOpPBg2RhRXzpIZF7ycLSXOX3tYIcnC2DLJgh
iHfySnN6Ja4Q1kwfrHop71wj2QKegs9ln229pjPw3NXlnT7GtpfpOi+TUeUB
er4VJO5jT1LdzTfiKTd47BkWKUJRGbF4etoSd/Ku6NJkDPHwPoYoqMovWrmq
+sB80RA3dgiZb9I1qxVNLqHkiakHR2mgs7ov2WlsMnlPY1GdCfvyOahT/fmg
5vmwfD7QF8Ko5vm4fO7pS2NSPtdFBAlL22yso4NTsXMWc6t0dZOwi4EfG9tr
8NEhOjxY4Hr/LFygcpRZ++JEj+GmAKfabhbWL16tgowqyGq7LORIZTd2dLB8
TMshAJ13845vgBbAHSAaZwqhjCNUqnGq5FvwWskqqIfQ5arid5HPCh1DodaB
6w+ht3nQYoewpoKymvV3Ce12n/O9PBkj5IeEaC9FBPrc0T0ZLDsGJxCAPguS
RRzMw3zJO3g+2wRz3EHG+CEF88J5Q8iww55lwbso5htcApdcRwarlbgx4XTy
Wz6wl6IOp1anclFiFq7AIMkVSlHCqSto/hsQFCIOeg6u3pJ9m2ZhwEe0uFmT
o4903+D9GyqqG76dAe+Vc+aMl1Yw4UFSunUhLcrrHvJQjgtohw6mqKhCBhaM
rxAlgoLkDXA9VrLO3SHUK9wezqNFQqFTMt9EfEKx2sNClM2PjcCV4HomlBnR
4IIzsgpWicfa8jzD8d8nhrUtPvD7trx6oHwofv1Ba9SdGI9HuI0mv9fhPP+6
Hg6btCa+WYxvBIaHE87FD/VwPK81GoyMx8Mx7pg64HxfXt3hwsfrmoVcBwPc
y3XAOX3ZgI8P47Lg9Do9J5wXDXT2+i3Pok+/1xk74Rw9b4Azag17Jj7+qAaf
78qbOmw43rjbGo5NfMAkGznhHB7U4wN0HnTN+fLrxvWsgT7+sNUbDk04fg0+
Xz+rh+N1W2NrXN64Bs7Zd/VwYF10BwMTzqAGzkEDHODnrm8WsfX6NfP1u9N6
OH6v5fX6Jhy/hp+Py6qTVXwGrX63a8Lp1sFpWF/esDWeWIWSR5jH4IBz2ABn
Mmz1BxacQY38OS5v16ni02uNJiMbjlv+vCqrcrjmy5tYRUXr1sVReZLcOe82
nK4xro8l550ekLS9ajaEg1VKmV6W+fXwvZxttZGtHV+7tePrn1E7Nko3nEhz
1Q26uBXt4IYmLkc4PXPVgfR3r5YGqY2/Xs/U1n2vRjseNnAn/oaWFhniXroD
zvNmfGAgtvR3S7cmLYu/gTkuv1sD56JBi2A7z5L+k5rV2yQF8Ncb2nDc0qRJ
2mI7zxwXm9TQuUkb4W9k8mGtdDv9thnOZGzDcfPhH5rXBRua2hGkpJsPm7Q+
d2HMx72a+WqS/ths7Ntw3PQ5abJiWWXemV9jzRzcxYcWHK9Gq53eQefRyIbj
XhdN2hpT1EYVfNx8+KyZzoOxxYd18vD5YSMccA+a4Hwq7Zg6tKPtYzdrx8eP
ZZHXPE3K9CX9Lmh9KyXIk4YMqupbfs9LaF0urWMnNtzPT0WuqMgFFbUiRGjl
4PyOYAr5wS/Efg0CQRc6ZjGWnpV3O+Eec0RXMyL0w+UmWSyvA9DXMW6y4O2q
vf4QL1g9/5Y9y9JgPqV0+oPzSc8bw2MeSdA+74+GQ3gun/D4Ajwf9wcI5nAZ
ZJiwDvRdbRKRA5zjB153BJYiHkLvet5gjwdc4LMZFog5pIhEtdFo4iNUGebB
oERNNOKFyCpoaacLyqrGgsyb2RIDD0fRIiqC+PUsDBJCrd8denscIYw2GeMF
mx0wmIfAUSItjrCoieqIqYUpizI5X3pWG+2libAJ5VNTJhzV0tTCRjQAgb66
LkmbeT27GHOF8TpTLKAdrsIa8tQYhA80uw7OT7hQ+JDQyMNNPmTZqkAat+zH
E6chg5xdbT1qDXqmmJ54LrWB/O90fT2rb6fxg6uk2vewNbACC2OXg0kryNV6
bIV/hs6+cS25nP+uJcYHLnOLFq3LVe9bLu1g6FS2voUiH2VrYJnmYFo5VOyo
65oxoNqgYpg5qOb3xo6+J9DaUsvOIEN/7DlnrGtP5MhhrHjDgXvcPVt1Dl0m
XM8fOlqPwL212MDpbvftaAP+/F5rMvG3aT3yHBdzDFuTUaW1w0jrj63FJPoe
DiuOucP0GHt2PAF/o9ZkbLGB55ix3nDSr/aNzvywYva4zLlR38ktQ9uodBlN
fZjurgvzrhWwqTeVPlb4wDJLaqIIpCGkgmyOHXyoqviQOMGDVQVpdrePYPCI
13XawM4lRC/MRTB2KRpvNJlURSb+hiZ/jkYuv2vi+TWYW+LaFT3wBhPfjbm1
hHxX5HDgT2zX0N03JTlXW/eHDnENv9HAXr4VqnkDWCrO1vZegHMB+r3JwKEi
Eau7fR5oO7BdUNl6i77BraqZ7/5gi9Z+3w4zyNaVGGS1da8/sZ062drfqu++
u3VvfHdrb9ztuqm2ncgcd2v63oJq3tj33VSzF657xoYjN6f2tqOa7+a1bVr3
Rv2u++Yre0CfUlW4PNgal9qlKvCeCvB1Z3RDwquDk7NzPFdrSnTKUEjpUGOU
NJT05M3XmEU/i9bi+gmx6a/n2lBSA50dlukI+j6yvMQc0xjpAvDX0gm3VF/O
79oo3Ubqv631D/4yOWfS+QzcO+TgaOOBcpFwoXL/VX6kiAbQ4XK8PpuPkyDv
9kYoffF69U2Omzje53tU3nGWJuBqyqqsxuEUfokyJnIYe+QrrNoI7iEv+yji
H3Z34yGdOOBJ4vSF/naA4S3o/4DNllE7p5Kt4qIfM+uobqbqjheIs0ZRAu/C
ZC6v2T7AK5j4FUkZlgvQzqqrLNSOjiFlZVSonhtkd5+HVrMh8z8syiCKRME4
eoP+N0zV1DhQHuTGLPDTzhUyqdxZygeRx37pEhE8FZYXIklLmzqAnKeziBPx
rqXgPhRIxHxNsZ+4JXMxxDJQR48RhQxnXMPkXn3XHKuQSUarEK+7ifIVpes6
Vl4+C5MgowN2P4gasngyHJdwjucrZE2JsgDGLNjkQUzpwlYxDev4PfEFcSZN
prmEIzkkxxyLao+IHq2JYkk5cwhpjou1aMw0ccvZrY7tWPtXaB4flonQp3SY
ZoZ3GsvT6AdT+UT7Tj382HhxgnG85M/D89Ekr9Qppl6P7YLQGn6uFab38JAc
lyRc152olVbC6nl9aulpJ6I8ANbTYfktcOSUzPrIY3TqwVWQ4CEZrv5wgUdV
3WZngDVvt/6dsYiP0zrWJrHXmwA3dLVzczix3QFMdbc8OVdlETycB3zk+YpF
Jq3B0INmEzyNqc7gwUOA1R/zzz4ti0Tbsoh9ekKYSuz44OSAz81cnCAQ2Zsk
/mYbEqe8LjT/VpzR4tbKo53/D7x8zjeC3QAA

-->

</rfc>
