From nobody Mon Aug 2 02:23:29 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DB183A1546; Mon, 2 Aug 2021 02:23:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.197 X-Spam-Level: X-Spam-Status: No, score=-4.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OTeXrMU39l3f; Mon, 2 Aug 2021 02:23:21 -0700 (PDT) Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F41CB3A1547; Mon, 2 Aug 2021 02:23:18 -0700 (PDT) Received: from fraeml714-chm.china.huawei.com (unknown [172.18.147.201]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4GdXbw4ty7z6F85V; Mon, 2 Aug 2021 17:23:08 +0800 (CST) Received: from kwepeml100004.china.huawei.com (7.221.188.19) by fraeml714-chm.china.huawei.com (10.206.15.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Mon, 2 Aug 2021 11:23:16 +0200 Received: from kwepeml500001.china.huawei.com (7.221.188.162) by kwepeml100004.china.huawei.com (7.221.188.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Mon, 2 Aug 2021 17:23:14 +0800 Received: from kwepeml500001.china.huawei.com ([7.221.188.162]) by kwepeml500001.china.huawei.com ([7.221.188.162]) with mapi id 15.01.2176.012; Mon, 2 Aug 2021 17:23:14 +0800 From: "Wanghaibo (Rainsword)" To: "draft-ietf-bess-srv6-services@ietf.org" CC: "bess@ietf.org" Thread-Topic: Mail regarding draft-ietf-bess-srv6-services Thread-Index: AdeHfrf/R+vzU1EjQWiAaaoZFFP3hw== Date: Mon, 2 Aug 2021 09:23:14 +0000 Message-ID: <0cd4e36fc04b4d839fd2718207a1c6ed@huawei.com> Accept-Language: zh-CN, en-US Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.108.153.118] Content-Type: multipart/alternative; boundary="_000_0cd4e36fc04b4d839fd2718207a1c6edhuaweicom_" MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Subject: [bess] Mail regarding draft-ietf-bess-srv6-services X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Aug 2021 09:23:28 -0000 --_000_0cd4e36fc04b4d839fd2718207a1c6edhuaweicom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi authors, I have a question about the SRv6 Service Data Sub-Sub-TLVs, whether it shou= ld be mandatory or optional. >From a practical point of view, this TLV can help identifier the locator or= optimize packaging efficiency by transposition. But it doesn't seem it's must to do like this. Regards, Haibo --_000_0cd4e36fc04b4d839fd2718207a1c6edhuaweicom_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi authors,

 

I have a question about the SRv= 6 Service Data Sub-Sub-TLVs, whether it should be mandatory or optional.

 

From a practical point of view,= this TLV can help identifier the locator or optimize packaging efficiency = by transposition.

But it doesn't seem it's must t= o do like this.

 

Regards,

Haibo

--_000_0cd4e36fc04b4d839fd2718207a1c6edhuaweicom_-- From nobody Tue Aug 3 15:30:28 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A4F13A3563; Tue, 3 Aug 2021 15:30:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.352 X-Spam-Level: X-Spam-Status: No, score=-2.352 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Do_5TafYqFq7; Tue, 3 Aug 2021 15:30:21 -0700 (PDT) Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2127.outbound.protection.outlook.com [40.107.244.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 211583A3562; Tue, 3 Aug 2021 15:30:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ScxijSsXFXUz5gu+5201ROEUH6dJ3EJE7aIuvhkcuaE/TT5H3BgLyBangh0XOra8EMXtB5PQk1CddMrffoHdlhEeRM9GQtO+4bKToNkPgcvT7gn3ySy6Osq3L/ZW11Jurnas1H8wVLye7InmSxrvQDT9nEAAmlrsaosHv90zC8LVLZW1rYwxz5FriIqszBsvwHXaLMxXSmeTUH6NLRJeTrowDqOxbO1b69W+6eBtQ47KBZfJdzIIz0zCjqf7fIs+xEckDW7jgrYjKIc3mFhY13n6Dr8VHBQLpYGkL2IhrcSb9V8+TvhOIkhVpYPghpGxNxhDculnZebGfgmzOk8kkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=A9KwLrJvUU5BSw2D2oZP4UE1i2oa7hd5HkZ4iXhrZac=; b=M/hQ1ArImT3CyLhbqBFYR0e+rtk967Q3LI46GgPGhlmTKR0HO5j1kdSGFlOlKgMmuVx8pucCR6bkj5Bv1cbUkERZXcb9XWWfWEGMlycl84gmd+raalLhRTuXOHZvomRJw3fxLa2wyYD6RTG+nyvArlEGhbTGoeSeMXTK3NkF/dzTWx+xBWMxht5OWVxqYmE+81TRcNAqCJDrLAyx48vLwEojVBX8E01peRmhINPz2h5ieQsK6+t1Ed6uzZSOPSc6zSdVQglmBi3L5yKs5DvxzZ0hqN0Vvv0jOF4xHUey10bl2MRNaSiffEmBmb6ds3c8iJq4N42czp8c7mEOu1l2ug== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=A9KwLrJvUU5BSw2D2oZP4UE1i2oa7hd5HkZ4iXhrZac=; b=jAWv0Gnti+1/fRihJyfJOsKu8MG8v0Lchnw2DSDxcm3gn9vDtH9JJjdD7HmYYw40OdVcgnGX37Dqmb7+QxNHnTNQsmlHf/LLhtILOOqsaLZIkLMeSVQNJUMacWTPK0QU8GBlpBNi0iv9dDbJi0kiivRfD4mpl6jOlV1agz9jyxs= Received: from CO1PR08MB7062.namprd08.prod.outlook.com (2603:10b6:303:fb::22) by MWHPR08MB3392.namprd08.prod.outlook.com (2603:10b6:301:65::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.26; Tue, 3 Aug 2021 22:30:05 +0000 Received: from CO1PR08MB7062.namprd08.prod.outlook.com ([fe80::c88f:1334:fbfe:725]) by CO1PR08MB7062.namprd08.prod.outlook.com ([fe80::c88f:1334:fbfe:725%7]) with mapi id 15.20.4373.026; Tue, 3 Aug 2021 22:30:05 +0000 From: "Rabadan, Jorge (Nokia - US/Mountain View)" To: "Arvind Venkateswaran (arvvenka)" CC: "draft-ietf-bess-mvpn-evpn-sr-p2mp@ietf.org" , "bess@ietf.org" Thread-Topic: draft-ietf-bess-mvpn-evpn-sr-p2mp-03 and Ingress Replication with SRv6 Thread-Index: AQHXg71Zhrl/mhMJhk+6vVs+fFUQ+atbcr6AgAAEUwCABu9yUA== Date: Tue, 3 Aug 2021 22:30:05 +0000 Message-ID: References: , <3BC50520-7258-4302-9C2E-91FEB3C50085@cisco.com> In-Reply-To: <3BC50520-7258-4302-9C2E-91FEB3C50085@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=nokia.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: af2838ec-289a-45f4-a1fa-08d956ce3e38 x-ms-traffictypediagnostic: MWHPR08MB3392: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR08MB7062.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(396003)(376002)(39860400002)(346002)(366004)(66946007)(76116006)(6506007)(55016002)(53546011)(9686003)(4326008)(7696005)(66556008)(66476007)(64756008)(91956017)(66446008)(86362001)(33656002)(26005)(83380400001)(478600001)(186003)(8676002)(122000001)(316002)(54906003)(2906002)(8936002)(38100700002)(71200400001)(5660300002)(38070700005)(6916009)(52536014); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?Ec19heOJBbYA5Idegq+Vsy8WT6XFaReH0+rYr0SGDNFoFQQ8tLQVy9+x?= =?Windows-1252?Q?kkN88Bbhc3IW1dhWI4AW+zJFKKjesgC7+5qzFFHwjl5tIId/+VAeWDnf?= =?Windows-1252?Q?xouLmF+7RFLbVo5Ow4IjKarMVXNbVfxc0ocUbcsKhyfzKxW26HrT4Vyz?= =?Windows-1252?Q?6D2rSIiRBdVk5TBp7h0bWLc2FfmapADuCTJV/jMPHHepKnGFUq0H1RXV?= =?Windows-1252?Q?nd7QF7GwWgvtek8/ZuvV/5uIVJN64ra/cuvBuFEElH82Fhu04/j9sjKr?= =?Windows-1252?Q?lAuf7QcvlZsOh3LmxPqMT2JuLgSbUt63myY5Z23Mb4upmEsFiQNNBlJ4?= =?Windows-1252?Q?6YZx/OgpE0cVROx9srxsA3U+jm+hkCSY7MWsdBY6BajJzwKA+AwKGFfs?= =?Windows-1252?Q?dc4J/BHYvJisVyJ07FkPFVK0E0mZsKigh8kn+LGG2MsZswVhXHvjhpr7?= =?Windows-1252?Q?pv9p7WZ/AiZkQL611Q836AN8UBpgNYxWTkaznqPeKarMwrvw3CGZuHSB?= =?Windows-1252?Q?PECgb+f8DpySCVGFAkNKaVkgI2eUZtHatWSHN7HnP3d9dg/5MoD6utm+?= =?Windows-1252?Q?11CgCImgRmdRTqwaBgvjyhuVr0QS9VnmG5xEvaRSfGYZvfMm16u+mOIF?= =?Windows-1252?Q?nrFWAvwquT1ixWYG/cmHDOFQCsf8lKd/6UH09EKQaka54j5wY6dV6KaT?= =?Windows-1252?Q?KAZ2ZxxwZubaYDQBPKiK505CJaHjQUjk4d+Ip/HqoRG4spX/qntNPtk5?= =?Windows-1252?Q?wcOvAM41UG1RsFUpWtofKEt0mL0J8zi2T6CpZjbXFbwoP8VsBnuwBeHB?= =?Windows-1252?Q?70XseuOwLBt9W9xduEJMez2ZcAwDUc6Y1sq6OZcjBRRXYHgslve+AdbF?= =?Windows-1252?Q?SKnCuisYESXKmHf2O4FhXUjoYndU++OVBgsLiA7Oo5IkZ0NZRCcrs4lQ?= =?Windows-1252?Q?BRikO5037iP2EPaFG8AyZ4bIqSqLe0NmI+eWo96me2qk76PMIwKWvxQP?= =?Windows-1252?Q?vJkIUGFqXbVKqRjidRM1W+xIkLktmIful7BPjM9NxpvUN2gI6yfkuAen?= =?Windows-1252?Q?nLaO11s2tmHO8UAm7BuuAayv6hcFGffZxYbFe2ewRrqpS8syu/WD8dOy?= =?Windows-1252?Q?/Vkr/WlapysEDUtEMNZtI2Nvcsr7fP/AVi324881KekFcD4i9W0vyHmJ?= =?Windows-1252?Q?rnaEzOckfk7TCAYps87P2bfxTkzyDJ18cyVjjXzHWt4+MHHyHBMUYZ+y?= =?Windows-1252?Q?5Mnb5cLcAhuA7UsSeAGmYH+1c8kUn/5Y/crK9l7wxXvQfzrT0CqzmkCE?= =?Windows-1252?Q?MXFfH/aggL6y7CHkfOP0E9xNcXv7R56wlJlUctbGlqGTl12Coor2U/pR?= =?Windows-1252?Q?FxAR/pZkp0Qvjr760ksrUFetuejIwaFryo4w1Lk3H7l2ZfVIVUWHz1VH?= =?Windows-1252?Q?ENARx5/5j4ALnHWVT67kXw=3D=3D?= Content-Type: multipart/alternative; boundary="_000_CO1PR08MB706244B16B276D40D2B0715DF7F09CO1PR08MB7062namp_" MIME-Version: 1.0 X-OriginatorOrg: nokia.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR08MB7062.namprd08.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: af2838ec-289a-45f4-a1fa-08d956ce3e38 X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Aug 2021 22:30:05.5103 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: YGAY5oMJRDGYzqYP7P7R6bkGrVMHog+z4CbmNI6s5UdornJU3O2nG1zjP9Pn5s6tz55PE52rtPWT90mqgpFkYw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR08MB3392 Archived-At: Subject: Re: [bess] draft-ietf-bess-mvpn-evpn-sr-p2mp-03 and Ingress Replication with SRv6 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 Aug 2021 22:30:26 -0000 --_000_CO1PR08MB706244B16B276D40D2B0715DF7F09CO1PR08MB7062namp_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable Thank you Arvind for clarifying and making the change for the second point. Jorge From: Arvind Venkateswaran (arvvenka) Date: Friday, July 30, 2021 at 12:34 PM To: Rabadan, Jorge (Nokia - US/Mountain View) Cc: draft-ietf-bess-mvpn-evpn-sr-p2mp@ietf.org , bess@ietf.org Subject: Re: draft-ietf-bess-mvpn-evpn-sr-p2mp-03 and Ingress Replication w= ith SRv6 Hi Jorge, Thanks for your comments. Please find my responses inline [AV] -Arvind. From: "Rabadan, Jorge (Nokia - US/Mountain View)" Date: Wednesday, July 28, 2021 at 8:08 AM To: "draft-ietf-bess-mvpn-evpn-sr-p2mp@ietf.org" , "bess@ietf.org" Subject: draft-ietf-bess-mvpn-evpn-sr-p2mp-03 and Ingress Replication with = SRv6 Resent-From: Resent-To: , , , , , Resent-Date: Wednesday, July 28, 2021 at 8:08 AM Dear draft-ietf-bess-mvpn-evpn-sr-p2mp authors, I have some comments about yesterday=92s presentation of revision 03. In th= e slides, this caught my attention: =93Current Updates (Version 03) =95 Includes procedures for binding MVPN/EVPN service to an ingress-replica= tion P-tunnel in a Segment Routing network =95 Procedures in RFC7988 sufficient for MVPN IR over SR-MPLS =95 For SRv6, =95 I-PMSI and S-PMSI AD routes signal SRv6 Multicast Service SID =95 BGP Prefix-SID attribute [RFC8669] with SRv6 L3 Service TLV [I-D.ietf-b= ess-srv6-services] signals the SRv6 Multicast Service SID =95 New endpoint behaviors defined for packet decapsulation and multicast t= able lookup (End.DTM4, End.DTM6, End.DTM46=94 My questions/comments are: - The slide states that the new extensions are valid for EVPN too. The t= ext in the draft seems to be valid for MVPN only, and EVPN already supports= Ingress Replication without the need for RFC8669 (which applies to MVPN on= ly) or any extension to I-D.ietf-bess-srv6-services, at least for IMET and = SMET routes. Can you please clarify if the text in the slide is an typo or = intended? If intended, you need to clarify why those extensions are needed = over what I-D.ietf-bess-srv6-services already supports for IR. [AV] The text in the slide was indeed a typo. The text in this document is = intended for MVPN only. - Section 5.2 implies that the MPLS label field in the PTA is a 24-bit v= alue. However I-D.ietf-bess-srv6-services states that the SAFI 128 routes f= or SRv6 use a 20-bit label value in the MPLS label field (only EVPN conside= rs the field as a 24-bit value). So in order to be consistent with the VPN-= IP families, section 5.2 (and assuming this section is only for MVPN) shoul= d say that the MPLS label field is a 20-bit value. The text about transposi= tion should be modified accordingly. Would you agree with this? [AV] Yes, we agree. We will make the edit to indicate that only 20 bits fro= m the MPLS field in the PTA will be used if transposition scheme is used. I would appreciate feedback on the above points please. Thank you! Jorge --_000_CO1PR08MB706244B16B276D40D2B0715DF7F09CO1PR08MB7062namp_ Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable

Thank you Arvind for clarifying and making the change for the second poin= t.

Jorge

 

From: Arvind Venkateswaran (arvvenka) <arvv= enka@cisco.com>
Date: Friday, July 30, 2021 at 12:34 PM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@noki= a.com>
Cc: draft-ietf-bess-mvpn-evpn-sr-p2mp@ietf.org <draft-ietf-bess-m= vpn-evpn-sr-p2mp@ietf.org>, bess@ietf.org <bess@ietf.org>
Subject: Re: draft-ietf-bess-mvpn-evpn-sr-p2mp-03 and Ingress Replic= ation with SRv6

Hi Jorge,

 

Thanks for your comment= s. Please find my responses inline [AV]

 

-Arvind.

 

From: "Rabadan, Jorg= e (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
Date: Wednesday, July 28, 2021 at 8:08 AM
To: "draft-ietf-bess-mvpn-evpn-sr-p2mp@ietf.org" <draft= -ietf-bess-mvpn-evpn-sr-p2mp@ietf.org>, "bess@ietf.org" <be= ss@ietf.org>
Subject: draft-ietf-bess-mvpn-evpn-sr-p2mp-03 and Ingress Replicatio= n with SRv6
Resent-From: <alias-bounces@ietf.org>
Resent-To: <cfilsfil@cisco.com>, <hooman.bidgoli@nokia.com&= gt;, <arvvenka@cisco.com>, <daniel.voyer@bell.ca>, <zzhang@j= uniper.net>, <riparekh@cisco.com>
Resent-Date: Wednesday, July 28, 2021 at 8:08 AM

 

Dear draft-ietf-bess-mvpn-evpn-sr-p2mp autho= rs,

 

I have some comments about yesterday=92s pre= sentation of revision 03. In the slides, this caught my attention:

 

=93Current Updates (Version 03)

=95 Includes procedures for binding MVPN/EVP= N service to an ingress-replication P-tunnel in a Segment Routing network

=95 Procedures in RFC7988 sufficient for MVP= N IR over SR-MPLS

=95 For SRv6,

=95 I-PMSI and S-PMSI AD = routes signal SRv6 Multicast Service SID

=95 BGP Prefix-SID attrib= ute [RFC8669] with SRv6 L3 Service TLV [I-D.ietf-bess-srv6-services] signal= s the SRv6 Multicast Service SID

=95 New endpoint behavior= s defined for packet decapsulation and multicast table lookup (End.DTM4, En= d.DTM6, End.DTM46=94

 

My questions/comments are:=

 

-&nbs= p;   The slide states that the new extensions are valid for EVPN too. = The text in the draft seems to be valid for MVPN only, and EVPN already sup= ports Ingress Replication without the need for RFC8669 (which applies to MVPN only) or any extension to I-D.= ietf-bess-srv6-services, at least for IMET and SMET routes. Can you please = clarify if the text in the slide is an typo or intended? If intended, you n= eed to clarify why those extensions are needed over what I-D.ietf-bess-srv6-services already supports for IR.<= /span>

 

[AV] The text in the slide was indeed a typo. The text in this document is intended for MVPN only.

 

-&nbs= p;   Section 5.2 implies that the MPLS label field in the PTA is a 24-= bit value. However I-D.ietf-bess-srv6-services states that the SAFI 128 rou= tes for SRv6 use a 20-bit label value in the MPLS label field (only EVPN considers the field as a 24-bit value).= So in order to be consistent with the VPN-IP families, section 5.2 (and as= suming this section is only for MVPN) should say that the MPLS label field = is a 20-bit value. The text about transposition should be modified accordingly. Would you agree with this?

 

[AV] Yes, we agree. We will make = the edit to indicate that only 20 bits from the MPLS field in the PTA will = be used if transposition scheme is used.

 

I would appreciate feedback on the above poi= nts please.

Thank you!

Jorge

 

 

 

--_000_CO1PR08MB706244B16B276D40D2B0715DF7F09CO1PR08MB7062namp_-- From nobody Wed Aug 4 14:48:17 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 731B43A0D03; Wed, 4 Aug 2021 14:48:15 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: Cc: bess@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.35.0 Auto-Submitted: auto-generated Precedence: bulk Reply-To: bess@ietf.org Message-ID: <162811369537.21958.5070435482670959676@ietfa.amsl.com> Date: Wed, 04 Aug 2021 14:48:15 -0700 Archived-At: Subject: [bess] I-D Action: draft-ietf-bess-evpn-redundant-mcast-source-02.txt X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 04 Aug 2021 21:48:16 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Multicast Source Redundancy in EVPN Networks Authors : Jorge Rabadan Jayant Kotalwar Senthil Sathappan Zhaohui Zhang Wen Lin Eric C. Rosen Filename : draft-ietf-bess-evpn-redundant-mcast-source-02.txt Pages : 31 Date : 2021-08-04 Abstract: EVPN supports intra and inter-subnet IP multicast forwarding. However, EVPN (or conventional IP multicast techniques for that matter) do not have a solution for the case where: a) a given multicast group carries more than one flow (i.e., more than one source), and b) it is desired that each receiver gets only one of the several flows. Existing multicast techniques assume there are no redundant sources sending the same flow to the same IP multicast group, and, in case there were redundant sources, the receiver's application would deal with the received duplicated packets. This document extends the existing EVPN specifications and assumes that IP Multicast source redundancy may exist. It also assumes that, in case two or more sources send the same IP Multicast flows into the tenant domain, the EVPN PEs need to avoid that the receivers get packet duplication by following the described procedures. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-redundant-mcast-source/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-redundant-mcast-source-02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-bess-evpn-redundant-mcast-source-02 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Fri Aug 6 08:03:41 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21D4C3A321F; Fri, 6 Aug 2021 08:03:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.347 X-Spam-Level: * X-Spam-Status: No, score=1.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, KHOP_HELO_FCRDNS=0.399, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pdn8yVsQufDG; Fri, 6 Aug 2021 08:03:36 -0700 (PDT) Received: from hickoryhill-consulting.com (50-245-122-97-static.hfc.comcastbusiness.net [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E38BF3A3205; Fri, 6 Aug 2021 08:03:35 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=50.107.119.54; From: "Susan Hares" To: , , Date: Fri, 6 Aug 2021 11:03:33 -0400 Message-ID: <009d01d78ad4$3a2ce6c0$ae86b440$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_009E_01D78AB2.B31C7F40" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdeK06btyDPZa/WFTqmIT6qVt2XMrg== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Subject: Re: [bess] [Idr] 2 Week WG LC on draft-ietf-idr-rfc7752bis (7/9/2021 to 7/25/2021) - WG call concluded X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Aug 2021 15:03:39 -0000 This is a multipart message in MIME format. ------=_NextPart_000_009E_01D78AB2.B31C7F40 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit IDR has concluded a WG LC on draft-ietf-rfc7752bis on 7/31/2021 and there is consensus to publish this draft. Jeff Haas will be the point person for the shepherd write-up. All IDR chairs (and our secretary) will take any additional you care to share about this important bis draft. If the bess or spring working groups know of any errors, please send message to the IDR work and/or contact the idr chairs. Cheerily, Susan Hares ------=_NextPart_000_009E_01D78AB2.B31C7F40 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

IDR has = concluded a WG LC on draft-ietf-rfc7752bis

on 7/31/2021 and there is consensus to publish =

this draft.

 

Jeff Haas = will be the point person for the

shepherd write-up.  All IDR chairs (and our = secretary)

will take any additional = you care to share about this

important bis draft. 

 

If the bess = or spring working groups know of any errors,

please send message to the IDR work and/or contact =

the idr chairs.

 

Cheerily, = Susan Hares  

 

------=_NextPart_000_009E_01D78AB2.B31C7F40-- From nobody Fri Aug 6 08:48:04 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF9ED3A33BC; Fri, 6 Aug 2021 08:47:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.347 X-Spam-Level: * X-Spam-Status: No, score=1.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, KHOP_HELO_FCRDNS=0.399, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y6mLGeUYaMqa; Fri, 6 Aug 2021 08:47:56 -0700 (PDT) Received: from hickoryhill-consulting.com (50-245-122-97-static.hfc.comcastbusiness.net [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1862A3A33BE; Fri, 6 Aug 2021 08:47:55 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=50.107.119.54; From: "Susan Hares" To: , , "'GROW WG'" Date: Fri, 6 Aug 2021 11:47:43 -0400 Message-ID: <012b01d78ada$6ab61360$40223a20$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_012C_01D78AB8.E3A536B0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdeK2l6jKMh92+9yQKakQmPJuNYEWQ== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Subject: [bess] IDR interims - 8/23, 9/13, 9/27, 10/11 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Aug 2021 15:47:58 -0000 This is a multipart message in MIME format. ------=_NextPart_000_012C_01D78AB8.E3A536B0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit The IDR WG will be holding the following interims: Each interim is being held from 10-12:30) EDT (22:00- 0:30 Beijing; 4-6:30pm CET, 7-9:30 PDT) 8/23: WG draft review 9/13: Flow Specification v2 9/27: Embedded NLRI and improved Error handling (CAR and DT-Transport) 10/11: Auto-configuration protocols The first interim on 8/23 will provide an opportunity for longer presentations on drafts which have requested WG Adoption in IDR, but are not part of larger efforts (flow-spec v2, embedded NLRI (CAR, DT-Transport), bgp autoconfiguration)). Authors of the following drafts are invited to present: 1) draft-ietf-wang-idr-rd-orf 2) draft-hb-idr-sr-p2mp-policy 3) draft-xie-idr-bghp-ls-sr-vtn-mt 4) draft-chen-bgp-redist-03.txt (only when -03 adjusts) 5) draft-zzhang-idr-rt-derived-community [informational draft] 6) draft-zzhang-idr-tunnel-encapsulation-label-stack Each draft will be allotted 15-20 minutes for a longer discussion. Authors of drafts may request a time slot to present. If bess chairs or WG has concerns regarding overlap on these drafts. Cheerily, Susan Hares ------=_NextPart_000_012C_01D78AB8.E3A536B0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

The IDR WG = will be holding the following interims:

Each interim is being held from 10-12:30) = EDT

(22:00- 0:30 Beijing; 4-6:30pm = CET, 7-9:30 PDT)

 

8/23: WG = draft review

9/13: Flow = Specification v2

9/27: Embedded NLRI = and improved Error handling

         &= nbsp; (CAR and DT-Transport)

10/11: Auto-configuration protocols

 

The first = interim on 8/23 will provide an opportunity for longer presentations on = drafts which have requested WG Adoption in IDR, but are not part of = larger efforts (flow-spec v2, embedded NLRI (CAR, DT-Transport), bgp = autoconfiguration)).

 

Authors of = the following drafts are invited to present:

1) draft-ietf-wang-idr-rd-orf  =  

2) draft-hb-idr-sr-p2mp-policy =

3) draft-xie-idr-bghp-ls-sr-vtn-mt =

4) draft-chen-bgp-redist-03.txt = (only when -03 adjusts)

5) = draft-zzhang-idr-rt-derived-community [informational draft] =

6) = draft-zzhang-idr-tunnel-encapsulation-label-stack

 

Each draft = will be allotted 15-20 minutes for a longer discussion. Authors of = drafts may request a time slot to present.

 

If bess = chairs or WG has concerns regarding overlap on these drafts. =

 

Cheerily, Susan Hares =

------=_NextPart_000_012C_01D78AB8.E3A536B0-- From nobody Fri Aug 6 17:32:41 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9A913A20E9; Fri, 6 Aug 2021 17:32:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.438 X-Spam-Level: * X-Spam-Status: No, score=1.438 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_SBL_CSS=3.335, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m5RZV8MtZLGd; Fri, 6 Aug 2021 17:32:31 -0700 (PDT) Received: from mail-m17638.qiye.163.com (mail-m17638.qiye.163.com [59.111.176.38]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DB1A3A20E2; Fri, 6 Aug 2021 17:32:25 -0700 (PDT) Received: from smtpclient.apple (unknown [109.166.36.204]) by mail-m17638.qiye.163.com (Hmail) with ESMTPA id 706A41C0365; Sat, 7 Aug 2021 08:32:22 +0800 (CST) Content-Type: multipart/alternative; boundary=Apple-Mail-D8938D17-1DF8-4430-80DE-891341E84D03 Content-Transfer-Encoding: 7bit From: Aijun Wang Mime-Version: 1.0 (1.0) Date: Sat, 7 Aug 2021 08:32:19 +0800 Message-Id: <72A54D16-835E-4FE7-AB15-42F7F99E69D8@tsinghua.org.cn> References: <012b01d78ada$6ab61360$40223a20$@ndzh.com> Cc: idr@ietf.org, bess@ietf.org, GROW WG In-Reply-To: <012b01d78ada$6ab61360$40223a20$@ndzh.com> To: Susan Hares X-Mailer: iPhone Mail (18F72) X-HM-Spam-Status: e1kfGhgUHx5ZQUtXWQgPGg8OCBgUHx5ZQUlOS1dZCBgUCR5ZQVlLVUtZV1 kWDxoPAgseWUFZKDYvK1lXWShZQUpMS0tKN1dZLVlBSVdZDwkaFQgSH1lBWRpPGkNWTR4eSR1DSU JJQx0ZVRMBExYaEhckFA4PWVdZFhoPEhUdFFlBWU9LSFVKSktITk9VS1kG X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6Nkk6Cjo*Kj9CLSsfKzBCLQEt SS8wCi9VSlVKTUlDSUJNSE9ISkhPVTMWGhIXVQwaFRwaEhEOFTsPCBIVHBMOGlUUCRxVGBVFWVdZ EgtZQVlKS0JVSk1NVUhNVUlLT1lXWQgBWUFCSUNDNwY+ X-HM-Tid: 0a7b1e066bbfd993kuws706a41c0365 Archived-At: Subject: Re: [bess] [RD-ORF][GROW]IDR interims - 8/23, 9/13, 9/27, 10/11 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 07 Aug 2021 00:32:36 -0000 --Apple-Mail-D8938D17-1DF8-4430-80DE-891341E84D03 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hi, All Thanks for the Chair=E2=80=99s arrangements. For draft https://datatracker.ietf.org/doc/draft-wang-idr-rd-orf/, we have a= nalyzed in detail the application scenarios and their corresponding solution= s at https://datatracker.ietf.org/meeting/111/materials/slides-111-idr-sessa-10-u= pdates-and-discussion-on-rd-orf-solutions-00.pdf. We would like to the experts to review these analysis and consider the follo= wing questions: 1. Is it convincible that RD-ORF mechanism can solve the problems in mention= ed scenarios? If not, why? 2. Is there any other scenario that RD-ORF can=E2=80=99t solve? If it exists= , please describe also such scenarios and we will analyze it. 3. Is there any other suggestions to put forward to this draft? We would like to apply 20 minutes in the coming interim meeting for the pote= ntial discussion. Discussions via the list before the interim meeting are we= lcome. Thanks in advance. Aijun Wang China Telecom > On Aug 6, 2021, at 23:49, Susan Hares wrote: >=20 > =EF=BB=BF > The IDR WG will be holding the following interims: > Each interim is being held from 10-12:30) EDT > (22:00- 0:30 Beijing; 4-6:30pm CET, 7-9:30 PDT) > =20 > 8/23: WG draft review > 9/13: Flow Specification v2 > 9/27: Embedded NLRI and improved Error handling > (CAR and DT-Transport) > 10/11: Auto-configuration protocols > =20 > The first interim on 8/23 will provide an opportunity for longer presentat= ions on drafts which have requested WG Adoption in IDR, but are not part of l= arger efforts (flow-spec v2, embedded NLRI (CAR, DT-Transport), bgp autoconf= iguration)). > =20 > Authors of the following drafts are invited to present: > 1) draft-ietf-wang-idr-rd-orf =20 > 2) draft-hb-idr-sr-p2mp-policy > 3) draft-xie-idr-bghp-ls-sr-vtn-mt > 4) draft-chen-bgp-redist-03.txt (only when -03 adjusts) > 5) draft-zzhang-idr-rt-derived-community [informational draft] > 6) draft-zzhang-idr-tunnel-encapsulation-label-stack > =20 > Each draft will be allotted 15-20 minutes for a longer discussion. Authors= of drafts may request a time slot to present. > =20 > If bess chairs or WG has concerns regarding overlap on these drafts. > =20 > Cheerily, Susan Hares > _______________________________________________ > GROW mailing list > GROW@ietf.org > https://www.ietf.org/mailman/listinfo/grow --Apple-Mail-D8938D17-1DF8-4430-80DE-891341E84D03 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hi, All

Thanks for the C= hair=E2=80=99s arrangements.
For draft https://datatracker.ietf.org/d= oc/draft-wang-idr-rd-orf/, we have analyzed in detail the application sc= enarios and their corresponding solutions at

We would like to the experts to r= eview these analysis and consider the following questions:
1. Is i= t convincible that RD-ORF mechanism can solve the problems in mentioned scen= arios? If not, why?
2. Is there any other scenario that RD-ORF can= =E2=80=99t solve? If it exists, please describe also such scenarios and we w= ill analyze it.
3. Is there any other suggestions to put forward t= o this draft?

We would like to apply 20 minutes in t= he coming interim meeting for the potential discussion. Discussions via the l= ist before the interim meeting are welcome.

Thanks i= n advance.

Aijun Wang
China Telecom
=

On Aug 6, 2021, at 23:4= 9, Susan Hares <shares@ndzh.com> wrote:

=EF=BB=BF

The IDR WG will be holding the following interims:

<= p class=3D"MsoNormal">Each interim is being held from 10-12:30) EDT

(22:00- 0:30 Beijing; 4-6:30pm CET, 7-9:30 PDT)=

 

8/23: WG draft review

9/13: Flow= Specification v2

9/27: Embedded NLRI a= nd improved Error handling

  = ;         (CAR and DT-Transport= )

10/11: Auto-configuration protocols <= o:p>

 

The first interim on 8/23 will provide an opportunity for longer presen= tations on drafts which have requested WG Adoption in IDR, but are not part o= f larger efforts (flow-spec v2, embedded NLRI (CAR, DT-Transport), bgp autoc= onfiguration)).

 

<= p class=3D"MsoNormal">Authors of the following drafts are invited to present= :

1) draft-ietf-wang-idr-rd-orf  &= nbsp;

2) draft-hb-idr-sr-p2mp-policy

3) draft-xie-idr-bghp-ls-sr-vtn-mt =

4) draft-chen-bgp-redist-03.txt (only when -= 03 adjusts)

5) draft-zzhang-idr-rt-der= ived-community [informational draft]

6= ) draft-zzhang-idr-tunnel-encapsulation-label-stack

 

Each draft will be a= llotted 15-20 minutes for a longer discussion. Authors of drafts may request= a time slot to present.

 

If bess chairs or WG has concerns regarding o= verlap on these drafts.

 

Cheerily, Susan Hares

_______________________________________________
GROW mail= ing list
GROW@ietf.org
https://www.ietf.org/= mailman/listinfo/grow
= --Apple-Mail-D8938D17-1DF8-4430-80DE-891341E84D03-- From nobody Mon Aug 9 06:24:57 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C24E3A115F; Mon, 9 Aug 2021 06:24:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.353 X-Spam-Level: X-Spam-Status: No, score=-2.353 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z4rIgeZ5yNQz; Mon, 9 Aug 2021 06:24:51 -0700 (PDT) Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40131.outbound.protection.outlook.com [40.107.4.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D0723A115E; Mon, 9 Aug 2021 06:24:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OJw2NTxVtGqCYDW0aDJqUOVGRN+MKlDe5y3tZ1AsgcuJKF3HD1vl9vPDiO96+4XXpGZYnSNEmZ/DuQ4m/4atxtOhSD3Ts4ctozsnZAMZNkeRupaWjbmeOM5JZ5lXfNiY5KLxA0JVEKDIRQw4rMyPGF8i1ZluDbJV2x8F56fYQahLYRqDfhjlfwXTchcJcNRR8hkdK0aYW/Il4IYweyMvCsyx32oPiMz31wqg59P9nG1wgdeTAcXAHbCuRtBtfUDlh9KN9BGaM7qPfsoG4PzNevGW6tbMWamAxnYEk6xJOcOFEitc16ziF/Rk97AKFjUT+CHMoqojhcOUk4nV3hwJNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1BJjaTyTweaybXNvC6i36ice7+FuC1sNntYesOsZczY=; b=B8bE8Abpg+5fDb3KtMe9Qu7rzpmOmnI95toLAGi1srkGEMwkpV3KogjhiK8Vg/nxECSDSZCtjjBcu999vMGpJrJYaroI0dFZa/mkmF6/AGWBK4kdvoyQPNwDRzYZqmmEA2bjBdok0/DQgZFFqMKhTh9VhNwScCjyVVt/KmxnbcNFjNv52o0WyLwpT4aKpnP/aTOpNo8l2aP24RCnxoGQWPLxZUypJ4dWm5C1+IDLtXyeXULGpsdYuH16o9YXI7ee90pqxd1cVxFV3AIkpxcO+GsVkOvbkkd2F3pVXwoTJwVVM7lixLZDppPk9d0uzhy9OcGPapLkofIIr6MxNGYqMw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1BJjaTyTweaybXNvC6i36ice7+FuC1sNntYesOsZczY=; b=rMf6ZPUQw9m8rJgpdvCbjYecye4fI+oM1HlRh18qOnQiu1UY26nyBPcDpR6omEF6OIOj0z0Xa+0qz+TOErVJi0NkOYD74muA2r3tAJqbXbHDvnW+hEG6Fuj0EsuQ8BPIZl447DBwNst++elaJO1SZg1jUkw5rd4egJS7d2fI+Rs= Received: from VI1PR0701MB6991.eurprd07.prod.outlook.com (2603:10a6:800:17d::22) by VI1PR07MB3264.eurprd07.prod.outlook.com (2603:10a6:802:1d::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.4; Mon, 9 Aug 2021 13:24:45 +0000 Received: from VI1PR0701MB6991.eurprd07.prod.outlook.com ([fe80::694d:b35:66fb:d7d8]) by VI1PR0701MB6991.eurprd07.prod.outlook.com ([fe80::694d:b35:66fb:d7d8%3]) with mapi id 15.20.4394.016; Mon, 9 Aug 2021 13:24:45 +0000 From: "Bocci, Matthew (Nokia - GB)" To: "bess@ietf.org" , "draft-ietf-bess-evpn-lsp-ping@ietf.org" Thread-Topic: Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 Thread-Index: AQHXjSHrLk5K96Ha502EnoU7V5R92w== Date: Mon, 9 Aug 2021 13:24:45 +0000 Message-ID: <0B5439E0-0204-4AF2-ACAC-CFB0CE884712@nokia.com> Accept-Language: en-GB, en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.51.21071101 authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=nokia.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 77abadb9-4fc1-49e7-e657-08d95b390dc7 x-ms-traffictypediagnostic: VI1PR07MB3264: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR0701MB6991.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(346002)(366004)(136003)(39860400002)(66476007)(66574015)(66946007)(6512007)(66446008)(83380400001)(33656002)(64756008)(122000001)(66556008)(38070700005)(2616005)(450100002)(26005)(478600001)(6506007)(186003)(36756003)(91956017)(316002)(71200400001)(5660300002)(966005)(38100700002)(6486002)(8936002)(110136005)(8676002)(2906002)(76116006)(86362001)(45980500001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TzdOa3g0d2ZMNWZjTnNFbDlyZExWY21JQkhzK1dwYXRyRGxFZHNVTk9KS1hO?= =?utf-8?B?TUp5a2hacXQvZnB4d0FBbGNvWk9BZXlpL21CQ0w1RlUzN2pZT1l0cHVSUG5I?= =?utf-8?B?ekpVbm5tY3NXV2tvUzExdCtwdndBMngwcFhtQUUwNW9OMFFpVXNUTVNaT24y?= =?utf-8?B?RUYzNXNSSitueUVPL2Jld3lTQ2U4RFA5YXBLa21uVTJKZElONVNrL3lJZTV2?= =?utf-8?B?anFMNmgweU81Wk5NdkhNcGp6TDY2d0thTEhYVENzd2hNYVR5VEJBODNSTE5F?= =?utf-8?B?a3EveTdnZUlsbW02N1htaUc3YTJoRGRERndZY1F5R2F0UzBFNE9NejU0c1Bj?= =?utf-8?B?L2NsaTNtTFRUU2ZuS2dqU200NUZSRitOY3hHUXJGQVNGM2kzS3ZsRjRQUWxw?= =?utf-8?B?eVJLb3FUNjFZY2c0SjZ0QU5uNFJYdmdVNUo4UjJJanp6Qlc4UUxMRGlXVmZZ?= =?utf-8?B?WEdTTXVVLy9UeHc2a0pIZTRVcXdrclc2RFEwNWVpU1dGK0Y5aXFBREw1SkRN?= =?utf-8?B?clZFbmFYa2dCeUlOd1NiQ0JBMkpXbEREWlgwUTdEWURRU3BQT1M3WmpPamxQ?= =?utf-8?B?aUpMd1FCL1dQODhablo2amp2WmNtZjVKVWZBRkxWTERQVG1LWWNuZTY4L2J4?= =?utf-8?B?cHVHMUFsRnBLaFZKYlB4THBRWHYwTzRndnBVNmo4aVpkdFAwTTF4OXBCSks1?= =?utf-8?B?NzAwS25ZWTVZOE5acUd2TmZ2Y2pUYVZINU9qS09GUEtXYlp5VStMR1ZMdFJH?= =?utf-8?B?a1BvbjZOWGV5VlR4TFZNTzQ2a2hVTFhvQUIwaUV1VThJUGdMdlZlZ2kzMWNS?= =?utf-8?B?QnRCOGMvamhYeEl3MHd6VTd1d0E1YmJiVms0aUU5Q1kwcWRmcGFTdjNueVZF?= =?utf-8?B?d2tvMVdqTE5SZlprY291MEFWNGdlcFZRZmtvQXk2MkVoZXRiN243d2NtM2Fl?= =?utf-8?B?RWJ0Nk9aSXlQWXpXU0MwWUx4YVNXRUlKRkR6Z1Y4UGpid0FtOVhMVlJ5UHBo?= =?utf-8?B?L2R0NE5KWWk1NG51UkhMT2ZhZEdFMVVDc0J5V3pxM0g4dW8vWXpIRldoQjAy?= =?utf-8?B?dmhGbUdyNmU1ZW11SHpVK09MSHdxdEgySWtwNkEyZkNSNThPTEZ4V1krQTBy?= =?utf-8?B?ZkdwM2tPdUg4WURIZXJHQkpKYmNhZDdmeE5Yb1hjamJ2NmRpWEF2TW5oOXFH?= =?utf-8?B?RWtPTUdPT1BJKzE4VCtLWGRMOGJjODJqd1JoUW9YSHlkWXd5M1ptZWFhZ2pR?= =?utf-8?B?S0x1WWFmNE9CSDdCQTY4RmNCWW9VYUJhcjRQWWlFSE5wM1hDUVZWcDNYMkxt?= =?utf-8?B?WmwwMktXejRwbDVGbnY3MXZZNFFzb2EvcDlqM2NoTm1vRnVVek5Fci9zZ1Jq?= =?utf-8?B?SGZOTmk4WFMwU3VoUXJKYitKc0ZWbXRjeERHdTFCeEEzSDJjajFhUEk4eDR0?= =?utf-8?B?VkxsTUw0dnppRzFQUFlGbjRoRExON1F3OVNZcUM2Wksyc2tLdlU5alNoelg2?= =?utf-8?B?R2hsZGdSb0d4MDNjdUUwRnI0aHBHbTJ0YmErNVZhbGFBbUxFR2pCMnN3emZn?= =?utf-8?B?MzM0cFVrNi9VbGNYQzhENm12cVNPOWdGUUhYdFlQTzY1UkNOeXJQUUdsZ3ha?= =?utf-8?B?R3pkNDJMMnM0VHVTeU94U1pvbE1ZM1pQMHo3cHV2UCtPOHdFV3hIajlkRFYy?= =?utf-8?B?TXNvc1V3V1VadWx0UjRuNjA0dVc3WDhxVVVJaitBMGxmTnJOcnFaZmhHcGdL?= =?utf-8?Q?oR6pAHhoueYLpukEn2ZoQiA/+JFH6D3FNCMFJmr?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: nokia.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: VI1PR0701MB6991.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 77abadb9-4fc1-49e7-e657-08d95b390dc7 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Aug 2021 13:24:45.1367 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Gfo3cpjnJEwXBCQiVEytXNZX0p9Iwq9V/jsfZ0EX5b9OqVg5pRKbXi40Vw72szubkmICcxvWBNm2vgAK6RsJAg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3264 Archived-At: Subject: [bess] Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Aug 2021 13:24:57 -0000 V0cgYW5kIEF1dGhvcnMNCg0KVW5mb3J0dW5hdGVseSBJIGhhdmUgbm90IHNlZW4gYW55IHJlc3Bv bnNlcyBpbmRpY2F0aW5nIHRoYXQgdGhlcmUgYXJlIGFueSBrbm93biBpbXBsZW1lbnRhdGlvbnMg b2YgdGhpcyBkcmFmdC4gSSBhbHNvIGRpZCBub3Qgc2VlIGFueSByZXNwb25zZXMgdG8gU3RlcGhh bmUncyBxdWVzdGlvbiBpZiB3ZSBzaG91bGQgcHJvY2VlZCByZWdhcmRsZXNzLg0KDQpBcyBwZXIg dGhlIEJFU1MgV0cgaW1wbGVtZW50YXRpb24gcG9saWN5IChodHRwczovL21haWxhcmNoaXZlLmll dGYub3JnL2FyY2gvbXNnL2Jlc3MvY0czWDF0VHFiX3ZQQzRyZzU2U0Vka2pxRHB3LyksIHBsZWFz ZSBjYW4geW91IHJlc3BvbmQgdG8gdGhpcyBlbWFpbCBpbmRpY2F0aW5nIGVpdGhlcjoNCg0KLSBU aGF0IHlvdSBhcmUgYXdhcmUgb2YgYW55IGltcGxlbWVudGF0aW9ucyAoaWRlYWxseSBwcm92aWRp bmcgc29tZSBkZXRhaWxzKQ0KLSBJZiB5b3UgYXJlIG5vdCBhd2FyZSBvZiBhbnksIGlmIHlvdSB0 aGluayB0aGUgV0cgc2hvdWxkIHByb2NlZWQgd2l0aCB0aGUgZHJhZnQncyBwdWJsaWNhdGlvbiBh bmQgd2h5Lg0KDQpJIHdpbGwgY2xvc2UgdGhpcyBwb2xsIG9uIDI1dGggQXVndXN0IDIwMjEuDQoN ClJlZ2FyZHMNCg0KTWF0dGhldw0KIA0KDQrvu79PbiAxNC8wNi8yMDIxLCAxNzozOCwgIkJFU1Mg b24gYmVoYWxmIG9mIGludGVybmV0LWRyYWZ0c0BpZXRmLm9yZyIgPGJlc3MtYm91bmNlc0BpZXRm Lm9yZyBvbiBiZWhhbGYgb2YgaW50ZXJuZXQtZHJhZnRzQGlldGYub3JnPiB3cm90ZToNCg0KDQog ICAgQSBOZXcgSW50ZXJuZXQtRHJhZnQgaXMgYXZhaWxhYmxlIGZyb20gdGhlIG9uLWxpbmUgSW50 ZXJuZXQtRHJhZnRzIGRpcmVjdG9yaWVzLg0KICAgIFRoaXMgZHJhZnQgaXMgYSB3b3JrIGl0ZW0g b2YgdGhlIEJHUCBFbmFibGVkIFNlcnZpY2VTIFdHIG9mIHRoZSBJRVRGLg0KDQogICAgICAgICAg ICBUaXRsZSAgICAgICAgICAgOiBMU1AtUGluZyBNZWNoYW5pc21zIGZvciBFVlBOIGFuZCBQQkIt RVZQTg0KICAgICAgICAgICAgQXV0aG9ycyAgICAgICAgIDogUGFyYWcgSmFpbg0KICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgU2FtZXIgU2FsYW0NCiAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIEFsaSBTYWphc3NpDQogICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTYW1pIEJv dXRyb3MNCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEdyZWcgTWlyc2t5DQogICAgCUZp bGVuYW1lICAgICAgICA6IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1LnR4dA0KICAg IAlQYWdlcyAgICAgICAgICAgOiAxNQ0KICAgIAlEYXRlICAgICAgICAgICAgOiAyMDIxLTA2LTE0 DQoNCiAgICBBYnN0cmFjdDoNCiAgICAgICBMU1AtUGluZyBpcyBhIHdpZGVseSBkZXBsb3llZCBP cGVyYXRpb24sIEFkbWluaXN0cmF0aW9uLCBhbmQNCiAgICAgICBNYWludGVuYW5jZSAoT0FNKSBt ZWNoYW5pc20gaW4gTVBMUyBuZXR3b3Jrcy4gIFRoaXMgZG9jdW1lbnQNCiAgICAgICBkZXNjcmli ZXMgbWVjaGFuaXNtcyBmb3IgZGV0ZWN0aW5nIGRhdGEtcGxhbmUgZmFpbHVyZXMgdXNpbmcgTFNQ IFBpbmcNCiAgICAgICBpbiBNUExTIGJhc2VkIEVWUE4gYW5kIFBCQi1FVlBOIG5ldHdvcmtzLg0K DQoNCiAgICBUaGUgSUVURiBkYXRhdHJhY2tlciBzdGF0dXMgcGFnZSBmb3IgdGhpcyBkcmFmdCBp czoNCiAgICBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1sc3AtcGluZy8NCg0KICAgIFRoZXJlIGlzIGFsc28gYW4gaHRtbGl6ZWQgdmVyc2lvbiBh dmFpbGFibGUgYXQ6DQogICAgaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9k cmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNQ0KDQogICAgQSBkaWZmIGZyb20gdGhlIHBy ZXZpb3VzIHZlcnNpb24gaXMgYXZhaWxhYmxlIGF0Og0KICAgIGh0dHBzOi8vd3d3LmlldGYub3Jn L3JmY2RpZmY/dXJsMj1kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNQ0KDQoNCiAgICBJ bnRlcm5ldC1EcmFmdHMgYXJlIGFsc28gYXZhaWxhYmxlIGJ5IGFub255bW91cyBGVFAgYXQ6DQog ICAgZnRwOi8vZnRwLmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy8NCg0KDQogICAgX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCiAgICBCRVNTIG1haWxpbmcg bGlzdA0KICAgIEJFU1NAaWV0Zi5vcmcNCiAgICBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFu L2xpc3RpbmZvL2Jlc3MNCg0K From nobody Wed Aug 11 06:48:34 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A6843A16E6; Wed, 11 Aug 2021 06:48:30 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: IETF Secretariat To: Cc: bess@ietf.org, ipr-announce@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <162868971009.301.9130486496090570168@ietfa.amsl.com> Date: Wed, 11 Aug 2021 06:48:30 -0700 Archived-At: Subject: [bess] IPR Disclosure Huawei Technologies Co., Ltd's Statement about IPR related to draft-ietf-bess-evpn-inter-subnet-forwarding X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Aug 2021 13:48:30 -0000 Dear Ali Sajassi, Samer Salam, Samir Thoria, John Drake, Jorge Rabadan: An IPR disclosure that pertains to your Internet-Draft entitled "Integrated Routing and Bridging in EVPN" (draft-ietf-bess-evpn-inter-subnet-forwarding) was submitted to the IETF Secretariat on 2021-08-10 and has been posted on the "IETF Page of Intellectual Property Rights Disclosures" (https://datatracker.ietf.org/ipr/5039/). The title of the IPR disclosure is "Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-evpn-inter-subnet-forwarding" Thank you IETF Secretariat From nobody Fri Aug 13 03:45:27 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA2C33A12F6; Fri, 13 Aug 2021 03:45:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.55 X-Spam-Level: X-Spam-Status: No, score=-2.55 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hw6UlywsrIbC; Fri, 13 Aug 2021 03:45:19 -0700 (PDT) Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8DADC3A12F4; Fri, 13 Aug 2021 03:45:18 -0700 (PDT) Received: from pps.filterd (m0150245.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17DAfwuo002867; Fri, 13 Aug 2021 10:45:17 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=mJALWtOvd7bsY7gNcOy6XQ7uLoMGZv62j+p2SLiDLC8=; b=fxfwAihCvIHkxg8kR2mT61h9rwZEpHwKBuHKX8gnCvaPwSbA2RPlGVmr+al4FZRrpGow UVeDNjYzCS31+/bsboE/pud9RPatyqH/tgnbLEpbfO1AllKjoyQIjmn/cSlkbAAduukR C/CaFxeCd00sFA/ZOJO56PSC3KXbR6JSFU10JsbMoDiyamNWHyg6KgH2l1gS/fmSG8QD ffwRuXf/Fp0QYmeIg8qiDe0vrx+HZsCTQydbSDo3k3waVOpZScAVHozF9neIYUQRF/Ap ohGpurdc7tNmU21lUwNxpZmQXXLeBJwE0iCgvhZrXZpumvl9YwDdHs/SDLg0wLgTux4Y kA== Received: from g4t3427.houston.hpe.com (g4t3427.houston.hpe.com [15.241.140.73]) by mx0b-002e3701.pphosted.com with ESMTP id 3ad0jpad2b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 13 Aug 2021 10:45:16 +0000 Received: from G1W8106.americas.hpqcorp.net (g1w8106.austin.hp.com [16.193.72.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3427.houston.hpe.com (Postfix) with ESMTPS id 6039D57; Fri, 13 Aug 2021 10:45:16 +0000 (UTC) Received: from G4W9331.americas.hpqcorp.net (16.208.32.117) by G1W8106.americas.hpqcorp.net (16.193.72.61) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Fri, 13 Aug 2021 10:45:16 +0000 Received: from G1W8106.americas.hpqcorp.net (16.193.72.61) by G4W9331.americas.hpqcorp.net (16.208.32.117) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Fri, 13 Aug 2021 10:45:15 +0000 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (15.241.52.13) by G1W8106.americas.hpqcorp.net (16.193.72.61) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Fri, 13 Aug 2021 10:45:15 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bMMMLkq75DnR2fBAV14gQE+nfBAcQnYkaKCKjTNDfVhiDoI0jijQLE+Jnb261we31fN38ssoB2kr4jgmVZTUh32G4rezLm+TM48aUTYe9L6VsMo0b8pqSTmcjBsVztjm7hUoZd3UBG3fbnK2YY+J1x5F8nJld5zf/nWDZwDST4Z8WOYLbroL0EomrDZYRIOowzpU1a0VpButFdh0rKP3hOCPhEYm2YHuYbvGgWrJzS744Ih56tTpuR2WdHo6AwK6dceFHMU8eIeqXx0nnYuK++E921OOuxZkqb4sgHmJFdArbnWh8Zpbkeue7v1OVGITV6NFZ/m810noYuuZUmXpbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aXZfDn0YcdbxrHCU4JDJ03pyA4jmP6juSeb8AxrZeYI=; b=f9Erki92KFqDLU+1ozBtOVJCMLA/aOpcc3OaohUsftDoFgsjW3bsFwmfsGWSWkfVG0mQ7GGXdiO06la2fPZG6h4Y+9fMOig4jQODxvTPqNcKnAon+w91Vcd3y49OOwvP93s1VDVxpwqexYRUVbsX9o4tdAKPHfI6MjD97tMzFeZr2ttH1qb8iuuxL/wQVvLrZM8LjlTh/llw/56tY4Es/DTbpQNtW8T5TwTvYIsZQZpCIzEKr0C4PVpbdDTUIo9g0/yPRDFo3tdhxelRRYzS+2Id+YYOzzr7TggCFErWy+uwqGvTJNfYGo96/8BONOjPWLYeWUvf72WSqOtPUrrEtg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7715::21) by TU4PR8401MB0685.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:770d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.15; Fri, 13 Aug 2021 10:45:13 +0000 Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca]) by TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca%11]) with mapi id 15.20.4415.019; Fri, 13 Aug 2021 10:45:13 +0000 From: "Dikshit, Saumya" To: John Scudder , The IESG CC: "zzhang@juniper.net" , "bess-chairs@ietf.org" , "draft-ietf-bess-evpn-inter-subnet-forwarding@ietf.org" , "bess@ietf.org" Thread-Topic: [bess] John Scudder's No Objection on draft-ietf-bess-evpn-inter-subnet-forwarding-14: (with COMMENT) Thread-Index: AQHXeQc5SUvrQYBpnkaxBCghj2Hruqtxa2dA Date: Fri, 13 Aug 2021 10:45:12 +0000 Message-ID: References: <162630497960.13734.3896701871544253401@ietfa.amsl.com> In-Reply-To: <162630497960.13734.3896701871544253401@ietfa.amsl.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9fb0efa8-3697-42a7-264f-08d95e476e08 x-ms-traffictypediagnostic: TU4PR8401MB0685: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8273; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: TCor0P78o51V/X2M1qvLw9jWqdAqwQKNniPpJwprlfkbvCZ6Z8aj6qVIb7JExwXOND4++s851ApE0gnA+09F0nWAg3J9LLQagdqSPU2rOAPwvreDkLVVxiuWUp8pjnL9Plqx90O7EbOaRyArb9BXiBaHyMnyZQkewj8wX3M24RTQq3lr+TF0TbSCCLQ/kMf3i03tIrjIEPmpq3E/SG0XSRPFau6Pqd2HBFbIUgYoUq7Ucd3jHLWwv8O6HEWNsfbRyVkcRu94aHmyl81r5F39vWHBIxFzlCeNvv9ZMzarvOKlYRKsnV5xZAVR21/GjpQNXj/ywIbRPICbdB8rVr8wVudJ2zP5JNhmVH+uKKh/YFPtRbjZx58k/eA5WAxhZUIXxG6528qS9ih8IiZOYw2ASTLTQ3ee13vVafM+PWQV/FpHZB6WiboN1DoudBjrxSxGu33T7aHhnXTyrJfk65Xjdm8l89Fb+AdESv3q+ObDS/+vuKjwcqzSu3WAQFpiTrJ8+w9K32HqhwmVmmQBKyw0rQUW+nhQmVAqA9ZeUHnD7fHjBksXGPuh4FT2KiqeIZbqmH/MleqHSXJcKqMt6OCcJU86LqKkHsrDDdqEeDkmnHK+gPgxSgpHFprrYpBQvXyed12dl/GU5pfub3Lz9eXaXucvHe7BwXzuOSNvp1rlGGj7Nm1OXsZYM+RZ3FnZfeUuQtssLeKvE6pVnYLerV7NoA== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(136003)(396003)(366004)(39860400002)(346002)(376002)(76116006)(66476007)(66556008)(64756008)(66946007)(66446008)(83380400001)(26005)(55016002)(53546011)(110136005)(30864003)(7696005)(2906002)(38070700005)(52536014)(5660300002)(6506007)(66574015)(186003)(33656002)(316002)(71200400001)(8936002)(122000001)(478600001)(8676002)(4326008)(38100700002)(9686003)(86362001)(54906003)(966005); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?K3VOS2ZsUS9VK0pNN01ncmN6Nm9DNmdiRVlFNERabzFobm5GUjVJR0pJNWE2?= =?utf-8?B?K2tYbU1qRFNtUExuZURFNzc4MTJ2RmlDWjRrcUltQ1ArSVVKUHZhOGFqYUc3?= =?utf-8?B?LzN0QjI5OGRaRHFMQk5oTzkrVUI2OWFFUlE5U0xPSUV2OXpxQTZCazdrNFR4?= =?utf-8?B?ZCttdlFnaDVQSmNZZmFGYmZLc0pxSGNyZk1wWnkvUittZDFBOXlLa2RlWkND?= =?utf-8?B?ZnQvUVU1TDRHZ0lpSEJBRGp5NnRrOFJRdEt5QXUyL0YzeGpWM2VXQURURGxJ?= =?utf-8?B?djIwME1Lb3M4TlJSRDh0RXVkOWhzM0xMZzYybUZ4NXhvSjZHbVc2dmxIQ2dt?= =?utf-8?B?bkZ0U1NEMGVCMXRCOERrK2NjS0QwdENSQXlyNHhZWlk1ZHo0bGVVM3lJNnNr?= =?utf-8?B?VFk3UFAzQjJRNGIyMHc2RzRRTExycHZBY05IVG9UcXgxSVdJZWY1bnRPTG9F?= =?utf-8?B?VFAxK2RxT1NmaHYzQXhmalVpQ2IwWVM2c3dEdS9ESkd0SnJvWVdGNkd0NXRn?= =?utf-8?B?WUxEZTdaUlN4a0lMQjlFNTJYWDFNaHZiWG5qZ3ZFajRCSHlBcitQdVN4elRn?= =?utf-8?B?NlZXRldySlNrSnRTdHhhN0FUMmVvMEQxNlpFR1lqYUJzbVY1UjNJQlY1dE5Y?= =?utf-8?B?Q1g1NDg0Q0I1Tm5NQWwxQ1BVaHE1a1l0OXZqZkpvMCtFVUdOOTdXL0h1c1pu?= =?utf-8?B?U21hZWwrRmpHM2pIZUF0SElKTHd5TnFFRWFZRlg0aFh2WjJCZlJjdGdQRnBI?= =?utf-8?B?ejNuYTI0MXNqQ3VWY1lZc2xMVGx1bDdkZlRLZmtOOHZnMTIxYU1PbHg3WWxt?= =?utf-8?B?Tk5aaFh3dzVSUFVBZEhyUXZ4c3l1QlI4ZjBZOUt3aGxsczR1T3hYTURUV2Mw?= =?utf-8?B?eTEzZzE0TTIyRitNQmV1UFpoa1QyK3c4N2FTSHlFQ3huR3g3SEFxUC9QMVhx?= =?utf-8?B?VDRodG1YWDFWY1JJa3FJT3RIeFZzWUhELzU4V05IYk1rYi9CclVib29BOUhP?= =?utf-8?B?Mk0wOHNqdTQwTzVnY0ZDQXBva0ozR1MrVGVOWkhwUkxpYjZyRWpPUGYrUXNt?= =?utf-8?B?VmZDT0lPcHFGUVpKUTFWNGNwUXVIZ3Z0ZE4rVjY3Sk1UOTNrQ2libnJIZElO?= =?utf-8?B?SEE1cFR4bTJRSkp0Q2RHNldReHVocm53MllQQjZIbXJCNUcrRUhRVU0yYnpN?= =?utf-8?B?SFlsRS9hSkN3OWx0NTlKaC9IdUx2SlhwNy9SYzY5Szd2bFd1R1Z0bXNvRTlL?= =?utf-8?B?dlZJWkZ0bFhIYUlZVHQyZCtxKzJDMTkzV3Fyd0NBM2tHUER0YjNUZTQvZVk4?= =?utf-8?B?SC9GdUcvV3Nxak5FTHJrRHovSEhwM1cxRTJ3ZUxtVUFZUk12VVlVTVQ1UVh6?= =?utf-8?B?ZDF1QVdnWFFvN1FSWDdVdmFzeEVyOG14YW9pMEhUT040QWQ1RUhDbHFDcVRJ?= =?utf-8?B?azhpejNtc0kweG94ZkY2bWR0TVR1MXhvc3F2N0ZsV014ZTkyWmdPUTc5UjN1?= =?utf-8?B?bUJxUXdQb0VaTlFmbXZwWkJ5MnNzL2l6ZGgxOWs0NzZGR3Fsb3lzejhkL3Qr?= =?utf-8?B?T0w1V2k3OUpOMnh6NFc3cUp4OXZONndZd1Y2QWNzVWFwTTRkZkdzQ29FRXRk?= =?utf-8?B?c2FMMzJ3bUN0Q2RRZkFndDJYbTZveXVnSWVPYktLN3dnT2FLK2dsVzA0Yjg2?= =?utf-8?B?L3NhUjAyMUdHMC8xQ0sxRnlyRUprdWlFREg1ZVJYMzVLT0M1L05EUitiOGVT?= =?utf-8?Q?iqrqfx4oAjjq/mOHAwee9OCodHHan06XbhEVJkL?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_TU4PR8401MB1248F7A511CDA597C3423F3194FA9TU4PR8401MB1248_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 9fb0efa8-3697-42a7-264f-08d95e476e08 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Aug 2021 10:45:12.9403 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: VFROYYnGtkFY+M7sQzun7xaWfpCJ6yGgbtfHuipIRII9iCvIS5KsYstUq2x5UV6GFRzWmZo3a7jd1gz4mNelmw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR8401MB0685 X-OriginatorOrg: hpe.com X-Proofpoint-GUID: -nOzFde9RdQv9cyaI6csrdqHc5u8JZzx X-Proofpoint-ORIG-GUID: -nOzFde9RdQv9cyaI6csrdqHc5u8JZzx X-Proofpoint-UnRewURL: 16 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-13_03:2021-08-12, 2021-08-13 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 lowpriorityscore=0 bulkscore=0 phishscore=0 impostorscore=0 mlxlogscore=999 clxscore=1011 spamscore=0 adultscore=0 mlxscore=0 suspectscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108130063 Archived-At: Subject: Re: [bess] John Scudder's No Objection on draft-ietf-bess-evpn-inter-subnet-forwarding-14: (with COMMENT) X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Aug 2021 10:45:25 -0000 --_000_TU4PR8401MB1248F7A511CDA597C3423F3194FA9TU4PR8401MB1248_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SSBoYXZlIHF1ZXJ5IHJlZ2FyZGluZyB0aGUgZm9sbG93aW5nIHRleHQgaW4gdGhlIHNlY3Rpb24g IiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1l dnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xIiA6DQoiIFtJUDcsIE0x XSBpcyBsZWFybnQgYXMgYSBuZXcgcm91dGUgYXQNCiAgIFtQRTMsIFBFNF0gYW5kIGFkdmVydGlz ZWQgdG8gcmVtb3RlIFBFcyB3aXRoIGEgc2VxdWVuY2UgbnVtYmVyIG9mIDAuDQogICBBcyBhIHJl c3VsdCwgTDMgcmVhY2hhYmlsaXR5IHRvIElQNyB3b3VsZCBiZSBlc3RhYmxpc2hlZCBhY3Jvc3Mg dGhlDQogICBvdmVybGF5LCBob3dldmVyLCBNQUMgbW9iaWxpdHkgcHJvY2VkdXJlIGZvciBNQUMx IHdpbGwgbm90IHRyaWdnZXIgYXMNCiAgIGEgcmVzdWx0IG9mIHRoaXMgTUFDLUlQIHJvdXRlIGFk dmVydGlzZW1lbnQiDQoNCklmIGEgaG9zdCBpcyBtb3ZlZCB3aXRoIHRoZSBzYW1lIE1BQywgdGhl IGZvbGxvd2luZyBpcyBzdGlsbCBiZWluZyBmb2xsb3dpbmcgaW4gY3VycmVudCBpbXBsZW1lbnRh dGlvbihzKToNCi0gRWl0aGVyICJNQUMtb25seS1yb3V0ZSIgb3IgIk1BQy1JUC1yb3V0ZSIgYWR2 ZXJ0aXNlbWVudCwgdGhlIHNlcXVlbmNlIG51bWJlciBpcyBidW1wZWQgaW4gYm90aCBjYXNlcw0K LSBPbiByZWNlaXZpbmcgc2lkZSwNCiAgICAgIC0gIHRoZSBzZXF1ZW5jZS1udW1iZXIgaXMgcGlj a2VkIHVwIGZyb20gIk1BQy1vbmx5LXJvdXRlIiBvciAiTUFDLUlQLXJvdXRlIiBhbmQgYXBwbGll ZCB0byBNQUMgbGVhcm5pbmdzDQogICAgICAtIHRoZSBidW1wZWQgdXAgc2VxdWVuY2UgbnVtYmVy IGxlYWRzIGEgd2l0aGRyYXcgb2YgIk1BQy1vbmx5IiBvciAiTUFDLUlQLXJvdXRlIiBmcm9tIHRo ZSBpbmZlcmlvciAoZWFybGllcikgcHVibGlzaGVyDQoNCktpbmRseSBoZWxwIGV4cGxhaW4sIGlm IHRoZSB0ZXh0IG1lbnRpb25lZCBpbiDigJxzZWN0aW9uIDQuMy4x4oCdIGlzIGNyZWF0aW5nIHNv bWUgZG91YnRzIHJlZ2FyZGluZyB0aGUgd2F5IHRoaW5ncyBvcGVyYXRlIHdpdGggY3VycmVudCBz dGFuZGFyZHMuDQpUaG91Z2ggSSBkZWZpbml0ZWx5IGJlbGlldmUgdGhhdCB0aGlzIGxpdGVyYXR1 cmUgZG9lcyBhd2F5IHdpdGggbG90IG9mIGV4aXN0aW5nIGFtYmlndWl0aWVzLg0KSSB0aGluayB3 ZSBuZWVkIHRvIHBhcmFwaHJhc2UgdGhpcyBzZWN0aW9uIGF0bGVhc3QuDQoNClRoYW5rcw0KU2F1 bXlhLg0KDQoNCi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBCRVNTIFttYWlsdG86 YmVzcy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YgSm9obiBTY3VkZGVyIHZpYSBEYXRh dHJhY2tlcg0KU2VudDogVGh1cnNkYXksIEp1bHkgMTUsIDIwMjEgNDo1MyBBTQ0KVG86IFRoZSBJ RVNHIDxpZXNnQGlldGYub3JnPg0KQ2M6IHp6aGFuZ0BqdW5pcGVyLm5ldDsgYmVzcy1jaGFpcnNA aWV0Zi5vcmc7IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5nQGll dGYub3JnOyBiZXNzQGlldGYub3JnDQpTdWJqZWN0OiBbYmVzc10gSm9obiBTY3VkZGVyJ3MgTm8g T2JqZWN0aW9uIG9uIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5n LTE0OiAod2l0aCBDT01NRU5UKQ0KDQpKb2huIFNjdWRkZXIgaGFzIGVudGVyZWQgdGhlIGZvbGxv d2luZyBiYWxsb3QgcG9zaXRpb24gZm9yDQpkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJu ZXQtZm9yd2FyZGluZy0xNDogTm8gT2JqZWN0aW9uDQoNCldoZW4gcmVzcG9uZGluZywgcGxlYXNl IGtlZXAgdGhlIHN1YmplY3QgbGluZSBpbnRhY3QgYW5kIHJlcGx5IHRvIGFsbCBlbWFpbCBhZGRy ZXNzZXMgaW5jbHVkZWQgaW4gdGhlIFRvIGFuZCBDQyBsaW5lcy4gKEZlZWwgZnJlZSB0byBjdXQg dGhpcyBpbnRyb2R1Y3RvcnkgcGFyYWdyYXBoLCBob3dldmVyLikNCg0KDQpQbGVhc2UgcmVmZXIg dG8gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvaWVzZy9zdGF0ZW1lbnQvZGlzY3Vzcy1jcml0ZXJpYS5o dG1sDQpmb3IgbW9yZSBpbmZvcm1hdGlvbiBhYm91dCBESVNDVVNTIGFuZCBDT01NRU5UIHBvc2l0 aW9ucy4NCg0KDQpUaGUgZG9jdW1lbnQsIGFsb25nIHdpdGggb3RoZXIgYmFsbG90IHBvc2l0aW9u cywgY2FuIGJlIGZvdW5kIGhlcmU6DQpodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9k cmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy8NCg0KDQoNCi0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0NCkNPTU1FTlQ6DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQoNClRoYW5rcyB0byB0aGUgYXV0aG9y cyBmb3IgdGhlaXIgd29yayBpbiBhZGRyZXNzaW5nIG15IGNvbW1lbnRzLiBDb3B5aW5nIG15DQoo cmVzb2x2ZWQpIGRpc2N1c3MgcG9pbnRzIGhlcmUgZm9yIHBvc3Rlcml0eS4NCg0KLS0tLQ0KDQpJ IGZvdW5kIHRoaXMgZG9jdW1lbnQgZGlmZmljdWx0IHRvIHJldmlldy4gU29tZSBvZiB0aGlzIG1p Z2h0IGJlIGR1ZSB0byB0aGUNCmZhY3QgdGhhdCBJJ20gbm90IGFuIGV4cGVydCBvbiBFVlBOLCBi dXQgSSB0aGluayBzb21lIG9mIHRoZSByZWFzb24gaXMgdGhhdCB0aGUNCmRvY3VtZW50IGNvdWxk IGJlIHN0cnVjdHVyZWQgYmV0dGVyIGFuZCBleHByZXNzZWQgbW9yZSBjbGVhcmx5LiBUaGUgb25s eSByZWFzb24NCkknbSBub3Qgb3Bwb3NpbmcgcHJvZ3Jlc3Npb24gb2YgdGhlIGRvY3VtZW50IG9u IHRoZSBncm91bmRzIHRoYXQgaXQncyB0b28NCnVuY2xlYXIgdG8gaW1wbGVtZW50IGlzIHRoYXQg SSd2ZSBiZWVuIHRvbGQsIGFuZCBhY2NlcHQgb24gZmFpdGgsIHRoYXQNCmltcGxlbWVudGF0aW9u cyAqaGF2ZSogYmVlbiBzdWNjZXNzZnVsbHkgd3JpdHRlbiBzdGFydGluZyBmcm9tIHRoZSBzcGVj LCB3aGljaA0KaW1wbGllcyBpdCdzIGltcGxlbWVudGFibGUgLS0gSSBndWVzcyBieSBwZW9wbGUg d2hvIGFyZSBleHBlcnQgaW4gRVZQTiBhbHJlYWR5LA0KaXQgd291bGRuJ3QgYmUgaW1wbGVtZW50 YWJsZSBieSBtZS4NCg0KSW4gYW55IGNhc2UsIEkgZG8gaGF2ZSBzb21lIHBvaW50cyBJIHdvdWxk IGxpa2UgdG8gZGlzY3VzcywgdGhhdCBhcmUgbW9yZQ0KYWN0aW9uYWJsZS4NCg0KMS4gSSBhZ3Jl ZSB3aXRoIFJvYmVydCBXaWx0b24ncyBjb21tZW50IG9uIC0wOToNCg0KYGBgDQpPbmUgcXVlc3Rp b24gSSBoYXZlIGlzIHdoZXRoZXIgaXQgaXMgcG9zc2libGUgdG8gaGF2ZSBhIGRlcGxveW1lbnQg d2hlcmUgc29tZQ0KZGV2aWNlcyBzdXBwb3J0IHN5bmNocm9ub3VzIG1vZGUgYW5kIG90aGVycyBz dXBwb3J0IGFzeW5jaHJvbm91cyBtb2RlLiAgQW0gSQ0KcmlnaHQgaW4gcHJlc3VtaW5nIHRoYXQg dGhpcyBpcyBub3Qgc3VwcG9ydGVkIGFuZCBpZiBzbyBpcyB0aGlzIGNhcGFiaWxpdHkNCnNpZ25h bGVkIGluIGFueSB3YXk/IE9yIGlzIHRoZSBleHBlY3RhdGlvbiB0aGF0IHRoaXMgd291bGQgYmUg Y29udHJvbGxlZCB2aWENCmRlcGxveW1lbnQgY2hvaWNlIG9mIG5ldHdvcmsgZGV2aWNlLCBvciB0 aG91Z2ggY29uZmlndXJhdGlvbiBtYW5hZ2VtZW50PyBgYGANCg0KVGhpcyBpc3N1ZSBzdGlsbCBl eGlzdHMgaW4gLTE0LiBJIHRoaW5rIGl0IHNob3VsZCBiZSBhZGRyZXNzZWQgaW4gdGhlIGRvY3Vt ZW50Lg0KU2ltaWxhcmx5LCBJIGFncmVlIHdpdGggV2FycmVuIEt1bWFyaSdzIGNvbW1lbnQsIGFs c28gb24gLTA5Og0KDQpgYGANCkkgd291bGQgc3Ryb25nbHkgcmVjb21tZW5kIHRoYXQgdGhlIGF1 dGhvcnMgcmVhZCB0aGUgT3BzRGlyIHJldmlldyBhdDoNCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0 Zi5vcmcvZG9jL3Jldmlldy1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy0w OS1vcHNkaXItbGMtamFlZ2dsaS0yMDIwLTA3LTA2Lw0KLCBlc3BlY2lhbGx5IHRoZTogIml0IHdv dWxkIGJlIGhlbHBmdWwgaWYgc2VjdGlvbiA0IHdvdWxkIGJlIG1vcmUgZXhwbGljaXQgZm9yDQpu b24taW1wbGVtZW50b3JzIG9uIHdoZW4gc3ltZXRyaWMgb3IgYXN5bWV0cmljIG1vZHVsZXMgd291 bGQgYmUgY2hvc2VuLCBhcyBpdA0Kc3RhbmRzIHRoZSB2YXJpYXRpb24gYmFzaWNhbGx5IHJlYWRz IGxpa2UgdGhlIGVudW1lcmF0aW9uIG9mIHRoZSBmZWF0dXJlcyBvZg0KdmFyaW91cyBpbXBsZW1l bnRhdGlvbnMuIiBjb21tZW50ICh3aGljaCBJIGZ1bGx5IGFncmVlIHdpdGgpLiBgYGANCg0KSXQg c2VlbXMgYm90aCBvZiB0aGVzZSBjb21tZW50cyBjb3VsZCAtLSBhbmQgc2hvdWxkISAtLSBiZSBh ZGRyZXNzZWQgYnkgYWRkaW5nDQphIGZldyBwYXJhZ3JhcGhzIHRhbGtpbmcgYWJvdXQgdGhlc2Ug dG9waWNzLiBUaGlzIGNvdWxkIGJlIGRvbmUgZWl0aGVyIGluIMKnNCwNCmFzIFdhcnJlbiBzdWdn ZXN0cywgb3IgaW4gc29tZSBvdGhlciBzZWN0aW9uIChlLmcuIHlvdSBjb3VsZCBhZGQgYW4NCiJv cGVyYXRpb25hbCBjb25zaWRlcmF0aW9ucyIgc2VjdGlvbikuDQoNCjIuIFNlY3Rpb24gNy4xDQoN CknigJltIGd1ZXNzaW5nIHRoaXMgcXVlc3Rpb24gaXNu4oCZdCB1bmlxdWUgdG8gdGhpcyBkb2N1 bWVudCwgYnV0IHNpbmNlIHRoaXMgaXMNCndoZXJlIEkgZW5jb3VudGVyZWQgaXQsIEnigJlsbCBh c2s6IGl0IHNlZW1zIGFzIHRob3VnaCB0aGUgZGVzY3JpYmVkIG1vYmlsaXR5DQpwcm9jZWR1cmVz IGFyZSB2dWxuZXJhYmxlIHRvIGEgY29uZGl0aW9uIHdoZXJlIGEgcGFydGljdWxhciAoSVAsIE1B QykgYXBwZWFycw0KYXQgdHdvIGRpZmZlcmVudCBOVkVzIGF0IHRoZSBzYW1lIHRpbWUuIElmIHRo aXMgY29uZGl0aW9uIGV4aXN0cyAoZWl0aGVyDQppbm5vY2VudGx5LCBvciBtYWxpY2lvdXNseSkg d2hhdCBwcmV2ZW50cyB0aGUgc291cmNlIGFuZCB0YXJnZXQgTlZFcyBmcm9tDQpjb250aW51YWxs eSBhdHRlbXB0aW5nIHRvIGNsYWltIHRoZSAoSVAsIE1BQykgZnJvbSBvbmUgYW5vdGhlciwgZmxv b2RpbmcgdGhlDQpuZXR3b3JrIHdpdGggdXBkYXRlcyBhbGwgdGhlIHdoaWxlPw0KDQooVGhpcyBh cHBsaWVzIHRvIDcuMiBhcyB3ZWxsLikNCg0KU2luY2UgdGhpcyBzZWVtcyBsaWtlIGEgcG90ZW50 aWFsIHNlY3VyaXR5IGlzc3VlLCBJJ20gaW5jbHVkaW5nIGl0IGluIG15DQpESVNDVVNTLg0KDQot LS0tDQoNCkJlbG93IGFyZSBhIG51bWJlciBvZiBxdWVzdGlvbnMgYW5kIGNvbW1lbnRzIHRoYXQg SSBob3BlIG1pZ2h0IGhlbHAgaW1wcm92ZSB0aGUNCmRvY3VtZW50LiBJIGhhdmVuJ3QgY2hvc2Vu IHRvIG1ha2UgdGhlbSBibG9ja2luZyBieSBpbmNsdWRpbmcgdGhlbSBpbiBteQ0KRElTQ1VTUzsg bm9uZXRoZWxlc3MgSSB3b3VsZCBhcHByZWNpYXRlIHJlcGxpZXMgdG8gdGhlbS4NCg0KMS4gSSBh Z3JlZSB3aXRoIHRoZSBjb21tZW50cyBieSBzZXZlcmFsIG9mIHRoZSBvdGhlciByZXZpZXdlcnMs IHRoYXQgdGhlcmUgYXJlDQpqdXN0IHRvbyBtYW55IGdyYXR1aXRvdXMgYWNyb255bXMgaW4gdGhp cyBkb2N1bWVudC4gVGhleSBhcmVuJ3QgdGhlIG9ubHkgdGhpbmcNCnRoYXQgbWFrZXMgaXQgaGFy ZCB0byByZWFkLCBidXQgdGhleSBjZXJ0YWlubHkgY29udHJpYnV0ZS4gSSdtIGRpc2FwcG9pbnRl ZCB0bw0Kc2VlIHRoaXMgaGFzbid0IGJlZW4gYWRkcmVzc2VkIGJldHdlZW4gdmVyc2lvbnMgLTA5 IGFuZCAtMTQuIEl0IHdvdWxkIGhhdmUgYmVlbg0KYSBzbWFsbCBtYXR0ZXIgb2Ygc2VhcmNoLWFu ZC1yZXBsYWNlIHRvIGdvIHRocm91Z2ggYW5kIGV4cGFuZCBtb3N0IG9mIHRoZQ0KYWNyb255bXMu DQoNCjIuIFNlY3Rpb24gMg0KDQpgYGANCiAgIFIxOiBUaGUgc29sdXRpb24gbXVzdCBhbGxvdyBm b3IgYm90aCBpbnRlci1zdWJuZXQgYW5kIGludHJhLXN1Ym5ldA0KICAgdHJhZmZpYyBiZWxvbmdp bmcgdG8gdGhlIHNhbWUgdGVuYW50IHRvIGJlIGxvY2FsbHkgcm91dGVkIGFuZCBicmlkZ2VkDQog ICByZXNwZWN0aXZlbHkuICBUaGUgc29sdXRpb24gbXVzdCBwcm92aWRlIElQIHJvdXRpbmcgZm9y IGludGVyLXN1Ym5ldA0KICAgdHJhZmZpYyBhbmQgRXRoZXJuZXQgQnJpZGdpbmcgZm9yIGludHJh LXN1Ym5ldCB0cmFmZmljLiAgSXQgc2hvdWxkIGJlDQogICBub3RlZCB0aGF0IGlmIGFuIElQLVZS RiBpbiBhIE5WRSBpcyBjb25maWd1cmVkIGZvciBJUHY2IGFuZCB0aGF0IE5WRQ0KICAgcmVjZWl2 ZXMgSVB2NCB0cmFmZmljIG9uIHRoZSBjb3JyZXNwb25kaW5nIFZMQU4sIHRoZW4gdGhlIElQdjQN CiAgIHRyYWZmaWMgaXMgdHJlYXRlZCBhcyBMMiB0cmFmZmljIGFuZCBpdCBpcyBicmlkZ2VkLiAg QWxzbyB2aXNlIHZlcnNhLA0KICAgaWYgYW4gSVAtVlJGIGluIGEgTlZFIGlzIGNvbmZpZ3VyZWQg Zm9yIElQdjQgYW5kIHRoYXQgTlZFIHJlY2VpdmVzDQogICBJUHY2IHRyYWZmaWMgb24gdGhlIGNv cnJlc3BvbmRpbmcgVkxBTiwgdGhlbiB0aGUgSVB2NiB0cmFmZmljIGlzDQogICB0cmVhdGVkIGFz IEwyIHRyYWZmaWMgYW5kIGl0IGlzIGJyaWRnZWQuDQoNCiAgIFIyOiBUaGUgc29sdXRpb24gbXVz dCBzdXBwb3J0IGJyaWRnaW5nIGZvciBub24tSVAgdHJhZmZpYy4NCmBgYA0KDQpSMSBpcyBhIGxp dHRsZSB0b3J0dXJlZCwgd2hlcmUgeW91IGFkZCBhbGwgdGhlIGNhdmVhdHMgYWJvdXQg4oCcdHJl YXRlZCBhcyBMMg0KdHJhZmZpY+KAnS4gU2VlbXMgdG8gbWUgbGlrZSBpdCB3b3VsZCBmYWxsIG91 dCBtb3JlIG5hdHVyYWxseSBpZiB5b3UgaGFkIHNpbXBseQ0KaW50cm9kdWNlZCB0aGUgY29uY2Vw dHMgb2Ygcm91dGFibGUgYW5kIG5vbi1yb3V0YWJsZSB0cmFmZmljLCB3aGVyZSByb3V0YWJsZQ0K dHJhZmZpYyBpcyB0aGF0IGZvciB3aGljaCBhIHN1aXRhYmxlIElQLVZSRiBleGlzdHMuIFRoYXQg d291bGQgYWxzbyBoYXZlIHRoZQ0KcGxlYXNhbnQgZWZmZWN0IG9mIG1ha2luZyBSMiBzYXkg4oCc 4oCmIG11c3Qgc3VwcG9ydCBicmlkZ2luZyBmb3Igbm9uLXJvdXRhYmxlDQp0cmFmZmlj4oCdIGlu c3RlYWQgb2Yg4oCcbm9uLUlQIHRyYWZmaWPigJ0sIHdoaWNoIGlzIHRlY2huaWNhbGx5IGluY29y cmVjdCAoc2luY2UgcGVyDQpSMSB5b3UgbWlnaHQgaGF2ZSBub24tcm91dGFibGUgSVAgdHJhZmZp YykuDQoNCmBgYA0KICAgUjM6IFRoZSBzb2x1dGlvbiBtdXN0IGFsbG93IGludGVyLXN1Ym5ldCBz d2l0Y2hpbmcgdG8gYmUgZGlzYWJsZWQgb24NCiAgIGEgcGVyIFZMQU4gYmFzaXMgb24gUEVzIHdo ZXJlIHRoZSB0cmFmZmljIG5lZWRzIHRvIGJlIGJhY2toYXVsZWQgdG8NCiAgIGFub3RoZXIgbm9k ZSAoaS5lLiwgZm9yIHBlcmZvcm1pbmcgRlcgb3IgRFBJIGZ1bmN0aW9uYWxpdHkpLg0KYGBgDQoN CldoYXTigJlzIOKAnHN3aXRjaGluZ+KAnT8gVGhlIGRvY3VtZW50IGlzIGFib3V0IHJvdXRpbmcg dnMuIGJyaWRnaW5nLCB3aGljaCBkbyB5b3UNCm1lYW4/IEkgdGhpbmsgeW91IG1lYW4g4oCccm91 dGluZ+KAnS4gSU1PIHlvdSBzaG91bGQgZ2V0IHJpZCBvZiB0aGUgd29yZA0K4oCcc3dpdGNoaW5n 4oCdIGFuZCByZXBsYWNlIHdpdGggc29tZXRoaW5nIGxlc3MgYW1iaWd1b3VzLCBlLmcuIOKAnHJv dXRpbmfigJ0uIChCb3RoDQpoZXJlIGFuZCB0aGUgb25lIG90aGVyIHBsYWNlIGluIHRoZSBkb2Mg d2hlcmUgeW91IHVzZSDigJxzd2l0Y2hpbmfigJ0uKQ0KDQpBbHNvLCBJIHRoaW5rIHlvdSBkb27i gJl0IG1lYW4g4oCcaS5lLuKAnSwgSSB0aGluayB5b3UgbWVhbiDigJxlLmcu4oCdLiBUaGUgbWVh bmluZyBvZg0K4oCcaS5lLuKAnSBpcyDigJxpbiBvdGhlciB3b3Jkc+KAnS4gVGhlIG1lYW5pbmcg b2Yg4oCcZS5nLuKAnSBpcyDigJxmb3IgZXhhbXBsZeKAnS4gVGhlIGJlc3QNCndheSB0byBhdm9p ZCB0aGVzZSBwcm9ibGVtcywgSU1PLCBpcyB0byBzaW1wbHkgd3JpdGUgb3V0IHdoYXQgeW91IG1l YW4sIHNvIGluDQp0aGlzIGNhc2Ugd3JpdGUg4oCcKGZvciBleGFtcGxlLCBmb3IgcGVyZm9ybWlu ZyBGVyBvciBEUEkgZnVuY3Rpb25hbGl0eSku4oCdIChBbmQNCm9oIGJ5IHRoZSB3YXksIHlvdSBo YXZlbuKAmXQgZGVmaW5lZCBvciBleHBhbmRlZCBGVyBvciBEUEksIHBsZWFzZSBkbyBzby4pDQoN CjMuIFNlY3Rpb24gNA0KDQpgYGANCiAgIG8gIHJlZmVyZW5jZXMgdG8gQVJQIHRhYmxlIGluIHRo ZSBjb250ZXh0IG9mIGFzeW1tZXRyaWMgSVJCIGlzIGENCiAgICAgIGxvZ2ljYWwgdmlldyBvZiBh IGZvcndhcmRpbmcgdGFibGUgdGhhdCBtYWludGFpbnMgYW4gSVAgdG8gTUFDDQogICAgICBiaW5k aW5nIGVudHJ5IG9uIGEgbGF5ZXIgMyBpbnRlcmZhY2UgZm9yIGJvdGggSVB2NCBhbmQgSVB2Ni4N CiAgICAgIFRoZXNlIGVudHJpZXMgYXJlIG5vdCBzdWJqZWN0IHRvIEFSUCBvciBORCBwcm90b2Nv bC4NCmBgYA0KDQpUaGlzIHBhc3NhZ2Ugc2hpbmVzIGEgc3BvdGxpZ2h0IG9uIHRoZSBmYWN0IHRo YXQg4oCcQVJQIHRhYmxl4oCdIGFzIGl04oCZcyB1c2VkIGluDQp0aGlzIGRvY3VtZW50IGlzIGEg bWlzbm9tZXIsIHNpbmNlIGl04oCZcyBhIHRhYmxlIHRoYXQgaXMgbm90IChuZWNlc3NhcmlseSkN CnBvcHVsYXRlZCBieSBBUlAuIEkgZG9u4oCZdCBwcm9wb3NlIHRoYXQgeW91IGNoYW5nZSB0aGUg bm9tZW5jbGF0dXJlLCBzaW5jZSBpdOKAmXMNCmZpcm1seSBlc3RhYmxpc2hlZCBldmVuIHRob3Vn aCB3cm9uZyDigJQgYnV0IGl0IG1pZ2h0IGJlIHdvcnRoIGFkZGluZyB0aGUgZmlyc3QNCnNlbnRl bmNlIG9yIG9uZSBsaWtlIGl0IHRvIHlvdXIgVGVybWlub2xvZ3kgc2VjdGlvbi4NCg0KNC4gU2Vj dGlvbiA0DQoNCkZpZ3VyZSAyIGRlcGljdHMgQlQyIGJlaW5nIHByZXNlbnQgb24gdGhlIGluZ3Jl c3MgUEUsIGJ1dCB0aGUgdGV4dCBtYWtlcyBpdA0KY2xlYXIgdGhhdCBpbiB0aGUgc3ltbWV0cmlj IG1vZGUgdGhhdCB0aGlzIGZpZ3VyZSBkZXBpY3RzLCBCVDIgZG9lc27igJl0IGFjdHVhbGx5DQpu ZWVkIHRvIGJlIHRoZXJlLiBXb3VsZG7igJl0IGl0IGJlIGNsZWFyZXIgaWYgeW91IGRpZG7igJl0 IHNob3cgaXQ/DQoNCjUuIFNlY3Rpb24gNA0KDQpJIGhhdmUgYSBoYXJkIHRpbWUgcGFyc2luZyB0 aGlzIHRleHQ6DQoNCmBgYA0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIEVhY2ggQlQgb24gYSBQRSBpcw0KICAgYXNzb2NpYXRlZCB3aXRoIGEgdW5pcXVlIFZM QU4gKGUuZy4sIHdpdGggYSBCRCkNCmBgYA0KDQpTbywgMSBWTEFOIOKAlD4gYXQgbGVhc3QgMSBC VCAoMTptYW55KQ0KDQpgYGANCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgd2hlcmUgaW4gdHVybiBpdCBpcw0KICAgYXNzb2NpYXRlZCB3aXRoIGEgc2lu Z2xlIE1BQy1WUkYNCmBgYA0KDQpTbywgMSBNQUMtVlJGIOKAlD4gYXQgbGVhc3QgMSBCVCAoMTpt YW55KQ0KDQpgYGANCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGluIHRoZSBj YXNlIG9mIFZMQU4tQmFzZWQgbW9kZSBvciBhDQogICBudW1iZXIgb2YgQlRzIGNhbiBiZSBhc3Nv Y2lhdGVkIHdpdGggYSBzaW5nbGUgTUFDLVZSRiBpbiB0aGUgY2FzZSBvZg0KICAgVkxBTi1Bd2Fy ZSBCdW5kbGUgbW9kZS4NCmBgYA0KDQpTbywgMSBNQUMtVlJGIOKAlD4gYXQgbGVhc3QgMSBCVCAo MTptYW55KQ0KDQpTaW5jZSB0aGlzIGlzIHN0YXRlZCBhcyBhbiBleGNlcHRpb24gSSBndWVzcyB0 aGF0IG1lYW5zIHlvdSBtZWFudCB0aGUgcHJlY2VkaW5nDQp0d28gKHRoYXQgSSBwYXJzZWQgYXMg MTptYW55KSBhcmUgYWN0dWFsbHkgc3VwcG9zZWQgdG8gYmUgMToxPyBJZiBzbyBJIHRoaW5rDQp0 aGlzIG5lZWRzIGEgcmV3cml0ZSAoaXQgcHJvYmFibHkgZG9lcyByZWdhcmRsZXNzLCBmb3IgY2xh cml0eSkuDQoNCjYuIFNlY3Rpb24gNC4xDQoNCldoZW4geW91IHdyaXRlIOKAnEludGVybmV0IHN0 YW5kYXJkIGJpdCBvcmRlcuKAnCwgZG8geW91IG1lYW4g4oCcbmV0d29yayBieXRlIG9yZGVy4oCc Pw0KQWx0aG91Z2ggZXZlbiBuZXR3b3JrIGJ5dGUgb3JkZXIgYXBwZWFycyB0byBiZSBub24tYXBw bGljYWJsZSwgc2luY2UgdGhlIHZhbHVlcw0KYXJlIHNob3duIHdpdGggYW4gZXhwbGljaXQgYnl0 ZSBvcmRlci4NCg0KSSByZWFsaXplIHRoZSBkZWZpbml0aW9ucyBhcmUgbWVyZWx5IHBhc3RlZCBm cm9tIFJGQyA1Nzk4IGFuZCB0aGF0IHNoaXAgaGFzDQpzYWlsZWQsIGJ1dCB1bmxlc3MgeW91IGNh biBleHBsYWluIHdoYXQg4oCcKGluIGhleCwgaW4gSW50ZXJuZXQgc3RhbmRhcmQNCmJpdC1vcmRl cinigJ0gaXMgc3VwcG9zZWQgdG8gbWVhbiwgSSBzdWdnZXN0IHJlbW92aW5nIGl0LiAoQWx0ZXJu YXRlbHkgYW5kIGxlc3MNCmRlc2lyYWJseSwgbWFrZSBpdCBleHBsaWNpdCB0aGF0IHlvdeKAmXJl IHByb3ZpZGluZyBhIGRpcmVjdCBxdW90YXRpb24gb2YgUkZDDQo1Nzk4LikNCg0KNy4gU2VjdGlv biA1LjENCg0KWW91IHNheSB0aGUgRW5jYXBzdWxhdGlvbiBFeHRlbmRlZCBDb21tdW5pdHkgYW5k IFJvdXRlcuKAmXMgTUFDIEV4dGVuZGVkDQpDb21tdW5pdHkgaGF2ZSB0byBiZSBzZW50LCBidXQg eW91IHNheSBub3RoaW5nIGFib3V0IHRoZSByZXF1aXJlZCB2YWx1ZXMuIEZvcg0KUm91dGVyJ3Mg TUFDLCDCpzguMSBzcGVjaWZpZXMgdGhlIHJlcXVpcmVkIHZhbHVlLCBJIHN1Z2dlc3QgYSBmb3J3 YXJkIHJlZmVyZW5jZQ0KdG8gaXQuIEZvciBFbmNhcHN1bGF0aW9uLCB0aGUgY2xvc2VzdCBJIHdh cyBhYmxlIHRvIGZpbmQgdG8gYSBwbGFjZSB3aGVyZSB0aGlzDQppcyBzcGVjaWZpZWQgd2FzIHNl Y3Rpb24gOS4xLjEsIGJ1dCB0aGF0J3Mgb25seSBhbiBleGFtcGxlLiBUaGVyZSByZWFsbHkgbmVl ZHMNCnRvIGJlIHNvbWUgcGxhY2Ugd2hlcmUgaXQncyBzcGVsbGVkIG91dC4gQSBiYXJlIG1pbmlt dW0gd291bGQgYmUgdG8gY2l0ZSBSRkMNCjkwMTIgwqc0LjEsIGJ1dCB0aGF0IGp1c3QgcHJvdmlk ZXMgdGhlIHN5bnRheCAtLSB5b3UgcmVhbGx5IHNob3VsZCBzYXkgc29tZXRoaW5nDQptb3JlIGFi b3V0IGhvdyB0byBkZWNpZGUgd2hhdCB2YWx1ZSB0byBzZW5kLiBGb3IgdGhhdCBtYXR0ZXIsIGl0 IGNvdWxkIGJlIHdoYXQNCnZhbHVlUyB0byBzZW5kIC0tIGlzIGl0IGxlZ2FsIGZvciBhIE5WRSB0 byBhZHZlcnRpc2UgbXVsdGlwbGUgRW5jYXBzdWxhdGlvbg0KRXh0ZW5kZWQgQ29tbXVuaXRpZXM/ IFlvdSBkb24ndCBzYXkgaXQgaXNuJ3QsIGFuZCB0aGVyZSBhcmUgcG90ZW50aWFsIHJlYXNvbnMN CnRvIGRvIHNvLg0KDQo4LiBTZWN0aW9uIDUuMg0KDQpgYGANCiAgIG8gIFVzaW5nIE1BQy1WUkYg Um91dGUgVGFyZ2V0IChhbmQgRXRoZXJuZXQgVGFnIGlmIGRpZmZlcmVudCBmcm9tDQogICAgICB6 ZXJvKSwgaXQgaWRlbnRpZmllcyB0aGUgY29ycmVzcG9uZGluZyBNQUMtVlJGIChhbmQgQlQpLiAg SWYgdGhlDQogICAgICBNQUMtIFZSRiAoYW5kIEJUKSBleGlzdHMgKGUuZy4sIGl0IGlzIGxvY2Fs bHkgY29uZmlndXJlZCkgdGhlbiBpdA0KYGBgDQoNCllvdSB1c2Ug4oCcZS5nLuKAnSBzbyBJIHBy ZXN1bWUgdGhlcmUgbWlnaHQgYmUgb3RoZXIgcmVhc29ucyB0aGUgTUFDLVZSRiBhbmQgQlQNCm1p Z2h0IGV4aXN0IGV2ZW4gaWYgbm90IGxvY2FsbHkgY29uZmlndXJlZD8NCg0KYGBgDQogICAgICBp bXBvcnRzIHRoZSBNQUMgYWRkcmVzcyBpbnRvIGl0LiAgT3RoZXJ3aXNlLCBpdCBkb2VzIG5vdCBp bXBvcnQNCiAgICAgIHRoZSBNQUMgYWRkcmVzcy4NCg0KICAgbyAgVXNpbmcgSVAtVlJGIHJvdXRl IHRhcmdldCwgaXQgaWRlbnRpZmllcyB0aGUgY29ycmVzcG9uZGluZyBJUC1WUkYNCiAgICAgIGFu ZCBpbXBvcnRzIHRoZSBJUCBhZGRyZXNzIGludG8gaXQuDQpgYGANCg0KWW91IGRvbuKAmXQgcHJv dmlkZSBhbnkgY29uZGl0aW9uYWwgbGFuZ3VhZ2UgaW4gdGhpcyBidWxsZXQgYWJvdXQg4oCcaWYg dGhlIElQLVZSRg0KZXhpc3Rz4oCdLiBXaHkgaXMgdGhhdCBjYXZlYXQgcmVxdWlyZWQgZm9yIE1B Qy1WUkYgYnV0IG5vdCBmb3IgSVAtVlJGPw0KDQo5LiBTZWN0aW9uIDUuMg0KDQpgYGANCiAgIFRo ZSBpbmNsdXNpb24gb2YgTVBMUyBsYWJlbDIgZmllbGQgaW4gdGhpcyByb3V0ZSBzaWduYWxzIHRv IHRoZQ0KICAgcmVjZWl2aW5nIFBFIHRoYXQgdGhpcyByb3V0ZSBpcyBmb3Igc3ltbWV0cmljIElS QiBtb2RlIGFuZCBNUExTDQogICBsYWJlbDIgbmVlZHMgdG8gYmUgaW5zdGFsbGVkIGluIGZvcndh cmRpbmcgcGF0aCB0byBpZGVudGlmeSB0aGUNCiAgIGNvcnJlc3BvbmRpbmcgSVAtVlJGLg0KYGBg DQoNCkkgd2FzIHVuYWJsZSB0byBtYWtlIGhlYWQgbm9yIHRhaWwgb2YgdGhpcyBwYXJhZ3JhcGgu IEkgc3VwcG9zZSDCpzUuNCBpcyB3aGVyZQ0KdGhlIGJlaGF2aW9yIGlzIGFjdHVhbGx5IHNwZWNp ZmllZCwgc28gaW4gYSB3YXkgaXQgZG9lc27igJl0IG1hdHRlciAoYWx0aG91Z2gNCm1heWJlIGEg Zm9yd2FyZCByZWZlcmVuY2Ugd291bGQgaGVscCkuDQoNCjEwLiBTZWN0aW9uIDUuMg0KDQpgYGAN CiAgIElmIHRoZSByZWNlaXZpbmcgUEUgcmVjZWl2ZXMgdGhpcyByb3V0ZSB3aXRoIGJvdGggdGhl IE1BQy1WUkYgYW5kIElQLQ0KICAgVlJGIHJvdXRlIHRhcmdldHMgYW5kIGlmIHRoZSByZWNlaXZp bmcgUEUgZG9lcyBub3Qgc3VwcG9ydCBlaXRoZXINCiAgIGFzeW1tZXRyaWMgb3Igc3ltbWV0cmlj IElSQiBtb2RlcywgdGhlbiBpZiBpdCBoYXMgdGhlIGNvcnJlc3BvbmRpbmcNCiAgIE1BQy1WUkYs IGl0IG9ubHkgaW1wb3J0cyB0aGUgTUFDIGFkZHJlc3MuICBPdGhlcndpc2UsIGlmIGl0IGRvZXNu J3QNCiAgIGhhdmUgdGhlIGNvcnJlc3BvbmRpbmcgTUFDLVZSRiwgaXQgbXVzdCBub3QgaW1wb3J0 IHRoaXMgcm91dGUuDQpgYGANCg0KSWYgaXQgZG9lc27igJl0IHN1cHBvcnQgZWl0aGVyIGFzeW1t ZXRyaWMgb3Igc3ltbWV0cmljIElSQiBtb2RlcywgdGhlbiBkb2VzbuKAmXQNCnRoYXQgbWVhbiBp dCBkb2VzbuKAmXQgaW1wbGVtZW50IHRoaXMgc3BlY2lmaWNhdGlvbiBhdCBhbGw/IEluIHRoYXQg Y2lyY3Vtc3RhbmNlLA0KaG93IGRvIHlvdSBleHBlY3QgeW91ciDigJxtdXN0IG5vdOKAnSB0byBi ZSByZXNwZWN0ZWQ/DQoNCjExLiBTZWN0aW9uIDUuMw0KDQpgYGANCiAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICBJZiBob3N0IEIncyAoTUFDLCBJUCkgaGFzIG5vdCB5ZXQgYmVlbg0KICAg bGVhcm50IGVpdGhlciB2aWEgYSBncmF0dWl0b3VzIEFSUCBPUiB2aWEgYSBwcmlvciBnbGVhbmlu ZyBwcm9jZWR1cmUsDQogICBhIG5ldyBnbGVhbmluZyBwcm9jZWR1cmUgTVVTVCBiZSB0cmlnZ2Vy ZWQNCmBgYA0KDQpTaW5jZSB5b3XigJl2ZSB1c2VkIE1VU1QgaGVyZSwgeW91IE1VU1QgcHJvdmlk ZSBhIHJlZmVyZW5jZSB0byB3aGVyZSB0aGUg4oCcbmV3DQpnbGVhbmluZyBwcm9jZWR1cmXigJ0g aXMgc3BlY2lmaWVkLg0KDQpBbHNvLCBoYXMgbm90IGJlZW4gbGVhcm50IGJ5IHdob20/IFRoZSBw cm9jZWR1cmUgbXVzdCBiZSB0cmlnZ2VyZWQgd2hlcmU/DQoNCjEyLiBTZWN0aW9uIDUuMw0KDQpU aGUgc2Vjb25kIHBhcmFncmFwaCwgdGhhdCBiZWdpbnMgIkNvbnNpZGVyIGEgc3VibmV0IEEiLCBp cyB0cmVtZW5kb3VzbHkNCmNvbmZ1c2luZyB0byBhIGZpcnN0LXRpbWUgcmVhZGVyIChvciBhdCBs ZWFzdCB0byB0aGlzIGZpcnN0LXRpbWUgcmVhZGVyKS4gSQ0KcmVhbGl6ZSB5b3UgcHJvYmFibHkg dGhpbmsgeW91J3JlIGJlaW5nIGhlbHBmdWwgYnkgcHJvdmlkaW5nIGEgd29ya2VkIGV4YW1wbGUs DQpidXQgYXMgSSByZWFkIHRocm91Z2ggaXQsIGl0IHdhcyB0aGUgb3Bwb3NpdGUgb2YgaGVscGZ1 bC4gVGhpcyBpcyBlc3BlY2lhbGx5DQp0cnVlIGJlY2F1c2Ugwqc1IGFuZCBpdHMgc3Vic2VjdGlv bnMgaXMgYWJvdXQgIlN5bW1ldHJpYyBJUkIgUHJvY2VkdXJlcyIgLS0gYW5kDQp0aGUgcGFyYWdy YXBoIGluIHF1ZXN0aW9uIHByb3ZpZGVzIG5vIHByb2NlZHVyZXMuDQoNClNvbWUgb3B0aW9ucyB0 byBpbXByb3ZlIHRoZSBzaXR1YXRpb24gLS0NCg0KLSBSZW1vdmUgdGhlIHBhcmFncmFwaCBlbnRp cmVseS4NCi0gUHJlZmFjZSB0aGUgcGFyYWdyYXBoIHdpdGggImFzIGFuIGV4YW1wbGUgdG8gc2hv dyB3aHkgYWR2ZXJ0aXNlbWVudCBhcyBSVC01DQppcyByZXF1aXJlZCwiDQoNCjEzLiBTZWN0aW9u IDUuNA0KDQpgYGANCiAgIG8gIGdsb2JhbCBtb2RlOiBWTkkgaXMgc2V0IHRvIHRoZSByZWNlaXZl ZCBsYWJlbDIgaW4gdGhlIHJvdXRlIHdoaWNoDQogICAgICBpcyBkb21haW4td2lkZSBhc3NpZ25l ZC4gIFRoaXMgVk5JIHZhbHVlIGZyb20gcmVjZWl2ZWQgbGFiZWwyIE1VU1QNCiAgICAgIGJlIHRo ZSBzYW1lIGFzIHRoZSBsb2NhbGx5IGNvbmZpZ3VyZWQgVk5JIGZvciB0aGUgSVAgVlJGIGFzIGFs bA0KICAgICAgUEVzIGluIHRoZSBOVk8gTVVTVCBiZSBjb25maWd1cmVkIHdpdGggdGhlIHNhbWUg SVAgVlJGIFZOSSBmb3INCiAgICAgIHRoaXMgbW9kZSBvZiBvcGVyYXRpb24uDQpgYGANCg0KV2hh dCBhY3Rpb24gaXMgdG8gYmUgdGFrZW4gaWYgdGhpcyBNVVNUIGlzIHZpb2xhdGVkPw0KDQoxNC4g U2VjdGlvbiA2LjENCg0KYGBgDQogICBGb3IgYXN5bW1ldHJpYyBJUkIgbW9kZSwgUm91dGVyJ3Mg TUFDIEVDIGlzIG5vdCBuZWVkZWQgYmVjYXVzZQ0KYGBgDQoNClBsZWFzZSBlaXRoZXIgZXhwYW5k IOKAnEVD4oCdIG9yIGFkZCBpdCB0byB5b3VyIGRlZmluaXRpb25zIHNlY3Rpb24uIChBbHNvIGFw cGxpZXMNCnRvIDUuMSkNCg0KMTUuIFNlY3Rpb24gNi4yDQoNCmBgYA0KICAgbyAgSWYgb25seSBN QUMtVlJGIHJvdXRlIHRhcmdldCBpcyB1c2VkLCB0aGVuIHRoZSByZWNlaXZpbmcgUEUgdXNlcw0K ICAgICAgdGhlIE1BQy1WUkYgcm91dGUgdGFyZ2V0IHRvIGlkZW50aWZ5IHRoZSBjb3JyZXNwb25k aW5nIElQLVZSRiAtLQ0KICAgICAgaS5lLiwgbWFueSBNQUMtVlJGIHJvdXRlIHRhcmdldHMgbWFw IHRvIHRoZSBzYW1lIElQLVZSRiBmb3IgYQ0KICAgICAgZ2l2ZW4gdGVuYW50LiAgSW4gdGhpcyBj YXNlLCBNQUMtVlJGIG1heSBiZSB1c2VkIGJ5IHRoZSByZWNlaXZpbmcNCiAgICAgIFBFIHRvIGlk ZW50aWZ5IHRoZSBjb3JyZXNwb25kaW5nIElQIFZSRg0KYGBgDQoNCkRvIHlvdSBtZWFuIOKAnGlu IHRoaXMgY2FzZSwgdGhlIE1BQy1WUkYgKnJvdXRlIHRhcmdldCogbWF5IGJlIHVzZWTigKbigJ0/ DQoNCjE2LiBTZWN0aW9uIDYuMg0KDQpgYGANCiAgIElmIHRoZSByZWNlaXZpbmcgUEUgcmVjZWl2 ZXMgdGhlIE1BQy9JUCBBZHZlcnRpc2VtZW50IHJvdXRlIHdpdGggTVBMUw0KICAgbGFiZWwyIGZp ZWxkIGFuZCBpdCB1c2VzIHN5bW1ldHJpYyBJUkIgbW9kZQ0KYGBgDQoNClRoaXMgZW50aXJlIHNl Y3Rpb24gaXMgZW50aXRsZWQg4oCcYXN5bW1ldHJpYyBJUkIgcHJvY2VkdXJlc+KAnC4gV2h5IGlz IHRoZXJlDQpzcGVjaWZpY2F0aW9uIGxhbmd1YWdlIHJlZ2FyZGluZyBzeW1tZXRyaWMgcHJvY2Vk dXJlcyBpbiBpdD8gKEnigJltIHByZXR0eSBzdXJlDQp0aGlzIGlzIG5vdCB0aGUgb25seSBwbGFj ZSB0aGlzIGtpbmQgb2YgcHJvYmxlbSBhcHBlYXJzLikNCg0KMTcuIFNlY3Rpb24gNy4zDQoNCmBg YA0KICAgT24gdGhlIHNvdXJjZSBOVkUsIGFuIGFnZS1vdXQgdGltZXIgKGZvciB0aGUgc2lsZW50 IGhvc3QgdGhhdCBoYXMNCiAgIG1vdmVkKSBpcyB1c2VkIHRvIHRyaWdnZXIgYW4gQVJQIHByb2Jl LiAgVGhpcyBhZ2Utb3V0IHRpbWVyIGNhbiBiZQ0KICAgZWl0aGVyIEFSUCB0aW1lciBvciBNQUMg YWdlLW91dCB0aW1lciBhbmQgdGhpcyBpcyBhbiBpbXBsZW1lbnRhdGlvbg0KICAgY2hvaWNlLiAg VGhlIEFSUCByZXF1ZXN0IGdldHMgc2VudCBib3RoIGxvY2FsbHkgdG8gYWxsIHRoZSBhdHRhY2hl ZA0KICAgVFNlcyBvbiB0aGF0IHN1Ym5ldCBhcyB3ZWxsIGFzIGl0IGdldHMgc2VudCB0byBhbGwg dGhlIHJlbW90ZSBOVkVzDQogICAoaW5jbHVkaW5nIHRoZSB0YXJnZXQgTlZFKSBwYXJ0aWNpcGF0 aW5nIGluIHRoYXQgc3VibmV0LiAgVGhlIHNvdXJjZQ0KICAgTlZFIGFsc28gd2l0aGRyYXcgdGhl IEVWUE4gTUFDL0lQIEFkdmVydGlzZW1lbnQgcm91dGUgd2l0aCBvbmx5IHRoZQ0KICAgTUFDIGFk ZHJlc3MgKGlmIGl0IGhhcyBwcmV2aW91c2x5IGFkdmVydGlzZWQgc3VjaCBhIHJvdXRlKS4NCmBg YA0KDQpXb3VsZG7igJl0IHRoZSBzb3VyY2UgTlZFIG9ubHkgd2l0aGRyYXcgdGhlIHJvdXRlIGFm dGVyIGEgdGltZW91dCBoYWQgZXhwaXJlZD8gQXMNCnlvdSBoYXZlIHdyaXR0ZW4gdGhpcyBwYXJh Z3JhcGgsIGluIGNhc2UgdGhlIHNpbGVudCBUUyBoYXMgbm90IG1vdmVkLCB0aGUNCmZvbGxvd2lu ZyB3b3VsZCBoYXBwZW46DQoNCmBgYA0KVGltZSB0OiBhZ2Utb3V0IHRpbWVyIGZpcmVzLCBBUlAg cHJvYmUgaXMgc2VudA0KVGltZSB0OiBOVkUgd2l0aGRyYXdzIHJvdXRlIGFkdmVydGlzZW1lbnQN ClRpbWUgdSA+IHQ6IFRTIHJlY2VpdmVzIEFSUCBwcm9iZSwgc2VuZHMgQVJQIHJlcGx5DQpUaW1l IHYgPiB1OiBOVkUgcmVjZWl2ZXMgQVJQIHJlcGx5DQpUaW1lIHY6IE5WRSByZS1hZHZlcnRpc2Vz IHJvdXRlDQpgYGANCg0KUHJlc3VtYWJseSB0aGlzIGNodXJuIGlzbuKAmXQgd2hhdCB5b3UgaW50 ZW5kZWQuDQoNCjE4LiBTZWN0aW9uIDkuMg0KDQpIb3cgZG9lcyB0aGUgTlZFIGxlYXJuIHdoYXQg c3VibmV0cyBhcmUgYmVoaW5kIGl0cyBhdHRhY2hlZCBUUz8NCg0KMTkuIFNlY3Rpb24gOS4yDQoN CldoYXQgYWJvdXQgaWYgVFM0IHdhbnRzIHRvIHJlYWNoIFNOMT8gSG93IGRvZXMgaXQga25vdyB3 aGVyZSB0byBzZW5kIHRoZQ0KcGFja2V0PyAoSSBzdXBwb3NlIHRoZSBhbnN3ZXIgbWF5IGJlIHRo ZSBzYW1lIGFzIGZvciAjMTguKQ0KDQoNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX18NCkJFU1MgbWFpbGluZyBsaXN0DQpCRVNTQGlldGYub3JnPG1haWx0 bzpCRVNTQGlldGYub3JnPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9i ZXNzDQoNCg== --_000_TU4PR8401MB1248F7A511CDA597C3423F3194FA9TU4PR8401MB1248_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRvciIgY29udGVu dD0iTWljcm9zb2Z0IEV4Y2hhbmdlIFNlcnZlciI+DQo8IS0tIGNvbnZlcnRlZCBmcm9tIHJ0ZiAt LT4NCjxzdHlsZT48IS0tIC5FbWFpbFF1b3RlIHsgbWFyZ2luLWxlZnQ6IDFwdDsgcGFkZGluZy1s ZWZ0OiA0cHQ7IGJvcmRlci1sZWZ0OiAjODAwMDAwIDJweCBzb2xpZDsgfSAtLT48L3N0eWxlPg0K PC9oZWFkPg0KPGJvZHk+DQo8Zm9udCBmYWNlPSJDYWxpYnJpIiBzaXplPSIyIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExcHQ7Ij4NCjxkaXY+SSBoYXZlIHF1ZXJ5IHJlZ2FyZGluZyB0aGUgZm9s bG93aW5nIHRleHQgaW4gdGhlIHNlY3Rpb24gJnF1b3Q7IDxhIGhyZWY9Imh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tNC4zLjEiPjxmb250IGNvbG9yPSIjMDU2M0MxIj48dT5odHRw czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xPC91PjwvZm9udD48L2E+JnF1b3Q7 DQo6PC9kaXY+DQo8ZGl2Pjxmb250IHNpemU9IjIiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTBw dDsiPjxpPiZxdW90OyA8L2k+PGk+W0lQNywgTTFdIGlzIGxlYXJudCBhcyBhIG5ldyByb3V0ZSBh dDwvaT48L3NwYW4+PC9mb250PjwvZGl2Pg0KPGRpdj48Zm9udCBzaXplPSIyIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjEwcHQ7Ij48aT4mbmJzcDsmbmJzcDsgW1BFMywgUEU0XSBhbmQgYWR2ZXJ0 aXNlZCB0byByZW1vdGUgUEVzIHdpdGggYSBzZXF1ZW5jZSBudW1iZXIgb2YgMC48L2k+PC9zcGFu PjwvZm9udD48L2Rpdj4NCjxkaXY+PGZvbnQgc2l6ZT0iMiI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMHB0OyI+PGk+Jm5ic3A7Jm5ic3A7IEFzIGEgcmVzdWx0LCBMMyByZWFjaGFiaWxpdHkgdG8g SVA3IHdvdWxkIGJlIGVzdGFibGlzaGVkIGFjcm9zcyB0aGU8L2k+PC9zcGFuPjwvZm9udD48L2Rp dj4NCjxkaXY+PGZvbnQgc2l6ZT0iMiI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMHB0OyI+PGk+ Jm5ic3A7Jm5ic3A7IG92ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0eSBwcm9jZWR1cmUgZm9y IE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhczwvaT48L3NwYW4+PC9mb250PjwvZGl2Pg0KPGRpdj48 Zm9udCBzaXplPSIyIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwcHQ7Ij48aT4mbmJzcDsmbmJz cDsgYSByZXN1bHQgb2YgdGhpcyBNQUMtSVAgcm91dGUgYWR2ZXJ0aXNlbWVudDwvaT48aT4mcXVv dDs8L2k+PC9zcGFuPjwvZm9udD48L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PklmIGEg aG9zdCBpcyBtb3ZlZCB3aXRoIHRoZSBzYW1lIE1BQywgdGhlIGZvbGxvd2luZyBpcyBzdGlsbCBi ZWluZyBmb2xsb3dpbmcgaW4gY3VycmVudCBpbXBsZW1lbnRhdGlvbihzKTo8L2Rpdj4NCjxkaXY+ LSBFaXRoZXIgJnF1b3Q7TUFDLW9ubHktcm91dGUmcXVvdDsgb3IgJnF1b3Q7TUFDLUlQLXJvdXRl JnF1b3Q7IGFkdmVydGlzZW1lbnQsIHRoZSBzZXF1ZW5jZSBudW1iZXIgaXMgYnVtcGVkIGluIGJv dGggY2FzZXM8L2Rpdj4NCjxkaXY+LSBPbiByZWNlaXZpbmcgc2lkZSwgPC9kaXY+DQo8ZGl2PiZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyAtJm5ic3A7IHRoZSBzZXF1ZW5jZS1udW1iZXIg aXMgcGlja2VkIHVwIGZyb20gJnF1b3Q7TUFDLW9ubHktcm91dGUmcXVvdDsgb3IgJnF1b3Q7TUFD LUlQLXJvdXRlJnF1b3Q7IGFuZCBhcHBsaWVkIHRvIE1BQyBsZWFybmluZ3M8L2Rpdj4NCjxkaXY+ Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0gdGhlIGJ1bXBlZCB1cCBzZXF1ZW5jZSBu dW1iZXIgbGVhZHMgYSB3aXRoZHJhdyBvZiAmcXVvdDtNQUMtb25seSZxdW90OyBvciAmcXVvdDtN QUMtSVAtcm91dGUmcXVvdDsgZnJvbSB0aGUgaW5mZXJpb3IgKGVhcmxpZXIpIHB1Ymxpc2hlcjwv ZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+S2luZGx5IGhlbHAgZXhwbGFpbiwgaWYgdGhl IHRleHQgbWVudGlvbmVkIGluIOKAnHNlY3Rpb24gNC4zLjHigJ0gaXMgY3JlYXRpbmcgc29tZSBk b3VidHMgcmVnYXJkaW5nIHRoZSB3YXkgdGhpbmdzIG9wZXJhdGUgd2l0aCBjdXJyZW50IHN0YW5k YXJkcy48L2Rpdj4NCjxkaXY+VGhvdWdoIEkgZGVmaW5pdGVseSBiZWxpZXZlIHRoYXQgdGhpcyBs aXRlcmF0dXJlIGRvZXMgYXdheSB3aXRoIGxvdCBvZiBleGlzdGluZyBhbWJpZ3VpdGllcy48L2Rp dj4NCjxkaXY+SSB0aGluayB3ZSBuZWVkIHRvIHBhcmFwaHJhc2UgdGhpcyBzZWN0aW9uIGF0bGVh c3QuPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5UaGFua3M8L2Rpdj4NCjxkaXY+U2F1 bXlhLjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2Pi0t LS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tPGJyPg0KDQpGcm9tOiBCRVNTIFs8YSBocmVmPSJtYWls dG86YmVzcy1ib3VuY2VzQGlldGYub3JnIj5tYWlsdG86YmVzcy1ib3VuY2VzQGlldGYub3JnPC9h Pl0gT24gQmVoYWxmIE9mIEpvaG4gU2N1ZGRlciB2aWEgRGF0YXRyYWNrZXI8YnI+DQoNClNlbnQ6 IFRodXJzZGF5LCBKdWx5IDE1LCAyMDIxIDQ6NTMgQU08YnI+DQoNClRvOiBUaGUgSUVTRyAmbHQ7 aWVzZ0BpZXRmLm9yZyZndDs8YnI+DQoNCkNjOiB6emhhbmdAanVuaXBlci5uZXQ7IGJlc3MtY2hh aXJzQGlldGYub3JnOyBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGlu Z0BpZXRmLm9yZzsgYmVzc0BpZXRmLm9yZzxicj4NCg0KU3ViamVjdDogW2Jlc3NdIEpvaG4gU2N1 ZGRlcidzIE5vIE9iamVjdGlvbiBvbiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQt Zm9yd2FyZGluZy0xNDogKHdpdGggQ09NTUVOVCk8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8 ZGl2PkpvaG4gU2N1ZGRlciBoYXMgZW50ZXJlZCB0aGUgZm9sbG93aW5nIGJhbGxvdCBwb3NpdGlv biBmb3I8L2Rpdj4NCjxkaXY+ZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndh cmRpbmctMTQ6IE5vIE9iamVjdGlvbjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+V2hl biByZXNwb25kaW5nLCBwbGVhc2Uga2VlcCB0aGUgc3ViamVjdCBsaW5lIGludGFjdCBhbmQgcmVw bHkgdG8gYWxsIGVtYWlsIGFkZHJlc3NlcyBpbmNsdWRlZCBpbiB0aGUgVG8gYW5kIENDIGxpbmVz LiAoRmVlbCBmcmVlIHRvIGN1dCB0aGlzIGludHJvZHVjdG9yeSBwYXJhZ3JhcGgsIGhvd2V2ZXIu KTwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PlBsZWFz ZSByZWZlciB0byA8YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9yZy9pZXNnL3N0YXRlbWVudC9k aXNjdXNzLWNyaXRlcmlhLmh0bWwiPmh0dHBzOi8vd3d3LmlldGYub3JnL2llc2cvc3RhdGVtZW50 L2Rpc2N1c3MtY3JpdGVyaWEuaHRtbDwvYT48L2Rpdj4NCjxkaXY+Zm9yIG1vcmUgaW5mb3JtYXRp b24gYWJvdXQgRElTQ1VTUyBhbmQgQ09NTUVOVCBwb3NpdGlvbnMuPC9kaXY+DQo8ZGl2PiZuYnNw OzwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+VGhlIGRvY3VtZW50LCBhbG9uZyB3aXRo IG90aGVyIGJhbGxvdCBwb3NpdGlvbnMsIGNhbiBiZSBmb3VuZCBoZXJlOjwvZGl2Pg0KPGRpdj48 YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy8iPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5v cmcvZG9jL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5nLzwvYT4N CjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PiZuYnNw OzwvZGl2Pg0KPGRpdj4tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tPC9kaXY+DQo8ZGl2PkNPTU1FTlQ6PC9kaXY+DQo8 ZGl2Pi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS08L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PlRoYW5rcyB0 byB0aGUgYXV0aG9ycyBmb3IgdGhlaXIgd29yayBpbiBhZGRyZXNzaW5nIG15IGNvbW1lbnRzLiBD b3B5aW5nIG15PC9kaXY+DQo8ZGl2PihyZXNvbHZlZCkgZGlzY3VzcyBwb2ludHMgaGVyZSBmb3Ig cG9zdGVyaXR5LjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+LS0tLTwvZGl2Pg0KPGRp dj4mbmJzcDs8L2Rpdj4NCjxkaXY+SSBmb3VuZCB0aGlzIGRvY3VtZW50IGRpZmZpY3VsdCB0byBy ZXZpZXcuIFNvbWUgb2YgdGhpcyBtaWdodCBiZSBkdWUgdG8gdGhlPC9kaXY+DQo8ZGl2PmZhY3Qg dGhhdCBJJ20gbm90IGFuIGV4cGVydCBvbiBFVlBOLCBidXQgSSB0aGluayBzb21lIG9mIHRoZSBy ZWFzb24gaXMgdGhhdCB0aGU8L2Rpdj4NCjxkaXY+ZG9jdW1lbnQgY291bGQgYmUgc3RydWN0dXJl ZCBiZXR0ZXIgYW5kIGV4cHJlc3NlZCBtb3JlIGNsZWFybHkuIFRoZSBvbmx5IHJlYXNvbjwvZGl2 Pg0KPGRpdj5JJ20gbm90IG9wcG9zaW5nIHByb2dyZXNzaW9uIG9mIHRoZSBkb2N1bWVudCBvbiB0 aGUgZ3JvdW5kcyB0aGF0IGl0J3MgdG9vPC9kaXY+DQo8ZGl2PnVuY2xlYXIgdG8gaW1wbGVtZW50 IGlzIHRoYXQgSSd2ZSBiZWVuIHRvbGQsIGFuZCBhY2NlcHQgb24gZmFpdGgsIHRoYXQ8L2Rpdj4N CjxkaXY+aW1wbGVtZW50YXRpb25zICpoYXZlKiBiZWVuIHN1Y2Nlc3NmdWxseSB3cml0dGVuIHN0 YXJ0aW5nIGZyb20gdGhlIHNwZWMsIHdoaWNoPC9kaXY+DQo8ZGl2PmltcGxpZXMgaXQncyBpbXBs ZW1lbnRhYmxlIC0tIEkgZ3Vlc3MgYnkgcGVvcGxlIHdobyBhcmUgZXhwZXJ0IGluIEVWUE4gYWxy ZWFkeSw8L2Rpdj4NCjxkaXY+aXQgd291bGRuJ3QgYmUgaW1wbGVtZW50YWJsZSBieSBtZS48L2Rp dj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PkluIGFueSBjYXNlLCBJIGRvIGhhdmUgc29tZSBw b2ludHMgSSB3b3VsZCBsaWtlIHRvIGRpc2N1c3MsIHRoYXQgYXJlIG1vcmU8L2Rpdj4NCjxkaXY+ YWN0aW9uYWJsZS48L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PjEuIEkgYWdyZWUgd2l0 aCBSb2JlcnQgV2lsdG9uJ3MgY29tbWVudCBvbiAtMDk6PC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2 Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+T25lIHF1ZXN0aW9uIEkgaGF2ZSBpcyB3aGV0aGVyIGl0 IGlzIHBvc3NpYmxlIHRvIGhhdmUgYSBkZXBsb3ltZW50IHdoZXJlIHNvbWU8L2Rpdj4NCjxkaXY+ ZGV2aWNlcyBzdXBwb3J0IHN5bmNocm9ub3VzIG1vZGUgYW5kIG90aGVycyBzdXBwb3J0IGFzeW5j aHJvbm91cyBtb2RlLiZuYnNwOyBBbSBJPC9kaXY+DQo8ZGl2PnJpZ2h0IGluIHByZXN1bWluZyB0 aGF0IHRoaXMgaXMgbm90IHN1cHBvcnRlZCBhbmQgaWYgc28gaXMgdGhpcyBjYXBhYmlsaXR5PC9k aXY+DQo8ZGl2PnNpZ25hbGVkIGluIGFueSB3YXk/IE9yIGlzIHRoZSBleHBlY3RhdGlvbiB0aGF0 IHRoaXMgd291bGQgYmUgY29udHJvbGxlZCB2aWE8L2Rpdj4NCjxkaXY+ZGVwbG95bWVudCBjaG9p Y2Ugb2YgbmV0d29yayBkZXZpY2UsIG9yIHRob3VnaCBjb25maWd1cmF0aW9uIG1hbmFnZW1lbnQ/ IGBgYDwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+VGhpcyBpc3N1ZSBzdGlsbCBleGlz dHMgaW4gLTE0LiBJIHRoaW5rIGl0IHNob3VsZCBiZSBhZGRyZXNzZWQgaW4gdGhlIGRvY3VtZW50 LjwvZGl2Pg0KPGRpdj5TaW1pbGFybHksIEkgYWdyZWUgd2l0aCBXYXJyZW4gS3VtYXJpJ3MgY29t bWVudCwgYWxzbyBvbiAtMDk6PC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8L2Rp dj4NCjxkaXY+SSB3b3VsZCBzdHJvbmdseSByZWNvbW1lbmQgdGhhdCB0aGUgYXV0aG9ycyByZWFk IHRoZSBPcHNEaXIgcmV2aWV3IGF0OjwvZGl2Pg0KPGRpdj48YSBocmVmPSJodHRwczovL2RhdGF0 cmFja2VyLmlldGYub3JnL2RvYy9yZXZpZXctaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZv cndhcmRpbmctMDktb3BzZGlyLWxjLWphZWdnbGktMjAyMC0wNy0wNi8iPmh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL3Jldmlldy1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9y d2FyZGluZy0wOS1vcHNkaXItbGMtamFlZ2dsaS0yMDIwLTA3LTA2LzwvYT4NCjwvZGl2Pg0KPGRp dj4sIGVzcGVjaWFsbHkgdGhlOiAmcXVvdDtpdCB3b3VsZCBiZSBoZWxwZnVsIGlmIHNlY3Rpb24g NCB3b3VsZCBiZSBtb3JlIGV4cGxpY2l0IGZvcjwvZGl2Pg0KPGRpdj5ub24taW1wbGVtZW50b3Jz IG9uIHdoZW4gc3ltZXRyaWMgb3IgYXN5bWV0cmljIG1vZHVsZXMgd291bGQgYmUgY2hvc2VuLCBh cyBpdDwvZGl2Pg0KPGRpdj5zdGFuZHMgdGhlIHZhcmlhdGlvbiBiYXNpY2FsbHkgcmVhZHMgbGlr ZSB0aGUgZW51bWVyYXRpb24gb2YgdGhlIGZlYXR1cmVzIG9mPC9kaXY+DQo8ZGl2PnZhcmlvdXMg aW1wbGVtZW50YXRpb25zLiZxdW90OyBjb21tZW50ICh3aGljaCBJIGZ1bGx5IGFncmVlIHdpdGgp LiBgYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2Pkl0IHNlZW1zIGJvdGggb2YgdGhl c2UgY29tbWVudHMgY291bGQgLS0gYW5kIHNob3VsZCEgLS0gYmUgYWRkcmVzc2VkIGJ5IGFkZGlu ZzwvZGl2Pg0KPGRpdj5hIGZldyBwYXJhZ3JhcGhzIHRhbGtpbmcgYWJvdXQgdGhlc2UgdG9waWNz LiBUaGlzIGNvdWxkIGJlIGRvbmUgZWl0aGVyIGluIMKnNCw8L2Rpdj4NCjxkaXY+YXMgV2FycmVu IHN1Z2dlc3RzLCBvciBpbiBzb21lIG90aGVyIHNlY3Rpb24gKGUuZy4geW91IGNvdWxkIGFkZCBh bjwvZGl2Pg0KPGRpdj4mcXVvdDtvcGVyYXRpb25hbCBjb25zaWRlcmF0aW9ucyZxdW90OyBzZWN0 aW9uKS48L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PjIuIFNlY3Rpb24gNy4xPC9kaXY+ DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5J4oCZbSBndWVzc2luZyB0aGlzIHF1ZXN0aW9uIGlz buKAmXQgdW5pcXVlIHRvIHRoaXMgZG9jdW1lbnQsIGJ1dCBzaW5jZSB0aGlzIGlzPC9kaXY+DQo8 ZGl2PndoZXJlIEkgZW5jb3VudGVyZWQgaXQsIEnigJlsbCBhc2s6IGl0IHNlZW1zIGFzIHRob3Vn aCB0aGUgZGVzY3JpYmVkIG1vYmlsaXR5PC9kaXY+DQo8ZGl2PnByb2NlZHVyZXMgYXJlIHZ1bG5l cmFibGUgdG8gYSBjb25kaXRpb24gd2hlcmUgYSBwYXJ0aWN1bGFyIChJUCwgTUFDKSBhcHBlYXJz PC9kaXY+DQo8ZGl2PmF0IHR3byBkaWZmZXJlbnQgTlZFcyBhdCB0aGUgc2FtZSB0aW1lLiBJZiB0 aGlzIGNvbmRpdGlvbiBleGlzdHMgKGVpdGhlcjwvZGl2Pg0KPGRpdj5pbm5vY2VudGx5LCBvciBt YWxpY2lvdXNseSkgd2hhdCBwcmV2ZW50cyB0aGUgc291cmNlIGFuZCB0YXJnZXQgTlZFcyBmcm9t PC9kaXY+DQo8ZGl2PmNvbnRpbnVhbGx5IGF0dGVtcHRpbmcgdG8gY2xhaW0gdGhlIChJUCwgTUFD KSBmcm9tIG9uZSBhbm90aGVyLCBmbG9vZGluZyB0aGU8L2Rpdj4NCjxkaXY+bmV0d29yayB3aXRo IHVwZGF0ZXMgYWxsIHRoZSB3aGlsZT88L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PihU aGlzIGFwcGxpZXMgdG8gNy4yIGFzIHdlbGwuKTwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxk aXY+U2luY2UgdGhpcyBzZWVtcyBsaWtlIGEgcG90ZW50aWFsIHNlY3VyaXR5IGlzc3VlLCBJJ20g aW5jbHVkaW5nIGl0IGluIG15PC9kaXY+DQo8ZGl2PkRJU0NVU1MuPC9kaXY+DQo8ZGl2PiZuYnNw OzwvZGl2Pg0KPGRpdj4tLS0tPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5CZWxvdyBh cmUgYSBudW1iZXIgb2YgcXVlc3Rpb25zIGFuZCBjb21tZW50cyB0aGF0IEkgaG9wZSBtaWdodCBo ZWxwIGltcHJvdmUgdGhlPC9kaXY+DQo8ZGl2PmRvY3VtZW50LiBJIGhhdmVuJ3QgY2hvc2VuIHRv IG1ha2UgdGhlbSBibG9ja2luZyBieSBpbmNsdWRpbmcgdGhlbSBpbiBteTwvZGl2Pg0KPGRpdj5E SVNDVVNTOyBub25ldGhlbGVzcyBJIHdvdWxkIGFwcHJlY2lhdGUgcmVwbGllcyB0byB0aGVtLjwv ZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+MS4gSSBhZ3JlZSB3aXRoIHRoZSBjb21tZW50 cyBieSBzZXZlcmFsIG9mIHRoZSBvdGhlciByZXZpZXdlcnMsIHRoYXQgdGhlcmUgYXJlPC9kaXY+ DQo8ZGl2Pmp1c3QgdG9vIG1hbnkgZ3JhdHVpdG91cyBhY3JvbnltcyBpbiB0aGlzIGRvY3VtZW50 LiBUaGV5IGFyZW4ndCB0aGUgb25seSB0aGluZzwvZGl2Pg0KPGRpdj50aGF0IG1ha2VzIGl0IGhh cmQgdG8gcmVhZCwgYnV0IHRoZXkgY2VydGFpbmx5IGNvbnRyaWJ1dGUuIEknbSBkaXNhcHBvaW50 ZWQgdG88L2Rpdj4NCjxkaXY+c2VlIHRoaXMgaGFzbid0IGJlZW4gYWRkcmVzc2VkIGJldHdlZW4g dmVyc2lvbnMgLTA5IGFuZCAtMTQuIEl0IHdvdWxkIGhhdmUgYmVlbjwvZGl2Pg0KPGRpdj5hIHNt YWxsIG1hdHRlciBvZiBzZWFyY2gtYW5kLXJlcGxhY2UgdG8gZ28gdGhyb3VnaCBhbmQgZXhwYW5k IG1vc3Qgb2YgdGhlPC9kaXY+DQo8ZGl2PmFjcm9ueW1zLjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rp dj4NCjxkaXY+Mi4gU2VjdGlvbiAyPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8 L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IFIxOiBUaGUgc29sdXRpb24gbXVzdCBhbGxvdyBmb3Ig Ym90aCBpbnRlci1zdWJuZXQgYW5kIGludHJhLXN1Ym5ldDwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJz cDsgdHJhZmZpYyBiZWxvbmdpbmcgdG8gdGhlIHNhbWUgdGVuYW50IHRvIGJlIGxvY2FsbHkgcm91 dGVkIGFuZCBicmlkZ2VkPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyByZXNwZWN0aXZlbHkuJm5i c3A7IFRoZSBzb2x1dGlvbiBtdXN0IHByb3ZpZGUgSVAgcm91dGluZyBmb3IgaW50ZXItc3VibmV0 PC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyB0cmFmZmljIGFuZCBFdGhlcm5ldCBCcmlkZ2luZyBm b3IgaW50cmEtc3VibmV0IHRyYWZmaWMuJm5ic3A7IEl0IHNob3VsZCBiZTwvZGl2Pg0KPGRpdj4m bmJzcDsmbmJzcDsgbm90ZWQgdGhhdCBpZiBhbiBJUC1WUkYgaW4gYSBOVkUgaXMgY29uZmlndXJl ZCBmb3IgSVB2NiBhbmQgdGhhdCBOVkU8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IHJlY2VpdmVz IElQdjQgdHJhZmZpYyBvbiB0aGUgY29ycmVzcG9uZGluZyBWTEFOLCB0aGVuIHRoZSBJUHY0PC9k aXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyB0cmFmZmljIGlzIHRyZWF0ZWQgYXMgTDIgdHJhZmZpYyBh bmQgaXQgaXMgYnJpZGdlZC4mbmJzcDsgQWxzbyB2aXNlIHZlcnNhLDwvZGl2Pg0KPGRpdj4mbmJz cDsmbmJzcDsgaWYgYW4gSVAtVlJGIGluIGEgTlZFIGlzIGNvbmZpZ3VyZWQgZm9yIElQdjQgYW5k IHRoYXQgTlZFIHJlY2VpdmVzPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBJUHY2IHRyYWZmaWMg b24gdGhlIGNvcnJlc3BvbmRpbmcgVkxBTiwgdGhlbiB0aGUgSVB2NiB0cmFmZmljIGlzPC9kaXY+ DQo8ZGl2PiZuYnNwOyZuYnNwOyB0cmVhdGVkIGFzIEwyIHRyYWZmaWMgYW5kIGl0IGlzIGJyaWRn ZWQuPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsgUjI6IFRoZSBz b2x1dGlvbiBtdXN0IHN1cHBvcnQgYnJpZGdpbmcgZm9yIG5vbi1JUCB0cmFmZmljLjwvZGl2Pg0K PGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PlIxIGlzIGEgbGl0dGxlIHRv cnR1cmVkLCB3aGVyZSB5b3UgYWRkIGFsbCB0aGUgY2F2ZWF0cyBhYm91dCDigJx0cmVhdGVkIGFz IEwyPC9kaXY+DQo8ZGl2PnRyYWZmaWPigJ0uIFNlZW1zIHRvIG1lIGxpa2UgaXQgd291bGQgZmFs bCBvdXQgbW9yZSBuYXR1cmFsbHkgaWYgeW91IGhhZCBzaW1wbHk8L2Rpdj4NCjxkaXY+aW50cm9k dWNlZCB0aGUgY29uY2VwdHMgb2Ygcm91dGFibGUgYW5kIG5vbi1yb3V0YWJsZSB0cmFmZmljLCB3 aGVyZSByb3V0YWJsZTwvZGl2Pg0KPGRpdj50cmFmZmljIGlzIHRoYXQgZm9yIHdoaWNoIGEgc3Vp dGFibGUgSVAtVlJGIGV4aXN0cy4gVGhhdCB3b3VsZCBhbHNvIGhhdmUgdGhlPC9kaXY+DQo8ZGl2 PnBsZWFzYW50IGVmZmVjdCBvZiBtYWtpbmcgUjIgc2F5IOKAnOKApiBtdXN0IHN1cHBvcnQgYnJp ZGdpbmcgZm9yIG5vbi1yb3V0YWJsZTwvZGl2Pg0KPGRpdj50cmFmZmlj4oCdIGluc3RlYWQgb2Yg 4oCcbm9uLUlQIHRyYWZmaWPigJ0sIHdoaWNoIGlzIHRlY2huaWNhbGx5IGluY29ycmVjdCAoc2lu Y2UgcGVyPC9kaXY+DQo8ZGl2PlIxIHlvdSBtaWdodCBoYXZlIG5vbi1yb3V0YWJsZSBJUCB0cmFm ZmljKS48L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj4mbmJz cDsmbmJzcDsgUjM6IFRoZSBzb2x1dGlvbiBtdXN0IGFsbG93IGludGVyLXN1Ym5ldCBzd2l0Y2hp bmcgdG8gYmUgZGlzYWJsZWQgb248L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IGEgcGVyIFZMQU4g YmFzaXMgb24gUEVzIHdoZXJlIHRoZSB0cmFmZmljIG5lZWRzIHRvIGJlIGJhY2toYXVsZWQgdG88 L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IGFub3RoZXIgbm9kZSAoaS5lLiwgZm9yIHBlcmZvcm1p bmcgRlcgb3IgRFBJIGZ1bmN0aW9uYWxpdHkpLjwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+ Jm5ic3A7PC9kaXY+DQo8ZGl2PldoYXTigJlzIOKAnHN3aXRjaGluZ+KAnT8gVGhlIGRvY3VtZW50 IGlzIGFib3V0IHJvdXRpbmcgdnMuIGJyaWRnaW5nLCB3aGljaCBkbyB5b3U8L2Rpdj4NCjxkaXY+ bWVhbj8gSSB0aGluayB5b3UgbWVhbiDigJxyb3V0aW5n4oCdLiBJTU8geW91IHNob3VsZCBnZXQg cmlkIG9mIHRoZSB3b3JkPC9kaXY+DQo8ZGl2PuKAnHN3aXRjaGluZ+KAnSBhbmQgcmVwbGFjZSB3 aXRoIHNvbWV0aGluZyBsZXNzIGFtYmlndW91cywgZS5nLiDigJxyb3V0aW5n4oCdLiAoQm90aDwv ZGl2Pg0KPGRpdj5oZXJlIGFuZCB0aGUgb25lIG90aGVyIHBsYWNlIGluIHRoZSBkb2Mgd2hlcmUg eW91IHVzZSDigJxzd2l0Y2hpbmfigJ0uKTwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+ QWxzbywgSSB0aGluayB5b3UgZG9u4oCZdCBtZWFuIOKAnGkuZS7igJ0sIEkgdGhpbmsgeW91IG1l YW4g4oCcZS5nLuKAnS4gVGhlIG1lYW5pbmcgb2Y8L2Rpdj4NCjxkaXY+4oCcaS5lLuKAnSBpcyDi gJxpbiBvdGhlciB3b3Jkc+KAnS4gVGhlIG1lYW5pbmcgb2Yg4oCcZS5nLuKAnSBpcyDigJxmb3Ig ZXhhbXBsZeKAnS4gVGhlIGJlc3Q8L2Rpdj4NCjxkaXY+d2F5IHRvIGF2b2lkIHRoZXNlIHByb2Js ZW1zLCBJTU8sIGlzIHRvIHNpbXBseSB3cml0ZSBvdXQgd2hhdCB5b3UgbWVhbiwgc28gaW48L2Rp dj4NCjxkaXY+dGhpcyBjYXNlIHdyaXRlIOKAnChmb3IgZXhhbXBsZSwgZm9yIHBlcmZvcm1pbmcg Rlcgb3IgRFBJIGZ1bmN0aW9uYWxpdHkpLuKAnSAoQW5kPC9kaXY+DQo8ZGl2Pm9oIGJ5IHRoZSB3 YXksIHlvdSBoYXZlbuKAmXQgZGVmaW5lZCBvciBleHBhbmRlZCBGVyBvciBEUEksIHBsZWFzZSBk byBzby4pPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj4zLiBTZWN0aW9uIDQ8L2Rpdj4N CjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsgbyZu YnNwOyByZWZlcmVuY2VzIHRvIEFSUCB0YWJsZSBpbiB0aGUgY29udGV4dCBvZiBhc3ltbWV0cmlj IElSQiBpcyBhPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBsb2dp Y2FsIHZpZXcgb2YgYSBmb3J3YXJkaW5nIHRhYmxlIHRoYXQgbWFpbnRhaW5zIGFuIElQIHRvIE1B QzwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgYmluZGluZyBlbnRy eSBvbiBhIGxheWVyIDMgaW50ZXJmYWNlIGZvciBib3RoIElQdjQgYW5kIElQdjYuPC9kaXY+DQo8 ZGl2PiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBUaGVzZSBlbnRyaWVzIGFyZSBub3Qg c3ViamVjdCB0byBBUlAgb3IgTkQgcHJvdG9jb2wuPC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRp dj4mbmJzcDs8L2Rpdj4NCjxkaXY+VGhpcyBwYXNzYWdlIHNoaW5lcyBhIHNwb3RsaWdodCBvbiB0 aGUgZmFjdCB0aGF0IOKAnEFSUCB0YWJsZeKAnSBhcyBpdOKAmXMgdXNlZCBpbjwvZGl2Pg0KPGRp dj50aGlzIGRvY3VtZW50IGlzIGEgbWlzbm9tZXIsIHNpbmNlIGl04oCZcyBhIHRhYmxlIHRoYXQg aXMgbm90IChuZWNlc3NhcmlseSk8L2Rpdj4NCjxkaXY+cG9wdWxhdGVkIGJ5IEFSUC4gSSBkb27i gJl0IHByb3Bvc2UgdGhhdCB5b3UgY2hhbmdlIHRoZSBub21lbmNsYXR1cmUsIHNpbmNlIGl04oCZ czwvZGl2Pg0KPGRpdj5maXJtbHkgZXN0YWJsaXNoZWQgZXZlbiB0aG91Z2ggd3Jvbmcg4oCUIGJ1 dCBpdCBtaWdodCBiZSB3b3J0aCBhZGRpbmcgdGhlIGZpcnN0PC9kaXY+DQo8ZGl2PnNlbnRlbmNl IG9yIG9uZSBsaWtlIGl0IHRvIHlvdXIgVGVybWlub2xvZ3kgc2VjdGlvbi48L2Rpdj4NCjxkaXY+ Jm5ic3A7PC9kaXY+DQo8ZGl2PjQuIFNlY3Rpb24gNDwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4N CjxkaXY+RmlndXJlIDIgZGVwaWN0cyBCVDIgYmVpbmcgcHJlc2VudCBvbiB0aGUgaW5ncmVzcyBQ RSwgYnV0IHRoZSB0ZXh0IG1ha2VzIGl0PC9kaXY+DQo8ZGl2PmNsZWFyIHRoYXQgaW4gdGhlIHN5 bW1ldHJpYyBtb2RlIHRoYXQgdGhpcyBmaWd1cmUgZGVwaWN0cywgQlQyIGRvZXNu4oCZdCBhY3R1 YWxseTwvZGl2Pg0KPGRpdj5uZWVkIHRvIGJlIHRoZXJlLiBXb3VsZG7igJl0IGl0IGJlIGNsZWFy ZXIgaWYgeW91IGRpZG7igJl0IHNob3cgaXQ/PC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRp dj41LiBTZWN0aW9uIDQ8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PkkgaGF2ZSBhIGhh cmQgdGltZSBwYXJzaW5nIHRoaXMgdGV4dDo8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2 PmBgYDwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsgRWFjaCBCVCBvbiBhIFBFIGlzPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBhc3NvY2lhdGVk IHdpdGggYSB1bmlxdWUgVkxBTiAoZS5nLiwgd2l0aCBhIEJEKTwvZGl2Pg0KPGRpdj5gYGA8L2Rp dj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PlNvLCAxIFZMQU4g4oCUJmd0OyBhdCBsZWFzdCAx IEJUICgxOm1hbnkpPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxk aXY+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7IHdoZXJlIGluIHR1cm4gaXQgaXM8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7 IGFzc29jaWF0ZWQgd2l0aCBhIHNpbmdsZSBNQUMtVlJGPC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0K PGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+U28sIDEgTUFDLVZSRiDigJQmZ3Q7IGF0IGxlYXN0IDEg QlQgKDE6bWFueSk8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRp dj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgaW4gdGhlIGNhc2Ugb2Yg VkxBTi1CYXNlZCBtb2RlIG9yIGE8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IG51bWJlciBvZiBC VHMgY2FuIGJlIGFzc29jaWF0ZWQgd2l0aCBhIHNpbmdsZSBNQUMtVlJGIGluIHRoZSBjYXNlIG9m PC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBWTEFOLUF3YXJlIEJ1bmRsZSBtb2RlLjwvZGl2Pg0K PGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PlNvLCAxIE1BQy1WUkYg4oCU Jmd0OyBhdCBsZWFzdCAxIEJUICgxOm1hbnkpPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRp dj5TaW5jZSB0aGlzIGlzIHN0YXRlZCBhcyBhbiBleGNlcHRpb24gSSBndWVzcyB0aGF0IG1lYW5z IHlvdSBtZWFudCB0aGUgcHJlY2VkaW5nPC9kaXY+DQo8ZGl2PnR3byAodGhhdCBJIHBhcnNlZCBh cyAxOm1hbnkpIGFyZSBhY3R1YWxseSBzdXBwb3NlZCB0byBiZSAxOjE/IElmIHNvIEkgdGhpbms8 L2Rpdj4NCjxkaXY+dGhpcyBuZWVkcyBhIHJld3JpdGUgKGl0IHByb2JhYmx5IGRvZXMgcmVnYXJk bGVzcywgZm9yIGNsYXJpdHkpLjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+Ni4gU2Vj dGlvbiA0LjE8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PldoZW4geW91IHdyaXRlIOKA nEludGVybmV0IHN0YW5kYXJkIGJpdCBvcmRlcuKAnCwgZG8geW91IG1lYW4g4oCcbmV0d29yayBi eXRlIG9yZGVy4oCcPzwvZGl2Pg0KPGRpdj5BbHRob3VnaCBldmVuIG5ldHdvcmsgYnl0ZSBvcmRl ciBhcHBlYXJzIHRvIGJlIG5vbi1hcHBsaWNhYmxlLCBzaW5jZSB0aGUgdmFsdWVzPC9kaXY+DQo8 ZGl2PmFyZSBzaG93biB3aXRoIGFuIGV4cGxpY2l0IGJ5dGUgb3JkZXIuPC9kaXY+DQo8ZGl2PiZu YnNwOzwvZGl2Pg0KPGRpdj5JIHJlYWxpemUgdGhlIGRlZmluaXRpb25zIGFyZSBtZXJlbHkgcGFz dGVkIGZyb20gUkZDIDU3OTggYW5kIHRoYXQgc2hpcCBoYXM8L2Rpdj4NCjxkaXY+c2FpbGVkLCBi dXQgdW5sZXNzIHlvdSBjYW4gZXhwbGFpbiB3aGF0IOKAnChpbiBoZXgsIGluIEludGVybmV0IHN0 YW5kYXJkPC9kaXY+DQo8ZGl2PmJpdC1vcmRlcinigJ0gaXMgc3VwcG9zZWQgdG8gbWVhbiwgSSBz dWdnZXN0IHJlbW92aW5nIGl0LiAoQWx0ZXJuYXRlbHkgYW5kIGxlc3M8L2Rpdj4NCjxkaXY+ZGVz aXJhYmx5LCBtYWtlIGl0IGV4cGxpY2l0IHRoYXQgeW914oCZcmUgcHJvdmlkaW5nIGEgZGlyZWN0 IHF1b3RhdGlvbiBvZiBSRkM8L2Rpdj4NCjxkaXY+NTc5OC4pPC9kaXY+DQo8ZGl2PiZuYnNwOzwv ZGl2Pg0KPGRpdj43LiBTZWN0aW9uIDUuMTwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+ WW91IHNheSB0aGUgRW5jYXBzdWxhdGlvbiBFeHRlbmRlZCBDb21tdW5pdHkgYW5kIFJvdXRlcuKA mXMgTUFDIEV4dGVuZGVkPC9kaXY+DQo8ZGl2PkNvbW11bml0eSBoYXZlIHRvIGJlIHNlbnQsIGJ1 dCB5b3Ugc2F5IG5vdGhpbmcgYWJvdXQgdGhlIHJlcXVpcmVkIHZhbHVlcy4gRm9yPC9kaXY+DQo8 ZGl2PlJvdXRlcidzIE1BQywgwqc4LjEgc3BlY2lmaWVzIHRoZSByZXF1aXJlZCB2YWx1ZSwgSSBz dWdnZXN0IGEgZm9yd2FyZCByZWZlcmVuY2U8L2Rpdj4NCjxkaXY+dG8gaXQuIEZvciBFbmNhcHN1 bGF0aW9uLCB0aGUgY2xvc2VzdCBJIHdhcyBhYmxlIHRvIGZpbmQgdG8gYSBwbGFjZSB3aGVyZSB0 aGlzPC9kaXY+DQo8ZGl2PmlzIHNwZWNpZmllZCB3YXMgc2VjdGlvbiA5LjEuMSwgYnV0IHRoYXQn cyBvbmx5IGFuIGV4YW1wbGUuIFRoZXJlIHJlYWxseSBuZWVkczwvZGl2Pg0KPGRpdj50byBiZSBz b21lIHBsYWNlIHdoZXJlIGl0J3Mgc3BlbGxlZCBvdXQuIEEgYmFyZSBtaW5pbXVtIHdvdWxkIGJl IHRvIGNpdGUgUkZDPC9kaXY+DQo8ZGl2PjkwMTIgwqc0LjEsIGJ1dCB0aGF0IGp1c3QgcHJvdmlk ZXMgdGhlIHN5bnRheCAtLSB5b3UgcmVhbGx5IHNob3VsZCBzYXkgc29tZXRoaW5nPC9kaXY+DQo8 ZGl2Pm1vcmUgYWJvdXQgaG93IHRvIGRlY2lkZSB3aGF0IHZhbHVlIHRvIHNlbmQuIEZvciB0aGF0 IG1hdHRlciwgaXQgY291bGQgYmUgd2hhdDwvZGl2Pg0KPGRpdj52YWx1ZVMgdG8gc2VuZCAtLSBp cyBpdCBsZWdhbCBmb3IgYSBOVkUgdG8gYWR2ZXJ0aXNlIG11bHRpcGxlIEVuY2Fwc3VsYXRpb248 L2Rpdj4NCjxkaXY+RXh0ZW5kZWQgQ29tbXVuaXRpZXM/IFlvdSBkb24ndCBzYXkgaXQgaXNuJ3Qs IGFuZCB0aGVyZSBhcmUgcG90ZW50aWFsIHJlYXNvbnM8L2Rpdj4NCjxkaXY+dG8gZG8gc28uPC9k aXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj44LiBTZWN0aW9uIDUuMjwvZGl2Pg0KPGRpdj4m bmJzcDs8L2Rpdj4NCjxkaXY+YGBgPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBvJm5ic3A7IFVz aW5nIE1BQy1WUkYgUm91dGUgVGFyZ2V0IChhbmQgRXRoZXJuZXQgVGFnIGlmIGRpZmZlcmVudCBm cm9tPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyB6ZXJvKSwgaXQg aWRlbnRpZmllcyB0aGUgY29ycmVzcG9uZGluZyBNQUMtVlJGIChhbmQgQlQpLiZuYnNwOyBJZiB0 aGU8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IE1BQy0gVlJGIChh bmQgQlQpIGV4aXN0cyAoZS5nLiwgaXQgaXMgbG9jYWxseSBjb25maWd1cmVkKSB0aGVuIGl0PC9k aXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+WW91IHVzZSDigJxl Lmcu4oCdIHNvIEkgcHJlc3VtZSB0aGVyZSBtaWdodCBiZSBvdGhlciByZWFzb25zIHRoZSBNQUMt VlJGIGFuZCBCVDwvZGl2Pg0KPGRpdj5taWdodCBleGlzdCBldmVuIGlmIG5vdCBsb2NhbGx5IGNv bmZpZ3VyZWQ/PC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+ Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGltcG9ydHMgdGhlIE1BQyBhZGRyZXNzIGlu dG8gaXQuJm5ic3A7IE90aGVyd2lzZSwgaXQgZG9lcyBub3QgaW1wb3J0PC9kaXY+DQo8ZGl2PiZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyB0aGUgTUFDIGFkZHJlc3MuPC9kaXY+DQo8ZGl2 PiZuYnNwOzwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsgbyZuYnNwOyBVc2luZyBJUC1WUkYgcm91 dGUgdGFyZ2V0LCBpdCBpZGVudGlmaWVzIHRoZSBjb3JyZXNwb25kaW5nIElQLVZSRjwvZGl2Pg0K PGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgYW5kIGltcG9ydHMgdGhlIElQIGFk ZHJlc3MgaW50byBpdC48L2Rpdj4NCjxkaXY+YGBgPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0K PGRpdj5Zb3UgZG9u4oCZdCBwcm92aWRlIGFueSBjb25kaXRpb25hbCBsYW5ndWFnZSBpbiB0aGlz IGJ1bGxldCBhYm91dCDigJxpZiB0aGUgSVAtVlJGPC9kaXY+DQo8ZGl2PmV4aXN0c+KAnS4gV2h5 IGlzIHRoYXQgY2F2ZWF0IHJlcXVpcmVkIGZvciBNQUMtVlJGIGJ1dCBub3QgZm9yIElQLVZSRj88 L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PjkuIFNlY3Rpb24gNS4yPC9kaXY+DQo8ZGl2 PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IFRoZSBpbmNs dXNpb24gb2YgTVBMUyBsYWJlbDIgZmllbGQgaW4gdGhpcyByb3V0ZSBzaWduYWxzIHRvIHRoZTwv ZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsgcmVjZWl2aW5nIFBFIHRoYXQgdGhpcyByb3V0ZSBpcyBm b3Igc3ltbWV0cmljIElSQiBtb2RlIGFuZCBNUExTPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBs YWJlbDIgbmVlZHMgdG8gYmUgaW5zdGFsbGVkIGluIGZvcndhcmRpbmcgcGF0aCB0byBpZGVudGlm eSB0aGU8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IGNvcnJlc3BvbmRpbmcgSVAtVlJGLjwvZGl2 Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2Pkkgd2FzIHVuYWJsZSB0 byBtYWtlIGhlYWQgbm9yIHRhaWwgb2YgdGhpcyBwYXJhZ3JhcGguIEkgc3VwcG9zZSDCpzUuNCBp cyB3aGVyZTwvZGl2Pg0KPGRpdj50aGUgYmVoYXZpb3IgaXMgYWN0dWFsbHkgc3BlY2lmaWVkLCBz byBpbiBhIHdheSBpdCBkb2VzbuKAmXQgbWF0dGVyIChhbHRob3VnaDwvZGl2Pg0KPGRpdj5tYXli ZSBhIGZvcndhcmQgcmVmZXJlbmNlIHdvdWxkIGhlbHApLjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rp dj4NCjxkaXY+MTAuIFNlY3Rpb24gNS4yPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5g YGA8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IElmIHRoZSByZWNlaXZpbmcgUEUgcmVjZWl2ZXMg dGhpcyByb3V0ZSB3aXRoIGJvdGggdGhlIE1BQy1WUkYgYW5kIElQLTwvZGl2Pg0KPGRpdj4mbmJz cDsmbmJzcDsgVlJGIHJvdXRlIHRhcmdldHMgYW5kIGlmIHRoZSByZWNlaXZpbmcgUEUgZG9lcyBu b3Qgc3VwcG9ydCBlaXRoZXI8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IGFzeW1tZXRyaWMgb3Ig c3ltbWV0cmljIElSQiBtb2RlcywgdGhlbiBpZiBpdCBoYXMgdGhlIGNvcnJlc3BvbmRpbmc8L2Rp dj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IE1BQy1WUkYsIGl0IG9ubHkgaW1wb3J0cyB0aGUgTUFDIGFk ZHJlc3MuJm5ic3A7IE90aGVyd2lzZSwgaWYgaXQgZG9lc24ndDwvZGl2Pg0KPGRpdj4mbmJzcDsm bmJzcDsgaGF2ZSB0aGUgY29ycmVzcG9uZGluZyBNQUMtVlJGLCBpdCBtdXN0IG5vdCBpbXBvcnQg dGhpcyByb3V0ZS48L2Rpdj4NCjxkaXY+YGBgPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRp dj5JZiBpdCBkb2VzbuKAmXQgc3VwcG9ydCBlaXRoZXIgYXN5bW1ldHJpYyBvciBzeW1tZXRyaWMg SVJCIG1vZGVzLCB0aGVuIGRvZXNu4oCZdDwvZGl2Pg0KPGRpdj50aGF0IG1lYW4gaXQgZG9lc27i gJl0IGltcGxlbWVudCB0aGlzIHNwZWNpZmljYXRpb24gYXQgYWxsPyBJbiB0aGF0IGNpcmN1bXN0 YW5jZSw8L2Rpdj4NCjxkaXY+aG93IGRvIHlvdSBleHBlY3QgeW91ciDigJxtdXN0IG5vdOKAnSB0 byBiZSByZXNwZWN0ZWQ/PC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj4xMS4gU2VjdGlv biA1LjM8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj4mbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsgSWYgaG9zdCBCJ3MgKE1BQywgSVApIGhhcyBub3QgeWV0IGJlZW48L2Rpdj4NCjxkaXY+ Jm5ic3A7Jm5ic3A7IGxlYXJudCBlaXRoZXIgdmlhIGEgZ3JhdHVpdG91cyBBUlAgT1IgdmlhIGEg cHJpb3IgZ2xlYW5pbmcgcHJvY2VkdXJlLDwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsgYSBuZXcg Z2xlYW5pbmcgcHJvY2VkdXJlIE1VU1QgYmUgdHJpZ2dlcmVkPC9kaXY+DQo8ZGl2PmBgYDwvZGl2 Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+U2luY2UgeW914oCZdmUgdXNlZCBNVVNUIGhlcmUs IHlvdSBNVVNUIHByb3ZpZGUgYSByZWZlcmVuY2UgdG8gd2hlcmUgdGhlIOKAnG5ldzwvZGl2Pg0K PGRpdj5nbGVhbmluZyBwcm9jZWR1cmXigJ0gaXMgc3BlY2lmaWVkLjwvZGl2Pg0KPGRpdj4mbmJz cDs8L2Rpdj4NCjxkaXY+QWxzbywgaGFzIG5vdCBiZWVuIGxlYXJudCBieSB3aG9tPyBUaGUgcHJv Y2VkdXJlIG11c3QgYmUgdHJpZ2dlcmVkIHdoZXJlPzwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4N CjxkaXY+MTIuIFNlY3Rpb24gNS4zPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5UaGUg c2Vjb25kIHBhcmFncmFwaCwgdGhhdCBiZWdpbnMgJnF1b3Q7Q29uc2lkZXIgYSBzdWJuZXQgQSZx dW90OywgaXMgdHJlbWVuZG91c2x5PC9kaXY+DQo8ZGl2PmNvbmZ1c2luZyB0byBhIGZpcnN0LXRp bWUgcmVhZGVyIChvciBhdCBsZWFzdCB0byB0aGlzIGZpcnN0LXRpbWUgcmVhZGVyKS4gSTwvZGl2 Pg0KPGRpdj5yZWFsaXplIHlvdSBwcm9iYWJseSB0aGluayB5b3UncmUgYmVpbmcgaGVscGZ1bCBi eSBwcm92aWRpbmcgYSB3b3JrZWQgZXhhbXBsZSw8L2Rpdj4NCjxkaXY+YnV0IGFzIEkgcmVhZCB0 aHJvdWdoIGl0LCBpdCB3YXMgdGhlIG9wcG9zaXRlIG9mIGhlbHBmdWwuIFRoaXMgaXMgZXNwZWNp YWxseTwvZGl2Pg0KPGRpdj50cnVlIGJlY2F1c2Ugwqc1IGFuZCBpdHMgc3Vic2VjdGlvbnMgaXMg YWJvdXQgJnF1b3Q7U3ltbWV0cmljIElSQiBQcm9jZWR1cmVzJnF1b3Q7IC0tIGFuZDwvZGl2Pg0K PGRpdj50aGUgcGFyYWdyYXBoIGluIHF1ZXN0aW9uIHByb3ZpZGVzIG5vIHByb2NlZHVyZXMuPC9k aXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5Tb21lIG9wdGlvbnMgdG8gaW1wcm92ZSB0aGUg c2l0dWF0aW9uIC0tPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj4tIFJlbW92ZSB0aGUg cGFyYWdyYXBoIGVudGlyZWx5LjwvZGl2Pg0KPGRpdj4tIFByZWZhY2UgdGhlIHBhcmFncmFwaCB3 aXRoICZxdW90O2FzIGFuIGV4YW1wbGUgdG8gc2hvdyB3aHkgYWR2ZXJ0aXNlbWVudCBhcyBSVC01 PC9kaXY+DQo8ZGl2PmlzIHJlcXVpcmVkLCZxdW90OzwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4N CjxkaXY+MTMuIFNlY3Rpb24gNS40PC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8 L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IG8mbmJzcDsgZ2xvYmFsIG1vZGU6IFZOSSBpcyBzZXQg dG8gdGhlIHJlY2VpdmVkIGxhYmVsMiBpbiB0aGUgcm91dGUgd2hpY2g8L2Rpdj4NCjxkaXY+Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGlzIGRvbWFpbi13aWRlIGFzc2lnbmVkLiZuYnNw OyBUaGlzIFZOSSB2YWx1ZSBmcm9tIHJlY2VpdmVkIGxhYmVsMiBNVVNUPC9kaXY+DQo8ZGl2PiZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBiZSB0aGUgc2FtZSBhcyB0aGUgbG9jYWxseSBj b25maWd1cmVkIFZOSSBmb3IgdGhlIElQIFZSRiBhcyBhbGw8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IFBFcyBpbiB0aGUgTlZPIE1VU1QgYmUgY29uZmlndXJlZCB3 aXRoIHRoZSBzYW1lIElQIFZSRiBWTkkgZm9yPC9kaXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyB0aGlzIG1vZGUgb2Ygb3BlcmF0aW9uLjwvZGl2Pg0KPGRpdj5gYGA8L2Rp dj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PldoYXQgYWN0aW9uIGlzIHRvIGJlIHRha2VuIGlm IHRoaXMgTVVTVCBpcyB2aW9sYXRlZD88L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PjE0 LiBTZWN0aW9uIDYuMTwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+YGBgPC9kaXY+DQo8 ZGl2PiZuYnNwOyZuYnNwOyBGb3IgYXN5bW1ldHJpYyBJUkIgbW9kZSwgUm91dGVyJ3MgTUFDIEVD IGlzIG5vdCBuZWVkZWQgYmVjYXVzZTwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7 PC9kaXY+DQo8ZGl2PlBsZWFzZSBlaXRoZXIgZXhwYW5kIOKAnEVD4oCdIG9yIGFkZCBpdCB0byB5 b3VyIGRlZmluaXRpb25zIHNlY3Rpb24uIChBbHNvIGFwcGxpZXM8L2Rpdj4NCjxkaXY+dG8gNS4x KTwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+MTUuIFNlY3Rpb24gNi4yPC9kaXY+DQo8 ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IG8mbmJz cDsgSWYgb25seSBNQUMtVlJGIHJvdXRlIHRhcmdldCBpcyB1c2VkLCB0aGVuIHRoZSByZWNlaXZp bmcgUEUgdXNlczwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgdGhl IE1BQy1WUkYgcm91dGUgdGFyZ2V0IHRvIGlkZW50aWZ5IHRoZSBjb3JyZXNwb25kaW5nIElQLVZS RiAtLTwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgaS5lLiwgbWFu eSBNQUMtVlJGIHJvdXRlIHRhcmdldHMgbWFwIHRvIHRoZSBzYW1lIElQLVZSRiBmb3IgYTwvZGl2 Pg0KPGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgZ2l2ZW4gdGVuYW50LiZuYnNw OyBJbiB0aGlzIGNhc2UsIE1BQy1WUkYgbWF5IGJlIHVzZWQgYnkgdGhlIHJlY2VpdmluZzwvZGl2 Pg0KPGRpdj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgUEUgdG8gaWRlbnRpZnkgdGhl IGNvcnJlc3BvbmRpbmcgSVAgVlJGPC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj4mbmJzcDs8 L2Rpdj4NCjxkaXY+RG8geW91IG1lYW4g4oCcaW4gdGhpcyBjYXNlLCB0aGUgTUFDLVZSRiAqcm91 dGUgdGFyZ2V0KiBtYXkgYmUgdXNlZOKApuKAnT88L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8 ZGl2PjE2LiBTZWN0aW9uIDYuMjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+YGBgPC9k aXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBJZiB0aGUgcmVjZWl2aW5nIFBFIHJlY2VpdmVzIHRoZSBN QUMvSVAgQWR2ZXJ0aXNlbWVudCByb3V0ZSB3aXRoIE1QTFM8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5i c3A7IGxhYmVsMiBmaWVsZCBhbmQgaXQgdXNlcyBzeW1tZXRyaWMgSVJCIG1vZGU8L2Rpdj4NCjxk aXY+YGBgPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGRpdj5UaGlzIGVudGlyZSBzZWN0aW9u IGlzIGVudGl0bGVkIOKAnGFzeW1tZXRyaWMgSVJCIHByb2NlZHVyZXPigJwuIFdoeSBpcyB0aGVy ZTwvZGl2Pg0KPGRpdj5zcGVjaWZpY2F0aW9uIGxhbmd1YWdlIHJlZ2FyZGluZyBzeW1tZXRyaWMg cHJvY2VkdXJlcyBpbiBpdD8gKEnigJltIHByZXR0eSBzdXJlPC9kaXY+DQo8ZGl2PnRoaXMgaXMg bm90IHRoZSBvbmx5IHBsYWNlIHRoaXMga2luZCBvZiBwcm9ibGVtIGFwcGVhcnMuKTwvZGl2Pg0K PGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+MTcuIFNlY3Rpb24gNy4zPC9kaXY+DQo8ZGl2PiZuYnNw OzwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IE9uIHRoZSBzb3VyY2Ug TlZFLCBhbiBhZ2Utb3V0IHRpbWVyIChmb3IgdGhlIHNpbGVudCBob3N0IHRoYXQgaGFzPC9kaXY+ DQo8ZGl2PiZuYnNwOyZuYnNwOyBtb3ZlZCkgaXMgdXNlZCB0byB0cmlnZ2VyIGFuIEFSUCBwcm9i ZS4mbmJzcDsgVGhpcyBhZ2Utb3V0IHRpbWVyIGNhbiBiZTwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJz cDsgZWl0aGVyIEFSUCB0aW1lciBvciBNQUMgYWdlLW91dCB0aW1lciBhbmQgdGhpcyBpcyBhbiBp bXBsZW1lbnRhdGlvbjwvZGl2Pg0KPGRpdj4mbmJzcDsmbmJzcDsgY2hvaWNlLiZuYnNwOyBUaGUg QVJQIHJlcXVlc3QgZ2V0cyBzZW50IGJvdGggbG9jYWxseSB0byBhbGwgdGhlIGF0dGFjaGVkPC9k aXY+DQo8ZGl2PiZuYnNwOyZuYnNwOyBUU2VzIG9uIHRoYXQgc3VibmV0IGFzIHdlbGwgYXMgaXQg Z2V0cyBzZW50IHRvIGFsbCB0aGUgcmVtb3RlIE5WRXM8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7 IChpbmNsdWRpbmcgdGhlIHRhcmdldCBOVkUpIHBhcnRpY2lwYXRpbmcgaW4gdGhhdCBzdWJuZXQu Jm5ic3A7IFRoZSBzb3VyY2U8L2Rpdj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IE5WRSBhbHNvIHdpdGhk cmF3IHRoZSBFVlBOIE1BQy9JUCBBZHZlcnRpc2VtZW50IHJvdXRlIHdpdGggb25seSB0aGU8L2Rp dj4NCjxkaXY+Jm5ic3A7Jm5ic3A7IE1BQyBhZGRyZXNzIChpZiBpdCBoYXMgcHJldmlvdXNseSBh ZHZlcnRpc2VkIHN1Y2ggYSByb3V0ZSkuPC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj4mbmJz cDs8L2Rpdj4NCjxkaXY+V291bGRu4oCZdCB0aGUgc291cmNlIE5WRSBvbmx5IHdpdGhkcmF3IHRo ZSByb3V0ZSBhZnRlciBhIHRpbWVvdXQgaGFkIGV4cGlyZWQ/IEFzPC9kaXY+DQo8ZGl2PnlvdSBo YXZlIHdyaXR0ZW4gdGhpcyBwYXJhZ3JhcGgsIGluIGNhc2UgdGhlIHNpbGVudCBUUyBoYXMgbm90 IG1vdmVkLCB0aGU8L2Rpdj4NCjxkaXY+Zm9sbG93aW5nIHdvdWxkIGhhcHBlbjo8L2Rpdj4NCjxk aXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PmBgYDwvZGl2Pg0KPGRpdj5UaW1lIHQ6IGFnZS1vdXQgdGlt ZXIgZmlyZXMsIEFSUCBwcm9iZSBpcyBzZW50PC9kaXY+DQo8ZGl2PlRpbWUgdDogTlZFIHdpdGhk cmF3cyByb3V0ZSBhZHZlcnRpc2VtZW50PC9kaXY+DQo8ZGl2PlRpbWUgdSAmZ3Q7IHQ6IFRTIHJl Y2VpdmVzIEFSUCBwcm9iZSwgc2VuZHMgQVJQIHJlcGx5PC9kaXY+DQo8ZGl2PlRpbWUgdiAmZ3Q7 IHU6IE5WRSByZWNlaXZlcyBBUlAgcmVwbHk8L2Rpdj4NCjxkaXY+VGltZSB2OiBOVkUgcmUtYWR2 ZXJ0aXNlcyByb3V0ZTwvZGl2Pg0KPGRpdj5gYGA8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8 ZGl2PlByZXN1bWFibHkgdGhpcyBjaHVybiBpc27igJl0IHdoYXQgeW91IGludGVuZGVkLjwvZGl2 Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+MTguIFNlY3Rpb24gOS4yPC9kaXY+DQo8ZGl2PiZu YnNwOzwvZGl2Pg0KPGRpdj5Ib3cgZG9lcyB0aGUgTlZFIGxlYXJuIHdoYXQgc3VibmV0cyBhcmUg YmVoaW5kIGl0cyBhdHRhY2hlZCBUUz88L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PjE5 LiBTZWN0aW9uIDkuMjwvZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+V2hhdCBhYm91dCBp ZiBUUzQgd2FudHMgdG8gcmVhY2ggU04xPyBIb3cgZG9lcyBpdCBrbm93IHdoZXJlIHRvIHNlbmQg dGhlPC9kaXY+DQo8ZGl2PnBhY2tldD8gKEkgc3VwcG9zZSB0aGUgYW5zd2VyIG1heSBiZSB0aGUg c2FtZSBhcyBmb3IgIzE4Lik8L2Rpdj4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8ZGl2PiZuYnNwOzwv ZGl2Pg0KPGRpdj4mbmJzcDs8L2Rpdj4NCjxkaXY+X19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX188L2Rpdj4NCjxkaXY+QkVTUyBtYWlsaW5nIGxpc3Q8L2Rpdj4N CjxkaXY+PGEgaHJlZj0ibWFpbHRvOkJFU1NAaWV0Zi5vcmciPkJFU1NAaWV0Zi5vcmc8L2E+PC9k aXY+DQo8ZGl2PjxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8v YmVzcyI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9iZXNzPC9hPg0KPC9k aXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPC9zcGFuPjwvZm9udD4NCjwvYm9keT4NCjwvaHRtbD4N Cg== --_000_TU4PR8401MB1248F7A511CDA597C3423F3194FA9TU4PR8401MB1248_-- From nobody Fri Aug 13 11:14:39 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 118C93A2147; Fri, 13 Aug 2021 11:14:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.551 X-Spam-Level: X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yJ_PGpu9PVqC; Fri, 13 Aug 2021 11:14:31 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 085C13A213A; Fri, 13 Aug 2021 11:14:27 -0700 (PDT) Received: from pps.filterd (m0150241.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17DI4Quu015918; Fri, 13 Aug 2021 18:14:27 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : content-type : mime-version; s=pps0720; bh=zONhVRIwmzcEM5ib+F/kIUJFr3tdBtitnjA4zG+m2nw=; b=WO4nNi0ph6SebAs+CpimlSgoz8th4tmnjv1+Niox6964XRfqZcRLT8VphZPQli7huTtZ fLd4+J5vjWQfngC3FkqrU3uNE5KRNzVwX6tOmZ712a4Z30DNm27efol0rmAsSljFGPTg V8eXnUiPOI4RNNPm+ZHqxStZMaOvEynNDEiw/eN7QCJumRsk01DZHzE4V/5HRm5YqcLl P/RNQkQDRJ7ump81r36mc2IQIFijWyLOZuzdFUQs0rBTckyB35SFGg+2Ik2jilDanR0q srNTuZi1ALY3KgYYRIEeqdgYnxMfweMeyorqDgrNqdF1TaG4nInYXPM1yITNR4uGUHXM Qg== Received: from g2t2352.austin.hpe.com (g2t2352.austin.hpe.com [15.233.44.25]) by mx0a-002e3701.pphosted.com with ESMTP id 3ad7eb9kdq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 13 Aug 2021 18:14:26 +0000 Received: from G4W9120.americas.hpqcorp.net (g4w9120.houston.hp.com [16.210.21.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g2t2352.austin.hpe.com (Postfix) with ESMTPS id EF873E9; Fri, 13 Aug 2021 18:14:25 +0000 (UTC) Received: from G2W6310.americas.hpqcorp.net (2002:10c5:4034::10c5:4034) by G4W9120.americas.hpqcorp.net (2002:10d2:150f::10d2:150f) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Fri, 13 Aug 2021 18:14:25 +0000 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (15.241.52.13) by G2W6310.americas.hpqcorp.net (16.197.64.52) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Fri, 13 Aug 2021 18:14:25 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=b9LQsWlO5+feP9Kqnu8/jHzYTJrvC74AsATAM1iQlsEYoPBwy/nGFypebPZIVupSVC42L9uSw+ui9vwTqsBASypdcQbJLUDPxqGppUssDYT+wxZlQB7wscPmwwF5yntTE9/OtIkuDXPLUdu7nkXKVTsIU3xorZUn1txV73AIPh2Xdwh43CfMjy9kdoGXkTW0SaHohqc4e3YQIiqXV3HF9xRr/hx8HiC3rh3OqR4hStm90BQXYSfygl7D83/0q0u3OezMgRPsG8eXnF5ZNdtgfVIpJ2L470CjFSk4uQj5JSHOyqkL8gPruX8Uqgeus6+YM+HF/aa69Gjo2wil95XHIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UptLhhXETscvOmoE+l/MZ9uNR1rZafXpQMsmTzPMyxw=; b=j2wvHfNx+e2qycydahmhiacs9kGmfFZTIkBPWQBwyBS6TJ5qAHz9O1T395CYd9o+iqwL00exijMFmal0eWDu4CjK4TbCxQurdrEjOkbC0Et33QfCOohKX/NDTJBjyaE7XUyEs7melPrqigGaz60at7WESHG5gZtdwk2lGK95e0aSGjtkqqXYDwczHSpHfshFoEp0UxkIUVWkj5ESleM0SKSMvdfxAzbTK2+i4yFu+rligWI+c4rF4G2xr7uslHc62TKPKXgm6qZc9QLLdoVv5JNtPF2B0v7iUeQw7w3RxQn24mIFMSac5PzsmIxlY2aLs3qUSvqtmBKNo4fPooFeqg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7715::21) by TU4PR8401MB0688.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:770f::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.19; Fri, 13 Aug 2021 18:14:21 +0000 Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca]) by TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca%11]) with mapi id 15.20.4415.019; Fri, 13 Aug 2021 18:14:20 +0000 From: "Dikshit, Saumya" To: "draft-ietf-bess-evpn-irb-extended-mobility@ietf.org" CC: "bess@ietf.org" Thread-Topic: Few queries on draft-ietf-bess-evpn-inter-subnet-forwarding-14 Thread-Index: AdeQbrNXnqzTB3XbSDOJAABU+O9N9A== Date: Fri, 13 Aug 2021 18:14:20 +0000 Message-ID: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: ae6add43-8ab3-468d-b977-08d95e862c1d x-ms-traffictypediagnostic: TU4PR8401MB0688: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8273; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(136003)(39860400002)(346002)(366004)(376002)(396003)(66574015)(166002)(6506007)(2906002)(26005)(186003)(316002)(66946007)(55016002)(71200400001)(38070700005)(66556008)(9686003)(66476007)(53546011)(52536014)(76116006)(83380400001)(7696005)(5660300002)(64756008)(66446008)(478600001)(30864003)(122000001)(86362001)(8936002)(450100002)(38100700002)(6916009)(4326008)(966005)(33656002)(8676002)(579004)(559001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ZXBMcm1kei9vbGkrQTJoeWlFL0RXd0pMNkxyWnp4UkxzblAzN2FEenJaKy9y?= =?utf-8?B?azIvZFBaT2hHRDE3ajRuaUZxUnF3T3Bwa3JYRFdZZ2MwQUNaMmo3anZUNlds?= =?utf-8?B?dzhFZFFiREZnNmxZMlJXOUNCeTdveXBSdnZxamFlVGtBdUU3eVBpSGIwbXB6?= =?utf-8?B?elFkR28yTVpwL3FUWUNOYUwyN09NRk93VVc0UjVXekdXVUFnOWNvVVVNVWRp?= =?utf-8?B?Nzd6c2c1ZEhPYWh0UnhwVkdCR0VtdE5lM2ZPYzdWakJZOUlWcmppajFVemJD?= =?utf-8?B?YnlqNFhETEV0ekVXTGVxcnkrVjBtRXdzUlFzRmppU0l6ekVwclUrMzBBdSs0?= =?utf-8?B?N2NMWUw3SlB2c2dFZUczc1NpemJ2WHF6cWZYNEVCazMxNENYRFF6cDA1YmZJ?= =?utf-8?B?UE5xczNGS2dPaVV3YnRIRHFSRGk1cmxNaWxWd2RQSG5ONjRqRFVwQ2hFQUMr?= =?utf-8?B?bEJzTnNDazM4dGNkTlRsYk1mS0UwVHEvRG5HMkllUm42dTRXRFRmb1lqNEJv?= =?utf-8?B?REtmdDdSVlRtenAwdWZoaVVxbm1PY1gyeGVyWTVlalVKSnNrb3d5YlF1RHBD?= =?utf-8?B?SEFMMUlydlRKMHpZSTVkSmp1L3JvYnhDbTFIeGJCMW5UWFZ1NDlJaWJNVDVw?= =?utf-8?B?N2drc0MrNVhKSTVSTHA4Y2JZbVFPR3JUT3VaS3RmMlJBTElCeW1jQ2xHdHk2?= =?utf-8?B?eUtlVTZIdkRVVHdldGYzZlhtWTNaYXB6NHdES3pkekdOTFd4d0dwZlRIWGl6?= =?utf-8?B?TUpyUS9JMTlKaXYvYTdLeVBrVjkxVlJ5UDRtQWRSaFgzeG5VNVZ3TkFXNDRo?= =?utf-8?B?dkNMRUp4eUlxV2RxU0dLbnZaQkJRdlU1WDZsQjJKd1BUVHl4a0tvZGRhdXMy?= =?utf-8?B?cXhxMVdoZWE3OVhVYXE0VDRLSklEWHlRaThoRFZaR3htRE8wRGplSld0bUFM?= =?utf-8?B?Mi9MSEhBUlAvS1htS3BFUlNQOHJzenduZTlSdXNqOFZGWXFGaThtUWNkTnFP?= =?utf-8?B?L1MzSWY3ZWc1czd1S2dCYkZ5UGVnbXA0ZG1DVFFnK1UrdUVaVVd2RmJ6d1hk?= =?utf-8?B?MXY2NmFGREs5ODI2ekdNaUhyY2llOUo2bkJFNW9NNS9jd0lDREN3YTIvODRi?= =?utf-8?B?SXB2TDVHTUVCdEpZS1BRS2VrMW1rTmpRRU1rQm9sOE9wMXk3L2pBOUgySVo3?= =?utf-8?B?NmVQdHgvdXhIcnFZVm1hQ25kS1dpdSthRHFwcWkvNzhsR3BmNU5FZGNrTjI1?= =?utf-8?B?VUV4ZWF5TGUxK3VzbnBzSXgySFJjWitBMXN3dlpZTGhmSndsRUdwNWxvbzF5?= =?utf-8?B?N09kM0s4YVNLdFVFL1hzSFh4Y3R2eVQ2UGJncGoxSlB6N2FtODFZQ1lQZitD?= =?utf-8?B?d1d1VXpWUXFrbmoyVmNuNjB5Z3hLUFFtOHBLTFBDT0s2cnhTSzZnSnJabGdN?= =?utf-8?B?ai9SeVpoRlJCdGJ3UnJNdUVPd1RiS0NtZk1WbmI5c00ra20xcVpxeGNGdjJx?= =?utf-8?B?RFl2eTVleTZsQnlxYldNQlVhNEkwQTZwVUtacXFIMEU0cE9ZNjYzT2x3QWxJ?= =?utf-8?B?S0dvamxWOXp5YXg4bjBaL1pqWVZkWTA0Q0dHR2FTVWx5TkZzQ1lhZ0ZUdUkr?= =?utf-8?B?YnhtSjE2MFE0U0pmWUxtdGM3VTMzbWVkalJheUFOS1hDbkpiNWxNa1hTcG05?= =?utf-8?B?TmZrOTVlbUczaVV1ZkZyNlp3UnhvYVgrbUdoUFY5anFQeVluWHF5NVNhWnB2?= =?utf-8?Q?CyZcdj3WzZn2yFdahXe4Ww7uG1aNPUX7n1Mfbui?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_TU4PR8401MB12487F27E7E4F54439933BC794FA9TU4PR8401MB1248_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: ae6add43-8ab3-468d-b977-08d95e862c1d X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Aug 2021 18:14:20.7070 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 6dSj1xFpEDfo8KS1ADdTotETm9vIlSeBK5eJMBNGPaZXTYhs+3jVaJfz5XhzfrIr4XrcMkRabiFW/RfAJsjSqQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR8401MB0688 X-OriginatorOrg: hpe.com X-Proofpoint-ORIG-GUID: HvRaDK1DhLuB1IvoXM3IHhwRqslBUtve X-Proofpoint-GUID: HvRaDK1DhLuB1IvoXM3IHhwRqslBUtve X-Proofpoint-UnRewURL: 10 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-13_06:2021-08-13, 2021-08-13 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 priorityscore=1501 suspectscore=0 clxscore=1011 phishscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 lowpriorityscore=0 mlxscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108130107 Archived-At: Subject: [bess] Few queries on draft-ietf-bess-evpn-inter-subnet-forwarding-14 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Aug 2021 18:14:38 -0000 --_000_TU4PR8401MB12487F27E7E4F54439933BC794FA9TU4PR8401MB1248_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGVsbG8gQXV0aG9ycyBvZiAgZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndh cmRpbmcsDQoNCkkgaGF2ZSBmb2xsb3dpbmcgcXVlcmllcyBhbmQgY29tbWVudHMgYWJvdXQgdGhp cyBkcmFmdCDigJxkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZ+KA nS4NClBsZWFzZSBoZWxwIGNsYXJpZnkuDQoNCj4+Pj5TZWN0aW9uIGh0dHBzOi8vZGF0YXRyYWNr ZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1v YmlsaXR5LTA1I3NlY3Rpb24tOC4xDQoNCk1VU1QgYmUgYXQgbGVhc3QgZXF1YWwgdG8gY29ycmVz cG9uZGluZyBTWU5DIE1BQyBzZXF1ZW5jZSBudW1iZXINCiAgICAgIGlmIG9uZSBpcyBwcmVzZW50 Lg0KQ2FuIHdlIGZvcm1hbGx5IGRlZmluZSB3aGF0IGEg4oCcU1lOQyBNQUMgc2VxdWVuY2UgbnVt YmVy4oCdID8NCg0KPj4+PlNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2Mv aHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlv bi04LjMNCg0K4oCcTUFDIE14IHdpdGggYSBzZXF1ZW5jZSBudW1iZXIgdGhhdCBpcyBoaWdoZXIg dGhhbiBvciBlcXVhbCB0bw0KICAgc2VxdWVuY2UgbnVtYmVyIGFzc2lnbmVkIHRvIGEgTE9DQUwg cm91dGUgZm9yIE1BQyBNeDoNCiAgIG8gIFBFIE1VU1QgdHJpZ2dlciBwcm9iZSBhbmQgZGVsZXRp b24gcHJvY2VkdXJlIGZvciBhbGwgTE9DQUwgSVBzDQogICAgICBhc3NvY2lhdGVkIHdpdGggTUFD IE14Lg0KICAgbyAgUEUgTVVTVCB0cmlnZ2VyIGRlbGV0aW9uIHByb2NlZHVyZSBmb3IgTE9DQUwg TUFDIHJvdXRlIGZvciBNeC4NCg0K4oCdDQpBcyBwZXIgcmZjNzQyMywgaWYgZXF1YWwgc2VxdWVu Y2UgbnVtYmVyIGlzIHJlY2VpdmVkLCB0aGVuIHRoZSBvbmUgcHVibGlzaGVkIHdpdGggbG93ZXIg dnRlcC1pcCBpcyByZXRhaW5lZCwgYW5kIHRoZSBvdGhlciBvbmUgaXMgd2l0aGRyYXduLg0KV2hp bGUgdGhpcyBzZWN0aW9uIHRhbGtzIGFib3V0IHByb2JpbmcgaXQgYWdhaW4uDQpUaGlzIHNob3Vs ZCBiZSBjYWxsZWQgb3V0IGluIHRoZSBJbnRlcm9wIHNlY3Rpb24gYXMgd2VsbCwgZm9yIHRoZSBj by1leGlzdGVuY2Ugb2Ygb2xkIHJ1bGUgYW5kIG5ld2x5IGRlZmluZWQNCg0KUXVvdGluZyBmcm9t ICBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlvbi0x NToNCg0K4oCcSWYgdHdvIChvciBtb3JlKSBQRXMgYWR2ZXJ0aXNlIHRoZSBzYW1lIE1BQw0KDQog ICBhZGRyZXNzIHdpdGggdGhlIHNhbWUgc2VxdWVuY2UgbnVtYmVyIGJ1dCBkaWZmZXJlbnQgRXRo ZXJuZXQgc2VnbWVudA0KDQogICBpZGVudGlmaWVycywgYSBQRSB0aGF0IHJlY2VpdmVzIHRoZXNl IHJvdXRlcyBzZWxlY3RzIHRoZSByb3V0ZQ0KDQogICBhZHZlcnRpc2VkIGJ5IHRoZSBQRSB3aXRo IHRoZSBsb3dlc3QgSVAgYWRkcmVzcyBhcyB0aGUgYmVzdCByb3V0ZeKAnQ0KDQoNCj4+Pj4gU2Vj dGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVz cy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguNg0KDQrigJwgICBhbiBp bnRlci1vcCBzY2VuYXJpbyB3aXRoIGEgZGlmZmVyZW50IGltcGxlbWVudGF0aW9uIGNvdWxkIGFy aXNlLA0KDQogICB3aGVyZSBhIFBFIGltcGxlbWVudGF0aW9uIG5vbi1jb21wbGlhbnQgd2l0aCB0 aGlzIGRvY3VtZW50IG9yIHdpdGgNCg0KICAgUkZDIDc0MzI8aHR0cHM6Ly9kYXRhdHJhY2tlci5p ZXRmLm9yZy9kb2MvaHRtbC9yZmM3NDMyPiBhc3NpZ25zIGFuZCBhZHZlcnRpc2VzIGluZGVwZW5k ZW50IHNlcXVlbmNlIG51bWJlcnMgdG8gTUFDDQoNCiAgIGFuZCBNQUMrSVAgcm91dGVz4oCdDQpI b3cgZG8gd2UgZXhwZWN0IHRoaXMgaW1wbGVtZW50YXRpb24gdG8gaW50ZXItb3AsIGFzIGl0IG1h eSBleHBlY3QgdHdvIGRpZmZlcmVudCBNQUMtb25seSBhbmQgTUFDLUlQIGFkdmVydGlzZW1lbnQg ZnJvbSByZW1vdGUgcGVlcnMgYXMgd2VsbC4/DQpDYW4gd2UgcGFyYXBocmFzZSB0aGlzID8NCg0K DQo+Pj4+IFNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFm dC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjgNCg0K 4oCcRm9sbG93aW5nIGEgaG9zdCBtb3ZlIGZyb20gUEUxIHRvIFBFMiwgdGhlIGhvc3QncyBNQUMg aXMNCg0KICAgICAgZGlzY292ZXJlZCBhdCBQRTIgYXMgYSBsb2NhbCBNQUMgdmlhIGEgZGF0YSBm cmFtZXMgcmVjZWl2ZWQgZnJvbQ0KDQogICAgICB0aGUgaG9zdC7igJ0NCg0KRG8gd2UgbmVlZCB0 byBjYWxsIG91dCB0aGUgbWlzY29uZmlndXJhdGlvbiBjYXNlLCB3aGVyZSBhIHByb2JlIG1heSBs ZWFkIHRvIERVUCByZXNwb25zZXMsDQoNCm9uZSBmcm9tIHRoZSAobG9jYWwgbGVhcm5pbmcpIGFj Y2VzcyBzaWRlIGFuZCBvdGhlciBvbmUgYWNyb3NzIHRoZSBmYWJyaWMgKG92ZXJsYXkgdHVubmVs KS4NCg0KDQo+Pj4+IFNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRt bC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi0x MC40LjENCg0K4oCcdW5mcmVlemluZyB0aGUNCg0KICAgICAgcm91dGUgYXQgdGhlIEZST1pFTiBs b2NhdGlvbiB3aWxsIHJlc3VsdCBpbiB0aGUgcm91dGUgYmVpbmcNCg0KICAgICAgYWR2ZXJ0aXNl ZCB3aXRoIGEgaGlnaGVyIHNlcXVlbmNlIG51bWJlci7igJ0NCldoeSBhcmUgd2UgdHlpbmcgcHJv YmluZyB3aXRoIOKAnHVuZnJlZXppbmfigJ0gPyBGUk9aRU4gd2lsbCB0eXBpY2FsbHkgaW5kaWNh dGUgZHJvcHBpbmcgb2YgZmxvd3MuIFByb2JpbmcgY2FuIHN0aWxsIGdvIG9uIGluIHBhcmFsbGVs ID8NCkNhbiB0aGlzIGJlIGNhbGxlZCBvdXQgZXhwbGljaXRseS4NCg0KDQpUaGFua3MNClNhdW15 YS4NCg0KDQpGcm9tOiBCRVNTIFttYWlsdG86YmVzcy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhh bGYgT2YgRGlrc2hpdCwgU2F1bXlhDQpTZW50OiBGcmlkYXksIEF1Z3VzdCAxMywgMjAyMSA0OjE1 IFBNDQpUbzogSm9obiBTY3VkZGVyIDxqZ3NAanVuaXBlci5uZXQ+OyBUaGUgSUVTRyA8aWVzZ0Bp ZXRmLm9yZz4NCkNjOiB6emhhbmdAanVuaXBlci5uZXQ7IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlu dGVyLXN1Ym5ldC1mb3J3YXJkaW5nQGlldGYub3JnOyBiZXNzLWNoYWlyc0BpZXRmLm9yZzsgYmVz c0BpZXRmLm9yZw0KU3ViamVjdDogUmU6IFtiZXNzXSBKb2huIFNjdWRkZXIncyBObyBPYmplY3Rp b24gb24gZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmctMTQ6ICh3 aXRoIENPTU1FTlQpDQoNCkkgaGF2ZSBxdWVyeSByZWdhcmRpbmcgdGhlIGZvbGxvd2luZyB0ZXh0 IGluIHRoZSBzZWN0aW9uICIgaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9k cmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi00LjMu MTxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1l dnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xPiIgOg0KIiBbSVA3LCBN MV0gaXMgbGVhcm50IGFzIGEgbmV3IHJvdXRlIGF0DQogICBbUEUzLCBQRTRdIGFuZCBhZHZlcnRp c2VkIHRvIHJlbW90ZSBQRXMgd2l0aCBhIHNlcXVlbmNlIG51bWJlciBvZiAwLg0KICAgQXMgYSBy ZXN1bHQsIEwzIHJlYWNoYWJpbGl0eSB0byBJUDcgd291bGQgYmUgZXN0YWJsaXNoZWQgYWNyb3Nz IHRoZQ0KICAgb3ZlcmxheSwgaG93ZXZlciwgTUFDIG1vYmlsaXR5IHByb2NlZHVyZSBmb3IgTUFD MSB3aWxsIG5vdCB0cmlnZ2VyIGFzDQogICBhIHJlc3VsdCBvZiB0aGlzIE1BQy1JUCByb3V0ZSBh ZHZlcnRpc2VtZW50Ig0KDQpJZiBhIGhvc3QgaXMgbW92ZWQgd2l0aCB0aGUgc2FtZSBNQUMsIHRo ZSBmb2xsb3dpbmcgaXMgc3RpbGwgYmVpbmcgZm9sbG93aW5nIGluIGN1cnJlbnQgaW1wbGVtZW50 YXRpb24ocyk6DQotIEVpdGhlciAiTUFDLW9ubHktcm91dGUiIG9yICJNQUMtSVAtcm91dGUiIGFk dmVydGlzZW1lbnQsIHRoZSBzZXF1ZW5jZSBudW1iZXIgaXMgYnVtcGVkIGluIGJvdGggY2FzZXMN Ci0gT24gcmVjZWl2aW5nIHNpZGUsDQogICAgICAtICB0aGUgc2VxdWVuY2UtbnVtYmVyIGlzIHBp Y2tlZCB1cCBmcm9tICJNQUMtb25seS1yb3V0ZSIgb3IgIk1BQy1JUC1yb3V0ZSIgYW5kIGFwcGxp ZWQgdG8gTUFDIGxlYXJuaW5ncw0KICAgICAgLSB0aGUgYnVtcGVkIHVwIHNlcXVlbmNlIG51bWJl ciBsZWFkcyBhIHdpdGhkcmF3IG9mICJNQUMtb25seSIgb3IgIk1BQy1JUC1yb3V0ZSIgZnJvbSB0 aGUgaW5mZXJpb3IgKGVhcmxpZXIpIHB1Ymxpc2hlcg0KDQpLaW5kbHkgaGVscCBleHBsYWluLCBp ZiB0aGUgdGV4dCBtZW50aW9uZWQgaW4g4oCcc2VjdGlvbiA0LjMuMeKAnSBpcyBjcmVhdGluZyBz b21lIGRvdWJ0cyByZWdhcmRpbmcgdGhlIHdheSB0aGluZ3Mgb3BlcmF0ZSB3aXRoIGN1cnJlbnQg c3RhbmRhcmRzLg0KVGhvdWdoIEkgZGVmaW5pdGVseSBiZWxpZXZlIHRoYXQgdGhpcyBsaXRlcmF0 dXJlIGRvZXMgYXdheSB3aXRoIGxvdCBvZiBleGlzdGluZyBhbWJpZ3VpdGllcy4NCkkgdGhpbmsg d2UgbmVlZCB0byBwYXJhcGhyYXNlIHRoaXMgc2VjdGlvbiBhdGxlYXN0Lg0KDQpUaGFua3MNClNh dW15YS4NCg0KDQotLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogQkVTUyBbbWFpbHRv OmJlc3MtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mIEpvaG4gU2N1ZGRlciB2aWEgRGF0 YXRyYWNrZXINClNlbnQ6IFRodXJzZGF5LCBKdWx5IDE1LCAyMDIxIDQ6NTMgQU0NClRvOiBUaGUg SUVTRyA8aWVzZ0BpZXRmLm9yZzxtYWlsdG86aWVzZ0BpZXRmLm9yZz4+DQpDYzogenpoYW5nQGp1 bmlwZXIubmV0PG1haWx0bzp6emhhbmdAanVuaXBlci5uZXQ+OyBiZXNzLWNoYWlyc0BpZXRmLm9y ZzxtYWlsdG86YmVzcy1jaGFpcnNAaWV0Zi5vcmc+OyBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRl ci1zdWJuZXQtZm9yd2FyZGluZ0BpZXRmLm9yZzxtYWlsdG86ZHJhZnQtaWV0Zi1iZXNzLWV2cG4t aW50ZXItc3VibmV0LWZvcndhcmRpbmdAaWV0Zi5vcmc+OyBiZXNzQGlldGYub3JnPG1haWx0bzpi ZXNzQGlldGYub3JnPg0KU3ViamVjdDogW2Jlc3NdIEpvaG4gU2N1ZGRlcidzIE5vIE9iamVjdGlv biBvbiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy0xNDogKHdp dGggQ09NTUVOVCkNCg0KSm9obiBTY3VkZGVyIGhhcyBlbnRlcmVkIHRoZSBmb2xsb3dpbmcgYmFs bG90IHBvc2l0aW9uIGZvcg0KZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndh cmRpbmctMTQ6IE5vIE9iamVjdGlvbg0KDQpXaGVuIHJlc3BvbmRpbmcsIHBsZWFzZSBrZWVwIHRo ZSBzdWJqZWN0IGxpbmUgaW50YWN0IGFuZCByZXBseSB0byBhbGwgZW1haWwgYWRkcmVzc2VzIGlu Y2x1ZGVkIGluIHRoZSBUbyBhbmQgQ0MgbGluZXMuIChGZWVsIGZyZWUgdG8gY3V0IHRoaXMgaW50 cm9kdWN0b3J5IHBhcmFncmFwaCwgaG93ZXZlci4pDQoNCg0KUGxlYXNlIHJlZmVyIHRvIGh0dHBz Oi8vd3d3LmlldGYub3JnL2llc2cvc3RhdGVtZW50L2Rpc2N1c3MtY3JpdGVyaWEuaHRtbDxodHRw czovL3d3dy5pZXRmLm9yZy9pZXNnL3N0YXRlbWVudC9kaXNjdXNzLWNyaXRlcmlhLmh0bWw+DQpm b3IgbW9yZSBpbmZvcm1hdGlvbiBhYm91dCBESVNDVVNTIGFuZCBDT01NRU5UIHBvc2l0aW9ucy4N Cg0KDQpUaGUgZG9jdW1lbnQsIGFsb25nIHdpdGggb3RoZXIgYmFsbG90IHBvc2l0aW9ucywgY2Fu IGJlIGZvdW5kIGhlcmU6DQpodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1p ZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy88aHR0cHM6Ly9kYXRhdHJhY2tl ci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRp bmcvPg0KDQoNCg0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KQ09NTUVOVDoNCi0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCg0KVGhh bmtzIHRvIHRoZSBhdXRob3JzIGZvciB0aGVpciB3b3JrIGluIGFkZHJlc3NpbmcgbXkgY29tbWVu dHMuIENvcHlpbmcgbXkNCihyZXNvbHZlZCkgZGlzY3VzcyBwb2ludHMgaGVyZSBmb3IgcG9zdGVy aXR5Lg0KDQotLS0tDQoNCkkgZm91bmQgdGhpcyBkb2N1bWVudCBkaWZmaWN1bHQgdG8gcmV2aWV3 LiBTb21lIG9mIHRoaXMgbWlnaHQgYmUgZHVlIHRvIHRoZQ0KZmFjdCB0aGF0IEknbSBub3QgYW4g ZXhwZXJ0IG9uIEVWUE4sIGJ1dCBJIHRoaW5rIHNvbWUgb2YgdGhlIHJlYXNvbiBpcyB0aGF0IHRo ZQ0KZG9jdW1lbnQgY291bGQgYmUgc3RydWN0dXJlZCBiZXR0ZXIgYW5kIGV4cHJlc3NlZCBtb3Jl IGNsZWFybHkuIFRoZSBvbmx5IHJlYXNvbg0KSSdtIG5vdCBvcHBvc2luZyBwcm9ncmVzc2lvbiBv ZiB0aGUgZG9jdW1lbnQgb24gdGhlIGdyb3VuZHMgdGhhdCBpdCdzIHRvbw0KdW5jbGVhciB0byBp bXBsZW1lbnQgaXMgdGhhdCBJJ3ZlIGJlZW4gdG9sZCwgYW5kIGFjY2VwdCBvbiBmYWl0aCwgdGhh dA0KaW1wbGVtZW50YXRpb25zICpoYXZlKiBiZWVuIHN1Y2Nlc3NmdWxseSB3cml0dGVuIHN0YXJ0 aW5nIGZyb20gdGhlIHNwZWMsIHdoaWNoDQppbXBsaWVzIGl0J3MgaW1wbGVtZW50YWJsZSAtLSBJ IGd1ZXNzIGJ5IHBlb3BsZSB3aG8gYXJlIGV4cGVydCBpbiBFVlBOIGFscmVhZHksDQppdCB3b3Vs ZG4ndCBiZSBpbXBsZW1lbnRhYmxlIGJ5IG1lLg0KDQpJbiBhbnkgY2FzZSwgSSBkbyBoYXZlIHNv bWUgcG9pbnRzIEkgd291bGQgbGlrZSB0byBkaXNjdXNzLCB0aGF0IGFyZSBtb3JlDQphY3Rpb25h YmxlLg0KDQoxLiBJIGFncmVlIHdpdGggUm9iZXJ0IFdpbHRvbidzIGNvbW1lbnQgb24gLTA5Og0K DQpgYGANCk9uZSBxdWVzdGlvbiBJIGhhdmUgaXMgd2hldGhlciBpdCBpcyBwb3NzaWJsZSB0byBo YXZlIGEgZGVwbG95bWVudCB3aGVyZSBzb21lDQpkZXZpY2VzIHN1cHBvcnQgc3luY2hyb25vdXMg bW9kZSBhbmQgb3RoZXJzIHN1cHBvcnQgYXN5bmNocm9ub3VzIG1vZGUuICBBbSBJDQpyaWdodCBp biBwcmVzdW1pbmcgdGhhdCB0aGlzIGlzIG5vdCBzdXBwb3J0ZWQgYW5kIGlmIHNvIGlzIHRoaXMg Y2FwYWJpbGl0eQ0Kc2lnbmFsZWQgaW4gYW55IHdheT8gT3IgaXMgdGhlIGV4cGVjdGF0aW9uIHRo YXQgdGhpcyB3b3VsZCBiZSBjb250cm9sbGVkIHZpYQ0KZGVwbG95bWVudCBjaG9pY2Ugb2YgbmV0 d29yayBkZXZpY2UsIG9yIHRob3VnaCBjb25maWd1cmF0aW9uIG1hbmFnZW1lbnQ/IGBgYA0KDQpU aGlzIGlzc3VlIHN0aWxsIGV4aXN0cyBpbiAtMTQuIEkgdGhpbmsgaXQgc2hvdWxkIGJlIGFkZHJl c3NlZCBpbiB0aGUgZG9jdW1lbnQuDQpTaW1pbGFybHksIEkgYWdyZWUgd2l0aCBXYXJyZW4gS3Vt YXJpJ3MgY29tbWVudCwgYWxzbyBvbiAtMDk6DQoNCmBgYA0KSSB3b3VsZCBzdHJvbmdseSByZWNv bW1lbmQgdGhhdCB0aGUgYXV0aG9ycyByZWFkIHRoZSBPcHNEaXIgcmV2aWV3IGF0Og0KaHR0cHM6 Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvcmV2aWV3LWlldGYtYmVzcy1ldnBuLWludGVyLXN1 Ym5ldC1mb3J3YXJkaW5nLTA5LW9wc2Rpci1sYy1qYWVnZ2xpLTIwMjAtMDctMDYvPGh0dHBzOi8v ZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL3Jldmlldy1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJu ZXQtZm9yd2FyZGluZy0wOS1vcHNkaXItbGMtamFlZ2dsaS0yMDIwLTA3LTA2Lz4NCiwgZXNwZWNp YWxseSB0aGU6ICJpdCB3b3VsZCBiZSBoZWxwZnVsIGlmIHNlY3Rpb24gNCB3b3VsZCBiZSBtb3Jl IGV4cGxpY2l0IGZvcg0Kbm9uLWltcGxlbWVudG9ycyBvbiB3aGVuIHN5bWV0cmljIG9yIGFzeW1l dHJpYyBtb2R1bGVzIHdvdWxkIGJlIGNob3NlbiwgYXMgaXQNCnN0YW5kcyB0aGUgdmFyaWF0aW9u IGJhc2ljYWxseSByZWFkcyBsaWtlIHRoZSBlbnVtZXJhdGlvbiBvZiB0aGUgZmVhdHVyZXMgb2YN CnZhcmlvdXMgaW1wbGVtZW50YXRpb25zLiIgY29tbWVudCAod2hpY2ggSSBmdWxseSBhZ3JlZSB3 aXRoKS4gYGBgDQoNCkl0IHNlZW1zIGJvdGggb2YgdGhlc2UgY29tbWVudHMgY291bGQgLS0gYW5k IHNob3VsZCEgLS0gYmUgYWRkcmVzc2VkIGJ5IGFkZGluZw0KYSBmZXcgcGFyYWdyYXBocyB0YWxr aW5nIGFib3V0IHRoZXNlIHRvcGljcy4gVGhpcyBjb3VsZCBiZSBkb25lIGVpdGhlciBpbiDCpzQs DQphcyBXYXJyZW4gc3VnZ2VzdHMsIG9yIGluIHNvbWUgb3RoZXIgc2VjdGlvbiAoZS5nLiB5b3Ug Y291bGQgYWRkIGFuDQoib3BlcmF0aW9uYWwgY29uc2lkZXJhdGlvbnMiIHNlY3Rpb24pLg0KDQoy LiBTZWN0aW9uIDcuMQ0KDQpJ4oCZbSBndWVzc2luZyB0aGlzIHF1ZXN0aW9uIGlzbuKAmXQgdW5p cXVlIHRvIHRoaXMgZG9jdW1lbnQsIGJ1dCBzaW5jZSB0aGlzIGlzDQp3aGVyZSBJIGVuY291bnRl cmVkIGl0LCBJ4oCZbGwgYXNrOiBpdCBzZWVtcyBhcyB0aG91Z2ggdGhlIGRlc2NyaWJlZCBtb2Jp bGl0eQ0KcHJvY2VkdXJlcyBhcmUgdnVsbmVyYWJsZSB0byBhIGNvbmRpdGlvbiB3aGVyZSBhIHBh cnRpY3VsYXIgKElQLCBNQUMpIGFwcGVhcnMNCmF0IHR3byBkaWZmZXJlbnQgTlZFcyBhdCB0aGUg c2FtZSB0aW1lLiBJZiB0aGlzIGNvbmRpdGlvbiBleGlzdHMgKGVpdGhlcg0KaW5ub2NlbnRseSwg b3IgbWFsaWNpb3VzbHkpIHdoYXQgcHJldmVudHMgdGhlIHNvdXJjZSBhbmQgdGFyZ2V0IE5WRXMg ZnJvbQ0KY29udGludWFsbHkgYXR0ZW1wdGluZyB0byBjbGFpbSB0aGUgKElQLCBNQUMpIGZyb20g b25lIGFub3RoZXIsIGZsb29kaW5nIHRoZQ0KbmV0d29yayB3aXRoIHVwZGF0ZXMgYWxsIHRoZSB3 aGlsZT8NCg0KKFRoaXMgYXBwbGllcyB0byA3LjIgYXMgd2VsbC4pDQoNClNpbmNlIHRoaXMgc2Vl bXMgbGlrZSBhIHBvdGVudGlhbCBzZWN1cml0eSBpc3N1ZSwgSSdtIGluY2x1ZGluZyBpdCBpbiBt eQ0KRElTQ1VTUy4NCg0KLS0tLQ0KDQpCZWxvdyBhcmUgYSBudW1iZXIgb2YgcXVlc3Rpb25zIGFu ZCBjb21tZW50cyB0aGF0IEkgaG9wZSBtaWdodCBoZWxwIGltcHJvdmUgdGhlDQpkb2N1bWVudC4g SSBoYXZlbid0IGNob3NlbiB0byBtYWtlIHRoZW0gYmxvY2tpbmcgYnkgaW5jbHVkaW5nIHRoZW0g aW4gbXkNCkRJU0NVU1M7IG5vbmV0aGVsZXNzIEkgd291bGQgYXBwcmVjaWF0ZSByZXBsaWVzIHRv IHRoZW0uDQoNCjEuIEkgYWdyZWUgd2l0aCB0aGUgY29tbWVudHMgYnkgc2V2ZXJhbCBvZiB0aGUg b3RoZXIgcmV2aWV3ZXJzLCB0aGF0IHRoZXJlIGFyZQ0KanVzdCB0b28gbWFueSBncmF0dWl0b3Vz IGFjcm9ueW1zIGluIHRoaXMgZG9jdW1lbnQuIFRoZXkgYXJlbid0IHRoZSBvbmx5IHRoaW5nDQp0 aGF0IG1ha2VzIGl0IGhhcmQgdG8gcmVhZCwgYnV0IHRoZXkgY2VydGFpbmx5IGNvbnRyaWJ1dGUu IEknbSBkaXNhcHBvaW50ZWQgdG8NCnNlZSB0aGlzIGhhc24ndCBiZWVuIGFkZHJlc3NlZCBiZXR3 ZWVuIHZlcnNpb25zIC0wOSBhbmQgLTE0LiBJdCB3b3VsZCBoYXZlIGJlZW4NCmEgc21hbGwgbWF0 dGVyIG9mIHNlYXJjaC1hbmQtcmVwbGFjZSB0byBnbyB0aHJvdWdoIGFuZCBleHBhbmQgbW9zdCBv ZiB0aGUNCmFjcm9ueW1zLg0KDQoyLiBTZWN0aW9uIDINCg0KYGBgDQogICBSMTogVGhlIHNvbHV0 aW9uIG11c3QgYWxsb3cgZm9yIGJvdGggaW50ZXItc3VibmV0IGFuZCBpbnRyYS1zdWJuZXQNCiAg IHRyYWZmaWMgYmVsb25naW5nIHRvIHRoZSBzYW1lIHRlbmFudCB0byBiZSBsb2NhbGx5IHJvdXRl ZCBhbmQgYnJpZGdlZA0KICAgcmVzcGVjdGl2ZWx5LiAgVGhlIHNvbHV0aW9uIG11c3QgcHJvdmlk ZSBJUCByb3V0aW5nIGZvciBpbnRlci1zdWJuZXQNCiAgIHRyYWZmaWMgYW5kIEV0aGVybmV0IEJy aWRnaW5nIGZvciBpbnRyYS1zdWJuZXQgdHJhZmZpYy4gIEl0IHNob3VsZCBiZQ0KICAgbm90ZWQg dGhhdCBpZiBhbiBJUC1WUkYgaW4gYSBOVkUgaXMgY29uZmlndXJlZCBmb3IgSVB2NiBhbmQgdGhh dCBOVkUNCiAgIHJlY2VpdmVzIElQdjQgdHJhZmZpYyBvbiB0aGUgY29ycmVzcG9uZGluZyBWTEFO LCB0aGVuIHRoZSBJUHY0DQogICB0cmFmZmljIGlzIHRyZWF0ZWQgYXMgTDIgdHJhZmZpYyBhbmQg aXQgaXMgYnJpZGdlZC4gIEFsc28gdmlzZSB2ZXJzYSwNCiAgIGlmIGFuIElQLVZSRiBpbiBhIE5W RSBpcyBjb25maWd1cmVkIGZvciBJUHY0IGFuZCB0aGF0IE5WRSByZWNlaXZlcw0KICAgSVB2NiB0 cmFmZmljIG9uIHRoZSBjb3JyZXNwb25kaW5nIFZMQU4sIHRoZW4gdGhlIElQdjYgdHJhZmZpYyBp cw0KICAgdHJlYXRlZCBhcyBMMiB0cmFmZmljIGFuZCBpdCBpcyBicmlkZ2VkLg0KDQogICBSMjog VGhlIHNvbHV0aW9uIG11c3Qgc3VwcG9ydCBicmlkZ2luZyBmb3Igbm9uLUlQIHRyYWZmaWMuDQpg YGANCg0KUjEgaXMgYSBsaXR0bGUgdG9ydHVyZWQsIHdoZXJlIHlvdSBhZGQgYWxsIHRoZSBjYXZl YXRzIGFib3V0IOKAnHRyZWF0ZWQgYXMgTDINCnRyYWZmaWPigJ0uIFNlZW1zIHRvIG1lIGxpa2Ug aXQgd291bGQgZmFsbCBvdXQgbW9yZSBuYXR1cmFsbHkgaWYgeW91IGhhZCBzaW1wbHkNCmludHJv ZHVjZWQgdGhlIGNvbmNlcHRzIG9mIHJvdXRhYmxlIGFuZCBub24tcm91dGFibGUgdHJhZmZpYywg d2hlcmUgcm91dGFibGUNCnRyYWZmaWMgaXMgdGhhdCBmb3Igd2hpY2ggYSBzdWl0YWJsZSBJUC1W UkYgZXhpc3RzLiBUaGF0IHdvdWxkIGFsc28gaGF2ZSB0aGUNCnBsZWFzYW50IGVmZmVjdCBvZiBt YWtpbmcgUjIgc2F5IOKAnOKApiBtdXN0IHN1cHBvcnQgYnJpZGdpbmcgZm9yIG5vbi1yb3V0YWJs ZQ0KdHJhZmZpY+KAnSBpbnN0ZWFkIG9mIOKAnG5vbi1JUCB0cmFmZmlj4oCdLCB3aGljaCBpcyB0 ZWNobmljYWxseSBpbmNvcnJlY3QgKHNpbmNlIHBlcg0KUjEgeW91IG1pZ2h0IGhhdmUgbm9uLXJv dXRhYmxlIElQIHRyYWZmaWMpLg0KDQpgYGANCiAgIFIzOiBUaGUgc29sdXRpb24gbXVzdCBhbGxv dyBpbnRlci1zdWJuZXQgc3dpdGNoaW5nIHRvIGJlIGRpc2FibGVkIG9uDQogICBhIHBlciBWTEFO IGJhc2lzIG9uIFBFcyB3aGVyZSB0aGUgdHJhZmZpYyBuZWVkcyB0byBiZSBiYWNraGF1bGVkIHRv DQogICBhbm90aGVyIG5vZGUgKGkuZS4sIGZvciBwZXJmb3JtaW5nIEZXIG9yIERQSSBmdW5jdGlv bmFsaXR5KS4NCmBgYA0KDQpXaGF04oCZcyDigJxzd2l0Y2hpbmfigJ0/IFRoZSBkb2N1bWVudCBp cyBhYm91dCByb3V0aW5nIHZzLiBicmlkZ2luZywgd2hpY2ggZG8geW91DQptZWFuPyBJIHRoaW5r IHlvdSBtZWFuIOKAnHJvdXRpbmfigJ0uIElNTyB5b3Ugc2hvdWxkIGdldCByaWQgb2YgdGhlIHdv cmQNCuKAnHN3aXRjaGluZ+KAnSBhbmQgcmVwbGFjZSB3aXRoIHNvbWV0aGluZyBsZXNzIGFtYmln dW91cywgZS5nLiDigJxyb3V0aW5n4oCdLiAoQm90aA0KaGVyZSBhbmQgdGhlIG9uZSBvdGhlciBw bGFjZSBpbiB0aGUgZG9jIHdoZXJlIHlvdSB1c2Ug4oCcc3dpdGNoaW5n4oCdLikNCg0KQWxzbywg SSB0aGluayB5b3UgZG9u4oCZdCBtZWFuIOKAnGkuZS7igJ0sIEkgdGhpbmsgeW91IG1lYW4g4oCc ZS5nLuKAnS4gVGhlIG1lYW5pbmcgb2YNCuKAnGkuZS7igJ0gaXMg4oCcaW4gb3RoZXIgd29yZHPi gJ0uIFRoZSBtZWFuaW5nIG9mIOKAnGUuZy7igJ0gaXMg4oCcZm9yIGV4YW1wbGXigJ0uIFRoZSBi ZXN0DQp3YXkgdG8gYXZvaWQgdGhlc2UgcHJvYmxlbXMsIElNTywgaXMgdG8gc2ltcGx5IHdyaXRl IG91dCB3aGF0IHlvdSBtZWFuLCBzbyBpbg0KdGhpcyBjYXNlIHdyaXRlIOKAnChmb3IgZXhhbXBs ZSwgZm9yIHBlcmZvcm1pbmcgRlcgb3IgRFBJIGZ1bmN0aW9uYWxpdHkpLuKAnSAoQW5kDQpvaCBi eSB0aGUgd2F5LCB5b3UgaGF2ZW7igJl0IGRlZmluZWQgb3IgZXhwYW5kZWQgRlcgb3IgRFBJLCBw bGVhc2UgZG8gc28uKQ0KDQozLiBTZWN0aW9uIDQNCg0KYGBgDQogICBvICByZWZlcmVuY2VzIHRv IEFSUCB0YWJsZSBpbiB0aGUgY29udGV4dCBvZiBhc3ltbWV0cmljIElSQiBpcyBhDQogICAgICBs b2dpY2FsIHZpZXcgb2YgYSBmb3J3YXJkaW5nIHRhYmxlIHRoYXQgbWFpbnRhaW5zIGFuIElQIHRv IE1BQw0KICAgICAgYmluZGluZyBlbnRyeSBvbiBhIGxheWVyIDMgaW50ZXJmYWNlIGZvciBib3Ro IElQdjQgYW5kIElQdjYuDQogICAgICBUaGVzZSBlbnRyaWVzIGFyZSBub3Qgc3ViamVjdCB0byBB UlAgb3IgTkQgcHJvdG9jb2wuDQpgYGANCg0KVGhpcyBwYXNzYWdlIHNoaW5lcyBhIHNwb3RsaWdo dCBvbiB0aGUgZmFjdCB0aGF0IOKAnEFSUCB0YWJsZeKAnSBhcyBpdOKAmXMgdXNlZCBpbg0KdGhp cyBkb2N1bWVudCBpcyBhIG1pc25vbWVyLCBzaW5jZSBpdOKAmXMgYSB0YWJsZSB0aGF0IGlzIG5v dCAobmVjZXNzYXJpbHkpDQpwb3B1bGF0ZWQgYnkgQVJQLiBJIGRvbuKAmXQgcHJvcG9zZSB0aGF0 IHlvdSBjaGFuZ2UgdGhlIG5vbWVuY2xhdHVyZSwgc2luY2UgaXTigJlzDQpmaXJtbHkgZXN0YWJs aXNoZWQgZXZlbiB0aG91Z2ggd3Jvbmcg4oCUIGJ1dCBpdCBtaWdodCBiZSB3b3J0aCBhZGRpbmcg dGhlIGZpcnN0DQpzZW50ZW5jZSBvciBvbmUgbGlrZSBpdCB0byB5b3VyIFRlcm1pbm9sb2d5IHNl Y3Rpb24uDQoNCjQuIFNlY3Rpb24gNA0KDQpGaWd1cmUgMiBkZXBpY3RzIEJUMiBiZWluZyBwcmVz ZW50IG9uIHRoZSBpbmdyZXNzIFBFLCBidXQgdGhlIHRleHQgbWFrZXMgaXQNCmNsZWFyIHRoYXQg aW4gdGhlIHN5bW1ldHJpYyBtb2RlIHRoYXQgdGhpcyBmaWd1cmUgZGVwaWN0cywgQlQyIGRvZXNu 4oCZdCBhY3R1YWxseQ0KbmVlZCB0byBiZSB0aGVyZS4gV291bGRu4oCZdCBpdCBiZSBjbGVhcmVy IGlmIHlvdSBkaWRu4oCZdCBzaG93IGl0Pw0KDQo1LiBTZWN0aW9uIDQNCg0KSSBoYXZlIGEgaGFy ZCB0aW1lIHBhcnNpbmcgdGhpcyB0ZXh0Og0KDQpgYGANCiAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICBFYWNoIEJUIG9uIGEgUEUgaXMNCiAgIGFzc29jaWF0ZWQg d2l0aCBhIHVuaXF1ZSBWTEFOIChlLmcuLCB3aXRoIGEgQkQpDQpgYGANCg0KU28sIDEgVkxBTiDi gJQ+IGF0IGxlYXN0IDEgQlQgKDE6bWFueSkNCg0KYGBgDQogICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgIHdoZXJlIGluIHR1cm4gaXQgaXMNCiAgIGFzc29j aWF0ZWQgd2l0aCBhIHNpbmdsZSBNQUMtVlJGDQpgYGANCg0KU28sIDEgTUFDLVZSRiDigJQ+IGF0 IGxlYXN0IDEgQlQgKDE6bWFueSkNCg0KYGBgDQogICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICBpbiB0aGUgY2FzZSBvZiBWTEFOLUJhc2VkIG1vZGUgb3IgYQ0KICAgbnVtYmVyIG9m IEJUcyBjYW4gYmUgYXNzb2NpYXRlZCB3aXRoIGEgc2luZ2xlIE1BQy1WUkYgaW4gdGhlIGNhc2Ug b2YNCiAgIFZMQU4tQXdhcmUgQnVuZGxlIG1vZGUuDQpgYGANCg0KU28sIDEgTUFDLVZSRiDigJQ+ IGF0IGxlYXN0IDEgQlQgKDE6bWFueSkNCg0KU2luY2UgdGhpcyBpcyBzdGF0ZWQgYXMgYW4gZXhj ZXB0aW9uIEkgZ3Vlc3MgdGhhdCBtZWFucyB5b3UgbWVhbnQgdGhlIHByZWNlZGluZw0KdHdvICh0 aGF0IEkgcGFyc2VkIGFzIDE6bWFueSkgYXJlIGFjdHVhbGx5IHN1cHBvc2VkIHRvIGJlIDE6MT8g SWYgc28gSSB0aGluaw0KdGhpcyBuZWVkcyBhIHJld3JpdGUgKGl0IHByb2JhYmx5IGRvZXMgcmVn YXJkbGVzcywgZm9yIGNsYXJpdHkpLg0KDQo2LiBTZWN0aW9uIDQuMQ0KDQpXaGVuIHlvdSB3cml0 ZSDigJxJbnRlcm5ldCBzdGFuZGFyZCBiaXQgb3JkZXLigJwsIGRvIHlvdSBtZWFuIOKAnG5ldHdv cmsgYnl0ZSBvcmRlcuKAnD8NCkFsdGhvdWdoIGV2ZW4gbmV0d29yayBieXRlIG9yZGVyIGFwcGVh cnMgdG8gYmUgbm9uLWFwcGxpY2FibGUsIHNpbmNlIHRoZSB2YWx1ZXMNCmFyZSBzaG93biB3aXRo IGFuIGV4cGxpY2l0IGJ5dGUgb3JkZXIuDQoNCkkgcmVhbGl6ZSB0aGUgZGVmaW5pdGlvbnMgYXJl IG1lcmVseSBwYXN0ZWQgZnJvbSBSRkMgNTc5OCBhbmQgdGhhdCBzaGlwIGhhcw0Kc2FpbGVkLCBi dXQgdW5sZXNzIHlvdSBjYW4gZXhwbGFpbiB3aGF0IOKAnChpbiBoZXgsIGluIEludGVybmV0IHN0 YW5kYXJkDQpiaXQtb3JkZXIp4oCdIGlzIHN1cHBvc2VkIHRvIG1lYW4sIEkgc3VnZ2VzdCByZW1v dmluZyBpdC4gKEFsdGVybmF0ZWx5IGFuZCBsZXNzDQpkZXNpcmFibHksIG1ha2UgaXQgZXhwbGlj aXQgdGhhdCB5b3XigJlyZSBwcm92aWRpbmcgYSBkaXJlY3QgcXVvdGF0aW9uIG9mIFJGQw0KNTc5 OC4pDQoNCjcuIFNlY3Rpb24gNS4xDQoNCllvdSBzYXkgdGhlIEVuY2Fwc3VsYXRpb24gRXh0ZW5k ZWQgQ29tbXVuaXR5IGFuZCBSb3V0ZXLigJlzIE1BQyBFeHRlbmRlZA0KQ29tbXVuaXR5IGhhdmUg dG8gYmUgc2VudCwgYnV0IHlvdSBzYXkgbm90aGluZyBhYm91dCB0aGUgcmVxdWlyZWQgdmFsdWVz LiBGb3INClJvdXRlcidzIE1BQywgwqc4LjEgc3BlY2lmaWVzIHRoZSByZXF1aXJlZCB2YWx1ZSwg SSBzdWdnZXN0IGEgZm9yd2FyZCByZWZlcmVuY2UNCnRvIGl0LiBGb3IgRW5jYXBzdWxhdGlvbiwg dGhlIGNsb3Nlc3QgSSB3YXMgYWJsZSB0byBmaW5kIHRvIGEgcGxhY2Ugd2hlcmUgdGhpcw0KaXMg c3BlY2lmaWVkIHdhcyBzZWN0aW9uIDkuMS4xLCBidXQgdGhhdCdzIG9ubHkgYW4gZXhhbXBsZS4g VGhlcmUgcmVhbGx5IG5lZWRzDQp0byBiZSBzb21lIHBsYWNlIHdoZXJlIGl0J3Mgc3BlbGxlZCBv dXQuIEEgYmFyZSBtaW5pbXVtIHdvdWxkIGJlIHRvIGNpdGUgUkZDDQo5MDEyIMKnNC4xLCBidXQg dGhhdCBqdXN0IHByb3ZpZGVzIHRoZSBzeW50YXggLS0geW91IHJlYWxseSBzaG91bGQgc2F5IHNv bWV0aGluZw0KbW9yZSBhYm91dCBob3cgdG8gZGVjaWRlIHdoYXQgdmFsdWUgdG8gc2VuZC4gRm9y IHRoYXQgbWF0dGVyLCBpdCBjb3VsZCBiZSB3aGF0DQp2YWx1ZVMgdG8gc2VuZCAtLSBpcyBpdCBs ZWdhbCBmb3IgYSBOVkUgdG8gYWR2ZXJ0aXNlIG11bHRpcGxlIEVuY2Fwc3VsYXRpb24NCkV4dGVu ZGVkIENvbW11bml0aWVzPyBZb3UgZG9uJ3Qgc2F5IGl0IGlzbid0LCBhbmQgdGhlcmUgYXJlIHBv dGVudGlhbCByZWFzb25zDQp0byBkbyBzby4NCg0KOC4gU2VjdGlvbiA1LjINCg0KYGBgDQogICBv ICBVc2luZyBNQUMtVlJGIFJvdXRlIFRhcmdldCAoYW5kIEV0aGVybmV0IFRhZyBpZiBkaWZmZXJl bnQgZnJvbQ0KICAgICAgemVybyksIGl0IGlkZW50aWZpZXMgdGhlIGNvcnJlc3BvbmRpbmcgTUFD LVZSRiAoYW5kIEJUKS4gIElmIHRoZQ0KICAgICAgTUFDLSBWUkYgKGFuZCBCVCkgZXhpc3RzIChl LmcuLCBpdCBpcyBsb2NhbGx5IGNvbmZpZ3VyZWQpIHRoZW4gaXQNCmBgYA0KDQpZb3UgdXNlIOKA nGUuZy7igJ0gc28gSSBwcmVzdW1lIHRoZXJlIG1pZ2h0IGJlIG90aGVyIHJlYXNvbnMgdGhlIE1B Qy1WUkYgYW5kIEJUDQptaWdodCBleGlzdCBldmVuIGlmIG5vdCBsb2NhbGx5IGNvbmZpZ3VyZWQ/ DQoNCmBgYA0KICAgICAgaW1wb3J0cyB0aGUgTUFDIGFkZHJlc3MgaW50byBpdC4gIE90aGVyd2lz ZSwgaXQgZG9lcyBub3QgaW1wb3J0DQogICAgICB0aGUgTUFDIGFkZHJlc3MuDQoNCiAgIG8gIFVz aW5nIElQLVZSRiByb3V0ZSB0YXJnZXQsIGl0IGlkZW50aWZpZXMgdGhlIGNvcnJlc3BvbmRpbmcg SVAtVlJGDQogICAgICBhbmQgaW1wb3J0cyB0aGUgSVAgYWRkcmVzcyBpbnRvIGl0Lg0KYGBgDQoN CllvdSBkb27igJl0IHByb3ZpZGUgYW55IGNvbmRpdGlvbmFsIGxhbmd1YWdlIGluIHRoaXMgYnVs bGV0IGFib3V0IOKAnGlmIHRoZSBJUC1WUkYNCmV4aXN0c+KAnS4gV2h5IGlzIHRoYXQgY2F2ZWF0 IHJlcXVpcmVkIGZvciBNQUMtVlJGIGJ1dCBub3QgZm9yIElQLVZSRj8NCg0KOS4gU2VjdGlvbiA1 LjINCg0KYGBgDQogICBUaGUgaW5jbHVzaW9uIG9mIE1QTFMgbGFiZWwyIGZpZWxkIGluIHRoaXMg cm91dGUgc2lnbmFscyB0byB0aGUNCiAgIHJlY2VpdmluZyBQRSB0aGF0IHRoaXMgcm91dGUgaXMg Zm9yIHN5bW1ldHJpYyBJUkIgbW9kZSBhbmQgTVBMUw0KICAgbGFiZWwyIG5lZWRzIHRvIGJlIGlu c3RhbGxlZCBpbiBmb3J3YXJkaW5nIHBhdGggdG8gaWRlbnRpZnkgdGhlDQogICBjb3JyZXNwb25k aW5nIElQLVZSRi4NCmBgYA0KDQpJIHdhcyB1bmFibGUgdG8gbWFrZSBoZWFkIG5vciB0YWlsIG9m IHRoaXMgcGFyYWdyYXBoLiBJIHN1cHBvc2Ugwqc1LjQgaXMgd2hlcmUNCnRoZSBiZWhhdmlvciBp cyBhY3R1YWxseSBzcGVjaWZpZWQsIHNvIGluIGEgd2F5IGl0IGRvZXNu4oCZdCBtYXR0ZXIgKGFs dGhvdWdoDQptYXliZSBhIGZvcndhcmQgcmVmZXJlbmNlIHdvdWxkIGhlbHApLg0KDQoxMC4gU2Vj dGlvbiA1LjINCg0KYGBgDQogICBJZiB0aGUgcmVjZWl2aW5nIFBFIHJlY2VpdmVzIHRoaXMgcm91 dGUgd2l0aCBib3RoIHRoZSBNQUMtVlJGIGFuZCBJUC0NCiAgIFZSRiByb3V0ZSB0YXJnZXRzIGFu ZCBpZiB0aGUgcmVjZWl2aW5nIFBFIGRvZXMgbm90IHN1cHBvcnQgZWl0aGVyDQogICBhc3ltbWV0 cmljIG9yIHN5bW1ldHJpYyBJUkIgbW9kZXMsIHRoZW4gaWYgaXQgaGFzIHRoZSBjb3JyZXNwb25k aW5nDQogICBNQUMtVlJGLCBpdCBvbmx5IGltcG9ydHMgdGhlIE1BQyBhZGRyZXNzLiAgT3RoZXJ3 aXNlLCBpZiBpdCBkb2Vzbid0DQogICBoYXZlIHRoZSBjb3JyZXNwb25kaW5nIE1BQy1WUkYsIGl0 IG11c3Qgbm90IGltcG9ydCB0aGlzIHJvdXRlLg0KYGBgDQoNCklmIGl0IGRvZXNu4oCZdCBzdXBw b3J0IGVpdGhlciBhc3ltbWV0cmljIG9yIHN5bW1ldHJpYyBJUkIgbW9kZXMsIHRoZW4gZG9lc27i gJl0DQp0aGF0IG1lYW4gaXQgZG9lc27igJl0IGltcGxlbWVudCB0aGlzIHNwZWNpZmljYXRpb24g YXQgYWxsPyBJbiB0aGF0IGNpcmN1bXN0YW5jZSwNCmhvdyBkbyB5b3UgZXhwZWN0IHlvdXIg4oCc bXVzdCBub3TigJ0gdG8gYmUgcmVzcGVjdGVkPw0KDQoxMS4gU2VjdGlvbiA1LjMNCg0KYGBgDQog ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSWYgaG9zdCBCJ3MgKE1BQywgSVApIGhhcyBu b3QgeWV0IGJlZW4NCiAgIGxlYXJudCBlaXRoZXIgdmlhIGEgZ3JhdHVpdG91cyBBUlAgT1Igdmlh IGEgcHJpb3IgZ2xlYW5pbmcgcHJvY2VkdXJlLA0KICAgYSBuZXcgZ2xlYW5pbmcgcHJvY2VkdXJl IE1VU1QgYmUgdHJpZ2dlcmVkDQpgYGANCg0KU2luY2UgeW914oCZdmUgdXNlZCBNVVNUIGhlcmUs IHlvdSBNVVNUIHByb3ZpZGUgYSByZWZlcmVuY2UgdG8gd2hlcmUgdGhlIOKAnG5ldw0KZ2xlYW5p bmcgcHJvY2VkdXJl4oCdIGlzIHNwZWNpZmllZC4NCg0KQWxzbywgaGFzIG5vdCBiZWVuIGxlYXJu dCBieSB3aG9tPyBUaGUgcHJvY2VkdXJlIG11c3QgYmUgdHJpZ2dlcmVkIHdoZXJlPw0KDQoxMi4g U2VjdGlvbiA1LjMNCg0KVGhlIHNlY29uZCBwYXJhZ3JhcGgsIHRoYXQgYmVnaW5zICJDb25zaWRl ciBhIHN1Ym5ldCBBIiwgaXMgdHJlbWVuZG91c2x5DQpjb25mdXNpbmcgdG8gYSBmaXJzdC10aW1l IHJlYWRlciAob3IgYXQgbGVhc3QgdG8gdGhpcyBmaXJzdC10aW1lIHJlYWRlcikuIEkNCnJlYWxp emUgeW91IHByb2JhYmx5IHRoaW5rIHlvdSdyZSBiZWluZyBoZWxwZnVsIGJ5IHByb3ZpZGluZyBh IHdvcmtlZCBleGFtcGxlLA0KYnV0IGFzIEkgcmVhZCB0aHJvdWdoIGl0LCBpdCB3YXMgdGhlIG9w cG9zaXRlIG9mIGhlbHBmdWwuIFRoaXMgaXMgZXNwZWNpYWxseQ0KdHJ1ZSBiZWNhdXNlIMKnNSBh bmQgaXRzIHN1YnNlY3Rpb25zIGlzIGFib3V0ICJTeW1tZXRyaWMgSVJCIFByb2NlZHVyZXMiIC0t IGFuZA0KdGhlIHBhcmFncmFwaCBpbiBxdWVzdGlvbiBwcm92aWRlcyBubyBwcm9jZWR1cmVzLg0K DQpTb21lIG9wdGlvbnMgdG8gaW1wcm92ZSB0aGUgc2l0dWF0aW9uIC0tDQoNCi0gUmVtb3ZlIHRo ZSBwYXJhZ3JhcGggZW50aXJlbHkuDQotIFByZWZhY2UgdGhlIHBhcmFncmFwaCB3aXRoICJhcyBh biBleGFtcGxlIHRvIHNob3cgd2h5IGFkdmVydGlzZW1lbnQgYXMgUlQtNQ0KaXMgcmVxdWlyZWQs Ig0KDQoxMy4gU2VjdGlvbiA1LjQNCg0KYGBgDQogICBvICBnbG9iYWwgbW9kZTogVk5JIGlzIHNl dCB0byB0aGUgcmVjZWl2ZWQgbGFiZWwyIGluIHRoZSByb3V0ZSB3aGljaA0KICAgICAgaXMgZG9t YWluLXdpZGUgYXNzaWduZWQuICBUaGlzIFZOSSB2YWx1ZSBmcm9tIHJlY2VpdmVkIGxhYmVsMiBN VVNUDQogICAgICBiZSB0aGUgc2FtZSBhcyB0aGUgbG9jYWxseSBjb25maWd1cmVkIFZOSSBmb3Ig dGhlIElQIFZSRiBhcyBhbGwNCiAgICAgIFBFcyBpbiB0aGUgTlZPIE1VU1QgYmUgY29uZmlndXJl ZCB3aXRoIHRoZSBzYW1lIElQIFZSRiBWTkkgZm9yDQogICAgICB0aGlzIG1vZGUgb2Ygb3BlcmF0 aW9uLg0KYGBgDQoNCldoYXQgYWN0aW9uIGlzIHRvIGJlIHRha2VuIGlmIHRoaXMgTVVTVCBpcyB2 aW9sYXRlZD8NCg0KMTQuIFNlY3Rpb24gNi4xDQoNCmBgYA0KICAgRm9yIGFzeW1tZXRyaWMgSVJC IG1vZGUsIFJvdXRlcidzIE1BQyBFQyBpcyBub3QgbmVlZGVkIGJlY2F1c2UNCmBgYA0KDQpQbGVh c2UgZWl0aGVyIGV4cGFuZCDigJxFQ+KAnSBvciBhZGQgaXQgdG8geW91ciBkZWZpbml0aW9ucyBz ZWN0aW9uLiAoQWxzbyBhcHBsaWVzDQp0byA1LjEpDQoNCjE1LiBTZWN0aW9uIDYuMg0KDQpgYGAN CiAgIG8gIElmIG9ubHkgTUFDLVZSRiByb3V0ZSB0YXJnZXQgaXMgdXNlZCwgdGhlbiB0aGUgcmVj ZWl2aW5nIFBFIHVzZXMNCiAgICAgIHRoZSBNQUMtVlJGIHJvdXRlIHRhcmdldCB0byBpZGVudGlm eSB0aGUgY29ycmVzcG9uZGluZyBJUC1WUkYgLS0NCiAgICAgIGkuZS4sIG1hbnkgTUFDLVZSRiBy b3V0ZSB0YXJnZXRzIG1hcCB0byB0aGUgc2FtZSBJUC1WUkYgZm9yIGENCiAgICAgIGdpdmVuIHRl bmFudC4gIEluIHRoaXMgY2FzZSwgTUFDLVZSRiBtYXkgYmUgdXNlZCBieSB0aGUgcmVjZWl2aW5n DQogICAgICBQRSB0byBpZGVudGlmeSB0aGUgY29ycmVzcG9uZGluZyBJUCBWUkYNCmBgYA0KDQpE byB5b3UgbWVhbiDigJxpbiB0aGlzIGNhc2UsIHRoZSBNQUMtVlJGICpyb3V0ZSB0YXJnZXQqIG1h eSBiZSB1c2Vk4oCm4oCdPw0KDQoxNi4gU2VjdGlvbiA2LjINCg0KYGBgDQogICBJZiB0aGUgcmVj ZWl2aW5nIFBFIHJlY2VpdmVzIHRoZSBNQUMvSVAgQWR2ZXJ0aXNlbWVudCByb3V0ZSB3aXRoIE1Q TFMNCiAgIGxhYmVsMiBmaWVsZCBhbmQgaXQgdXNlcyBzeW1tZXRyaWMgSVJCIG1vZGUNCmBgYA0K DQpUaGlzIGVudGlyZSBzZWN0aW9uIGlzIGVudGl0bGVkIOKAnGFzeW1tZXRyaWMgSVJCIHByb2Nl ZHVyZXPigJwuIFdoeSBpcyB0aGVyZQ0Kc3BlY2lmaWNhdGlvbiBsYW5ndWFnZSByZWdhcmRpbmcg c3ltbWV0cmljIHByb2NlZHVyZXMgaW4gaXQ/IChJ4oCZbSBwcmV0dHkgc3VyZQ0KdGhpcyBpcyBu b3QgdGhlIG9ubHkgcGxhY2UgdGhpcyBraW5kIG9mIHByb2JsZW0gYXBwZWFycy4pDQoNCjE3LiBT ZWN0aW9uIDcuMw0KDQpgYGANCiAgIE9uIHRoZSBzb3VyY2UgTlZFLCBhbiBhZ2Utb3V0IHRpbWVy IChmb3IgdGhlIHNpbGVudCBob3N0IHRoYXQgaGFzDQogICBtb3ZlZCkgaXMgdXNlZCB0byB0cmln Z2VyIGFuIEFSUCBwcm9iZS4gIFRoaXMgYWdlLW91dCB0aW1lciBjYW4gYmUNCiAgIGVpdGhlciBB UlAgdGltZXIgb3IgTUFDIGFnZS1vdXQgdGltZXIgYW5kIHRoaXMgaXMgYW4gaW1wbGVtZW50YXRp b24NCiAgIGNob2ljZS4gIFRoZSBBUlAgcmVxdWVzdCBnZXRzIHNlbnQgYm90aCBsb2NhbGx5IHRv IGFsbCB0aGUgYXR0YWNoZWQNCiAgIFRTZXMgb24gdGhhdCBzdWJuZXQgYXMgd2VsbCBhcyBpdCBn ZXRzIHNlbnQgdG8gYWxsIHRoZSByZW1vdGUgTlZFcw0KICAgKGluY2x1ZGluZyB0aGUgdGFyZ2V0 IE5WRSkgcGFydGljaXBhdGluZyBpbiB0aGF0IHN1Ym5ldC4gIFRoZSBzb3VyY2UNCiAgIE5WRSBh bHNvIHdpdGhkcmF3IHRoZSBFVlBOIE1BQy9JUCBBZHZlcnRpc2VtZW50IHJvdXRlIHdpdGggb25s eSB0aGUNCiAgIE1BQyBhZGRyZXNzIChpZiBpdCBoYXMgcHJldmlvdXNseSBhZHZlcnRpc2VkIHN1 Y2ggYSByb3V0ZSkuDQpgYGANCg0KV291bGRu4oCZdCB0aGUgc291cmNlIE5WRSBvbmx5IHdpdGhk cmF3IHRoZSByb3V0ZSBhZnRlciBhIHRpbWVvdXQgaGFkIGV4cGlyZWQ/IEFzDQp5b3UgaGF2ZSB3 cml0dGVuIHRoaXMgcGFyYWdyYXBoLCBpbiBjYXNlIHRoZSBzaWxlbnQgVFMgaGFzIG5vdCBtb3Zl ZCwgdGhlDQpmb2xsb3dpbmcgd291bGQgaGFwcGVuOg0KDQpgYGANClRpbWUgdDogYWdlLW91dCB0 aW1lciBmaXJlcywgQVJQIHByb2JlIGlzIHNlbnQNClRpbWUgdDogTlZFIHdpdGhkcmF3cyByb3V0 ZSBhZHZlcnRpc2VtZW50DQpUaW1lIHUgPiB0OiBUUyByZWNlaXZlcyBBUlAgcHJvYmUsIHNlbmRz IEFSUCByZXBseQ0KVGltZSB2ID4gdTogTlZFIHJlY2VpdmVzIEFSUCByZXBseQ0KVGltZSB2OiBO VkUgcmUtYWR2ZXJ0aXNlcyByb3V0ZQ0KYGBgDQoNClByZXN1bWFibHkgdGhpcyBjaHVybiBpc27i gJl0IHdoYXQgeW91IGludGVuZGVkLg0KDQoxOC4gU2VjdGlvbiA5LjINCg0KSG93IGRvZXMgdGhl IE5WRSBsZWFybiB3aGF0IHN1Ym5ldHMgYXJlIGJlaGluZCBpdHMgYXR0YWNoZWQgVFM/DQoNCjE5 LiBTZWN0aW9uIDkuMg0KDQpXaGF0IGFib3V0IGlmIFRTNCB3YW50cyB0byByZWFjaCBTTjE/IEhv dyBkb2VzIGl0IGtub3cgd2hlcmUgdG8gc2VuZCB0aGUNCnBhY2tldD8gKEkgc3VwcG9zZSB0aGUg YW5zd2VyIG1heSBiZSB0aGUgc2FtZSBhcyBmb3IgIzE4LikNCg0KDQoNCl9fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpCRVNTIG1haWxpbmcgbGlzdA0KQkVT U0BpZXRmLm9yZzxtYWlsdG86QkVTU0BpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21h aWxtYW4vbGlzdGluZm8vYmVzczxodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZv L2Jlc3M+DQoNCg== --_000_TU4PR8401MB12487F27E7E4F54439933BC794FA9TU4PR8401MB1248_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ Zm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9 DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCglj b2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFu Lk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpw dXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCglt YXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTAuMHB0Ow0K CWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0KcC5lbWFpbHF1b3RlLCBsaS5lbWFpbHF1b3Rl LCBkaXYuZW1haWxxdW90ZQ0KCXttc28tc3R5bGUtbmFtZTplbWFpbHF1b3RlOw0KCW1zby1tYXJn aW4tdG9wLWFsdDphdXRvOw0KCW1hcmdpbi1yaWdodDowaW47DQoJbXNvLW1hcmdpbi1ib3R0b20t YWx0OmF1dG87DQoJbWFyZ2luLWxlZnQ6MS4wcHQ7DQoJYm9yZGVyOm5vbmU7DQoJcGFkZGluZzow aW47DQoJZm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixz ZXJpZjt9DQpzcGFuLkVtYWlsU3R5bGUxOA0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBs eTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjojMUY0OTdEO30N CnNwYW4uSFRNTFByZWZvcm1hdHRlZENoYXINCgl7bXNvLXN0eWxlLW5hbWU6IkhUTUwgUHJlZm9y bWF0dGVkIENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUtbGluazoi SFRNTCBQcmVmb3JtYXR0ZWQiOw0KCWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0Kc3Bhbi5n cmV5DQoJe21zby1zdHlsZS1uYW1lOmdyZXk7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxl LXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1zaXplOjEwLjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlv bjENCgl7c2l6ZTo4LjVpbiAxMS4waW47DQoJbWFyZ2luOjEuMGluIDEuMGluIDEuMGluIDEuMGlu O30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3JkU2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT48 IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlZGVmYXVsdHMgdjpleHQ9ImVkaXQiIHNw aWRtYXg9IjEwMjYiIC8+DQo8L3htbD48IVtlbmRpZl0tLT48IS0tW2lmIGd0ZSBtc28gOV0+PHht bD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0PSJlZGl0Ij4NCjxvOmlkbWFwIHY6ZXh0PSJlZGl0IiBk YXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5b3V0PjwveG1sPjwhW2VuZGlmXS0tPg0KPC9oZWFkPg0K PGJvZHkgbGFuZz0iRU4tVVMiIGxpbms9ImJsdWUiIHZsaW5rPSJwdXJwbGUiPg0KPGRpdiBjbGFz cz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtj b2xvcjojMUY0OTdEIj5IZWxsbyBBdXRob3JzIG9mJm5ic3A7IGRyYWZ0LWlldGYtYmVzcy1ldnBu LWludGVyLXN1Ym5ldC1mb3J3YXJkaW5nLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwv bzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29s b3I6IzFGNDk3RCI+SSBoYXZlIGZvbGxvd2luZyBxdWVyaWVzIGFuZCBjb21tZW50cyBhYm91dCB0 aGlzIGRyYWZ0IOKAnGRyYWZ0LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5n 4oCdLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj5QbGVhc2UgaGVscCBjbGFyaWZ5LjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0O1NlY3Rpb24N CjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0 Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4xIj5odHRwczov L2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1l eHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMTwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L2k+ PC9wPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPk1VU1QgYmUgYXQgbGVhc3Qg ZXF1YWwgdG8gY29ycmVzcG9uZGluZyBTWU5DIE1BQyBzZXF1ZW5jZSBudW1iZXI8bzpwPjwvbzpw Pjwvc3Bhbj48L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xv cjpibGFjayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGlmIG9uZSBpcyBwcmVzZW50 LjxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Q2FuIHdlIGZvcm1hbGx5IGRlZmluZSB3aGF0IGEg4oCc U1lOQyBNQUMgc2VxdWVuY2UgbnVtYmVy4oCdID88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJz cDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmO2NvbG9yOiMxRjQ5N0QiPiZndDsmZ3Q7Jmd0OyZndDtTZWN0aW9uDQo8YSBocmVmPSJodHRw czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMyI+aHR0cHM6Ly9kYXRhdHJhY2tlci5p ZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxp dHktMDUjc2VjdGlvbi04LjM8L2E+PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwcmU+PGk+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPuKAnDwvc3Bhbj48c3BhbiBzdHlsZT0iY29s b3I6YmxhY2siPk1BQyBNeCB3aXRoIGEgc2VxdWVuY2UgbnVtYmVyIHRoYXQgaXMgaGlnaGVyIHRo YW4gPC9zcGFuPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjaztiYWNrZ3JvdW5kOnllbGxvdzttc28t aGlnaGxpZ2h0OnllbGxvdyI+b3IgZXF1YWw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNr Ij4gPC9zcGFuPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+dG88bzpwPjwvbzpwPjwvc3Bhbj48 L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+ Jm5ic3A7Jm5ic3A7IHNlcXVlbmNlIG51bWJlciBhc3NpZ25lZCB0byBhIExPQ0FMIHJvdXRlIGZv ciBNQUMgTXg6PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJp ZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgbyZuYnNwOyBQRSBNVVNUIHRy aWdnZXINCjxzcGFuIHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdzttc28taGlnaGxpZ2h0OnllbGxv dyI+cHJvYmUgYW5kIGRlbGV0aW9uIHByb2NlZHVyZTwvc3Bhbj4gZm9yIGFsbCBMT0NBTCBJUHM8 bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVv dDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBhc3NvY2lhdGVk IHdpdGggTUFDIE14LjxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtD b3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IG8mbmJzcDsgUEUgTVVT VCB0cmlnZ2VyDQo8c3BhbiBzdHlsZT0iYmFja2dyb3VuZDp5ZWxsb3c7bXNvLWhpZ2hsaWdodDp5 ZWxsb3ciPmRlbGV0aW9uIHByb2NlZHVyZSBmb3IgTE9DQUwgTUFDPC9zcGFuPiByb3V0ZSBmb3Ig TXguPG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9y OmJsYWNrIj7igJ08bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+QXMgcGVyIHJmYzc0MjMsIGlmIGVx dWFsIHNlcXVlbmNlIG51bWJlciBpcyByZWNlaXZlZCwgdGhlbiB0aGUgb25lIHB1Ymxpc2hlZCB3 aXRoIGxvd2VyIHZ0ZXAtaXAgaXMgcmV0YWluZWQsIGFuZCB0aGUgb3RoZXIgb25lIGlzIHdpdGhk cmF3bi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+V2hpbGUgdGhpcyBzZWN0aW9uIHRhbGtzIGFib3V0IHBy b2JpbmcgaXQgYWdhaW4uPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPlRoaXMgc2hvdWxkIGJlIGNhbGxlZCBv dXQgaW4gdGhlIEludGVyb3Agc2VjdGlvbiBhcyB3ZWxsLCBmb3IgdGhlIGNvLWV4aXN0ZW5jZSBv ZiBvbGQgcnVsZSBhbmQgbmV3bHkgZGVmaW5lZA0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5i c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp Zjtjb2xvcjojMUY0OTdEIj5RdW90aW5nIGZyb20mbmJzcDsNCjxhIGhyZWY9Imh0dHBzOi8vZGF0 YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvcmZjNzQzMiNzZWN0aW9uLTE1Ij5odHRwczovL2Rh dGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlvbi0xNTwvYT46PG86cD48 L286cD48L3NwYW4+PC9wPg0KPHByZT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPuKAnElmIHR3 byAob3IgbW9yZSkgUEVzIGFkdmVydGlzZSB0aGUgc2FtZSBNQUM8bzpwPjwvbzpwPjwvc3Bhbj48 L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYWRkcmVz cyB3aXRoIHRoZSBzYW1lIHNlcXVlbmNlIG51bWJlciBidXQgZGlmZmVyZW50IEV0aGVybmV0IHNl Z21lbnQ8bzpwPjwvbzpwPjwvc3Bhbj48L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9yOmJs YWNrIj4mbmJzcDsmbmJzcDsgaWRlbnRpZmllcnMsIGEgUEUgdGhhdCByZWNlaXZlcyB0aGVzZSBy b3V0ZXMgc2VsZWN0cyB0aGUgcm91dGU8bzpwPjwvbzpwPjwvc3Bhbj48L3ByZT4NCjxwcmU+PHNw YW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYWR2ZXJ0aXNlZCBieSB0aGUgUEUg d2l0aCB0aGUgPHNwYW4gc3R5bGU9ImJhY2tncm91bmQ6eWVsbG93O21zby1oaWdobGlnaHQ6eWVs bG93Ij5sb3dlc3QgSVAgYWRkcmVzcyBhcyB0aGUgYmVzdCByb3V0ZTwvc3Bhbj7igJ08bzpwPjwv bzpwPjwvc3Bhbj48L3ByZT4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtj b2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48 L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9y OiMxRjQ5N0QiPiZndDsmZ3Q7Jmd0OyZndDsgU2VjdGlvbg0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRh dHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5k ZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjYiPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv ZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3Nl Y3Rpb24tOC42PC9hPjxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3A+DQo8cHJlPjxpPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNr Ij4mbmJzcDsmbmJzcDsgYW4gaW50ZXItb3Agc2NlbmFyaW8gd2l0aCBhIGRpZmZlcmVudCBpbXBs ZW1lbnRhdGlvbiBjb3VsZCBhcmlzZSw8bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cHJl PjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IHdoZXJlIGEgUEUgaW1w bGVtZW50YXRpb24gbm9uLWNvbXBsaWFudCB3aXRoIHRoaXMgZG9jdW1lbnQgb3Igd2l0aDxvOnA+ PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNr Ij4mbmJzcDsmbmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2Mv aHRtbC9yZmM3NDMyIj5SRkMgNzQzMjwvYT4gYXNzaWducyBhbmQgYWR2ZXJ0aXNlcyBpbmRlcGVu ZGVudCBzZXF1ZW5jZSBudW1iZXJzIHRvIE1BQzxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4N CjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYW5kIE1BQytJ UCByb3V0ZXPigJ08bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SG93IGRvIHdlIGV4cGVjdCB0aGlz IGltcGxlbWVudGF0aW9uIHRvIGludGVyLW9wLCBhcyBpdCBtYXkgZXhwZWN0IHR3byBkaWZmZXJl bnQgTUFDLW9ubHkgYW5kIE1BQy1JUCBhZHZlcnRpc2VtZW50IGZyb20gcmVtb3RlIHBlZXJzIGFz IHdlbGwuPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5DYW4gd2UgcGFyYXBocmFzZSB0aGlzID88bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29s b3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjoj MUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44Ij5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2Rv Yy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0 aW9uLTguODwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHByZT48aT48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWY7Y29sb3I6IzFGNDk3RCI+4oCcPC9zcGFuPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+ Rm9sbG93aW5nIGEgaG9zdCBtb3ZlIGZyb20gUEUxIHRvIFBFMiwgdGhlIGhvc3QncyBNQUMgaXM8 bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpi bGFjayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGRpc2NvdmVyZWQgYXQgUEUyIGFz IGEgbG9jYWwgTUFDIHZpYSBhIGRhdGEgZnJhbWVzIHJlY2VpdmVkIGZyb208bzpwPjwvbzpwPjwv c3Bhbj48L2k+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHRoZSBob3N0LuKAnTxvOnA+PC9vOnA+PC9zcGFuPjwv aT48L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOmJsYWNrIj5EbyB3ZSBuZWVkIHRv IGNhbGwgb3V0IHRoZSBtaXNjb25maWd1cmF0aW9uIGNhc2UsIHdoZXJlIGEgcHJvYmUgbWF5IGxl YWQgdG8gRFVQIHJlc3BvbnNlcywgPG86cD48L286cD48L3NwYW4+PC9wcmU+DQo8cHJlPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjpibGFjayI+b25lIGZyb20gdGhlIChsb2NhbCBsZWFybmluZykgYWNj ZXNzIHNpZGUgYW5kIG90aGVyIG9uZSBhY3Jvc3MgdGhlIGZhYnJpYyAob3ZlcmxheSB0dW5uZWwp LjxvOnA+PC9vOnA+PC9zcGFuPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNw OzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0OyBTZWN0aW9uDQo8YSBocmVmPSJodHRw czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTEwLjQuMSI+aHR0cHM6Ly9kYXRhdHJhY2tl ci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9i aWxpdHktMDUjc2VjdGlvbi0xMC40LjE8L2E+PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxw cmU+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPuKAnDwvc3Bhbj48c3BhbiBzdHls ZT0iY29sb3I6YmxhY2siPnVuZnJlZXppbmcgdGhlPG86cD48L286cD48L3NwYW4+PC9pPjwvcHJl Pg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyByb3V0ZSBhdCB0aGUgRlJPWkVOIGxvY2F0aW9uIHdpbGwgcmVzdWx0IGluIHRo ZSByb3V0ZSBiZWluZzxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwcmU+PGk+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgYWR2ZXJ0 aXNlZCB3aXRoIGEgaGlnaGVyIHNlcXVlbmNlIG51bWJlci7igJ08bzpwPjwvbzpwPjwvc3Bhbj48 L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFG NDk3RCI+V2h5IGFyZSB3ZSB0eWluZyBwcm9iaW5nIHdpdGgg4oCcdW5mcmVlemluZ+KAnSA/IEZS T1pFTiB3aWxsIHR5cGljYWxseSBpbmRpY2F0ZSBkcm9wcGluZyBvZiBmbG93cy4gUHJvYmluZyBj YW4gc3RpbGwgZ28gb24gaW4gcGFyYWxsZWwgPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5DYW4gdGhpcyBi ZSBjYWxsZWQgb3V0IGV4cGxpY2l0bHkuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9v OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xv cjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+VGhhbmtzPG86cD48L286cD48L3Nw YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5 N0QiPlNhdW15YS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxv OnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9u ZTtib3JkZXItdG9wOnNvbGlkICNFMUUxRTEgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBp biI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkZyb206PC9zcGFu PjwvYj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiBCRVNTIFttYWlsdG86YmVzcy1ib3VuY2VzQGlldGYub3Jn XQ0KPGI+T24gQmVoYWxmIE9mIDwvYj5EaWtzaGl0LCBTYXVteWE8YnI+DQo8Yj5TZW50OjwvYj4g RnJpZGF5LCBBdWd1c3QgMTMsIDIwMjEgNDoxNSBQTTxicj4NCjxiPlRvOjwvYj4gSm9obiBTY3Vk ZGVyICZsdDtqZ3NAanVuaXBlci5uZXQmZ3Q7OyBUaGUgSUVTRyAmbHQ7aWVzZ0BpZXRmLm9yZyZn dDs8YnI+DQo8Yj5DYzo8L2I+IHp6aGFuZ0BqdW5pcGVyLm5ldDsgZHJhZnQtaWV0Zi1iZXNzLWV2 cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmdAaWV0Zi5vcmc7IGJlc3MtY2hhaXJzQGlldGYub3Jn OyBiZXNzQGlldGYub3JnPGJyPg0KPGI+U3ViamVjdDo8L2I+IFJlOiBbYmVzc10gSm9obiBTY3Vk ZGVyJ3MgTm8gT2JqZWN0aW9uIG9uIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1m b3J3YXJkaW5nLTE0OiAod2l0aCBDT01NRU5UKTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2 Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkkgaGF2ZSBxdWVyeSBy ZWdhcmRpbmcgdGhlIGZvbGxvd2luZyB0ZXh0IGluIHRoZSBzZWN0aW9uICZxdW90Ow0KPGEgaHJl Zj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi00LjMuMSI+PHNwYW4gc3R5bGU9 ImNvbG9yOiMwNTYzQzEiPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tNC4zLjE8 L3NwYW4+PC9hPiZxdW90OyA6PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mcXVvdDsgW0lQNywgTTFd IGlzIGxlYXJudCBhcyBhIG5ldyByb3V0ZSBhdDwvc3Bhbj48L2k+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBbUEUzLCBQRTRdIGFuZCBhZHZlcnRp c2VkIHRvIHJlbW90ZSBQRXMgd2l0aCBhIHNlcXVlbmNlIG51bWJlciBvZiAwLjwvc3Bhbj48L2k+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBBcyBh IHJlc3VsdCwgTDMgcmVhY2hhYmlsaXR5IHRvIElQNyB3b3VsZCBiZSBlc3RhYmxpc2hlZCBhY3Jv c3MgdGhlPC9zcGFuPjwvaT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ Jm5ic3A7Jm5ic3A7IG92ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0eSBwcm9jZWR1cmUgZm9y IE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhczwvc3Bhbj48L2k+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48bzpw PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBhIHJlc3VsdCBvZiB0aGlzIE1BQy1JUCBy b3V0ZSBhZHZlcnRpc2VtZW50JnF1b3Q7PC9zcGFuPjwvaT48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5JZiBhIGhvc3QgaXMgbW92 ZWQgd2l0aCB0aGUgc2FtZSBNQUMsIHRoZSBmb2xsb3dpbmcgaXMgc3RpbGwgYmVpbmcgZm9sbG93 aW5nIGluIGN1cnJlbnQgaW1wbGVtZW50YXRpb24ocyk6PG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4tIEVp dGhlciAmcXVvdDtNQUMtb25seS1yb3V0ZSZxdW90OyBvciAmcXVvdDtNQUMtSVAtcm91dGUmcXVv dDsgYWR2ZXJ0aXNlbWVudCwgdGhlIHNlcXVlbmNlIG51bWJlciBpcyBidW1wZWQgaW4gYm90aCBj YXNlczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+LSBPbiByZWNlaXZpbmcgc2lkZSwNCjxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0mbmJzcDsgdGhlIHNlcXVl bmNlLW51bWJlciBpcyBwaWNrZWQgdXAgZnJvbSAmcXVvdDtNQUMtb25seS1yb3V0ZSZxdW90OyBv ciAmcXVvdDtNQUMtSVAtcm91dGUmcXVvdDsgYW5kIGFwcGxpZWQgdG8gTUFDIGxlYXJuaW5nczxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0gdGhlIGJ1 bXBlZCB1cCBzZXF1ZW5jZSBudW1iZXIgbGVhZHMgYSB3aXRoZHJhdyBvZiAmcXVvdDtNQUMtb25s eSZxdW90OyBvciAmcXVvdDtNQUMtSVAtcm91dGUmcXVvdDsgZnJvbSB0aGUgaW5mZXJpb3IgKGVh cmxpZXIpIHB1Ymxpc2hlcjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3Nw YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj5LaW5kbHkgaGVscCBleHBsYWluLCBpZiB0aGUgdGV4dCBtZW50aW9uZWQgaW4g4oCcc2Vj dGlvbiA0LjMuMeKAnSBpcyBjcmVhdGluZyBzb21lIGRvdWJ0cyByZWdhcmRpbmcgdGhlIHdheSB0 aGluZ3Mgb3BlcmF0ZSB3aXRoIGN1cnJlbnQgc3RhbmRhcmRzLjxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ VGhvdWdoIEkgZGVmaW5pdGVseSBiZWxpZXZlIHRoYXQgdGhpcyBsaXRlcmF0dXJlIGRvZXMgYXdh eSB3aXRoIGxvdCBvZiBleGlzdGluZyBhbWJpZ3VpdGllcy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkkg dGhpbmsgd2UgbmVlZCB0byBwYXJhcGhyYXNlIHRoaXMgc2VjdGlvbiBhdGxlYXN0LjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaGFua3M8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPlNhdW15YS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4tLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLTxi cj4NCkZyb206IEJFU1MgWzxhIGhyZWY9Im1haWx0bzpiZXNzLWJvdW5jZXNAaWV0Zi5vcmciPm1h aWx0bzpiZXNzLWJvdW5jZXNAaWV0Zi5vcmc8L2E+XSBPbiBCZWhhbGYgT2YgSm9obiBTY3VkZGVy IHZpYSBEYXRhdHJhY2tlcjxicj4NClNlbnQ6IFRodXJzZGF5LCBKdWx5IDE1LCAyMDIxIDQ6NTMg QU08YnI+DQpUbzogVGhlIElFU0cgJmx0OzxhIGhyZWY9Im1haWx0bzppZXNnQGlldGYub3JnIj5p ZXNnQGlldGYub3JnPC9hPiZndDs8YnI+DQpDYzogPGEgaHJlZj0ibWFpbHRvOnp6aGFuZ0BqdW5p cGVyLm5ldCI+enpoYW5nQGp1bmlwZXIubmV0PC9hPjsgPGEgaHJlZj0ibWFpbHRvOmJlc3MtY2hh aXJzQGlldGYub3JnIj5iZXNzLWNoYWlyc0BpZXRmLm9yZzwvYT47IDxhIGhyZWY9Im1haWx0bzpk cmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZ0BpZXRmLm9yZyI+ZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmdAaWV0Zi5vcmc8L2E+OyA8 YSBocmVmPSJtYWlsdG86YmVzc0BpZXRmLm9yZyI+YmVzc0BpZXRmLm9yZzwvYT48YnI+DQpTdWJq ZWN0OiBbYmVzc10gSm9obiBTY3VkZGVyJ3MgTm8gT2JqZWN0aW9uIG9uIGRyYWZ0LWlldGYtYmVz cy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5nLTE0OiAod2l0aCBDT01NRU5UKTxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5Kb2huIFNjdWRkZXIgaGFzIGVu dGVyZWQgdGhlIGZvbGxvd2luZyBiYWxsb3QgcG9zaXRpb24gZm9yPG86cD48L286cD48L3NwYW4+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm Ij5kcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy0xNDogTm8gT2Jq ZWN0aW9uPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPldoZW4g cmVzcG9uZGluZywgcGxlYXNlIGtlZXAgdGhlIHN1YmplY3QgbGluZSBpbnRhY3QgYW5kIHJlcGx5 IHRvIGFsbCBlbWFpbCBhZGRyZXNzZXMgaW5jbHVkZWQgaW4gdGhlIFRvIGFuZCBDQyBsaW5lcy4g KEZlZWwgZnJlZSB0byBjdXQgdGhpcyBpbnRyb2R1Y3RvcnkgcGFyYWdyYXBoLCBob3dldmVyLik8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj5QbGVhc2UgcmVmZXIgdG8NCjxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYu b3JnL2llc2cvc3RhdGVtZW50L2Rpc2N1c3MtY3JpdGVyaWEuaHRtbCI+aHR0cHM6Ly93d3cuaWV0 Zi5vcmcvaWVzZy9zdGF0ZW1lbnQvZGlzY3Vzcy1jcml0ZXJpYS5odG1sPC9hPjxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+Zm9yIG1vcmUgaW5mb3JtYXRpb24gYWJvdXQgRElTQ1VTUyBhbmQgQ09NTUVOVCBw b3NpdGlvbnMuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZu YnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+VGhlIGRvY3VtZW50LCBhbG9uZyB3aXRoIG90aGVyIGJh bGxvdCBwb3NpdGlvbnMsIGNhbiBiZSBmb3VuZCBoZXJlOjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PGEg aHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1iZXNzLWV2 cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmcvIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3Jn L2RvYy9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZy88L2E+DQo8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPi0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS08bzpw PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWYiPkNPTU1FTlQ6PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlRoYW5rcyB0byB0 aGUgYXV0aG9ycyBmb3IgdGhlaXIgd29yayBpbiBhZGRyZXNzaW5nIG15IGNvbW1lbnRzLiBDb3B5 aW5nIG15PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4ocmVzb2x2ZWQpIGRpc2N1c3MgcG9pbnRzIGhlcmUg Zm9yIHBvc3Rlcml0eS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+LS0tLTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5JIGZv dW5kIHRoaXMgZG9jdW1lbnQgZGlmZmljdWx0IHRvIHJldmlldy4gU29tZSBvZiB0aGlzIG1pZ2h0 IGJlIGR1ZSB0byB0aGU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmZhY3QgdGhhdCBJJ20gbm90IGFuIGV4 cGVydCBvbiBFVlBOLCBidXQgSSB0aGluayBzb21lIG9mIHRoZSByZWFzb24gaXMgdGhhdCB0aGU8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPmRvY3VtZW50IGNvdWxkIGJlIHN0cnVjdHVyZWQgYmV0dGVyIGFu ZCBleHByZXNzZWQgbW9yZSBjbGVhcmx5LiBUaGUgb25seSByZWFzb248bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPkknbSBub3Qgb3Bwb3NpbmcgcHJvZ3Jlc3Npb24gb2YgdGhlIGRvY3VtZW50IG9uIHRoZSBn cm91bmRzIHRoYXQgaXQncyB0b288bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnVuY2xlYXIgdG8gaW1wbGVt ZW50IGlzIHRoYXQgSSd2ZSBiZWVuIHRvbGQsIGFuZCBhY2NlcHQgb24gZmFpdGgsIHRoYXQ8bzpw PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWYiPmltcGxlbWVudGF0aW9ucyAqaGF2ZSogYmVlbiBzdWNjZXNzZnVsbHkg d3JpdHRlbiBzdGFydGluZyBmcm9tIHRoZSBzcGVjLCB3aGljaDxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ aW1wbGllcyBpdCdzIGltcGxlbWVudGFibGUgLS0gSSBndWVzcyBieSBwZW9wbGUgd2hvIGFyZSBl eHBlcnQgaW4gRVZQTiBhbHJlYWR5LDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+aXQgd291bGRuJ3QgYmUg aW1wbGVtZW50YWJsZSBieSBtZS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+SW4gYW55IGNhc2UsIEkgZG8gaGF2ZSBzb21lIHBvaW50cyBJIHdvdWxkIGxpa2Ug dG8gZGlzY3VzcywgdGhhdCBhcmUgbW9yZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YWN0aW9uYWJsZS48 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+MS4gSSBhZ3JlZSB3 aXRoIFJvYmVydCBXaWx0b24ncyBjb21tZW50IG9uIC0wOTo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZu YnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5PbmUgcXVlc3Rp b24gSSBoYXZlIGlzIHdoZXRoZXIgaXQgaXMgcG9zc2libGUgdG8gaGF2ZSBhIGRlcGxveW1lbnQg d2hlcmUgc29tZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ZGV2aWNlcyBzdXBwb3J0IHN5bmNocm9ub3Vz IG1vZGUgYW5kIG90aGVycyBzdXBwb3J0IGFzeW5jaHJvbm91cyBtb2RlLiZuYnNwOyBBbSBJPG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj5yaWdodCBpbiBwcmVzdW1pbmcgdGhhdCB0aGlzIGlzIG5vdCBzdXBw b3J0ZWQgYW5kIGlmIHNvIGlzIHRoaXMgY2FwYWJpbGl0eTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+c2ln bmFsZWQgaW4gYW55IHdheT8gT3IgaXMgdGhlIGV4cGVjdGF0aW9uIHRoYXQgdGhpcyB3b3VsZCBi ZSBjb250cm9sbGVkIHZpYTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ZGVwbG95bWVudCBjaG9pY2Ugb2Yg bmV0d29yayBkZXZpY2UsIG9yIHRob3VnaCBjb25maWd1cmF0aW9uIG1hbmFnZW1lbnQ/IGBgYDxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaGlzIGlzc3VlIHN0 aWxsIGV4aXN0cyBpbiAtMTQuIEkgdGhpbmsgaXQgc2hvdWxkIGJlIGFkZHJlc3NlZCBpbiB0aGUg ZG9jdW1lbnQuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5TaW1pbGFybHksIEkgYWdyZWUgd2l0aCBXYXJy ZW4gS3VtYXJpJ3MgY29tbWVudCwgYWxzbyBvbiAtMDk6PG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJz cDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+SSB3b3VsZCBzdHJv bmdseSByZWNvbW1lbmQgdGhhdCB0aGUgYXV0aG9ycyByZWFkIHRoZSBPcHNEaXIgcmV2aWV3IGF0 OjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+PGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9y Zy9kb2MvcmV2aWV3LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5nLTA5LW9w c2Rpci1sYy1qYWVnZ2xpLTIwMjAtMDctMDYvIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3Jn L2RvYy9yZXZpZXctaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmctMDktb3Bz ZGlyLWxjLWphZWdnbGktMjAyMC0wNy0wNi88L2E+DQo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiwgZXNw ZWNpYWxseSB0aGU6ICZxdW90O2l0IHdvdWxkIGJlIGhlbHBmdWwgaWYgc2VjdGlvbiA0IHdvdWxk IGJlIG1vcmUgZXhwbGljaXQgZm9yPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5ub24taW1wbGVtZW50b3Jz IG9uIHdoZW4gc3ltZXRyaWMgb3IgYXN5bWV0cmljIG1vZHVsZXMgd291bGQgYmUgY2hvc2VuLCBh cyBpdDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+c3RhbmRzIHRoZSB2YXJpYXRpb24gYmFzaWNhbGx5IHJl YWRzIGxpa2UgdGhlIGVudW1lcmF0aW9uIG9mIHRoZSBmZWF0dXJlcyBvZjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZiI+dmFyaW91cyBpbXBsZW1lbnRhdGlvbnMuJnF1b3Q7IGNvbW1lbnQgKHdoaWNoIEkgZnVs bHkgYWdyZWUgd2l0aCkuIGBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48 L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj5JdCBzZWVtcyBib3RoIG9mIHRoZXNlIGNvbW1lbnRzIGNvdWxkIC0tIGFuZCBzaG91 bGQhIC0tIGJlIGFkZHJlc3NlZCBieSBhZGRpbmc8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmEgZmV3IHBh cmFncmFwaHMgdGFsa2luZyBhYm91dCB0aGVzZSB0b3BpY3MuIFRoaXMgY291bGQgYmUgZG9uZSBl aXRoZXIgaW4gwqc0LDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YXMgV2FycmVuIHN1Z2dlc3RzLCBvciBp biBzb21lIG90aGVyIHNlY3Rpb24gKGUuZy4geW91IGNvdWxkIGFkZCBhbjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZiI+JnF1b3Q7b3BlcmF0aW9uYWwgY29uc2lkZXJhdGlvbnMmcXVvdDsgc2VjdGlvbikuPG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjIuIFNlY3Rpb24gNy4x PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPknigJltIGd1ZXNz aW5nIHRoaXMgcXVlc3Rpb24gaXNu4oCZdCB1bmlxdWUgdG8gdGhpcyBkb2N1bWVudCwgYnV0IHNp bmNlIHRoaXMgaXM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPndoZXJlIEkgZW5jb3VudGVyZWQgaXQsIEni gJlsbCBhc2s6IGl0IHNlZW1zIGFzIHRob3VnaCB0aGUgZGVzY3JpYmVkIG1vYmlsaXR5PG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj5wcm9jZWR1cmVzIGFyZSB2dWxuZXJhYmxlIHRvIGEgY29uZGl0aW9uIHdo ZXJlIGEgcGFydGljdWxhciAoSVAsIE1BQykgYXBwZWFyczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YXQg dHdvIGRpZmZlcmVudCBOVkVzIGF0IHRoZSBzYW1lIHRpbWUuIElmIHRoaXMgY29uZGl0aW9uIGV4 aXN0cyAoZWl0aGVyPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5pbm5vY2VudGx5LCBvciBtYWxpY2lvdXNs eSkgd2hhdCBwcmV2ZW50cyB0aGUgc291cmNlIGFuZCB0YXJnZXQgTlZFcyBmcm9tPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj5jb250aW51YWxseSBhdHRlbXB0aW5nIHRvIGNsYWltIHRoZSAoSVAsIE1BQykg ZnJvbSBvbmUgYW5vdGhlciwgZmxvb2RpbmcgdGhlPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5uZXR3b3Jr IHdpdGggdXBkYXRlcyBhbGwgdGhlIHdoaWxlPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj4oVGhpcyBhcHBsaWVzIHRvIDcuMiBhcyB3ZWxsLik8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+U2luY2UgdGhpcyBzZWVtcyBsaWtl IGEgcG90ZW50aWFsIHNlY3VyaXR5IGlzc3VlLCBJJ20gaW5jbHVkaW5nIGl0IGluIG15PG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj5ESVNDVVNTLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4tLS0tPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPkJlbG93IGFyZSBhIG51bWJlciBvZiBxdWVzdGlvbnMgYW5kIGNvbW1lbnRzIHRoYXQgSSBo b3BlIG1pZ2h0IGhlbHAgaW1wcm92ZSB0aGU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmRvY3VtZW50LiBJ IGhhdmVuJ3QgY2hvc2VuIHRvIG1ha2UgdGhlbSBibG9ja2luZyBieSBpbmNsdWRpbmcgdGhlbSBp biBteTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+RElTQ1VTUzsgbm9uZXRoZWxlc3MgSSB3b3VsZCBhcHBy ZWNpYXRlIHJlcGxpZXMgdG8gdGhlbS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+MS4gSSBhZ3JlZSB3aXRoIHRoZSBjb21tZW50cyBieSBzZXZlcmFsIG9mIHRo ZSBvdGhlciByZXZpZXdlcnMsIHRoYXQgdGhlcmUgYXJlPG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5qdXN0 IHRvbyBtYW55IGdyYXR1aXRvdXMgYWNyb255bXMgaW4gdGhpcyBkb2N1bWVudC4gVGhleSBhcmVu J3QgdGhlIG9ubHkgdGhpbmc8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRoYXQgbWFrZXMgaXQgaGFyZCB0 byByZWFkLCBidXQgdGhleSBjZXJ0YWlubHkgY29udHJpYnV0ZS4gSSdtIGRpc2FwcG9pbnRlZCB0 bzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+c2VlIHRoaXMgaGFzbid0IGJlZW4gYWRkcmVzc2VkIGJldHdl ZW4gdmVyc2lvbnMgLTA5IGFuZCAtMTQuIEl0IHdvdWxkIGhhdmUgYmVlbjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZiI+YSBzbWFsbCBtYXR0ZXIgb2Ygc2VhcmNoLWFuZC1yZXBsYWNlIHRvIGdvIHRocm91Z2gg YW5kIGV4cGFuZCBtb3N0IG9mIHRoZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YWNyb255bXMuPG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjIuIFNlY3Rpb24gMjxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPiZuYnNwOyZuYnNwOyBSMTogVGhlIHNvbHV0aW9uIG11c3QgYWxsb3cgZm9yIGJvdGgg aW50ZXItc3VibmV0IGFuZCBpbnRyYS1zdWJuZXQ8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZu YnNwOyB0cmFmZmljIGJlbG9uZ2luZyB0byB0aGUgc2FtZSB0ZW5hbnQgdG8gYmUgbG9jYWxseSBy b3V0ZWQgYW5kIGJyaWRnZWQ8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyByZXNwZWN0 aXZlbHkuJm5ic3A7IFRoZSBzb2x1dGlvbiBtdXN0IHByb3ZpZGUgSVAgcm91dGluZyBmb3IgaW50 ZXItc3VibmV0PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgdHJhZmZpYyBhbmQgRXRo ZXJuZXQgQnJpZGdpbmcgZm9yIGludHJhLXN1Ym5ldCB0cmFmZmljLiZuYnNwOyBJdCBzaG91bGQg YmU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBub3RlZCB0aGF0IGlmIGFuIElQLVZS RiBpbiBhIE5WRSBpcyBjb25maWd1cmVkIGZvciBJUHY2IGFuZCB0aGF0IE5WRTxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+Jm5ic3A7Jm5ic3A7IHJlY2VpdmVzIElQdjQgdHJhZmZpYyBvbiB0aGUgY29ycmVz cG9uZGluZyBWTEFOLCB0aGVuIHRoZSBJUHY0PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJz cDsgdHJhZmZpYyBpcyB0cmVhdGVkIGFzIEwyIHRyYWZmaWMgYW5kIGl0IGlzIGJyaWRnZWQuJm5i c3A7IEFsc28gdmlzZSB2ZXJzYSw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBpZiBh biBJUC1WUkYgaW4gYSBOVkUgaXMgY29uZmlndXJlZCBmb3IgSVB2NCBhbmQgdGhhdCBOVkUgcmVj ZWl2ZXM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBJUHY2IHRyYWZmaWMgb24gdGhl IGNvcnJlc3BvbmRpbmcgVkxBTiwgdGhlbiB0aGUgSVB2NiB0cmFmZmljIGlzPG86cD48L286cD48 L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj4mbmJzcDsmbmJzcDsgdHJlYXRlZCBhcyBMMiB0cmFmZmljIGFuZCBpdCBpcyBicmlk Z2VkLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsm bmJzcDsgUjI6IFRoZSBzb2x1dGlvbiBtdXN0IHN1cHBvcnQgYnJpZGdpbmcgZm9yIG5vbi1JUCB0 cmFmZmljLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPlIxIGlzIGEgbGl0dGxlIHRvcnR1cmVkLCB3aGVyZSB5b3UgYWRk IGFsbCB0aGUgY2F2ZWF0cyBhYm91dCDigJx0cmVhdGVkIGFzIEwyPG86cD48L286cD48L3NwYW4+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm Ij50cmFmZmlj4oCdLiBTZWVtcyB0byBtZSBsaWtlIGl0IHdvdWxkIGZhbGwgb3V0IG1vcmUgbmF0 dXJhbGx5IGlmIHlvdSBoYWQgc2ltcGx5PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5pbnRyb2R1Y2VkIHRo ZSBjb25jZXB0cyBvZiByb3V0YWJsZSBhbmQgbm9uLXJvdXRhYmxlIHRyYWZmaWMsIHdoZXJlIHJv dXRhYmxlPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj50cmFmZmljIGlzIHRoYXQgZm9yIHdoaWNoIGEgc3Vp dGFibGUgSVAtVlJGIGV4aXN0cy4gVGhhdCB3b3VsZCBhbHNvIGhhdmUgdGhlPG86cD48L286cD48 L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj5wbGVhc2FudCBlZmZlY3Qgb2YgbWFraW5nIFIyIHNheSDigJzigKYgbXVzdCBzdXBw b3J0IGJyaWRnaW5nIGZvciBub24tcm91dGFibGU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRyYWZmaWPi gJ0gaW5zdGVhZCBvZiDigJxub24tSVAgdHJhZmZpY+KAnSwgd2hpY2ggaXMgdGVjaG5pY2FsbHkg aW5jb3JyZWN0IChzaW5jZSBwZXI8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlIxIHlvdSBtaWdodCBoYXZl IG5vbi1yb3V0YWJsZSBJUCB0cmFmZmljKS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgUjM6IFRo ZSBzb2x1dGlvbiBtdXN0IGFsbG93IGludGVyLXN1Ym5ldCBzd2l0Y2hpbmcgdG8gYmUgZGlzYWJs ZWQgb248bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBhIHBlciBWTEFOIGJhc2lzIG9u IFBFcyB3aGVyZSB0aGUgdHJhZmZpYyBuZWVkcyB0byBiZSBiYWNraGF1bGVkIHRvPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgYW5vdGhlciBub2RlIChpLmUuLCBmb3IgcGVyZm9ybWlu ZyBGVyBvciBEUEkgZnVuY3Rpb25hbGl0eSkuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+V2hhdOKAmXMg4oCcc3dpdGNo aW5n4oCdPyBUaGUgZG9jdW1lbnQgaXMgYWJvdXQgcm91dGluZyB2cy4gYnJpZGdpbmcsIHdoaWNo IGRvIHlvdTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+bWVhbj8gSSB0aGluayB5b3UgbWVhbiDigJxyb3V0 aW5n4oCdLiBJTU8geW91IHNob3VsZCBnZXQgcmlkIG9mIHRoZSB3b3JkPG86cD48L286cD48L3Nw YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj7igJxzd2l0Y2hpbmfigJ0gYW5kIHJlcGxhY2Ugd2l0aCBzb21ldGhpbmcgbGVzcyBhbWJp Z3VvdXMsIGUuZy4g4oCccm91dGluZ+KAnS4gKEJvdGg8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmhlcmUg YW5kIHRoZSBvbmUgb3RoZXIgcGxhY2UgaW4gdGhlIGRvYyB3aGVyZSB5b3UgdXNlIOKAnHN3aXRj aGluZ+KAnS4pPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkFs c28sIEkgdGhpbmsgeW91IGRvbuKAmXQgbWVhbiDigJxpLmUu4oCdLCBJIHRoaW5rIHlvdSBtZWFu IOKAnGUuZy7igJ0uIFRoZSBtZWFuaW5nIG9mPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj7igJxpLmUu4oCd IGlzIOKAnGluIG90aGVyIHdvcmRz4oCdLiBUaGUgbWVhbmluZyBvZiDigJxlLmcu4oCdIGlzIOKA nGZvciBleGFtcGxl4oCdLiBUaGUgYmVzdDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+d2F5IHRvIGF2b2lk IHRoZXNlIHByb2JsZW1zLCBJTU8sIGlzIHRvIHNpbXBseSB3cml0ZSBvdXQgd2hhdCB5b3UgbWVh biwgc28gaW48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRoaXMgY2FzZSB3cml0ZSDigJwoZm9yIGV4YW1w bGUsIGZvciBwZXJmb3JtaW5nIEZXIG9yIERQSSBmdW5jdGlvbmFsaXR5KS7igJ0gKEFuZDxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+b2ggYnkgdGhlIHdheSwgeW91IGhhdmVu4oCZdCBkZWZpbmVkIG9yIGV4 cGFuZGVkIEZXIG9yIERQSSwgcGxlYXNlIGRvIHNvLik8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNw OzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+My4gU2VjdGlvbiA0PG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJz cDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7 IG8mbmJzcDsgcmVmZXJlbmNlcyB0byBBUlAgdGFibGUgaW4gdGhlIGNvbnRleHQgb2YgYXN5bW1l dHJpYyBJUkIgaXMgYTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7IGxvZ2ljYWwgdmlldyBvZiBhIGZvcndhcmRpbmcgdGFibGUgdGhhdCBtYWludGFpbnMg YW4gSVAgdG8gTUFDPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsgYmluZGluZyBlbnRyeSBvbiBhIGxheWVyIDMgaW50ZXJmYWNlIGZvciBib3RoIElQdjQg YW5kIElQdjYuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsgVGhlc2UgZW50cmllcyBhcmUgbm90IHN1YmplY3QgdG8gQVJQIG9yIE5EIHByb3RvY29sLjxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPlRoaXMgcGFzc2FnZSBzaGluZXMgYSBzcG90bGlnaHQgb24gdGhlIGZhY3QgdGhh dCDigJxBUlAgdGFibGXigJ0gYXMgaXTigJlzIHVzZWQgaW48bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRo aXMgZG9jdW1lbnQgaXMgYSBtaXNub21lciwgc2luY2UgaXTigJlzIGEgdGFibGUgdGhhdCBpcyBu b3QgKG5lY2Vzc2FyaWx5KTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+cG9wdWxhdGVkIGJ5IEFSUC4gSSBk b27igJl0IHByb3Bvc2UgdGhhdCB5b3UgY2hhbmdlIHRoZSBub21lbmNsYXR1cmUsIHNpbmNlIGl0 4oCZczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ZmlybWx5IGVzdGFibGlzaGVkIGV2ZW4gdGhvdWdoIHdy b25nIOKAlCBidXQgaXQgbWlnaHQgYmUgd29ydGggYWRkaW5nIHRoZSBmaXJzdDxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+c2VudGVuY2Ugb3Igb25lIGxpa2UgaXQgdG8geW91ciBUZXJtaW5vbG9neSBzZWN0 aW9uLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj40LiBTZWN0 aW9uIDQ8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+RmlndXJl IDIgZGVwaWN0cyBCVDIgYmVpbmcgcHJlc2VudCBvbiB0aGUgaW5ncmVzcyBQRSwgYnV0IHRoZSB0 ZXh0IG1ha2VzIGl0PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5jbGVhciB0aGF0IGluIHRoZSBzeW1tZXRy aWMgbW9kZSB0aGF0IHRoaXMgZmlndXJlIGRlcGljdHMsIEJUMiBkb2VzbuKAmXQgYWN0dWFsbHk8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPm5lZWQgdG8gYmUgdGhlcmUuIFdvdWxkbuKAmXQgaXQgYmUgY2xl YXJlciBpZiB5b3UgZGlkbuKAmXQgc2hvdyBpdD88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+NS4gU2VjdGlvbiA0PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPkkgaGF2ZSBhIGhhcmQgdGltZSBwYXJzaW5nIHRoaXMgdGV4dDo8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgRWFj aCBCVCBvbiBhIFBFIGlzPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgYXNzb2NpYXRl ZCB3aXRoIGEgdW5pcXVlIFZMQU4gKGUuZy4sIHdpdGggYSBCRCk8bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYi PmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5TbywgMSBW TEFOIOKAlCZndDsgYXQgbGVhc3QgMSBCVCAoMTptYW55KTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5i c3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyB3 aGVyZSBpbiB0dXJuIGl0IGlzPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgYXNzb2Np YXRlZCB3aXRoIGEgc2luZ2xlIE1BQy1WUkY8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5TbywgMSBNQUMtVlJGIOKAlCZn dDsgYXQgbGVhc3QgMSBCVCAoMTptYW55KTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyBpbiB0aGUgY2FzZSBvZiBWTEFOLUJhc2VkIG1vZGUgb3IgYTxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7IG51bWJlciBvZiBCVHMgY2FuIGJlIGFzc29j aWF0ZWQgd2l0aCBhIHNpbmdsZSBNQUMtVlJGIGluIHRoZSBjYXNlIG9mPG86cD48L286cD48L3Nw YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj4mbmJzcDsmbmJzcDsgVkxBTi1Bd2FyZSBCdW5kbGUgbW9kZS48bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5Tbywg MSBNQUMtVlJGIOKAlCZndDsgYXQgbGVhc3QgMSBCVCAoMTptYW55KTxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5TaW5jZSB0aGlzIGlzIHN0YXRlZCBhcyBhbiBl eGNlcHRpb24gSSBndWVzcyB0aGF0IG1lYW5zIHlvdSBtZWFudCB0aGUgcHJlY2VkaW5nPG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj50d28gKHRoYXQgSSBwYXJzZWQgYXMgMTptYW55KSBhcmUgYWN0dWFsbHkg c3VwcG9zZWQgdG8gYmUgMToxPyBJZiBzbyBJIHRoaW5rPG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj50aGlz IG5lZWRzIGEgcmV3cml0ZSAoaXQgcHJvYmFibHkgZG9lcyByZWdhcmRsZXNzLCBmb3IgY2xhcml0 eSkuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjYuIFNlY3Rp b24gNC4xPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPldoZW4g eW91IHdyaXRlIOKAnEludGVybmV0IHN0YW5kYXJkIGJpdCBvcmRlcuKAnCwgZG8geW91IG1lYW4g 4oCcbmV0d29yayBieXRlIG9yZGVy4oCcPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+QWx0aG91Z2ggZXZl biBuZXR3b3JrIGJ5dGUgb3JkZXIgYXBwZWFycyB0byBiZSBub24tYXBwbGljYWJsZSwgc2luY2Ug dGhlIHZhbHVlczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YXJlIHNob3duIHdpdGggYW4gZXhwbGljaXQg Ynl0ZSBvcmRlci48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ SSByZWFsaXplIHRoZSBkZWZpbml0aW9ucyBhcmUgbWVyZWx5IHBhc3RlZCBmcm9tIFJGQyA1Nzk4 IGFuZCB0aGF0IHNoaXAgaGFzPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5zYWlsZWQsIGJ1dCB1bmxlc3Mg eW91IGNhbiBleHBsYWluIHdoYXQg4oCcKGluIGhleCwgaW4gSW50ZXJuZXQgc3RhbmRhcmQ8bzpw PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWYiPmJpdC1vcmRlcinigJ0gaXMgc3VwcG9zZWQgdG8gbWVhbiwgSSBzdWdn ZXN0IHJlbW92aW5nIGl0LiAoQWx0ZXJuYXRlbHkgYW5kIGxlc3M8bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYi PmRlc2lyYWJseSwgbWFrZSBpdCBleHBsaWNpdCB0aGF0IHlvdeKAmXJlIHByb3ZpZGluZyBhIGRp cmVjdCBxdW90YXRpb24gb2YgUkZDPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj41Nzk4Lik8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Ny4gU2VjdGlvbiA1LjE8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+WW91IHNheSB0aGUgRW5jYXBz dWxhdGlvbiBFeHRlbmRlZCBDb21tdW5pdHkgYW5kIFJvdXRlcuKAmXMgTUFDIEV4dGVuZGVkPG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj5Db21tdW5pdHkgaGF2ZSB0byBiZSBzZW50LCBidXQgeW91IHNheSBu b3RoaW5nIGFib3V0IHRoZSByZXF1aXJlZCB2YWx1ZXMuIEZvcjxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ Um91dGVyJ3MgTUFDLCDCpzguMSBzcGVjaWZpZXMgdGhlIHJlcXVpcmVkIHZhbHVlLCBJIHN1Z2dl c3QgYSBmb3J3YXJkIHJlZmVyZW5jZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+dG8gaXQuIEZvciBFbmNh cHN1bGF0aW9uLCB0aGUgY2xvc2VzdCBJIHdhcyBhYmxlIHRvIGZpbmQgdG8gYSBwbGFjZSB3aGVy ZSB0aGlzPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5pcyBzcGVjaWZpZWQgd2FzIHNlY3Rpb24gOS4xLjEs IGJ1dCB0aGF0J3Mgb25seSBhbiBleGFtcGxlLiBUaGVyZSByZWFsbHkgbmVlZHM8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPnRvIGJlIHNvbWUgcGxhY2Ugd2hlcmUgaXQncyBzcGVsbGVkIG91dC4gQSBiYXJl IG1pbmltdW0gd291bGQgYmUgdG8gY2l0ZSBSRkM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjkwMTIgwqc0 LjEsIGJ1dCB0aGF0IGp1c3QgcHJvdmlkZXMgdGhlIHN5bnRheCAtLSB5b3UgcmVhbGx5IHNob3Vs ZCBzYXkgc29tZXRoaW5nPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5tb3JlIGFib3V0IGhvdyB0byBkZWNp ZGUgd2hhdCB2YWx1ZSB0byBzZW5kLiBGb3IgdGhhdCBtYXR0ZXIsIGl0IGNvdWxkIGJlIHdoYXQ8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPnZhbHVlUyB0byBzZW5kIC0tIGlzIGl0IGxlZ2FsIGZvciBhIE5W RSB0byBhZHZlcnRpc2UgbXVsdGlwbGUgRW5jYXBzdWxhdGlvbjxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ RXh0ZW5kZWQgQ29tbXVuaXRpZXM/IFlvdSBkb24ndCBzYXkgaXQgaXNuJ3QsIGFuZCB0aGVyZSBh cmUgcG90ZW50aWFsIHJlYXNvbnM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRvIGRvIHNvLjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj44LiBTZWN0aW9uIDUuMjxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPiZuYnNwOyZuYnNwOyBvJm5ic3A7IFVzaW5nIE1BQy1WUkYgUm91dGUgVGFyZ2V0IChh bmQgRXRoZXJuZXQgVGFnIGlmIGRpZmZlcmVudCBmcm9tPG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgemVybyksIGl0IGlkZW50aWZpZXMgdGhlIGNvcnJl c3BvbmRpbmcgTUFDLVZSRiAoYW5kIEJUKS4mbmJzcDsgSWYgdGhlPG86cD48L286cD48L3NwYW4+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm Ij4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgTUFDLSBWUkYgKGFuZCBCVCkgZXhpc3Rz IChlLmcuLCBpdCBpcyBsb2NhbGx5IGNvbmZpZ3VyZWQpIHRoZW4gaXQ8bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5Zb3Ug dXNlIOKAnGUuZy7igJ0gc28gSSBwcmVzdW1lIHRoZXJlIG1pZ2h0IGJlIG90aGVyIHJlYXNvbnMg dGhlIE1BQy1WUkYgYW5kIEJUPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5taWdodCBleGlzdCBldmVuIGlm IG5vdCBsb2NhbGx5IGNvbmZpZ3VyZWQ/PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7IGltcG9ydHMgdGhlIE1BQyBhZGRyZXNzIGludG8gaXQuJm5ic3A7IE90aGVyd2lz ZSwgaXQgZG9lcyBub3QgaW1wb3J0PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsgdGhlIE1BQyBhZGRyZXNzLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7 PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgbyZuYnNwOyBVc2luZyBJUC1WUkYgcm91 dGUgdGFyZ2V0LCBpdCBpZGVudGlmaWVzIHRoZSBjb3JyZXNwb25kaW5nIElQLVZSRjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGFuZCBpbXBvcnRzIHRo ZSBJUCBhZGRyZXNzIGludG8gaXQuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+WW91IGRvbuKAmXQgcHJvdmlkZSBhbnkg Y29uZGl0aW9uYWwgbGFuZ3VhZ2UgaW4gdGhpcyBidWxsZXQgYWJvdXQg4oCcaWYgdGhlIElQLVZS RjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+ZXhpc3Rz4oCdLiBXaHkgaXMgdGhhdCBjYXZlYXQgcmVxdWly ZWQgZm9yIE1BQy1WUkYgYnV0IG5vdCBmb3IgSVAtVlJGPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5i c3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj45LiBTZWN0aW9uIDUuMjxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZu YnNwOyBUaGUgaW5jbHVzaW9uIG9mIE1QTFMgbGFiZWwyIGZpZWxkIGluIHRoaXMgcm91dGUgc2ln bmFscyB0byB0aGU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyByZWNlaXZpbmcgUEUg dGhhdCB0aGlzIHJvdXRlIGlzIGZvciBzeW1tZXRyaWMgSVJCIG1vZGUgYW5kIE1QTFM8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBsYWJlbDIgbmVlZHMgdG8gYmUgaW5zdGFsbGVkIGlu IGZvcndhcmRpbmcgcGF0aCB0byBpZGVudGlmeSB0aGU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNw OyZuYnNwOyBjb3JyZXNwb25kaW5nIElQLVZSRi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5JIHdhcyB1bmFibGUgdG8g bWFrZSBoZWFkIG5vciB0YWlsIG9mIHRoaXMgcGFyYWdyYXBoLiBJIHN1cHBvc2Ugwqc1LjQgaXMg d2hlcmU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRoZSBiZWhhdmlvciBpcyBhY3R1YWxseSBzcGVjaWZp ZWQsIHNvIGluIGEgd2F5IGl0IGRvZXNu4oCZdCBtYXR0ZXIgKGFsdGhvdWdoPG86cD48L286cD48 L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj5tYXliZSBhIGZvcndhcmQgcmVmZXJlbmNlIHdvdWxkIGhlbHApLjxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4xMC4gU2VjdGlvbiA1LjI8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286cD48L3Nw YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj4mbmJzcDsmbmJzcDsgSWYgdGhlIHJlY2VpdmluZyBQRSByZWNlaXZlcyB0aGlzIHJvdXRl IHdpdGggYm90aCB0aGUgTUFDLVZSRiBhbmQgSVAtPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsm bmJzcDsgVlJGIHJvdXRlIHRhcmdldHMgYW5kIGlmIHRoZSByZWNlaXZpbmcgUEUgZG9lcyBub3Qg c3VwcG9ydCBlaXRoZXI8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBhc3ltbWV0cmlj IG9yIHN5bW1ldHJpYyBJUkIgbW9kZXMsIHRoZW4gaWYgaXQgaGFzIHRoZSBjb3JyZXNwb25kaW5n PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgTUFDLVZSRiwgaXQgb25seSBpbXBvcnRz IHRoZSBNQUMgYWRkcmVzcy4mbmJzcDsgT3RoZXJ3aXNlLCBpZiBpdCBkb2Vzbid0PG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgaGF2ZSB0aGUgY29ycmVzcG9uZGluZyBNQUMtVlJGLCBp dCBtdXN0IG5vdCBpbXBvcnQgdGhpcyByb3V0ZS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5JZiBpdCBkb2VzbuKAmXQg c3VwcG9ydCBlaXRoZXIgYXN5bW1ldHJpYyBvciBzeW1tZXRyaWMgSVJCIG1vZGVzLCB0aGVuIGRv ZXNu4oCZdDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+dGhhdCBtZWFuIGl0IGRvZXNu4oCZdCBpbXBsZW1l bnQgdGhpcyBzcGVjaWZpY2F0aW9uIGF0IGFsbD8gSW4gdGhhdCBjaXJjdW1zdGFuY2UsPG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj5ob3cgZG8geW91IGV4cGVjdCB5b3VyIOKAnG11c3Qgbm904oCdIHRvIGJl IHJlc3BlY3RlZD88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ MTEuIFNlY3Rpb24gNS4zPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IElmIGhvc3QgQidzIChNQUMsIElQ KSBoYXMgbm90IHlldCBiZWVuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgbGVhcm50 IGVpdGhlciB2aWEgYSBncmF0dWl0b3VzIEFSUCBPUiB2aWEgYSBwcmlvciBnbGVhbmluZyBwcm9j ZWR1cmUsPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgYSBuZXcgZ2xlYW5pbmcgcHJv Y2VkdXJlIE1VU1QgYmUgdHJpZ2dlcmVkPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+U2luY2UgeW914oCZdmUgdXNlZCBN VVNUIGhlcmUsIHlvdSBNVVNUIHByb3ZpZGUgYSByZWZlcmVuY2UgdG8gd2hlcmUgdGhlIOKAnG5l dzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+Z2xlYW5pbmcgcHJvY2VkdXJl4oCdIGlzIHNwZWNpZmllZC48 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+QWxzbywgaGFzIG5v dCBiZWVuIGxlYXJudCBieSB3aG9tPyBUaGUgcHJvY2VkdXJlIG11c3QgYmUgdHJpZ2dlcmVkIHdo ZXJlPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4xMi4gU2Vj dGlvbiA1LjM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+VGhl IHNlY29uZCBwYXJhZ3JhcGgsIHRoYXQgYmVnaW5zICZxdW90O0NvbnNpZGVyIGEgc3VibmV0IEEm cXVvdDssIGlzIHRyZW1lbmRvdXNseTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Y29uZnVzaW5nIHRvIGEg Zmlyc3QtdGltZSByZWFkZXIgKG9yIGF0IGxlYXN0IHRvIHRoaXMgZmlyc3QtdGltZSByZWFkZXIp LiBJPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj5yZWFsaXplIHlvdSBwcm9iYWJseSB0aGluayB5b3UncmUg YmVpbmcgaGVscGZ1bCBieSBwcm92aWRpbmcgYSB3b3JrZWQgZXhhbXBsZSw8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPmJ1dCBhcyBJIHJlYWQgdGhyb3VnaCBpdCwgaXQgd2FzIHRoZSBvcHBvc2l0ZSBvZiBo ZWxwZnVsLiBUaGlzIGlzIGVzcGVjaWFsbHk8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnRydWUgYmVjYXVz ZSDCpzUgYW5kIGl0cyBzdWJzZWN0aW9ucyBpcyBhYm91dCAmcXVvdDtTeW1tZXRyaWMgSVJCIFBy b2NlZHVyZXMmcXVvdDsgLS0gYW5kPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj50aGUgcGFyYWdyYXBoIGlu IHF1ZXN0aW9uIHByb3ZpZGVzIG5vIHByb2NlZHVyZXMuPG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJz cDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlNvbWUgb3B0aW9ucyB0byBpbXByb3ZlIHRoZSBzaXR1YXRp b24gLS08bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+LSBSZW1v dmUgdGhlIHBhcmFncmFwaCBlbnRpcmVseS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPi0gUHJlZmFjZSB0 aGUgcGFyYWdyYXBoIHdpdGggJnF1b3Q7YXMgYW4gZXhhbXBsZSB0byBzaG93IHdoeSBhZHZlcnRp c2VtZW50IGFzIFJULTU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmlzIHJlcXVpcmVkLCZxdW90OzxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4xMy4gU2VjdGlvbiA1LjQ8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgbyZuYnNwOyBnbG9iYWwgbW9kZTogVk5JIGlzIHNldCB0 byB0aGUgcmVjZWl2ZWQgbGFiZWwyIGluIHRoZSByb3V0ZSB3aGljaDxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGlzIGRvbWFpbi13aWRlIGFzc2lnbmVk LiZuYnNwOyBUaGlzIFZOSSB2YWx1ZSBmcm9tIHJlY2VpdmVkIGxhYmVsMiBNVVNUPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgYmUgdGhlIHNhbWUgYXMg dGhlIGxvY2FsbHkgY29uZmlndXJlZCBWTkkgZm9yIHRoZSBJUCBWUkYgYXMgYWxsPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgUEVzIGluIHRoZSBOVk8g TVVTVCBiZSBjb25maWd1cmVkIHdpdGggdGhlIHNhbWUgSVAgVlJGIFZOSSBmb3I8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyB0aGlzIG1vZGUgb2Ygb3Bl cmF0aW9uLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPldoYXQgYWN0aW9uIGlzIHRvIGJlIHRha2VuIGlmIHRoaXMgTVVT VCBpcyB2aW9sYXRlZD88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+MTQuIFNlY3Rpb24gNi4xPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7IEZvciBhc3ltbWV0cmlj IElSQiBtb2RlLCBSb3V0ZXIncyBNQUMgRUMgaXMgbm90IG5lZWRlZCBiZWNhdXNlPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+UGxlYXNlIGVpdGhlciBleHBhbmQg4oCcRUPigJ0gb3IgYWRkIGl0IHRvIHlvdXIgZGVmaW5p dGlvbnMgc2VjdGlvbi4gKEFsc28gYXBwbGllczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+dG8gNS4xKTxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4xNS4gU2VjdGlvbiA2 LjI8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+YGBgPG86cD48 L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgbyZuYnNwOyBJZiBvbmx5IE1BQy1WUkYgcm91dGUg dGFyZ2V0IGlzIHVzZWQsIHRoZW4gdGhlIHJlY2VpdmluZyBQRSB1c2VzPG86cD48L286cD48L3Nw YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgdGhlIE1BQy1WUkYgcm91dGUgdGFy Z2V0IHRvIGlkZW50aWZ5IHRoZSBjb3JyZXNwb25kaW5nIElQLVZSRiAtLTxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGkuZS4sIG1hbnkgTUFDLVZSRiBy b3V0ZSB0YXJnZXRzIG1hcCB0byB0aGUgc2FtZSBJUC1WUkYgZm9yIGE8bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBnaXZlbiB0ZW5hbnQuJm5ic3A7IElu IHRoaXMgY2FzZSwgTUFDLVZSRiBtYXkgYmUgdXNlZCBieSB0aGUgcmVjZWl2aW5nPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgUEUgdG8gaWRlbnRpZnkg dGhlIGNvcnJlc3BvbmRpbmcgSVAgVlJGPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+RG8geW91IG1lYW4g4oCcaW4gdGhp cyBjYXNlLCB0aGUgTUFDLVZSRiAqcm91dGUgdGFyZ2V0KiBtYXkgYmUgdXNlZOKApuKAnT88bzpw PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+MTYuIFNlY3Rpb24gNi4y PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7IElmIHRoZSByZWNlaXZpbmcgUEUgcmVjZWl2ZXMgdGhl IE1BQy9JUCBBZHZlcnRpc2VtZW50IHJvdXRlIHdpdGggTVBMUzxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ Jm5ic3A7Jm5ic3A7IGxhYmVsMiBmaWVsZCBhbmQgaXQgdXNlcyBzeW1tZXRyaWMgSVJCIG1vZGU8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj5UaGlzIGVudGlyZSBzZWN0aW9uIGlzIGVudGl0bGVkIOKAnGFzeW1tZXRyaWMg SVJCIHByb2NlZHVyZXPigJwuIFdoeSBpcyB0aGVyZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+c3BlY2lm aWNhdGlvbiBsYW5ndWFnZSByZWdhcmRpbmcgc3ltbWV0cmljIHByb2NlZHVyZXMgaW4gaXQ/IChJ 4oCZbSBwcmV0dHkgc3VyZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+dGhpcyBpcyBub3QgdGhlIG9ubHkg cGxhY2UgdGhpcyBraW5kIG9mIHByb2JsZW0gYXBwZWFycy4pPG86cD48L286cD48L3NwYW4+PC9w Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4m bmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjE3LiBTZWN0aW9uIDcuMzxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNw OyZuYnNwOyBPbiB0aGUgc291cmNlIE5WRSwgYW4gYWdlLW91dCB0aW1lciAoZm9yIHRoZSBzaWxl bnQgaG9zdCB0aGF0IGhhczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7IG1vdmVkKSBp cyB1c2VkIHRvIHRyaWdnZXIgYW4gQVJQIHByb2JlLiZuYnNwOyBUaGlzIGFnZS1vdXQgdGltZXIg Y2FuIGJlPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgZWl0aGVyIEFSUCB0aW1lciBv ciBNQUMgYWdlLW91dCB0aW1lciBhbmQgdGhpcyBpcyBhbiBpbXBsZW1lbnRhdGlvbjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7IGNob2ljZS4mbmJzcDsgVGhlIEFSUCByZXF1ZXN0IGdl dHMgc2VudCBib3RoIGxvY2FsbHkgdG8gYWxsIHRoZSBhdHRhY2hlZDxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7Jm5ic3A7IFRTZXMgb24gdGhhdCBzdWJuZXQgYXMgd2VsbCBhcyBpdCBnZXRzIHNl bnQgdG8gYWxsIHRoZSByZW1vdGUgTlZFczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7 IChpbmNsdWRpbmcgdGhlIHRhcmdldCBOVkUpIHBhcnRpY2lwYXRpbmcgaW4gdGhhdCBzdWJuZXQu Jm5ic3A7IFRoZSBzb3VyY2U8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOyZuYnNwOyBOVkUgYWxz byB3aXRoZHJhdyB0aGUgRVZQTiBNQUMvSVAgQWR2ZXJ0aXNlbWVudCByb3V0ZSB3aXRoIG9ubHkg dGhlPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsgTUFDIGFkZHJlc3MgKGlmIGl0IGhh cyBwcmV2aW91c2x5IGFkdmVydGlzZWQgc3VjaCBhIHJvdXRlKS48bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYi PmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5Xb3VsZG7i gJl0IHRoZSBzb3VyY2UgTlZFIG9ubHkgd2l0aGRyYXcgdGhlIHJvdXRlIGFmdGVyIGEgdGltZW91 dCBoYWQgZXhwaXJlZD8gQXM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPnlvdSBoYXZlIHdyaXR0ZW4gdGhp cyBwYXJhZ3JhcGgsIGluIGNhc2UgdGhlIHNpbGVudCBUUyBoYXMgbm90IG1vdmVkLCB0aGU8bzpw PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWYiPmZvbGxvd2luZyB3b3VsZCBoYXBwZW46PG86cD48L286cD48L3NwYW4+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm Ij4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmBgYDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+VGltZSB0 OiBhZ2Utb3V0IHRpbWVyIGZpcmVzLCBBUlAgcHJvYmUgaXMgc2VudDxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+VGltZSB0OiBOVkUgd2l0aGRyYXdzIHJvdXRlIGFkdmVydGlzZW1lbnQ8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPlRpbWUgdSAmZ3Q7IHQ6IFRTIHJlY2VpdmVzIEFSUCBwcm9iZSwgc2VuZHMgQVJQIHJl cGx5PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaW1lIHYgJmd0OyB1OiBOVkUgcmVjZWl2ZXMgQVJQIHJl cGx5PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaW1lIHY6IE5WRSByZS1hZHZlcnRpc2VzIHJvdXRlPG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj5gYGA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+UHJlc3VtYWJseSB0aGlzIGNodXJuIGlzbuKAmXQgd2hhdCB5b3UgaW50ZW5kZWQu PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjE4LiBTZWN0aW9u IDkuMjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5Ib3cgZG9l cyB0aGUgTlZFIGxlYXJuIHdoYXQgc3VibmV0cyBhcmUgYmVoaW5kIGl0cyBhdHRhY2hlZCBUUz88 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+MTkuIFNlY3Rpb24g OS4yPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPldoYXQgYWJv dXQgaWYgVFM0IHdhbnRzIHRvIHJlYWNoIFNOMT8gSG93IGRvZXMgaXQga25vdyB3aGVyZSB0byBz ZW5kIHRoZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+cGFja2V0PyAoSSBzdXBwb3NlIHRoZSBhbnN3ZXIg bWF5IGJlIHRoZSBzYW1lIGFzIGZvciAjMTguKTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X188bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkJFU1MgbWFpbGluZyBsaXN0PG86cD48L286cD48L3NwYW4+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm Ij48YSBocmVmPSJtYWlsdG86QkVTU0BpZXRmLm9yZyI+QkVTU0BpZXRmLm9yZzwvYT48bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPjxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGlu Zm8vYmVzcyI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9iZXNzPC9hPg0K PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_TU4PR8401MB12487F27E7E4F54439933BC794FA9TU4PR8401MB1248_-- From nobody Fri Aug 13 23:00:06 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67A463A09C3; Fri, 13 Aug 2021 23:00:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.551 X-Spam-Level: X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sXM9dPEadn67; Fri, 13 Aug 2021 22:59:56 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86AF93A09B9; Fri, 13 Aug 2021 22:59:56 -0700 (PDT) Received: from pps.filterd (m0148663.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17E5jJWx030414; Sat, 14 Aug 2021 05:59:56 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : content-type : mime-version; s=pps0720; bh=pk0SZ80dQ9JeTTjY5y0RVP/rWqKODHHTbEL/HSjf/7E=; b=DSBxV51FmC2V1kBi/OGBpC/Hap9pDzKC0la21DwueLgNnmaYWTpmQvIlFLMwacQTyyxl CzHX4eVFkb8K65uQg+RFpnRYrhY/hdq79nMzcSPmTMCRU+EW0OCnlRsJoThyReaMoZ9h zd0GroftJJVpX1FqPqPTQzbX4JBvsD2ZZnKpDiPg5qTMg2SIuFsMhqdrVmc5wZ0+kyrR 5c+slRN5GdFPQ3nUa/tuGYpCA/mOh80c4L3RB16N24yrNqOAoeF2yL6LgIRYqCRi1Ru5 +Z8qIGoKI5h0ookjNnvIPvyFuZAGwNbu+5y5NmXk93/j/yK5CWXw7OUAGirgt7KpZBto fQ== Received: from g9t5009.houston.hpe.com (g9t5009.houston.hpe.com [15.241.48.73]) by mx0a-002e3701.pphosted.com with ESMTP id 3ae61n8hdt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 14 Aug 2021 05:59:55 +0000 Received: from G1W8108.americas.hpqcorp.net (g1w8108.austin.hp.com [16.193.72.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g9t5009.houston.hpe.com (Postfix) with ESMTPS id E84F755; Sat, 14 Aug 2021 05:59:54 +0000 (UTC) Received: from G9W8456.americas.hpqcorp.net (2002:10d8:a15f::10d8:a15f) by G1W8108.americas.hpqcorp.net (2002:10c1:483c::10c1:483c) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Sat, 14 Aug 2021 05:59:54 +0000 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (15.241.52.11) by G9W8456.americas.hpqcorp.net (16.216.161.95) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Sat, 14 Aug 2021 05:59:54 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Fo4LnDeYOmStdSo4VNj9CouyR5SMJ3OPYMN/n6YJLhhgy8lVlHy1LEbS+Q64keTs30EXWBOPUg/BtfZiUPVSdVLYCDof0vNccGsItSG+jlHE5GxRhgg2XmASEx1kzhDic/2LsysRZu9MrNsUdqai2YldpYimWYEPpDdk7UEtFA4QfKZoiKpWL1JsrDdIqxPbKeWM61fp3ekXKRJIjJq5/J44S0Aqgy6sYqmjqov/Q21itHE/wi4xsK7AE3ao5fuAUEVz6WZsnan+lSgZbepAQ3r8oGGWbBiYXkhG1HgE7vex3vuEcZVFifzvGa99J1W4CICrIh7eDOe4OjjaT7tgCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rNNXDD0Giks5R1keB/GuFoi++B2p+CRSXabhGi7n7zo=; b=ofZal0n6MlxsMaVMUGI6hYx++3TkMDiByeu6cgElfzMgh6fB7O9hO9QOiRR0mtOi/9rPerg8FNEegAyTwV8fqvSFQgvL1MX92TvVz7XnPkTLLACcvPErtcgUYABsej4XFLgqMlkbYBu2tHSBRP6hTq0Bq7NAINuuXOtyjz5gzuwqV7cc2Wgf2Fd4/vBjXXibDl5hP1/O7N1MzGdaTP2ecidnhoRiMAdIcR3PytreGreRXmfPGDaHTOvkh2VXM85rGVzJJYS/qcWRzdQzQyNBCSd2JOSMte3i/dE5vG8ntQyYRwZ/dcBjPxyq5YOr00qZ0msK2vCJGXHBAIMtWJ04+g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7514::15) by CS1PR8401MB0902.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7510::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.13; Sat, 14 Aug 2021 05:59:53 +0000 Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c]) by CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c%10]) with mapi id 15.20.4415.021; Sat, 14 Aug 2021 05:59:52 +0000 From: "Dikshit, Saumya" To: "draft-ietf-bess-evpn-irb-extended-mobility@ietf.org" CC: "bess@ietf.org" , "bess-chairs@ietf.org" Thread-Topic: Few queries on draft-ietf-bess-evpn-irb-extended-mobility Thread-Index: AdeQ0SpvsCHKrZuwR5W3DmRfbwf3vQ== Date: Sat, 14 Aug 2021 05:59:52 +0000 Message-ID: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9b0dbad8-a471-4c29-de61-08d95ee8bc08 x-ms-traffictypediagnostic: CS1PR8401MB0902: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(346002)(39860400002)(366004)(376002)(136003)(396003)(186003)(7696005)(9686003)(52536014)(76116006)(8676002)(86362001)(966005)(450100002)(4326008)(33656002)(316002)(38070700005)(6506007)(64756008)(66556008)(166002)(5660300002)(26005)(38100700002)(66946007)(122000001)(66476007)(71200400001)(55016002)(66446008)(6916009)(54906003)(2906002)(8936002)(478600001)(83380400001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TzNwUTVYVHVyVlZBd1JUUThIQ3pjTGkzc3V1R3RmUVEwUjZ4OHQ1dWdPS3VI?= =?utf-8?B?c2FyVWhhQUdidG1QZnZuNGdQYTBldmVVaVowUWtLZW5oNWR3elp4MTYra1Bw?= =?utf-8?B?TXRudW5uNEVxOWRKWUhuVU1INkdmTktUcEM3Z3NQbllYbzF4aWYwcE8wV3hS?= =?utf-8?B?eUprQktuNDF5bDF2QjNvL0ROTEpZN09UcnVXWXh6VUJleEo1VDYxVGxCVDJl?= =?utf-8?B?MWxybXFIbng0ZmRTVWFYWlJ4dEVrajRNWVZacmZITkphYkJuN3pERi9qUzJu?= =?utf-8?B?YTlZdWNBVlVMbXFYcXM5eUR1ek4waExWTCtDVzRqcmpNRkZDUTMrbjJvYi9w?= =?utf-8?B?d1pva3NqaUhoSld2aGxxQnhxT1RVNFV5VGhHTVhadXFQL1dha1F4ZW5xaThC?= =?utf-8?B?SVdpZ2w3TFE3cytVdGtLTnJMRGtmL00xUEpOSmdJN0NNVVVTcmcwS3N1QmZr?= =?utf-8?B?Wm1pcmlESkNlVS9XM2dPRWZ3ckJOdGlRVEo3cGRjZDRPM2w4cFZROEJYKzBI?= =?utf-8?B?V0gvaVU4UmQrUDg5NzFyWkxFa0ttRXl5RFNTOGdpTVBRWHRjQys5VU42QjlH?= =?utf-8?B?Q2p5Sm5JQVd6bGoyby9pd1k4cXhTVmZlTkNvSEZiYStmY24rVmVoZUpGNW5k?= =?utf-8?B?VTRGSndzQnhxczl5cS8vY3pxRlZpdVVlb2srZHZpcGVQa2IvaGdMa2NyTnFx?= =?utf-8?B?RCtLV283NE5OT1hkZ3RxZ3plYlZad1JrQnZsUVN2eHhmZlNCckhUS0d4OFl6?= =?utf-8?B?UVd0ZnNRSi9DTlVHR1RSOU9JOVFTeDh5U0FtZ09qMU9lUGtpK2RIMCsvSUJo?= =?utf-8?B?a0tTKzNtWUFzdVRkMERIQWZ5OU9ITG5XQ2psa0ZrUWwrdWRqODF5aDZhU1Jw?= =?utf-8?B?Tms0NFBseWdVTXgwUStYZlZsYlIrMTNKZzhjdnZzNnRxNVhQLzN5T0k3SGda?= =?utf-8?B?d3RCZ0pLT0t0QkhXSlhHVUoxOTdzWlRrV2oyQXNNODl5QUJwK2V4T2pleG1L?= =?utf-8?B?SzdjSWVvMG9SdmRjbTZvNUlLYXY1SE1GYnB1V3hoN1R4YWQ3YXJFYkk0Qkgx?= =?utf-8?B?bGtFblJicTdEL1Btb1VoZ3JrS2xVSHkxT0VyNDlqckRSUTV6WUxzMmNQTURj?= =?utf-8?B?UUYvNU9ha1hSVmZTS2NhaStIQnpSTkZmdUQ1OVd6RlZPNnZFUzF2TEdWN3VJ?= =?utf-8?B?K1hxUVVXRU9DcXk4TGV0MENXQmtCU2t1WG1FSU5yZzBFeEk4cC8xdFlOU1Ur?= =?utf-8?B?WDVyUlVnYUl5ZkphSW03OW9obFRvbmc4Ty9SeWJOUlZ1Uy9rMlZyaXZJTlc4?= =?utf-8?B?SzhiUlJMVDcyNXh5Z0FPdXNFZnVRakJIVWdKOU5CSnJmbGVxaWFjazlUSlBy?= =?utf-8?B?ZkhKNjFkL1c5RnRZYWJQZzVNU3J6MTB4dzdtNThJbExzMStKRlZLR3E5OUNW?= =?utf-8?B?L2VvWEQ0N0Y4dllJeDlpL2w2bXR3cTFqMmc4UlVQbUd3ejdjTUw0TXkxdDhp?= =?utf-8?B?ek5VNi9oRkttOHFkd091alR0R20zQjl0SGcwSTcwMXB4TG1MZlk1ZkNWVjZU?= =?utf-8?B?Lzd2SW5rMVUySk02dmNRY2h0VEo1QThhNkpBZXhtUTRnakgxV0xLNkVOaHY3?= =?utf-8?B?N1BOU3g1SXZKSmVnOGNaM0VqcFovSWx2bjRobm5LeXNMQk5xd3NBbjhYMk9o?= =?utf-8?B?R3hweWJYbVBMUUZ4K2RrTmc2YStmNGo2SkE3NmZmNlRiSXZlL2JrS3d2QlRu?= =?utf-8?Q?6F/TVZRuF9IrLTRcP2a6hHuA8hJ9WclJRo598ZM?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_CS1PR8401MB12377F658E48CFBF3349C18494FB9CS1PR8401MB1237_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 9b0dbad8-a471-4c29-de61-08d95ee8bc08 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Aug 2021 05:59:52.8847 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 713a2qKMKY1voFV0g1ZJpTdCH67H+giXHoXHoLy1M28EdHbRBRI7jNmreCryXk4ebq8fYcoDktCE3yh7K3VCOA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CS1PR8401MB0902 X-OriginatorOrg: hpe.com X-Proofpoint-GUID: gB86AKTZYZ68yqh3hdur5eJC-rcHhQ6m X-Proofpoint-ORIG-GUID: gB86AKTZYZ68yqh3hdur5eJC-rcHhQ6m X-Proofpoint-UnRewURL: 16 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-14_01:2021-08-13, 2021-08-14 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 adultscore=0 mlxlogscore=999 impostorscore=0 mlxscore=0 clxscore=1015 priorityscore=1501 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108140035 Archived-At: Subject: [bess] Few queries on draft-ietf-bess-evpn-irb-extended-mobility X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 14 Aug 2021 06:00:04 -0000 --_000_CS1PR8401MB12377F658E48CFBF3349C18494FB9CS1PR8401MB1237_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Q2hhbmdpbmcgdGhlIHN1YmplY3QgbGluZSBhbmQgcmVzZW5kaW5nLCBQbGVhc2UgaWdub3JlIHRo ZSBwcmV2aW91cyBlbWFpbC4gQXBvbG9neSBmb3IgbWl4aW5nIHVwIHRoaW5nc10NCg0KSGVsbG8g QXV0aG9ycyBvZiAgZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5Og0K DQpJIGhhdmUgZm9sbG93aW5nIHF1ZXJpZXMgYW5kIGNvbW1lbnRzIGFib3V0IHRoaXMgZHJhZnQg 4oCcZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmfigJ0uDQpQbGVh c2UgaGVscCBjbGFyaWZ5Lg0KDQo+Pj4+U2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYu b3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0w NSNzZWN0aW9uLTguMTxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMT4NCg0K TVVTVCBiZSBhdCBsZWFzdCBlcXVhbCB0byBjb3JyZXNwb25kaW5nIFNZTkMgTUFDIHNlcXVlbmNl IG51bWJlcg0KICAgICAgaWYgb25lIGlzIHByZXNlbnQuDQpDYW4gd2UgZm9ybWFsbHkgZGVmaW5l IHdoYXQgYSDigJxTWU5DIE1BQyBzZXF1ZW5jZSBudW1iZXLigJ0gPw0KDQo+Pj4+U2VjdGlvbiBo dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBu LWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMzxodHRwczovL2RhdGF0cmFja2Vy LmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2Jp bGl0eS0wNSNzZWN0aW9uLTguMz4NCg0K4oCcTUFDIE14IHdpdGggYSBzZXF1ZW5jZSBudW1iZXIg dGhhdCBpcyBoaWdoZXIgdGhhbiBvciBlcXVhbCB0bw0KICAgc2VxdWVuY2UgbnVtYmVyIGFzc2ln bmVkIHRvIGEgTE9DQUwgcm91dGUgZm9yIE1BQyBNeDoNCiAgIG8gIFBFIE1VU1QgdHJpZ2dlciBw cm9iZSBhbmQgZGVsZXRpb24gcHJvY2VkdXJlIGZvciBhbGwgTE9DQUwgSVBzDQogICAgICBhc3Nv Y2lhdGVkIHdpdGggTUFDIE14Lg0KICAgbyAgUEUgTVVTVCB0cmlnZ2VyIGRlbGV0aW9uIHByb2Nl ZHVyZSBmb3IgTE9DQUwgTUFDIHJvdXRlIGZvciBNeC4NCg0K4oCdDQpBcyBwZXIgcmZjNzQyMywg aWYgZXF1YWwgc2VxdWVuY2UgbnVtYmVyIGlzIHJlY2VpdmVkLCB0aGVuIHRoZSBvbmUgcHVibGlz aGVkIHdpdGggbG93ZXIgdnRlcC1pcCBpcyByZXRhaW5lZCwgYW5kIHRoZSBvdGhlciBvbmUgaXMg d2l0aGRyYXduLg0KV2hpbGUgdGhpcyBzZWN0aW9uIHRhbGtzIGFib3V0IHByb2JpbmcgaXQgYWdh aW4uDQpUaGlzIHNob3VsZCBiZSBjYWxsZWQgb3V0IGluIHRoZSBJbnRlcm9wIHNlY3Rpb24gYXMg d2VsbCwgZm9yIHRoZSBjby1leGlzdGVuY2Ugb2Ygb2xkIHJ1bGUgYW5kIG5ld2x5IGRlZmluZWQN Cg0KUXVvdGluZyBmcm9tICBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3Jm Yzc0MzIjc2VjdGlvbi0xNTxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3Jm Yzc0MzIjc2VjdGlvbi0xNT46DQoNCuKAnElmIHR3byAob3IgbW9yZSkgUEVzIGFkdmVydGlzZSB0 aGUgc2FtZSBNQUMNCg0KICAgYWRkcmVzcyB3aXRoIHRoZSBzYW1lIHNlcXVlbmNlIG51bWJlciBi dXQgZGlmZmVyZW50IEV0aGVybmV0IHNlZ21lbnQNCg0KICAgaWRlbnRpZmllcnMsIGEgUEUgdGhh dCByZWNlaXZlcyB0aGVzZSByb3V0ZXMgc2VsZWN0cyB0aGUgcm91dGUNCg0KICAgYWR2ZXJ0aXNl ZCBieSB0aGUgUEUgd2l0aCB0aGUgbG93ZXN0IElQIGFkZHJlc3MgYXMgdGhlIGJlc3Qgcm91dGXi gJ0NCg0KDQo+Pj4+IFNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRt bC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04 LjY8aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjY+DQoNCuKAnCAgIGFuIGlu dGVyLW9wIHNjZW5hcmlvIHdpdGggYSBkaWZmZXJlbnQgaW1wbGVtZW50YXRpb24gY291bGQgYXJp c2UsDQoNCiAgIHdoZXJlIGEgUEUgaW1wbGVtZW50YXRpb24gbm9uLWNvbXBsaWFudCB3aXRoIHRo aXMgZG9jdW1lbnQgb3Igd2l0aA0KDQogICBSRkMgNzQzMjxodHRwczovL2RhdGF0cmFja2VyLmll dGYub3JnL2RvYy9odG1sL3JmYzc0MzI+IGFzc2lnbnMgYW5kIGFkdmVydGlzZXMgaW5kZXBlbmRl bnQgc2VxdWVuY2UgbnVtYmVycyB0byBNQUMNCg0KICAgYW5kIE1BQytJUCByb3V0ZXPigJ0NCkhv dyBkbyB3ZSBleHBlY3QgdGhpcyBpbXBsZW1lbnRhdGlvbiB0byBpbnRlci1vcCwgYXMgaXQgbWF5 IGV4cGVjdCB0d28gZGlmZmVyZW50IE1BQy1vbmx5IGFuZCBNQUMtSVAgYWR2ZXJ0aXNlbWVudCBm cm9tIHJlbW90ZSBwZWVycyBhcyB3ZWxsLj8NCkNhbiB3ZSBwYXJhcGhyYXNlIHRoaXMgPw0KDQoN Cj4+Pj4gU2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguODxodHRw czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguOD4NCg0K4oCcRm9sbG93aW5nIGEgaG9z dCBtb3ZlIGZyb20gUEUxIHRvIFBFMiwgdGhlIGhvc3QncyBNQUMgaXMNCg0KICAgICAgZGlzY292 ZXJlZCBhdCBQRTIgYXMgYSBsb2NhbCBNQUMgdmlhIGEgZGF0YSBmcmFtZXMgcmVjZWl2ZWQgZnJv bQ0KDQogICAgICB0aGUgaG9zdC7igJ0NCg0KRG8gd2UgbmVlZCB0byBjYWxsIG91dCB0aGUgbWlz Y29uZmlndXJhdGlvbiBjYXNlLCB3aGVyZSBhIHByb2JlIG1heSBsZWFkIHRvIERVUCByZXNwb25z ZXMsDQoNCm9uZSBmcm9tIHRoZSAobG9jYWwgbGVhcm5pbmcpIGFjY2VzcyBzaWRlIGFuZCBvdGhl ciBvbmUgYWNyb3NzIHRoZSBmYWJyaWMgKG92ZXJsYXkgdHVubmVsKS4NCg0KDQo+Pj4+IFNlY3Rp b24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi0xMC40LjE8aHR0cHM6Ly9kYXRh dHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5k ZWQtbW9iaWxpdHktMDUjc2VjdGlvbi0xMC40LjE+DQoNCuKAnHVuZnJlZXppbmcgdGhlDQoNCiAg ICAgIHJvdXRlIGF0IHRoZSBGUk9aRU4gbG9jYXRpb24gd2lsbCByZXN1bHQgaW4gdGhlIHJvdXRl IGJlaW5nDQoNCiAgICAgIGFkdmVydGlzZWQgd2l0aCBhIGhpZ2hlciBzZXF1ZW5jZSBudW1iZXIu 4oCdDQpXaHkgYXJlIHdlIHR5aW5nIHByb2Jpbmcgd2l0aCDigJx1bmZyZWV6aW5n4oCdID8gRlJP WkVOIHdpbGwgdHlwaWNhbGx5IGluZGljYXRlIGRyb3BwaW5nIG9mIGZsb3dzLiBQcm9iaW5nIGNh biBzdGlsbCBnbyBvbiBpbiBwYXJhbGxlbCA/DQpDYW4gdGhpcyBiZSBjYWxsZWQgb3V0IGV4cGxp Y2l0bHkuDQoNCj4+Pj4gU2VjdGlvbiAiIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9j L2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rp b24tNC4zLjE8aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRm LWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi00LjMuMT4iIDoNCiIg W0lQNywgTTFdIGlzIGxlYXJudCBhcyBhIG5ldyByb3V0ZSBhdA0KICAgW1BFMywgUEU0XSBhbmQg YWR2ZXJ0aXNlZCB0byByZW1vdGUgUEVzIHdpdGggYSBzZXF1ZW5jZSBudW1iZXIgb2YgMC4NCiAg IEFzIGEgcmVzdWx0LCBMMyByZWFjaGFiaWxpdHkgdG8gSVA3IHdvdWxkIGJlIGVzdGFibGlzaGVk IGFjcm9zcyB0aGUNCiAgIG92ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0eSBwcm9jZWR1cmUg Zm9yIE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhcw0KICAgYSByZXN1bHQgb2YgdGhpcyBNQUMtSVAg cm91dGUgYWR2ZXJ0aXNlbWVudCINCg0KSWYgYSBob3N0IGlzIG1vdmVkIHdpdGggdGhlIHNhbWUg TUFDLCB0aGUgZm9sbG93aW5nIGlzIHN0aWxsIGJlaW5nIGZvbGxvd2luZyBpbiBjdXJyZW50IGlt cGxlbWVudGF0aW9uKHMpOg0KLSBFaXRoZXIgIk1BQy1vbmx5LXJvdXRlIiBvciAiTUFDLUlQLXJv dXRlIiBhZHZlcnRpc2VtZW50LCB0aGUgc2VxdWVuY2UgbnVtYmVyIGlzIGJ1bXBlZCBpbiBib3Ro IGNhc2VzDQotIE9uIHJlY2VpdmluZyBzaWRlLA0KICAgICAgLSAgdGhlIHNlcXVlbmNlLW51bWJl ciBpcyBwaWNrZWQgdXAgZnJvbSAiTUFDLW9ubHktcm91dGUiIG9yICJNQUMtSVAtcm91dGUiIGFu ZCBhcHBsaWVkIHRvIE1BQyBsZWFybmluZ3MNCiAgICAgIC0gdGhlIGJ1bXBlZCB1cCBzZXF1ZW5j ZSBudW1iZXIgbGVhZHMgYSB3aXRoZHJhdyBvZiAiTUFDLW9ubHkiIG9yICJNQUMtSVAtcm91dGUi IGZyb20gdGhlIGluZmVyaW9yIChlYXJsaWVyKSBwdWJsaXNoZXINCg0KS2luZGx5IGhlbHAgZXhw bGFpbiwgaWYgdGhlIHRleHQgbWVudGlvbmVkIGluIOKAnHNlY3Rpb24gNC4zLjHigJ0gaXMgY3Jl YXRpbmcgc29tZSBkb3VidHMgcmVnYXJkaW5nIHRoZSB3YXkgdGhpbmdzIG9wZXJhdGUgd2l0aCBj dXJyZW50IHN0YW5kYXJkcy4NClRob3VnaCBJIGRlZmluaXRlbHkgYmVsaWV2ZSB0aGF0IHRoaXMg bGl0ZXJhdHVyZSBkb2VzIGF3YXkgd2l0aCBsb3Qgb2YgZXhpc3RpbmcgYW1iaWd1aXRpZXMuDQpJ IHRoaW5rIHdlIG5lZWQgdG8gcGFyYXBocmFzZSB0aGlzIHNlY3Rpb24gYXRsZWFzdC4NCg0KVGhh bmtzDQpTYXVteWEuDQoNCg0K --_000_CS1PR8401MB12377F658E48CFBF3349C18494FB9CS1PR8401MB1237_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ Zm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9 DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCglj b2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFu Lk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpw dXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCglt YXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTAuMHB0Ow0K CWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0Kc3Bhbi5IVE1MUHJlZm9ybWF0dGVkQ2hhcg0K CXttc28tc3R5bGUtbmFtZToiSFRNTCBQcmVmb3JtYXR0ZWQgQ2hhciI7DQoJbXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCI7DQoJZm9udC1m YW1pbHk6IkNvdXJpZXIgTmV3Ijt9DQpwLmVtYWlscXVvdGUsIGxpLmVtYWlscXVvdGUsIGRpdi5l bWFpbHF1b3RlDQoJe21zby1zdHlsZS1uYW1lOmVtYWlscXVvdGU7DQoJbXNvLW1hcmdpbi10b3At YWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBpbjsNCgltc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0 bzsNCgltYXJnaW4tbGVmdDoxLjBwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5 OiJUaW1lcyBOZXcgUm9tYW4iLHNlcmlmO30NCnNwYW4uRW1haWxTdHlsZTIwDQoJe21zby1zdHls ZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNv bG9yOiMxRjQ5N0Q7fQ0Kc3Bhbi5ncmV5DQoJe21zby1zdHlsZS1uYW1lOmdyZXk7fQ0Kc3Bhbi5F bWFpbFN0eWxlMjINCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1p bHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6IzFGNDk3RDt9DQouTXNvQ2hwRGVmYXVs dA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30NCkBw YWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4waW4gMS4w aW4gMS4waW4gMS4waW47fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9 DQotLT48L3N0eWxlPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2 OmV4dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYg Z3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAg djpleHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZd LS0+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBs ZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkNoYW5naW5nIHRoZSBzdWJqZWN0IGxpbmUgYW5k IHJlc2VuZGluZywgUGxlYXNlIGlnbm9yZSB0aGUgcHJldmlvdXMgZW1haWwuIEFwb2xvZ3kgZm9y IG1peGluZyB1cCB0aGluZ3NdPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SGVsbG8gQXV0aG9ycyBvZiZuYnNwOyBkcmFmdC1pZXRm LWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHk6PG86cD48L286cD48L3NwYW4+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+ Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZjtjb2xvcjojMUY0OTdEIj5JIGhhdmUgZm9sbG93aW5nIHF1ZXJpZXMgYW5kIGNvbW1lbnRz IGFib3V0IHRoaXMgZHJhZnQg4oCcZHJhZnQtaWV0Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZv cndhcmRpbmfigJ0uPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPlBsZWFzZSBoZWxwIGNsYXJpZnkuPG86cD48 L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2Nv bG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7 U2VjdGlvbg0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9k cmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjEi Pmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2 cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4xPC9hPjxvOnA+PC9vOnA+PC9z cGFuPjwvaT48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+TVVTVCBiZSBh dCBsZWFzdCBlcXVhbCB0byBjb3JyZXNwb25kaW5nIFNZTkMgTUFDIHNlcXVlbmNlIG51bWJlcjxv OnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1 b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgaWYgb25lIGlz IHByZXNlbnQuPG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5DYW4gd2UgZm9ybWFsbHkgZGVmaW5lIHdo YXQgYSDigJxTWU5DIE1BQyBzZXF1ZW5jZSBudW1iZXLigJ0gPzxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48 bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0O1NlY3Rpb24NCjxhIGhy ZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zIj5odHRwczovL2RhdGF0 cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRl ZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMzwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0K PHByZT48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+4oCcPC9zcGFuPjxzcGFuIHN0 eWxlPSJjb2xvcjpibGFjayI+TUFDIE14IHdpdGggYSBzZXF1ZW5jZSBudW1iZXIgdGhhdCBpcyBo aWdoZXIgdGhhbiA8c3BhbiBzdHlsZT0iYmFja2dyb3VuZDp5ZWxsb3c7bXNvLWhpZ2hsaWdodDp5 ZWxsb3ciPm9yIGVxdWFsPC9zcGFuPiB0bzxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsg c2VxdWVuY2UgbnVtYmVyIGFzc2lnbmVkIHRvIGEgTE9DQUwgcm91dGUgZm9yIE1BQyBNeDo8bzpw PjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7 Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBvJm5ic3A7IFBFIE1VU1QgdHJpZ2dlcg0KPHNwYW4g c3R5bGU9ImJhY2tncm91bmQ6eWVsbG93O21zby1oaWdobGlnaHQ6eWVsbG93Ij5wcm9iZSBhbmQg ZGVsZXRpb24gcHJvY2VkdXJlPC9zcGFuPiBmb3IgYWxsIExPQ0FMIElQczxvOnA+PC9vOnA+PC9z cGFuPjwvaT48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1z aXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFj ayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGFzc29jaWF0ZWQgd2l0aCBNQUMgTXgu PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1 b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgbyZuYnNwOyBQRSBNVVNUIHRyaWdnZXINCjxz cGFuIHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdzttc28taGlnaGxpZ2h0OnllbGxvdyI+ZGVsZXRp b24gcHJvY2VkdXJlIGZvciBMT0NBTCBNQUM8L3NwYW4+IHJvdXRlIGZvciBNeC48bzpwPjwvbzpw Pjwvc3Bhbj48L2k+PC9wPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPuKAnTxv OnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj5BcyBwZXIgcmZjNzQyMywgaWYgZXF1YWwgc2VxdWVuY2Ug bnVtYmVyIGlzIHJlY2VpdmVkLCB0aGVuIHRoZSBvbmUgcHVibGlzaGVkIHdpdGggbG93ZXIgdnRl cC1pcCBpcyByZXRhaW5lZCwgYW5kIHRoZSBvdGhlciBvbmUgaXMgd2l0aGRyYXduLjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xv cjojMUY0OTdEIj5XaGlsZSB0aGlzIHNlY3Rpb24gdGFsa3MgYWJvdXQgcHJvYmluZyBpdCBhZ2Fp bi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWY7Y29sb3I6IzFGNDk3RCI+VGhpcyBzaG91bGQgYmUgY2FsbGVkIG91dCBpbiB0aGUgSW50 ZXJvcCBzZWN0aW9uIGFzIHdlbGwsIGZvciB0aGUgY28tZXhpc3RlbmNlIG9mIG9sZCBydWxlIGFu ZCBuZXdseSBkZWZpbmVkDQo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3Nw YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5 N0QiPlF1b3RpbmcgZnJvbSZuYnNwOw0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRm Lm9yZy9kb2MvaHRtbC9yZmM3NDMyI3NlY3Rpb24tMTUiPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0 Zi5vcmcvZG9jL2h0bWwvcmZjNzQzMiNzZWN0aW9uLTE1PC9hPjo8bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8cHJlPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+4oCcSWYgdHdvIChvciBtb3JlKSBQ RXMgYWR2ZXJ0aXNlIHRoZSBzYW1lIE1BQzxvOnA+PC9vOnA+PC9zcGFuPjwvcHJlPg0KPHByZT48 c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBhZGRyZXNzIHdpdGggdGhlIHNh bWUgc2VxdWVuY2UgbnVtYmVyIGJ1dCBkaWZmZXJlbnQgRXRoZXJuZXQgc2VnbWVudDxvOnA+PC9v OnA+PC9zcGFuPjwvcHJlPg0KPHByZT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZu YnNwOyBpZGVudGlmaWVycywgYSBQRSB0aGF0IHJlY2VpdmVzIHRoZXNlIHJvdXRlcyBzZWxlY3Rz IHRoZSByb3V0ZTxvOnA+PC9vOnA+PC9zcGFuPjwvcHJlPg0KPHByZT48c3BhbiBzdHlsZT0iY29s b3I6YmxhY2siPiZuYnNwOyZuYnNwOyBhZHZlcnRpc2VkIGJ5IHRoZSBQRSB3aXRoIHRoZSA8c3Bh biBzdHlsZT0iYmFja2dyb3VuZDp5ZWxsb3c7bXNvLWhpZ2hsaWdodDp5ZWxsb3ciPmxvd2VzdCBJ UCBhZGRyZXNzIGFzIHRoZSBiZXN0IHJvdXRlPC9zcGFuPuKAnTxvOnA+PC9vOnA+PC9zcGFuPjwv cHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0Qi PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0 OyZndDsmZ3Q7Jmd0OyBTZWN0aW9uDQo8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYu b3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0w NSNzZWN0aW9uLTguNiI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFm dC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjY8L2E+ PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9y OiMxRjQ5N0QiPuKAnDwvc3Bhbj48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyBhbiBpbnRlci1vcCBzY2VuYXJpbyB3aXRoIGEgZGlmZmVyZW50IGltcGxlbWVudGF0aW9uIGNv dWxkIGFyaXNlLDxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5 bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgd2hlcmUgYSBQRSBpbXBsZW1lbnRhdGlvbiBu b24tY29tcGxpYW50IHdpdGggdGhpcyBkb2N1bWVudCBvciB3aXRoPG86cD48L286cD48L3NwYW4+ PC9pPjwvcHJlPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyA8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIi PlJGQyA3NDMyPC9hPiBhc3NpZ25zIGFuZCBhZHZlcnRpc2VzIGluZGVwZW5kZW50IHNlcXVlbmNl IG51bWJlcnMgdG8gTUFDPG86cD48L286cD48L3NwYW4+PC9pPjwvcHJlPg0KPHByZT48aT48c3Bh biBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBhbmQgTUFDK0lQIHJvdXRlc+KAnTxv OnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj5Ib3cgZG8gd2UgZXhwZWN0IHRoaXMgaW1wbGVtZW50YXRp b24gdG8gaW50ZXItb3AsIGFzIGl0IG1heSBleHBlY3QgdHdvIGRpZmZlcmVudCBNQUMtb25seSBh bmQgTUFDLUlQIGFkdmVydGlzZW1lbnQgZnJvbSByZW1vdGUgcGVlcnMgYXMgd2VsbC4/PG86cD48 L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2Nv bG9yOiMxRjQ5N0QiPkNhbiB3ZSBwYXJhcGhyYXNlIHRoaXMgPzxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48 bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZndDsm Z3Q7Jmd0OyZndDsgU2VjdGlvbg0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9y Zy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUj c2VjdGlvbi04LjgiPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQt aWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44PC9hPjxv OnA+PC9vOnA+PC9zcGFuPjwvaT48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjoj MUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj5Gb2xsb3dpbmcgYSBo b3N0IG1vdmUgZnJvbSBQRTEgdG8gUEUyLCB0aGUgaG9zdCdzIE1BQyBpczxvOnA+PC9vOnA+PC9z cGFuPjwvaT48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgZGlzY292ZXJlZCBhdCBQRTIgYXMgYSBsb2NhbCBNQUMg dmlhIGEgZGF0YSBmcmFtZXMgcmVjZWl2ZWQgZnJvbTxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3By ZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsgdGhlIGhvc3Qu4oCdPG86cD48L286cD48L3NwYW4+PC9pPjwvcHJlPg0KPHBy ZT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6YmxhY2siPkRvIHdlIG5lZWQgdG8gY2FsbCBvdXQgdGhl IG1pc2NvbmZpZ3VyYXRpb24gY2FzZSwgd2hlcmUgYSBwcm9iZSBtYXkgbGVhZCB0byBEVVAgcmVz cG9uc2VzLCA8bzpwPjwvbzpwPjwvc3Bhbj48L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2Nv bG9yOmJsYWNrIj5vbmUgZnJvbSB0aGUgKGxvY2FsIGxlYXJuaW5nKSBhY2Nlc3Mgc2lkZSBhbmQg b3RoZXIgb25lIGFjcm9zcyB0aGUgZmFicmljIChvdmVybGF5IHR1bm5lbCkuPG86cD48L286cD48 L3NwYW4+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6 IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFu PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNr ZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1v YmlsaXR5LTA1I3NlY3Rpb24tMTAuNC4xIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2Rv Yy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0 aW9uLTEwLjQuMTwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHByZT48aT48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+4oCcPC9zcGFuPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFj ayI+dW5mcmVlemluZyB0aGU8bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cHJlPjxpPjxz cGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHJv dXRlIGF0IHRoZSBGUk9aRU4gbG9jYXRpb24gd2lsbCByZXN1bHQgaW4gdGhlIHJvdXRlIGJlaW5n PG86cD48L286cD48L3NwYW4+PC9pPjwvcHJlPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6 YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBhZHZlcnRpc2VkIHdpdGggYSBo aWdoZXIgc2VxdWVuY2UgbnVtYmVyLuKAnTxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5XaHkgYXJl IHdlIHR5aW5nIHByb2Jpbmcgd2l0aCDigJx1bmZyZWV6aW5n4oCdID8gRlJPWkVOIHdpbGwgdHlw aWNhbGx5IGluZGljYXRlIGRyb3BwaW5nIG9mIGZsb3dzLiBQcm9iaW5nIGNhbiBzdGlsbCBnbyBv biBpbiBwYXJhbGxlbCA/PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkNhbiB0aGlzIGJlIGNhbGxlZCBvdXQg ZXhwbGljaXRseS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0OyBTPC9zcGFuPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZiI+ZWN0aW9uICZxdW90Ow0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRm Lm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHkt MDUjc2VjdGlvbi00LjMuMSI+PHNwYW4gc3R5bGU9ImNvbG9yOiMwNTYzQzEiPmh0dHBzOi8vZGF0 YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVu ZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tNC4zLjE8L3NwYW4+PC9hPiZxdW90OyA6PG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcm cXVvdDsiPiZxdW90OyBbSVA3LCBNMV0gaXMgbGVhcm50IGFzIGEgbmV3IHJvdXRlIGF0PC9zcGFu PjwvaT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3Vy aWVyIE5ldyZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPiZuYnNwOyZuYnNwOyBbUEUzLCBQRTRdIGFu ZCBhZHZlcnRpc2VkIHRvIHJlbW90ZSBQRXMgd2l0aCBhIHNlcXVlbmNlIG51bWJlciBvZiAwLjwv c3Bhbj48L2k+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q291cmllciBOZXcmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mbmJzcDsmbmJzcDsgQXMgYSByZXN1 bHQsIEwzIHJlYWNoYWJpbGl0eSB0byBJUDcgd291bGQgYmUgZXN0YWJsaXNoZWQgYWNyb3NzIHRo ZTwvc3Bhbj48L2k+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q291cmllciBOZXcmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mbmJzcDsmbmJzcDsgb3Zlcmxh eSwgaG93ZXZlciwgTUFDIG1vYmlsaXR5IHByb2NlZHVyZSBmb3IgTUFDMSB3aWxsIG5vdCB0cmln Z2VyIGFzPC9zcGFuPjwvaT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPiZuYnNwOyZuYnNwOyBh IHJlc3VsdCBvZiB0aGlzIE1BQy1JUCByb3V0ZSBhZHZlcnRpc2VtZW50JnF1b3Q7PC9zcGFuPjwv aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVy IE5ldyZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYi PklmIGEgaG9zdCBpcyBtb3ZlZCB3aXRoIHRoZSBzYW1lIE1BQywgdGhlIGZvbGxvd2luZyBpcyBz dGlsbCBiZWluZyBmb2xsb3dpbmcgaW4gY3VycmVudCBpbXBsZW1lbnRhdGlvbihzKTo8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPi0gRWl0aGVyICZxdW90O01BQy1vbmx5LXJvdXRlJnF1b3Q7IG9yICZxdW90 O01BQy1JUC1yb3V0ZSZxdW90OyBhZHZlcnRpc2VtZW50LCB0aGUgc2VxdWVuY2UgbnVtYmVyIGlz IGJ1bXBlZCBpbiBib3RoIGNhc2VzPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4tIE9uIHJlY2VpdmluZyBz aWRlLA0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsg LSZuYnNwOyB0aGUgc2VxdWVuY2UtbnVtYmVyIGlzIHBpY2tlZCB1cCBmcm9tICZxdW90O01BQy1v bmx5LXJvdXRlJnF1b3Q7IG9yICZxdW90O01BQy1JUC1yb3V0ZSZxdW90OyBhbmQgYXBwbGllZCB0 byBNQUMgbGVhcm5pbmdzPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsgLSB0aGUgYnVtcGVkIHVwIHNlcXVlbmNlIG51bWJlciBsZWFkcyBhIHdpdGhkcmF3 IG9mICZxdW90O01BQy1vbmx5JnF1b3Q7IG9yICZxdW90O01BQy1JUC1yb3V0ZSZxdW90OyBmcm9t IHRoZSBpbmZlcmlvciAoZWFybGllcikgcHVibGlzaGVyPG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJz cDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPktpbmRseSBoZWxwIGV4cGxhaW4sIGlmIHRoZSB0ZXh0IG1l bnRpb25lZCBpbiDigJxzZWN0aW9uIDQuMy4x4oCdIGlzIGNyZWF0aW5nIHNvbWUgZG91YnRzIHJl Z2FyZGluZyB0aGUgd2F5IHRoaW5ncyBvcGVyYXRlIHdpdGggY3VycmVudCBzdGFuZGFyZHMuPG86 cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj5UaG91Z2ggSSBkZWZpbml0ZWx5IGJlbGlldmUgdGhhdCB0aGlzIGxp dGVyYXR1cmUgZG9lcyBhd2F5IHdpdGggbG90IG9mIGV4aXN0aW5nIGFtYmlndWl0aWVzLjxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+SSB0aGluayB3ZSBuZWVkIHRvIHBhcmFwaHJhc2UgdGhpcyBzZWN0aW9u IGF0bGVhc3QuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlRo YW5rczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+U2F1bXlhLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7 PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_CS1PR8401MB12377F658E48CFBF3349C18494FB9CS1PR8401MB1237_-- From nobody Tue Aug 17 00:25:24 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C7283A1BAC; Tue, 17 Aug 2021 00:25:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.548 X-Spam-Level: X-Spam-Status: No, score=-2.548 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zTTkXjTAR1ZJ; Tue, 17 Aug 2021 00:25:16 -0700 (PDT) Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0EFA3A1BAA; Tue, 17 Aug 2021 00:25:15 -0700 (PDT) Received: from pps.filterd (m0150245.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17H7E4eb019116; Tue, 17 Aug 2021 07:25:14 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=vuYnDUxtQ2Qcy4Voy8eQlyKo8SxNP8v7CPtxxuCQQ8Q=; b=Sfno34Y0uBcY64j4i8Z1039oppbXPUK+5JyDdHQk3YsvRLl/BOgQLlgXDcgFvjBOJu+W OtJy6fuWJKzMmJdCJtaX8rUWdxsPzLpor6MQ2YFQl6d+YohXCyEGgoLAzVRlyfhCQGgV HwYNNbC2OugAnNeYLYCgOUfwD6bCQNg14ElmXpUAqdpqlR8bnYyt6FTy8CGg+CyU9/G2 di/ngplnqGQi3xIc4MqJyNwoGi/uoh0VTu25HbhxqTWrGbc2QGqqwTCjxTD5VUNdWGF9 bnf9furwa2exWiuerdkw/Ue4sl/ruPyqhK1CSWkJTIL+LFHYbBbsMrxAh13p2ymeca+6 fQ== Received: from g4t3425.houston.hpe.com (g4t3425.houston.hpe.com [15.241.140.78]) by mx0b-002e3701.pphosted.com with ESMTP id 3afkncsc78-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 17 Aug 2021 07:25:14 +0000 Received: from G4W9120.americas.hpqcorp.net (exchangepmrr1.us.hpecorp.net [16.210.21.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3425.houston.hpe.com (Postfix) with ESMTPS id 99CAD9D; Tue, 17 Aug 2021 07:25:13 +0000 (UTC) Received: from G9W8453.americas.hpqcorp.net (2002:10d8:a0d3::10d8:a0d3) by G4W9120.americas.hpqcorp.net (2002:10d2:150f::10d2:150f) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Tue, 17 Aug 2021 07:25:13 +0000 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (15.241.52.13) by G9W8453.americas.hpqcorp.net (16.216.160.211) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Tue, 17 Aug 2021 07:25:13 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TuQLKxS2UbWvwDXiNt26+H2SUhABh6uoXhw8Hm90z+zIr2L1qLLTwl2ot6BPN1O3T7IhY91DT6pS01SnGgf6oFnpSwLxoxnsEdUHl/aoho9Fn17fFHgadJAYHmOpd6RN28JSpZutcKZx//wpLrn1dR1nGgKNLkPNbT0Pp4bQ8VXPSArzY5OAdqf6731b/bUMWM3jn/7JexvFGbVFHQq2Lp9eF0wwHui56lMPpbsmvHxoK0syC0hK9BkiErmlnASopIje/nRCQhVq+v8Lszhed4Z7oFymg6o9pS65oXkmP+nlynQL12dQJAr5oflvLK3GCraIFdbRgP/FzMCqqlfm2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=m/kZCTWBj6AwJLsCzIY0JDqoYYDC9B70V9Gi+KUhYNU=; b=IT0qNglN07ZhGwiqJAetq/wTlx9pT8dcxjQHlH8ageVpgrVVy8gNhr4lqUjeqhYHo8A26zH3zK7QGg8L3zuwDPkkNwOUy80ZTGj0kBhQ+zEl+mD7XwHbeiTTZtWqLklxZ32fsQciX8U4poCF32ITgB9V7zvWn3CxmnhLzU0CijBPWnC12Qco1V7RFNLwGZLbZm+ccTCy6SIRqmKsnlzzBh2FUmnNI8r+FT2g7I7QIt9TsCSlvGDHUVb0Q0hPCsJ2e57ZqSed8Xj23+QUSpkrU1BlxjL+pAr2+7PY6DYuRc5ix292H1HPBMDbsAeV4B8TSpN8wRZkv1AoS68bJb2Gig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7715::21) by TU4PR8401MB0800.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7710::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.16; Tue, 17 Aug 2021 07:25:11 +0000 Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca]) by TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca%11]) with mapi id 15.20.4415.024; Tue, 17 Aug 2021 07:25:11 +0000 From: "Dikshit, Saumya" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-irb-extended-mobility@ietf.org" CC: "bess-chairs@ietf.org" , "bess@ietf.org" Thread-Topic: Few queries on draft-ietf-bess-evpn-irb-extended-mobility Thread-Index: AdeQ0SpvsCHKrZuwR5W3DmRfbwf3vQCZ47ng Date: Tue, 17 Aug 2021 07:25:11 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: b8d69e4b-d654-4945-1cbf-08d961502654 x-ms-traffictypediagnostic: TU4PR8401MB0800: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(376002)(39860400002)(136003)(366004)(346002)(396003)(38070700005)(166002)(450100002)(4326008)(9686003)(7696005)(66556008)(66476007)(64756008)(66446008)(8676002)(66946007)(71200400001)(55016002)(76116006)(966005)(122000001)(8936002)(52536014)(26005)(33656002)(478600001)(54906003)(5660300002)(186003)(110136005)(2906002)(316002)(6506007)(38100700002)(53546011)(83380400001)(86362001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?QWxtak0vTXE0TjhZRHZNT1NhTW1seDJJejNvVHM3SkxYdnpFbHdDc3c0TnpZ?= =?utf-8?B?UFdIS3ZwUWp3eVkyYzhmaGZsMnJaSUxpd01hdFRBUnZINHVwNVZFbXVXRkdq?= =?utf-8?B?MkFvOCsrKzk5Qk4wM2d1ajJuYjNpSm40bXhZQTFqZXFoMWw1eWc1M3FFUTVT?= =?utf-8?B?RldpS1Uyc0pubGtrYnU5RHpUTkIzVTg5Y09NNy9MdTA0S21zb21jWmVNZW5a?= =?utf-8?B?RFFLQVJHSWZLSjI3U0NKRnExZW1RYmZaTk5pdGQ0T1RJa3o3eVZhVGxUeWk4?= =?utf-8?B?NjBvejhZUVBpc0EwWFdYbTI3bW9xR2dzMURBMFFjM3pYeXNoNnI0WDcyZlV5?= =?utf-8?B?aGI3UzlMWFZrcGR1dExIS08weU1ZaHQ1OXlJVEQwaHJGK1NpMnZaYmZPSC9O?= =?utf-8?B?RVVmeGxDei9Sb0RRWUJ3ZXMyRmVvY0FUTy9VRGxJcmczRXIxWVZldTFqQ1ph?= =?utf-8?B?VGUrUXNUK1pVRDNTeG11UFBDTXFvY2oydnZsMmNtOWV4OEk3WndieisxNXRz?= =?utf-8?B?dUUvK3BHTG5MUHhXZzNONE1IbGdMSkhUQ0JGQzF4UkE4dzNJUENhUDZJOUd0?= =?utf-8?B?ZlZ5SlBZcGhuaUpiejZTUjFVZ1RSenRDWG1YMVdNOUk3NU9YSEtQQ1VESDhE?= =?utf-8?B?TFBMemFOelBSaEFWSWhvL1JMaTdTeVVYUmF4VjZrS2VxQkN1NXVFaDBwSGFM?= =?utf-8?B?TndrKy9pTUhGUEFxeE10SmZBVk0wcUE5TGtQajh6QWlWb2xGZGJDaVB3NGVh?= =?utf-8?B?VGg2U3JKdEc3N3k5alZKL1lQMzlvR1pmck8yOUZKd2ZwMkdWTktkWStpTHhR?= =?utf-8?B?Ync1U0ROR0IyanNNZXBHYU8vWTU2NHBKLzR6M2pGdXJWREp2YVE4RUxKVU1R?= =?utf-8?B?cEo4cXZ5UWtiMDVNcFdUNE1rZmFLaWg3dDlNV2s4YlNHeGlwUVhIa29ZRlNa?= =?utf-8?B?QWsycWJUbnI5dTJlamdMS0RqVlVQU1VpT3VmM0kvZlVrTXVrMTl4Sk9yVEpT?= =?utf-8?B?aWU5eDZsTTZvK1lHNHNqNkRaN2FLeExpQzIxMXVibHZ6a2tITnQxNlY5dlli?= =?utf-8?B?WGxSeDhGY1NqVDdQZHppZjlDUUQ3d0JLRjJNRTdWZFExdzdFbHQ3cXdKNDRh?= =?utf-8?B?ZERiTU9OSlQzWjdyN3JOT0ZBZ25ndzBSSzBnUFRCTUZ1MDVsVjNIeUpFMDd4?= =?utf-8?B?SHEwYkNIYjZORCtlZWRBSGlaUVFKSWgyRytrTENRb0FERWJwa3hpNkFWNWVJ?= =?utf-8?B?NnZsWkt0V2JVaTA1SVNWSGlROVVJRU1FMUd4aDJRUjRhaVRRWmtYNDY2aTUv?= =?utf-8?B?a3dxQXpiUVBadW1QelJ3TFRlMm91ZURLMm9lUUNZZ2xST3ZPZFlNT29qN0FW?= =?utf-8?B?cjZ6YVBuY0xpOFh0Y0h1UzdicHlHd3g4WjVPMnZGbjVKYXlhd3FvZ0RObUpX?= =?utf-8?B?Rzgxa1RPK05ncS9TTjN3UWRqNjdnaFRDa3Y3VzIvdnEzMC9UTkxxNXJZSm9s?= =?utf-8?B?VkIxWHRVbWFBOU5XcE56cXNobEFIVzJSZiswQ1RGSXAvemp6eXZFK3M0dTVE?= =?utf-8?B?NzRLWXlqcVBlMlhGdFZtK3hrR0gwSDN1WE1tNE50NUtyT1dCNWd1ZHZpa0Mr?= =?utf-8?B?R0ZheTdSUWk4UnZrV1lNMklyMnJtS1lNcjNITm5FbHQ0WmUrSVJMUEdYQ3k0?= =?utf-8?B?bFMxOVpGMWJCUFpaSkpvZkpIZ1JwOGZ3bjV5WjJ3Y3E2NGNLODl1WWNHTHpx?= =?utf-8?Q?hTSFiKkOoeTdI4K0hSLWVpjJ1r3fKs2V88YCb0V?= Content-Type: multipart/alternative; boundary="_000_TU4PR8401MB1248D8D8507CE55B62EF749994FE9TU4PR8401MB1248_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: b8d69e4b-d654-4945-1cbf-08d961502654 X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Aug 2021 07:25:11.6760 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: oV5arkOUAsy0agbiSvuT5+xrUas7Xe8KdpZIjFaaiFNwGNSsb0snJnwbjMUK4RrcQS2bW1PQZQzaflpBF8R8+g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR8401MB0800 X-OriginatorOrg: hpe.com X-Proofpoint-ORIG-GUID: uSGy-N3HMNTW4r7VGHJxjhiWak5rNzsj X-Proofpoint-GUID: uSGy-N3HMNTW4r7VGHJxjhiWak5rNzsj X-Proofpoint-UnRewURL: 16 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-17_02:2021-08-16, 2021-08-17 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 malwarescore=0 suspectscore=0 mlxscore=0 spamscore=0 phishscore=0 adultscore=0 mlxlogscore=999 priorityscore=1501 lowpriorityscore=0 impostorscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108170047 Archived-At: Subject: Re: [bess] Few queries on draft-ietf-bess-evpn-irb-extended-mobility X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Aug 2021 07:25:21 -0000 --_000_TU4PR8401MB1248D8D8507CE55B62EF749994FE9TU4PR8401MB1248_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGVsbG8gQXV0aG9ycyBvZiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxp dHksDQoNClBsZWFzZSBoZWxwIG1lIHdpdGggYmVsb3cgcXVlcmllcy4NCg0KVGhhbmtzDQpTYXVt eWEuDQoNCkZyb206IEJFU1MgW21haWx0bzpiZXNzLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFs ZiBPZiBEaWtzaGl0LCBTYXVteWENClNlbnQ6IFNhdHVyZGF5LCBBdWd1c3QgMTQsIDIwMjEgMTE6 MzAgQU0NClRvOiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHlAaWV0 Zi5vcmcNCkNjOiBiZXNzLWNoYWlyc0BpZXRmLm9yZzsgYmVzc0BpZXRmLm9yZw0KU3ViamVjdDog W2Jlc3NdIEZldyBxdWVyaWVzIG9uIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1t b2JpbGl0eQ0KDQpDaGFuZ2luZyB0aGUgc3ViamVjdCBsaW5lIGFuZCByZXNlbmRpbmcsIFBsZWFz ZSBpZ25vcmUgdGhlIHByZXZpb3VzIGVtYWlsLiBBcG9sb2d5IGZvciBtaXhpbmcgdXAgdGhpbmdz XQ0KDQpIZWxsbyBBdXRob3JzIG9mICBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQt bW9iaWxpdHk6DQoNCkkgaGF2ZSBmb2xsb3dpbmcgcXVlcmllcyBhbmQgY29tbWVudHMgYWJvdXQg dGhpcyBkcmFmdCDigJxkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGlu Z+KAnS4NClBsZWFzZSBoZWxwIGNsYXJpZnkuDQoNCj4+Pj5TZWN0aW9uIGh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4xPGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9j L2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rp b24tOC4xPg0KDQpNVVNUIGJlIGF0IGxlYXN0IGVxdWFsIHRvIGNvcnJlc3BvbmRpbmcgU1lOQyBN QUMgc2VxdWVuY2UgbnVtYmVyDQogICAgICBpZiBvbmUgaXMgcHJlc2VudC4NCkNhbiB3ZSBmb3Jt YWxseSBkZWZpbmUgd2hhdCBhIOKAnFNZTkMgTUFDIHNlcXVlbmNlIG51bWJlcuKAnSA/DQoNCj4+ Pj5TZWN0aW9uIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0 Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zPGh0dHBzOi8v ZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4 dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zPg0KDQrigJxNQUMgTXggd2l0aCBhIHNlcXVl bmNlIG51bWJlciB0aGF0IGlzIGhpZ2hlciB0aGFuIG9yIGVxdWFsIHRvDQogICBzZXF1ZW5jZSBu dW1iZXIgYXNzaWduZWQgdG8gYSBMT0NBTCByb3V0ZSBmb3IgTUFDIE14Og0KICAgbyAgUEUgTVVT VCB0cmlnZ2VyIHByb2JlIGFuZCBkZWxldGlvbiBwcm9jZWR1cmUgZm9yIGFsbCBMT0NBTCBJUHMN CiAgICAgIGFzc29jaWF0ZWQgd2l0aCBNQUMgTXguDQogICBvICBQRSBNVVNUIHRyaWdnZXIgZGVs ZXRpb24gcHJvY2VkdXJlIGZvciBMT0NBTCBNQUMgcm91dGUgZm9yIE14Lg0KDQrigJ0NCkFzIHBl ciByZmM3NDIzLCBpZiBlcXVhbCBzZXF1ZW5jZSBudW1iZXIgaXMgcmVjZWl2ZWQsIHRoZW4gdGhl IG9uZSBwdWJsaXNoZWQgd2l0aCBsb3dlciB2dGVwLWlwIGlzIHJldGFpbmVkLCBhbmQgdGhlIG90 aGVyIG9uZSBpcyB3aXRoZHJhd24uDQpXaGlsZSB0aGlzIHNlY3Rpb24gdGFsa3MgYWJvdXQgcHJv YmluZyBpdCBhZ2Fpbi4NClRoaXMgc2hvdWxkIGJlIGNhbGxlZCBvdXQgaW4gdGhlIEludGVyb3Ag c2VjdGlvbiBhcyB3ZWxsLCBmb3IgdGhlIGNvLWV4aXN0ZW5jZSBvZiBvbGQgcnVsZSBhbmQgbmV3 bHkgZGVmaW5lZA0KDQpRdW90aW5nIGZyb20gIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv ZG9jL2h0bWwvcmZjNzQzMiNzZWN0aW9uLTE1PGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv ZG9jL2h0bWwvcmZjNzQzMiNzZWN0aW9uLTE1PjoNCg0K4oCcSWYgdHdvIChvciBtb3JlKSBQRXMg YWR2ZXJ0aXNlIHRoZSBzYW1lIE1BQw0KDQogICBhZGRyZXNzIHdpdGggdGhlIHNhbWUgc2VxdWVu Y2UgbnVtYmVyIGJ1dCBkaWZmZXJlbnQgRXRoZXJuZXQgc2VnbWVudA0KDQogICBpZGVudGlmaWVy cywgYSBQRSB0aGF0IHJlY2VpdmVzIHRoZXNlIHJvdXRlcyBzZWxlY3RzIHRoZSByb3V0ZQ0KDQog ICBhZHZlcnRpc2VkIGJ5IHRoZSBQRSB3aXRoIHRoZSBsb3dlc3QgSVAgYWRkcmVzcyBhcyB0aGUg YmVzdCByb3V0ZeKAnQ0KDQoNCj4+Pj4gU2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYu b3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0w NSNzZWN0aW9uLTguNjxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguNj4NCg0K 4oCcICAgYW4gaW50ZXItb3Agc2NlbmFyaW8gd2l0aCBhIGRpZmZlcmVudCBpbXBsZW1lbnRhdGlv biBjb3VsZCBhcmlzZSwNCg0KICAgd2hlcmUgYSBQRSBpbXBsZW1lbnRhdGlvbiBub24tY29tcGxp YW50IHdpdGggdGhpcyBkb2N1bWVudCBvciB3aXRoDQoNCiAgIFJGQyA3NDMyPGh0dHBzOi8vZGF0 YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvcmZjNzQzMj4gYXNzaWducyBhbmQgYWR2ZXJ0aXNl cyBpbmRlcGVuZGVudCBzZXF1ZW5jZSBudW1iZXJzIHRvIE1BQw0KDQogICBhbmQgTUFDK0lQIHJv dXRlc+KAnQ0KSG93IGRvIHdlIGV4cGVjdCB0aGlzIGltcGxlbWVudGF0aW9uIHRvIGludGVyLW9w LCBhcyBpdCBtYXkgZXhwZWN0IHR3byBkaWZmZXJlbnQgTUFDLW9ubHkgYW5kIE1BQy1JUCBhZHZl cnRpc2VtZW50IGZyb20gcmVtb3RlIHBlZXJzIGFzIHdlbGwuPw0KQ2FuIHdlIHBhcmFwaHJhc2Ug dGhpcyA/DQoNCg0KPj4+PiBTZWN0aW9uIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9j L2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rp b24tOC44PGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1i ZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44Pg0KDQrigJxGb2xs b3dpbmcgYSBob3N0IG1vdmUgZnJvbSBQRTEgdG8gUEUyLCB0aGUgaG9zdCdzIE1BQyBpcw0KDQog ICAgICBkaXNjb3ZlcmVkIGF0IFBFMiBhcyBhIGxvY2FsIE1BQyB2aWEgYSBkYXRhIGZyYW1lcyBy ZWNlaXZlZCBmcm9tDQoNCiAgICAgIHRoZSBob3N0LuKAnQ0KDQpEbyB3ZSBuZWVkIHRvIGNhbGwg b3V0IHRoZSBtaXNjb25maWd1cmF0aW9uIGNhc2UsIHdoZXJlIGEgcHJvYmUgbWF5IGxlYWQgdG8g RFVQIHJlc3BvbnNlcywNCg0Kb25lIGZyb20gdGhlIChsb2NhbCBsZWFybmluZykgYWNjZXNzIHNp ZGUgYW5kIG90aGVyIG9uZSBhY3Jvc3MgdGhlIGZhYnJpYyAob3ZlcmxheSB0dW5uZWwpLg0KDQoN Cj4+Pj4gU2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTEwLjQuMTxo dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBu LWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTEwLjQuMT4NCg0K4oCcdW5mcmVlemlu ZyB0aGUNCg0KICAgICAgcm91dGUgYXQgdGhlIEZST1pFTiBsb2NhdGlvbiB3aWxsIHJlc3VsdCBp biB0aGUgcm91dGUgYmVpbmcNCg0KICAgICAgYWR2ZXJ0aXNlZCB3aXRoIGEgaGlnaGVyIHNlcXVl bmNlIG51bWJlci7igJ0NCldoeSBhcmUgd2UgdHlpbmcgcHJvYmluZyB3aXRoIOKAnHVuZnJlZXpp bmfigJ0gPyBGUk9aRU4gd2lsbCB0eXBpY2FsbHkgaW5kaWNhdGUgZHJvcHBpbmcgb2YgZmxvd3Mu IFByb2JpbmcgY2FuIHN0aWxsIGdvIG9uIGluIHBhcmFsbGVsID8NCkNhbiB0aGlzIGJlIGNhbGxl ZCBvdXQgZXhwbGljaXRseS4NCg0KPj4+PiBTZWN0aW9uICIgaHR0cHM6Ly9kYXRhdHJhY2tlci5p ZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxp dHktMDUjc2VjdGlvbi00LjMuMTxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1s L2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQu My4xPiIgOg0KIiBbSVA3LCBNMV0gaXMgbGVhcm50IGFzIGEgbmV3IHJvdXRlIGF0DQogICBbUEUz LCBQRTRdIGFuZCBhZHZlcnRpc2VkIHRvIHJlbW90ZSBQRXMgd2l0aCBhIHNlcXVlbmNlIG51bWJl ciBvZiAwLg0KICAgQXMgYSByZXN1bHQsIEwzIHJlYWNoYWJpbGl0eSB0byBJUDcgd291bGQgYmUg ZXN0YWJsaXNoZWQgYWNyb3NzIHRoZQ0KICAgb3ZlcmxheSwgaG93ZXZlciwgTUFDIG1vYmlsaXR5 IHByb2NlZHVyZSBmb3IgTUFDMSB3aWxsIG5vdCB0cmlnZ2VyIGFzDQogICBhIHJlc3VsdCBvZiB0 aGlzIE1BQy1JUCByb3V0ZSBhZHZlcnRpc2VtZW50Ig0KDQpJZiBhIGhvc3QgaXMgbW92ZWQgd2l0 aCB0aGUgc2FtZSBNQUMsIHRoZSBmb2xsb3dpbmcgaXMgc3RpbGwgYmVpbmcgZm9sbG93aW5nIGlu IGN1cnJlbnQgaW1wbGVtZW50YXRpb24ocyk6DQotIEVpdGhlciAiTUFDLW9ubHktcm91dGUiIG9y ICJNQUMtSVAtcm91dGUiIGFkdmVydGlzZW1lbnQsIHRoZSBzZXF1ZW5jZSBudW1iZXIgaXMgYnVt cGVkIGluIGJvdGggY2FzZXMNCi0gT24gcmVjZWl2aW5nIHNpZGUsDQogICAgICAtICB0aGUgc2Vx dWVuY2UtbnVtYmVyIGlzIHBpY2tlZCB1cCBmcm9tICJNQUMtb25seS1yb3V0ZSIgb3IgIk1BQy1J UC1yb3V0ZSIgYW5kIGFwcGxpZWQgdG8gTUFDIGxlYXJuaW5ncw0KICAgICAgLSB0aGUgYnVtcGVk IHVwIHNlcXVlbmNlIG51bWJlciBsZWFkcyBhIHdpdGhkcmF3IG9mICJNQUMtb25seSIgb3IgIk1B Qy1JUC1yb3V0ZSIgZnJvbSB0aGUgaW5mZXJpb3IgKGVhcmxpZXIpIHB1Ymxpc2hlcg0KDQpLaW5k bHkgaGVscCBleHBsYWluLCBpZiB0aGUgdGV4dCBtZW50aW9uZWQgaW4g4oCcc2VjdGlvbiA0LjMu MeKAnSBpcyBjcmVhdGluZyBzb21lIGRvdWJ0cyByZWdhcmRpbmcgdGhlIHdheSB0aGluZ3Mgb3Bl cmF0ZSB3aXRoIGN1cnJlbnQgc3RhbmRhcmRzLg0KVGhvdWdoIEkgZGVmaW5pdGVseSBiZWxpZXZl IHRoYXQgdGhpcyBsaXRlcmF0dXJlIGRvZXMgYXdheSB3aXRoIGxvdCBvZiBleGlzdGluZyBhbWJp Z3VpdGllcy4NCkkgdGhpbmsgd2UgbmVlZCB0byBwYXJhcGhyYXNlIHRoaXMgc2VjdGlvbiBhdGxl YXN0Lg0KDQpUaGFua3MNClNhdW15YS4NCg0KDQo= --_000_TU4PR8401MB1248D8D8507CE55B62EF749994FE9TU4PR8401MB1248_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ Zm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9 DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCglj b2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFu Lk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpw dXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCglt YXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTAuMHB0Ow0K CWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0Kc3Bhbi5IVE1MUHJlZm9ybWF0dGVkQ2hhcg0K CXttc28tc3R5bGUtbmFtZToiSFRNTCBQcmVmb3JtYXR0ZWQgQ2hhciI7DQoJbXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCI7DQoJZm9udC1m YW1pbHk6IkNvdXJpZXIgTmV3Ijt9DQpwLmVtYWlscXVvdGUsIGxpLmVtYWlscXVvdGUsIGRpdi5l bWFpbHF1b3RlDQoJe21zby1zdHlsZS1uYW1lOmVtYWlscXVvdGU7DQoJbXNvLW1hcmdpbi10b3At YWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBpbjsNCgltc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0 bzsNCgltYXJnaW4tbGVmdDoxLjBwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5 OiJUaW1lcyBOZXcgUm9tYW4iLHNlcmlmO30NCnNwYW4uRW1haWxTdHlsZTIwDQoJe21zby1zdHls ZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNv bG9yOiMxRjQ5N0Q7fQ0Kc3Bhbi5ncmV5DQoJe21zby1zdHlsZS1uYW1lOmdyZXk7fQ0Kc3Bhbi5F bWFpbFN0eWxlMjINCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6IkNh bGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVtYWlsU3R5bGUyMw0K CXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIs c2Fucy1zZXJpZjsNCgljb2xvcjojMUY0OTdEO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHls ZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rp b24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBp bjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+ PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBz cGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4 bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIg ZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwvaGVhZD4N Cjxib2R5IGxhbmc9IkVOLVVTIiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xh c3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7 Y29sb3I6IzFGNDk3RCI+SGVsbG8gQXV0aG9ycyBvZiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmIt ZXh0ZW5kZWQtbW9iaWxpdHksPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj5QbGVhc2UgaGVscCBtZSB3aXRoIGJlbG93IHF1ZXJpZXMuPG86cD48L286cD48L3NwYW4+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0Qi PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5UaGFua3M8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+U2F1bXlh LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8ZGl2Pg0K PGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3Bh ZGRpbmc6My4wcHQgMGluIDBpbiAwaW4iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmIj5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4gQkVTUyBbbWFpbHRv OmJlc3MtYm91bmNlc0BpZXRmLm9yZ10NCjxiPk9uIEJlaGFsZiBPZiA8L2I+RGlrc2hpdCwgU2F1 bXlhPGJyPg0KPGI+U2VudDo8L2I+IFNhdHVyZGF5LCBBdWd1c3QgMTQsIDIwMjEgMTE6MzAgQU08 YnI+DQo8Yj5Ubzo8L2I+IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0 eUBpZXRmLm9yZzxicj4NCjxiPkNjOjwvYj4gYmVzcy1jaGFpcnNAaWV0Zi5vcmc7IGJlc3NAaWV0 Zi5vcmc8YnI+DQo8Yj5TdWJqZWN0OjwvYj4gW2Jlc3NdIEZldyBxdWVyaWVzIG9uIGRyYWZ0LWll dGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5D aGFuZ2luZyB0aGUgc3ViamVjdCBsaW5lIGFuZCByZXNlbmRpbmcsIFBsZWFzZSBpZ25vcmUgdGhl IHByZXZpb3VzIGVtYWlsLiBBcG9sb2d5IGZvciBtaXhpbmcgdXAgdGhpbmdzXTxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkhlbGxv IEF1dGhvcnMgb2YmbmJzcDsgZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmls aXR5OjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SSBoYXZlIGZv bGxvd2luZyBxdWVyaWVzIGFuZCBjb21tZW50cyBhYm91dCB0aGlzIGRyYWZ0IOKAnGRyYWZ0LWll dGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5n4oCdLjxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdE Ij5QbGVhc2UgaGVscCBjbGFyaWZ5LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpw Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29s b3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0O1NlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0 YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVu ZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4xIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3Jn L2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNz ZWN0aW9uLTguMTwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHByZT48aT48c3BhbiBz dHlsZT0iY29sb3I6YmxhY2siPk1VU1QgYmUgYXQgbGVhc3QgZXF1YWwgdG8gY29ycmVzcG9uZGlu ZyBTWU5DIE1BQyBzZXF1ZW5jZSBudW1iZXI8bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250 LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7IGlmIG9uZSBpcyBwcmVzZW50LjxvOnA+PC9vOnA+PC9zcGFuPjwv aT48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3 RCI+Q2FuIHdlIGZvcm1hbGx5IGRlZmluZSB3aGF0IGEg4oCcU1lOQyBNQUMgc2VxdWVuY2UgbnVt YmVy4oCdID88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZn dDsmZ3Q7Jmd0OyZndDtTZWN0aW9uDQo8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYu b3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0w NSNzZWN0aW9uLTguMyI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFm dC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjM8L2E+ PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9y OiMxRjQ5N0QiPuKAnDwvc3Bhbj48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPk1BQyBNeCB3aXRo IGEgc2VxdWVuY2UgbnVtYmVyIHRoYXQgaXMgaGlnaGVyIHRoYW4gPHNwYW4gc3R5bGU9ImJhY2tn cm91bmQ6eWVsbG93O21zby1oaWdobGlnaHQ6eWVsbG93Ij5vciBlcXVhbDwvc3Bhbj4gdG88bzpw PjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBz dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90 Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IHNlcXVlbmNlIG51bWJlciBhc3NpZ25lZCB0byBh IExPQ0FMIHJvdXRlIGZvciBNQUMgTXg6PG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgbyZu YnNwOyBQRSBNVVNUIHRyaWdnZXINCjxzcGFuIHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdzttc28t aGlnaGxpZ2h0OnllbGxvdyI+cHJvYmUgYW5kIGRlbGV0aW9uIHByb2NlZHVyZTwvc3Bhbj4gZm9y IGFsbCBMT0NBTCBJUHM8bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyBhc3NvY2lhdGVkIHdpdGggTUFDIE14LjxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250 LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7 IG8mbmJzcDsgUEUgTVVTVCB0cmlnZ2VyDQo8c3BhbiBzdHlsZT0iYmFja2dyb3VuZDp5ZWxsb3c7 bXNvLWhpZ2hsaWdodDp5ZWxsb3ciPmRlbGV0aW9uIHByb2NlZHVyZSBmb3IgTE9DQUwgTUFDPC9z cGFuPiByb3V0ZSBmb3IgTXguPG86cD48L286cD48L3NwYW4+PC9pPjwvcD4NCjxwcmU+PGk+PHNw YW4gc3R5bGU9ImNvbG9yOmJsYWNrIj7igJ08bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+QXMgcGVy IHJmYzc0MjMsIGlmIGVxdWFsIHNlcXVlbmNlIG51bWJlciBpcyByZWNlaXZlZCwgdGhlbiB0aGUg b25lIHB1Ymxpc2hlZCB3aXRoIGxvd2VyIHZ0ZXAtaXAgaXMgcmV0YWluZWQsIGFuZCB0aGUgb3Ro ZXIgb25lIGlzIHdpdGhkcmF3bi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+V2hpbGUgdGhpcyBzZWN0aW9u IHRhbGtzIGFib3V0IHByb2JpbmcgaXQgYWdhaW4uPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPlRoaXMgc2hv dWxkIGJlIGNhbGxlZCBvdXQgaW4gdGhlIEludGVyb3Agc2VjdGlvbiBhcyB3ZWxsLCBmb3IgdGhl IGNvLWV4aXN0ZW5jZSBvZiBvbGQgcnVsZSBhbmQgbmV3bHkgZGVmaW5lZA0KPG86cD48L286cD48 L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMx RjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5RdW90aW5nIGZyb20mbmJzcDsNCjxhIGhy ZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvcmZjNzQzMiNzZWN0aW9u LTE1Ij5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlv bi0xNTwvYT46PG86cD48L286cD48L3NwYW4+PC9wPg0KPHByZT48c3BhbiBzdHlsZT0iY29sb3I6 YmxhY2siPuKAnElmIHR3byAob3IgbW9yZSkgUEVzIGFkdmVydGlzZSB0aGUgc2FtZSBNQUM8bzpw PjwvbzpwPjwvc3Bhbj48L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJz cDsmbmJzcDsgYWRkcmVzcyB3aXRoIHRoZSBzYW1lIHNlcXVlbmNlIG51bWJlciBidXQgZGlmZmVy ZW50IEV0aGVybmV0IHNlZ21lbnQ8bzpwPjwvbzpwPjwvc3Bhbj48L3ByZT4NCjxwcmU+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgaWRlbnRpZmllcnMsIGEgUEUgdGhhdCBy ZWNlaXZlcyB0aGVzZSByb3V0ZXMgc2VsZWN0cyB0aGUgcm91dGU8bzpwPjwvbzpwPjwvc3Bhbj48 L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYWR2ZXJ0 aXNlZCBieSB0aGUgUEUgd2l0aCB0aGUgPHNwYW4gc3R5bGU9ImJhY2tncm91bmQ6eWVsbG93O21z by1oaWdobGlnaHQ6eWVsbG93Ij5sb3dlc3QgSVAgYWRkcmVzcyBhcyB0aGUgYmVzdCByb3V0ZTwv c3Bhbj7igJ08bzpwPjwvbzpwPjwvc3Bhbj48L3ByZT4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86 cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz YW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZndDsmZ3Q7Jmd0OyZndDsgU2VjdGlvbg0KPGEgaHJl Zj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjYiPmh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tOC42PC9hPjxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3A+DQo8 cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5 bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYW4gaW50ZXItb3Agc2NlbmFyaW8gd2l0aCBh IGRpZmZlcmVudCBpbXBsZW1lbnRhdGlvbiBjb3VsZCBhcmlzZSw8bzpwPjwvbzpwPjwvc3Bhbj48 L2k+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7 IHdoZXJlIGEgUEUgaW1wbGVtZW50YXRpb24gbm9uLWNvbXBsaWFudCB3aXRoIHRoaXMgZG9jdW1l bnQgb3Igd2l0aDxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5 bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tl ci5pZXRmLm9yZy9kb2MvaHRtbC9yZmM3NDMyIj5SRkMgNzQzMjwvYT4gYXNzaWducyBhbmQgYWR2 ZXJ0aXNlcyBpbmRlcGVuZGVudCBzZXF1ZW5jZSBudW1iZXJzIHRvIE1BQzxvOnA+PC9vOnA+PC9z cGFuPjwvaT48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsm bmJzcDsgYW5kIE1BQytJUCByb3V0ZXPigJ08bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SG93IGRv IHdlIGV4cGVjdCB0aGlzIGltcGxlbWVudGF0aW9uIHRvIGludGVyLW9wLCBhcyBpdCBtYXkgZXhw ZWN0IHR3byBkaWZmZXJlbnQgTUFDLW9ubHkgYW5kIE1BQy1JUCBhZHZlcnRpc2VtZW50IGZyb20g cmVtb3RlIHBlZXJzIGFzIHdlbGwuPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5DYW4gd2UgcGFyYXBocmFz ZSB0aGlzID88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+ Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhyZWY9 Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2 cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44Ij5odHRwczovL2RhdGF0cmFj a2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1t b2JpbGl0eS0wNSNzZWN0aW9uLTguODwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wPg0KPHBy ZT48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+4oCcPC9zcGFuPjxzcGFuIHN0eWxl PSJjb2xvcjpibGFjayI+Rm9sbG93aW5nIGEgaG9zdCBtb3ZlIGZyb20gUEUxIHRvIFBFMiwgdGhl IGhvc3QncyBNQUMgaXM8bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cHJlPjxpPjxzcGFu IHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGRpc2Nv dmVyZWQgYXQgUEUyIGFzIGEgbG9jYWwgTUFDIHZpYSBhIGRhdGEgZnJhbWVzIHJlY2VpdmVkIGZy b208bzpwPjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xv cjpibGFjayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHRoZSBob3N0LuKAnTxvOnA+ PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOmJsYWNr Ij5EbyB3ZSBuZWVkIHRvIGNhbGwgb3V0IHRoZSBtaXNjb25maWd1cmF0aW9uIGNhc2UsIHdoZXJl IGEgcHJvYmUgbWF5IGxlYWQgdG8gRFVQIHJlc3BvbnNlcywgPG86cD48L286cD48L3NwYW4+PC9w cmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjpibGFjayI+b25lIGZyb20gdGhlIChsb2Nh bCBsZWFybmluZykgYWNjZXNzIHNpZGUgYW5kIG90aGVyIG9uZSBhY3Jvc3MgdGhlIGZhYnJpYyAo b3ZlcmxheSB0dW5uZWwpLjxvOnA+PC9vOnA+PC9zcGFuPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0OyBTZWN0aW9u DQo8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWll dGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTEwLjQuMSI+aHR0 cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1p cmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi0xMC40LjE8L2E+PG86cD48L286cD48L3Nw YW4+PC9pPjwvcD4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPuKAnDwv c3Bhbj48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPnVuZnJlZXppbmcgdGhlPG86cD48L286cD48 L3NwYW4+PC9pPjwvcHJlPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyByb3V0ZSBhdCB0aGUgRlJPWkVOIGxvY2F0aW9uIHdp bGwgcmVzdWx0IGluIHRoZSByb3V0ZSBiZWluZzxvOnA+PC9vOnA+PC9zcGFuPjwvaT48L3ByZT4N CjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsgYWR2ZXJ0aXNlZCB3aXRoIGEgaGlnaGVyIHNlcXVlbmNlIG51bWJlci7igJ08bzpw PjwvbzpwPjwvc3Bhbj48L2k+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWY7Y29sb3I6IzFGNDk3RCI+V2h5IGFyZSB3ZSB0eWluZyBwcm9iaW5nIHdpdGgg4oCcdW5m cmVlemluZ+KAnSA/IEZST1pFTiB3aWxsIHR5cGljYWxseSBpbmRpY2F0ZSBkcm9wcGluZyBvZiBm bG93cy4gUHJvYmluZyBjYW4gc3RpbGwgZ28gb24gaW4gcGFyYWxsZWwgPzxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj5DYW4gdGhpcyBiZSBjYWxsZWQgb3V0IGV4cGxpY2l0bHkuPG86cD48L286cD48L3NwYW4+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZndDsm Z3Q7Jmd0OyZndDsgUzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPmVjdGlvbiAmcXVvdDsNCjxhIGhy ZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tNC4zLjEiPjxzcGFuIHN0eWxl PSJjb2xvcjojMDU2M0MxIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2Ry YWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4x PC9zcGFuPjwvYT4mcXVvdDsgOjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mcXVvdDsgW0lQNywgTTFdIGlzIGxl YXJudCBhcyBhIG5ldyByb3V0ZSBhdDwvc3Bhbj48L2k+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7 Ij4mbmJzcDsmbmJzcDsgW1BFMywgUEU0XSBhbmQgYWR2ZXJ0aXNlZCB0byByZW1vdGUgUEVzIHdp dGggYSBzZXF1ZW5jZSBudW1iZXIgb2YgMC48L3NwYW4+PC9pPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij48bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3Bh biBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZx dW90OyI+Jm5ic3A7Jm5ic3A7IEFzIGEgcmVzdWx0LCBMMyByZWFjaGFiaWxpdHkgdG8gSVA3IHdv dWxkIGJlIGVzdGFibGlzaGVkIGFjcm9zcyB0aGU8L3NwYW4+PC9pPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij48bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5l dyZxdW90OyI+Jm5ic3A7Jm5ic3A7IG92ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0eSBwcm9j ZWR1cmUgZm9yIE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhczwvc3Bhbj48L2k+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPjxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJp ZXIgTmV3JnF1b3Q7Ij4mbmJzcDsmbmJzcDsgYSByZXN1bHQgb2YgdGhpcyBNQUMtSVAgcm91dGUg YWR2ZXJ0aXNlbWVudCZxdW90Ozwvc3Bhbj48L2k+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5JZiBhIGhvc3QgaXMgbW92ZWQgd2l0aCB0aGUg c2FtZSBNQUMsIHRoZSBmb2xsb3dpbmcgaXMgc3RpbGwgYmVpbmcgZm9sbG93aW5nIGluIGN1cnJl bnQgaW1wbGVtZW50YXRpb24ocyk6PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4tIEVpdGhlciAmcXVvdDtN QUMtb25seS1yb3V0ZSZxdW90OyBvciAmcXVvdDtNQUMtSVAtcm91dGUmcXVvdDsgYWR2ZXJ0aXNl bWVudCwgdGhlIHNlcXVlbmNlIG51bWJlciBpcyBidW1wZWQgaW4gYm90aCBjYXNlczxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZiI+LSBPbiByZWNlaXZpbmcgc2lkZSwNCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0mbmJzcDsgdGhlIHNlcXVlbmNlLW51bWJlciBp cyBwaWNrZWQgdXAgZnJvbSAmcXVvdDtNQUMtb25seS1yb3V0ZSZxdW90OyBvciAmcXVvdDtNQUMt SVAtcm91dGUmcXVvdDsgYW5kIGFwcGxpZWQgdG8gTUFDIGxlYXJuaW5nczxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0gdGhlIGJ1bXBlZCB1cCBzZXF1 ZW5jZSBudW1iZXIgbGVhZHMgYSB3aXRoZHJhdyBvZiAmcXVvdDtNQUMtb25seSZxdW90OyBvciAm cXVvdDtNQUMtSVAtcm91dGUmcXVvdDsgZnJvbSB0aGUgaW5mZXJpb3IgKGVhcmxpZXIpIHB1Ymxp c2hlcjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5LaW5kbHkg aGVscCBleHBsYWluLCBpZiB0aGUgdGV4dCBtZW50aW9uZWQgaW4g4oCcc2VjdGlvbiA0LjMuMeKA nSBpcyBjcmVhdGluZyBzb21lIGRvdWJ0cyByZWdhcmRpbmcgdGhlIHdheSB0aGluZ3Mgb3BlcmF0 ZSB3aXRoIGN1cnJlbnQgc3RhbmRhcmRzLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+VGhvdWdoIEkgZGVm aW5pdGVseSBiZWxpZXZlIHRoYXQgdGhpcyBsaXRlcmF0dXJlIGRvZXMgYXdheSB3aXRoIGxvdCBv ZiBleGlzdGluZyBhbWJpZ3VpdGllcy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkkgdGhpbmsgd2UgbmVl ZCB0byBwYXJhcGhyYXNlIHRoaXMgc2VjdGlvbiBhdGxlYXN0LjxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+ Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaGFua3M8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlNhdW15 YS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD4mbmJz cDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg== --_000_TU4PR8401MB1248D8D8507CE55B62EF749994FE9TU4PR8401MB1248_-- From nobody Tue Aug 17 09:45:42 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E32353A2236; Tue, 17 Aug 2021 09:45:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -9.595 X-Spam-Level: X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=I+8bTwJL; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=GzoUcif+ Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yfM_lFUpDJ2O; Tue, 17 Aug 2021 09:45:32 -0700 (PDT) Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECD183A2231; Tue, 17 Aug 2021 09:45:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=37051; q=dns/txt; s=iport; t=1629218731; x=1630428331; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=4jNIQBKwjMX1/Te+ANceu9c3aJLGzgQd/jvGxmp7YNQ=; b=I+8bTwJLByFEP987eguC1Gjp9kHH4o0Eb2p0duUJbNwRRZL7uql0SA9/ A/bSKz7qqVCNCRPa6aJZAW1a3wPed9vSB25SERcuI6RA8NR98TZNERA3/ j68Mq5r5MojERnL2vz41591/+e2OVgRm+1XmppwFzI/fO1kCea3Sq6I71 s=; IronPort-PHdr: =?us-ascii?q?A9a23=3ABLwITBat3rP3Rph4KLnbwG3/LTA3hN3EVzX9o?= =?us-ascii?q?rInk78IeaOmrNzuP03asPNqilKBHYDW8OlNhOeetaf8EXcB7pCMvDFnEtRMW?= =?us-ascii?q?hYJhN9Qk1kmB8iIWk3jIbjhaClpVMhHXUVuqne8N0UdEc3iZlrU93u16zNaG?= =?us-ascii?q?hj2OQdvYOrvHYuHhMWs3Of08JrWMG11?= IronPort-HdrOrdr: =?us-ascii?q?A9a23=3Al4LMdqH3P4uQnlzqpLqFsZLXdLJyesId70?= =?us-ascii?q?hD6qkvc31om52j+fxGws516fatskdvZJkh8erwX5VoMkmsi6KdgLNhfYtKOT?= =?us-ascii?q?OHhILGFvAY0WKP+UyEJ8S6zJ8g6U4CSdk8NDSTNykBsS+S2mDReLxMrKjlgc?= =?us-ascii?q?KVbKXlvgpQpGpRGsddBnJCe36m+zpNNXB77PQCZf6hz/sCgwDlVWUcb8y9CH?= =?us-ascii?q?VAdfPEvcf3mJXvZgNDLwI76SGV5AnYqoLSIly95FMzQjlPybAt/SzuiAri/J?= =?us-ascii?q?iutPm911v1y3LT1ZJLg9Hso+EzQfBky/JlbgkEuDzYIriJaIfy5QzdZ9vfsG?= =?us-ascii?q?rCpeO85CvI+f4DsE85MFvF+ycFkDOQoQrGo0WSuWNwx0GT/PAQgFkBepV8bU?= =?us-ascii?q?UzSGqE16NohqAP7EoAtVjpxKZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5?= =?us-ascii?q?ACAYUh4bD30XklWqvoJhiKpbzP0dMeev309bJTaxeXfnrZtm5gzJilWWkyBA?= =?us-ascii?q?6PRgwHttaO2zZbkXhlxw9ArfZv0Eso5dY4Ud1J9u7EOqNnmPVHSdIXd7t0AK?= =?us-ascii?q?METdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHr4kd9aWvYtgF3ZEykJPOXBdRsn?= =?us-ascii?q?MzYVvnDYmU0JhC4nn2MS6AtPTWu4ljDr1Cy/zBrZbQQFm+oWEV4oKdSq8kc7?= =?us-ascii?q?jmst6ISeVrP8M=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D5CQDM5hth/4cNJK1aHQEBAQEJARI?= =?us-ascii?q?BBQUBghmBIzBRB3daNzGER4NIA4U5iGkDmjyBQoERA1QLAQEBDQEBNwoEAQG?= =?us-ascii?q?EYgIXglgCJTgTAQIEAQEBEgEBBQEBAQIBBgSBEROFaA2GQgEBAQEDEhEdAQE?= =?us-ascii?q?rDAEPAgEIEQMBAQEhAQYDAgICMBQJCAEBBAENBSKCTwGBflcDLwEOm1QBgTo?= =?us-ascii?q?Cih96gTGBAYIHAQEGBASBOgIOQYMjGII0AwaBOoJ+gnJTSAEBgmyDeiccgUl?= =?us-ascii?q?EgRUnDBCCYj6CYgEBAgGBJAQBEgE4CQ0JgmE2gi6DTmtEJgRAEQIELFVGFAo?= =?us-ascii?q?gFpVXiFeNQZIdCoMoij+UFQUmg2WLY5ctlhOMPpMvKYUHAgQCBAUCDgEBBoF?= =?us-ascii?q?3JGlwcBVlAYI+UBkOjiCDcoUUhUpzAgE1AgYBCgEBAwmHQ4JHAQE?= X-IronPort-AV: E=Sophos;i="5.84,329,1620691200"; d="scan'208,217";a="896576009" Received: from alln-core-2.cisco.com ([173.36.13.135]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Aug 2021 16:45:28 +0000 Received: from mail.cisco.com (xbe-aln-002.cisco.com [173.36.7.17]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 17HGjRRO028457 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 17 Aug 2021 16:45:27 GMT Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xbe-aln-002.cisco.com (173.36.7.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 17 Aug 2021 11:45:27 -0500 Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 17 Aug 2021 11:45:27 -0500 Received: from NAM02-SN1-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Tue, 17 Aug 2021 12:45:26 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Bpq/Jqu0BCYB5yOvmjcCdJGhETqo5AE/nCI3VnGofq+bVxR2qmRClqzLzLH9Hka3LeLqHc/3jb9AKGSZofmVIO466/B7b7uA2NBC+BvXQsl0oRf1jj3Dd7+sbEavlBimmvGsES0jvZc1Anqe4lfODiP8gpGS82TEpnzUyzYiHlPhzx8DQItsiyBc5o6vY59mh7TUEo3nu2wNztfsDenv+QXi9B+roH3NsKPwHMp9KUChX0cQrr3PqqFpck3IG1tdvPcJjoX9VVzeYM5wBUhv1FzCUttwwwv/dj7SwFJuGlBMXJlUv/+ETpCAuPkRRfbrliblprOpxrUvjR/3oRoGTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4jNIQBKwjMX1/Te+ANceu9c3aJLGzgQd/jvGxmp7YNQ=; b=eZbg8yTvKffSED1/c0TZc10f17+tIHrFtKUhaIeUNuG5oS6NCbGVTMLGV1qf3UELpirkdSKagZmw2yfsIxaPZ617R/q/CrGC0fA3Me4oq/3EJ3kJLbTntDdfCewlobeEdY9UatzL/wPd6n3QR7JYhidv2D3GMYBfLA9O61JnZP1EF5l70ZF8KaXvLd1+DfQXYD4JANu9TD2lLr6qek17EFPRMoZZjK3HtqIerm2K+W8DT7KGb3j0o+WJOfldauiLdA4KaFRf2QiBv1gMmpOe2fbqK/ZZunz0um0Fk88ub+noS0SPw4//a+ifUrYQyWdKiUTYiCQ2Aq4imkXeQC8RyQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4jNIQBKwjMX1/Te+ANceu9c3aJLGzgQd/jvGxmp7YNQ=; b=GzoUcif+GPELd9z71KdqFYMhAIPvm5ZXH8e1VCQqoo0cBN0G6csamFkETtHd1mlgmqc4GPN7gQFb6fcyCHrwmEIf4M4eRHZgmSeqIOMbBWtLRQb4qnwYkWAwee7RFN/ZsFGAIjEt/ynRcWFTptTng55GIdfwxQWHyHME3JkurrE= Received: from BYAPR11MB2726.namprd11.prod.outlook.com (2603:10b6:a02:be::19) by BYAPR11MB2598.namprd11.prod.outlook.com (2603:10b6:a02:cb::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.19; Tue, 17 Aug 2021 16:45:25 +0000 Received: from BYAPR11MB2726.namprd11.prod.outlook.com ([fe80::870:ae22:d043:5d97]) by BYAPR11MB2726.namprd11.prod.outlook.com ([fe80::870:ae22:d043:5d97%5]) with mapi id 15.20.4415.024; Tue, 17 Aug 2021 16:45:25 +0000 From: "Neeraj Malhotra (nmalhotr)" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-irb-extended-mobility@ietf.org" CC: "bess-chairs@ietf.org" , "bess@ietf.org" Thread-Topic: Few queries on draft-ietf-bess-evpn-irb-extended-mobility Thread-Index: AdeQ0SpvsCHKrZuwR5W3DmRfbwf3vQCZ47ngAAT4JgA= Date: Tue, 17 Aug 2021 16:45:25 +0000 Message-ID: <2B8A97CC-3709-4889-AA49-1F32BD7F7905@cisco.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/10.10.1b.201012 authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=cisco.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 95aac8e6-eb46-4bcd-d092-08d9619e69a2 x-ms-traffictypediagnostic: BYAPR11MB2598: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2726.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(39860400002)(376002)(346002)(396003)(366004)(136003)(38070700005)(86362001)(9326002)(4326008)(6486002)(6506007)(166002)(966005)(53546011)(8676002)(186003)(8936002)(478600001)(2616005)(36756003)(66476007)(54906003)(38100700002)(66556008)(2906002)(5660300002)(66946007)(71200400001)(83380400001)(64756008)(76116006)(296002)(316002)(66446008)(33656002)(6512007)(110136005)(122000001)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NXdyTnVSL2J4eTgvN2VFZmlsTUZ5d1BaenJaRDI5dzBNdDhkYVRLWVlVeURP?= =?utf-8?B?cW13eFB6TXpMYzdMdGd4bEc3Mm5tSGJydkt2Yyt0S1p6ditUek0yblU4MVp5?= =?utf-8?B?Yy9XRk00OUhBUkVNWEVyUnZXYmRDZzM2NDNPSDhPNEx5T2VaRVBCZ0hGeHRL?= =?utf-8?B?eUZiR1dXM1p3b1B2Q2VqdXpBZmdzVXVjSGdSaWlBZk9RSHFxVzNwT1lyM29t?= =?utf-8?B?SFU0UWNZcDlZNUdUVHRwem1jckZwZ01wdXRJTS84ODdGQTBIaGdwbTRSME1S?= =?utf-8?B?QnZzNWhQdlpIeWwvMlhqbEZtck82VUFabGQxVHpBVzVpSU1CaVBOdzVLRkho?= =?utf-8?B?OGd6eUNjMzBTUVRWMWpxMmx3Y2RGSm1jeGJJOU0yalZZbVBwb3dPYS96RDJj?= =?utf-8?B?c1RlTXBpS091TElrSWUrQitXM1RaekNGWWMxeFZoVThTblBIT0tITE04Sm1x?= =?utf-8?B?TlVEWVpTZDkvRDNnd1RTdDRMM3d6RTVWZjY2KzZaZ1piNWh0R0RGbDdqOWFr?= =?utf-8?B?cWcycktLYjVMbGE0K2dKYm10cWViNERrUVZEdnh0WWk2ZTZNYTh5a1lKck43?= =?utf-8?B?Ly9vUXBSRXNQRW03bW15WEdrd0JMTEVBT3pOaFhNQVpYMU5KN00xYXVYN285?= =?utf-8?B?d29wblNWcDQvOXZYeUw5dzVuaGFiTW1XVXdaQVFQTkN1dnlneUtBdWhmYTl0?= =?utf-8?B?NHovcEdycmFETkVpKy9kYkpyc29EZk9vR2N0SEpsdFRLWkdKWSszVzNmWUJ2?= =?utf-8?B?eCsyR1BtSFdla0E3elMxZkJyZStvU2xEdXF3UFh2SmFJZnYrdUVYU09TYlpS?= =?utf-8?B?RHBqaUtVeWVGVDQrK2FRWWE5UGFheWRsU3RUTmJsWmoyUXQ4ZVRlc3VrRlJ6?= =?utf-8?B?WURUSW1YbUxxQVI1NVlhQlFYM3VlRjNFZG9GUlJpQ2tobHpuWCtoK2hsM1l4?= =?utf-8?B?aHFtRFRya0lETWxtcmpFNjRjWlpuY0N4TjR6UjR3eHN4Q0RIaGI5RFNzdkJK?= =?utf-8?B?eFkxZVJNYmdmQlI4MHd2YUZCY3d1Q2MvNUJMYXVIdGlMN3hwMlBKVk83UXBk?= =?utf-8?B?NE5wS2pDdEpJYmg4U1FBQmx6SDZTVGRPM08wRmdhV0h5VTNoQW9IWGs3YXpO?= =?utf-8?B?NWc2NUc3Z0lpQ1dRc3loZHRZYnF3cWVvQlJOcU1mVGphYnhPNE90dHpmOWRS?= =?utf-8?B?UXdSeFRJQVpvUEJvazJRYVB1dVN1WjFOYWpSMmNmOWVnMEQzamRFaE9WYTNa?= =?utf-8?B?bmZwZWhjZXd2VzEwVjhGdXl2SjF1T1dmM1RtZ3g2aENOa3Zsa1JwUjMrbldn?= =?utf-8?B?NUdIMTZFaWRSeFIvNGRFb2JMZDJ5K3lPbGhjeE5XK0R4MGFOc1lYR2QycWdP?= =?utf-8?B?RTFxZ0t4QWVrNHlTUlRGZXpqL1JSZXE2RGt5bUhnTDl5NEs0ci9IKzVTV0xY?= =?utf-8?B?eDFrYUNZak1FWmh1MXlPYnkzcGN4ZWNuVEZIbHN0eVRtdHhFZlRpakxpRE9u?= =?utf-8?B?WVNGZm5aVFNTc0dvcjVSUVdsa3FMeEE2emxhMS9TZng1S2MzVzk5ZW45MitE?= =?utf-8?B?d2RkT2ZXRVVuaFhQd0RwY3paL1J6Qjl3S3RmVjZBV3dTSi9PV0daOXgrTXBS?= =?utf-8?B?ekJVYk9RSEdvS1ZlelZrUHRSNEVNSndIMWlKMHZsaGlydER6VzEvL0FMUFFi?= =?utf-8?B?a01CZ2x0MVdDTXBvd08wVFlzUmc4NjdoalAvSC9lMGJiMXlkU1dpMGVBQSsz?= =?utf-8?B?NXpVd3NJOHpKcDJCTXRQQXBqcGpvSEw4cFhPcFkrL0hscVpYS0RMdG9oVmNN?= =?utf-8?B?eGtYMW9FQnBrUzZqUnNDNklURExia3hMZm1pT3c4VVp6bmc0RGhRNkhjdlA4?= =?utf-8?B?Uk55OUFIa1QxNDdKQzBtKzU1ZDJybkJOclIvNUZLcWdxWXc9PQ==?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_2B8A97CC37094889AA491F32BD7F7905ciscocom_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2726.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 95aac8e6-eb46-4bcd-d092-08d9619e69a2 X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Aug 2021 16:45:25.2591 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Mdbr1p11iKrY0fo6rGj5cBGaPMa92XFtkMdC43TDhSV5s+C1n7QLTJDKfZD0sll+H5/xqDli2LxJdUN/Hux8mg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2598 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.36.7.17, xbe-aln-002.cisco.com X-Outbound-Node: alln-core-2.cisco.com Archived-At: Subject: Re: [bess] Few queries on draft-ietf-bess-evpn-irb-extended-mobility X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Aug 2021 16:45:38 -0000 --_000_2B8A97CC37094889AA491F32BD7F7905ciscocom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 DQpIaSBTYXVteWEsDQoNClRoYW5rcyBmb3IgeW91ciBjb21tZW50cy9xdWVzdGlvbnMuIFdpbGwg cmVzcG9uZCBieSBlbmQgb2YgdGhpcyB3ZWVrLg0KDQpUaGFua3MsDQpOZWVyYWoNCg0KRnJvbTog IkRpa3NoaXQsIFNhdW15YSIgPHNhdW15YS5kaWtzaGl0QGhwZS5jb20+DQpEYXRlOiBUdWVzZGF5 LCBBdWd1c3QgMTcsIDIwMjEgYXQgMTI6MjUgQU0NClRvOiAiRGlrc2hpdCwgU2F1bXlhIiA8c2F1 bXlhLmRpa3NoaXRAaHBlLmNvbT4sICJkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQt bW9iaWxpdHlAaWV0Zi5vcmciIDxkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9i aWxpdHlAaWV0Zi5vcmc+DQpDYzogImJlc3MtY2hhaXJzQGlldGYub3JnIiA8YmVzcy1jaGFpcnNA aWV0Zi5vcmc+LCAiYmVzc0BpZXRmLm9yZyIgPGJlc3NAaWV0Zi5vcmc+DQpTdWJqZWN0OiBSRTog RmV3IHF1ZXJpZXMgb24gZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5 DQpSZXNlbnQtRnJvbTogPGFsaWFzLWJvdW5jZXNAaWV0Zi5vcmc+DQpSZXNlbnQtVG86IDxhcGpv c2hpQGNpc2NvLmNvbT4sIDxqb3JnZS5yYWJhZGFuQG5va2lhLmNvbT4sIDxqZHJha2VAanVuaXBl ci5uZXQ+LCA8YXI5NzdtQGF0dC5jb20+LCA8c2FqYXNzaUBjaXNjby5jb20+LCA8bm1hbGhvdHJA Y2lzY28uY29tPg0KUmVzZW50LURhdGU6IFR1ZXNkYXksIEF1Z3VzdCAxNywgMjAyMSBhdCAxMjoy NSBBTQ0KDQpIZWxsbyBBdXRob3JzIG9mIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRl ZC1tb2JpbGl0eSwNCg0KUGxlYXNlIGhlbHAgbWUgd2l0aCBiZWxvdyBxdWVyaWVzLg0KDQpUaGFu a3MNClNhdW15YS4NCg0KRnJvbTogQkVTUyBbbWFpbHRvOmJlc3MtYm91bmNlc0BpZXRmLm9yZ10g T24gQmVoYWxmIE9mIERpa3NoaXQsIFNhdW15YQ0KU2VudDogU2F0dXJkYXksIEF1Z3VzdCAxNCwg MjAyMSAxMTozMCBBTQ0KVG86IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2Jp bGl0eUBpZXRmLm9yZw0KQ2M6IGJlc3MtY2hhaXJzQGlldGYub3JnOyBiZXNzQGlldGYub3JnDQpT dWJqZWN0OiBbYmVzc10gRmV3IHF1ZXJpZXMgb24gZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4 dGVuZGVkLW1vYmlsaXR5DQoNCkNoYW5naW5nIHRoZSBzdWJqZWN0IGxpbmUgYW5kIHJlc2VuZGlu ZywgUGxlYXNlIGlnbm9yZSB0aGUgcHJldmlvdXMgZW1haWwuIEFwb2xvZ3kgZm9yIG1peGluZyB1 cCB0aGluZ3NdDQoNCkhlbGxvIEF1dGhvcnMgb2YgIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1l eHRlbmRlZC1tb2JpbGl0eToNCg0KSSBoYXZlIGZvbGxvd2luZyBxdWVyaWVzIGFuZCBjb21tZW50 cyBhYm91dCB0aGlzIGRyYWZ0IOKAnGRyYWZ0LWlldGYtYmVzcy1ldnBuLWludGVyLXN1Ym5ldC1m b3J3YXJkaW5n4oCdLg0KUGxlYXNlIGhlbHAgY2xhcmlmeS4NCg0KPj4+PlNlY3Rpb24gaHR0cHM6 Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmIt ZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjENCg0KTVVTVCBiZSBhdCBsZWFzdCBlcXVh bCB0byBjb3JyZXNwb25kaW5nIFNZTkMgTUFDIHNlcXVlbmNlIG51bWJlcg0KICAgICAgaWYgb25l IGlzIHByZXNlbnQuDQpDYW4gd2UgZm9ybWFsbHkgZGVmaW5lIHdoYXQgYSDigJxTWU5DIE1BQyBz ZXF1ZW5jZSBudW1iZXLigJ0gPw0KDQo+Pj4+U2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmll dGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0 eS0wNSNzZWN0aW9uLTguMw0KDQrigJxNQUMgTXggd2l0aCBhIHNlcXVlbmNlIG51bWJlciB0aGF0 IGlzIGhpZ2hlciB0aGFuIG9yIGVxdWFsIHRvDQogICBzZXF1ZW5jZSBudW1iZXIgYXNzaWduZWQg dG8gYSBMT0NBTCByb3V0ZSBmb3IgTUFDIE14Og0KICAgbyAgUEUgTVVTVCB0cmlnZ2VyIHByb2Jl IGFuZCBkZWxldGlvbiBwcm9jZWR1cmUgZm9yIGFsbCBMT0NBTCBJUHMNCiAgICAgIGFzc29jaWF0 ZWQgd2l0aCBNQUMgTXguDQogICBvICBQRSBNVVNUIHRyaWdnZXIgZGVsZXRpb24gcHJvY2VkdXJl IGZvciBMT0NBTCBNQUMgcm91dGUgZm9yIE14Lg0KDQrigJ0NCkFzIHBlciByZmM3NDIzLCBpZiBl cXVhbCBzZXF1ZW5jZSBudW1iZXIgaXMgcmVjZWl2ZWQsIHRoZW4gdGhlIG9uZSBwdWJsaXNoZWQg d2l0aCBsb3dlciB2dGVwLWlwIGlzIHJldGFpbmVkLCBhbmQgdGhlIG90aGVyIG9uZSBpcyB3aXRo ZHJhd24uDQpXaGlsZSB0aGlzIHNlY3Rpb24gdGFsa3MgYWJvdXQgcHJvYmluZyBpdCBhZ2Fpbi4N ClRoaXMgc2hvdWxkIGJlIGNhbGxlZCBvdXQgaW4gdGhlIEludGVyb3Agc2VjdGlvbiBhcyB3ZWxs LCBmb3IgdGhlIGNvLWV4aXN0ZW5jZSBvZiBvbGQgcnVsZSBhbmQgbmV3bHkgZGVmaW5lZA0KDQpR dW90aW5nIGZyb20gIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvcmZjNzQz MiNzZWN0aW9uLTE1Og0KDQrigJxJZiB0d28gKG9yIG1vcmUpIFBFcyBhZHZlcnRpc2UgdGhlIHNh bWUgTUFDDQoNCiAgIGFkZHJlc3Mgd2l0aCB0aGUgc2FtZSBzZXF1ZW5jZSBudW1iZXIgYnV0IGRp ZmZlcmVudCBFdGhlcm5ldCBzZWdtZW50DQoNCiAgIGlkZW50aWZpZXJzLCBhIFBFIHRoYXQgcmVj ZWl2ZXMgdGhlc2Ugcm91dGVzIHNlbGVjdHMgdGhlIHJvdXRlDQoNCiAgIGFkdmVydGlzZWQgYnkg dGhlIFBFIHdpdGggdGhlIGxvd2VzdCBJUCBhZGRyZXNzIGFzIHRoZSBiZXN0IHJvdXRl4oCdDQoN Cg0KPj4+PiBTZWN0aW9uIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC42DQoN CuKAnCAgIGFuIGludGVyLW9wIHNjZW5hcmlvIHdpdGggYSBkaWZmZXJlbnQgaW1wbGVtZW50YXRp b24gY291bGQgYXJpc2UsDQoNCiAgIHdoZXJlIGEgUEUgaW1wbGVtZW50YXRpb24gbm9uLWNvbXBs aWFudCB3aXRoIHRoaXMgZG9jdW1lbnQgb3Igd2l0aA0KDQogICBSRkMgNzQzMjxodHRwczovL2Rh dGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzI+IGFzc2lnbnMgYW5kIGFkdmVydGlz ZXMgaW5kZXBlbmRlbnQgc2VxdWVuY2UgbnVtYmVycyB0byBNQUMNCg0KICAgYW5kIE1BQytJUCBy b3V0ZXPigJ0NCkhvdyBkbyB3ZSBleHBlY3QgdGhpcyBpbXBsZW1lbnRhdGlvbiB0byBpbnRlci1v cCwgYXMgaXQgbWF5IGV4cGVjdCB0d28gZGlmZmVyZW50IE1BQy1vbmx5IGFuZCBNQUMtSVAgYWR2 ZXJ0aXNlbWVudCBmcm9tIHJlbW90ZSBwZWVycyBhcyB3ZWxsLj8NCkNhbiB3ZSBwYXJhcGhyYXNl IHRoaXMgPw0KDQoNCj4+Pj4gU2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2Rv Yy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0 aW9uLTguOA0KDQrigJxGb2xsb3dpbmcgYSBob3N0IG1vdmUgZnJvbSBQRTEgdG8gUEUyLCB0aGUg aG9zdCdzIE1BQyBpcw0KDQogICAgICBkaXNjb3ZlcmVkIGF0IFBFMiBhcyBhIGxvY2FsIE1BQyB2 aWEgYSBkYXRhIGZyYW1lcyByZWNlaXZlZCBmcm9tDQoNCiAgICAgIHRoZSBob3N0LuKAnQ0KDQpE byB3ZSBuZWVkIHRvIGNhbGwgb3V0IHRoZSBtaXNjb25maWd1cmF0aW9uIGNhc2UsIHdoZXJlIGEg cHJvYmUgbWF5IGxlYWQgdG8gRFVQIHJlc3BvbnNlcywNCg0Kb25lIGZyb20gdGhlIChsb2NhbCBs ZWFybmluZykgYWNjZXNzIHNpZGUgYW5kIG90aGVyIG9uZSBhY3Jvc3MgdGhlIGZhYnJpYyAob3Zl cmxheSB0dW5uZWwpLg0KDQoNCj4+Pj4gU2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYu b3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0w NSNzZWN0aW9uLTEwLjQuMQ0KDQrigJx1bmZyZWV6aW5nIHRoZQ0KDQogICAgICByb3V0ZSBhdCB0 aGUgRlJPWkVOIGxvY2F0aW9uIHdpbGwgcmVzdWx0IGluIHRoZSByb3V0ZSBiZWluZw0KDQogICAg ICBhZHZlcnRpc2VkIHdpdGggYSBoaWdoZXIgc2VxdWVuY2UgbnVtYmVyLuKAnQ0KV2h5IGFyZSB3 ZSB0eWluZyBwcm9iaW5nIHdpdGgg4oCcdW5mcmVlemluZ+KAnSA/IEZST1pFTiB3aWxsIHR5cGlj YWxseSBpbmRpY2F0ZSBkcm9wcGluZyBvZiBmbG93cy4gUHJvYmluZyBjYW4gc3RpbGwgZ28gb24g aW4gcGFyYWxsZWwgPw0KQ2FuIHRoaXMgYmUgY2FsbGVkIG91dCBleHBsaWNpdGx5Lg0KDQo+Pj4+ IFNlY3Rpb24gIiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWll dGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xIiA6DQoi IFtJUDcsIE0xXSBpcyBsZWFybnQgYXMgYSBuZXcgcm91dGUgYXQNCiAgIFtQRTMsIFBFNF0gYW5k IGFkdmVydGlzZWQgdG8gcmVtb3RlIFBFcyB3aXRoIGEgc2VxdWVuY2UgbnVtYmVyIG9mIDAuDQog ICBBcyBhIHJlc3VsdCwgTDMgcmVhY2hhYmlsaXR5IHRvIElQNyB3b3VsZCBiZSBlc3RhYmxpc2hl ZCBhY3Jvc3MgdGhlDQogICBvdmVybGF5LCBob3dldmVyLCBNQUMgbW9iaWxpdHkgcHJvY2VkdXJl IGZvciBNQUMxIHdpbGwgbm90IHRyaWdnZXIgYXMNCiAgIGEgcmVzdWx0IG9mIHRoaXMgTUFDLUlQ IHJvdXRlIGFkdmVydGlzZW1lbnQiDQoNCklmIGEgaG9zdCBpcyBtb3ZlZCB3aXRoIHRoZSBzYW1l IE1BQywgdGhlIGZvbGxvd2luZyBpcyBzdGlsbCBiZWluZyBmb2xsb3dpbmcgaW4gY3VycmVudCBp bXBsZW1lbnRhdGlvbihzKToNCi0gRWl0aGVyICJNQUMtb25seS1yb3V0ZSIgb3IgIk1BQy1JUC1y b3V0ZSIgYWR2ZXJ0aXNlbWVudCwgdGhlIHNlcXVlbmNlIG51bWJlciBpcyBidW1wZWQgaW4gYm90 aCBjYXNlcw0KLSBPbiByZWNlaXZpbmcgc2lkZSwNCiAgICAgIC0gIHRoZSBzZXF1ZW5jZS1udW1i ZXIgaXMgcGlja2VkIHVwIGZyb20gIk1BQy1vbmx5LXJvdXRlIiBvciAiTUFDLUlQLXJvdXRlIiBh bmQgYXBwbGllZCB0byBNQUMgbGVhcm5pbmdzDQogICAgICAtIHRoZSBidW1wZWQgdXAgc2VxdWVu Y2UgbnVtYmVyIGxlYWRzIGEgd2l0aGRyYXcgb2YgIk1BQy1vbmx5IiBvciAiTUFDLUlQLXJvdXRl IiBmcm9tIHRoZSBpbmZlcmlvciAoZWFybGllcikgcHVibGlzaGVyDQoNCktpbmRseSBoZWxwIGV4 cGxhaW4sIGlmIHRoZSB0ZXh0IG1lbnRpb25lZCBpbiDigJxzZWN0aW9uIDQuMy4x4oCdIGlzIGNy ZWF0aW5nIHNvbWUgZG91YnRzIHJlZ2FyZGluZyB0aGUgd2F5IHRoaW5ncyBvcGVyYXRlIHdpdGgg Y3VycmVudCBzdGFuZGFyZHMuDQpUaG91Z2ggSSBkZWZpbml0ZWx5IGJlbGlldmUgdGhhdCB0aGlz IGxpdGVyYXR1cmUgZG9lcyBhd2F5IHdpdGggbG90IG9mIGV4aXN0aW5nIGFtYmlndWl0aWVzLg0K SSB0aGluayB3ZSBuZWVkIHRvIHBhcmFwaHJhc2UgdGhpcyBzZWN0aW9uIGF0bGVhc3QuDQoNClRo YW5rcw0KU2F1bXlhLg0KDQoNCg== --_000_2B8A97CC37094889AA491F32BD7F7905ciscocom_ Content-Type: text/html; charset="utf-8" Content-ID: <185BF1BF6A7F0A4C9B4CD292973E12DC@namprd11.prod.outlook.com> Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2 IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3Jt YWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGluOw0KCW1hcmdpbi1i b3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBO ZXcgUm9tYW4iLHNlcmlmO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxl LXByaW9yaXR5Ojk5Ow0KCWNvbG9yOmJsdWU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9 DQphOnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9y aXR5Ojk5Ow0KCWNvbG9yOnB1cnBsZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCnBy ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IkhUTUwgUHJlZm9y bWF0dGVkIENoYXIiOw0KCW1hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZv bnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6IkNvdXJpZXIgTmV3Ijt9DQpwLm1zb25vcm1h bDAsIGxpLm1zb25vcm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25v cm1hbDsNCgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1z by1tYXJnaW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6 MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCnNwYW4uSFRNTFBy ZWZvcm1hdHRlZENoYXINCgl7bXNvLXN0eWxlLW5hbWU6IkhUTUwgUHJlZm9ybWF0dGVkIENoYXIi Ow0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUtbGluazoiSFRNTCBQcmVmb3Jt YXR0ZWQiOw0KCWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0KcC5lbWFpbHF1b3RlLCBsaS5l bWFpbHF1b3RlLCBkaXYuZW1haWxxdW90ZQ0KCXttc28tc3R5bGUtbmFtZTplbWFpbHF1b3RlOw0K CW1zby1tYXJnaW4tdG9wLWFsdDphdXRvOw0KCW1hcmdpbi1yaWdodDowaW47DQoJbXNvLW1hcmdp bi1ib3R0b20tYWx0OmF1dG87DQoJbWFyZ2luLWxlZnQ6MS4wcHQ7DQoJZm9udC1zaXplOjEyLjBw dDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9DQpzcGFuLkVtYWlsU3R5 bGUyMQ0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIs c2Fucy1zZXJpZjsNCgljb2xvcjojMUY0OTdEO30NCnNwYW4uZ3JleQ0KCXttc28tc3R5bGUtbmFt ZTpncmV5O30NCnNwYW4uRW1haWxTdHlsZTIzDQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0K CWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0Kc3Bh bi5FbWFpbFN0eWxlMjQNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6 IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVtYWlsU3R5bGUy NQ0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJy aSIsc2Fucy1zZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21z by1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29y ZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBp biAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwv c3R5bGU+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1 cnBsZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkhpIFNhdW15YSw8bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+Jm5ic3A7PC9v OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+VGhh bmtzIGZvciB5b3VyIGNvbW1lbnRzL3F1ZXN0aW9ucy4gV2lsbCByZXNwb25kIGJ5IGVuZCBvZiB0 aGlzIHdlZWsuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlRoYW5rcyw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPk5lZXJhajxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD4mbmJz cDs8L286cD48L3NwYW4+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpz b2xpZCAjQjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGluIDBpbiAwaW4iPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj5Gcm9tOiA8L3NwYW4+PC9i PjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+JnF1b3Q7RGlrc2hpdCwgU2F1bXlhJnF1b3Q7ICZs dDtzYXVteWEuZGlrc2hpdEBocGUuY29tJmd0Ozxicj4NCjxiPkRhdGU6IDwvYj5UdWVzZGF5LCBB dWd1c3QgMTcsIDIwMjEgYXQgMTI6MjUgQU08YnI+DQo8Yj5UbzogPC9iPiZxdW90O0Rpa3NoaXQs IFNhdW15YSZxdW90OyAmbHQ7c2F1bXlhLmRpa3NoaXRAaHBlLmNvbSZndDssICZxdW90O2RyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eUBpZXRmLm9yZyZxdW90OyAmbHQ7 ZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5QGlldGYub3JnJmd0Ozxi cj4NCjxiPkNjOiA8L2I+JnF1b3Q7YmVzcy1jaGFpcnNAaWV0Zi5vcmcmcXVvdDsgJmx0O2Jlc3Mt Y2hhaXJzQGlldGYub3JnJmd0OywgJnF1b3Q7YmVzc0BpZXRmLm9yZyZxdW90OyAmbHQ7YmVzc0Bp ZXRmLm9yZyZndDs8YnI+DQo8Yj5TdWJqZWN0OiA8L2I+UkU6IEZldyBxdWVyaWVzIG9uIGRyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eTxicj4NCjxiPlJlc2VudC1Gcm9t OiA8L2I+Jmx0O2FsaWFzLWJvdW5jZXNAaWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+UmVzZW50LVRvOiA8 L2I+Jmx0O2Fwam9zaGlAY2lzY28uY29tJmd0OywgJmx0O2pvcmdlLnJhYmFkYW5Abm9raWEuY29t Jmd0OywgJmx0O2pkcmFrZUBqdW5pcGVyLm5ldCZndDssICZsdDthcjk3N21AYXR0LmNvbSZndDss ICZsdDtzYWphc3NpQGNpc2NvLmNvbSZndDssICZsdDtubWFsaG90ckBjaXNjby5jb20mZ3Q7PGJy Pg0KPGI+UmVzZW50LURhdGU6IDwvYj5UdWVzZGF5LCBBdWd1c3QgMTcsIDIwMjEgYXQgMTI6MjUg QU08bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3Nw YW4+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29s b3I6IzFGNDk3RCI+SGVsbG8gQXV0aG9ycyBvZiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0 ZW5kZWQtbW9iaWxpdHksPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpw PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdE Ij5QbGVhc2UgaGVscCBtZSB3aXRoIGJlbG93IHF1ZXJpZXMuPC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZu YnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj5UaGFua3M8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+U2F1bXlhLjwv c3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp Zjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8ZGl2Pg0KPGRp diBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRp bmc6My4wcHQgMGluIDBpbiAwaW4iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4gQkVTUyBbbWFpbHRvOmJl c3MtYm91bmNlc0BpZXRmLm9yZ10NCjxiPk9uIEJlaGFsZiBPZiA8L2I+RGlrc2hpdCwgU2F1bXlh PGJyPg0KPGI+U2VudDo8L2I+IFNhdHVyZGF5LCBBdWd1c3QgMTQsIDIwMjEgMTE6MzAgQU08YnI+ DQo8Yj5Ubzo8L2I+IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eUBp ZXRmLm9yZzxicj4NCjxiPkNjOjwvYj4gYmVzcy1jaGFpcnNAaWV0Zi5vcmc7IGJlc3NAaWV0Zi5v cmc8YnI+DQo8Yj5TdWJqZWN0OjwvYj4gW2Jlc3NdIEZldyBxdWVyaWVzIG9uIGRyYWZ0LWlldGYt YmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eTwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwv ZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5DaGFu Z2luZyB0aGUgc3ViamVjdCBsaW5lIGFuZCByZXNlbmRpbmcsIFBsZWFzZSBpZ25vcmUgdGhlIHBy ZXZpb3VzIGVtYWlsLiBBcG9sb2d5IGZvciBtaXhpbmcgdXAgdGhpbmdzXTwvc3Bhbj48bzpwPjwv bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkhlbGxvIEF1 dGhvcnMgb2YmbmJzcDsgZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5 Ojwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SSBoYXZlIGZvbGxv d2luZyBxdWVyaWVzIGFuZCBjb21tZW50cyBhYm91dCB0aGlzIGRyYWZ0IOKAnGRyYWZ0LWlldGYt YmVzcy1ldnBuLWludGVyLXN1Ym5ldC1mb3J3YXJkaW5n4oCdLjwvc3Bhbj48bzpwPjwvbzpwPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5Q bGVhc2UgaGVscCBjbGFyaWZ5Ljwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48 L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6 IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0O1NlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4xIj4NCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv ZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3Nl Y3Rpb24tOC4xPC9hPjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0 eWxlPSJjb2xvcjpibGFjayI+TVVTVCBiZSBhdCBsZWFzdCBlcXVhbCB0byBjb3JyZXNwb25kaW5n IFNZTkMgTUFDIHNlcXVlbmNlIG51bWJlcjwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsgaWYgb25lIGlzIHByZXNlbnQuPC9zcGFuPjwvaT48bzpwPjwvbzpw PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdE Ij5DYW4gd2UgZm9ybWFsbHkgZGVmaW5lIHdoYXQgYSDigJxTWU5DIE1BQyBzZXF1ZW5jZSBudW1i ZXLigJ0gPzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0 OyZndDsmZ3Q7Jmd0O1NlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5v cmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1 I3NlY3Rpb24tOC4zIj4NCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zPC9h Pjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xv cjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj5NQUMgTXggd2l0 aCBhIHNlcXVlbmNlIG51bWJlciB0aGF0IGlzIGhpZ2hlciB0aGFuIDxzcGFuIHN0eWxlPSJiYWNr Z3JvdW5kOnllbGxvdzttc28taGlnaGxpZ2h0OnllbGxvdyI+b3IgZXF1YWw8L3NwYW4+IHRvPC9z cGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVv dDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBzZXF1ZW5jZSBudW1iZXIgYXNzaWduZWQgdG8g YSBMT0NBTCByb3V0ZSBmb3IgTUFDIE14Ojwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZh bWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IG8m bmJzcDsgUEUgTVVTVCB0cmlnZ2VyDQo8c3BhbiBzdHlsZT0iYmFja2dyb3VuZDp5ZWxsb3c7bXNv LWhpZ2hsaWdodDp5ZWxsb3ciPnByb2JlIGFuZCBkZWxldGlvbiBwcm9jZWR1cmU8L3NwYW4+IGZv ciBhbGwgTE9DQUwgSVBzPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsgYXNzb2NpYXRlZCB3aXRoIE1BQyBNeC48L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyBvJm5ic3A7IFBFIE1VU1QgdHJpZ2dlcg0KPHNwYW4gc3R5bGU9ImJhY2tncm91bmQ6eWVsbG93 O21zby1oaWdobGlnaHQ6eWVsbG93Ij5kZWxldGlvbiBwcm9jZWR1cmUgZm9yIExPQ0FMIE1BQzwv c3Bhbj4gcm91dGUgZm9yIE14Ljwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxz cGFuIHN0eWxlPSJjb2xvcjpibGFjayI+4oCdPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkFzIHBl ciByZmM3NDIzLCBpZiBlcXVhbCBzZXF1ZW5jZSBudW1iZXIgaXMgcmVjZWl2ZWQsIHRoZW4gdGhl IG9uZSBwdWJsaXNoZWQgd2l0aCBsb3dlciB2dGVwLWlwIGlzIHJldGFpbmVkLCBhbmQgdGhlIG90 aGVyIG9uZSBpcyB3aXRoZHJhd24uPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPldoaWxlIHRoaXMgc2VjdGlv biB0YWxrcyBhYm91dCBwcm9iaW5nIGl0IGFnYWluLjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5UaGlzIHNo b3VsZCBiZSBjYWxsZWQgb3V0IGluIHRoZSBJbnRlcm9wIHNlY3Rpb24gYXMgd2VsbCwgZm9yIHRo ZSBjby1leGlzdGVuY2Ugb2Ygb2xkIHJ1bGUgYW5kIG5ld2x5IGRlZmluZWQNCjwvc3Bhbj48bzpw PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjoj MUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+UXVvdGluZyBmcm9tJm5ic3A7DQo8YSBo cmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlv bi0xNSI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9yZmM3NDMyI3NlY3Rp b24tMTU8L2E+Ojwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9y OmJsYWNrIj7igJxJZiB0d28gKG9yIG1vcmUpIFBFcyBhZHZlcnRpc2UgdGhlIHNhbWUgTUFDPC9z cGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5i c3A7Jm5ic3A7IGFkZHJlc3Mgd2l0aCB0aGUgc2FtZSBzZXF1ZW5jZSBudW1iZXIgYnV0IGRpZmZl cmVudCBFdGhlcm5ldCBzZWdtZW50PC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFu IHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGlkZW50aWZpZXJzLCBhIFBFIHRoYXQg cmVjZWl2ZXMgdGhlc2Ugcm91dGVzIHNlbGVjdHMgdGhlIHJvdXRlPC9zcGFuPjxvOnA+PC9vOnA+ PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGFkdmVy dGlzZWQgYnkgdGhlIFBFIHdpdGggdGhlIDxzcGFuIHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdztt c28taGlnaGxpZ2h0OnllbGxvdyI+bG93ZXN0IElQIGFkZHJlc3MgYXMgdGhlIGJlc3Qgcm91dGU8 L3NwYW4+4oCdPC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZu YnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhy ZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC42Ij4NCmh0dHBzOi8vZGF0 YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVu ZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC42PC9hPjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+ DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYW4gaW50ZXItb3Agc2NlbmFyaW8gd2l0 aCBhIGRpZmZlcmVudCBpbXBsZW1lbnRhdGlvbiBjb3VsZCBhcmlzZSw8L3NwYW4+PC9pPjxvOnA+ PC9vOnA+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5i c3A7IHdoZXJlIGEgUEUgaW1wbGVtZW50YXRpb24gbm9uLWNvbXBsaWFudCB3aXRoIHRoaXMgZG9j dW1lbnQgb3Igd2l0aDwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJh Y2tlci5pZXRmLm9yZy9kb2MvaHRtbC9yZmM3NDMyIj5SRkMgNzQzMjwvYT4gYXNzaWducyBhbmQg YWR2ZXJ0aXNlcyBpbmRlcGVuZGVudCBzZXF1ZW5jZSBudW1iZXJzIHRvIE1BQzwvc3Bhbj48L2k+ PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJz cDsmbmJzcDsgYW5kIE1BQytJUCByb3V0ZXPigJ08L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wcmU+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SG93 IGRvIHdlIGV4cGVjdCB0aGlzIGltcGxlbWVudGF0aW9uIHRvIGludGVyLW9wLCBhcyBpdCBtYXkg ZXhwZWN0IHR3byBkaWZmZXJlbnQgTUFDLW9ubHkgYW5kIE1BQy1JUCBhZHZlcnRpc2VtZW50IGZy b20gcmVtb3RlIHBlZXJzIGFzIHdlbGwuPzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5DYW4gd2UgcGFyYXBo cmFzZSB0aGlzID88L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZu YnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhy ZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44Ij4NCmh0dHBzOi8vZGF0 YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVu ZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44PC9hPjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+ DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj5Gb2xsb3dpbmcgYSBob3N0IG1vdmUgZnJvbSBQRTEgdG8gUEUy LCB0aGUgaG9zdCdzIE1BQyBpczwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+ PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsg ZGlzY292ZXJlZCBhdCBQRTIgYXMgYSBsb2NhbCBNQUMgdmlhIGEgZGF0YSBmcmFtZXMgcmVjZWl2 ZWQgZnJvbTwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9 ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgdGhlIGhvc3Qu4oCd PC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHByZT48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6 YmxhY2siPkRvIHdlIG5lZWQgdG8gY2FsbCBvdXQgdGhlIG1pc2NvbmZpZ3VyYXRpb24gY2FzZSwg d2hlcmUgYSBwcm9iZSBtYXkgbGVhZCB0byBEVVAgcmVzcG9uc2VzLCA8L3NwYW4+PG86cD48L286 cD48L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOmJsYWNrIj5vbmUgZnJvbSB0aGUg KGxvY2FsIGxlYXJuaW5nKSBhY2Nlc3Mgc2lkZSBhbmQgb3RoZXIgb25lIGFjcm9zcyB0aGUgZmFi cmljIChvdmVybGF5IHR1bm5lbCkuPC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxv OnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9y OiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNl Y3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tMTAuNC4x Ij4NCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tMTAuNC4xPC9hPjwvc3Bhbj48 L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdE Ij7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj51bmZyZWV6aW5nIHRoZTwvc3Bh bj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNr Ij4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgcm91dGUgYXQgdGhlIEZST1pFTiBsb2Nh dGlvbiB3aWxsIHJlc3VsdCBpbiB0aGUgcm91dGUgYmVpbmc8L3NwYW4+PC9pPjxvOnA+PC9vOnA+ PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7IGFkdmVydGlzZWQgd2l0aCBhIGhpZ2hlciBzZXF1ZW5jZSBudW1iZXIu 4oCdPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPldoeSBhcmUgd2UgdHlpbmcgcHJvYmluZyB3aXRo IOKAnHVuZnJlZXppbmfigJ0gPyBGUk9aRU4gd2lsbCB0eXBpY2FsbHkgaW5kaWNhdGUgZHJvcHBp bmcgb2YgZmxvd3MuIFByb2JpbmcgY2FuIHN0aWxsIGdvIG9uIGluIHBhcmFsbGVsID88L3NwYW4+ PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29s b3I6IzFGNDk3RCI+Q2FuIHRoaXMgYmUgY2FsbGVkIG91dCBleHBsaWNpdGx5Ljwvc3Bhbj48bzpw PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdE Ij4mZ3Q7Jmd0OyZndDsmZ3Q7IFM8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5lY3Rpb24gJnF1b3Q7 DQo8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWll dGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xIj4NCjxz cGFuIHN0eWxlPSJjb2xvcjojMDU2M0MxIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2Rv Yy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0 aW9uLTQuMy4xPC9zcGFuPjwvYT4mcXVvdDsgOjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mcXVvdDsgW0lQNywg TTFdIGlzIGxlYXJudCBhcyBhIG5ldyByb3V0ZSBhdDwvc3Bhbj48L2k+PG86cD48L286cD48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+Jm5ic3A7 Jm5ic3A7IFtQRTMsIFBFNF0gYW5kIGFkdmVydGlzZWQgdG8gcmVtb3RlIFBFcyB3aXRoIGEgc2Vx dWVuY2UgbnVtYmVyIG9mIDAuPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mbmJzcDsmbmJzcDsgQXMgYSBy ZXN1bHQsIEwzIHJlYWNoYWJpbGl0eSB0byBJUDcgd291bGQgYmUgZXN0YWJsaXNoZWQgYWNyb3Nz IHRoZTwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom cXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+Jm5ic3A7Jm5ic3A7IG92ZXJsYXksIGhvd2V2ZXIsIE1B QyBtb2JpbGl0eSBwcm9jZWR1cmUgZm9yIE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhczwvc3Bhbj48 L2k+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVy IE5ldyZxdW90OyI+Jm5ic3A7Jm5ic3A7IGEgcmVzdWx0IG9mIHRoaXMgTUFDLUlQIHJvdXRlIGFk dmVydGlzZW1lbnQmcXVvdDs8L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8L3NwYW4+PG86 cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPklmIGEgaG9zdCBpcyBtb3ZlZCB3aXRoIHRoZSBzYW1lIE1BQywgdGhlIGZvbGxv d2luZyBpcyBzdGlsbCBiZWluZyBmb2xsb3dpbmcgaW4gY3VycmVudCBpbXBsZW1lbnRhdGlvbihz KTo8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPi0gRWl0aGVyICZxdW90O01BQy1vbmx5LXJvdXRlJnF1b3Q7 IG9yICZxdW90O01BQy1JUC1yb3V0ZSZxdW90OyBhZHZlcnRpc2VtZW50LCB0aGUgc2VxdWVuY2Ug bnVtYmVyIGlzIGJ1bXBlZCBpbiBib3RoIGNhc2VzPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4tIE9uIHJl Y2VpdmluZyBzaWRlLA0KPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsgLSZuYnNwOyB0aGUgc2VxdWVuY2UtbnVtYmVyIGlzIHBpY2tlZCB1cCBmcm9tICZx dW90O01BQy1vbmx5LXJvdXRlJnF1b3Q7IG9yICZxdW90O01BQy1JUC1yb3V0ZSZxdW90OyBhbmQg YXBwbGllZCB0byBNQUMgbGVhcm5pbmdzPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsgLSB0aGUgYnVtcGVkIHVwIHNlcXVlbmNlIG51bWJlciBsZWFkcyBh IHdpdGhkcmF3IG9mICZxdW90O01BQy1vbmx5JnF1b3Q7IG9yICZxdW90O01BQy1JUC1yb3V0ZSZx dW90OyBmcm9tIHRoZSBpbmZlcmlvciAoZWFybGllcikgcHVibGlzaGVyPC9zcGFuPjxvOnA+PC9v OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPktpbmRseSBoZWxwIGV4cGxhaW4sIGlmIHRo ZSB0ZXh0IG1lbnRpb25lZCBpbiDigJxzZWN0aW9uIDQuMy4x4oCdIGlzIGNyZWF0aW5nIHNvbWUg ZG91YnRzIHJlZ2FyZGluZyB0aGUgd2F5IHRoaW5ncyBvcGVyYXRlIHdpdGggY3VycmVudCBzdGFu ZGFyZHMuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaG91Z2ggSSBkZWZpbml0ZWx5IGJlbGlldmUgdGhh dCB0aGlzIGxpdGVyYXR1cmUgZG9lcyBhd2F5IHdpdGggbG90IG9mIGV4aXN0aW5nIGFtYmlndWl0 aWVzLjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+SSB0aGluayB3ZSBuZWVkIHRvIHBhcmFwaHJhc2UgdGhp cyBzZWN0aW9uIGF0bGVhc3QuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8L3NwYW4+PG86cD48 L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPlRoYW5rczwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+U2F1bXlhLjwvc3Bhbj48bzpwPjwvbzpw PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp ZiI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+ DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_2B8A97CC37094889AA491F32BD7F7905ciscocom_-- From nobody Wed Aug 18 22:30:33 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 800473A00B0 for ; Wed, 18 Aug 2021 22:30:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -9.598 X-Spam-Level: X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=RyJAvlJR; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=m7m0jFuc Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7DuHrioUAr5M for ; Wed, 18 Aug 2021 22:30:24 -0700 (PDT) Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDAF43A00AD for ; Wed, 18 Aug 2021 22:30:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2645; q=dns/txt; s=iport; t=1629351024; x=1630560624; h=from:to:subject:date:message-id:mime-version; bh=NgV3hbBd334zHoMu6YUet7pkxp2GyE7/h+UjvsypGvQ=; b=RyJAvlJR4C7LeqOR3mT1Tc5lLCVsEWxSJLloYMwjQyC6XvP6Cn1vh/u/ PaPqSu5kBp9LbfbelR+4NOcJktmhlQpia38SwuFhJwj9Q80XEjD7/6h0Y iV8xoN7FWTSUJe3o9asyUUdVKUoSilJXIcCl5shbFIzVbmhZJrEvAXmpD Q=; IronPort-PHdr: =?us-ascii?q?A9a23=3ATttkgx+AsYLVf/9uWDnoyV9kXcBvk7T5IgBT7?= =?us-ascii?q?YAo2PpCcaWmqpLlOkGXpfBgl0TAUoiT7fVYw/HXvKbtVS1lg96BvXkOfYYKW?= =?us-ascii?q?0oDjsMbzA0tHMDDDlf0f7bmaiUgF5FEU1lot3iwLUlSHpP4YFvf6n2/5DIfA?= =?us-ascii?q?FPxLw1wc+/0AYXVyc+w0rPaxg=3D=3D?= IronPort-HdrOrdr: =?us-ascii?q?A9a23=3ADU21ta5fcApyx+f+OwPXwXeBI+orL9Y04l?= =?us-ascii?q?Q7vn2ZFiY1TiXIra6TdaoguiMc0AxhIk3I6urwRZVoIEmsuaKdhLNwAV7MZn?= =?us-ascii?q?ifhILFFvAG0WKA+UyuJ8SdzJ8n6U4IScEXY7ecYSkY/KTHCWKDYrEdKay8gd?= =?us-ascii?q?mVbJDlvhFQpG9RGsVdxjY8LjzePlx9RQFAC5Z8PoGb/NB7qz2pfmlSRtinB1?= =?us-ascii?q?EeNtKz6eHjpdbDW1orFhQn4A6BgXeD87jhCSWV2R8YTndm3aoiy27YiAb0j5?= =?us-ascii?q?/T8s1TiyWsl1M73a4m2ucJ+eEzQfBkTfJlbgkEvzzYJ7iJnYfy+wzd7tvfrm?= =?us-ascii?q?rC2+O83yvId/4DlE85OFvF+CcEH2LboW0TA7iI8y7BvZKrm72GeBsqT8VGno?= =?us-ascii?q?5XaR3f9g4pu8x9yrtC2yaDu4NQFg6oplW02zHkbWAdqqOPmwtqrQfTtQ0sba?= =?us-ascii?q?IOLLtK6YAP9kJcF5kNWCr89YA8CeFrSMXR/uxff1+WZ23Q+jAH+q3nYl0jWh?= =?us-ascii?q?OdBkQSsM2c1DZb2Hh/0ksD3cQa2nMN7og0RZVI7/nNdq5oiLZNRMkLar8VPp?= =?us-ascii?q?ZLfeKnTmjWBR7cOmObJlrqUKkBJnLWspbypK444em7EaZ4u6faWK6xJG+wkF?= =?us-ascii?q?RCNn4GJff+rKGjwyq9NVlVBw6du/22z6IJyYHBeA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DzDgD+6h1h/5RdJa1agQmCfDBRB3d?= =?us-ascii?q?aNzGIDwOFOYZFl2CFA4JTA1QLAQEBDQEBNQwEAQGEYwKCLgIlOBMBAgQBAQE?= =?us-ascii?q?SAQEFAQEBAgEGBIERE4VoAQyGWy4BATgRAQx0JwQbGoJQgX5XAy8BDp0xAYE?= =?us-ascii?q?6AoofeIEzgQGCBwEBBgQEgTYBAwICg3AYgjQDBoE6gn6EDYJshCMcgUlEgVi?= =?us-ascii?q?CMwGDTgIDgV8rgyCCLoY9ZgufXZ9eCoMoBYo6lC8SpnWWE4w/mF8CBAIEBQI?= =?us-ascii?q?OAQEGgXckgVlwFYMkUBkOkhKFFIVKczgCBgsBAQMJigEBAQ?= X-IronPort-AV: E=Sophos;i="5.84,333,1620691200"; d="scan'208,217";a="921047091" Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Aug 2021 05:30:23 +0000 Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 17J5UNVF018346 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK) for ; Thu, 19 Aug 2021 05:30:23 GMT Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 19 Aug 2021 00:30:23 -0500 Received: from xfe-rtp-005.cisco.com (64.101.210.235) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 19 Aug 2021 00:30:22 -0500 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Thu, 19 Aug 2021 01:30:22 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lnPcwEmr7i6kzyijDYf1LOo/kZ4rJm6lYa0+JS1ZQ3gSmDcJnBLSLDipnp3aZUCDrOAwMNpS9ABThlKLosUi00aQgvAzokNzaMPUIRzg08nwUIy6wdQf6fkwvNNWOnn//G8FnFaBTl5rOgH/yunmdgAp/URZRGNS61mH5fEONY2gVgawbk0/zbvVNp6iaFDgn2VZqG474Cpb87ETRQNNtrj+Td8fysBDlrisyuYYIAlWM0r4vGNPbuWmDI5cz+6Wvvk8ZReucIPEPFXZaZYVbT0bRJ9viCqVFW/uAed9kJBkhkJdXgpKYJ9lasZG72r7sgfzwRhHXR719EhEuYYNlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MWU9ue3IJMuCIRYcx+vQ7ZS0VffBa7kscnzFuOk8uHg=; b=OpMW91L0n6bXHPeVTtCl5Cju2eC8V7HC0D95tKnAPDr1AJPNcVOgOjogTdidHL69pV6q+D1kyAEcXO9tQBLZoqlug4TvbuG3J+tT0vuI0H6BTCR7PQGD9RK02ABNIRICO30GK5y5/F1U97eQnqZPTFO0dknEfbo64VcXHTwZ9iSpfXFuk5dsZGB1PPTL+5X0WGOafuy6LeJRjzB4dfQ7eUTBS/JzoIkycUE0RRl74nU0m2J/PQUeT5n+d23OY6z1wViljeULyWqfHhq/P4YnRsCtD6ylc57RmvY/VAB2CcJIcNL7J4NYIl8r9SKoRP/dsG/hcF6yeEOjEw8cu/bMeg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MWU9ue3IJMuCIRYcx+vQ7ZS0VffBa7kscnzFuOk8uHg=; b=m7m0jFucRmRJRC/Y9ekunB5RLBUvuWJ8Z3gRP1ttoGUnrghSsQ1KUqD8h55nq2Jkc6vB/QbElgCxRDM7BP9NS0A5CJhKC/Dimqn/0Uf5ntTUXsVBVLmx5Uc74GSOdj9hToOeav5wLbcXSIc3goH3uECoYiTxCSZUhr4vIsONtv8= Received: from BYAPR11MB2725.namprd11.prod.outlook.com (2603:10b6:a02:c5::25) by BY5PR11MB4225.namprd11.prod.outlook.com (2603:10b6:a03:1ba::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.16; Thu, 19 Aug 2021 05:30:20 +0000 Received: from BYAPR11MB2725.namprd11.prod.outlook.com ([fe80::40c8:5409:cc2b:f8be]) by BYAPR11MB2725.namprd11.prod.outlook.com ([fe80::40c8:5409:cc2b:f8be%5]) with mapi id 15.20.4415.024; Thu, 19 Aug 2021 05:30:20 +0000 From: "Mankamana Mishra (mankamis)" To: "bess@ietf.org" Thread-Topic: Meeting minutes uploaded Thread-Index: AQHXlLs+H5omEq3f+U2RwlEpu6b5HQ== Date: Thu, 19 Aug 2021 05:30:20 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cisco.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 30850e28-75c3-4e8a-e2e2-08d962d26fc6 x-ms-traffictypediagnostic: BY5PR11MB4225: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:2582; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: vTq63Z9jjRoq2B7WXPs3sncyAho5kvSB+3utrV2jo66qbj2u0qix+jj4UJL6q+tdfY5nIfiq34/VgBtqcCpOq3A05h9NzDk+5vG47BzNX5k5OZ7U6J5O0cFV/EVPPYmXq3rvIETOwejYD75XUjzeWGPF0M4h5CkGhFM1g0bKeJuAd6yiegn6dZuj2c/8creVGVOOi+YYcKZMxDic/ReeSsgJpB3F79jvmcdl05MGMvB+zq0lexGZZBOVYg8x/M3E3b7aotmX+WYRYZTnYn2Ygq7qe005C1WO7aDk1gFAHPKvi9NChmll6nzhnUOiEBsXvL64xPoSaaBXd7/xSTCqEcskqinNhMKNEDj5+0+3kqPyS/3fuL9SSprY73SFovdNrL6dTpZ6noXab8r7hqwQOOJsfBuYiCtLmz4HmukYExq5871VcrFR24+XGpDJAU31hejdCspXSqXAw+t6oqRnlwM7iAtnXO2y356lwjFx8OudJXZEKbSDIyIot9tGArT2gYBENWbto4XFmzyU/3grXIrpHKRf9g9HHbDkFUTyZRbZcoFn0UUR/0adIQz7zdddL2UeF7AwmqQakRNXGtsD3N1MWsA92ILctAujO+zSgFf/aiDkZES5R0nT07xVgAmjPXbaxWEFbWRdwbWPsP5oq7BA0tylhbDIWZXJQ9MFhtePbEWbTP+7etT12A1WKptPQdafeZLCdjxVclNAzDDwc7bl0gK8M1oLF2Ju6i8WGH96zVpQ48it45mbF2eCJ+PBZLS2BUqkXxDiPe36nYzR+7uVvsSdF7io9S2UXan0/n0= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2725.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(39860400002)(366004)(136003)(376002)(346002)(396003)(86362001)(316002)(6506007)(8676002)(66446008)(38070700005)(7696005)(52536014)(3480700007)(966005)(5660300002)(7116003)(478600001)(9686003)(8936002)(66556008)(71200400001)(6916009)(38100700002)(186003)(558084003)(122000001)(66946007)(64756008)(76116006)(66476007)(2906002)(33656002)(166002)(55016002)(4743002)(26005); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?NGXJDCzXSsUTWLsMD7Wll145oxNsqtPraawk0euXTZocDJhFsAEXb8nb9vkO?= =?us-ascii?Q?JQ5tMM4jUknsLvBHj1ufZ1iqXsT8KdJ6WHDtAQh1kOksM/P4L8OlekYZpfGW?= =?us-ascii?Q?T3pGNMF5wT2qxBgKhcjp8NN7qGFXl5WurjITSdcc1acyG+9ylDZYPy+7Jov1?= =?us-ascii?Q?8oGKIX+yq8d1oJRGSRhVRer7+whgT05kezr6Z8AdDFmD2UYnHFGr9bbyGAQf?= =?us-ascii?Q?8r/a/1zG1qp3A72NnjAj0Q4ZgWbaDliDn3MPw0yPyrBj4VG5VySAhS4OZVr7?= =?us-ascii?Q?9jgSACBbYKDUE7FxDpem0XM5rDEZe64CMThHwTt2aIZ2f/1wJW+6YnCFTBJ8?= =?us-ascii?Q?KP6fkF2M0CGZdhl4COdWDzPF6+hTZX2ATPtFK+Kkq31GsMrUqWTucbpFKn7i?= =?us-ascii?Q?SrbPFLBuVBsMnAqiU5Au9D7ZT5+Hc8soH9Wisg4cizw1M7vLH5aPg2CZzAwF?= =?us-ascii?Q?Pn1hBlZFC63CMIOJJQlYc+KE/nnpkfzdKuAWIXfECQz1OvlRkp6lup7l4Nn4?= =?us-ascii?Q?bGBu83i0RNt1N7jfri5dvH9La2VhOoFRkOpGsEBNWrcMSjeB741m22V40O2N?= =?us-ascii?Q?lzroLuwAocWFSidxO0CdN2SzOdae2NXqgk2sBrVdO6hH8/iQ4uX7kQu5PRPt?= =?us-ascii?Q?stWonNcVO0XWyYVceADLz5P885I81egwROZygK7GY+6v3qjmQOjROsxeGKBB?= =?us-ascii?Q?pdrzrZnJT5J1yN2Ad7DdsBmROB+fKvlH++iDWJHFgqVEoO/+6HOvWUHl5hCT?= =?us-ascii?Q?ihSfFc2IDyxG+4cMfvGgxBoW4t4Oyci+0qZ/FcUe+9LylGxsLq8UGpikhwVX?= =?us-ascii?Q?AIeMLOTUR5rZjEX8n06y0u4SkcNFTkFlOcrN13D1ux4xOG0FqyniUquGryV3?= =?us-ascii?Q?+GsRZqvuCfrcXlJfS6BWmTCMoD6V1WeI4mqbuFoswN+QONP2u6BweRKPi0GT?= =?us-ascii?Q?h0c3XVVdX8bylm4MY6lgo3jQghJfPItn//3mEFcQgtgpZoHfSrSkttig3TSs?= =?us-ascii?Q?1lrlXnHHiBTsDiaj1YB5WJGU12by4T7wYnFtKMpoCPestrw90tHgES9MzMMG?= =?us-ascii?Q?g3uWNM7X0bteEul4FpbEk7CwC3TYv8/0ZjAkSwjHVBCjuNT9Pujsz07gGE0V?= =?us-ascii?Q?oRyMb3LIrWFSrTOCgtotuEUSvjnM6aG4b4yMG/CLi6/wma5yaDBrf4JnvNiU?= =?us-ascii?Q?nu7iu1afcFFopht21g27Y4CdmyL0Cx86RwNZ5J+0wXHNU3byxqzAzVenxxhs?= =?us-ascii?Q?ZYN0TfPc+2302J0XDNm675VR3HqdFXOOVnlYnqYfr5YYHvuzS2yxw4edvS4D?= =?us-ascii?Q?D1JcxL9EtL6dNIBf2B3jKYdc5NchyyD21rVExrpAPmjzgQ=3D=3D?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_BYAPR11MB2725F97E4C359624678D6CC9DFC09BYAPR11MB2725namp_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2725.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 30850e28-75c3-4e8a-e2e2-08d962d26fc6 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 05:30:20.6735 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: dmeM7VnGResNgjAoNFS+oXK+v0Pq34Ihdv05s4uulmL0TNhGxxPPSvMgX5ReT/GSsjJIHBN/AATqiX/QWJ7sdw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR11MB4225 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com X-Outbound-Node: rcdn-core-12.cisco.com Archived-At: Subject: [bess] Meeting minutes uploaded X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 05:30:31 -0000 --_000_BYAPR11MB2725F97E4C359624678D6CC9DFC09BYAPR11MB2725namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable All, Meeting minutes uploaded for IETF 111 https://datatracker.ietf.org/meeting/111/materials/minutes-111-bess-00 Mankamana --_000_BYAPR11MB2725F97E4C359624678D6CC9DFC09BYAPR11MB2725namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

All,

Meeting minutes upl= oaded for IETF 111

 

https://dat= atracker.ietf.org/meeting/111/materials/minutes-111-bess-00<= /span>

 

 

Mankamana

--_000_BYAPR11MB2725F97E4C359624678D6CC9DFC09BYAPR11MB2725namp_-- From nobody Thu Aug 19 04:51:47 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24D263A0F09; Thu, 19 Aug 2021 04:51:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.538 X-Spam-Level: X-Spam-Status: No, score=-2.538 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sVEwFkogf3Xz; Thu, 19 Aug 2021 04:51:38 -0700 (PDT) Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A97323A0F0A; Thu, 19 Aug 2021 04:51:37 -0700 (PDT) Received: from pps.filterd (m0134424.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17JBnk4H006780; Thu, 19 Aug 2021 11:51:36 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : content-type : content-transfer-encoding : mime-version; s=pps0720; bh=9M/Tc6USVfCjgBgb3iPr3cLFwEF6jcWn5wAT04UIS6U=; b=FgQW3AgcM5V47XtrjxfdoZ4I0i5bWpTSQF1aoNYKe+he0a0M9XMRN9UO6RhFT30oxCMm klLgP1VuN05r/83HP5cQsiKSYf+dwNArJTKwTidGZdvZ0Xe945MtWSflr1vi8bauruha ApA1GThEqY9tBWrbUFDyqWJ+kDtGhwwm9EpQn5TeAo1LicAXfB82hnd1vwb+9+lqMSgg ZAM7F1hhZYe5CAh8JsrMRJLnH8HbL/Nwxo7g7r/fapBudzwhNr35Fqzlw99ATL96pVj2 yQXlNwqVDFoIabw2bIzprY3iD5NSH3zykrC90x5rc3d5FuBlxDzzofcxg8b8IlIXXamf 9A== Received: from g2t2353.austin.hpe.com (g2t2353.austin.hpe.com [15.233.44.26]) by mx0b-002e3701.pphosted.com with ESMTP id 3ahgy4at7a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Aug 2021 11:51:36 +0000 Received: from G9W8454.americas.hpqcorp.net (g9w8454.houston.hp.com [16.216.161.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g2t2353.austin.hpe.com (Postfix) with ESMTPS id 9FBA177; Thu, 19 Aug 2021 11:51:35 +0000 (UTC) Received: from G9W8453.americas.hpqcorp.net (2002:10d8:a0d3::10d8:a0d3) by G9W8454.americas.hpqcorp.net (2002:10d8:a104::10d8:a104) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 19 Aug 2021 11:51:35 +0000 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (15.241.52.11) by G9W8453.americas.hpqcorp.net (16.216.160.211) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Thu, 19 Aug 2021 11:51:35 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=f6V2PzOxNBeNqy8+Lgc5RezvM94C9P2+jE74+fDhvkDgvOc1kFG/h7/4moSBBP9YMjEU1hJ364Oi8aWSFzUYP2WluwgBE18kBQDchx7pdjdMqlFPqi7GyludQWtJZciXplnhIKNOLT2x4o9W+leDkYJamZbc38mI2OS9dU46Qn48b2O/anQ7uXOeucJixvGbID/PBNOIpjm0n5Xp1VZxJWSpfjyMPYqSnX1KgmLtBSXhJHuQ191loheziOnc/6q2TjxAwx4t0ZAwJalEloc+oBBgFBj8BWVAy1lc9lk9AjEhYfQiqKYByo+8bWy9sLvBS+CgkClIymFjd3VW2IPz2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yMLDFqxxpi1Vm/G8VPN9+7f0oElOg8gbfATY2miKh5Y=; b=DYdwF7Djc0JSj0nKL5BZnU89uqFsPPlajK8FmEtBntnwgSigkQZWogkGJ9Uemg8wTZwhG2qwEIudUj8msrVYyKuCJUMX1zCvKYIFXAwp7kaupGHb0UrBB9t87BMZmnu8fO5n5y8hmUCgwH85sNJ0EA2RCyXulQvIT04V5bR1GMKZujgRM8UJ0608b5fBR5goCrKLC4Zbk7yPD/qPdrztE/smUlfu7AziQrnSLK4k75LGGHBdLFD2tdw9cJLWhM40DRFTfs4ZusK5MxalaRItbVlhs5XKS5HfxAuK74CfLikzWDZs8YSlaZS9RebU/8WbpFI7+NI0bAhWP/nkBEfdog== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7715::21) by TU4PR8401MB0335.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7717::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.24; Thu, 19 Aug 2021 11:51:34 +0000 Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca]) by TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::7571:ca1a:b701:efca%11]) with mapi id 15.20.4415.024; Thu, 19 Aug 2021 11:51:34 +0000 From: "Dikshit, Saumya" To: "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWw== Date: Thu, 19 Aug 2021 11:51:34 +0000 Message-ID: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: de52eb24-4ad0-4299-ab48-08d96307b174 x-ms-traffictypediagnostic: TU4PR8401MB0335: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: DdBTjLCK/s3w6Ux2kIWNnxaz90GsepBGjUPu0t70INiTFx+0mPoCOZk20axPAKNbRvbOpJ6ck037Id3x8QCNTLEjNu5Hnm2p9Yl2ozz27QOM8ZyxY3U+b7eekotX25u77+a1IOEVsJkD8gszxyIwaRzzERhjdsXaMdd0EXAFyivad5aHapYRurKZhPzAW/ngRY4aepszMFP/loLPUF6SWg9c2IcuHpDON6ZduCGbmUdgeB1fA7vEt5FROcBBrSdNbLruYHd9ktIO38dgx8FjbVPgvoNwHW+55SVeBh0YAAqfM9F+7Hu7E4gMxeiPZuGuMaLgGY/t6qXCoBNNXP+zjOVhwLTlFjCz40LjVQTHqOOi/RMigyFfodaSZkz3qOF4ZjsTYVepa7RFu7vdMO3YP/2RgLTn4FsRTYOBRit1RAs7euCzL0VhvZv2OzbL9zFIkhJjO+CJAy6hEJj2Aeyb70tCIqgcFkNx3IC8lRT7cPallL4DsYqsIFHomA1Bkr+KDwTypkq+gBjin/v+yW/efpOWHvokDL8WNy7OVMg2k+NcxaWDvzvNJFd0lJS0oqWwC/q2rbDAHSiK/vM1oWa99rx6QCvDi5oLPWnXh8jsqse6jWPA4B5L+lihh+igJWKQ+yY/L36mxpCKlSDOgSeVAN5K0HzCbmcj/np4QL54b+nM2odGZ8XSnfv0lr3Lc0rmQVJyT7ze8FhcHJMYryNiaX1VHQMYWb0vyGBb3STfLX42SHAbeWV1JgQIqhc3ew/bH2n62fdvJsBaRjOuImOH6FSJ6NWfyj2Cst1h+G0y4i1DR4NBc7mxakyP40byXQ4sAEeu08GE0itayN8Pzjw7Ug== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(66556008)(64756008)(55236004)(6506007)(66446008)(66476007)(9686003)(4326008)(7696005)(53546011)(66946007)(52536014)(26005)(508600001)(76116006)(186003)(71200400001)(5660300002)(966005)(8936002)(33656002)(83380400001)(316002)(66574015)(2906002)(110136005)(122000001)(38100700002)(38070700005)(55016002)(86362001)(8676002)(450100002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?0wkYYOPoeYA4bmRXusqfJ0VQIjPpwqm2NrXhz7qjjVw5seXKJKGMhaPWq3YM?= =?us-ascii?Q?y10nZ3OCnmdu7YCfv0M4uB8vaBR2h396vx1QipaQIisKNN6FY/ufm/jHI6nS?= =?us-ascii?Q?E0YQnEQeTqtl3WFTX6HFjeYtAJeAQKh9ri49ZNQBi7BcA0JeJc5mcaCDdspQ?= =?us-ascii?Q?eqh2UmPmD7icFjDgyuZgA1wyxrH1djxVGSHXSMCnxCkBMf35sP1N56n9uScQ?= =?us-ascii?Q?leuPqKr+nBlb9ECwvx7scwbgIjFKys0SQyltcg357RHho9m69kAEXLmAeN58?= =?us-ascii?Q?ARsyMsBSSd66ei5MNhepGEEOLV3aEv5w2hoiyfqyjNsZmnQfNyJirH0OLZpe?= =?us-ascii?Q?A0+weG4m/1ov2laUqcOmz0bkfpMi7wZYm1LCYT2fTKGCepaJ/+l4gcaYv3K5?= =?us-ascii?Q?sMVIl5DJvxih7xrDcSIrbkBjbOeQulj9ehVlmtjmF0mzB+VGAPYd5Cv4NHZf?= =?us-ascii?Q?2FJEPp4SFARMaRhi4qCMFY4kWwyX+7YerAxNEDIir1xFCXk93m+Z7em1Sk95?= =?us-ascii?Q?sSNmEzPzGG93q1x4EbtA5y85OMHQBTzNVRzCZpbry+eqNJocVl3W83fwqZk3?= =?us-ascii?Q?eThkkiBngOFNFfzKlc/lnUqUe8GQuWuOfet0JYownweFHOBOKefJWx2ujVtS?= =?us-ascii?Q?H9JFhBGll0rUf9fEe2I3kJJ8jsizPSwTt2wlg4LyQg8Pe/3CgMVc6rd+fzB3?= =?us-ascii?Q?YHs3HCYo0EwB8HVzHLZk3u8b/zd6DSiMgb6Bm8RxQBwUe7+LEZgiCR1S/K83?= =?us-ascii?Q?y5d4B1LGWhA9ZuOvozjUqh57yr1q/rCMve/qRrQyNMwUd7yp0jXNbsKIs/76?= =?us-ascii?Q?eul/U4+d7av9c5SvBBhZoLhErMEYQOiyngL4tgfTK+P/VGxA60VjJ3zgooPn?= =?us-ascii?Q?D1eMhLQzJ7++HdaM/qmwKdvMwci/OqA3DDQp9NhmfpmhDLuFg6OiwBHu3JBn?= =?us-ascii?Q?qxsyssX199rcGPmabaTQdRBXuIfE4DposHBC79cXgT8JWKTuGZwSazZbi2iV?= =?us-ascii?Q?QFuGYuV/+gOt5tX93dKrOREu+E7L+nMcmYYXcb0WGEvYVr5xINZS2jbN9OwZ?= =?us-ascii?Q?B5xlZ2RGTgkEwlq+LqIKgPNnC6+DHweQDxmVLRonZlC27y1ZVAK6d/nlbxve?= =?us-ascii?Q?xsVr7bkuXqrZ/vYsR5VIe2oqR4ardanQc3I8tQk/q7+LmJviC6x1gjyno3WK?= =?us-ascii?Q?2SewhAU6ZQ7DnRZ2+Opkd2gVKlOHvyRrUkZWtdFSAXATMMCLgEbNjxas9qtH?= =?us-ascii?Q?pmlpSdtC9bwcQDTrsJRUvytfRe/ydDcimnx9TNGG4QuyfW/hNYPgn96q8zrv?= =?us-ascii?Q?ydvMBFQQlnwaVeNn7K6h5x01?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: de52eb24-4ad0-4299-ab48-08d96307b174 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 11:51:34.1610 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 4rDQ9PJ1MtVwgiJ0YGhbu/tNCdxDYU92zOfWO3PLu58UqASYw2+qELyCDszGdJ+A/l4/sPBEch0dG8nV390VAA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR8401MB0335 X-OriginatorOrg: hpe.com X-Proofpoint-GUID: tc64zKfLti5pHmB5Dx8s1V5fYW6MhI8r X-Proofpoint-ORIG-GUID: tc64zKfLti5pHmB5Dx8s1V5fYW6MhI8r Content-Transfer-Encoding: quoted-printable X-Proofpoint-UnRewURL: 5 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-19_04:2021-08-17, 2021-08-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 adultscore=0 clxscore=1011 impostorscore=0 priorityscore=1501 malwarescore=0 lowpriorityscore=0 suspectscore=0 mlxscore=0 bulkscore=0 spamscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108190068 Archived-At: Subject: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 11:51:44 -0000 Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://data= tracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario:=20 All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF.=20=20 This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,=20 packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials.= =20 Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram.=20 Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably.=20 Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein,=20 it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2=20=20=20=20=20=20=20= =20=20=20=20=20=20 | | |=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 Firewall _1 | Firewall_2=20=20=20=20=20=20=20= =20=20=20=20=20=20=20 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/=20 There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02=20 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2=20 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/=20 _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess=20 From nobody Thu Aug 19 07:17:05 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 585B53A1B58; Thu, 19 Aug 2021 07:17:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.352 X-Spam-Level: X-Spam-Status: No, score=-2.352 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wg_-BTv1l91x; Thu, 19 Aug 2021 07:16:58 -0700 (PDT) Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2133.outbound.protection.outlook.com [40.107.236.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AA943A1B54; Thu, 19 Aug 2021 07:16:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GS0f4Z2JPCgkAu6XIf/6byZ0lYXpD4ErXcyj/xoE/pwuBGgm7GUhsbwQdXsTzKq7ZIEan01cJQOgUT7z0gtRJIRVOofknRwNTZo7n0LibC1YCgsG+eslmj7UarBNWmrCBz5LtGd9Lmyf/LUMhiulecOUfYkauh601HZn5pz1J7QnWzJHTB1q5MxLBY7Izmy8XpWQzrNqCo6QLV+K+2rlArNurnAvOnceFCcP4QKHHtmpzyxQaRldRXdTBEe4+NtNzSPkIBLac/k/dXihKu1qqcwnh1U9BGPJ9lxh7TAWKPqpbljPmRw2hI8werZ1FDN2D3B4K123+PsMFPgdA52RHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=i9jypAFU5E+rF0LUut6kdGAFNDI40Q01ABouwibw3X8=; b=AfTT+r7FM4MQw4INupvBD3UlEzr4xpyt4GItz2t+F7SvBlajM/+KSCRA7DEv6NKREIPgy4LT558n4ypD9T9PiSObJ145Jn9Z/ZpcqREDKV3zWM3rhF9wi7On4jHcIutN1rrlf15q9C5eS9euB6ld9zkuTJ6dfxw2T41ZPaA6hg5TxSFbVUKD3VBKixoxPCb2hIxRTTXbtGrBM6/hW5AqjTSixH+0N5CJbBvBfLjMc7AfcCCC/wF7Uu7XIID2GYAAQSIV92yI1d9JO3Nnob2eeS9E0F3C1f+IKHvffk1Hx+jOOkn4jyFnjaDr2JvUWcpCYUnuJ0r5wBJdUHxqt+u+vA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=i9jypAFU5E+rF0LUut6kdGAFNDI40Q01ABouwibw3X8=; b=qg+YTIg50Xk4i/jUyPDw6LS1Hc1+hAWOBIkWI50ByqzC9FhV8dgom8HEoYzp8eoQ5nPUUl/la4VHm+zzkRei3tIN6G1vt61Ap7B3wkxBJuUvx3NhCRpL86VTEip7kMiG/Hm9sDMpcWnp3pbxiSsv4BKtrYBrmQDGDSbRAJiEMOo= Received: from BY3PR08MB7060.namprd08.prod.outlook.com (2603:10b6:a03:36d::19) by BY3PR08MB7060.namprd08.prod.outlook.com (2603:10b6:a03:36d::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.19; Thu, 19 Aug 2021 14:16:51 +0000 Received: from BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d]) by BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d%5]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 14:16:51 +0000 From: "Rabadan, Jorge (Nokia - US/Mountain View)" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7O Date: Thu, 19 Aug 2021 14:16:51 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=nokia.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: f481162d-e321-4a97-a76c-08d9631bfd73 x-ms-traffictypediagnostic: BY3PR08MB7060: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8273; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR08MB7060.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(39860400002)(346002)(376002)(136003)(396003)(52536014)(6506007)(4326008)(66446008)(5660300002)(478600001)(186003)(66476007)(66556008)(76116006)(2906002)(9326002)(8936002)(66946007)(91956017)(53546011)(7696005)(26005)(64756008)(8676002)(55016002)(66574015)(86362001)(38100700002)(316002)(83380400001)(33656002)(296002)(966005)(166002)(110136005)(71200400001)(122000001)(38070700005)(9686003); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?y5D5t7GAQZHA8gHFgnFmaA6RszkdgKPcehuJSR0e27sX8Qxr1cKavQPn?= =?Windows-1252?Q?xEhUxWBgA1AZsyx68itKq13h08sRp3RzreQm6bUJUeW+FWol5jKgOgaQ?= =?Windows-1252?Q?iaF0TZDa00vfUU4CVu50VOxHiTapSHPXeQNGfadxsfxqco0pLaWgtTLG?= =?Windows-1252?Q?uKm9gOypRuD/JG/kjYuHrC6OoFVdbW35dMmt9sCvi2j5p0xbGGQgcLKF?= =?Windows-1252?Q?ot9xqVRcOe0I63YgkjkFb2e74bARGPQnqN5RkEkEbJBrSxDuj+rPhEG4?= =?Windows-1252?Q?Si1JNt+tzuGY/t8bVgjrQn2YVZeg4EFWP/W8WL/PZU3oXd6QaLaOCZpC?= =?Windows-1252?Q?1srZRgGnuckQjoHJc5xMKnMrUj4Szw3c2b+6KHHBtM2wehad8TwoCHmL?= =?Windows-1252?Q?ITNg5QFhQziniyXRc81875D879595tDDFCYC6j5g5rg24im66H8KL58N?= =?Windows-1252?Q?1JMw3/9LfSnm1LK9TM8aHaC870VLUmTQ3f23w2P5Msdy2pPQYMK/BMqk?= =?Windows-1252?Q?nLCa5oKOMf6K8JCC+ya4C8FsXGn5KLUAPQ6tTFrpb8ajg/uGjkqk7KKn?= =?Windows-1252?Q?BUK7tnpNF9AcAhlv9/Q+q7y+Pn66RfkUCtTQco2VIqg7ZbJL9+2ohvm8?= =?Windows-1252?Q?JF5AsP4RXXppwdtlss2Cj5Q5NadSf9296HXPH4gpO/3n+PFrChR7GmH6?= =?Windows-1252?Q?nrrQI/8OXI218sN0cQRZLgtu68TR92Sb9t8BcA5a0cwO7CCdZVBLgAU0?= =?Windows-1252?Q?ICDWy1298BFHkrzRawUrBgSwMTiofih54nvPwYZRWlBudWZ4uMEUZYqx?= =?Windows-1252?Q?TmLh5a9ObBEgXxeGY8fdqaq0p0tefphxw/8GNqeezTzl531g02/T2BCw?= =?Windows-1252?Q?rFt+Fw0/+A6li4jKfrHO7EQpXsU+4fq5jD+y4Y/74BaYUxt7N/vgdtOj?= =?Windows-1252?Q?LFezbSVVOeeNI93NFDl0rjzCUbyeGr92y0iDuU5AA0GRZ06ljSJsy8fh?= =?Windows-1252?Q?HM+oceg0AqHXc+pJbPA9zg9rRx18XgGb8VlAw2FQK4BNQSqgFvozlvR0?= =?Windows-1252?Q?m7T7yqrH01E4uFYEAcWLbZguPUuuDyoPaB0w19qeylCtFKe1RG+b5NRq?= =?Windows-1252?Q?ymFKRkx0ZIfIqT5/Nil43WWm2HYFayk1Z/CIlNky1vq02Pz0C83I3+f+?= =?Windows-1252?Q?En0wPaR98fsTY3ZPSDmYduyaybSE2mQJ1YbVZJUYNwimckfInVOO1Ds+?= =?Windows-1252?Q?UJktAIdDqdE8agDxHtTJKVAEpSEv+uAJDsa+7OPIGldaaJLB42IyYxcF?= =?Windows-1252?Q?dh3TuH3keYUcSHd72RFAean07Y9MSVk2dO/MSjyyol6LYPTAmSo4cpS8?= =?Windows-1252?Q?PjpE+YkYzjtIz7UxahgG7g/msctq/qOB2plQoxmgqHCLurTi3u+vBY+f?= =?Windows-1252?Q?+fJL5e0kIfXX8t+s/y2pJQ=3D=3D?= Content-Type: multipart/alternative; boundary="_000_BY3PR08MB706044C8A3572A624DFD1E51F7C09BY3PR08MB7060namp_" MIME-Version: 1.0 X-OriginatorOrg: nokia.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BY3PR08MB7060.namprd08.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: f481162d-e321-4a97-a76c-08d9631bfd73 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 14:16:51.5962 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: cD3cU/IW09GivnyrKJHXoAyNMxJVpLa3+JicfdNSAczfyBElnvzOco6bOeGebF3GwoGDPh1t9Yj94VJCrbT5OA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR08MB7060 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 14:17:04 -0000 --_000_BY3PR08MB706044C8A3572A624DFD1E51F7C09BY3PR08MB7060namp_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don=92t see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows =91static= =92 MACs that are advertised with the sticky bit set. You can configure MAC= F as static in the two leaf nodes. There is no mobility procedures for sta= tic MACs, hence forwarding comes down to the local selection on each node. = In the implementations that I know, the local static MAC will be preferred = over the EVPN MAC/IP route with the static bit, hence again you will have t= he behavior you want.. and again, only in your example with two directly co= nnected leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org , draft-ietf-bess-evpn-df-election-framework@ietf.o= rg Cc: bess@ietf.org Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://data= tracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= ) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_BY3PR08MB706044C8A3572A624DFD1E51F7C09BY3PR08MB7060namp_ Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable

Hi Saumya,

 

To be clear, your query has nothing to do with the two documents you refe= r to. In fact I don=92t see any issue related to multihoming.

Given that in your example host-1 and FW-1 are directly connected to the = same leaf, and host-2 and FW-2 are connected to the same leaf too, I can se= e your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same all-active ES, I assume local-= bias behavior as in RFC8365 (seems you are using VXLAN as data plane). Host= -1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case of failure, the behavior= will be as per your description. Note that a third leaf with a local host = will do aliasing to both, but since it seems you only have directly connect= ed leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows =91stat= ic=92 MACs that are advertised with the sticky bit set. You can configure M= AC F as static in the two leaf nodes. There is no mobility procedures for static MACs, hence forwarding comes down to = the local selection on each node. In the implementations that I know, the l= ocal static MAC will be preferred over the EVPN MAC/IP route with the stati= c bit, hence again you will have the behavior you want.. and again, only in your example with two directly = connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.c= om>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-be= ss-evpn-fast-df-recovery@ietf.org>, draft-ietf-bess-evpn-df-election-fra= mework@ietf.org <draft-ietf-bess-evpn-df-election-framework@ietf.org>=
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery<= br>
I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt

A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_BY3PR08MB706044C8A3572A624DFD1E51F7C09BY3PR08MB7060namp_-- From nobody Thu Aug 19 07:57:00 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22E543A1DF0; Thu, 19 Aug 2021 07:56:59 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.537 X-Spam-Level: X-Spam-Status: No, score=-2.537 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gMZerwKLDwFw; Thu, 19 Aug 2021 07:56:52 -0700 (PDT) Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A72F3A1DEF; Thu, 19 Aug 2021 07:56:51 -0700 (PDT) Received: from pps.filterd (m0134425.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17JEnKLS003809; Thu, 19 Aug 2021 14:56:50 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=XzJ/V1tMnJuKin3ax3YzNuR1H/GfxWnwR+b/QpOY9+g=; b=ZTRcBx1r9hmXUbZQ650cAJ1NUTpWuO5PuN2kqd7cvBvMi7/letzNR5U6QJ5+svw6ge2z 0JFzx29cUX4LyduhnhhT4Bq7n+l68I/C3YdLU16BI2IeN3IvSQaOhvGzYc1soJlPvghX m6dYNsG1fr7hIL57FEDaOJoMKlu8HepYSzkg6cv46I9TYXYuBIy8Nag12NN92GZjNM44 hL8ypmcOdF32iax9iJX5+xa6uWnhi/U9AO1pbAIQeBkyn/2o6ryE3cyRDRRIsgVjxDgU WqzOYduOBejpJl6wmSrqAJuknXxzeo6keRNZotIUfarSvtAYs0fciBDS/ZqiP3390ucG tw== Received: from g4t3426.houston.hpe.com (g4t3426.houston.hpe.com [15.241.140.75]) by mx0b-002e3701.pphosted.com with ESMTP id 3ahfe0vus7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Aug 2021 14:56:50 +0000 Received: from G4W9121.americas.hpqcorp.net (exchangepmrr1.us.hpecorp.net [16.210.21.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3426.houston.hpe.com (Postfix) with ESMTPS id B77AF4E; Thu, 19 Aug 2021 14:56:49 +0000 (UTC) Received: from G1W8108.americas.hpqcorp.net (2002:10c1:483c::10c1:483c) by G4W9121.americas.hpqcorp.net (2002:10d2:1510::10d2:1510) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 19 Aug 2021 14:56:49 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (15.241.52.11) by G1W8108.americas.hpqcorp.net (16.193.72.60) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Thu, 19 Aug 2021 14:56:49 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AW5PcsKbUOLJXnMzR1lP9GPbQhi7K/0yuI5BPK2c5qPNe5Ht3btdASSxLoEsmekpDLyxO/AK1JsXnlxNMI9NkBeevDeaLpcmbyt/7it/BApmCpFAV6sa6nU3v61CMGC/YPnqTnPa/e2auYP/3qb4O1jE6HNBXz091J0L0DhzpjhQ1/fBKx+4BXkvNxbLXZkK4a4vs+7fR+mwbOZU/zrDn1TRN89//f/GxaeJtGImHEQk0/+BoOw0Yq9T6tmTWQDaJrlph81s/8e1DQhR7gUvuwIP7KgApSfF/4GuoF8VTv2E+VjARe6BbpyRIKUw9ktk8n7zgSk0NhKBQPh5Mv5HKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ocIoQtBNbz3yV/9fMHiHnFqSqv+eCkxqAGWKW+w0s9c=; b=PWkodcmv5Nb17eWVP4AJpN6q7XVOQtB3jI09qVGa6Uz7Z54JNYaQ7nHp2UUvMoAdWA/3GXM+71QWW5mtVS/uD1S+iYwWo4E2M9+qulzsNFDRq+bZK2k4et9GfDlq4WD5/xBceS5F9WRuayYHw5JJycuCwvnLjEXphTFHTZLapzl4eOBIQ9JHrpfL60+SAWXlxmnsaXKLVuQNSTLEIIQZ5SPw3EL1FuNXZExOao5FMoz8Qm5dI/v30gL7qhAzdUWe3zxiISpzRKNiV0s0v3GszYgOIhPxhnRD0Wfe1ZdK1iGfP0+hIJjACpt70uudKkt6eE9+voWMCd8YAlJbT65j7g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7514::15) by CS1PR8401MB0648.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:750b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.18; Thu, 19 Aug 2021 14:56:47 +0000 Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c]) by CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c%10]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 14:56:47 +0000 From: "Dikshit, Saumya" To: "Rabadan, Jorge (Nokia - US/Mountain View)" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SA= Date: Thu, 19 Aug 2021 14:56:47 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 55fea43b-3378-408e-edf8-08d9632191b3 x-ms-traffictypediagnostic: CS1PR8401MB0648: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(39860400002)(136003)(396003)(366004)(346002)(376002)(66946007)(76116006)(5660300002)(316002)(2906002)(9686003)(55016002)(66476007)(4326008)(38070700005)(66446008)(64756008)(66556008)(166002)(83380400001)(8676002)(8936002)(52536014)(478600001)(66574015)(53546011)(33656002)(186003)(26005)(86362001)(55236004)(6506007)(296002)(7696005)(966005)(38100700002)(110136005)(122000001)(71200400001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?Aw3+amh1b9UwfQlSn2vMJ1/E8ktQJ0VtV1vWajWQxWxhO9l7mZFG/WoA5vYS?= =?us-ascii?Q?ta9jmlQ+pAhvru9ANiTllHg1NZPJ+Y19aTUyXHq4ABfoDOk/WjL1m5A/ge0+?= =?us-ascii?Q?VqMUfmlRtfZg6Ajr4lPV41gMctwlT/sSDNZFnvIlhz6ejVdku/jcFONbu093?= =?us-ascii?Q?9ytu/R4I1mBE/7DzupvqIenL7XjnIf5yrJzRkdduhLg6u1oOK82lA/Nn7mCl?= =?us-ascii?Q?tNrfM+xuGN9e3YW492kMW43yZ8/aMuVOnORqfA0TDtqvo99hHYztvZBPFG5Y?= =?us-ascii?Q?Xw09Vv56ieaDIcts6Pp2f+OckS45UmVkPHv1tozPuDN2cMPs8jD7pQy+NskU?= =?us-ascii?Q?denQp5il867dq8FAQl3Kc6KXBwvxZNm0j2fsG78BcpoKxiU3YDCpxJaWzlgk?= =?us-ascii?Q?OiWV3xJTZx8Erpdp7UWnkzeMWmJHfffmstYbgiNafFPcW8RZFtfjpUXC4kFm?= =?us-ascii?Q?rKELSc51mwrcr3g9D8a4kHMwEf+tWSkf+nDeV1R7RP5BgHhRBmQ5zvKa+s3u?= =?us-ascii?Q?vbTydIEqVoWiqZYACvQHZDSL/hUtLCubV5e2STridCjmb/CmIJYoNhls6gH9?= =?us-ascii?Q?d6bfzHQEdQOdaaM2Q0mHkhAkCknFxG3oQHKme/eLDnAxvZYNmwGE0OAaiilX?= =?us-ascii?Q?ZPT4DfMexkl2Evcc6iFbxVfCo8MvPeaAlGBwGsAZuLefBZFjcs2uuTbIENpe?= =?us-ascii?Q?K5M9JWeq3u0SG1ay7AcZoEWqoOD4elM6eHAtO7gW1I8daTnTNwC8OOhfC81s?= =?us-ascii?Q?aOU6v+SIpDv45jm14i7j+p3mlbeuyvqBI9M7uGyubyWEwyPXi2F4bOLPLW7T?= =?us-ascii?Q?NOirqxlYsVfGQ63F+qvqxPhEWjJZ/ggYQUkcSu85qe0o+Lt5ZTfgJZAUJJpa?= =?us-ascii?Q?wGu7CgsNurWJrdc43toA51crp4ymdbKsZYmFV8zYh9ua1HfJs2pWgzkUuk8N?= =?us-ascii?Q?6ddVnhoSG6yAx39oRJuCAi9c62d2qsgrsp/crO8K1zqrhbQTdIe7SwmybkxF?= =?us-ascii?Q?lxiXJsGqgDnh7ekJvnj1VfWoHVSr68TpKrLf40NrQzgtEdw3K16vGLsfFMzH?= =?us-ascii?Q?o8svZd+lvKlOMMdqLiNB0sJJVOudXRA8/LHH/6+G/tXXPjB5SefY49LT/WJY?= =?us-ascii?Q?O4t46tBpHZtJ4cdfeS24RqAddylaq+l5RDMFXZ5fMDeqCrcEbr/aN2mfSun9?= =?us-ascii?Q?e+jOxNHFaDE9KWLsS3jutz2poHYHm2NBB1vpAqL/wBSeJ2xHuAqVY5U2UPGz?= =?us-ascii?Q?ya8OBy6deLJeFyoT7WGSY49zh8+11aMvJ4/EnSQJ93VVXmEY8BXJhEwuwlYx?= =?us-ascii?Q?XjcWgIYxNvupypktd0iL8og2?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_CS1PR8401MB123794D686B4006BDC54679A94C09CS1PR8401MB1237_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 55fea43b-3378-408e-edf8-08d9632191b3 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 14:56:47.8045 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: OTMGJo6webOC4uiyNgB23uCfKLCGkMybF1iDk/aF6VDWDkavmZqWdxmzkaI5macqIkuJYzNgw+FOUOAQ5KPFIA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CS1PR8401MB0648 X-OriginatorOrg: hpe.com X-Proofpoint-ORIG-GUID: wWsIrvrSGeTUfCWpDuUGxrFtQg57ll0b X-Proofpoint-GUID: wWsIrvrSGeTUfCWpDuUGxrFtQg57ll0b X-Proofpoint-UnRewURL: 14 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-19_05:2021-08-17, 2021-08-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 adultscore=0 lowpriorityscore=0 phishscore=0 mlxscore=0 mlxlogscore=999 clxscore=1011 impostorscore=0 bulkscore=0 priorityscore=1501 spamscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108190084 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 14:56:59 -0000 --_000_CS1PR8401MB123794D686B4006BDC54679A94C09CS1PR8401MB1237_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That's the reason it would be good to have two DFs for the {ESI, Bridge-dom= ain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don't see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' = MACs that are advertised with the sticky bit set. You can configure MAC F a= s static in the two leaf nodes. There is no mobility procedures for static = MACs, hence forwarding comes down to the local selection on each node. In t= he implementations that I know, the local static MAC will be preferred over= the EVPN MAC/IP route with the static bit, hence again you will have the b= ehavior you want.. and again, only in your example with two directly connec= ted leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-= bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_CS1PR8401MB123794D686B4006BDC54679A94C09CS1PR8401MB1237_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Thanks a lot for a prompt reply Jorge.

 

Well I missed drawing the Host(s) behind the remote = Vtep (PE) assuming that it will not make any difference (except aliasing as= you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broadcast packets like ARP request= for the firewaill credentials ? ARP request (MAC_F) should to sent to the = local vtep, which should act as a DF.

The hairpinning of ARP request to remote DF (over WA= N), should be avoided. That’s the reason it would be good to have two= DFs for the {ESI, Bridge-domain} in this scenario.

 

>>>> In the= implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route with the static bit, hence ag= ain you will have the behavior you want

The static-mac approach has an issue, when the local= firewall goes down, there is no organic way to prefer/plumb the MAC_F publ= ished by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, Jorge (Nokia - US/Mountain Vie= w) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do with the two documents you refe= r to. In fact I don’t see any issue related to multihoming.

Given that in your example host-1 and FW-1 are directly connected to the = same leaf, and host-2 and FW-2 are connected to the same leaf too, I can se= e your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same all-active ES, I assume local-= bias behavior as in RFC8365 (seems you are using VXLAN as data plane). Host= -1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case of failure, the behavior= will be as per your description. Note that a third leaf with a local host = will do aliasing to both, but since it seems you only have directly connect= ed leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows ‘= static’ MACs that are advertised with the sticky bit set. You can con= figure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, hence forwarding comes down to = the local selection on each node. In the implementations that I know, the l= ocal static MAC will be preferred over the EVPN MAC/IP route with the stati= c bit, hence again you will have the behavior you want.. and again, only in your example with two directly = connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org= /doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-b= ess-evpn-fast-df-recovery

I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_CS1PR8401MB123794D686B4006BDC54679A94C09CS1PR8401MB1237_-- From nobody Thu Aug 19 08:06:02 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9A213A1E82; Thu, 19 Aug 2021 08:04:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.352 X-Spam-Level: X-Spam-Status: No, score=-2.352 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YrsMVrRlxPma; Thu, 19 Aug 2021 08:04:38 -0700 (PDT) Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2139.outbound.protection.outlook.com [40.107.237.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABB923A1E84; Thu, 19 Aug 2021 08:04:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ECEOyqv8J03qfI/g9DVAqak7CNvjza66Q7fkifpjjfmzj9pv3sDadsmVYAtoUnq6YO8HMjPfqSbcRVoaV1OgX4ZCm1EeN4HlnKtlzonR8odbh3pGo1ptMMpRJvBTBH+mrSM4IGMkggY6xnMTwuJMf3h4m7lJ7w/Pwy03WdK+PN6NpBP9jkRjheSodZHkw3QbxbpXLcsAegFB/r2qM4OQKCcJJ0gYMvNb7rPxp5SaVu0RiN9vrilnZa4sgLM8HHEsIo92AZh6yHvRpjXiA7AMNqvVglkWtCR5kDewMEcTqG5Tdm7p/RcfUIMjL+Vug4fU3o8h/ZvOm3/Y8+QrOmIppA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=78dFyZZLtjuwF0Vzah6Rwk0zMK4EvOYmEam0GhrzLTw=; b=UFb4mdnCSjZ2JQRVNSMgh2C0LYQqmWYynTe5CgkeGLrJVOqY2F6ANwMwwzIQsGnje8vkQRsXkVyZbR0d1GOGOx97URCKYMtNy3uJYz9BhJkdA2yokbtNfCaOV3HwpoPjznRXiqCvQOmvde+T43mCz/XOcw5YLwhRdAM1XBTiWol0FnMk7FCHR8ok5Su7J/fP+axmTbaMz/IEoDzROcHbyScEzePi6jqLYVr09NyohbLvtxwrX6+oFeBzwQyHUrkMvBtDd0K/WtJKnKx84t8ALJu8exIHL10QDUa1n4r+zZtBf3OkzBTlsTPGkvtfVn2PKIisF+dxRo5aagVg3wlsng== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=78dFyZZLtjuwF0Vzah6Rwk0zMK4EvOYmEam0GhrzLTw=; b=XkFnP8sqP3AX1bZQefFrFk4L7069onqwtK0RkyFM5MIYwL91LIioRok3s59avmlZXHMQw8ZEhL+Ikj9f/UJz15tnjp74rs+d+wNdJq9VFx15F4DmjYubGhcVpr+jKvW2Wym5UKxK0wJ7HMFTUbFkBOM0hltr13WWi2Qoz5CQ7v4= Received: from BY3PR08MB7060.namprd08.prod.outlook.com (2603:10b6:a03:36d::19) by BYAPR08MB4200.namprd08.prod.outlook.com (2603:10b6:a02:f2::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.19; Thu, 19 Aug 2021 15:04:34 +0000 Received: from BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d]) by BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d%5]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 15:04:34 +0000 From: "Rabadan, Jorge (Nokia - US/Mountain View)" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlw== Date: Thu, 19 Aug 2021 15:04:34 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=nokia.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 58fba773-b234-44e9-66b3-08d96322a79e x-ms-traffictypediagnostic: BYAPR08MB4200: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR08MB7060.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(39860400002)(136003)(366004)(396003)(66556008)(64756008)(66476007)(26005)(66946007)(7696005)(91956017)(55016002)(66446008)(53546011)(9686003)(76116006)(38070700005)(122000001)(8936002)(6506007)(5660300002)(52536014)(4326008)(478600001)(8676002)(966005)(66574015)(83380400001)(166002)(110136005)(316002)(71200400001)(296002)(186003)(86362001)(33656002)(2906002)(38100700002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?b3upznasD9H3Imm5StbugkJqt/FPSxSMiAgwhL/oaSuLnW0e1/cNQzzd?= =?Windows-1252?Q?YqC82hpvdVUU9tCIdPvJ7IfxCX7cNkV9fZMRwlZZo+qQUd27nZvdSZ6h?= =?Windows-1252?Q?FMc+u6Kv5K9ooTowjccOvrll3wIfORT6LQjdxxyo8+end0EXiduWdJm5?= =?Windows-1252?Q?hx9MWbRr9+u2NxsKBDB3hcndcb0K1uT7vLlcSYVDu1geXn7CV2Qh9xqI?= =?Windows-1252?Q?8KRXD/rJmwE41f5jrxZcV+bYhSAp2GZjdHLOMpiVC6jkHbU1hi28epac?= =?Windows-1252?Q?AZAIEoaN4TMvaD6Z0hVN7maXg/lQIcznQ6jvCx7KhXamsnBojF6FTZsg?= =?Windows-1252?Q?9cd1VlRd92i7H41UDzyuaIO8rIVAvfxg5YEf56d5ZxaUmawD2DourYM9?= =?Windows-1252?Q?m5dRbxTnxJyilp4zcvHjwzayZYFfj9t7INwQUFOMgdKgXaaTIkoN/dqf?= =?Windows-1252?Q?U9EBkpMni3ez2qJDQvIM8kfi1UbaV99oa29XKFEFvxONdiAA2Eqp9puw?= =?Windows-1252?Q?U5YEkPDdRW1Lb+0eqrwVK2lE8JlF6wd5iQ/6VQ1Gn0xFrVUjc3NZyVBK?= =?Windows-1252?Q?Ug1kITTLG9gFzBnWktjHZooq7SlGCorv4iLLmrLSeP4KihMKgMkEx57U?= =?Windows-1252?Q?NbQwOo7VMaNzfMNDEwyyhByB7pWAbwnwKdvLc/qrkh0FL9EnbUuDAHYA?= =?Windows-1252?Q?o/X3o+58P0fGhvtDmMAaI3TwiOhJ9yOgfsBS9KyNZJDkUjNQhIx9Dpx+?= =?Windows-1252?Q?7Fn4o4Cy/k9+N9UFOxbyH9wlimbJhZ/0DaiAhvoPlbfqhc/YItRxnDRj?= =?Windows-1252?Q?vBXLytcvUVB5hd6ske41Fk5bwm3WkbiUh1mitupV2qXLxlHegYi1I3si?= =?Windows-1252?Q?VOKuSoq/L5aDGu4YzGWFK0UocWJNvVZFGNr2dvYTVgHmWmszxkClK51/?= =?Windows-1252?Q?kd2tJ/Z2zjMTKaiePzc2kx6IHMZ7+2anEiCC/MihuR1XZhjyXHUKxmV9?= =?Windows-1252?Q?GDDA4kYqGkzm3qe8FT8cUIglCKPySC1wgmEwrbkU87tZmCIqYaQ0DoX5?= =?Windows-1252?Q?39VIDBUWECn7i7C/AVDS+l6NEhwFtZa/jgxANeOsjRsPwE5HgWaYjIg4?= =?Windows-1252?Q?DErAez2Godj6EZqW72HAAQtaBmHsHSHL+ub0Yrto4zAjrYhmV6cXuZxM?= =?Windows-1252?Q?7I1PZOJYyT9pziY/XKHG2zdJ8k5HxbTLlc8F9R40MtnjP3zRjSfEwCYh?= =?Windows-1252?Q?pmicELK5C6BnOBeh3iMagcITVfl9pjeZche39KzZutcWiVbZCMQ9wayd?= =?Windows-1252?Q?d7m86efFKBOlzcAhPnxJPVxhuw+rnAkWfZYz2Nx7EENgaMVdTrlFOPXL?= =?Windows-1252?Q?C6fIQBPCkq64zyuE2fTiiRByxT82zRtI9qItWujpUit5SeHAK4KeeVaK?= =?Windows-1252?Q?t0orXHlovOYXM7YKiiKdJA=3D=3D?= Content-Type: multipart/alternative; boundary="_000_BY3PR08MB7060AFFCBE0076B074C02957F7C09BY3PR08MB7060namp_" MIME-Version: 1.0 X-OriginatorOrg: nokia.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BY3PR08MB7060.namprd08.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 58fba773-b234-44e9-66b3-08d96322a79e X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 15:04:34.0416 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: EjxPiSpAQzSQHfBjlR02hASUD2HV9ESGxQjimvZVc2MM/7etawcLfMJL3BRmIAkjh0djTyppM+8FIfH0F5zZGQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR08MB4200 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 15:04:45 -0000 --_000_BY3PR08MB7060AFFCBE0076B074C02957F7C09BY3PR08MB7060namp_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don=92t understand. When the local FW goes down, the= local static MAC disappears and the one from the EVPN route should be inst= alled. Thx Jorge From: Dikshit, Saumya Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) , dr= aft-ietf-bess-evpn-fast-df-recovery@ietf.org , draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That=92s the reason it would be good to have two DFs for the {ESI, Bridge-d= omain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don=92t see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows =91static= =92 MACs that are advertised with the sticky bit set. You can configure MAC= F as static in the two leaf nodes. There is no mobility procedures for sta= tic MACs, hence forwarding comes down to the local selection on each node. = In the implementations that I know, the local static MAC will be preferred = over the EVPN MAC/IP route with the static bit, hence again you will have t= he behavior you want.. and again, only in your example with two directly co= nnected leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://data= tracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= ) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_BY3PR08MB7060AFFCBE0076B074C02957F7C09BY3PR08MB7060namp_ Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable

For the first case, again, for the local hosts, local bias makes sure the= ARP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-= 1 only, irrespective of the DF state.

 

For the second case, I don=92t understand. When the local FW goes down, t= he local static MAC disappears and the one from the EVPN route should be in= stalled.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.c= om>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@noki= a.com>, draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-be= ss-evpn-fast-df-recovery@ietf.org>, draft-ietf-bess-evpn-df-election-fra= mework@ietf.org <draft-ietf-bess-evpn-df-election-framework@ietf.org>=
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a prom= pt reply Jorge.

 

Well I missed drawing t= he Host(s) behind the remote Vtep (PE) assuming that it will not make any d= ifference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broad= cast packets like ARP request for the firewaill credentials ? ARP request (= MAC_F) should to sent to the local vtep, which should act as a DF.

The hairpinning of ARP = request to remote DF (over WAN), should be avoided. That=92s the reason it = would be good to have two DFs for the {ESI, Bridge-domain} in this scenario= .

 

>>>> In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route wi= th the static bit, hence again you will have the behavior you want

The static-mac approach= has an issue, when the local firewall goes down, there is no organic way t= o prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, J= orge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do wi= th the two documents you refer to. In fact I don=92t see any issue related = to multihoming.

Given that in your example host-1 and FW-1 a= re directly connected to the same leaf, and host-2 and FW-2 are connected t= o the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same a= ll-active ES, I assume local-bias behavior as in RFC8365 (seems you are usi= ng VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case= of failure, the behavior will be as per your description. Note that a thir= d leaf with a local host will do aliasing to both, but since it seems you o= nly have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the= same ES, EVPN allows =91static=92 MACs that are advertised with the sticky= bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery<= br>
I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt

A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_BY3PR08MB7060AFFCBE0076B074C02957F7C09BY3PR08MB7060namp_-- From nobody Thu Aug 19 08:28:44 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0E393A200E; Thu, 19 Aug 2021 08:28:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.54 X-Spam-Level: X-Spam-Status: No, score=-2.54 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zy3wDKvEk0kS; Thu, 19 Aug 2021 08:28:33 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87BBB3A200D; Thu, 19 Aug 2021 08:28:33 -0700 (PDT) Received: from pps.filterd (m0134421.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17JFMqYk025847; Thu, 19 Aug 2021 15:28:32 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=CkkcgVPkBy1UUnPdZWIszvcXgiwv6Oo8r7ZHeSHSWkY=; b=PgxNHs9Nxrzxk90W04imqRjAMjg5kwfOtlwMCmQPyQC/A3F5P/UvO1q0vPsUCQHqFblw nNq+LvkEDBhirhQhhAMybMVkTn8X27ZFbElGvtYcDHlO1UW4M/6aI2uT/ixIqKN92Dki T8qwvoJvzK7KrEsYCABFAoThvu9wX0whXNMMOHK+R9C/9vw5X91KSMi0G53Kz4OWTBQa ykv+R7lmyJcJjKB5Aarxz0CUJVz8EjTZaxb75XUIdPtLDGavYhtGAsm+nqNoWgtRsfSN m4Pe9CCuom2MepUcwuEsxFIhIJW5jaVYf0QnhWfu4OvXbs5SUIGgCeowGMHSI8lhCfqR +w== Received: from g4t3425.houston.hpe.com (g4t3425.houston.hpe.com [15.241.140.78]) by mx0b-002e3701.pphosted.com with ESMTP id 3ahf52n6rw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Aug 2021 15:28:32 +0000 Received: from G1W8106.americas.hpqcorp.net (g1w8106.austin.hp.com [16.193.72.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3425.houston.hpe.com (Postfix) with ESMTPS id 713AAA9; Thu, 19 Aug 2021 15:28:31 +0000 (UTC) Received: from G4W9336.americas.hpqcorp.net (16.208.33.86) by G1W8106.americas.hpqcorp.net (16.193.72.61) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 19 Aug 2021 15:28:22 +0000 Received: from G9W9210.americas.hpqcorp.net (2002:10dc:429b::10dc:429b) by G4W9336.americas.hpqcorp.net (2002:10d0:2156::10d0:2156) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 19 Aug 2021 15:28:22 +0000 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (15.241.52.11) by G9W9210.americas.hpqcorp.net (16.220.66.155) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Thu, 19 Aug 2021 15:28:21 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RIH45dss0OdLgNvrFtFbTY6OFVXVg+QVcfbtl2DDUp5IpxOjbpcM1g0BFGJ9ZL1hxRkT22JbmtWnNeR2n5shDOH+oHnje93NxmRY/pn6pwq2dTFy6tBF/0z5u/vWqs4frTWYEW2M8VsThwKl9C2VN2D2ZSBbqUu85srskEf1RCb3xHZ92EBgP8697Pni9piHPYxHRmN6AdGPvgQvRu3I7S3wKKe3Eu0FG13l3vetvXW7VYPdPLgQZvebY4XR3GeciecZORlfOOZlGQ1F6pBK0Nbxcl5UHD/NhcOvWHl8hc5mUtZXTq++JmDAmrwrO+7+WdCpVz5n5+892WOvbQr52A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZQOtI6xHqsqce/7A8eAWM1alulkQVEBxY7pxoN7f7ec=; b=c0UhKyD6J0GNy5JcQPR8Ulmmu1dXAzDGAwb/OxPH2o0GkPrL/f5KyHDH2xZVxvKahTgeCYSip+38NH56cey8D73Lqq9SGVsIWJJNSQGyn8j8xf5MKq+9Oue5ZUZYDCLYLoObrK0m0giv9td4SjQ4BBp0jKNxYbrp3bxoRwS5YqEHBVCfHsOvyAwWyEvpYR5vvV1iW2MY2OsI8VGHq9ULcAkLX0tJIQxj2qaXagoTTcbLohz35T1hNWLFeeE8yIbJNb3cukVW8/0sMoOWKhcm2zGRB83q3vHMhWrl1/oPZmTGP1qOxVsMnECpyrhbg27ldk3uiBnsocm9eNDTyXPgzw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7514::15) by CS1PR8401MB0998.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7511::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.19; Thu, 19 Aug 2021 15:28:20 +0000 Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c]) by CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c%10]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 15:28:20 +0000 From: "Dikshit, Saumya" To: "Rabadan, Jorge (Nokia - US/Mountain View)" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlwAAgzMQ Date: Thu, 19 Aug 2021 15:28:20 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 93cc8601-3a98-404d-437d-08d96325f9b3 x-ms-traffictypediagnostic: CS1PR8401MB0998: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3968; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: ZEaRIYY59AV4O+tsNr1PWN1KiyHMbkMK5ZbnFY/qpzPvilBYB/mN3iYaqF5gOvKhNkrJdV0z0no9yoPC0p1qCNd2Sla6CdkEJLdM3ybaBAko+nqIQ7y7gzXpUy4jMNIqJZyWWaMOcytymx9z7YEH82o+yqAWGXqveWXcKvWyn19kesUu1Doj+fMnMldtCdVnFiImxjfrgDKTXJx+jGGBInzvQopJZPUyBGYqQpVb4e8ZEBcxvQ3u+2ZASMX+oQKD2CH/NBvsZlFK53KwqIKXDpuVOPPRHp0QPLadXRjjokLQEK9Q9Fo9Gqpa8+yEqsJIRc5YS3rmXFW4ArUAIodeZNhviujz6FlGVCaVSj5xaHhKHkz9ptA0B8sNzKZ1OwV8gvHB1GyjjYTyKW+FGWjI96EUCIx9J+duQ7xKkLYRV9JHPSluY/MFXyA0GcXynbYLSTGQMa7vAChWCDWMqvhHGWusrl8ADi9BPldjpupszwPaUAw6H/AKueTsQO76z9hDSebUsOftNIJMEBDXgy3hjbUGSofM5pwS4blEK/Sv1U6qNyoCeP4hoDq1ybrKKr9yw49NQ1IuZ4EuOYyqYP8uZZmJJV6ncfcqQzTDLcpm6cxBcIk3MXl/OnzN3Ljby00CSz/QKVXLtf82wxNG9OimO0uiS6g1b9Xjv5KgTQ840658ab6hbSKDMD5Ukbn0xhD1TSbtafScXrz5P8uIHTXncKT+8S3Hsm6unGAvd9WAA33kGoklp/jf1MSXh43AkgDd2+rzkorfcEY6Mx0qRhKbBUsemftqPcM8GyWupwnxRpTOfbYsJOB91ggAmNIcQeM0MqYwEThKcpH9WohRf87+Aw== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(136003)(366004)(39860400002)(346002)(396003)(376002)(76116006)(8676002)(66476007)(66556008)(55236004)(53546011)(66946007)(6506007)(33656002)(66446008)(71200400001)(64756008)(7696005)(52536014)(38070700005)(38100700002)(122000001)(4326008)(5660300002)(86362001)(8936002)(186003)(55016002)(9686003)(478600001)(26005)(966005)(110136005)(2906002)(316002)(296002)(166002)(66574015)(83380400001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?IdFuk87VrzPE77OGuptn8kCu9UOrNH5aG4qqQPJC+6S42SdYjKBqvoCE2md6?= =?us-ascii?Q?OlI1Y5jCKAR+fP9Cvr0xZ0iWeg6lIlMYFB3wvA8IfpinxB8g7MRyTUdojZX6?= =?us-ascii?Q?lewgkbrySg3ReNJYXRA1QTStj0si16cSaBYoHhPmx8aeHsA31Ud+5RvL2BxN?= =?us-ascii?Q?XwTC3c40Qbmr8fJHO2PjpN+cn+g94BuDBdd3MPcC3V27exuXw+diujr8iNK3?= =?us-ascii?Q?Wks++jU0poSf5jk0yIegDbtt7y273QnPfck5VJ0D3ssp0IbNlqtvIo2Hs0/X?= =?us-ascii?Q?vA0ZB+qH3Y+dnGh8Jdt6dx/XBADnt1Ti1BXXZNKxYyFbwAWNvfdMyy3ci/WC?= =?us-ascii?Q?7m5PoJ+uroMKvBYQFdnMlNolq5Ne7OwMBbaggLZFWCJVPxqgtcJ4JcoMRpd/?= =?us-ascii?Q?xhOJEBiaqa/h4QMuFzjYQBjhRG0fcdUMnGrdI9H1Cb/ZCK5fk9YuLWFXMLMa?= =?us-ascii?Q?bUEwZMCCotZUWz4xINV8Ar1IobNxfemmFeeiuydDX5ZlIjFGue4b+GfcIPtY?= =?us-ascii?Q?aTi1/psi3PauCQW4qAVPYzObI/S+8olO1ARR4fqf1mpWCS31ejzoHPW4rIUF?= =?us-ascii?Q?XJnXcVzqD3g5QWrX1Gm3moBWdjZGhP5uDdCFoqqq86APHZaga95T8xB6f3lC?= =?us-ascii?Q?RM2E5cqEk5fOq13RLSVPHLubb+H/fOOf4EYinFvw+Oeg/gWv/pKpBsJVG0Nn?= =?us-ascii?Q?Qou+vCqwdMmtuiVJdYKktFwfrQiglXaBMnCNO+uuPkqon73lSbE6EwWVEiys?= =?us-ascii?Q?/4KTk3LReIQaxt2vZrsLbCNDoYG3RgCZ6ffHrTevq9+O8E2PuQZ7e/k8cfo9?= =?us-ascii?Q?8WJGSNUhIB/nWpz1BG6f2s7NJq7s/jzkm+2YclyyXiWoItRmwyI7uvtQAMKo?= =?us-ascii?Q?m6Te192zzN0NiuusVCoMLDMtxqUgjhDNyvkFjO3ZeIKMSBzY5mAsK0+qoDDO?= =?us-ascii?Q?vUFL+aQqld4ZZc04pELK75eA3HX0nLBXj38VWG8hhppLKWFa+Rg8lsYZ3dTi?= =?us-ascii?Q?1Uf08lPjE+7QEo8C4L5QhjE526mXPEB0+Nt0QYsNiVef06R/mAUHRAA2tMT7?= =?us-ascii?Q?I644HN9TKYWojHxYOC3UAmnUdzhRU1YjL+jHdKjrllRBj7eFt1ZD5Zh4w/fS?= =?us-ascii?Q?l2fbCz5sdyAKPDvD3idG2FdBmS4wYwrfi9M2fR9PqIn+J2Mx0krYscJM954e?= =?us-ascii?Q?ATDqnCHhn87jGjiBgkUCuyhvP4+yKAeMSWgpCvgtP1/1MUaXI4qSL3UBnb+d?= =?us-ascii?Q?+XO3gSqRwZIYztSY8kjaecgMB+TELBv3LIReHjnyi3Tfs+HW7KDo7LI92eGx?= =?us-ascii?Q?qj3OglaYxxlZu9apn5pwVORq?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_CS1PR8401MB1237DC7DE237D358914E6DE094C09CS1PR8401MB1237_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 93cc8601-3a98-404d-437d-08d96325f9b3 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 15:28:20.1731 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0Qgd1J5rshuKaAJYPSrUF/6GR3B6SkudaVWqrLN7typGLjEUNbxcSBKGFwvf9GfWhyH72kjAeFMwaPgjqbC9WQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CS1PR8401MB0998 X-OriginatorOrg: hpe.com X-Proofpoint-ORIG-GUID: Wfkre6ZXVR3f9yPUg04kZ7o7IyO-_NP2 X-Proofpoint-GUID: Wfkre6ZXVR3f9yPUg04kZ7o7IyO-_NP2 X-Proofpoint-UnRewURL: 14 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-19_05:2021-08-17, 2021-08-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 adultscore=0 spamscore=0 priorityscore=1501 mlxlogscore=999 mlxscore=0 lowpriorityscore=0 impostorscore=0 clxscore=1015 bulkscore=0 malwarescore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108190090 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 15:28:41 -0000 --_000_CS1PR8401MB1237DC7DE237D358914E6DE094C09CS1PR8401MB1237_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Thanks Again Rabadan and apology for the confusion. As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 8:35 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don't understand. When the local FW goes down, the l= ocal static MAC disappears and the one from the EVPN route should be instal= led. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That's the reason it would be good to have two DFs for the {ESI, Bridge-dom= ain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don't see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' = MACs that are advertised with the sticky bit set. You can configure MAC F a= s static in the two leaf nodes. There is no mobility procedures for static = MACs, hence forwarding comes down to the local selection on each node. In t= he implementations that I know, the local static MAC will be preferred over= the EVPN MAC/IP route with the static bit, hence again you will have the b= ehavior you want.. and again, only in your example with two directly connec= ted leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-= bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_CS1PR8401MB1237DC7DE237D358914E6DE094C09CS1PR8401MB1237_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Thanks Again Rabadan a= nd apology for the confusion.

 

As I mentioned I shoul= d have added first_hop vtep/PE for Host1/2 as well,

to reflect that reacha= bility to firewall from the host(s) is across the Overlay (EVPN fabric).

 

I have redone the topo= logy to show host1 and host2 behind first hop vteps “Vtep_host1”= ; and “Vtep_host2” respectively.

In this updated topolo= gy local-bias will not come into play, as traffic from host1/2 to firewall = arrives over the evpn-fabric.

.

 

    SITE-1    &nb= sp;            |&nbs= p;            &= nbsp;           SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

        &nbs= p; \            = ;            &n= bsp;            = ;         /

Vtep_host1       =             &nb= sp;          Vtep_host2 &= nbsp;           &nbs= p;      
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

         |&n= bsp;      [ EVPN-fabric ]     =            |

         |&n= bsp;            = ;            &n= bsp;            = ;             |=
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

>>>> the lo= cal static MAC disappears

As I have observed in few implementations that static MACs are admin-conf= igured (other than control-plane published with sticky-bit).

So will need a admin intervention to clean them up.

 

Thanks

Saumya.

 

From: Rabadan, Jorge (Nokia - US/Mountain Vie= w) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

For the first case, again, for the local hosts, local bias makes sure the= ARP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-= 1 only, irrespective of the DF state.

 

For the second case, I don’t understand. When the local FW goes dow= n, the local static MAC disappears and the one from the EVPN route should b= e installed.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a prompt= reply Jorge.

 

Well I missed drawing the= Host(s) behind the remote Vtep (PE) assuming that it will not make any dif= ference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broadca= st packets like ARP request for the firewaill credentials ? ARP request (MA= C_F) should to sent to the local vtep, which should act as a DF.=

The hairpinning of ARP re= quest to remote DF (over WAN), should be avoided. That’s the reason i= t would be good to have two DFs for the {ESI, Bridge-domain} in this scenar= io.

 

>>>><= i> In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route with the= static bit, hence again you will have the behavior you want<= span style=3D"font-size:10.5pt;font-family:Consolas">=

The static-mac approach h= as an issue, when the local firewall goes down, there is no organic way to = prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, Jor= ge (Nokia - US/Mountain View) [m= ailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do with= the two documents you refer to. In fact I don’t see any issue relate= d to multihoming.

Given that in your example host-1 and FW-1 are= directly connected to the same leaf, and host-2 and FW-2 are connected to = the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same all= -active ES, I assume local-bias behavior as in RFC8365 (seems you are using= VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case= of failure, the behavior will be as per your description. Note that a thir= d leaf with a local host will do aliasing to both, but since it seems you o= nly have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the s= ame ES, EVPN allows ‘static’ MACs that are advertised with the = sticky bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org= /doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-b= ess-evpn-fast-df-recovery

I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_CS1PR8401MB1237DC7DE237D358914E6DE094C09CS1PR8401MB1237_-- From nobody Thu Aug 19 08:34:02 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27BAB3A2059; Thu, 19 Aug 2021 08:33:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.352 X-Spam-Level: X-Spam-Status: No, score=-2.352 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1tYy0xWt36xG; Thu, 19 Aug 2021 08:33:52 -0700 (PDT) Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2138.outbound.protection.outlook.com [40.107.223.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FBEA3A2062; Thu, 19 Aug 2021 08:33:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=heV5YdcK/XkB2KtwgYc37CjuiJyX3Mg4CWTZS+QNIfS32Dcl/PhELjcm5NJnRQ103IQc971s0ZECR0P2KKktP4jBYJdUiZmTfF9SNZU8Iu6Wpb+0yU6oeRkeKc3e/9qRW4BEPDMmX3fAqUDHWmyHqXaRzxYJoSb6xgPKAckfhid572kEdfIHUe7ERpuNiOVeIMUo5KJ6oKtUd+8d4EidCfIZTRO1bDTAdUkBYUQgzxtWDhezUPXMYHmJpnXiIxo29rbZWSMlAYHUtiZgMNxYRMZyszOBDEpcEdHGMeOhG2MUuhaiuBv90190Ao+jCYIpaqqO1hV6bF6UvF8gaZi2jQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NtuOU8PkBvGqZ6Vsi3woJ3hcSIgdMUrt+Er9f0mYCNs=; b=BdPKZpmFXtZwVqutGml92wyS1kOWikLjU8W0gckehy5JJDRsY2e2+/4JP1smn3sGrSKrooPGNdcVZ2zFCjRiPPceYaRoWfhSvLlfQeWDuxCxiu23ylF/cqoJ0g4xuAFPbP60GXFZtPQoGiUxXKPp9p87VjlTQebnuvbsd7Y9kY4nQu5T5sF7IIgeaot6VyCT/h1zkHKzyRVJAIqJ25gaZ69BE4lPGgJP1mL3l1PV8LBEbfyLAb6KmH4gPmSlC5K1A/Wr9vcbek8l9vmWxlydVwtlpQa6tcBi6bDS7x3UNSYYArGRPOGjzU1wzKkm4tNCrEGVcxFaoxhjCH06TWGBKA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NtuOU8PkBvGqZ6Vsi3woJ3hcSIgdMUrt+Er9f0mYCNs=; b=nj7nHBZj43fMDZqnS/eU812BOL1eSCOBSkHNo5s2NhEv4JfN85GAOWAul0KA3Ui4781oOmWbzsSP9uGdOd/mddd0ehLcQmfchPyi+1bqg8DPqbT0VATymduTVG0Iom5dLSNWJKLI5vkbNBB+ytXzpVDoGTiGoPbNgQnU7n0BHN4= Received: from BY3PR08MB7060.namprd08.prod.outlook.com (2603:10b6:a03:36d::19) by BY3PR08MB7186.namprd08.prod.outlook.com (2603:10b6:a03:361::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.19; Thu, 19 Aug 2021 15:33:48 +0000 Received: from BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d]) by BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d%5]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 15:33:48 +0000 From: "Rabadan, Jorge (Nokia - US/Mountain View)" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlwAAgzMQAAB+KQA= Date: Thu, 19 Aug 2021 15:33:48 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=nokia.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 511e4756-6cab-4abe-badd-08d96326bd2a x-ms-traffictypediagnostic: BY3PR08MB7186: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3968; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR08MB7060.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(55016002)(4326008)(110136005)(966005)(52536014)(71200400001)(6506007)(30864003)(66476007)(9686003)(76116006)(186003)(64756008)(66446008)(38070700005)(5660300002)(53546011)(66574015)(7696005)(66556008)(508600001)(66946007)(83380400001)(91956017)(8936002)(26005)(8676002)(33656002)(86362001)(122000001)(38100700002)(166002)(2906002)(316002)(296002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?plQ64bRnKJL6zZeF2Sm8wZSybVfThobnMVZ1Th2EuJw1LI3FonnYjwiS?= =?Windows-1252?Q?Hic72MJaieaNb+7P5jucCAB+GSX/n/h9FC59+Vz9CW+Txjwe5tRcSPAu?= =?Windows-1252?Q?rhUiv7Q2yoDVdiO+ZBcdWXkJAfRJecQW4dlqTs/icAQIv4Rz0tJ6u5e4?= =?Windows-1252?Q?7HsBU6QkoI4mtj1dy8ldaH53497K41YNczy/XkAsAsk3dt6LsROfQ+Ew?= =?Windows-1252?Q?WsIw8Opvu+TnGureLvbsAiWGZmBPenLjypE0EPB8DfSngeiOi3wvYaOl?= =?Windows-1252?Q?x6y5gUHPsh0h7UM30N81afZgOaQiyV9xZtL1ju/Ruu0GXSYGgRjdvgJ0?= =?Windows-1252?Q?KYPXuZV9j5nwKplKnVBmcNLS4uFzYrUM1N4h7ahR9z6VSqSqUVMDHpBX?= =?Windows-1252?Q?uXBWdjDVV+gntoEZeOHybIWNd61ab/8J2ArPMvLshtgbVQxKlf6GEGj/?= =?Windows-1252?Q?udlZhsRZNFs9X2VF3RFkscgpBTDpt1m8IOGA6fXzLOnFYasAR9ftg0Al?= =?Windows-1252?Q?v+viqHWZ8aQpRJXAOTjz7Zf4NtF6Gqmm9p+upZ/+z7SVQy4nPes1cPvI?= =?Windows-1252?Q?kttFd7l0LoxUFmWF7Vm8dWMrkZxFJOVx6K5EIrz9TZI/yIBjAq2FwjHV?= =?Windows-1252?Q?xo3Bopv7R8+X6VgueLGPHeIRVkBY0I+i+gko/PCX4bVpLikezd/sV+u5?= =?Windows-1252?Q?7dnVdNvCnq8/Amb6fwv2cao2paiQ2VdWFCXda15E//02uL0yHN07Np1i?= =?Windows-1252?Q?N/IMr2ITZ46rbTeCZzDBPGDPl1iQcrGt+aAkNz+XMelMNHbo6eyTibzQ?= =?Windows-1252?Q?Twn4r+aO6arDnMZ5PzFg+/ZVcbuEM5XlaOob3QExsqWzDIqQTj4/MY6G?= =?Windows-1252?Q?z/B/A7Hrp2agNo/p6HOWgEaUqlcXD4xEeQtq6+VcsHd94N6UbF/ySMIt?= =?Windows-1252?Q?oMDLPRqjz3b5B1Td0He64nnKX7qBQY0Ar7JgZ4fDW5nI1CcJF5IaIISu?= =?Windows-1252?Q?KmP+hau8RVhfMH+S6F5gSeLVTPAhh1FNmBG7/7WjfIpva53YHO0KWc+y?= =?Windows-1252?Q?6B8AqoD9vBuUx716LAuUy7dJeJPCbne86I/wfRww4W/HMwMk4Xay9TG8?= =?Windows-1252?Q?QbdxrsRYMHAn4nEjP0JB+YHdosRQTe62hmEtMzd06okTA658ync0Lm1b?= =?Windows-1252?Q?ymnzBNpOZp3ooH13xoH5FCHpGZjadCd/WuSqnXolUzdK2hrtllLmYZiy?= =?Windows-1252?Q?Q+Ku1GbJYEWia1zLBrfgtAda3d7C9MomTsNYvNKgVYpJaqYW86l8Z33L?= =?Windows-1252?Q?dpdljCL+ebg14U8oJRUYEdfQ0fnxTILPoHMXBwpO8oYzd44c3ZyIb9v6?= =?Windows-1252?Q?ZWmSESOj/vqjmWFOYNa003wKL4BMywKPHH2qvuoDgB5WVRuHXpZ6FW+5?= =?Windows-1252?Q?9kNxNnqa1qrSzRN64svIKw=3D=3D?= Content-Type: multipart/alternative; boundary="_000_BY3PR08MB7060B2178006A7A7C1EDC624F7C09BY3PR08MB7060namp_" MIME-Version: 1.0 X-OriginatorOrg: nokia.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BY3PR08MB7060.namprd08.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 511e4756-6cab-4abe-badd-08d96326bd2a X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 15:33:48.1624 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 8n/Wd7KmlW3mvIBY+rt9apVIMv/NPgfBRWP2VBA4O/BIQy3hwN6vhR0ysahPrLrN2jm6v/iTIfGNHnynIXAphw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR08MB7186 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 15:33:59 -0000 --_000_BY3PR08MB7060B2178006A7A7C1EDC624F7C09BY3PR08MB7060namp_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable About this: >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. In the implementations I know, the static mac is configured associated to a= n interface and conditionally active based on the oper-status of the interf= ace. So no admin intervention. IMHO it does not make much sense to keep a s= tatic mac installed if the associated attachment circuit is down. Thanks. Jorge From: Dikshit, Saumya Date: Thursday, August 19, 2021 at 8:28 AM To: Rabadan, Jorge (Nokia - US/Mountain View) , dr= aft-ietf-bess-evpn-fast-df-recovery@ietf.org , draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks Again Rabadan and apology for the confusion. As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps = =93Vtep_host1=94 and =93Vtep_host2=94 respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 8:35 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don=92t understand. When the local FW goes down, the= local static MAC disappears and the one from the EVPN route should be inst= alled. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That=92s the reason it would be good to have two DFs for the {ESI, Bridge-d= omain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don=92t see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows =91static= =92 MACs that are advertised with the sticky bit set. You can configure MAC= F as static in the two leaf nodes. There is no mobility procedures for sta= tic MACs, hence forwarding comes down to the local selection on each node. = In the implementations that I know, the local static MAC will be preferred = over the EVPN MAC/IP route with the static bit, hence again you will have t= he behavior you want.. and again, only in your example with two directly co= nnected leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://data= tracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= ) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_BY3PR08MB7060B2178006A7A7C1EDC624F7C09BY3PR08MB7060namp_ Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable

About this:

 

>>>> the local static MAC disappears

As I have observed in few implementations that static MACs are admin-conf= igured (other than control-plane published with sticky-bit).

So will need a admin intervention to clean them up.

 

 

In the implementations I know, the static mac is configured associated to= an interface and conditionally active based on the oper-status of the inte= rface. So no admin intervention. IMHO it does not make much sense to keep a static mac installed if the associat= ed attachment circuit is down.

 

Thanks.

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.c= om>
Date: Thursday, August 19, 2021 at 8:28 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@noki= a.com>, draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-be= ss-evpn-fast-df-recovery@ietf.org>, draft-ietf-bess-evpn-df-election-fra= mework@ietf.org <draft-ietf-bess-evpn-df-election-framework@ietf.org>=
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks Again Rabadan and apology for the confusion.

 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as = well,

to reflect that reachability to firewall from the host(s) is across = the Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop = vteps =93Vtep_host1=94 and =93Vtep_host2=94 respectively.=

In this updated topology local-bias will not come into play, as traf= fic from host1/2 to firewall arrives over the evpn-fabric.

.

 

    SITE= -1            &= nbsp;    |        &n= bsp;            = ;    SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    = ;      \       =             &nb= sp;            =             &nb= sp; /

Vtep_host1  &= nbsp;           &nbs= p;             =   Vtep_host2         = ;           
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    = ;     |       [ EVPN-fabr= ic ]            &nbs= p;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

>>>> the local static MAC disappears

As I have observed in few implementations th= at static MACs are admin-configured (other than control-plane published wit= h sticky-bit).

So will need a admin intervention to clean t= hem up.

 

Thanks

Saumya.

 

From: Rabadan, J= orge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

For the first case, again, for the local hos= ts, local bias makes sure the ARP requests go only to the local FW, i.e. ho= st-1 ARP Requests goes to FW-1 only, irrespective of the DF state.

 

For the second case, I don=92t understand. W= hen the local FW goes down, the local static MAC disappears and the one fro= m the EVPN route should be installed.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a prom= pt reply Jorge.

 

Well I missed drawing t= he Host(s) behind the remote Vtep (PE) assuming that it will not make any d= ifference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broad= cast packets like ARP request for the firewaill credentials ? ARP request (= MAC_F) should to sent to the local vtep, which should act as a DF.

The hairpinning of ARP = request to remote DF (over WAN), should be avoided. That=92s the reason it = would be good to have two DFs for the {ESI, Bridge-domain} in this scenario= .

 

>>>> In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route wi= th the static bit, hence again you will have the behavior you want

The static-mac approach= has an issue, when the local firewall goes down, there is no organic way t= o prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, J= orge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do wi= th the two documents you refer to. In fact I don=92t see any issue related = to multihoming.

Given that in your example host-1 and FW-1 a= re directly connected to the same leaf, and host-2 and FW-2 are connected t= o the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same a= ll-active ES, I assume local-bias behavior as in RFC8365 (seems you are usi= ng VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case= of failure, the behavior will be as per your description. Note that a thir= d leaf with a local host will do aliasing to both, but since it seems you o= nly have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the= same ES, EVPN allows =91static=92 MACs that are advertised with the sticky= bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery<= br>
I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt

A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_BY3PR08MB7060B2178006A7A7C1EDC624F7C09BY3PR08MB7060namp_-- From nobody Thu Aug 19 08:49:43 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FCC83A213B; Thu, 19 Aug 2021 08:49:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.54 X-Spam-Level: X-Spam-Status: No, score=-2.54 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9NbOaE8Ot21z; Thu, 19 Aug 2021 08:49:34 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 655723A2184; Thu, 19 Aug 2021 08:49:32 -0700 (PDT) Received: from pps.filterd (m0134420.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17JFhAbJ018182; Thu, 19 Aug 2021 15:49:31 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=P3D8lilbO+yO0UY76KJTjeRSb3p4XpL3BrpDH3of9NI=; b=R5vGBHkaRM33AucCOJXyGyXApQzfm+825OFbHbbZaoyecgKXC3UXmZvoF6kIqsO3RbbJ sh65CUWAEtsljIOV+JLz2wuziktmsxGdjDGQD72VvrLNlroZ9X80a2KXFEsIqCPx5Kci iHL87DVEoG85eAAShIzFdVPdIU8e5O2kTenvUBf/nMHhYndlYnR4LaXGFkNrE4w/hCqp j6Z3GmBSrb15Ne6N7cEZZXwGad32CJEFtGvxo2CwVQIOVh9iItrVPBBV+0WfdpPOlIUK tGPdv0cvKeSm61KqjwZVwbaURpmL/B215GqvnrpWekugb8ZfNftI2tQms0lrLmGf5pQA vg== Received: from g9t5008.houston.hpe.com (g9t5008.houston.hpe.com [15.241.48.72]) by mx0b-002e3701.pphosted.com with ESMTP id 3ah99mfcke-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Aug 2021 15:49:31 +0000 Received: from G4W9121.americas.hpqcorp.net (g4w9121.houston.hp.com [16.210.21.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g9t5008.houston.hpe.com (Postfix) with ESMTPS id 544A059; Thu, 19 Aug 2021 15:49:30 +0000 (UTC) Received: from G4W9121.americas.hpqcorp.net (2002:10d2:1510::10d2:1510) by G4W9121.americas.hpqcorp.net (2002:10d2:1510::10d2:1510) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 19 Aug 2021 15:49:29 +0000 Received: from NAM04-MW2-obe.outbound.protection.outlook.com (15.241.52.10) by G4W9121.americas.hpqcorp.net (16.210.21.16) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Thu, 19 Aug 2021 15:49:29 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EVYTHdTwKyDzJYsKkL2p0LVYx21El7mNn+kjx/STuu9ImYOE5vRBLinI1DiCsUOtjbJNcCPvXbU4goEbOZXEjVXJKKZUxjiaKdbhWIp03ntTTI7AWqigA5XAMLuPf1zocPriTfO74TsodDCsqhC2cFVWOJ2EwGcGfaimLO8z51nvq42zLYn8ZxHtVc+5HjydTPM2Z0dTnxK1jzERlIiPS2MQ2kG+rZAZFPouMcDX3SkOYgSWeEbr6bXNERHaE0Ki2IEImy2XmEU0NiMMG89WuW9yXZBqc9xMH3R5xIc3qwag0VXtDUo5+yNPxlPICNS5BgYa6+/I+8ax1Wg+6tDtUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v0ACMDlBBBe8aUVX5n9zlOzur4lIlKtYHlNZoqEOF/o=; b=Khc/QQFWjXSBdKLnMjZzbfKMY+dIXzQ3ZDWiSY4vVo/ntNPcoEijlPhXRWEZhpMvu52luE6Wi8LLmlTDNI1OSoKVZzYZDo9h3Sw1NFW/P0xLVbcHGzv+Gr8XNtrGhVTXO6M+MbKa1wJiPec4+P7oV9d3KaeAN8TieVr4XEAnjn8WghueNPztM6F1DzqkIpFr2dRo3VQjzMAvG4p+AP6TVQjuS35Itt1gfUBdHy6cLAFPnhlzWLRAA1ffYtngUZApyfArj9FiAoln+C1eLkk+zOrwz81hK4BDNI2ALWN98ioeTB83QendVvu2LfY376g2okAdqLA19vqFO8pKfNW5TA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7514::15) by CS1PR8401MB0645.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:750c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.16; Thu, 19 Aug 2021 15:49:28 +0000 Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c]) by CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c%10]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 15:49:28 +0000 From: "Dikshit, Saumya" To: "Rabadan, Jorge (Nokia - US/Mountain View)" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlwAAgzMQAAB+KQAAAEcMAA== Date: Thu, 19 Aug 2021 15:49:28 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 60c63c8d-101a-45be-8f5f-08d96328ed66 x-ms-traffictypediagnostic: CS1PR8401MB0645: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3968; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(346002)(396003)(136003)(39860400002)(366004)(376002)(71200400001)(7696005)(66556008)(66946007)(5660300002)(186003)(66574015)(66446008)(64756008)(4326008)(478600001)(53546011)(83380400001)(26005)(122000001)(52536014)(110136005)(316002)(8936002)(2906002)(296002)(966005)(86362001)(6506007)(8676002)(38070700005)(30864003)(166002)(38100700002)(55016002)(76116006)(66476007)(9686003)(55236004)(33656002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?hU0n/oofl4x6pQLN2YmHORwH3nxdCJTAkaSDlv1PMolcEs9yWpoHll6Mj6oJ?= =?us-ascii?Q?ArIatg3tQdOa9D4M85H6JCwp8RQ+Mhr5E6av/IVuZ2Oz5iUK8WiRyBzD3ufx?= =?us-ascii?Q?8GFHlYYsxTKozvCriulBDFU1OtyOZ/QIIBTfXXlKtlWeCn/CyrGpI733cWB8?= =?us-ascii?Q?USeTk0HHllB215ybNz5K4IMxQroiG1D2xT3g3swEI2PY7r1FtIOUkrIkNTYO?= =?us-ascii?Q?ZM5e+u3wy1nSzQYhJAMsz2A+kOWxo3ZQkxf9214jU1b8YY7DJJKwUwrSNgQE?= =?us-ascii?Q?5/JczH69C+stePY41OdTOWN3n577yjp4KUgZck8yVA6+i4a289u9CFJZb14m?= =?us-ascii?Q?Qv63Ycr8Pb5+cP0z+KoWwvNG39W36fpKdqRAnznbFyZXtJAyQxoXbVMpFZ3T?= =?us-ascii?Q?kLa7lftukE/UZFDyxZWLemVfVr+sB9QvghlNgwksZMBkPbDGzibJ8AXb5LTq?= =?us-ascii?Q?VYSmAklNutrSk4FO2ElrwOYOd9ZorV2C3bi3XNhOSOfZoSggEMJLFbIsjWeC?= =?us-ascii?Q?13Yv+Rs27fDM46SMU1HMVRXlD2sSpJ3eeMQ96c3Ml0j0IlRYwKVMTz0ZAZz5?= =?us-ascii?Q?SMPvcU2DjgiGGUuMZlySxBT1/O+KpRIwkeWCHlWY1dqAdxWZpy63stemArWi?= =?us-ascii?Q?1YStjstO63eegFK8XQofZU6QgNbbgKbaZK+JbCPQIIoUtQERqGp3r+NI9bCl?= =?us-ascii?Q?OJgJ7dXw79cEWQncyOffIdRFWpkTgM1LeFtxquvW2Cnu/j+8hW9gIPWyG7D+?= =?us-ascii?Q?jxdB9OJY6p4XJ13k7Jc0ZDg9iJ5tgDCqBgKEhuvDUc/2gWo/uBp0u2FGNVzu?= =?us-ascii?Q?pmiJsP957B7cmDBtqfrF93esVfM7L4SsukCR91nJ/naDC7AsTKCSrneI3UXZ?= =?us-ascii?Q?jDCIGtjhWhGNVL3jdNRvXyDOnuoweyoaTdIegl/31IqpVEnbwoVLF+JUBPXd?= =?us-ascii?Q?sSrIFWysRb345mBKSx5blPs4hFfgFKaBcAxoj2D4yAMIHuD+eeKWJaUnE8J7?= =?us-ascii?Q?KQQfi/vM4eds1xbdMoMv3+j8sDfsu+RKl6DY7lx+jjJ3GNZZJm8MpGNVLSwN?= =?us-ascii?Q?4VaPU1XPyK5Wa39MqYxeI0y8bRkIGAbdk9zbSdMQtng1Lqf/HI/0B5b3xWO4?= =?us-ascii?Q?H7feP6Eik6bcJ6dYIPJfGXxIW6eeDLiVfpOmc0U748oqNy1krYMLtctoalON?= =?us-ascii?Q?r9K9WlHO6j3YqHedUZtTTThEeuwlXqrFOAb3CK++5cL1AyqKAPvBiqItXeSW?= =?us-ascii?Q?lJic1eleozq+VciJjqyOXI9/jNw4s7/CotRnomoUCpfDbiPfchSdfiFkqJnd?= =?us-ascii?Q?WOZQLWREA+DeN9IZroXDBc8U?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_CS1PR8401MB1237CB54D3F55AF7B0DF7D0F94C09CS1PR8401MB1237_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 60c63c8d-101a-45be-8f5f-08d96328ed66 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 15:49:28.0719 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: v6yKVqMN3MYtNy9H+YI3yRMSELDNkimvj1v5zGcN554sW+qSrwwIwhHH1jxQVLfZMfE37xEw/cXXh8hSYAZnWQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CS1PR8401MB0645 X-OriginatorOrg: hpe.com X-Proofpoint-GUID: 8q4Bf5Fe0t_k2RwgOW5h3AVQZjP1ZPj- X-Proofpoint-ORIG-GUID: 8q4Bf5Fe0t_k2RwgOW5h3AVQZjP1ZPj- X-Proofpoint-UnRewURL: 14 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-19_05:2021-08-17, 2021-08-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 mlxscore=0 adultscore=0 clxscore=1015 phishscore=0 suspectscore=0 impostorscore=0 bulkscore=0 malwarescore=0 lowpriorityscore=0 mlxlogscore=999 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108190092 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 15:49:42 -0000 --_000_CS1PR8401MB1237CB54D3F55AF7B0DF7D0F94C09CS1PR8401MB1237_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable >>> the static mac is configured associated to an interface and conditional= ly active based on the oper-status of the interface Ack on that and that's pretty organic (tying it to the interface/AC state). But it may not solve the case where other hosts (other than firewall) are b= ehind the interface/AC (which is live and kicking). Need to track firewall state and trigger an administrative delete of the st= atic-MAC. >>> As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 9:04 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc About this: >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. In the implementations I know, the static mac is configured associated to a= n interface and conditionally active based on the oper-status of the interf= ace. So no admin intervention. IMHO it does not make much sense to keep a s= tatic mac installed if the associated attachment circuit is down. Thanks. Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 8:28 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks Again Rabadan and apology for the confusion. As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 8:35 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don't understand. When the local FW goes down, the l= ocal static MAC disappears and the one from the EVPN route should be instal= led. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That's the reason it would be good to have two DFs for the {ESI, Bridge-dom= ain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don't see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' = MACs that are advertised with the sticky bit set. You can configure MAC F a= s static in the two leaf nodes. There is no mobility procedures for static = MACs, hence forwarding comes down to the local selection on each node. In t= he implementations that I know, the local static MAC will be preferred over= the EVPN MAC/IP route with the static bit, hence again you will have the b= ehavior you want.. and again, only in your example with two directly connec= ted leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-= bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_CS1PR8401MB1237CB54D3F55AF7B0DF7D0F94C09CS1PR8401MB1237_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

>>>= the static ma= c is configured associated to an interface and conditionally active based o= n the oper-status of the interface

Ack on that and that&#= 8217;s pretty organic (tying it to the interface/AC state).

But it may not solve t= he case where other hosts (other than firewall) are behind the interface/AC= (which is live and kicking).

Need to track firewall= state and trigger an administrative delete of the static-MAC.

 

>>> = ;

As I mentioned I should have added first_hop vtep/PE for Host1/2 as we= ll,

to reflect that reachability to firewall from the host(s) is across th= e Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop vt= eps “Vtep_host1” and “Vtep_host2” respectively.

In this updated topology local-bias will not come into play, as traffi= c from host1/2 to firewall arrives over the evpn-fabric.<= /p>

.

 

    SITE-1=             &nb= sp;    |        &nbs= p;            &= nbsp;   SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    &= nbsp;     \       &n= bsp;            = ;            &n= bsp;            = ; /

Vtep_host1  &nb= sp;            =              &n= bsp; Vtep_host2         &= nbsp;          
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    &= nbsp;    |       [ EVPN-fabric= ]             =    |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

 

 

From: Rabadan, Jorge (Nokia - US/Mountain Vie= w) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:04 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

About this:

 

>>>> the local static MAC disappears

As I have observed in few implementations that static MACs are admin-conf= igured (other than control-plane published with sticky-bit).

So will need a admin intervention to clean them up.

 

 

In the implementations I know, the static mac is configured associated to= an interface and conditionally active based on the oper-status of the inte= rface. So no admin intervention. IMHO it does not make much sense to keep a static mac installed if the associat= ed attachment circuit is down.

 

Thanks.

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 8:28 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks Again Rabadan and apology for the confusion.

 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as we= ll,

to reflect that reachability to firewall from the host(s) is across th= e Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop vt= eps “Vtep_host1” and “Vtep_host2” respectively.

In this updated topology local-bias will not come into play, as traffi= c from host1/2 to firewall arrives over the evpn-fabric.<= /p>

.

 

    SITE-1=             &nb= sp;    |        &nbs= p;            &= nbsp;   SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    &= nbsp;     \       &n= bsp;            = ;            &n= bsp;            = ; /

Vtep_host1  &nb= sp;            =              &n= bsp; Vtep_host2         &= nbsp;          
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    &= nbsp;    |       [ EVPN-fabric= ]             =    |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

>>>><= i> the local static MAC disappears

As I have observed in few implementations that= static MACs are admin-configured (other than control-plane published with = sticky-bit).

So will need a admin intervention to clean the= m up.

 

Thanks

Saumya.

 

From: Rabadan, Jor= ge (Nokia - US/Mountain View) [m= ailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

For the first case, again, for the local hosts= , local bias makes sure the ARP requests go only to the local FW, i.e. host= -1 ARP Requests goes to FW-1 only, irrespective of the DF state.

 

For the second case, I don’t understand.= When the local FW goes down, the local static MAC disappears and the one f= rom the EVPN route should be installed.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a promp= t reply Jorge.

 

Well I missed drawing th= e Host(s) behind the remote Vtep (PE) assuming that it will not make any di= fference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broadc= ast packets like ARP request for the firewaill credentials ? ARP request (M= AC_F) should to sent to the local vtep, which should act as a DF.

The hairpinning of ARP r= equest to remote DF (over WAN), should be avoided. That’s the reason = it would be good to have two DFs for the {ESI, Bridge-domain} in this scena= rio.

 

>>>>= In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route wi= th the static bit, hence again you will have the behavior you want

The static-mac approach = has an issue, when the local firewall goes down, there is no organic way to= prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, Jo= rge (Nokia - US/Mountain View) [= mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do wit= h the two documents you refer to. In fact I don’t see any issue relat= ed to multihoming.

Given that in your example host-1 and FW-1 ar= e directly connected to the same leaf, and host-2 and FW-2 are connected to= the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same al= l-active ES, I assume local-bias behavior as in RFC8365 (seems you are usin= g VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case= of failure, the behavior will be as per your description. Note that a thir= d leaf with a local host will do aliasing to both, but since it seems you o= nly have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the = same ES, EVPN allows ‘static’ MACs that are advertised with the= sticky bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org= /doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-b= ess-evpn-fast-df-recovery

I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_CS1PR8401MB1237CB54D3F55AF7B0DF7D0F94C09CS1PR8401MB1237_-- From nobody Thu Aug 19 09:10:01 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5097F3A07A3; Thu, 19 Aug 2021 09:09:59 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.352 X-Spam-Level: X-Spam-Status: No, score=-2.352 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fi4ibs-1cHGs; Thu, 19 Aug 2021 09:09:54 -0700 (PDT) Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2134.outbound.protection.outlook.com [40.107.223.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A7F9A3A07A0; Thu, 19 Aug 2021 09:09:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HBeWaEu6tYntCcD2XIL2ss2rWqaqMlqX+tqCpAX1wo2DZ4t7vIf+1SWdduyc5/Y25w2DRE+Q5NvLzDaEUVsffe4kz7Ep/DsVU8amDWbbj++4GLmJvdLH3uK4o0p9xynaI5CNBrEGtSnlnIzL23mW5HOIlmULzRdmMtwFciudyG7dWjbJfGCpfwDO+3QS2/BcvPquq+4NjZYMukolAMsmhU5B3s//QT/fyU4odDcWFTln0NP9mbOFiiih5fKcSjvB1yXyz28/GFDUzu31m1+5nPLt8T9FV7kOCX1ICrbj8pmSUvkVuNRAEx+hHL8hrHLrRlKW9S9btVr57kGoNFNrgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=inb3OyrmcfuZp6ufROMZK8+A+WFB+Az+DbOSkZUvAro=; b=Pe7kuOFTSOC8HJNUTEMDAVd+SxD0yOHpNPEzlXP4u1JrUMSjJ2dBdBdA3WhDnQpd5LKJVfBw7GEZRpOiZzy9S4HxmgqQZqfBzJvWCLbAzzUCInd4O7a9hPIWt+d26Zggao4b/Jyo2NiTAu5DsgC6mDGWGVvdP+jgtALb6VNRjgPunINPr6N0YzXyIuaA3OT6hVNoqR4rOg19aoQ6fAPoKatX3KPWn6X+sW6VoZNplPKQD/yNv6jC1RHjOEIGVw3ol7yLw4LTDo1NZghcWzlf6gTbxkKdTU29XpkuaTzFAh4DSJV0WnMZzAJlYFzyHaT22encmoHXgqbF4D4Wdb09bg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=inb3OyrmcfuZp6ufROMZK8+A+WFB+Az+DbOSkZUvAro=; b=MPschnkomGXZByYUtQWpXuMLK0bMr23lsq2WBdFBw3oIJhEW+Xa84LDFGPPlyvC8mrJl2KzZpreKM4+PVEWeIJGlvv4o3cTWyHdzAyqOxebE8y3fv3OHVYPgOilIvFABlbYeMp4iQMu7pVGf/9n0nWS+xuqiGvHrnUZhsLEP9pg= Received: from BY3PR08MB7060.namprd08.prod.outlook.com (2603:10b6:a03:36d::19) by BYAPR08MB4535.namprd08.prod.outlook.com (2603:10b6:a03:52::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.19; Thu, 19 Aug 2021 16:09:51 +0000 Received: from BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d]) by BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::94a6:8abc:2cc1:fa4d%5]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 16:09:50 +0000 From: "Rabadan, Jorge (Nokia - US/Mountain View)" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlwAAgzMQAAB+KQAAAEcMAAAA0+4K Date: Thu, 19 Aug 2021 16:09:50 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=nokia.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: dc5048ae-a140-4f4f-9ebf-08d9632bc629 x-ms-traffictypediagnostic: BYAPR08MB4535: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3968; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR08MB7060.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(346002)(376002)(136003)(396003)(366004)(33656002)(110136005)(478600001)(7696005)(316002)(296002)(30864003)(122000001)(38100700002)(38070700005)(8936002)(66946007)(76116006)(91956017)(64756008)(9686003)(66446008)(71200400001)(52536014)(2906002)(5660300002)(66556008)(66476007)(83380400001)(66574015)(166002)(4326008)(966005)(186003)(86362001)(8676002)(55016002)(26005)(53546011)(6506007)(579004); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?csyFzY67KHKzRzkqcUv0+jD9AZnTtFCweUhhZ8s5L0k4QeCpSAWTZeS6?= =?Windows-1252?Q?VADBBVIoOY0KA/z7MgphgNIYhTTcqPhrIpSiUD3+Qb7wf52dNs+T3CdW?= =?Windows-1252?Q?wSUAjXvT1UOjHbMKJu7YDgiI4F7ARDakuEMotT/3+6wB+n0nyHeIfOnK?= =?Windows-1252?Q?lDYPhAt8Yi8R7n70hvizvhPGRZfCy4qDAg6+qWJ3EiR1tSHRz5jh6pJZ?= =?Windows-1252?Q?AZC/z0xYC1TkmjIEdvNZyrXBSxbM2qPjUgJ38d9++ppf3SetxA+ZnSOn?= =?Windows-1252?Q?Abf7K1s9zL0DgP9Bq4ITOvn+748gVPFLzEeB2upwkBCMT3xZmUmfi/Tz?= =?Windows-1252?Q?jkJVIr6vgrRAozFGZ2TJUn4uFRUzu72xBSyUHaZaEYmfB/LXpePxfdOi?= =?Windows-1252?Q?OM2osyP2TXiEdTn0/oRGLcADK+h7EaigpciZApQNXLG/FIVylOk5Cre1?= =?Windows-1252?Q?Qi8OBSRYf8Az5+AvJz/UVXFfMi7BoOnJeBCTozvlAtkEY0GMAifEXk7m?= =?Windows-1252?Q?4sZYUdAc6Gcsw2VWXpuAAZiv7rvmtEHhMC1UavL+Pj0LOf98FciIm2Kw?= =?Windows-1252?Q?N/m/b8M83+4wLchVdTM40aJtX8gwUVpwN6cHQrAEah9W2Zwj6ghWLFlS?= =?Windows-1252?Q?S48sQH7bs1LLF5P70NFzvnvZKej00b2EaFQVHkxJfJGGhTHKC8L82XJE?= =?Windows-1252?Q?oHpWqxqcf0wQWkUjl82ibhUCjjjdydV3eBRxnetMiC/n+hzebiPumf6w?= =?Windows-1252?Q?/a9P0Jk/xZxNcdBfrZiT6rmHuU3lot51jfcgZ7HHtIdNKIESE1gKRtdW?= =?Windows-1252?Q?Qi6xqeJQsQuY12oySH0zj4ab9HMj7nWjVruylcs4RCPTEaIRGlWQknrB?= =?Windows-1252?Q?N8U8xxD2cR/FEQoLFnz8k0u3ZcHOslPFExgiiYehCDIOPDDLFiHOM58D?= =?Windows-1252?Q?U2EnypEUe1Kv2Rr2AdXixHioknTXt0zNAC13KYT14T2wMO7RWrKd6hqx?= =?Windows-1252?Q?Gyrqe2XUDqpEoP9S+PILMAyuF8OdtffcFEtR8m8aojMJ3e50HqYwr/+L?= =?Windows-1252?Q?zeWzAKKXuTIqCbDzgGPrQjq5s9ShcPEOJZDfT/3Lu5BhASyXbd4eOzno?= =?Windows-1252?Q?fLc49VwQ56f95t/3tQmNQSJga7k6y7/mM8YDhOHaSIw1g/K3WgDKcpSz?= =?Windows-1252?Q?i8gn1FI5cPcTpq/PrAMFirxFKO1zGs6jwBXiFaWAodEdZ8/jKEviCKcY?= =?Windows-1252?Q?XJv0b5tgPPhgyCQhwfenXgohzpQqTt/EgeWXUuEl5KzvoUkE5o3hnnSm?= =?Windows-1252?Q?S1vXKAEq6p114Nbdb0cDLHor8XeFKlGO1R5/8/qR38geTcJmHE6EeqaZ?= =?Windows-1252?Q?KXuAKtAvsHbnhktqW1sDc5BeR6L0T+UTB5kNQEUYKPyl2EV0z/dzbN++?= =?Windows-1252?Q?X+ezPoL2ZaI2N4puSpendw=3D=3D?= Content-Type: multipart/alternative; boundary="_000_BY3PR08MB70607218E0811CB04C609378F7C09BY3PR08MB7060namp_" MIME-Version: 1.0 X-OriginatorOrg: nokia.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BY3PR08MB7060.namprd08.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: dc5048ae-a140-4f4f-9ebf-08d9632bc629 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 16:09:50.7542 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: y4QXV6nCqiBIVTltUNYAxG2E8uHwgSPZ03EJsAIvBAo3URAvOjN1+08VNX0VF+TEYVjzgRqdRhrFGYPrayu7vw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR08MB4535 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 16:10:00 -0000 --_000_BY3PR08MB70607218E0811CB04C609378F7C09BY3PR08MB7060namp_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable I think you are saying that the FW can fail but it=92s interface to the lea= f is oper-up. I don=92t think the network can do anything to prevent traffi= c to that interface then. And of course, in your new diagram local bias does not play. As I said, loc= al bias works in the previous diagram. Those new leaf nodes will do aliasing to the remote all-active ES. If you still want to control the unicast and BUM flows to one FW or the oth= er depending on the leaf, you can still do it but that=92s implementation s= pecific since it relies on the route selection in vtep_host1 and vtep_host2= . Thx Jorge From: Dikshit, Saumya Date: Thursday, August 19, 2021 at 8:49 AM To: Rabadan, Jorge (Nokia - US/Mountain View) , dr= aft-ietf-bess-evpn-fast-df-recovery@ietf.org , draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc >>> the static mac is configured associated to an interface and conditional= ly active based on the oper-status of the interface Ack on that and that=92s pretty organic (tying it to the interface/AC state= ). But it may not solve the case where other hosts (other than firewall) are b= ehind the interface/AC (which is live and kicking). Need to track firewall state and trigger an administrative delete of the st= atic-MAC. >>> As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps = =93Vtep_host1=94 and =93Vtep_host2=94 respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 9:04 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc About this: >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. In the implementations I know, the static mac is configured associated to a= n interface and conditionally active based on the oper-status of the interf= ace. So no admin intervention. IMHO it does not make much sense to keep a s= tatic mac installed if the associated attachment circuit is down. Thanks. Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 8:28 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks Again Rabadan and apology for the confusion. As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps = =93Vtep_host1=94 and =93Vtep_host2=94 respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 8:35 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don=92t understand. When the local FW goes down, the= local static MAC disappears and the one from the EVPN route should be inst= alled. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That=92s the reason it would be good to have two DFs for the {ESI, Bridge-d= omain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don=92t see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows =91static= =92 MACs that are advertised with the sticky bit set. You can configure MAC= F as static in the two leaf nodes. There is no mobility procedures for sta= tic MACs, hence forwarding comes down to the local selection on each node. = In the implementations that I know, the local static MAC will be preferred = over the EVPN MAC/IP route with the static bit, hence again you will have t= he behavior you want.. and again, only in your example with two directly co= nnected leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://data= tracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= ) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_BY3PR08MB70607218E0811CB04C609378F7C09BY3PR08MB7060namp_ Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable

I think you are saying that the FW can fail but it=92s interface to the l= eaf is oper-up. I don=92t think the network can do anything to prevent traf= fic to that interface then.

 

And of course, in your new diagram local bias does not play. As I said, l= ocal bias works in the previous diagram.

Those new leaf nodes will do aliasing to the remote all-active ES.

 

If you still want to control the unicast and BUM flows to one FW or the o= ther depending on the leaf, you can still do it but that=92s implementation= specific since it relies on the route selection in vtep_host1 and vtep_host2.

 

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.c= om>
Date: Thursday, August 19, 2021 at 8:49 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@noki= a.com>, draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-be= ss-evpn-fast-df-recovery@ietf.org>, draft-ietf-bess-evpn-df-election-fra= mework@ietf.org <draft-ietf-bess-evpn-df-election-framework@ietf.org>=
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

>>> the static mac is configured associated to an interface and= conditionally active based on the oper-status of the interface

Ack on that and that=92s pretty organic (tying it to the interface/A= C state).

But it may not solve the case where other hosts (other than firewall= ) are behind the interface/AC (which is live and kicking).

Need to track firewall state and trigger an administrative delete of= the static-MAC.

 

 

>>> 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as = well,

to reflect that reachability to firewall from the host(s) is across = the Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop = vteps =93Vtep_host1=94 and =93Vtep_host2=94 respectively.=

In this updated topology local-bias will not come into play, as traf= fic from host1/2 to firewall arrives over the evpn-fabric.

.

 

    SITE= -1            &= nbsp;    |        &n= bsp;            = ;    SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    = ;      \       =             &nb= sp;            =             &nb= sp; /

Vtep_host1  &= nbsp;           &nbs= p;             =   Vtep_host2         = ;           
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    = ;     |       [ EVPN-fabr= ic ]            &nbs= p;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

 

 

From: Rabadan, J= orge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:04 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

About this:

 

>>>> the local static MA= C disappears

As I have observed in few implementations th= at static MACs are admin-configured (other than control-plane published wit= h sticky-bit).

So will need a admin intervention to clean t= hem up.

 

 

In the implementations I know, the static ma= c is configured associated to an interface and conditionally active based o= n the oper-status of the interface. So no admin intervention. IMHO it does not make much sense to keep a static m= ac installed if the associated attachment circuit is down.

 

Thanks.

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 8:28 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks Again Rabadan and apology for the confusion.

 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as = well,

to reflect that reachability to firewall from the host(s) is across = the Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop = vteps =93Vtep_host1=94 and =93Vtep_host2=94 respectively.=

In this updated topology local-bias will not come into play, as traf= fic from host1/2 to firewall arrives over the evpn-fabric.

.

 

    SITE= -1            &= nbsp;    |        &n= bsp;            = ;    SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    = ;      \       =             &nb= sp;            =             &nb= sp; /

Vtep_host1  &= nbsp;           &nbs= p;             =   Vtep_host2         = ;           
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    = ;     |       [ EVPN-fabr= ic ]            &nbs= p;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

>>>> the local static MAC disappears

As I have observed in few implementations th= at static MACs are admin-configured (other than control-plane published wit= h sticky-bit).

So will need a admin intervention to clean t= hem up.

 

Thanks

Saumya.

 

From: Rabadan, J= orge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

For the first case, again, for the local hos= ts, local bias makes sure the ARP requests go only to the local FW, i.e. ho= st-1 ARP Requests goes to FW-1 only, irrespective of the DF state.

 

For the second case, I don=92t understand. W= hen the local FW goes down, the local static MAC disappears and the one fro= m the EVPN route should be installed.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a pro= mpt reply Jorge.

 

Well I missed drawing = the Host(s) behind the remote Vtep (PE) assuming that it will not make any = difference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broa= dcast packets like ARP request for the firewaill credentials ? ARP request = (MAC_F) should to sent to the local vtep, which should act as a DF.

The hairpinning of ARP= request to remote DF (over WAN), should be avoided. That=92s the reason it= would be good to have two DFs for the {ESI, Bridge-domain} in this scenari= o.

 

>>>> In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route = with the static bit, hence again you will have the behavior you want=

The static-mac approac= h has an issue, when the local firewall goes down, there is no organic way = to prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, = Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do w= ith the two documents you refer to. In fact I don=92t see any issue related= to multihoming.

Given that in your example host-1 and FW-1 = are directly connected to the same leaf, and host-2 and FW-2 are connected = to the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same = all-active ES, I assume local-bias behavior as in RFC8365 (seems you are us= ing VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In= case of failure, the behavior will be as per your description. Note that a= third leaf with a local host will do aliasing to both, but since it seems = you only have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to th= e same ES, EVPN allows =91static=92 MACs that are advertised with the stick= y bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery<= br>
I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt

A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_BY3PR08MB70607218E0811CB04C609378F7C09BY3PR08MB7060namp_-- From nobody Thu Aug 19 11:09:40 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 055A43A12D5; Thu, 19 Aug 2021 11:09:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.54 X-Spam-Level: X-Spam-Status: No, score=-2.54 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8_kMk1MFwQQb; Thu, 19 Aug 2021 11:09:30 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99D553A12CF; Thu, 19 Aug 2021 11:09:30 -0700 (PDT) Received: from pps.filterd (m0148663.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17JI8rA6026241; Thu, 19 Aug 2021 18:09:30 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=3q4crw/hHwrhaiNeWttLN7fZQUYTwAidvDv4yZwbdvc=; b=ove1BCrlDP7VN4MHm6m1ZVtQN2Z/JFctBZjDHASLT0jP1Y3m3zZUOkYHVPEEEv7BZe2Z Ec/lTwREF9FuIQu7ObKlVl7m50KVP3WqM8ZYrnHLeYbzifFHzVmgS2GTxkEi/aslPiGB xDbonUol7M41y/HFbNiFhM8i02Y6CnZZYDg0qOGlI7uRMZduZYwJqtm1LSWhyewR4XU1 TBsUUshiaD+gdbT8VI+aIGitWlieWokZsrribmo3/4rnCGnbgTn/RcPWRfclZmYcIf+6 STkuaGIR7ud+gSvus/1y556DzaMbLwr5HwByRXANKM281ipUxG5XwtnEwyuF4gt8Gwcn ew== Received: from g9t5009.houston.hpe.com (g9t5009.houston.hpe.com [15.241.48.73]) by mx0a-002e3701.pphosted.com with ESMTP id 3ahbt78ac0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Aug 2021 18:09:29 +0000 Received: from G1W8108.americas.hpqcorp.net (g1w8108.austin.hp.com [16.193.72.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g9t5009.houston.hpe.com (Postfix) with ESMTPS id EA40566; Thu, 19 Aug 2021 18:09:28 +0000 (UTC) Received: from G9W8453.americas.hpqcorp.net (2002:10d8:a0d3::10d8:a0d3) by G1W8108.americas.hpqcorp.net (2002:10c1:483c::10c1:483c) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 19 Aug 2021 18:09:28 +0000 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (15.241.52.13) by G9W8453.americas.hpqcorp.net (16.216.160.211) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Thu, 19 Aug 2021 18:09:28 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MB+9wV0rpT8B7hy1Vm4o6S3f13teY5GGIOXTqoy7lNTX8VUnltgihCfKNnlbmg3/iyGQ+aMs8jgYZt65lmuQOOyMzBWQ2ZSV6NxxLaK9lKe2nSWdnC9CIDcE/oCbhysBGDDhZbCAGOF5uDKhy6n/6+9qe5n9ZZPjLG4xvw3wQhrvHb8aKXdUEl+VvIpFXtvX7vKk8wl6TUGdXcRI5p/rRHrdOPo0O0/xHo0yX64+4OzIjbwtfMgoaypHjhdzXpTKHZ/VD9Y2uf8HgNJJ6WsW3wHaOTuf7VGsybk24fWnbXA/h3erGXyKd9frViDv6dU8W8y0gs6XTtSogrg0FZkLvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zD4233AE76iTSFYZee2cuGLzpD5PTr3DXXCLzwHYqHY=; b=YUWehQdp3fQPLsFRgreACQVs2MHOHxX7THnaOG/znPISu85ktamnVu/+PhKUJs6ngfRcTXlmO0gkaJjyrI5GZRp9aBWzhLrpOd1Cya1wXzzOct/EM0G4kXB2uB6pxc94bhp0LFY0m+tG7bESpSV2jfV8+s0ooBMXASt3X2uor1C8dVEKQsjtWRA4UZvQAzhS4sIk53otKin0fFfyJFoAqpa/elthNYFVhZxn5khlUqK6eb+8HdC/KlVE9P1l7N5iKtOThE4a97Fx1omxj0h4/Zeb5FB6DlDv07HMH40ruD9gWvMRJOFdHx70yB+9k9yYNU0mdqeL1Vfy46kZI11Vgw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7514::15) by CS1PR8401MB1093.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7513::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.19; Thu, 19 Aug 2021 18:09:26 +0000 Received: from CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c]) by CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM ([fe80::413a:e95e:bc8b:db7c%10]) with mapi id 15.20.4436.019; Thu, 19 Aug 2021 18:09:26 +0000 From: "Dikshit, Saumya" To: "Rabadan, Jorge (Nokia - US/Mountain View)" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlwAAgzMQAAB+KQAAAEcMAAAA0+4KAARDHrA= Date: Thu, 19 Aug 2021 18:09:26 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 36c24ee9-74e0-455b-c874-08d9633c7b19 x-ms-traffictypediagnostic: CS1PR8401MB1093: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3968; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(39860400002)(396003)(376002)(346002)(136003)(366004)(86362001)(186003)(966005)(33656002)(55016002)(8676002)(66946007)(296002)(110136005)(9686003)(55236004)(6506007)(7696005)(53546011)(38100700002)(122000001)(8936002)(38070700005)(71200400001)(5660300002)(52536014)(26005)(30864003)(316002)(4326008)(66574015)(478600001)(83380400001)(166002)(64756008)(66476007)(66446008)(66556008)(2906002)(76116006)(579004); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?XDk5QGvfkui5NpIFQLSoLgrPT8nSOdvORNZWuRtCXW/WSRV+f6Q8LvFHotvM?= =?us-ascii?Q?PCsLEkjIL5gx2qCpH0scDijSYOkZ78YCQxbQUZAKe5LsOj/XmojONYU6NYYA?= =?us-ascii?Q?lmawKcWjyYxzdRxNNicsIOfSG/Rtpxa2v9F4eyBN22/tjmxnNpyKOGhTqYzl?= =?us-ascii?Q?uzj0UrW6AFA1WZv3pYtisrWXfIkxslh4WqT8j3bHj5u+N+gFbhQnNGYnPW4Q?= =?us-ascii?Q?WygRu4bm+2XNwuRcL+8ljXqIOSMafnYaAdODMCgWxLQKFeLdz1ysoZdQ6Fl3?= =?us-ascii?Q?DcgpZZJmeUIxLlsghR+QjExqvxtb/O4L9OKce95tVQVBmOAGIRYoj2t6TqXQ?= =?us-ascii?Q?OFLuDfGJpDkqLPNRsqdKXTpZfWbZoHL4UiN3np7vR7UGhjVm7cDLsC8DliMp?= =?us-ascii?Q?hvLbjG5AoXV5YokvdbEGx0mlWyZ7TfjC/rsSK6FZV27bminTnr+t71GYx2fv?= =?us-ascii?Q?Xt6BEF11iGjq5uTLw4vbINIH084Ka9LxQizEiBRxddYatnVuAwVwV21XfOhN?= =?us-ascii?Q?5kr6sfPyz6U5HVod0zMPDlBc+kCOEBnrvY0O4176QiFt6JwDS33mYJ8lbM17?= =?us-ascii?Q?GwKsxK7GCHXxM2L8KbGlcDTdAs2A08f+jYMS5BtH0Jy/LDaIvMrz9/N1WFQx?= =?us-ascii?Q?+0cfIeitjzXHVrOirrpEmZfc8uFhKRMR1A1Gppqyjdx/35oAkOXKQ4d0FR25?= =?us-ascii?Q?WnT01xhcpDdnxAfviFEcWhfIhGMumKMVFTBsCEdH6kRnNvHDeuivT1Uptx9P?= =?us-ascii?Q?FZBNOC5JOwsLKjrsCRt4ph8jtbkITjQDLtDDe81HzhLy7vUIRTFCOGI1iTSO?= =?us-ascii?Q?A1NO7o5QRvNkV1knqSY6tO66VUjIJ4kBe3shPgZ50CevLAi1ervgc2d5WY6z?= =?us-ascii?Q?YFHHlFrnL4j8c6vuZqv4iGYH3kdNOygM7ZFgVf0mJ3/ZyJxCu0Ygt56e3r+5?= =?us-ascii?Q?x8imAXr2rHq/L8q6yOhdznSw4rKpzfK7E2W87pbzx4NMzHjSn+WFyCUewUlR?= =?us-ascii?Q?iPexUEkEzeVB/gEB7ip+zeE5E9wmeQ7ulxUqZMAOVMK0NllE/oWlwnaQ9Knr?= =?us-ascii?Q?fseIazoKXH++o6dK+kQDSlLfjoIqPfxC9P3LtWfsoUkGVLRYvQLiliVu6X0n?= =?us-ascii?Q?OW/SV3TJwm8LTwVRJREARDgwIxO+ruYF9gWLf/jqil64UrxvnUQJ42BVKZZD?= =?us-ascii?Q?jqcR0McmY8MXKmXVZw418WgH2HuTLPEmvt1x0fchkLYcoAS/8OY4eyREv6JZ?= =?us-ascii?Q?51ELJLDyeGVuB0wGa1z379TGZti6L9BAdQ1Kf0COXM4eGU6nnmG4lVGwk6dP?= =?us-ascii?Q?oz27FumYuHkD0KZbBIi+9Crv?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_CS1PR8401MB1237A04EE45E896735A7CF8494C09CS1PR8401MB1237_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CS1PR8401MB1237.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 36c24ee9-74e0-455b-c874-08d9633c7b19 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2021 18:09:26.2501 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: rokHamkYtOIgRHZQ4T6WqMGe4vkQf957fFgF7lwlVGOYUShxf043pCJDBDU8BkCPb1vL3t5SXHSaeTH+OrsIIw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CS1PR8401MB1093 X-OriginatorOrg: hpe.com X-Proofpoint-GUID: qDUZeRVSYYip8wnAOPmRk9ZJ995blFBx X-Proofpoint-ORIG-GUID: qDUZeRVSYYip8wnAOPmRk9ZJ995blFBx X-Proofpoint-UnRewURL: 14 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-19_06:2021-08-17, 2021-08-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 bulkscore=0 adultscore=0 malwarescore=0 spamscore=0 phishscore=0 priorityscore=1501 clxscore=1015 suspectscore=0 impostorscore=0 mlxscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108190106 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Aug 2021 18:09:38 -0000 --_000_CS1PR8401MB1237A04EE45E896735A7CF8494C09CS1PR8401MB1237_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable >>>> If you still want to control the unicast and BUM flows to one FW or th= e other depending on the leaf, you can still do it but that's implementatio= n specific since it relies on the route selection in vtep_host1 and vtep_ho= st2. +1 on the implementation part. It's good to have few proprietary solutions = in place. On another note, the best way forward could be the standards-support/enable= r for EVPN control-plane; like an option to allow more than one PEs (in active-active) to process the= BUM (arp request) traffic. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 9:40 PM To: Dikshit, Saumya ; draft-ietf-bess-evpn-fast-df-= recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ietf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc I think you are saying that the FW can fail but it's interface to the leaf = is oper-up. I don't think the network can do anything to prevent traffic to= that interface then. And of course, in your new diagram local bias does not play. As I said, loc= al bias works in the previous diagram. Those new leaf nodes will do aliasing to the remote all-active ES. If you still want to control the unicast and BUM flows to one FW or the oth= er depending on the leaf, you can still do it but that's implementation spe= cific since it relies on the route selection in vtep_host1 and vtep_host2. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 8:49 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc >>> the static mac is configured associated to an interface and conditional= ly active based on the oper-status of the interface Ack on that and that's pretty organic (tying it to the interface/AC state). But it may not solve the case where other hosts (other than firewall) are b= ehind the interface/AC (which is live and kicking). Need to track firewall state and trigger an administrative delete of the st= atic-MAC. >>> As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 9:04 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc About this: >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. In the implementations I know, the static mac is configured associated to a= n interface and conditionally active based on the oper-status of the interf= ace. So no admin intervention. IMHO it does not make much sense to keep a s= tatic mac installed if the associated attachment circuit is down. Thanks. Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 8:28 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks Again Rabadan and apology for the confusion. As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 8:35 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don't understand. When the local FW goes down, the l= ocal static MAC disappears and the one from the EVPN route should be instal= led. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That's the reason it would be good to have two DFs for the {ESI, Bridge-dom= ain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don't see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' = MACs that are advertised with the sticky bit set. You can configure MAC F a= s static in the two leaf nodes. There is no mobility procedures for static = MACs, hence forwarding comes down to the local selection on each node. In t= he implementations that I know, the local static MAC will be preferred over= the EVPN MAC/IP route with the static bit, hence again you will have the b= ehavior you want.. and again, only in your example with two directly connec= ted leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-= bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_CS1PR8401MB1237A04EE45E896735A7CF8494C09CS1PR8401MB1237_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

 

>>>> If you still want to control the unicast an= d BUM flows to one FW or the other depending on the leaf, you can still do = it but that’s implementation specific since it relies on the route selection in vtep_host1 and vtep_host2.

+1 on the implementation part. It’s good to have few proprietary so= lutions in place.

On another note, the best way forward could be the standards-support/enab= ler for EVPN control-plane;

like an option to allow more than one PEs (in active-active) to process t= he BUM (arp request) traffic.

 

Thanks

Saumya.

 

From: Rabadan, Jorge (Nokia - US/Mountain Vie= w) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:40 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com>; draft-ietf-bess-= evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@= ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

I think you are saying that the FW can fail but it’s interface to t= he leaf is oper-up. I don’t think the network can do anything to prev= ent traffic to that interface then.

 

And of course, in your new diagram local bias does not play. As I said, l= ocal bias works in the previous diagram.

Those new leaf nodes will do aliasing to the remote all-active ES.

 

If you still want to control the unicast and BUM flows to one FW or the o= ther depending on the leaf, you can still do it but that’s implementa= tion specific since it relies on the route selection in vtep_host1 and vtep_host2.

 

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 8:49 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

>>> the static mac is configured associated to an interface and c= onditionally active based on the oper-status of the interface

Ack on that and that’s pretty organic (tying it to the interface= /AC state).

But it may not solve the case where other hosts (other than firewall) = are behind the interface/AC (which is live and kicking).

Need to track firewall state and trigger an administrative delete of t= he static-MAC.

 

 

>>> 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as w= ell,

to reflect that reachability to firewall from the host(s) is across t= he Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop v= teps “Vtep_host1” and “Vtep_host2” respectively.

In this updated topology local-bias will not come into play, as traff= ic from host1/2 to firewall arrives over the evpn-fabric.=

.

 

    SITE-= 1            &n= bsp;    |        &nb= sp;            =     SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    =       \       &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p; /

Vtep_host1  &n= bsp;            = ;             &= nbsp; Vtep_host2         =            
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    =      |       [ EVPN-fabri= c ]             = ;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

 

 

From: Rabadan, Jor= ge (Nokia - US/Mountain View) [m= ailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:04 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

About this:

 

>>>> the local static MAC = disappears=

As I have observed in few implementations that= static MACs are admin-configured (other than control-plane published with = sticky-bit).

So will need a admin intervention to clean the= m up.

 

 

In the implementations I know, the static mac = is configured associated to an interface and conditionally active based on = the oper-status of the interface. So no admin intervention. IMHO it does not make much sense to keep a static mac = installed if the associated attachment circuit is down.

 

Thanks.

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 8:28 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks Again Rabadan and apology for the confusion.

 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as w= ell,

to reflect that reachability to firewall from the host(s) is across t= he Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop v= teps “Vtep_host1” and “Vtep_host2” respectively.

In this updated topology local-bias will not come into play, as traff= ic from host1/2 to firewall arrives over the evpn-fabric.=

.

 

    SITE-= 1            &n= bsp;    |        &nb= sp;            =     SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    =       \       &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p; /

Vtep_host1  &n= bsp;            = ;             &= nbsp; Vtep_host2         =            
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    =      |       [ EVPN-fabri= c ]             = ;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

>>>>= the local static MAC disappears

As I have observed in few implementations tha= t static MACs are admin-configured (other than control-plane published with= sticky-bit).

So will need a admin intervention to clean th= em up.

 

Thanks

Saumya.

 

From: Rabadan, Jo= rge (Nokia - US/Mountain View) [= mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

For the first case, again, for the local host= s, local bias makes sure the ARP requests go only to the local FW, i.e. hos= t-1 ARP Requests goes to FW-1 only, irrespective of the DF state.

 

For the second case, I don’t understand= . When the local FW goes down, the local static MAC disappears and the one = from the EVPN route should be installed.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a promp= t reply Jorge.

 

Well I missed drawing th= e Host(s) behind the remote Vtep (PE) assuming that it will not make any di= fference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broadc= ast packets like ARP request for the firewaill credentials ? ARP request (M= AC_F) should to sent to the local vtep, which should act as a DF.

The hairpinning of ARP r= equest to remote DF (over WAN), should be avoided. That’s the reason = it would be good to have two DFs for the {ESI, Bridge-domain} in this scena= rio.

 

>>>>= In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route wi= th the static bit, hence again you will have the behavior you want

The static-mac approach = has an issue, when the local firewall goes down, there is no organic way to= prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, Jo= rge (Nokia - US/Mountain View) [= mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do wit= h the two documents you refer to. In fact I don’t see any issue relat= ed to multihoming.

Given that in your example host-1 and FW-1 ar= e directly connected to the same leaf, and host-2 and FW-2 are connected to= the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same al= l-active ES, I assume local-bias behavior as in RFC8365 (seems you are usin= g VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case= of failure, the behavior will be as per your description. Note that a thir= d leaf with a local host will do aliasing to both, but since it seems you o= nly have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the = same ES, EVPN allows ‘static’ MACs that are advertised with the= sticky bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org= /doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-b= ess-evpn-fast-df-recovery

I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_CS1PR8401MB1237A04EE45E896735A7CF8494C09CS1PR8401MB1237_-- From nobody Mon Aug 23 04:30:45 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 619D33A07D1; Mon, 23 Aug 2021 04:30:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.54 X-Spam-Level: X-Spam-Status: No, score=-2.54 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NV9YC7dq7bA3; Mon, 23 Aug 2021 04:30:34 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C98E3A07CE; Mon, 23 Aug 2021 04:30:34 -0700 (PDT) Received: from pps.filterd (m0134421.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17NBSDa6001892; Mon, 23 Aug 2021 11:30:34 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=lcS/zmvaVlNGK4pN9HjfvZqWQg7wKH6S1c2DKCtCZd0=; b=SpVb0bk+2j5I6cW5301e5GYT0iGxBr91B3BsPxCG7LnE230TBL0wT0hkHZfib/OUQVZi NV9qf5PJxJChRh4hIOHVQpJFWg8j1WhVd+PG9E0yxLQhx6OUw9+rMX7K/lI/+XXi4QYT ahinmm2lQWxLNfp2oKXYfefPV6Zkxd9lVEso4mdAJ2DUSVrbxPzvr+W+xVMVdhjWhRSy IpCiqzGZ1NW6YCuBcNUkUKC3beqbTidanw5fxYR7ULqgfBWetP2SjCgVJAUhd97eOKXc yt+iQxtijblHrfNnJHWNRn3P5vPz5yHiIGY5Xz6Rn1BAAsQYuCq0E2397VPBHnbnipv3 9w== Received: from g2t2353.austin.hpe.com (g2t2353.austin.hpe.com [15.233.44.26]) by mx0b-002e3701.pphosted.com with ESMTP id 3am7ud1e0d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 23 Aug 2021 11:30:33 +0000 Received: from G9W8456.americas.hpqcorp.net (exchangepmrr1.us.hpecorp.net [16.216.161.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g2t2353.austin.hpe.com (Postfix) with ESMTPS id CF57877; Mon, 23 Aug 2021 11:30:32 +0000 (UTC) Received: from G9W8453.americas.hpqcorp.net (2002:10d8:a0d3::10d8:a0d3) by G9W8456.americas.hpqcorp.net (2002:10d8:a15f::10d8:a15f) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Mon, 23 Aug 2021 11:30:32 +0000 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (15.241.52.10) by G9W8453.americas.hpqcorp.net (16.216.160.211) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Mon, 23 Aug 2021 11:30:32 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZmhzcXCfIa28oZMDGfH56S9qgsWWv1JiuyXsN8UEbD/O86xQqMEIPW0+Y7+29mEWPDV/a8RlRGcqxgeYAig9bDaeBYtt5V+URd9qxEQkckq8Ik5PojS1BI8UeAFueqPS0KJRdQrK1rx+rbMXOYjFOIm2rNpiRVuUWu1qegjIoLryMCdEH156uXMdRDRQeG8FVsE1E4wyUUGBOgiCsU6YKQjVkEMdeH1bzIzrqJvK43XhezB8Nn0I/KI4rNOR0VBQoDAD4jTt6l2+Qr1RBadjo79e41HrL6cDzW60IojQ+cvphH0V/Pgxw9vkJi85kWAeTkdlCJaYemZ/BOU+jnSyUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2VJg59Sz39SLAlEeVUiyhcXj+68gjYl6k57W68wrf2U=; b=QYs5QzzA/zjAIr4EyEJPxBL99ZqWeGVBh08TGM80jdb+zm4jBtVNFL7c+YNXOWMbhvw60f4uqwilzN2ASuJj+MhloTuhqshfOTgU+M9v/FUB7y+YET3tV5psj21NdsGglYrbfNv61pK4fWuCYYS2zR6+YYRfBzWqen3PDvcCzvBAGcP9Io1GE6/yNgx9rDfnrqiOjY6CDgM8Mnrmry1ahV/LxPqBZX1/TgnVUdi2SoJS61rcshjtEHKzJ4fSmemgtDP/FmicwXadodAObZMsCoVWvKh8kwFm+Pq91Ih8WjcJVtxG3y9u5UdgzdLw59H7CgfP2s7137iUzFructYarA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::18) by DF4PR8401MB0876.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760e::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.22; Mon, 23 Aug 2021 11:30:30 +0000 Received: from DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM ([fe80::a0d3:cb12:eda1:f8cf]) by DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM ([fe80::a0d3:cb12:eda1:f8cf%11]) with mapi id 15.20.4436.024; Mon, 23 Aug 2021 11:30:30 +0000 From: "Joshi, Vinayak" To: "Dikshit, Saumya" , "Rabadan, Jorge (Nokia - US/Mountain View)" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAwkC7QA== Date: Mon, 23 Aug 2021 11:30:30 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 6c07da27-e2d9-4b9b-9ee6-08d966296a15 x-ms-traffictypediagnostic: DF4PR8401MB0876: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(346002)(366004)(39860400002)(376002)(396003)(136003)(86362001)(38070700005)(76116006)(2906002)(26005)(66946007)(7696005)(966005)(52536014)(166002)(8936002)(5660300002)(8676002)(83380400001)(66446008)(55236004)(71200400001)(122000001)(66476007)(53546011)(64756008)(9686003)(66556008)(316002)(296002)(478600001)(110136005)(55016002)(4326008)(186003)(6506007)(33656002)(38100700002)(66574015); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?gIbArI2WERISg49GISdqQTGf/161rb8SNe/XjzbekYqCIYxWbWc+fv8xJ9ah?= =?us-ascii?Q?Z9/SxLZRdrO6Q+WDlJkTs0Zh3xaTm4gRySEOluApwNptBF9Bxli9+bNagvta?= =?us-ascii?Q?todzxcHKtQRSeodO8bTL/VK4nQ6+Nl78TDSVYAlNd9b8e9o9k7WyuXsz0aUo?= =?us-ascii?Q?qon921LaNXhcQq+kW3psa59xIXA0iyrmIpGCMXTh+zO60CuwxDXrdnQgQVEt?= =?us-ascii?Q?h/eZg1RyhzvJL6NRVS+3OTeeCYyRw55hCLrjyslk+EccuBfyU4IWZLZqz8dO?= =?us-ascii?Q?EAqe04S/qvlswahqF2+t7RmH44UClJbM8L6quz7GxdbTr8P2aZNlPlwHIv0n?= =?us-ascii?Q?xgSmIvEgHxyh16Uuw9d54lG0h1JBQhQXLpWhQjT2V9q8zvvz/tsl2WfkCi56?= =?us-ascii?Q?hYsReDZsRehZwfIEm81KRLc2bf+afwEEE47JSOdBS+PTV5pU/0xuq7iGLEy0?= =?us-ascii?Q?Qevj6/JtgriaVVSFGCc0YTZszKFugYwQF+H6/sWqqtHiEPvIID1M/oTxT6Uo?= =?us-ascii?Q?cfbUtQT3sa5gjohrop/HGmUVheo5BzZUJDEYTaTDAwsFVnGzFcxGkkBDh60F?= =?us-ascii?Q?sRRKvBc0BSt2q4Vu4a3qOKzLyy/2K+9uvmK4T/Xr/2KMzlzohGGdJtcHHzJx?= =?us-ascii?Q?TfZCof7iGcr4NpqqrHjqDhba7jLhYoNiyxC12HAeDT5Qsj2vmzpkdtw+4ZeJ?= =?us-ascii?Q?YSxkm0UnYxpLasmVNfSZiMe1vZyRGveEY19jYXknAvSsNFFdu3NBckLCWflg?= =?us-ascii?Q?0+Afb40h+gPFYELUK+G4xGoMBDj4l5ECtHyZBCwHaE+I+c7jzXI1Ln2IvCkw?= =?us-ascii?Q?Nzr7sqFhlMY7+dIAvAUtDgxyOuLdyGhAsg7TxvNmpoCJ4Q0X9nzI5ZKSiEDz?= =?us-ascii?Q?B+6K2lvP7PLX3wWInD44UuYnd50Hj5F3A41mrL6PXSIXufwnDGJUXrgzZVBd?= =?us-ascii?Q?VP9+CTuJIiqAp4W10lP/wsGzTmrmD9h6G/xCLfdGLQsr9Oq/doKp0qSrPG7R?= =?us-ascii?Q?Uy2no+LzXMa/Wl710VRUuaJsWzdLjMDxJvDRjkRuHTKLpN/9jymDpYGjCeSM?= =?us-ascii?Q?WmL2z/EukBfXMQlk0ClOSMl1YBq6qFn5wJd/n2ldGz2J4zSz4oZnV1CAFWpm?= =?us-ascii?Q?EM9bLn3X+BFNc0cV+wtidbA0scDn6KF+7c3KxLwTOeYmbnSrln0J7tqy0x4o?= =?us-ascii?Q?RPLeBKf4S+GEbRqrekgArn4Qh/v5MtkORZo7A55/Fa6nkdAXTS0qJDL11iVw?= =?us-ascii?Q?YBwTZI1PT8JPzTqOq7+iHaI+zS9ZJwTSFNIJY8xw3L6Ka7m+doiBIc6zyMRn?= =?us-ascii?Q?KD+tEFHsu3Y3hGoxl0nG2Xtt?= Content-Type: multipart/alternative; boundary="_000_DF4PR8401MB0475939B4560C0BCE4C6E29BF2C49DF4PR8401MB0475_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 6c07da27-e2d9-4b9b-9ee6-08d966296a15 X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Aug 2021 11:30:30.7790 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 1BHSDczcunmLcsoTIjHZMnYjhmpvGf4PPHohBB4XjhKWbxLyVDOLmol5c/hzB9S9Ooaej8AJWdxleWII/OQRyg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB0876 X-OriginatorOrg: hpe.com X-Proofpoint-ORIG-GUID: DP_xfr0vGuwSfdLs6oc63dL9-pMxgGC4 X-Proofpoint-GUID: DP_xfr0vGuwSfdLs6oc63dL9-pMxgGC4 X-Proofpoint-UnRewURL: 14 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-23_02:2021-08-23, 2021-08-23 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 bulkscore=0 phishscore=0 adultscore=0 clxscore=1011 suspectscore=0 mlxlogscore=999 impostorscore=0 priorityscore=1501 mlxscore=0 spamscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108230077 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 23 Aug 2021 11:30:42 -0000 --_000_DF4PR8401MB0475939B4560C0BCE4C6E29BF2C49DF4PR8401MB0475_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable In other words it is not just all-active multi-homing. It is [all active + all DF] multihoming. However, BUM procedures such as L= ocal Bias have to be adhered to. Regards, Vinayaj From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Dikshit, Saumya Sent: Thursday, August 19, 2021 8:27 PM To: Rabadan, Jorge (Nokia - US/Mountain View) ; dr= aft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-elect= ion-framework@ietf.org Cc: bess@ietf.org Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That's the reason it would be good to have two DFs for the {ESI, Bridge-dom= ain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don't see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' = MACs that are advertised with the sticky bit set. You can configure MAC F a= s static in the two leaf nodes. There is no mobility procedures for static = MACs, hence forwarding comes down to the local selection on each node. In t= he implementations that I know, the local static MAC will be preferred over= the EVPN MAC/IP route with the static bit, hence again you will have the b= ehavior you want.. and again, only in your example with two directly connec= ted leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-= bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_DF4PR8401MB0475939B4560C0BCE4C6E29BF2C49DF4PR8401MB0475_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

In other words it is n= ot just all-active multi-homing.

 

It is [all active + al= l DF] multihoming.  However, BUM procedures such as Local Bias have to= be adhered to.

 

Regards,

Vinayaj

 

From: BESS [mailto:bess-bounces@ietf.org] = On Behalf Of Dikshit, Saumya
Sent: Thursday, August 19, 2021 8:27 PM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@noki= a.com>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-= evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df= -recovery and rfc

 

Thanks a lot for a prompt reply Jorge.

 

Well I missed drawing the Host(s) behind the remote = Vtep (PE) assuming that it will not make any difference (except aliasing as= you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broadcast packets like ARP request= for the firewaill credentials ? ARP request (MAC_F) should to sent to the = local vtep, which should act as a DF.

The hairpinning of ARP request to remote DF (over WA= N), should be avoided. That’s the reason it would be good to have two= DFs for the {ESI, Bridge-domain} in this scenario.

 

>>>> In the= implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route with the static bit, hence ag= ain you will have the behavior you want

The static-mac approach has an issue, when the local= firewall goes down, there is no organic way to prefer/plumb the MAC_F publ= ished by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, Jorge (Nokia - US/Mountain Vie= w) [mailto:jorge.rabadan@nokia.c= om]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do with the two documents you refe= r to. In fact I don’t see any issue related to multihoming.

Given that in your example host-1 and FW-1 are directly connected to the = same leaf, and host-2 and FW-2 are connected to the same leaf too, I can se= e your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same all-active ES, I assume local-= bias behavior as in RFC8365 (seems you are using VXLAN as data plane). Host= -1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case of failure, the behavior= will be as per your description. Note that a third leaf with a local host = will do aliasing to both, but since it seems you only have directly connect= ed leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows ‘= static’ MACs that are advertised with the sticky bit set. You can con= figure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, hence forwarding comes down to = the local selection on each node. In the implementations that I know, the l= ocal static MAC will be preferred over the EVPN MAC/IP route with the stati= c bit, hence again you will have the behavior you want.. and again, only in your example with two directly = connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org= /doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-b= ess-evpn-fast-df-recovery

I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_DF4PR8401MB0475939B4560C0BCE4C6E29BF2C49DF4PR8401MB0475_-- From nobody Mon Aug 23 04:52:16 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB52D3A0D78; Mon, 23 Aug 2021 04:52:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.54 X-Spam-Level: X-Spam-Status: No, score=-2.54 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8brYvfYZgVRB; Mon, 23 Aug 2021 04:52:05 -0700 (PDT) Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7886A3A0D7A; Mon, 23 Aug 2021 04:52:05 -0700 (PDT) Received: from pps.filterd (m0134422.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17NBnqmp020362; Mon, 23 Aug 2021 11:52:05 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=nfPYlOqi8FpL8kZrzvCtplmTCr08L9tW8l8tj7Ebeqg=; b=hyYSkDURqKu3MjLR5wv2dqo/lU3jE6HFqrQ25m4Bl0Yv1xEbIMBXJGn1bAYHBS9SF1gm 9H2zKxj9fO20wwX79zfVUZfS2Xo2UdpyfVuXfQcvLgAfzSDIUBEA0U2BoHjiCZlw76ri wWlVsOlBvOG3sy7gSqCNbYqi+mswM5+yiyAZxoyraGOSk/dvJXdeEUp2WGhp9StYXUzE kCMgtJvibzswXbTX0tlpcQceTUIew9lja2LC6QRnCrC8oiaDdt+wdf0WfxVYbtbH97tS 50xWNsoSRfn0gTXmeIzu3txzseArdfgm2lkWD9038sEUowRGrLcsnwh6WCnLQg1GXH1r jg== Received: from g2t2352.austin.hpe.com (g2t2352.austin.hpe.com [15.233.44.25]) by mx0b-002e3701.pphosted.com with ESMTP id 3ama1nrghs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 23 Aug 2021 11:52:04 +0000 Received: from G2W6310.americas.hpqcorp.net (g2w6310.austin.hp.com [16.197.64.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g2t2352.austin.hpe.com (Postfix) with ESMTPS id 75B5B85; Mon, 23 Aug 2021 11:52:03 +0000 (UTC) Received: from G1W8107.americas.hpqcorp.net (2002:10c1:483b::10c1:483b) by G2W6310.americas.hpqcorp.net (2002:10c5:4034::10c5:4034) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Mon, 23 Aug 2021 11:52:02 +0000 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (15.241.52.10) by G1W8107.americas.hpqcorp.net (16.193.72.59) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Mon, 23 Aug 2021 11:52:02 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nfYOOm27ktVIAUM0SD9cClXqGFS8s4iSfc3NCgeZgNozLyG7sZ7i4UNF1lIQPI/bfBknm1Cu3wq8Td0YeAsakFMcX1Ql3QE8Fs8dqQXPov/qeXle8nfKjX9Gk3Vq0to2p8cjYvOIc0n2JzJrh2AukNGKeogkj9lX51LEWGYb+4k80ICPvvukk4T+ACSZ+scFh0/abJy0mC09dBCbdjBi2QCPShQD4EzOGoga8sB5VDcuupEMMNeUCw4ajBSgn4pyA0FKxNeMNooIgKOR/2SKpSAjJ2vXdbDjE/k01xfXNHgvB5Iuqk/vuaj0M8RWe5Hgefn5zggRpC3nbAy4WZz08A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jX2xxBOphM4I4RgGhLdrHT9q1hvKhggPp2glaSzeDFw=; b=KMMOSGhOC6fNr2NBVSwKe1hBj8zkKDM/kViTjyLzog0arcwZc9bZwuGnHjAMCocbqTfdPXJPEAiyBIH2559pnDeaU5P2aTHf8xF2GXifkJaTJTCRevHzHX1NGjkPo8WJ7XUl28TXMfS5qkZVslheqHbat5Bkmcqr74uIB7IDz6QTcezIZtHCDYygtlN3Ena8JnFUTpNKXAjUW2z9FOdMzuBsdjoltQkCytQmBLnn5RI8egdAdLDQakY3VMod9Dl2FHbY8UEwr73Z33WHo1KxVdvPutIlwYooUecAdNajwHVD6sftt/WX80ndHm3tupVMiUkUY/KDkWX3wDXEWusoXA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::18) by DF4PR8401MB1212.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7612::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.22; Mon, 23 Aug 2021 11:52:00 +0000 Received: from DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM ([fe80::a0d3:cb12:eda1:f8cf]) by DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM ([fe80::a0d3:cb12:eda1:f8cf%11]) with mapi id 15.20.4436.024; Mon, 23 Aug 2021 11:52:00 +0000 From: "Joshi, Vinayak" To: "Dikshit, Saumya" , "Rabadan, Jorge (Nokia - US/Mountain View)" , "draft-ietf-bess-evpn-fast-df-recovery@ietf.org" , "draft-ietf-bess-evpn-df-election-framework@ietf.org" CC: "bess@ietf.org" Thread-Topic: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Thread-Index: AdeUsUIzDqdWM3jCQ+GSnr3hpDVnWwAUYe7OAAGB9SAAAJEqlwAAgzMQAAB+KQAAAEcMAAAA0+4KAARDHrAAu8DaYA== Date: Mon, 23 Aug 2021 11:52:00 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9fcfe157-f347-43ac-e0a8-08d9662c6b01 x-ms-traffictypediagnostic: DF4PR8401MB1212: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:4303; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(508600001)(166002)(38100700002)(33656002)(296002)(76116006)(30864003)(7696005)(966005)(6506007)(66446008)(5660300002)(55236004)(110136005)(83380400001)(53546011)(66574015)(2906002)(9686003)(52536014)(55016002)(8936002)(122000001)(71200400001)(8676002)(4326008)(86362001)(316002)(66946007)(66476007)(66556008)(38070700005)(64756008)(26005)(186003)(579004); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?VDr89b2kI/HT0XudZCR3FoHJwZDyITzdflZknlyxspO4TX/xF0yk5FyYyrd2?= =?us-ascii?Q?aByCDc73rr3u6lyDPWp/ipU7N3mfwQ96UYZpdhD+jGozD5Gwetg58PGDrvCv?= =?us-ascii?Q?GJ1hkTfhbAduzdAmja3c2jd0BRlHFYnM3CGMbkw6md9ug+o5KfrUYj4OhGRc?= =?us-ascii?Q?1wTjHe+mcjo0WC96psZGg4wpk6ZlkQIL1hJnmD6eW9ObPBpvxulpbKpEwhoj?= =?us-ascii?Q?wTWJJH3gPWnu3gApXmB4qWLYO5NlGWWN9aY/7DpIxrrQX3te4V1Hq+pUne8h?= =?us-ascii?Q?vNhmq1WZUnDAewX6Y5DPzu+Aynon0Fgp96llpvAQvkXwXRyUG8vuLGKTOQF1?= =?us-ascii?Q?F5LvRB0oGnnABuaQag5e1n6cw5pQvPOBrBE7YMamZNpxFTsP1zuQy/ewUnJx?= =?us-ascii?Q?E5mRoO57aDOivQ4aVnAKddSa9DPwjXdx0uvkTRhktz7YF38FTnY42NHkFd0t?= =?us-ascii?Q?vf2a4QwLpaRKHPKzDfwnS223xGsDwN94S2izt4F6Tb4Mmv9kvhEsi0WD1Pq/?= =?us-ascii?Q?S47aysmpUgLLQrfwNyBQnB3JWTPEMqNruhGQ5xwfmBufy+YIGTvqT+OUdDF4?= =?us-ascii?Q?+XLZxudhiz/fJUsgJv4s/iwawMyq77SzvsmxpsQOz3vEoX+lZhCFsdSKmAKn?= =?us-ascii?Q?6t9bEsMPMbUzB8MCIZzrPPipnbxPBdHEIL1jFe/FTnHr63QRgRrBHNFKVCHM?= =?us-ascii?Q?Rxq0TVi160nUhu2pb9KOml3lfMfBjd/XSDZEgtt+sf0BI4jgRly66aDZpv2E?= =?us-ascii?Q?1pCB3Pb5wbHdQJ/YYVuLi7UQxFeNo8eSKvc/m5rmYYv95YOm+yULYOWPs4IV?= =?us-ascii?Q?fe+Nbo+VIszFIqCZk1w0K0Rf9S/YQ6LLanVC37ebqLHOMLw6iR27O7B0vVDS?= =?us-ascii?Q?rrBd5GlMp3fysPbbUkMyHcYB75vfJa1yuOtgczs7HYhJN4CaBB/nfd7O9ig6?= =?us-ascii?Q?Ho0//RojO56nHQ8R30qroz4rX38S2qcQRKCh6O9n80O7Owu4Mw9Lhe9h5OD1?= =?us-ascii?Q?xDzFWdN0UdQ8ym8Ppyb+owFbscz1FByXWRgoS9KOiG6lpF3vx6TBdbb6TPrf?= =?us-ascii?Q?KE3+fPHc0BAwI/q8WXYP+Q9h/3ceQv1g5rlvuxjtu/NV55HAbcI06KmvWthv?= =?us-ascii?Q?8B7ZyuwwEdFWPw+x1foLj49vM13vvbbyreg1yH5+i+MIWB9W+3kgpiflXosd?= =?us-ascii?Q?GaFnPlXeWi1nVpMWRe2GExjrdlzBbD6keYPqXyJadppSqhvGyW54sbKzEmo2?= =?us-ascii?Q?IwixUtcjXM2vbwCZFPoKwJIAsgYGDtDOmFNvtk0DDYR9hhB8THdQCvQ+M+qD?= =?us-ascii?Q?dXQieVfDwcilQZQZLkY61nhl?= Content-Type: multipart/alternative; boundary="_000_DF4PR8401MB04752C2D9E909D27B47B0EBEF2C49DF4PR8401MB0475_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0475.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 9fcfe157-f347-43ac-e0a8-08d9662c6b01 X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Aug 2021 11:52:00.8165 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 2wKvau990TwTnCio8koahLjfXork9XXoLl0TiL/Olc1bdbft398khmj0eQg6Vl29JLe1KhaY2RdKBlxj1oadAQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB1212 X-OriginatorOrg: hpe.com X-Proofpoint-ORIG-GUID: pnwV2K5KlSq5obF4aIHHWkH4liTzFMw5 X-Proofpoint-GUID: pnwV2K5KlSq5obF4aIHHWkH4liTzFMw5 X-Proofpoint-UnRewURL: 14 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-23_02:2021-08-23, 2021-08-23 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 malwarescore=0 lowpriorityscore=0 spamscore=0 mlxscore=0 bulkscore=0 phishscore=0 mlxlogscore=999 impostorscore=0 clxscore=1015 priorityscore=1501 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108230080 Archived-At: Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 23 Aug 2021 11:52:14 -0000 --_000_DF4PR8401MB04752C2D9E909D27B47B0EBEF2C49DF4PR8401MB0475_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable +1 for standard compliance on the control plane to indicate [All Active + A= ll DF]. However, I think local bias is still needed to prevent some scenarios E.g.: 1) Host1 sends out ARP request for the Firewall. 2) It reaches VTEP-1 over VxLAN from Vtep_Host1. Two options at Vtep_1 a) Proprietary Option: VTEP 2 does not forward it over the VxLAN DCI = tunnel to Vtep2. I.e. VTEP 1 has to match the ARP for Firewall. b) Vtep_1 sends it over VTEP 2 on VxLAN DCI. VTEP 2's local bias proc= edure prevents it from getting into Firewall_2. This makes it easier to im= plement on Vtep_2. This is because Vtep_1 need not selectively block BUM ov= er the VxLAN tunnel (ARP from Host1 to resolve Host2's IP has to be forward= ed by Vtep_1 to Vtep_2). Regards, Vinayak From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Dikshit, Saumya Sent: Thursday, August 19, 2021 11:39 PM To: Rabadan, Jorge (Nokia - US/Mountain View) ; dr= aft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-elect= ion-framework@ietf.org Cc: bess@ietf.org Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc >>>> If you still want to control the unicast and BUM flows to one FW or th= e other depending on the leaf, you can still do it but that's implementatio= n specific since it relies on the route selection in vtep_host1 and vtep_ho= st2. +1 on the implementation part. It's good to have few proprietary solutions = in place. On another note, the best way forward could be the standards-support/enable= r for EVPN control-plane; like an option to allow more than one PEs (in active-active) to process the= BUM (arp request) traffic. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 9:40 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc I think you are saying that the FW can fail but it's interface to the leaf = is oper-up. I don't think the network can do anything to prevent traffic to= that interface then. And of course, in your new diagram local bias does not play. As I said, loc= al bias works in the previous diagram. Those new leaf nodes will do aliasing to the remote all-active ES. If you still want to control the unicast and BUM flows to one FW or the oth= er depending on the leaf, you can still do it but that's implementation spe= cific since it relies on the route selection in vtep_host1 and vtep_host2. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 8:49 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc >>> the static mac is configured associated to an interface and conditional= ly active based on the oper-status of the interface Ack on that and that's pretty organic (tying it to the interface/AC state). But it may not solve the case where other hosts (other than firewall) are b= ehind the interface/AC (which is live and kicking). Need to track firewall state and trigger an administrative delete of the st= atic-MAC. >>> As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 9:04 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc About this: >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. In the implementations I know, the static mac is configured associated to a= n interface and conditionally active based on the oper-status of the interf= ace. So no admin intervention. IMHO it does not make much sense to keep a s= tatic mac installed if the associated attachment circuit is down. Thanks. Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 8:28 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks Again Rabadan and apology for the confusion. As I mentioned I should have added first_hop vtep/PE for Host1/2 as well, to reflect that reachability to firewall from the host(s) is across the Ove= rlay (EVPN fabric). I have redone the topology to show host1 and host2 behind first hop vteps "= Vtep_host1" and "Vtep_host2" respectively. In this updated topology local-bias will not come into play, as traffic fro= m host1/2 to firewall arrives over the evpn-fabric. . SITE-1 | SITE-2 ------------------------------------------------------ Host1 Host2 \ / Vtep_host1 Vtep_host2 | | | [ EVPN-fabric ] | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 / \ Firewall _1 Firewall_2 (MAC_F) (MAC_F) >>>> the local static MAC disappears As I have observed in few implementations that static MACs are admin-config= ured (other than control-plane published with sticky-bit). So will need a admin intervention to clean them up. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 8:35 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc For the first case, again, for the local hosts, local bias makes sure the A= RP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 = only, irrespective of the DF state. For the second case, I don't understand. When the local FW goes down, the l= ocal static MAC disappears and the one from the EVPN route should be instal= led. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 7:56 AM To: Rabadan, Jorge (Nokia - US/Mountain View) >, draft-ietf-bess-evpn-fast-df-recovery@ietf.or= g >, draft-ietf-bess-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Thanks a lot for a prompt reply Jorge. Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that= it will not make any difference (except aliasing as you mentioned). >>>> FW1 and FW2 can be attached to the same all-active ES How to handle the broadcast packets like ARP request for the firewaill cred= entials ? ARP request (MAC_F) should to sent to the local vtep, which shoul= d act as a DF. The hairpinning of ARP request to remote DF (over WAN), should be avoided. = That's the reason it would be good to have two DFs for the {ESI, Bridge-dom= ain} in this scenario. >>>> In the implementations that I know, the local static MAC will be prefe= rred over the EVPN MAC/IP route with the static bit, hence again you will h= ave the behavior you want The static-mac approach has an issue, when the local firewall goes down, th= ere is no organic way to prefer/plumb the MAC_F published by remote vtep. Thanks Saumya. From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia= .com] Sent: Thursday, August 19, 2021 7:47 PM To: Dikshit, Saumya >= ; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-evpn-df-election-framework@ie= tf.org Cc: bess@ietf.org Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and = rfc Hi Saumya, To be clear, your query has nothing to do with the two documents you refer = to. In fact I don't see any issue related to multihoming. Given that in your example host-1 and FW-1 are directly connected to the sa= me leaf, and host-2 and FW-2 are connected to the same leaf too, I can see = your use-case resolved in two ways: a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bi= as behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1= will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-= 2. In case of failure, the behavior will be as per your description. Note t= hat a third leaf with a local host will do aliasing to both, but since it s= eems you only have directly connected leaf nodes, you are fine. b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' = MACs that are advertised with the sticky bit set. You can configure MAC F a= s static in the two leaf nodes. There is no mobility procedures for static = MACs, hence forwarding comes down to the local selection on each node. In t= he implementations that I know, the local static MAC will be preferred over= the EVPN MAC/IP route with the static bit, hence again you will have the b= ehavior you want.. and again, only in your example with two directly connec= ted leaf nodes. My 2 cents. Thx Jorge From: Dikshit, Saumya > Date: Thursday, August 19, 2021 at 4:51 AM To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org >, draft-ietf-bes= s-evpn-df-election-framework@ietf.org > Cc: bess@ietf.org > Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc Hello Authors of https://datatracker.ietf.org/doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-= bess-evpn-fast-df-recovery I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures. Scenario: All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. This is a typical case of distributed firewall (active/active) across fabri= cs (sites), Where in, the preferred firewall is the one local to the site, whereas, upo= n failure, packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall. The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI. All in all, it's an emulated multi-homing scenario. This is scenario of distributed firewall devices host same MAC credentials. Simplistic example : There are two sites, SITE-1 and SITE-2 in the below diagram. Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain) should run through site-local firewall instance (firewall_1) preferably. Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2). Same should apply to traffic generated by Host2 (in SITE-2), wherein, it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1. Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1. But since both the learnings are over the same ESI, it should not lead to M= AC move. Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE. Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall. SITE-1 | SITE-2 ------------------------------------------------------ Host1 | Host2 | | | Vtep1 =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D Vtep2 | | | Firewall _1 | Firewall_2 (MAC_F) (MAC_F) Please let me know if there is a way out (with out) using existing standard= s. Thanks Saumya. -----Original Message----- From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf= .org Sent: Tuesday, July 6, 2021 8:31 PM To: i-d-announce@ietf.org Cc: bess@ietf.org Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : Fast Recovery for EVPN DF Election Authors : Patrice Brissette Ali Sajassi Luc Andre Burdet John Drake Jorge Rabadan Filename : draft-ietf-bess-evpn-fast-df-recovery-02.txt Pages : 11 Date : 2021-07-06 Abstract: Ethernet Virtual Private Network (EVPN) solution provides Designated Forwarder election procedures for multi-homing Ethernet Segments. These procedures have been enhanced further by applying Highest Random Weight (HRW) Algorithm for Designated Forwarded election in order to avoid unnecessary DF status changes upon a failure. This draft improves these procedures by providing a fast Designated Forwarder (DF) election upon recovery of the failed link or node associated with the multi-homing Ethernet Segment. The solution is independent of number of EVIs associated with that Ethernet Segment and it is performed via a simple signaling between the recovered PE and each PEs in the multi-homing group. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery= -02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast-df-recovery-0= 2 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ BESS mailing list BESS@ietf.org https://www.ietf.org/mailman/listinfo/bess --_000_DF4PR8401MB04752C2D9E909D27B47B0EBEF2C49DF4PR8401MB0475_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

+1 for standard compli= ance on the control plane to indicate [All Active + All DF].

However, I think local= bias is still needed to prevent some scenarios

 

E.g.:

1)  Host1 sends o= ut ARP request for the Firewall.

2)  It reaches VT= EP-1 over VxLAN from Vtep_Host1. Two options at Vtep_1

a) &nbs= p;    Proprietary Op= tion:  VTEP 2 does not forward it over the VxLAN DCI tunnel to Vtep2. = I.e. VTEP 1 has to match the ARP for Firewall.

b) &nbs= p;     Vtep_1 s= ends it over VTEP 2 on VxLAN DCI. VTEP 2’s local bias procedure preve= nts it from getting into Firewall_2.  This makes it easier to implemen= t on Vtep_2. This is because Vtep_1 need not selectively block BUM over the VxLAN tunnel (ARP from Host1 to resolve Host2’s I= P has to be forwarded by Vtep_1 to Vtep_2).

Regards,

Vinayak

 

 

 

From: BESS [mailto:bess-bounces@ietf.org] = On Behalf Of Dikshit, Saumya
Sent: Thursday, August 19, 2021 11:39 PM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@noki= a.com>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org; draft-ietf-bess-= evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df= -recovery and rfc

 

 

>>>> If you still want to control the unicast an= d BUM flows to one FW or the other depending on the leaf, you can still do = it but that’s implementation specific since it relies on the route selection in vtep_host1 and vtep_host2.

+1 on the implementation part. It’s good to have few proprietary so= lutions in place.

On another note, the best way forward could be the standards-support/enab= ler for EVPN control-plane;

like an option to allow more than one PEs (in active-active) to process t= he BUM (arp request) traffic.

 

Thanks

Saumya.

 

From: Rabadan, Jorge (Nokia - US/Mountain Vie= w) [mailto:jorge.rabadan@nokia.c= om]
Sent: Thursday, August 19, 2021 9:40 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

I think you are saying that the FW can fail but it’s interface to t= he leaf is oper-up. I don’t think the network can do anything to prev= ent traffic to that interface then.

 

And of course, in your new diagram local bias does not play. As I said, l= ocal bias works in the previous diagram.

Those new leaf nodes will do aliasing to the remote all-active ES.

 

If you still want to control the unicast and BUM flows to one FW or the o= ther depending on the leaf, you can still do it but that’s implementa= tion specific since it relies on the route selection in vtep_host1 and vtep_host2.

 

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 8:49 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

>>> the static mac is configured associated to an interface and c= onditionally active based on the oper-status of the interface

Ack on that and that’s pretty organic (tying it to the interface= /AC state).

But it may not solve the case where other hosts (other than firewall) = are behind the interface/AC (which is live and kicking).

Need to track firewall state and trigger an administrative delete of t= he static-MAC.

 

 

>>> 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as w= ell,

to reflect that reachability to firewall from the host(s) is across t= he Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop v= teps “Vtep_host1” and “Vtep_host2” respectively.

In this updated topology local-bias will not come into play, as traff= ic from host1/2 to firewall arrives over the evpn-fabric.=

.

 

    SITE-= 1            &n= bsp;    |        &nb= sp;            =     SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    =       \       &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p; /

Vtep_host1  &n= bsp;            = ;             &= nbsp; Vtep_host2         =            
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    =      |       [ EVPN-fabri= c ]             = ;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

 

 

From: Rabadan, Jor= ge (Nokia - US/Mountain View) [m= ailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:04 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

About this:

 

>>>> the local static MAC = disappears=

As I have observed in few implementations that= static MACs are admin-configured (other than control-plane published with = sticky-bit).

So will need a admin intervention to clean the= m up.

 

 

In the implementations I know, the static mac = is configured associated to an interface and conditionally active based on = the oper-status of the interface. So no admin intervention. IMHO it does not make much sense to keep a static mac = installed if the associated attachment circuit is down.

 

Thanks.

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 8:28 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks Again Rabadan and apology for the confusion.

 

As I mentioned I should have added first_hop vtep/PE for Host1/2 as w= ell,

to reflect that reachability to firewall from the host(s) is across t= he Overlay (EVPN fabric).

 

I have redone the topology to show host1 and host2 behind first hop v= teps “Vtep_host1” and “Vtep_host2” respectively.

In this updated topology local-bias will not come into play, as traff= ic from host1/2 to firewall arrives over the evpn-fabric.=

.

 

    SITE-= 1            &n= bsp;    |        &nb= sp;            =     SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;            =             &nb= sp;          Host2<= /p>

    =       \       &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p; /

Vtep_host1  &n= bsp;            = ;             &= nbsp; Vtep_host2         =            
         |    &= nbsp;           &nbs= p;             =             &nb= sp;        |

    =      |       [ EVPN-fabri= c ]             = ;   |

         |    &= nbsp;           &nbs= p;            &= nbsp;           &nbs= p;         |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       /      &= nbsp;           &nbs= p;             =              &n= bsp;       \     &nb= sp;            =  
Firewall _1           &nb= sp;            =       Firewall_2     &nbs= p;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

 

>>>>= the local static MAC disappears

As I have observed in few implementations tha= t static MACs are admin-configured (other than control-plane published with= sticky-bit).

So will need a admin intervention to clean th= em up.

 

Thanks

Saumya.

 

From: Rabadan, Jo= rge (Nokia - US/Mountain View) [= mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

For the first case, again, for the local host= s, local bias makes sure the ARP requests go only to the local FW, i.e. hos= t-1 ARP Requests goes to FW-1 only, irrespective of the DF state.

 

For the second case, I don’t understand= . When the local FW goes down, the local static MAC disappears and the one = from the EVPN route should be installed.

 

Thx

Jorge

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, draft-iet= f-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-df-recovery@= ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

Thanks a lot for a promp= t reply Jorge.

 

Well I missed drawing th= e Host(s) behind the remote Vtep (PE) assuming that it will not make any di= fference (except aliasing as you mentioned).

 

>>>> FW1 and FW2 can be attached to = the same all-active ES

How to handle the broadc= ast packets like ARP request for the firewaill credentials ? ARP request (M= AC_F) should to sent to the local vtep, which should act as a DF.

The hairpinning of ARP r= equest to remote DF (over WAN), should be avoided. That’s the reason = it would be good to have two DFs for the {ESI, Bridge-domain} in this scena= rio.

 

>>>>= In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route wi= th the static bit, hence again you will have the behavior you want

The static-mac approach = has an issue, when the local firewall goes down, there is no organic way to= prefer/plumb the MAC_F published by remote vtep.

 

Thanks

Saumya.

 

From: Rabadan, Jo= rge (Nokia - US/Mountain View) [= mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <sa= umya.dikshit@hpe.com>; draft-iet= f-bess-evpn-fast-df-recovery@ietf.org; draf= t-ietf-bess-evpn-df-election-framework@ietf.org
Cc: bess@ietf.org
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recove= ry and rfc

 

Hi Saumya,

 

To be clear, your query has nothing to do wit= h the two documents you refer to. In fact I don’t see any issue relat= ed to multihoming.

Given that in your example host-1 and FW-1 ar= e directly connected to the same leaf, and host-2 and FW-2 are connected to= the same leaf too, I can see your use-case resolved in two ways:

 

a) FW1 and FW2 can be attached to the same al= l-active ES, I assume local-bias behavior as in RFC8365 (seems you are usin= g VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case= of failure, the behavior will be as per your description. Note that a thir= d leaf with a local host will do aliasing to both, but since it seems you o= nly have directly connected leaf nodes, you are fine.

 

b) instead of attaching FW-1 and FW-2 to the = same ES, EVPN allows ‘static’ MACs that are advertised with the= sticky bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, he= nce forwarding comes down to the local selection on each node. In the imple= mentations that I know, the local static MAC will be preferred over the EVP= N MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your = example with two directly connected leaf nodes.

 

My 2 cents.

Thx

Jorge

 

 

From: Dikshit, Saumya <saumya.dikshit@hpe.com>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org <draft-ietf-bess-evpn-fast-d= f-recovery@ietf.org>, draf= t-ietf-bess-evpn-df-election-framework@ietf.org <draft-ietf-bess-evpn-df= -election-framework@ietf.org>
Cc: bess@ietf.org <bess@ietf.org>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery a= nd rfc

Hello Authors of https://datatracker.ietf.org= /doc/rfc8584/ and https://datatracker.ietf.org/doc/draft-ietf-b= ess-evpn-fast-df-recovery

I have a query regarding the following use-case which I could not find supp= orted with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and b= oth act as DF. 

This is a typical case of distributed firewall (active/active) across fabri= cs (sites),
Where in, the preferred firewall is the one local to the site, whereas, upo= n failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote si= te firewall.
The firewall-device is connected to it's first-hop vtep over the same bridg= e-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.=

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain= )
 should run through site-local firewall instance (firewall_1) preferab= ly.
Only in case of local-outage, the traffic should be send across over WAN to= the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a= failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the = remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to M= AC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting = the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vt= ep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1        &n= bsp;        |    &nb= sp;            =         SITE-2
------------------------------------------------------   &nb= sp;            =             &nb= sp;  
      Host1      &nb= sp;        |    &nbs= p;            &= nbsp;      Host2
         |    &= nbsp;           &nbs= p;    |         = ;            &n= bsp;    |
     Vtep1  =3D=3D =3D=3DWAN=3D=3D=3D=3D=3D=3D&nbs= p; Vtep2           &= nbsp;
       |      &= nbsp;           &nbs= p;    |         = ;            &n= bsp;     |       &nb= sp;           
Firewall _1           |&n= bsp;            = ;      Firewall_2     &nb= sp;       
  (MAC_F)          &= nbsp;           &nbs= p;           (MAC_F)

Please let me know if there is a way out (with out) using existing standard= s.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ie= tf.org] On Behalf Of internet-drafts@ietf.org
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org
Cc: bess@ietf.org
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts director= ies.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title    &nb= sp;      : Fast Recovery for EVPN DF Election
        Authors    &= nbsp;    : Patrice Brissette
            &nb= sp;            = Ali Sajassi
            &nb= sp;            = Luc Andre Burdet
            &nb= sp;            = John Drake
            &nb= sp;            = Jorge Rabadan
        Filename    =     : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages    &nb= sp;      : 11
        Date    &nbs= p;       : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Desi= gnated
   Forwarder election procedures for multi-homing Ethernet Segmen= ts.
   These procedures have been enhanced further by applying Highes= t
   Random Weight (HRW) Algorithm for Designated Forwarded electio= n in
   order to avoid unnecessary DF status changes upon a failure.&n= bsp; This
   draft improves these procedures by providing a fast Designated=
   Forwarder (DF) election upon recovery of the failed link or no= de
   associated with the multi-homing Ethernet Segment.  The s= olution is
   independent of number of EVIs associated with that Ethernet Se= gment
   and it is performed via a simple signaling between the recover= ed PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-reco= very/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-= fast-df-recovery-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-fast= -df-recovery-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet= -drafts/


_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org= /mailman/listinfo/bess

--_000_DF4PR8401MB04752C2D9E909D27B47B0EBEF2C49DF4PR8401MB0475_-- From nobody Mon Aug 23 13:12:27 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B85E3A13C7; Mon, 23 Aug 2021 13:12:24 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: Cc: bess@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk Reply-To: bess@ietf.org Message-ID: <162974954435.30746.16892620262602333355@ietfa.amsl.com> Date: Mon, 23 Aug 2021 13:12:24 -0700 Archived-At: Subject: [bess] I-D Action: draft-ietf-bess-evpn-igmp-mld-proxy-12.txt X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 23 Aug 2021 20:12:25 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the BGP Enabled ServiceS WG of the IETF. Title : IGMP and MLD Proxy for EVPN Authors : Ali Sajassi Samir Thoria Mankamana Mishra John Drake Wen Lin Filename : draft-ietf-bess-evpn-igmp-mld-proxy-12.txt Pages : 33 Date : 2021-08-23 Abstract: Ethernet Virtual Private Network (EVPN) solution is becoming pervasive in data center (DC) applications for Network Virtualization Overlay (NVO) and DC interconnect (DCI) services, and in service provider (SP) applications for next generation virtual private LAN services. This draft describes how to support efficiently endpoints running IGMP for the above services over an EVPN network by incorporating IGMP proxy procedures on EVPN PEs. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-igmp-mld-proxy/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-igmp-mld-proxy-12 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-bess-evpn-igmp-mld-proxy-12 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Tue Aug 24 07:32:47 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 131E03A10C7; Tue, 24 Aug 2021 07:32:44 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: The IESG To: "IETF-Announce" X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk CC: bess-chairs@ietf.org, bess@ietf.org, draft-ietf-bess-evpn-igmp-mld-proxy@ietf.org, martin.vigoureux@nokia.com, slitkows.ietf@gmail.com Reply-To: last-call@ietf.org Sender: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-ID: <162981556338.24416.9670382295250496138@ietfa.amsl.com> Date: Tue, 24 Aug 2021 07:32:44 -0700 Archived-At: Subject: [bess] Last Call: (IGMP and MLD Proxy for EVPN) to Proposed Standard X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Aug 2021 14:32:44 -0000 The IESG has received a request from the BGP Enabled ServiceS WG (bess) to consider the following document: - 'IGMP and MLD Proxy for EVPN' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-09-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Ethernet Virtual Private Network (EVPN) solution is becoming pervasive in data center (DC) applications for Network Virtualization Overlay (NVO) and DC interconnect (DCI) services, and in service provider (SP) applications for next generation virtual private LAN services. This draft describes how to support efficiently endpoints running IGMP for the above services over an EVPN network by incorporating IGMP proxy procedures on EVPN PEs. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-igmp-mld-proxy/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3673/ https://datatracker.ietf.org/ipr/2949/ https://datatracker.ietf.org/ipr/2942/ From nobody Tue Aug 24 07:33:43 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BDAB53A11AA; Tue, 24 Aug 2021 07:33:27 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: The IESG To: "IETF-Announce" X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk CC: Zheng Zhang , bess-chairs@ietf.org, bess@ietf.org, draft-ietf-bess-evpn-bum-procedure-updates@ietf.org, martin.vigoureux@nokia.com, zzhang_ietf@hotmail.com Reply-To: last-call@ietf.org Sender: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-ID: <162981560775.25202.459359578452442240@ietfa.amsl.com> Date: Tue, 24 Aug 2021 07:33:27 -0700 Archived-At: Subject: [bess] Last Call: (Updates on EVPN BUM Procedures) to Proposed Standard X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Aug 2021 14:33:36 -0000 The IESG has received a request from the BGP Enabled ServiceS WG (bess) to consider the following document: - 'Updates on EVPN BUM Procedures' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-09-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies procedure updates for broadcast, unknown unicast, and multicast (BUM) traffic in Ethernet VPNs (EVPN), including selective multicast, and provider tunnel segmentation. This document updates RFC 7432. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-bum-procedure-updates/ No IPR declarations have been submitted directly on this I-D. From nobody Tue Aug 24 07:34:14 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D63623A10F5; Tue, 24 Aug 2021 07:33:59 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: The IESG To: "IETF-Announce" X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk CC: Matthew Bocci , bess-chairs@ietf.org, bess@ietf.org, draft-ietf-bess-evpn-optimized-ir@ietf.org, martin.vigoureux@nokia.com, matthew.bocci@nokia.com Reply-To: last-call@ietf.org Sender: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-ID: <162981563985.25202.16010718144605304046@ietfa.amsl.com> Date: Tue, 24 Aug 2021 07:33:59 -0700 Archived-At: Subject: [bess] Last Call: (Optimized Ingress Replication solution for EVPN) to Proposed Standard X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Aug 2021 14:34:09 -0000 The IESG has received a request from the BGP Enabled ServiceS WG (bess) to consider the following document: - 'Optimized Ingress Replication solution for EVPN' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-09-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Network Virtualization Overlay (NVO) networks using EVPN as control plane may use Ingress Replication (IR) or PIM (Protocol Independent Multicast) based trees to convey the overlay BUM traffic. PIM provides an efficient solution to avoid sending multiple copies of the same packet over the same physical link, however it may not always be deployed in the NVO core network. IR avoids the dependency on PIM in the NVO network core. While IR provides a simple multicast transport, some NVO networks with demanding multicast applications require a more efficient solution without PIM in the core. This document describes a solution to optimize the efficiency of IR in NVO networks. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-optimized-ir/ No IPR declarations have been submitted directly on this I-D. From nobody Thu Aug 26 23:32:41 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 404FB3A1D36; Thu, 26 Aug 2021 23:32:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.537 X-Spam-Level: X-Spam-Status: No, score=-2.537 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LBOx_d0GanIs; Thu, 26 Aug 2021 23:32:32 -0700 (PDT) Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49EFA3A1D37; Thu, 26 Aug 2021 23:32:31 -0700 (PDT) Received: from pps.filterd (m0134424.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17R6RxKY002879; Fri, 27 Aug 2021 06:32:30 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=wCS7RZOOM+gsjQLLVmK1IQWtXAFiXTpQcyxYKZS3qXo=; b=EoXN6J0N08Tr8HqY6H4gg5H8nArzbFcEZbV6MALgjoYga33g5y1+V9Kj+vCnILVRYq78 FtMPziUC8CCH1DiU8BZENLLM24bCKki2cK+J8N+HRbpLKF1zzXA0LZ9hF7Iu8hScTmNl E7qUE1POn4EnmbV/pdAVcLoXr2fliOS0iSkuQI8RlZg88JuHxQuIB6adzMjw0RGyz+q2 rK2d9/1bK8DPjFFkrFzEJZ2ozXQpYLuNu5cRssCDo3JCoj2BFIux/XTz+qEAM1JuB7hg t0CB4FrDedDRFgjmLwRoycuqaaXDPfiM37S+5WMUd0/kiDzEBn1F2CAVmmsCFykUr1oL Jg== Received: from g4t3427.houston.hpe.com (g4t3427.houston.hpe.com [15.241.140.73]) by mx0b-002e3701.pphosted.com with ESMTP id 3apbnqpfpt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 27 Aug 2021 06:32:29 +0000 Received: from G9W9210.americas.hpqcorp.net (g9w9210.houston.hpecorp.net [16.220.66.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3427.houston.hpe.com (Postfix) with ESMTPS id 4E1BA57; Fri, 27 Aug 2021 06:32:29 +0000 (UTC) Received: from G1W8106.americas.hpqcorp.net (16.193.72.61) by G9W9210.americas.hpqcorp.net (16.220.66.155) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Fri, 27 Aug 2021 06:32:29 +0000 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (15.241.52.13) by G1W8106.americas.hpqcorp.net (16.193.72.61) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Fri, 27 Aug 2021 06:32:28 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=i9J01MTn+001CSxEsYCG/6cnUAGANhUQtWoBtTmkoe8Vw+VkT4G9o44sRXJ+8Qh9C/L3V6TQFm+jLtKTOxnJDejavmJrZwEWoa9Q0465Hm8uoClYeu8jeJ7F+Y8g/O7sCW8HW4SiQzjJdzPj2RRSNaIrG+LXiIfFrFK2gZcEd3DgztsqcggvtEgCaNskC/taHOn91y8YhE5zZkIFqPlp6p95tOxUNsqWo46aOGQwYLM/eDS6xpR8ATd5naNm0aWGPSpGBHA3/yJWLZnbtA6ojWDE36JeEDh0kbpNCbGSoF6E2EUvR1haeaFqcYk75LHlk6NxWi0wot0DuG090mwn3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fOAy3WiGG91Eg4TftJzhzkouJZm4N6MvIJx+AMP4HH8=; b=Uo9wmsxHNYJixOKXziY/IRNaH5wSpMC+8ailePDK/mwmdG+sgvuJvaf32h+fr3ggWQsC8Dx8sQrG+n9UM7Y+0eMkIAydiugY2TbscE8kyh40Rx8MY0saMvkcZCpkdBKLnM2hxyCCjTG/VYaTPLZci93EDuCSYCASRb0JLJI1pwWKPSyKW2F0Lry7Iicq5+R/cuQrsdzkDuw8FkGpaCTtQosHZv3pHqEWD6QpyKgVtyHZjp6RS37Fv6TVYO4yg/DIQwZxnjfMBgVKtUon3BlBMECiyknsIFya6JSMHt6OTK18ROfY/pkVe+T5gyG1MZ/d63oyMBEVf7IIXI7f6JOwCA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7715::21) by TU4PR8401MB0927.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7713::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.20; Fri, 27 Aug 2021 06:32:27 +0000 Received: from TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::f01b:c60f:5d22:748b]) by TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM ([fe80::f01b:c60f:5d22:748b%12]) with mapi id 15.20.4457.020; Fri, 27 Aug 2021 06:32:27 +0000 From: "Dikshit, Saumya" To: "Neeraj Malhotra (nmalhotr)" , "draft-ietf-bess-evpn-irb-extended-mobility@ietf.org" CC: "bess-chairs@ietf.org" , "bess@ietf.org" Thread-Topic: Few queries on draft-ietf-bess-evpn-irb-extended-mobility Thread-Index: AdeQ0SpvsCHKrZuwR5W3DmRfbwf3vQCZ47ngAAT4JgAB8CgCYA== Date: Fri, 27 Aug 2021 06:32:27 +0000 Message-ID: References: <2B8A97CC-3709-4889-AA49-1F32BD7F7905@cisco.com> In-Reply-To: <2B8A97CC-3709-4889-AA49-1F32BD7F7905@cisco.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=hpe.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 3131781a-1680-4a99-868c-08d969247060 x-ms-traffictypediagnostic: TU4PR8401MB0927: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(376002)(366004)(136003)(346002)(39860400002)(396003)(122000001)(9326002)(7696005)(38100700002)(186003)(2906002)(966005)(316002)(55016002)(86362001)(9686003)(8936002)(166002)(66476007)(66946007)(53546011)(76116006)(6506007)(66556008)(52536014)(478600001)(66446008)(64756008)(55236004)(5660300002)(26005)(71200400001)(33656002)(8676002)(38070700005)(4326008)(110136005)(83380400001)(54906003); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?aUI4RkZBemJyZUlOUjVBcWZsK09TN3R2YWNza2xpUitVUTlsQ2dKTzllQ0pC?= =?utf-8?B?OFIzWTJVNUVhdjEwbE90Ui84anUwODl6TTFYa0FqQnJMRUl0TDBEajg3ZVZw?= =?utf-8?B?SU1BMi85ZityYmk2TndoN1dTdWE0VWd1MGxIOVUydXBvRE9yK3d2Sllmc2FF?= =?utf-8?B?QUZPSGxBS1hZY1lKMHZDc0c5MEp5K1M1RzgxMGlLNy9RQTNpV05zT1VmNG9i?= =?utf-8?B?QnpIcml0a2dlZVJNYVp6bFNPa3ZCSVhTRG1scUV2a2RObDNCbWtKZXV4SlBD?= =?utf-8?B?RmhRSVhTb2d1ZXYvc1hjaVN0Q0NkVC9FRTJTZ2w3Q016NlFpSmR2UUwzdE9I?= =?utf-8?B?cDVhZ3ltR3lCUVhHVlNpeDhtc21ob0xNUmQrdVpDSkM2YVVvdVZKZjZONmNF?= =?utf-8?B?Q3JKNW9leklwcVRNWmkzRTJqa0JvNlp1blp0M1VYWTJJYjJkYjVaWU44ZE0w?= =?utf-8?B?SVdQT2pheUplWnlmZGlPOHZJNmJDOThZYWlreUZJbDdBaHVvemJiUjV0T0pK?= =?utf-8?B?cXJNclYrQk9mV2RxZ0U1WVlVOFRVWEVsOTdqRER4eTh6dWRuR1dHVnF5SWdl?= =?utf-8?B?VTRlNWpmSkptajFicDlpZkpQSWxJRnlxSldSNzZUSktRTHFOaERTK2U1ZTZw?= =?utf-8?B?aHphazdMUXAzS2YzK2dyUG1yUi9UTE1HK1VwRXQ0U2Z1R1RCU3NFeEtrT1Nx?= =?utf-8?B?cjVQSEZ5MjlxdWRZN2tpNDRMUld4YVlsNWVoTFJ4amFqdXBzUXF3NVg2enBp?= =?utf-8?B?QnlHN09GdHpxeFd6T00ybEVPNVZHUXZlODQwdnM2V2lKaEc0ODhrc1hLeVh3?= =?utf-8?B?ZXRGbXhPUnBDalNSMHRvTzUvSUpjK093VkhkWC9Sa3B3a25GWUpGeVU3R0Nt?= =?utf-8?B?a09pckRZdWtNS3VHSEpwTS9BTUNkUXg0YUkyQ1Y5TEM3bUtBaUlzUE1NWjZt?= =?utf-8?B?bFV6eVNrYnh2aWhPZys4d24rQUtxOHgxWWl0ckR0eDVKVUduOUNMWlAvU2ZJ?= =?utf-8?B?YU9HekM3YUE5YStqUTJVbnRKam42NzFEVUR1QzNjM0tNUlpHREpLQ0ZDdVhU?= =?utf-8?B?VmlqV2dNaGREVzgyclRiUTZjUGdpN1lLc1NmR2E5elkvVlpyMlNJVW5Tck1J?= =?utf-8?B?N2NMb2tFajE5dG5mdkNoM0V2MndmRVdUblhSWkdLOHIyQ0pWUEpyM21BRWRV?= =?utf-8?B?R2h6SG1YS1pxMHVSaG1kSllHa0FOWXVkQnFubFlyVFFMbDErQ25nMTdBYjNy?= =?utf-8?B?QWlnMUJ2MGxBYlRPY3VydzRoNHhWZ250RktyVXpLM0Y0UUN1M1NLTW03Y280?= =?utf-8?B?WTY2cGN2OE51cW90SzRPc2ZyUVIxN1RmalYyb3lYdUEzOG42dDNCbmxvYVVv?= =?utf-8?B?QUk4SjMxNUpQeERUSEk0dzVTU2dYMHBwMHJNblFDMGFxcjcrK2c3UkZzLzd4?= =?utf-8?B?bVR5OFVwMjY4WlpTMUYxZll0NldPaVQ4aUsyU0NMcmpxNWxHalhtdUhjQXRh?= =?utf-8?B?VjVxcllBU3NlWVpUM1FGdTNGUGhObHVxVmFtQkhvQU4yWE8zTFhLdDI1ZzZu?= =?utf-8?B?M1pkRTA5SjVYZGlxTXRqVk1oM0VxekdNWk1VMTFZbEV5elphMTVIL1VOSEZM?= =?utf-8?B?S2lDSFBCYVdvaCtWdEdLc1phVDNDTU9HVklwVGVndkZITzZQUkFtWkdudFcy?= =?utf-8?B?NEdPQ2FsUlpUdUhnay80Z29GZ1paYnVpVHVzZUxFaGx6ZE9hQ0tuY0RnMjYx?= =?utf-8?Q?AWn/eBUFMwmGUL82TBe6LgEr6GRDAhrgF0aaOIm?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_TU4PR8401MB1248930A62AD7DF982263CA594C89TU4PR8401MB1248_" X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: TU4PR8401MB1248.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 3131781a-1680-4a99-868c-08d969247060 X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Aug 2021 06:32:27.3749 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: +ZgAODXssFMpcSbjRLO+AT3+7KtNwQNuzTQS1P5TwThOlvsGe0MEC0TaWa6Jxy19HzsojHiYJMfkTjmLKZzn4g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR8401MB0927 X-OriginatorOrg: hpe.com X-Proofpoint-GUID: Vftz6GUUVuMue3FRo3mZyZkBROYWFYMr X-Proofpoint-ORIG-GUID: Vftz6GUUVuMue3FRo3mZyZkBROYWFYMr X-Proofpoint-UnRewURL: 16 URL's were un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-27_02:2021-08-26, 2021-08-27 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxlogscore=999 clxscore=1015 suspectscore=0 adultscore=0 mlxscore=0 malwarescore=0 spamscore=0 impostorscore=0 priorityscore=1501 bulkscore=0 lowpriorityscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108270041 Archived-At: Subject: Re: [bess] Few queries on draft-ietf-bess-evpn-irb-extended-mobility X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Aug 2021 06:32:39 -0000 --_000_TU4PR8401MB1248930A62AD7DF982263CA594C89TU4PR8401MB1248_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgTmVlcmFqLA0KDQpQbGVhc2UgcHJvdmlkZSB5b3VyIGlucHV0cyBvbiB0aGUgYmVsb3cgcXVl cmllcy4NCg0KVGhhbmtzDQpTYXVteWEuDQoNCkZyb206IE5lZXJhaiBNYWxob3RyYSAobm1hbGhv dHIpIFttYWlsdG86bm1hbGhvdHJAY2lzY28uY29tXQ0KU2VudDogVHVlc2RheSwgQXVndXN0IDE3 LCAyMDIxIDEwOjE1IFBNDQpUbzogRGlrc2hpdCwgU2F1bXlhIDxzYXVteWEuZGlrc2hpdEBocGUu Y29tPjsgZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5QGlldGYub3Jn DQpDYzogYmVzcy1jaGFpcnNAaWV0Zi5vcmc7IGJlc3NAaWV0Zi5vcmcNClN1YmplY3Q6IFJlOiBG ZXcgcXVlcmllcyBvbiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHkN Cg0KDQpIaSBTYXVteWEsDQoNClRoYW5rcyBmb3IgeW91ciBjb21tZW50cy9xdWVzdGlvbnMuIFdp bGwgcmVzcG9uZCBieSBlbmQgb2YgdGhpcyB3ZWVrLg0KDQpUaGFua3MsDQpOZWVyYWoNCg0KRnJv bTogIkRpa3NoaXQsIFNhdW15YSIgPHNhdW15YS5kaWtzaGl0QGhwZS5jb208bWFpbHRvOnNhdW15 YS5kaWtzaGl0QGhwZS5jb20+Pg0KRGF0ZTogVHVlc2RheSwgQXVndXN0IDE3LCAyMDIxIGF0IDEy OjI1IEFNDQpUbzogIkRpa3NoaXQsIFNhdW15YSIgPHNhdW15YS5kaWtzaGl0QGhwZS5jb208bWFp bHRvOnNhdW15YS5kaWtzaGl0QGhwZS5jb20+PiwgImRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1l eHRlbmRlZC1tb2JpbGl0eUBpZXRmLm9yZzxtYWlsdG86ZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJi LWV4dGVuZGVkLW1vYmlsaXR5QGlldGYub3JnPiIgPGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1l eHRlbmRlZC1tb2JpbGl0eUBpZXRmLm9yZzxtYWlsdG86ZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJi LWV4dGVuZGVkLW1vYmlsaXR5QGlldGYub3JnPj4NCkNjOiAiYmVzcy1jaGFpcnNAaWV0Zi5vcmc8 bWFpbHRvOmJlc3MtY2hhaXJzQGlldGYub3JnPiIgPGJlc3MtY2hhaXJzQGlldGYub3JnPG1haWx0 bzpiZXNzLWNoYWlyc0BpZXRmLm9yZz4+LCAiYmVzc0BpZXRmLm9yZzxtYWlsdG86YmVzc0BpZXRm Lm9yZz4iIDxiZXNzQGlldGYub3JnPG1haWx0bzpiZXNzQGlldGYub3JnPj4NClN1YmplY3Q6IFJF OiBGZXcgcXVlcmllcyBvbiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxp dHkNClJlc2VudC1Gcm9tOiA8YWxpYXMtYm91bmNlc0BpZXRmLm9yZzxtYWlsdG86YWxpYXMtYm91 bmNlc0BpZXRmLm9yZz4+DQpSZXNlbnQtVG86IDxhcGpvc2hpQGNpc2NvLmNvbTxtYWlsdG86YXBq b3NoaUBjaXNjby5jb20+PiwgPGpvcmdlLnJhYmFkYW5Abm9raWEuY29tPG1haWx0bzpqb3JnZS5y YWJhZGFuQG5va2lhLmNvbT4+LCA8amRyYWtlQGp1bmlwZXIubmV0PG1haWx0bzpqZHJha2VAanVu aXBlci5uZXQ+PiwgPGFyOTc3bUBhdHQuY29tPG1haWx0bzphcjk3N21AYXR0LmNvbT4+LCA8c2Fq YXNzaUBjaXNjby5jb208bWFpbHRvOnNhamFzc2lAY2lzY28uY29tPj4sIDxubWFsaG90ckBjaXNj by5jb208bWFpbHRvOm5tYWxob3RyQGNpc2NvLmNvbT4+DQpSZXNlbnQtRGF0ZTogVHVlc2RheSwg QXVndXN0IDE3LCAyMDIxIGF0IDEyOjI1IEFNDQoNCkhlbGxvIEF1dGhvcnMgb2YgZHJhZnQtaWV0 Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LA0KDQpQbGVhc2UgaGVscCBtZSB3aXRo IGJlbG93IHF1ZXJpZXMuDQoNClRoYW5rcw0KU2F1bXlhLg0KDQpGcm9tOiBCRVNTIFttYWlsdG86 YmVzcy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YgRGlrc2hpdCwgU2F1bXlhDQpTZW50 OiBTYXR1cmRheSwgQXVndXN0IDE0LCAyMDIxIDExOjMwIEFNDQpUbzogZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5QGlldGYub3JnPG1haWx0bzpkcmFmdC1pZXRmLWJl c3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHlAaWV0Zi5vcmc+DQpDYzogYmVzcy1jaGFpcnNA aWV0Zi5vcmc8bWFpbHRvOmJlc3MtY2hhaXJzQGlldGYub3JnPjsgYmVzc0BpZXRmLm9yZzxtYWls dG86YmVzc0BpZXRmLm9yZz4NClN1YmplY3Q6IFtiZXNzXSBGZXcgcXVlcmllcyBvbiBkcmFmdC1p ZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHkNCg0KQ2hhbmdpbmcgdGhlIHN1Ympl Y3QgbGluZSBhbmQgcmVzZW5kaW5nLCBQbGVhc2UgaWdub3JlIHRoZSBwcmV2aW91cyBlbWFpbC4g QXBvbG9neSBmb3IgbWl4aW5nIHVwIHRoaW5nc10NCg0KSGVsbG8gQXV0aG9ycyBvZiAgZHJhZnQt aWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5Og0KDQpJIGhhdmUgZm9sbG93aW5n IHF1ZXJpZXMgYW5kIGNvbW1lbnRzIGFib3V0IHRoaXMgZHJhZnQg4oCcZHJhZnQtaWV0Zi1iZXNz LWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmfigJ0uDQpQbGVhc2UgaGVscCBjbGFyaWZ5Lg0K DQo+Pj4+U2VjdGlvbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMTxodHRw czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMT4NCg0KTVVTVCBiZSBhdCBsZWFzdCBl cXVhbCB0byBjb3JyZXNwb25kaW5nIFNZTkMgTUFDIHNlcXVlbmNlIG51bWJlcg0KICAgICAgaWYg b25lIGlzIHByZXNlbnQuDQpDYW4gd2UgZm9ybWFsbHkgZGVmaW5lIHdoYXQgYSDigJxTWU5DIE1B QyBzZXF1ZW5jZSBudW1iZXLigJ0gPw0KDQo+Pj4+U2VjdGlvbiBodHRwczovL2RhdGF0cmFja2Vy LmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2Jp bGl0eS0wNSNzZWN0aW9uLTguMzxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1s L2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTgu Mz4NCg0K4oCcTUFDIE14IHdpdGggYSBzZXF1ZW5jZSBudW1iZXIgdGhhdCBpcyBoaWdoZXIgdGhh biBvciBlcXVhbCB0bw0KICAgc2VxdWVuY2UgbnVtYmVyIGFzc2lnbmVkIHRvIGEgTE9DQUwgcm91 dGUgZm9yIE1BQyBNeDoNCiAgIG8gIFBFIE1VU1QgdHJpZ2dlciBwcm9iZSBhbmQgZGVsZXRpb24g cHJvY2VkdXJlIGZvciBhbGwgTE9DQUwgSVBzDQogICAgICBhc3NvY2lhdGVkIHdpdGggTUFDIE14 Lg0KICAgbyAgUEUgTVVTVCB0cmlnZ2VyIGRlbGV0aW9uIHByb2NlZHVyZSBmb3IgTE9DQUwgTUFD IHJvdXRlIGZvciBNeC4NCg0K4oCdDQpBcyBwZXIgcmZjNzQyMywgaWYgZXF1YWwgc2VxdWVuY2Ug bnVtYmVyIGlzIHJlY2VpdmVkLCB0aGVuIHRoZSBvbmUgcHVibGlzaGVkIHdpdGggbG93ZXIgdnRl cC1pcCBpcyByZXRhaW5lZCwgYW5kIHRoZSBvdGhlciBvbmUgaXMgd2l0aGRyYXduLg0KV2hpbGUg dGhpcyBzZWN0aW9uIHRhbGtzIGFib3V0IHByb2JpbmcgaXQgYWdhaW4uDQpUaGlzIHNob3VsZCBi ZSBjYWxsZWQgb3V0IGluIHRoZSBJbnRlcm9wIHNlY3Rpb24gYXMgd2VsbCwgZm9yIHRoZSBjby1l eGlzdGVuY2Ugb2Ygb2xkIHJ1bGUgYW5kIG5ld2x5IGRlZmluZWQNCg0KUXVvdGluZyBmcm9tICBo dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlvbi0xNTxo dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlvbi0xNT46 DQoNCuKAnElmIHR3byAob3IgbW9yZSkgUEVzIGFkdmVydGlzZSB0aGUgc2FtZSBNQUMNCg0KICAg YWRkcmVzcyB3aXRoIHRoZSBzYW1lIHNlcXVlbmNlIG51bWJlciBidXQgZGlmZmVyZW50IEV0aGVy bmV0IHNlZ21lbnQNCg0KICAgaWRlbnRpZmllcnMsIGEgUEUgdGhhdCByZWNlaXZlcyB0aGVzZSBy b3V0ZXMgc2VsZWN0cyB0aGUgcm91dGUNCg0KICAgYWR2ZXJ0aXNlZCBieSB0aGUgUEUgd2l0aCB0 aGUgbG93ZXN0IElQIGFkZHJlc3MgYXMgdGhlIGJlc3Qgcm91dGXigJ0NCg0KDQo+Pj4+IFNlY3Rp b24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3Mt ZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjY8aHR0cHM6Ly9kYXRhdHJh Y2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQt bW9iaWxpdHktMDUjc2VjdGlvbi04LjY+DQoNCuKAnCAgIGFuIGludGVyLW9wIHNjZW5hcmlvIHdp dGggYSBkaWZmZXJlbnQgaW1wbGVtZW50YXRpb24gY291bGQgYXJpc2UsDQoNCiAgIHdoZXJlIGEg UEUgaW1wbGVtZW50YXRpb24gbm9uLWNvbXBsaWFudCB3aXRoIHRoaXMgZG9jdW1lbnQgb3Igd2l0 aA0KDQogICBSRkMgNzQzMjxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3Jm Yzc0MzI+IGFzc2lnbnMgYW5kIGFkdmVydGlzZXMgaW5kZXBlbmRlbnQgc2VxdWVuY2UgbnVtYmVy cyB0byBNQUMNCg0KICAgYW5kIE1BQytJUCByb3V0ZXPigJ0NCkhvdyBkbyB3ZSBleHBlY3QgdGhp cyBpbXBsZW1lbnRhdGlvbiB0byBpbnRlci1vcCwgYXMgaXQgbWF5IGV4cGVjdCB0d28gZGlmZmVy ZW50IE1BQy1vbmx5IGFuZCBNQUMtSVAgYWR2ZXJ0aXNlbWVudCBmcm9tIHJlbW90ZSBwZWVycyBh cyB3ZWxsLj8NCkNhbiB3ZSBwYXJhcGhyYXNlIHRoaXMgPw0KDQoNCj4+Pj4gU2VjdGlvbiBodHRw czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguODxodHRwczovL2RhdGF0cmFja2VyLmll dGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0 eS0wNSNzZWN0aW9uLTguOD4NCg0K4oCcRm9sbG93aW5nIGEgaG9zdCBtb3ZlIGZyb20gUEUxIHRv IFBFMiwgdGhlIGhvc3QncyBNQUMgaXMNCg0KICAgICAgZGlzY292ZXJlZCBhdCBQRTIgYXMgYSBs b2NhbCBNQUMgdmlhIGEgZGF0YSBmcmFtZXMgcmVjZWl2ZWQgZnJvbQ0KDQogICAgICB0aGUgaG9z dC7igJ0NCg0KRG8gd2UgbmVlZCB0byBjYWxsIG91dCB0aGUgbWlzY29uZmlndXJhdGlvbiBjYXNl LCB3aGVyZSBhIHByb2JlIG1heSBsZWFkIHRvIERVUCByZXNwb25zZXMsDQoNCm9uZSBmcm9tIHRo ZSAobG9jYWwgbGVhcm5pbmcpIGFjY2VzcyBzaWRlIGFuZCBvdGhlciBvbmUgYWNyb3NzIHRoZSBm YWJyaWMgKG92ZXJsYXkgdHVubmVsKS4NCg0KDQo+Pj4+IFNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJh Y2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQt bW9iaWxpdHktMDUjc2VjdGlvbi0xMC40LjE8aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9k b2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2Vj dGlvbi0xMC40LjE+DQoNCuKAnHVuZnJlZXppbmcgdGhlDQoNCiAgICAgIHJvdXRlIGF0IHRoZSBG Uk9aRU4gbG9jYXRpb24gd2lsbCByZXN1bHQgaW4gdGhlIHJvdXRlIGJlaW5nDQoNCiAgICAgIGFk dmVydGlzZWQgd2l0aCBhIGhpZ2hlciBzZXF1ZW5jZSBudW1iZXIu4oCdDQpXaHkgYXJlIHdlIHR5 aW5nIHByb2Jpbmcgd2l0aCDigJx1bmZyZWV6aW5n4oCdID8gRlJPWkVOIHdpbGwgdHlwaWNhbGx5 IGluZGljYXRlIGRyb3BwaW5nIG9mIGZsb3dzLiBQcm9iaW5nIGNhbiBzdGlsbCBnbyBvbiBpbiBw YXJhbGxlbCA/DQpDYW4gdGhpcyBiZSBjYWxsZWQgb3V0IGV4cGxpY2l0bHkuDQoNCj4+Pj4gU2Vj dGlvbiAiIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1i ZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tNC4zLjE8aHR0cHM6Ly9k YXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0 ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi00LjMuMT4iIDoNCiIgW0lQNywgTTFdIGlzIGxlYXJu dCBhcyBhIG5ldyByb3V0ZSBhdA0KICAgW1BFMywgUEU0XSBhbmQgYWR2ZXJ0aXNlZCB0byByZW1v dGUgUEVzIHdpdGggYSBzZXF1ZW5jZSBudW1iZXIgb2YgMC4NCiAgIEFzIGEgcmVzdWx0LCBMMyBy ZWFjaGFiaWxpdHkgdG8gSVA3IHdvdWxkIGJlIGVzdGFibGlzaGVkIGFjcm9zcyB0aGUNCiAgIG92 ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0eSBwcm9jZWR1cmUgZm9yIE1BQzEgd2lsbCBub3Qg dHJpZ2dlciBhcw0KICAgYSByZXN1bHQgb2YgdGhpcyBNQUMtSVAgcm91dGUgYWR2ZXJ0aXNlbWVu dCINCg0KSWYgYSBob3N0IGlzIG1vdmVkIHdpdGggdGhlIHNhbWUgTUFDLCB0aGUgZm9sbG93aW5n IGlzIHN0aWxsIGJlaW5nIGZvbGxvd2luZyBpbiBjdXJyZW50IGltcGxlbWVudGF0aW9uKHMpOg0K LSBFaXRoZXIgIk1BQy1vbmx5LXJvdXRlIiBvciAiTUFDLUlQLXJvdXRlIiBhZHZlcnRpc2VtZW50 LCB0aGUgc2VxdWVuY2UgbnVtYmVyIGlzIGJ1bXBlZCBpbiBib3RoIGNhc2VzDQotIE9uIHJlY2Vp dmluZyBzaWRlLA0KICAgICAgLSAgdGhlIHNlcXVlbmNlLW51bWJlciBpcyBwaWNrZWQgdXAgZnJv bSAiTUFDLW9ubHktcm91dGUiIG9yICJNQUMtSVAtcm91dGUiIGFuZCBhcHBsaWVkIHRvIE1BQyBs ZWFybmluZ3MNCiAgICAgIC0gdGhlIGJ1bXBlZCB1cCBzZXF1ZW5jZSBudW1iZXIgbGVhZHMgYSB3 aXRoZHJhdyBvZiAiTUFDLW9ubHkiIG9yICJNQUMtSVAtcm91dGUiIGZyb20gdGhlIGluZmVyaW9y IChlYXJsaWVyKSBwdWJsaXNoZXINCg0KS2luZGx5IGhlbHAgZXhwbGFpbiwgaWYgdGhlIHRleHQg bWVudGlvbmVkIGluIOKAnHNlY3Rpb24gNC4zLjHigJ0gaXMgY3JlYXRpbmcgc29tZSBkb3VidHMg cmVnYXJkaW5nIHRoZSB3YXkgdGhpbmdzIG9wZXJhdGUgd2l0aCBjdXJyZW50IHN0YW5kYXJkcy4N ClRob3VnaCBJIGRlZmluaXRlbHkgYmVsaWV2ZSB0aGF0IHRoaXMgbGl0ZXJhdHVyZSBkb2VzIGF3 YXkgd2l0aCBsb3Qgb2YgZXhpc3RpbmcgYW1iaWd1aXRpZXMuDQpJIHRoaW5rIHdlIG5lZWQgdG8g cGFyYXBocmFzZSB0aGlzIHNlY3Rpb24gYXRsZWFzdC4NCg0KVGhhbmtzDQpTYXVteWEuDQoNCg0K --_000_TU4PR8401MB1248930A62AD7DF982263CA594C89TU4PR8401MB1248_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ Zm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9 DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCglj b2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFu Lk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpw dXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCglt YXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTAuMHB0Ow0K CWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0Kc3Bhbi5IVE1MUHJlZm9ybWF0dGVkQ2hhcg0K CXttc28tc3R5bGUtbmFtZToiSFRNTCBQcmVmb3JtYXR0ZWQgQ2hhciI7DQoJbXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCI7DQoJZm9udC1m YW1pbHk6IkNvdXJpZXIgTmV3Ijt9DQpwLm1zb25vcm1hbDAsIGxpLm1zb25vcm1hbDAsIGRpdi5t c29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25vcm1hbDsNCgltc28tbWFyZ2luLXRvcC1h bHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1zby1tYXJnaW4tYm90dG9tLWFsdDphdXRv Ow0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJD YWxpYnJpIixzYW5zLXNlcmlmO30NCnAuZW1haWxxdW90ZSwgbGkuZW1haWxxdW90ZSwgZGl2LmVt YWlscXVvdGUNCgl7bXNvLXN0eWxlLW5hbWU6ZW1haWxxdW90ZTsNCgltc28tbWFyZ2luLXRvcC1h bHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1zby1tYXJnaW4tYm90dG9tLWFsdDphdXRv Ow0KCW1hcmdpbi1sZWZ0OjEuMHB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6 IlRpbWVzIE5ldyBSb21hbiIsc2VyaWY7fQ0Kc3Bhbi5FbWFpbFN0eWxlMjENCgl7bXNvLXN0eWxl LXR5cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29s b3I6IzFGNDk3RDt9DQpzcGFuLmdyZXkNCgl7bXNvLXN0eWxlLW5hbWU6Z3JleTt9DQpzcGFuLkVt YWlsU3R5bGUyMw0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbDsNCglmb250LWZhbWlseToiQ2Fs aWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjojMUY0OTdEO30NCnNwYW4uRW1haWxTdHlsZTI0DQoJ e21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNl cmlmOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0Kc3Bhbi5FbWFpbFN0eWxlMjUNCgl7bXNvLXN0eWxlLXR5 cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6 d2luZG93dGV4dDt9DQpzcGFuLkVtYWlsU3R5bGUyNg0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25h bC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjojMUY0 OTdEO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZv bnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGlu Ow0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJ e3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+ DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+ PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4 dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxh eW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkVOLVVTIiBsaW5r PSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SGkgTmVlcmFq LDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z ZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+UGxlYXNlIHByb3Zp ZGUgeW91ciBpbnB1dHMgb24gdGhlIGJlbG93IHF1ZXJpZXMuPG86cD48L286cD48L3NwYW4+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxv OnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj5UaGFua3M8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+U2F1bXlhLjxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp Zjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPGRp diBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRp bmc6My4wcHQgMGluIDBpbiAwaW4iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4gTmVlcmFqIE1hbGhvdHJh IChubWFsaG90cikgW21haWx0bzpubWFsaG90ckBjaXNjby5jb21dDQo8YnI+DQo8Yj5TZW50Ojwv Yj4gVHVlc2RheSwgQXVndXN0IDE3LCAyMDIxIDEwOjE1IFBNPGJyPg0KPGI+VG86PC9iPiBEaWtz aGl0LCBTYXVteWEgJmx0O3NhdW15YS5kaWtzaGl0QGhwZS5jb20mZ3Q7OyBkcmFmdC1pZXRmLWJl c3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHlAaWV0Zi5vcmc8YnI+DQo8Yj5DYzo8L2I+IGJl c3MtY2hhaXJzQGlldGYub3JnOyBiZXNzQGlldGYub3JnPGJyPg0KPGI+U3ViamVjdDo8L2I+IFJl OiBGZXcgcXVlcmllcyBvbiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxp dHk8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+SGkgU2F1bXlhLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3Nw YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaGFua3MgZm9y IHlvdXIgY29tbWVudHMvcXVlc3Rpb25zLiBXaWxsIHJlc3BvbmQgYnkgZW5kIG9mIHRoaXMgd2Vl ay48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+VGhhbmtzLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+TmVlcmFqPG86cD48L286cD48L3NwYW4+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpw Pjwvc3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNC NUM0REYgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBpbiI+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48Yj48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPkZyb206IDwvc3Bhbj48L2I+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj4mcXVvdDtEaWtzaGl0LCBTYXVteWEmcXVvdDsgJmx0OzxhIGhy ZWY9Im1haWx0bzpzYXVteWEuZGlrc2hpdEBocGUuY29tIj5zYXVteWEuZGlrc2hpdEBocGUuY29t PC9hPiZndDs8YnI+DQo8Yj5EYXRlOiA8L2I+VHVlc2RheSwgQXVndXN0IDE3LCAyMDIxIGF0IDEy OjI1IEFNPGJyPg0KPGI+VG86IDwvYj4mcXVvdDtEaWtzaGl0LCBTYXVteWEmcXVvdDsgJmx0Ozxh IGhyZWY9Im1haWx0bzpzYXVteWEuZGlrc2hpdEBocGUuY29tIj5zYXVteWEuZGlrc2hpdEBocGUu Y29tPC9hPiZndDssICZxdW90OzxhIGhyZWY9Im1haWx0bzpkcmFmdC1pZXRmLWJlc3MtZXZwbi1p cmItZXh0ZW5kZWQtbW9iaWxpdHlAaWV0Zi5vcmciPmRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1l eHRlbmRlZC1tb2JpbGl0eUBpZXRmLm9yZzwvYT4mcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzpk cmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHlAaWV0Zi5vcmciPmRyYWZ0 LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eUBpZXRmLm9yZzwvYT4mZ3Q7PGJy Pg0KPGI+Q2M6IDwvYj4mcXVvdDs8YSBocmVmPSJtYWlsdG86YmVzcy1jaGFpcnNAaWV0Zi5vcmci PmJlc3MtY2hhaXJzQGlldGYub3JnPC9hPiZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmJlc3Mt Y2hhaXJzQGlldGYub3JnIj5iZXNzLWNoYWlyc0BpZXRmLm9yZzwvYT4mZ3Q7LCAmcXVvdDs8YSBo cmVmPSJtYWlsdG86YmVzc0BpZXRmLm9yZyI+YmVzc0BpZXRmLm9yZzwvYT4mcXVvdDsgJmx0Ozxh IGhyZWY9Im1haWx0bzpiZXNzQGlldGYub3JnIj5iZXNzQGlldGYub3JnPC9hPiZndDs8YnI+DQo8 Yj5TdWJqZWN0OiA8L2I+UkU6IEZldyBxdWVyaWVzIG9uIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWly Yi1leHRlbmRlZC1tb2JpbGl0eTxicj4NCjxiPlJlc2VudC1Gcm9tOiA8L2I+Jmx0OzxhIGhyZWY9 Im1haWx0bzphbGlhcy1ib3VuY2VzQGlldGYub3JnIj5hbGlhcy1ib3VuY2VzQGlldGYub3JnPC9h PiZndDs8YnI+DQo8Yj5SZXNlbnQtVG86IDwvYj4mbHQ7PGEgaHJlZj0ibWFpbHRvOmFwam9zaGlA Y2lzY28uY29tIj5hcGpvc2hpQGNpc2NvLmNvbTwvYT4mZ3Q7LCAmbHQ7PGEgaHJlZj0ibWFpbHRv OmpvcmdlLnJhYmFkYW5Abm9raWEuY29tIj5qb3JnZS5yYWJhZGFuQG5va2lhLmNvbTwvYT4mZ3Q7 LCAmbHQ7PGEgaHJlZj0ibWFpbHRvOmpkcmFrZUBqdW5pcGVyLm5ldCI+amRyYWtlQGp1bmlwZXIu bmV0PC9hPiZndDssICZsdDs8YSBocmVmPSJtYWlsdG86YXI5NzdtQGF0dC5jb20iPmFyOTc3bUBh dHQuY29tPC9hPiZndDssDQogJmx0OzxhIGhyZWY9Im1haWx0bzpzYWphc3NpQGNpc2NvLmNvbSI+ c2FqYXNzaUBjaXNjby5jb208L2E+Jmd0OywgJmx0OzxhIGhyZWY9Im1haWx0bzpubWFsaG90ckBj aXNjby5jb20iPm5tYWxob3RyQGNpc2NvLmNvbTwvYT4mZ3Q7PGJyPg0KPGI+UmVzZW50LURhdGU6 IDwvYj5UdWVzZGF5LCBBdWd1c3QgMTcsIDIwMjEgYXQgMTI6MjUgQU08bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SGVsbG8g QXV0aG9ycyBvZiBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHksPC9z cGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm O2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5QbGVhc2UgaGVscCBtZSB3 aXRoIGJlbG93IHF1ZXJpZXMuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwv bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj5UaGFua3M8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+U2F1bXlhLjwvc3Bhbj48bzpwPjwvbzpwPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4m bmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5v bmU7Ym9yZGVyLXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRpbmc6My4wcHQgMGluIDBpbiAw aW4iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5Gcm9tOjwvc3Bh bj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj4gQkVTUyBbPGEgaHJlZj0ibWFpbHRvOmJlc3MtYm91bmNl c0BpZXRmLm9yZyI+bWFpbHRvOmJlc3MtYm91bmNlc0BpZXRmLm9yZzwvYT5dDQo8Yj5PbiBCZWhh bGYgT2YgPC9iPkRpa3NoaXQsIFNhdW15YTxicj4NCjxiPlNlbnQ6PC9iPiBTYXR1cmRheSwgQXVn dXN0IDE0LCAyMDIxIDExOjMwIEFNPGJyPg0KPGI+VG86PC9iPiA8YSBocmVmPSJtYWlsdG86ZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5QGlldGYub3JnIj5kcmFmdC1p ZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHlAaWV0Zi5vcmc8L2E+PGJyPg0KPGI+ Q2M6PC9iPiA8YSBocmVmPSJtYWlsdG86YmVzcy1jaGFpcnNAaWV0Zi5vcmciPmJlc3MtY2hhaXJz QGlldGYub3JnPC9hPjsgPGEgaHJlZj0ibWFpbHRvOmJlc3NAaWV0Zi5vcmciPmJlc3NAaWV0Zi5v cmc8L2E+PGJyPg0KPGI+U3ViamVjdDo8L2I+IFtiZXNzXSBGZXcgcXVlcmllcyBvbiBkcmFmdC1p ZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHk8L3NwYW4+PG86cD48L286cD48L3A+ DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48 L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+ Q2hhbmdpbmcgdGhlIHN1YmplY3QgbGluZSBhbmQgcmVzZW5kaW5nLCBQbGVhc2UgaWdub3JlIHRo ZSBwcmV2aW91cyBlbWFpbC4gQXBvbG9neSBmb3IgbWl4aW5nIHVwIHRoaW5nc108L3NwYW4+PG86 cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5IZWxs byBBdXRob3JzIG9mJm5ic3A7IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2Jp bGl0eTo8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkkgaGF2ZSBm b2xsb3dpbmcgcXVlcmllcyBhbmQgY29tbWVudHMgYWJvdXQgdGhpcyBkcmFmdCDigJxkcmFmdC1p ZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9yd2FyZGluZ+KAnS48L3NwYW4+PG86cD48L286 cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3 RCI+UGxlYXNlIGhlbHAgY2xhcmlmeS48L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxv OnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2Nv bG9yOiMxRjQ5N0QiPiZndDsmZ3Q7Jmd0OyZndDtTZWN0aW9uDQo8YSBocmVmPSJodHRwczovL2Rh dGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRl bmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguMSI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9y Zy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUj c2VjdGlvbi04LjE8L2E+PC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjxwcmU+PGk+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj5NVVNUIGJlIGF0IGxlYXN0IGVxdWFsIHRvIGNvcnJlc3BvbmRp bmcgU1lOQyBNQUMgc2VxdWVuY2UgbnVtYmVyPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyBpZiBvbmUgaXMgcHJlc2VudC48L3NwYW4+PC9pPjxvOnA+PC9v OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5 N0QiPkNhbiB3ZSBmb3JtYWxseSBkZWZpbmUgd2hhdCBhIOKAnFNZTkMgTUFDIHNlcXVlbmNlIG51 bWJlcuKAnSA/PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4m Z3Q7Jmd0OyZndDsmZ3Q7U2VjdGlvbg0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRm Lm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHkt MDUjc2VjdGlvbi04LjMiPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zPC9h Pjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xv cjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj5NQUMgTXggd2l0 aCBhIHNlcXVlbmNlIG51bWJlciB0aGF0IGlzIGhpZ2hlciB0aGFuIDxzcGFuIHN0eWxlPSJiYWNr Z3JvdW5kOnllbGxvdzttc28taGlnaGxpZ2h0OnllbGxvdyI+b3IgZXF1YWw8L3NwYW4+IHRvPC9z cGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVv dDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBzZXF1ZW5jZSBudW1iZXIgYXNzaWduZWQgdG8g YSBMT0NBTCByb3V0ZSBmb3IgTUFDIE14Ojwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZh bWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IG8m bmJzcDsgUEUgTVVTVCB0cmlnZ2VyDQo8c3BhbiBzdHlsZT0iYmFja2dyb3VuZDp5ZWxsb3c7bXNv LWhpZ2hsaWdodDp5ZWxsb3ciPnByb2JlIGFuZCBkZWxldGlvbiBwcm9jZWR1cmU8L3NwYW4+IGZv ciBhbGwgTE9DQUwgSVBzPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsgYXNzb2NpYXRlZCB3aXRoIE1BQyBNeC48L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyBvJm5ic3A7IFBFIE1VU1QgdHJpZ2dlcg0KPHNwYW4gc3R5bGU9ImJhY2tncm91bmQ6eWVsbG93 O21zby1oaWdobGlnaHQ6eWVsbG93Ij5kZWxldGlvbiBwcm9jZWR1cmUgZm9yIExPQ0FMIE1BQzwv c3Bhbj4gcm91dGUgZm9yIE14Ljwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxz cGFuIHN0eWxlPSJjb2xvcjpibGFjayI+4oCdPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkFzIHBl ciByZmM3NDIzLCBpZiBlcXVhbCBzZXF1ZW5jZSBudW1iZXIgaXMgcmVjZWl2ZWQsIHRoZW4gdGhl IG9uZSBwdWJsaXNoZWQgd2l0aCBsb3dlciB2dGVwLWlwIGlzIHJldGFpbmVkLCBhbmQgdGhlIG90 aGVyIG9uZSBpcyB3aXRoZHJhd24uPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPldoaWxlIHRoaXMgc2VjdGlv biB0YWxrcyBhYm91dCBwcm9iaW5nIGl0IGFnYWluLjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5UaGlzIHNo b3VsZCBiZSBjYWxsZWQgb3V0IGluIHRoZSBJbnRlcm9wIHNlY3Rpb24gYXMgd2VsbCwgZm9yIHRo ZSBjby1leGlzdGVuY2Ugb2Ygb2xkIHJ1bGUgYW5kIG5ld2x5IGRlZmluZWQNCjwvc3Bhbj48bzpw PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjoj MUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+UXVvdGluZyBmcm9tJm5ic3A7DQo8YSBo cmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlv bi0xNSI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9yZmM3NDMyI3NlY3Rp b24tMTU8L2E+Ojwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9y OmJsYWNrIj7igJxJZiB0d28gKG9yIG1vcmUpIFBFcyBhZHZlcnRpc2UgdGhlIHNhbWUgTUFDPC9z cGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5i c3A7Jm5ic3A7IGFkZHJlc3Mgd2l0aCB0aGUgc2FtZSBzZXF1ZW5jZSBudW1iZXIgYnV0IGRpZmZl cmVudCBFdGhlcm5ldCBzZWdtZW50PC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFu IHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGlkZW50aWZpZXJzLCBhIFBFIHRoYXQg cmVjZWl2ZXMgdGhlc2Ugcm91dGVzIHNlbGVjdHMgdGhlIHJvdXRlPC9zcGFuPjxvOnA+PC9vOnA+ PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGFkdmVy dGlzZWQgYnkgdGhlIFBFIHdpdGggdGhlIDxzcGFuIHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdztt c28taGlnaGxpZ2h0OnllbGxvdyI+bG93ZXN0IElQIGFkZHJlc3MgYXMgdGhlIGJlc3Qgcm91dGU8 L3NwYW4+4oCdPC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZu YnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhy ZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNz LWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC42Ij5odHRwczovL2RhdGF0 cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRl ZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguNjwvYT48L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wPg0K PHByZT48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+4oCcPC9zcGFuPjxzcGFuIHN0 eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGFuIGludGVyLW9wIHNjZW5hcmlvIHdpdGgg YSBkaWZmZXJlbnQgaW1wbGVtZW50YXRpb24gY291bGQgYXJpc2UsPC9zcGFuPjwvaT48bzpwPjwv bzpwPjwvcHJlPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyB3aGVyZSBhIFBFIGltcGxlbWVudGF0aW9uIG5vbi1jb21wbGlhbnQgd2l0aCB0aGlzIGRvY3Vt ZW50IG9yIHdpdGg8L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0 eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNr ZXIuaWV0Zi5vcmcvZG9jL2h0bWwvcmZjNzQzMiI+UkZDIDc0MzI8L2E+IGFzc2lnbnMgYW5kIGFk dmVydGlzZXMgaW5kZXBlbmRlbnQgc2VxdWVuY2UgbnVtYmVycyB0byBNQUM8L3NwYW4+PC9pPjxv OnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7 Jm5ic3A7IGFuZCBNQUMrSVAgcm91dGVz4oCdPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkhvdyBk byB3ZSBleHBlY3QgdGhpcyBpbXBsZW1lbnRhdGlvbiB0byBpbnRlci1vcCwgYXMgaXQgbWF5IGV4 cGVjdCB0d28gZGlmZmVyZW50IE1BQy1vbmx5IGFuZCBNQUMtSVAgYWR2ZXJ0aXNlbWVudCBmcm9t IHJlbW90ZSBwZWVycyBhcyB3ZWxsLj88L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Q2FuIHdlIHBhcmFwaHJh c2UgdGhpcyA/PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJz cDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0OyBTZWN0aW9uDQo8YSBocmVm PSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1l dnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTguOCI+aHR0cHM6Ly9kYXRhdHJh Y2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQt bW9iaWxpdHktMDUjc2VjdGlvbi04Ljg8L2E+PC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjxw cmU+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPuKAnDwvc3Bhbj48c3BhbiBzdHls ZT0iY29sb3I6YmxhY2siPkZvbGxvd2luZyBhIGhvc3QgbW92ZSBmcm9tIFBFMSB0byBQRTIsIHRo ZSBob3N0J3MgTUFDIGlzPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHByZT48aT48c3Bh biBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBkaXNj b3ZlcmVkIGF0IFBFMiBhcyBhIGxvY2FsIE1BQyB2aWEgYSBkYXRhIGZyYW1lcyByZWNlaXZlZCBm cm9tPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHByZT48aT48c3BhbiBzdHlsZT0iY29s b3I6YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyB0aGUgaG9zdC7igJ08L3Nw YW4+PC9pPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjpibGFj ayI+RG8gd2UgbmVlZCB0byBjYWxsIG91dCB0aGUgbWlzY29uZmlndXJhdGlvbiBjYXNlLCB3aGVy ZSBhIHByb2JlIG1heSBsZWFkIHRvIERVUCByZXNwb25zZXMsIDwvc3Bhbj48bzpwPjwvbzpwPjwv cHJlPg0KPHByZT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6YmxhY2siPm9uZSBmcm9tIHRoZSAobG9j YWwgbGVhcm5pbmcpIGFjY2VzcyBzaWRlIGFuZCBvdGhlciBvbmUgYWNyb3NzIHRoZSBmYWJyaWMg KG92ZXJsYXkgdHVubmVsKS48L3NwYW4+PG86cD48L286cD48L3ByZT4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48 L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFG NDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZndDsmZ3Q7Jmd0OyZndDsgU2VjdGlv bg0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1p ZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi0xMC40LjEiPmh0 dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4t aXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tMTAuNC4xPC9hPjwvc3Bhbj48L2k+PG86 cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8 L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj51bmZyZWV6aW5nIHRoZTwvc3Bhbj48L2k+ PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgcm91dGUgYXQgdGhlIEZST1pFTiBsb2NhdGlvbiB3 aWxsIHJlc3VsdCBpbiB0aGUgcm91dGUgYmVpbmc8L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wcmU+ DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7IGFkdmVydGlzZWQgd2l0aCBhIGhpZ2hlciBzZXF1ZW5jZSBudW1iZXIu4oCdPC9z cGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmO2NvbG9yOiMxRjQ5N0QiPldoeSBhcmUgd2UgdHlpbmcgcHJvYmluZyB3aXRoIOKAnHVu ZnJlZXppbmfigJ0gPyBGUk9aRU4gd2lsbCB0eXBpY2FsbHkgaW5kaWNhdGUgZHJvcHBpbmcgb2Yg Zmxvd3MuIFByb2JpbmcgY2FuIHN0aWxsIGdvIG9uIGluIHBhcmFsbGVsID88L3NwYW4+PG86cD48 L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFG NDk3RCI+Q2FuIHRoaXMgYmUgY2FsbGVkIG91dCBleHBsaWNpdGx5Ljwvc3Bhbj48bzpwPjwvbzpw PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7 Jmd0OyZndDsmZ3Q7IFM8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5lY3Rpb24gJnF1b3Q7DQo8YSBo cmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVz cy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xIj48c3BhbiBzdHls ZT0iY29sb3I6IzA1NjNDMSI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9k cmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi00LjMu MTwvc3Bhbj48L2E+JnF1b3Q7IDo8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtm b250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+JnF1b3Q7IFtJUDcsIE0xXSBpcyBs ZWFybnQgYXMgYSBuZXcgcm91dGUgYXQ8L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPiZuYnNwOyZuYnNwOyBb UEUzLCBQRTRdIGFuZCBhZHZlcnRpc2VkIHRvIHJlbW90ZSBQRXMgd2l0aCBhIHNlcXVlbmNlIG51 bWJlciBvZiAwLjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZh bWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+Jm5ic3A7Jm5ic3A7IEFzIGEgcmVzdWx0LCBM MyByZWFjaGFiaWxpdHkgdG8gSVA3IHdvdWxkIGJlIGVzdGFibGlzaGVkIGFjcm9zcyB0aGU8L3Nw YW4+PC9pPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291 cmllciBOZXcmcXVvdDsiPiZuYnNwOyZuYnNwOyBvdmVybGF5LCBob3dldmVyLCBNQUMgbW9iaWxp dHkgcHJvY2VkdXJlIGZvciBNQUMxIHdpbGwgbm90IHRyaWdnZXIgYXM8L3NwYW4+PC9pPjxvOnA+ PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVv dDsiPiZuYnNwOyZuYnNwOyBhIHJlc3VsdCBvZiB0aGlzIE1BQy1JUCByb3V0ZSBhZHZlcnRpc2Vt ZW50JnF1b3Q7PC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm Ij5JZiBhIGhvc3QgaXMgbW92ZWQgd2l0aCB0aGUgc2FtZSBNQUMsIHRoZSBmb2xsb3dpbmcgaXMg c3RpbGwgYmVpbmcgZm9sbG93aW5nIGluIGN1cnJlbnQgaW1wbGVtZW50YXRpb24ocyk6PC9zcGFu PjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmIj4tIEVpdGhlciAmcXVvdDtNQUMtb25seS1yb3V0ZSZxdW90OyBvciAmcXVv dDtNQUMtSVAtcm91dGUmcXVvdDsgYWR2ZXJ0aXNlbWVudCwgdGhlIHNlcXVlbmNlIG51bWJlciBp cyBidW1wZWQgaW4gYm90aCBjYXNlczwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+LSBPbiByZWNlaXZpbmcg c2lkZSwNCjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 IC0mbmJzcDsgdGhlIHNlcXVlbmNlLW51bWJlciBpcyBwaWNrZWQgdXAgZnJvbSAmcXVvdDtNQUMt b25seS1yb3V0ZSZxdW90OyBvciAmcXVvdDtNQUMtSVAtcm91dGUmcXVvdDsgYW5kIGFwcGxpZWQg dG8gTUFDIGxlYXJuaW5nczwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7IC0gdGhlIGJ1bXBlZCB1cCBzZXF1ZW5jZSBudW1iZXIgbGVhZHMgYSB3aXRoZHJh dyBvZiAmcXVvdDtNQUMtb25seSZxdW90OyBvciAmcXVvdDtNQUMtSVAtcm91dGUmcXVvdDsgZnJv bSB0aGUgaW5mZXJpb3IgKGVhcmxpZXIpIHB1Ymxpc2hlcjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5i c3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OyxzYW5zLXNlcmlmIj5LaW5kbHkgaGVscCBleHBsYWluLCBpZiB0aGUgdGV4dCBt ZW50aW9uZWQgaW4g4oCcc2VjdGlvbiA0LjMuMeKAnSBpcyBjcmVhdGluZyBzb21lIGRvdWJ0cyBy ZWdhcmRpbmcgdGhlIHdheSB0aGluZ3Mgb3BlcmF0ZSB3aXRoIGN1cnJlbnQgc3RhbmRhcmRzLjwv c3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+VGhvdWdoIEkgZGVmaW5pdGVseSBiZWxpZXZlIHRoYXQgdGhpcyBs aXRlcmF0dXJlIGRvZXMgYXdheSB3aXRoIGxvdCBvZiBleGlzdGluZyBhbWJpZ3VpdGllcy48L3Nw YW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1 b3Q7LHNhbnMtc2VyaWYiPkkgdGhpbmsgd2UgbmVlZCB0byBwYXJhcGhyYXNlIHRoaXMgc2VjdGlv biBhdGxlYXN0Ljwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5U aGFua3M8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPlNhdW15YS48L3NwYW4+PG86cD48L286cD48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNw Ozwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssc2Fucy1zZXJpZiI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+ DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg== --_000_TU4PR8401MB1248930A62AD7DF982263CA594C89TU4PR8401MB1248_-- From nobody Fri Aug 27 08:39:21 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E99C03A10B7; Fri, 27 Aug 2021 08:39:03 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: Matt Joras via Datatracker To: Cc: bess@ietf.org, draft-ietf-bess-evpn-igmp-mld-proxy.all@ietf.org, last-call@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <163007874389.28956.14383867161176082457@ietfa.amsl.com> Reply-To: Matt Joras Date: Fri, 27 Aug 2021 08:39:03 -0700 Archived-At: Subject: [bess] Genart last call review of draft-ietf-bess-evpn-igmp-mld-proxy-12 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Aug 2021 15:39:15 -0000 Reviewer: Matt Joras Review result: Ready with Nits I am the assigned Gen-ART reviewer for this draft. The General Area Review Team (Gen-ART) reviews all IETF documents being processed by the IESG for the IETF Chair. Please treat these comments just like any other last call comments. For more information, please see the FAQ at . Document: draft-ietf-bess-evpn-igmp-mld-proxy-?? Reviewer: Matt Joras Review Date: 2021-08-26 IETF LC End Date: 2021-09-07 IESG Telechat date: Not scheduled for a telechat Review Ethernet Virtual Private Network (EVPN) solution is becoming pervasive in data center (DC) applications for Network Virtualization Overlay (NVO) and DC interconnect (DCI) services, and in service provider (SP) applications for next generation virtual private LAN services. This intro to the abstract could use some rewording. For example, "is becoming" does not read well in a standards document. It is sufficient to describe what this document is specifying. Also "next generation" is overused and doesn't usually read well retrospectively. This draft describes how to support efficiently endpoints running IGMP for the above services over an EVPN network by incorporating IGMP proxy procedures on EVPN PEs. Avoid using the term "draft" as this will have to be edited out since the idea is for this to be standards track. 1. Introduction Ethernet Virtual Private Network (EVPN) solution [RFC7432] is becoming pervasive in data center (DC) applications for Network Virtualization Overlay (NVO) and DC interconnect (DCI) services, and in service provider (SP) applications for next generation virtual private LAN services. This is a copy of the abstract, and has similar issues. The introduction serves a different purpose beyond the abstract, it also has the same grammatical issues as the abstract. In DC applications, a point of delivery (POD) can consist of a collection of servers supported by several top of rack (TOR) and Spine switches. This collection of servers and switches are self contained and may have their own control protocol for intra-POD communication and orchestration. However, EVPN is used as standard way of inter-POD communication for both intra-DC and inter-DC. A subnet can span across multiple PODs and DCs. EVPN provides robust multi-tenant solution with extensive multi-homing capabilities to stretch a subnet (VLAN) across multiple PODs and DCs. There can be many hosts/VMs(virtual machine) (several hundreds) attached to a subnet that is stretched across several PODs and DCs. Why is "Spine" capitalized? I'm also wondering whether another term might be appropriate here that doesn't imply a certain topology. Also, "provides robust multi-tenant solution" should probably be "provides a robust multi-tenant solution". These hosts/VMs express their interests in multicast groups on a given subnet/VLAN by sending IGMP Membership Reports (Joins) for their interested multicast group(s). Furthermore, an IGMP router periodically sends membership queries to find out if there are hosts on that subnet that are still interested in receiving multicast traffic for that group. The IGMP/MLD Proxy solution described in this draft accomplishes three objectives: I don't think you need "/VMs". They are a kind of host. There is also another use of "draft" in this paragraph. 3. Selective Multicast: to forward multicast traffic over EVPN network such that it only gets forwarded to the PEs that have interest in the multicast group(s), multicast traffic will not be forwarded to the PEs that have no receivers attached to them for that multicast group. This draft shows how this objective may be achieved when Ingress Replication is used to distribute the multicast traffic among the PEs. Procedures for supporting selective multicast using P2MP tunnels can be found in [I-D.ietf-bess-evpn-bum-procedure-updates] The first sentence is very long and could probably be reworded to be less redundant. Also there is another instance of "draft". The first two objectives are achieved by using IGMP/MLD proxy on the PE and the third objective is achieved by setting up a multicast tunnel (e.g., ingress replication) only among the PEs that have interest in that multicast group(s) based on the trigger from IGMP/ MLD proxy processes. The proposed solutions for each of these objectives are discussed in the following sections. The first sentence can probably be split into two. Also, is "(e.g., ingress replication)" really an example? "multicast tunnel" probably suffices. o Ethernet Segment (ES): When a customer site (device or network) is connected to one or more PEs via a set of Ethernet links, then that set of links is referred to as an 'Ethernet Segment'. o Ethernet Segment Identifier (ESI): A unique non-zero identifier that identifies an Ethernet Segment is called an 'Ethernet Segment Identifier'. Both of these terminology definitions can drop the end part where they quote the thing they're defining. It is implied by the colon. o Ethernet Tag: An Ethernet tag identifies a particular broadcast domain, e.g., a VLAN. An EVPN instance consists of one or more broadcast domains. Same issue here more or less. You don't need to start out a sentence saying "Ethernet tag" again. 4.1. Proxy Reporting When IGMP protocol is used between hosts/VMs and their first hop EVPN router (EVPN PE), Proxy-reporting is used by the EVPN PE to summarize (when possible) reports received from downstream hosts and propagate them in BGP to other PEs that are interested in the information. This is done by terminating the IGMP Reports in the first hop PE, and translating and exchanging the relevant information among EVPN BGP speakers. The information is again translated back to IGMP message at the recipient EVPN speaker. Thus it helps create an IGMP overlay subnet using BGP. In order to facilitate such an overlay, this document also defines a new EVPN route type NLRI, the EVPN Selective Multicast Ethernet Tag route, along with its procedures to help exchange and register IGMP multicast groups Section 9. Another usage of hosts/VMs. 1. When the first hop PE receives several IGMP Membership Reports (Joins), belonging to the same IGMP version, from different attached hosts/VMs for the same (*,G) or (S,G), it SHOULD send a single BGP message corresponding to the very first IGMP Membership Request (BGP update as soon as possible) for that (*,G) or (S,G). This is because BGP is a stateful protocol and no further transmission of the same report is needed. If the IGMP Membership Request is for (*,G), then multicast group address MUST be sent along with the corresponding version flag (v2 or v3) set. In case of IGMPv3, the exclude flag MUST also be set to indicate that no source IP address must be excluded (include all sources"*"). If the IGMP Join is for (S,G), then besides setting multicast group address along with the version flag v3, the source IP address and the IE flag MUST be set. It should be noted that when advertising the EVPN route for (S,G), the only valid version flag is v3 (v2 flags MUST be set to zero). Another hosts/VMs usage. Also missing a space after "include all sources". 7. Upon receiving EVPN SMET route(s) and before generating the corresponding IGMP Membership Request(s), the PE checks to see whether it has any CE multicast router for that BD on any of its ES's . The PE provides such a check by listening for PIM Hello messages on that AC (i.e, ES,BD). If the PE does have the router's ACs, then the generated IGMP Membership Request(s) are sent to those ACs. If it doesn't have any of the router's AC, then no IGMP Membership Request(s) needs to be generated. This is because sending IGMP Membership Requests to other hosts can result in unintentionally preventing a host from joining a specific multicast group using IGMPv2 - i.e., if the PE does not receive a join from the host it will not forward multicast data to it. Per [RFC4541] , when an IGMPv2 host receives a Membership Report for a group address that it intends to join, the host will suppress its own membership report for the same group, and if the PE does not receive an IGMP Join from host it will not forward multicast data to it. In other words, an IGMPv2 Join MUST NOT be sent on an AC that does not lead to a CE multicast router. This message suppression is a requirement for IGMPv2 hosts. This is not a problem for hosts running IGMPv3 because there is no suppression of IGMP Membership Reports. Need a "the" before "host in "and if the PE does not receive an IGMP Join from host it will not forward multicast data to it." 2. When a PE receives an EVPN SMET route for a given (*,G), it compares the received version flags from the route with its per- PE stored version flags. If the PE finds that a version flag associated with the (*,G) for the remote PE is reset, then the PE MUST generate IGMP Leave for that (*,G) toward its local interface (if any) attached to the multicast router for that multicast group. It should be noted that the received EVPN route SHOULD at least have one version flag set. If all version flags are reset, it is an error because the PE should have received an EVPN route withdraw for the last version flag. Error MUST be considered as BGP error and the PE MUST apply the "treat-as- withdraw" procedure of [RFC7606]. Consider rewording the latter part of this paragraph, note that "Error MUST be considered" is not quite grammatical.. Also if this is an error condition, should the "SHOULD at least have one version flag set" be a MUST? 5. Operation ... o only hosts/VMs o mix of hosts/VMs and multicast source o mix of hosts/VMs, multicast source, and multicast router More hosts/VMs. I will stop mentioning this nit. 6. All-Active Multi-Homing Because the LAG flow hashing algorithm used by the CE is unknown at the PE, in an All-Active redundancy mode it must be assumed that the CE can send a given IGMP message to any one of the multi-homed PEs, either DF or non-DF; i.e., different IGMP Membership Request messages can arrive at different PEs in the redundancy group and furthermore their corresponding Leave messages can arrive at PEs that are different from the ones that received the Join messages. Therefore, all PEs attached to a given ES must coordinate IGMP Membership Request and Leave Group (x,G) state, where x may be either '*' or a particular source S, for each BD on that ES. This allows the DF for that (ES,BD) to correctly advertise or withdraw a Selective Multicast Ethernet Tag (SMET) route for that (x,G) group in that BD when needed. All-Active multihoming PEs for a given ES MUST support IGMP synchronization procedures described in this section if they need to perform IGMP proxy for hosts connected to that ES. "LAG" is undefined. Should "All-Active" really be capitalized? 6.2.2. Common Leave Group Synchronization ... When the Maximum Response Timer expires a PE that has advertised an IGMP Leave Synch route, withdraws it. Any PE attached to the multihomed ES, that started the Maximum Response Time and has no local IGMP Membership Request (x,G) state and no installed IGMP Join Synch routes, it removes IGMP Membership Request (x,G) state for that (ES,BD). If the DF no longer has IGMP Membership Request (x,G) state for that BD on any ES for which it is DF, it withdraws its SMET route for that (x,G) group in that BD. The first sentence should be reworded, ending the sentence with ", withdraws it." reads awkwardly. The next sentence is also long and is confusing to read, I'm actually not quite sure what it is trying to convey. 6.3. Mass Withdraw of Multicast join Sync route in case of failure A PE which has received an IGMP Membership Request, would have synced the IGMP Join by the procedure defined in section 6.1. If a PE with local join state goes down or the PE to CE link goes down, it would lead to a mass withdraw of multicast routes. Remote PEs (PEs where these routes were remote IGMP Joins) SHOULD NOT remove the state immediately; instead General Query SHOULD be generated to refresh the states. There are several ways to detect failure at a peer, e.g. using IGP next hop tracking or ES route withdraw. The first sentence has an extraneous comma after "IGMP Membership Request". 9.1. Selective Multicast Ethernet Tag Route ... o The least significant bit, bit 7 indicates support for IGMP version 1. Since IGMP V1 is being deprecated , sender MUST set it as 0 for IGMP and receiver MUST ignore it. Extraneous comma and space in the second sentence, and missing article before "sender". o The second least significant bit, bit 6 indicates support for IGMP version 2. o The third least significant bit, bit 5 indicates support for IGMP version 3. o The fourth least significant bit, bit 4 indicates whether the (S,G) information carried within the route-type is of an Include Group type (bit value 0) or an Exclude Group type (bit value 1). The Exclude Group type bit MUST be ignored if bit 5 is not set. Is it typical to express this in terms of which least significant bit and the bit number? It reads a bit oddly. It's also only done in some of the descriptions so it is not consistent. o If route is used for IPv6 (MLD) then bit 7 indicates support for MLD version 1. The second least significant bit, bit 6 indicates support for MLD version 2. Since there is no MLD version 3, in case of IPv6 route third least significant bit MUST be 0. In case of IPv6 routes, the fourth least significant bit MUST be ignored if bit 6 is not set. Will there never be a MLD version 3? Also again missing an article before "third least significant bit", though I have similar commentary as above about how to refer to bits individually. 9.1.1. Constructing the Selective Multicast Ethernet Tag route ... Reserved bits MUST be set to 0. They can be defined in future by Why are these a MUST whereas the earlier reserved bits in section 9.1 were SHOULDs? 9.1.2. Default Selective Multicast Route ... Consider the EVPN network of Figure-2, where there is an EVPN instance configured across the PEs. Lets consider PE2 is connected to multicast router R1 and there is a network running PIM ASM behind R1. If there are receivers behind the PIM ASM network, the PIM Join would be forwarded to the PIM RP (Rendezvous Point). If receivers behind PIM ASM network are interested in a multicast flow originated by multicast source S2 (behind PE1), it is necessary for PE2 to receive multicast traffic. In this case PE2 MUST originate a (*,*) SMET route to receive all of the multicast traffic in the EVPN domain. To generate Wildcards (*,*) routes, prcedure from [RFC6625] SHOULD be used. "Lets" should be "Let's", also probably should be "consider that PE2 is connected". The comma in " If there are receivers behind the PIM ASM network, " is extraneous. The last sentence has a typo in "procedure" and is missing "the" before it. 9.2. Multicast Join Synch Route ... Similar commentary for this section about how bits are referred to, both by index and which "least significant bit" they are. o Reserved bits MUST be set to 0. They can be defined in future by other document. Probably don't need the second sentence at all as that's implicit, also "future document" is more grammatical. 9.2.1. Constructing the Multicast Join Synch Route ... The Flags field indicates the version of IGMP protocol from which the Membership Report was received. It also indicates whether the multicast group had INCLUDE or EXCLUDE bit set. Earlier in the section "INCLUDE" and "EXCLUDE" were not capitalized. One should be picked. Reserved bits MUST be set to 0. They can be defined in future by other document. Same commentary as before. From nobody Fri Aug 27 18:54:16 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 224483A25DB; Fri, 27 Aug 2021 18:54:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -9.595 X-Spam-Level: X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=EsUsPNzs; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=mGbNQqyg Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ut0DeIsyIirr; Fri, 27 Aug 2021 18:54:07 -0700 (PDT) Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71DFF3A25DC; Fri, 27 Aug 2021 18:54:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18052; q=dns/txt; s=iport; t=1630115647; x=1631325247; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=5MDhWmeFwMF755iBvbEEC3d5TYlxlzFjwGWXTbCyyo4=; b=EsUsPNzsbWpVYXWB4JH6NWglE40MPtqLsK/clh1rORrkAuMHTrvNvOFK FBZhUBVJPqGKGWSRPOvuhSQ0NlxZQV0syl6jT/UIubPT+7pxGivqFuFft TQZ4EcqpLJnqzkPUSgK8MocDEeC0fBYk9f1cpW7KscH8o37I+eyaQ8TH+ Y=; IronPort-PHdr: =?us-ascii?q?A9a23=3ADVVjpxVYJzuc/2F/FACoscIxEQ3V8K3gAWYlg?= =?us-ascii?q?6HPw5pIdaei9tLpO0mMrflujVqcW4Ld5roEjufNqKnvVCQG5orJq3ENdpFAF?= =?us-ascii?q?npnwcUblgAtGoiJXEv8KvO5aSs5Hc0EX1hgrDm3NEFPE5P4YFvf6nS58T8VH?= =?us-ascii?q?ED5Mgx4buT4E4LflYK5zee3rpbSeA5PwjG6ZOAaEQ=3D=3D?= IronPort-HdrOrdr: =?us-ascii?q?A9a23=3AZccSzqivBBI5W7Vv81Yt5y60hXBQX3F13D?= =?us-ascii?q?Abv31ZSRFFG/FwyPrOoB1L73HJYWgqN03IwerwRJVoMkmsiqKdgLNhc4tKOT?= =?us-ascii?q?OHhILGFvAb0WKP+UyEJ8S6zJ8h6U4CSdk+NDSTNykAsS+S2mDReLxMrKjlgc?= =?us-ascii?q?KVbKXlvg1QpGpRGsZdBnJCe3+m+zpNNW977PQCZf6hz/sCgwDlVWUcb8y9CH?= =?us-ascii?q?VAdfPEvcf3mJXvZgNDLwI76SGV5AnYqILSIly95FMzQjlPybAt/SzuiAri/J?= =?us-ascii?q?iutPm911v1y3LT1ZJLg9Hso+EzR/Bky/JlaAkEuDzYILiJaIfy+wzdZ9vfrm?= =?us-ascii?q?rCpeO85ivI+f4Dsk85MFvF+ScFkDOQrgrGo0WSuGNwx0GT+vAQgFkBepd8bU?= =?us-ascii?q?UzSGqC16NohqAN7Itbm22erJZZFhXGgWD04MXJTQhjkg6urWMlivN7tQ0UbW?= =?us-ascii?q?IyUs4YkWUkxjIfLH7AJlOP1Kk3VO11SM3M7vdfdl2XK3jfo2l02dSpGnA+BA?= =?us-ascii?q?2PTEQOstGcl2E+pgE082IIgMgE2nsQ/pM0TJdJo+zCL6RzjblLCssbd7h0Cu?= =?us-ascii?q?sNSda+TmbNXRXPOmSPJkmPLtBLB1vd75rspLkl7uCjf5IFiJM0hZTaSVtd8X?= =?us-ascii?q?U/fkr/YPf+laGjMiq9NllVeA6dhf22y6IJyIEUdYCbRhFrEmpe4PdIi89vd/?= =?us-ascii?q?HmZw=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BzAABglilh/5tdJa1aHQEBAQEJARI?= =?us-ascii?q?BBQUBggUIAQsBgSIwUQd3WjcxhEeDSAOEWWCIBgOMEoNnhU2FA4EuFIERA1Q?= =?us-ascii?q?LAQEBDQEBKgEKDAQBAYRrAheCGgIlNAkOAQIEAQEBEgEBBQEBAQIBBgSBERO?= =?us-ascii?q?FaA2GQgEBAQEDAQEQER0BASwMDwIBCBEDAQIrAgICJQsdCAIEARIIDA6CUIF?= =?us-ascii?q?+VwMvAQ6degGBOgKKH3qBMYEBggcBAQYEBIE2AQMCDkGCfxiCNAMGgToBgn6?= =?us-ascii?q?EDwEBgm6DfCccgg2BFUOCZj6CYgEBAgEXgREBEgEjFQkNgmo2gi6HRAQdNAI?= =?us-ascii?q?UMhVxAREBKi5AkR8Mg1aIY59ujWuGaIoegy8Sg2WLZZcylheMQpNjhQMCBAI?= =?us-ascii?q?EBQIOAQEGgWE7aXBwFRohgjUBATJQGQ+OIAwWg1CFFIVKdDgCBgEKAQEDCY8?= =?us-ascii?q?aAQE?= X-IronPort-AV: E=Sophos;i="5.84,358,1620691200"; d="scan'208,217";a="928061053" Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Aug 2021 01:54:05 +0000 Received: from mail.cisco.com (xbe-rcd-005.cisco.com [173.37.102.20]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 17S1s5DD016665 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Sat, 28 Aug 2021 01:54:05 GMT Received: from xfe-rtp-005.cisco.com (64.101.210.235) by xbe-rcd-005.cisco.com (173.37.102.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 27 Aug 2021 20:54:05 -0500 Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 27 Aug 2021 21:54:04 -0400 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Fri, 27 Aug 2021 20:54:04 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cNRJVkWpwoA9JBwP76eLaVykQozyDEVEM1JV/hzlrF1NIuY7YkgeMclXqUwrsSnBGr/9AU9g9B5979fc9KZPPncEeUtcaIl/9D13EwCFWpElWkRzysXNUTiR4tEkbWqdB2wtBi2kbO9TKXG3eB2ahz/kAYe3B8BDpigQfOT51wWVdMvq6t0nma4Rmhoa1eyqR88y1pfIu4SObCl/7Mza/LVHInYu7EOJejYYw6gHsZIUQ3Ci2ggjDu8yy9iY1+zoEasnpxw63hfc6RRzceiuKNppDUypaLbnhPDaU6DaGzXA5IiveQfhJLwt8qLFvYGT37rrPICffX95XrS34kD74Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5MDhWmeFwMF755iBvbEEC3d5TYlxlzFjwGWXTbCyyo4=; b=XqdY597ODZuYqU1j9e58dcaWt5ir6WbH+lcWD8yCv2x4YAU7dg18BYF0+P7DmBaZEb70MB/uZfF6jOdkGVKj4zQNMqTZeHbaDqydo5gOemhTjbBN6WAl10BuQLp1nX3iNt8BizGsGEhfeR/GxyLLypzCiy5A4OyBiqWxSkiqfdxzH0edoBRuzZzlgzGlarBjsvL45c2Uvu8Rz2+hJWO4uVhZdwd+2GHWPGjcEd5hjSNH0fEaD7Nh6vtVwXUxyAUoGpTrs+oLKlcN6CXk2ieOdMNx6G/aOBEQq5ukJsiqB2yWDYlx3bIqsOE1ZUGvEEJSxLBg52q5bhV6B/SJ/lRlsQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5MDhWmeFwMF755iBvbEEC3d5TYlxlzFjwGWXTbCyyo4=; b=mGbNQqygmpCCHDQllyHG7C4vkOWJPSIWPxjzdmWMgjHVfks3EvTp48qlANY9ewN07l83rwWaBQdyDEE3GkBv9Kz7Vq9TbOX+8DIdVeUZ0zFrIujnVMG18a0QbCaAYX/yhtMZMMb/QrLV8xYj34mQWTnX4lQpJeyBm60DczTrD6U= Received: from BY5PR11MB4260.namprd11.prod.outlook.com (2603:10b6:a03:1ba::30) by BYAPR11MB2680.namprd11.prod.outlook.com (2603:10b6:a02:c9::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.19; Sat, 28 Aug 2021 01:54:01 +0000 Received: from BY5PR11MB4260.namprd11.prod.outlook.com ([fe80::603a:dc34:d817:f7e4]) by BY5PR11MB4260.namprd11.prod.outlook.com ([fe80::603a:dc34:d817:f7e4%3]) with mapi id 15.20.4436.024; Sat, 28 Aug 2021 01:54:01 +0000 From: "Ali Sajassi (sajassi)" To: "Bocci, Matthew (Nokia - GB)" , "bess@ietf.org" , "draft-ietf-bess-evpn-lsp-ping@ietf.org" Thread-Topic: Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 Thread-Index: AQHXjSHrLk5K96Ha502EnoU7V5R926uIQapS Date: Sat, 28 Aug 2021 01:54:00 +0000 Message-ID: References: <0B5439E0-0204-4AF2-ACAC-CFB0CE884712@nokia.com> In-Reply-To: <0B5439E0-0204-4AF2-ACAC-CFB0CE884712@nokia.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=cisco.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 6401543e-ac9e-4d04-befa-08d969c6b4f6 x-ms-traffictypediagnostic: BYAPR11MB2680: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4260.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(366004)(136003)(39860400002)(346002)(376002)(9686003)(6506007)(296002)(76116006)(8936002)(71200400001)(478600001)(66556008)(38100700002)(166002)(53546011)(122000001)(316002)(33656002)(55016002)(110136005)(966005)(186003)(5660300002)(9326002)(38070700005)(66476007)(52536014)(8676002)(64756008)(66946007)(86362001)(83380400001)(66574015)(26005)(7696005)(2906002)(66446008); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?UjRnTEw0Q0UwRWh0OHNMUmNJZXcxKzdkeDRXeHNjd3hKVGJiTUdqMWc5eWJq?= =?utf-8?B?SXdIa1VKclNFVVR1Vll4TkFBNGJnK1Z4SzFpcWYwczYxaE5PaE1kSlVQWDNZ?= =?utf-8?B?QVA1cW96QmxLb3BhS3RUVzBOQ1QvWkg1enBLS2lsOHRmODgxb1lkdWlDY3V0?= =?utf-8?B?dHZXWlgwQ3FwNmlwZFZXekNnbHQ2cFF4d28zM3RGK2o0NE1SWnJaU1IwS3Yy?= =?utf-8?B?QjNQWjRsMTRJVytEZGRjU3hqbGNlcEJHdWV5Kys0VG5hNWMwc0pyM1Y0bVFX?= =?utf-8?B?VFh4VHJDUTNsWDJaNk1UZUE0QitYamN0KzZyUUZHL2cwNFc2aE5UZzNTU1Fn?= =?utf-8?B?MEkwaXRoKzRmUzlqeUhOK2pYdTUwd2FjMWdoSUVOaEYweWswWnR5OGo5NXlL?= =?utf-8?B?Kzg5clFub0M0VmlsN1Zob0kzdVk4czhsRmtjOVo4MzdlK0M4ZHpvaERyYlVB?= =?utf-8?B?b0o2dlhqWGxwUUErWVI5K08yWVR4bUNkNndQWFlNK0RNVTBoT0REbkpKbWdK?= =?utf-8?B?bjRKbGI0ZU1GampPdFdTcTFOYm9UeTc0MHBjQnF6MC9hUHI1Qi9hdVI2b1Rx?= =?utf-8?B?STJiT1NBV0dNZmpiaW5ZYzdIQnBqUGxDbWNuVzYzQTJpVFhjc1VpLzJ4eGt6?= =?utf-8?B?U1Z6Y1F6Mm5DWkkrUjlIUTV5SFNST1lPSFhhMEUzWjdWcFJlWmdrWi9nZ1Bq?= =?utf-8?B?YkVQemFtcVV2SGZSME4rbXFHR0lTKzVNQ09Rb3dBVGZ5OUJjOHBxV0VvTTkw?= =?utf-8?B?aW5sME5VeGNUbmNCSzdGNklsN2J2SGRhNll3dU03R2h0cEZwZVFUYUN0YTIx?= =?utf-8?B?aXRQV3E5Z3lFNUVydnd1aDZWTzhBRFFrRVVRMEVSSlk4Mmp4ZXJUNmV6eUpE?= =?utf-8?B?alNXM1hRTDRidWI5TVdLNm00QklmemRWbERqSThjZDJzbmpCWm44VVdEWjNk?= =?utf-8?B?ZFZ4K3dPdGVQVXAxeWdxMWZMa2hRckpiaWhDbG5GNzlGQzdNcXE5anlpNHZp?= =?utf-8?B?MjQ3OWhvVm1vRVp6T2YrOHQzanJBYVEwSkJSQkdIa3QycEFoV3pZSFlXMHRH?= =?utf-8?B?VkQxZk1aSVhWSW5yUUtjK0xJWnZxejRERTlLdzZhMlVFdWtzWGxNS2NFTTE2?= =?utf-8?B?L1hSRzVUMHAzT3pUVEs0QkVzS2I3U21PWE4yZ0Qxa0lPenJGd1ZWWFZ4TDls?= =?utf-8?B?a3JvSVFONW9pajZWNXZNSDB6YUhVNzNrMVI1Qk56dkorMVRTM3lGTURuRFEy?= =?utf-8?B?blpHZHhSbzhQcXNZamQ3Rkp0cE00VWJZZU16d05uYW50ZFluL0hLTEtONlFC?= =?utf-8?B?RkoyNS90REwxM3hBb3hLWkhwQi9KSzdhV3JvbXpoYVh0eEZ4YXVlcEJEN0E2?= =?utf-8?B?MDAzSGxkSkp6aThBcHQ5Z09IUEN1R21LNURzUHIxWFI0bUJZN2ljTEZpYVN6?= =?utf-8?B?dUJySDJXZVg3bWVzT2o0RWlLY3NsWlQ0OHJWaldEQmhjbnhJbWcyT3FSbXJ6?= =?utf-8?B?Q3lDaDNOdkc5RlRsaU9NMmh3TU1BakNRcVNBYWUxY0FkK0JzZjk1cWhtNzZS?= =?utf-8?B?c3FUbjQ4RmpyZllpQWJnNk5EejZ2d3h2enhnejVtVWFESUxiWitLZWpsNmdG?= =?utf-8?B?KzdmZ3JnVXhZdktmT01JWklBUURFbzlxTHhjalBTRmdsMW9keDJSckJLL2t4?= =?utf-8?B?eVc2SWJ6Z3U2b3pLREJLcHdEUk5XVldWUnk0QXQxQW9lWWo2ZS8vMjZkN2pq?= =?utf-8?B?anhSZkwvaUYrVWRSY0pQOXZBb3FFZ0lua0RsY2tPb3VxTzZ5K2Yxcm5odnFq?= =?utf-8?B?bWMzNU40aXFSZE9JRmYydz09?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_BY5PR11MB42607626E070F40254A2E853B0C99BY5PR11MB4260namp_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4260.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 6401543e-ac9e-4d04-befa-08d969c6b4f6 X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Aug 2021 01:54:00.9337 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: xJbzsh0KWCS43C2slXYErxo42jsY2YpdNI7KX/W5un7rDkU6j+xupNRNuwEZPSNucv9VhP4XYOH2D0a9j0gobg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2680 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.37.102.20, xbe-rcd-005.cisco.com X-Outbound-Node: rcdn-core-4.cisco.com Archived-At: Subject: Re: [bess] Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 28 Aug 2021 01:54:14 -0000 --_000_BY5PR11MB42607626E070F40254A2E853B0C99BY5PR11MB4260namp_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgTWF0dGhldywNCg0KU29tZSBvZiB0aGUgY28tYXV0aG9ycyBhcmUgb24gUFRPIGFuZCBJIGNv dWxkbuKAmXQgcmVhY2ggdGhlbSAodHlwaWNhbCBvZiB0aGUgbW9udGggb2YgQXVndXN0KS4gU28s IEnigJlkIGxpa2UgdG8gZ2V0IGEgYml0IG1vcmUgZXh0ZW5zaW9uLg0KDQpSZWdhcmRpbmcgdGhl IHR3byBxdWVzdGlvbnMgYmVsb3c6DQoNCiAgMS4gIE15IGNvbXBhbnkgaGFzbuKAmXQgaW1wbGVt ZW50ZWQgaXQuDQogIDIuICBJIGRvIHRoaW5rIHRoYXQgd2Ugc2hvdWxkIHByb2Nlc3Mgd2l0aCB0 aGUgcHVibGljYXRpb24gYXMgaXQgZGVzY3JpYmVzIGhvdyBMU1AgcGluZyBjYW4gYmUgdXNlZCB0 byBkZXRlY3QgZGF0YS1wbGFuZSBmYWlsdXJlcyBmb3IgdmFyaW91cyBFVlBOIGZ1bmN0aW9uYWxp dHkgaW5jbHVkaW5nIGFsaWFzaW5nLCBzcGxpdC1ob3Jpem9uIGZpbHRlcmluZyB1c2luZyBFU0kg bGFiZWwsIG11bHRpY2FzdCwgbDItdW5pY2FzdCwgbDMtdW5pY2FzdCwgSVJCLCBldGMuIEZvciBN UExTIHRyYW5zcG9ydCB0dW5uZWwsIEkgYW0gbm90IGF3YXJlIG9mIGFueSBvdGhlciB0b29sL2Ry YWZ0IHRoYXQgYWxsb3dzIHVzIHRvIGRvIGRhdGEtcGxhbmUgZmFpbHVyZSBkZXRlY3Rpb24uIFRo dXMsIEkgdGhpbmsgaXQgaXMgaW1wb3J0YW50IHRvIHByb2NlZWQgd2l0aCBpdHMgcHVibGljYXRp b25zLg0KDQpTdGlsbCBJ4oCZZCBsaWtlIHRvIGhlYXIgZnJvbSBvdGhlciBjby1hdXRob3JzIGFu ZCBvdGhlciBwZW9wbGUgaW4gdGhpcyBjb21tdW5pdHkuDQoNClJlZ2FyZHMsDQpBbGkNCg0KRnJv bTogQm9jY2ksIE1hdHRoZXcgKE5va2lhIC0gR0IpIDxtYXR0aGV3LmJvY2NpQG5va2lhLmNvbT4N CkRhdGU6IE1vbmRheSwgQXVndXN0IDksIDIwMjEgYXQgNjoyNSBBTQ0KVG86IGJlc3NAaWV0Zi5v cmcgPGJlc3NAaWV0Zi5vcmc+LCBkcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9y ZyA8ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmc+DQpTdWJqZWN0OiBJbXBs ZW1lbnRhdGlvbiBwb2xsIGZvciBkcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNQ0KV0cg YW5kIEF1dGhvcnMNCg0KVW5mb3J0dW5hdGVseSBJIGhhdmUgbm90IHNlZW4gYW55IHJlc3BvbnNl cyBpbmRpY2F0aW5nIHRoYXQgdGhlcmUgYXJlIGFueSBrbm93biBpbXBsZW1lbnRhdGlvbnMgb2Yg dGhpcyBkcmFmdC4gSSBhbHNvIGRpZCBub3Qgc2VlIGFueSByZXNwb25zZXMgdG8gU3RlcGhhbmUn cyBxdWVzdGlvbiBpZiB3ZSBzaG91bGQgcHJvY2VlZCByZWdhcmRsZXNzLg0KDQpBcyBwZXIgdGhl IEJFU1MgV0cgaW1wbGVtZW50YXRpb24gcG9saWN5IChodHRwczovL21haWxhcmNoaXZlLmlldGYu b3JnL2FyY2gvbXNnL2Jlc3MvY0czWDF0VHFiX3ZQQzRyZzU2U0Vka2pxRHB3LyksIHBsZWFzZSBj YW4geW91IHJlc3BvbmQgdG8gdGhpcyBlbWFpbCBpbmRpY2F0aW5nIGVpdGhlcjoNCg0KLSBUaGF0 IHlvdSBhcmUgYXdhcmUgb2YgYW55IGltcGxlbWVudGF0aW9ucyAoaWRlYWxseSBwcm92aWRpbmcg c29tZSBkZXRhaWxzKQ0KLSBJZiB5b3UgYXJlIG5vdCBhd2FyZSBvZiBhbnksIGlmIHlvdSB0aGlu ayB0aGUgV0cgc2hvdWxkIHByb2NlZWQgd2l0aCB0aGUgZHJhZnQncyBwdWJsaWNhdGlvbiBhbmQg d2h5Lg0KDQpJIHdpbGwgY2xvc2UgdGhpcyBwb2xsIG9uIDI1dGggQXVndXN0IDIwMjEuDQoNClJl Z2FyZHMNCg0KTWF0dGhldw0KDQoNCu+7v09uIDE0LzA2LzIwMjEsIDE3OjM4LCAiQkVTUyBvbiBi ZWhhbGYgb2YgaW50ZXJuZXQtZHJhZnRzQGlldGYub3JnIiA8YmVzcy1ib3VuY2VzQGlldGYub3Jn IG9uIGJlaGFsZiBvZiBpbnRlcm5ldC1kcmFmdHNAaWV0Zi5vcmc+IHdyb3RlOg0KDQoNCiAgICBB IE5ldyBJbnRlcm5ldC1EcmFmdCBpcyBhdmFpbGFibGUgZnJvbSB0aGUgb24tbGluZSBJbnRlcm5l dC1EcmFmdHMgZGlyZWN0b3JpZXMuDQogICAgVGhpcyBkcmFmdCBpcyBhIHdvcmsgaXRlbSBvZiB0 aGUgQkdQIEVuYWJsZWQgU2VydmljZVMgV0cgb2YgdGhlIElFVEYuDQoNCiAgICAgICAgICAgIFRp dGxlICAgICAgICAgICA6IExTUC1QaW5nIE1lY2hhbmlzbXMgZm9yIEVWUE4gYW5kIFBCQi1FVlBO DQogICAgICAgICAgICBBdXRob3JzICAgICAgICAgOiBQYXJhZyBKYWluDQogICAgICAgICAgICAg ICAgICAgICAgICAgICAgICBTYW1lciBTYWxhbQ0KICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgQWxpIFNhamFzc2kNCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFNhbWkgQm91dHJv cw0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgR3JlZyBNaXJza3kNCiAgICAgICAgIEZp bGVuYW1lICAgICAgICA6IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1LnR4dA0KICAg ICAgICAgUGFnZXMgICAgICAgICAgIDogMTUNCiAgICAgICAgIERhdGUgICAgICAgICAgICA6IDIw MjEtMDYtMTQNCg0KICAgIEFic3RyYWN0Og0KICAgICAgIExTUC1QaW5nIGlzIGEgd2lkZWx5IGRl cGxveWVkIE9wZXJhdGlvbiwgQWRtaW5pc3RyYXRpb24sIGFuZA0KICAgICAgIE1haW50ZW5hbmNl IChPQU0pIG1lY2hhbmlzbSBpbiBNUExTIG5ldHdvcmtzLiAgVGhpcyBkb2N1bWVudA0KICAgICAg IGRlc2NyaWJlcyBtZWNoYW5pc21zIGZvciBkZXRlY3RpbmcgZGF0YS1wbGFuZSBmYWlsdXJlcyB1 c2luZyBMU1AgUGluZw0KICAgICAgIGluIE1QTFMgYmFzZWQgRVZQTiBhbmQgUEJCLUVWUE4gbmV0 d29ya3MuDQoNCg0KICAgIFRoZSBJRVRGIGRhdGF0cmFja2VyIHN0YXR1cyBwYWdlIGZvciB0aGlz IGRyYWZ0IGlzOg0KICAgIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWll dGYtYmVzcy1ldnBuLWxzcC1waW5nLw0KDQogICAgVGhlcmUgaXMgYWxzbyBhbiBodG1saXplZCB2 ZXJzaW9uIGF2YWlsYWJsZSBhdDoNCiAgICBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2Rv Yy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1DQoNCiAgICBBIGRpZmYgZnJv bSB0aGUgcHJldmlvdXMgdmVyc2lvbiBpcyBhdmFpbGFibGUgYXQ6DQogICAgaHR0cHM6Ly93d3cu aWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1DQoN Cg0KICAgIEludGVybmV0LURyYWZ0cyBhcmUgYWxzbyBhdmFpbGFibGUgYnkgYW5vbnltb3VzIEZU UCBhdDoNCiAgICBmdHA6Ly9mdHAuaWV0Zi5vcmcvaW50ZXJuZXQtZHJhZnRzLw0KDQoNCiAgICBf X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KICAgIEJFU1Mg bWFpbGluZyBsaXN0DQogICAgQkVTU0BpZXRmLm9yZw0KICAgIGh0dHBzOi8vd3d3LmlldGYub3Jn L21haWxtYW4vbGlzdGluZm8vYmVzcw0K --_000_BY5PR11MB42607626E070F40254A2E853B0C99BY5PR11MB4260namp_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2 IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6RGVuZ1hpYW47DQoJcGFub3NlLTE6 MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7 DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZh bWlseToiXEBEZW5nWGlhbiI7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQovKiBT dHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05v cm1hbA0KCXttYXJnaW46MGluOw0KCWZvbnQtc2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNh bGlicmkiLHNhbnMtc2VyaWY7fQ0KYTpsaW5rLCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5 bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5l O30NCnAuTXNvTGlzdFBhcmFncmFwaCwgbGkuTXNvTGlzdFBhcmFncmFwaCwgZGl2Lk1zb0xpc3RQ YXJhZ3JhcGgNCgl7bXNvLXN0eWxlLXByaW9yaXR5OjM0Ow0KCW1hcmdpbi10b3A6MGluOw0KCW1h cmdpbi1yaWdodDowaW47DQoJbWFyZ2luLWJvdHRvbTowaW47DQoJbWFyZ2luLWxlZnQ6LjVpbjsN Cglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30N CnNwYW4uRW1haWxTdHlsZTE5DQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsLXJlcGx5Ow0KCWZv bnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9yOndpbmRvd3RleHQ7fQ0KLk1z b0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1zaXplOjEw LjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7c2l6ZTo4LjVpbiAxMS4waW47DQoJbWFyZ2lu OjEuMGluIDEuMGluIDEuMGluIDEuMGluO30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3Jk U2VjdGlvbjE7fQ0KLyogTGlzdCBEZWZpbml0aW9ucyAqLw0KQGxpc3QgbDANCgl7bXNvLWxpc3Qt aWQ6NTM5NzA3OTI2Ow0KCW1zby1saXN0LXR5cGU6aHlicmlkOw0KCW1zby1saXN0LXRlbXBsYXRl LWlkczo4MDExMzg0MDYgNjc2OTg3MDUgNjc2OTg3MTMgNjc2OTg3MTUgNjc2OTg3MDMgNjc2OTg3 MTMgNjc2OTg3MTUgNjc2OTg3MDMgNjc2OTg3MTMgNjc2OTg3MTU7fQ0KQGxpc3QgbDA6bGV2ZWwx DQoJe21zby1sZXZlbC10ZXh0OiIlMVwpIjsNCgltc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCglt c28tbGV2ZWwtbnVtYmVyLXBvc2l0aW9uOmxlZnQ7DQoJdGV4dC1pbmRlbnQ6LS4yNWluO30NCkBs aXN0IGwwOmxldmVsMg0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDphbHBoYS1sb3dlcjsNCglt c28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCgltc28tbGV2ZWwtbnVtYmVyLXBvc2l0aW9uOmxlZnQ7 DQoJdGV4dC1pbmRlbnQ6LS4yNWluO30NCkBsaXN0IGwwOmxldmVsMw0KCXttc28tbGV2ZWwtbnVt YmVyLWZvcm1hdDpyb21hbi1sb3dlcjsNCgltc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCgltc28t bGV2ZWwtbnVtYmVyLXBvc2l0aW9uOnJpZ2h0Ow0KCXRleHQtaW5kZW50Oi05LjBwdDt9DQpAbGlz dCBsMDpsZXZlbDQNCgl7bXNvLWxldmVsLXRhYi1zdG9wOm5vbmU7DQoJbXNvLWxldmVsLW51bWJl ci1wb3NpdGlvbjpsZWZ0Ow0KCXRleHQtaW5kZW50Oi0uMjVpbjt9DQpAbGlzdCBsMDpsZXZlbDUN Cgl7bXNvLWxldmVsLW51bWJlci1mb3JtYXQ6YWxwaGEtbG93ZXI7DQoJbXNvLWxldmVsLXRhYi1z dG9wOm5vbmU7DQoJbXNvLWxldmVsLW51bWJlci1wb3NpdGlvbjpsZWZ0Ow0KCXRleHQtaW5kZW50 Oi0uMjVpbjt9DQpAbGlzdCBsMDpsZXZlbDYNCgl7bXNvLWxldmVsLW51bWJlci1mb3JtYXQ6cm9t YW4tbG93ZXI7DQoJbXNvLWxldmVsLXRhYi1zdG9wOm5vbmU7DQoJbXNvLWxldmVsLW51bWJlci1w b3NpdGlvbjpyaWdodDsNCgl0ZXh0LWluZGVudDotOS4wcHQ7fQ0KQGxpc3QgbDA6bGV2ZWw3DQoJ e21zby1sZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246bGVm dDsNCgl0ZXh0LWluZGVudDotLjI1aW47fQ0KQGxpc3QgbDA6bGV2ZWw4DQoJe21zby1sZXZlbC1u dW1iZXItZm9ybWF0OmFscGhhLWxvd2VyOw0KCW1zby1sZXZlbC10YWItc3RvcDpub25lOw0KCW1z by1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotLjI1aW47fQ0KQGxp c3QgbDA6bGV2ZWw5DQoJe21zby1sZXZlbC1udW1iZXItZm9ybWF0OnJvbWFuLWxvd2VyOw0KCW1z by1sZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246cmlnaHQ7 DQoJdGV4dC1pbmRlbnQ6LTkuMHB0O30NCm9sDQoJe21hcmdpbi1ib3R0b206MGluO30NCnVsDQoJ e21hcmdpbi1ib3R0b206MGluO30NCi0tPjwvc3R5bGU+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJF Ti1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSIgc3R5bGU9IndvcmQtd3JhcDpicmVhay13 b3JkIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5I aSBNYXR0aGV3LDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJz cDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5Tb21lIG9mIHRoZSBjby1hdXRob3Jz IGFyZSBvbiBQVE8gYW5kIEkgY291bGRu4oCZdCByZWFjaCB0aGVtICh0eXBpY2FsIG9mIHRoZSBt b250aCBvZiBBdWd1c3QpLiBTbywgSeKAmWQgbGlrZSB0byBnZXQgYSBiaXQgbW9yZSBleHRlbnNp b24uPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpw PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPlJlZ2FyZGluZyB0aGUgdHdvIHF1ZXN0aW9ucyBi ZWxvdzo8bzpwPjwvbzpwPjwvcD4NCjxvbCBzdHlsZT0ibWFyZ2luLXRvcDowaW4iIHN0YXJ0PSIx IiB0eXBlPSIxIj4NCjxsaSBjbGFzcz0iTXNvTGlzdFBhcmFncmFwaCIgc3R5bGU9Im1hcmdpbi1s ZWZ0OjBpbjttc28tbGlzdDpsMCBsZXZlbDEgbGZvMSI+TXkgY29tcGFueSBoYXNu4oCZdCBpbXBs ZW1lbnRlZCBpdC48bzpwPjwvbzpwPjwvbGk+PGxpIGNsYXNzPSJNc29MaXN0UGFyYWdyYXBoIiBz dHlsZT0ibWFyZ2luLWxlZnQ6MGluO21zby1saXN0OmwwIGxldmVsMSBsZm8xIj5JIGRvIHRoaW5r IHRoYXQgd2Ugc2hvdWxkIHByb2Nlc3Mgd2l0aCB0aGUgcHVibGljYXRpb24gYXMgaXQgZGVzY3Jp YmVzIGhvdyBMU1AgcGluZyBjYW4gYmUgdXNlZCB0byBkZXRlY3QgZGF0YS1wbGFuZSBmYWlsdXJl cyBmb3IgdmFyaW91cyBFVlBOIGZ1bmN0aW9uYWxpdHkgaW5jbHVkaW5nIGFsaWFzaW5nLCBzcGxp dC1ob3Jpem9uDQogZmlsdGVyaW5nIHVzaW5nIEVTSSBsYWJlbCwgbXVsdGljYXN0LCBsMi11bmlj YXN0LCBsMy11bmljYXN0LCBJUkIsIGV0Yy4gRm9yIE1QTFMgdHJhbnNwb3J0IHR1bm5lbCwgSSBh bSBub3QgYXdhcmUgb2YgYW55IG90aGVyIHRvb2wvZHJhZnQgdGhhdCBhbGxvd3MgdXMgdG8gZG8g ZGF0YS1wbGFuZSBmYWlsdXJlIGRldGVjdGlvbi4gVGh1cywgSSB0aGluayBpdCBpcyBpbXBvcnRh bnQgdG8gcHJvY2VlZCB3aXRoIGl0cyBwdWJsaWNhdGlvbnMuDQo8bzpwPjwvbzpwPjwvbGk+PC9v bD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+U3RpbGwgSeKAmWQgbGlrZSB0byBoZWFyIGZyb20gb3RoZXIgY28tYXV0aG9y cyBhbmQgb3RoZXIgcGVvcGxlIGluIHRoaXMgY29tbXVuaXR5LjxvOnA+PC9vOnA+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj5SZWdhcmRzLDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+QWxpPG86 cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4N CjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtw YWRkaW5nOjMuMHB0IDBpbiAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt YXJnaW4tYm90dG9tOjEyLjBwdCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29s b3I6YmxhY2siPkZyb206DQo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0 O2NvbG9yOmJsYWNrIj5Cb2NjaSwgTWF0dGhldyAoTm9raWEgLSBHQikgJmx0O21hdHRoZXcuYm9j Y2lAbm9raWEuY29tJmd0Ozxicj4NCjxiPkRhdGU6IDwvYj5Nb25kYXksIEF1Z3VzdCA5LCAyMDIx IGF0IDY6MjUgQU08YnI+DQo8Yj5UbzogPC9iPmJlc3NAaWV0Zi5vcmcgJmx0O2Jlc3NAaWV0Zi5v cmcmZ3Q7LCBkcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9yZyAmbHQ7ZHJhZnQt aWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDogPC9i PkltcGxlbWVudGF0aW9uIHBvbGwgZm9yIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1 PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCIgc3R5bGU9Im1hcmdpbi1ib3R0b206MTIuMHB0Ij5XRyBhbmQgQXV0aG9yczxicj4NCjxicj4N ClVuZm9ydHVuYXRlbHkgSSBoYXZlIG5vdCBzZWVuIGFueSByZXNwb25zZXMgaW5kaWNhdGluZyB0 aGF0IHRoZXJlIGFyZSBhbnkga25vd24gaW1wbGVtZW50YXRpb25zIG9mIHRoaXMgZHJhZnQuIEkg YWxzbyBkaWQgbm90IHNlZSBhbnkgcmVzcG9uc2VzIHRvIFN0ZXBoYW5lJ3MgcXVlc3Rpb24gaWYg d2Ugc2hvdWxkIHByb2NlZWQgcmVnYXJkbGVzcy48YnI+DQo8YnI+DQpBcyBwZXIgdGhlIEJFU1Mg V0cgaW1wbGVtZW50YXRpb24gcG9saWN5ICg8YSBocmVmPSJodHRwczovL21haWxhcmNoaXZlLmll dGYub3JnL2FyY2gvbXNnL2Jlc3MvY0czWDF0VHFiX3ZQQzRyZzU2U0Vka2pxRHB3LyI+aHR0cHM6 Ly9tYWlsYXJjaGl2ZS5pZXRmLm9yZy9hcmNoL21zZy9iZXNzL2NHM1gxdFRxYl92UEM0cmc1NlNF ZGtqcURwdy88L2E+KSwgcGxlYXNlIGNhbiB5b3UgcmVzcG9uZCB0byB0aGlzIGVtYWlsIGluZGlj YXRpbmcgZWl0aGVyOjxicj4NCjxicj4NCi0gVGhhdCB5b3UgYXJlIGF3YXJlIG9mIGFueSBpbXBs ZW1lbnRhdGlvbnMgKGlkZWFsbHkgcHJvdmlkaW5nIHNvbWUgZGV0YWlscyk8YnI+DQotIElmIHlv dSBhcmUgbm90IGF3YXJlIG9mIGFueSwgaWYgeW91IHRoaW5rIHRoZSBXRyBzaG91bGQgcHJvY2Vl ZCB3aXRoIHRoZSBkcmFmdCdzIHB1YmxpY2F0aW9uIGFuZCB3aHkuPGJyPg0KPGJyPg0KSSB3aWxs IGNsb3NlIHRoaXMgcG9sbCBvbiAyNXRoIEF1Z3VzdCAyMDIxLjxicj4NCjxicj4NClJlZ2FyZHM8 YnI+DQo8YnI+DQpNYXR0aGV3PGJyPg0KJm5ic3A7PGJyPg0KPGJyPg0K77u/T24gMTQvMDYvMjAy MSwgMTc6MzgsICZxdW90O0JFU1Mgb24gYmVoYWxmIG9mIGludGVybmV0LWRyYWZ0c0BpZXRmLm9y ZyZxdW90OyAmbHQ7YmVzcy1ib3VuY2VzQGlldGYub3JnIG9uIGJlaGFsZiBvZiBpbnRlcm5ldC1k cmFmdHNAaWV0Zi5vcmcmZ3Q7IHdyb3RlOjxicj4NCjxicj4NCjxicj4NCiZuYnNwOyZuYnNwOyZu YnNwOyBBIE5ldyBJbnRlcm5ldC1EcmFmdCBpcyBhdmFpbGFibGUgZnJvbSB0aGUgb24tbGluZSBJ bnRlcm5ldC1EcmFmdHMgZGlyZWN0b3JpZXMuPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7IFRoaXMg ZHJhZnQgaXMgYSB3b3JrIGl0ZW0gb2YgdGhlIEJHUCBFbmFibGVkIFNlcnZpY2VTIFdHIG9mIHRo ZSBJRVRGLjxicj4NCjxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBUaXRsZSZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA6IExTUC1QaW5nIE1lY2hhbmlz bXMgZm9yIEVWUE4gYW5kIFBCQi1FVlBOPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IEF1dGhvcnMmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgOiBQYXJhZyBKYWluPGJyPg0K Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7IFNhbWVyIFNhbGFtPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IEFsaSBTYWphc3NpPGJyPg0KJm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IFNhbWkgQm91dHJv czxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyBHcmVnIE1pcnNreTxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyBGaWxlbmFtZSZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyA6IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1LnR4dDxicj4N CiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBQYWdlcyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyA6IDE1PGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7IERhdGUmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsgOiAyMDIxLTA2LTE0PGJyPg0KPGJyPg0KJm5ic3A7Jm5ic3A7Jm5i c3A7IEFic3RyYWN0Ojxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBM U1AtUGluZyBpcyBhIHdpZGVseSBkZXBsb3llZCBPcGVyYXRpb24sIEFkbWluaXN0cmF0aW9uLCBh bmQ8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgTWFpbnRlbmFuY2Ug KE9BTSkgbWVjaGFuaXNtIGluIE1QTFMgbmV0d29ya3MuJm5ic3A7IFRoaXMgZG9jdW1lbnQ8YnI+ DQombmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgZGVzY3JpYmVzIG1lY2hhbmlz bXMgZm9yIGRldGVjdGluZyBkYXRhLXBsYW5lIGZhaWx1cmVzIHVzaW5nIExTUCBQaW5nPGJyPg0K Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGluIE1QTFMgYmFzZWQgRVZQTiBh bmQgUEJCLUVWUE4gbmV0d29ya3MuPGJyPg0KPGJyPg0KPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7 IFRoZSBJRVRGIGRhdGF0cmFja2VyIHN0YXR1cyBwYWdlIGZvciB0aGlzIGRyYWZ0IGlzOjxicj4N CiZuYnNwOyZuYnNwOyZuYnNwOyA8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3Jn L2RvYy9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy8iPmh0dHBzOi8vZGF0YXRyYWNrZXIu aWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLzwvYT48YnI+DQo8YnI+ DQombmJzcDsmbmJzcDsmbmJzcDsgVGhlcmUgaXMgYWxzbyBhbiBodG1saXplZCB2ZXJzaW9uIGF2 YWlsYWJsZSBhdDo8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly9kYXRh dHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0w NSI+DQpodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVz cy1ldnBuLWxzcC1waW5nLTA1PC9hPjxicj4NCjxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyBBIGRp ZmYgZnJvbSB0aGUgcHJldmlvdXMgdmVyc2lvbiBpcyBhdmFpbGFibGUgYXQ6PGJyPg0KJm5ic3A7 Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL3JmY2RpZmY/dXJsMj1k cmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNSI+DQpodHRwczovL3d3dy5pZXRmLm9yZy9y ZmNkaWZmP3VybDI9ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDU8L2E+PGJyPg0KPGJy Pg0KPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7IEludGVybmV0LURyYWZ0cyBhcmUgYWxzbyBhdmFp bGFibGUgYnkgYW5vbnltb3VzIEZUUCBhdDo8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsgPGEgaHJl Zj0iZnRwOi8vZnRwLmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy8iPmZ0cDovL2Z0cC5pZXRmLm9y Zy9pbnRlcm5ldC1kcmFmdHMvPC9hPjxicj4NCjxicj4NCjxicj4NCiZuYnNwOyZuYnNwOyZuYnNw OyBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCiZu YnNwOyZuYnNwOyZuYnNwOyBCRVNTIG1haWxpbmcgbGlzdDxicj4NCiZuYnNwOyZuYnNwOyZuYnNw OyBCRVNTQGlldGYub3JnPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8v d3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vYmVzcyI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcv bWFpbG1hbi9saXN0aW5mby9iZXNzPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4N CjwvYm9keT4NCjwvaHRtbD4NCg== --_000_BY5PR11MB42607626E070F40254A2E853B0C99BY5PR11MB4260namp_-- From nobody Sat Aug 28 10:13:07 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B3293A0D35; Sat, 28 Aug 2021 10:12:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rh_JxqyTL73C; Sat, 28 Aug 2021 10:12:47 -0700 (PDT) Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A98713A0D32; Sat, 28 Aug 2021 10:12:47 -0700 (PDT) Received: by rfc-editor.org (Postfix, from userid 30) id 35658F40744; Sat, 28 Aug 2021 10:12:30 -0700 (PDT) To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org X-PHP-Originating-Script: 1005:ams_util_lib.php From: rfc-editor@rfc-editor.org Cc: rfc-editor@rfc-editor.org, drafts-update-ref@iana.org, bess@ietf.org Content-type: text/plain; charset=UTF-8 Message-Id: <20210828171230.35658F40744@rfc-editor.org> Date: Sat, 28 Aug 2021 10:12:30 -0700 (PDT) Archived-At: Subject: [bess] =?utf-8?q?RFC_9125_on_Gateway_Auto-Discovery_and_Route_Ad?= =?utf-8?q?vertisement_for_Site_Interconnection_Using_Segment_Routing?= X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 28 Aug 2021 17:12:56 -0000 A new Request for Comments is now available in online RFC libraries. RFC 9125 Title: Gateway Auto-Discovery and Route Advertisement for Site Interconnection Using Segment Routing Author: A. Farrel, J. Drake, E. Rosen, K. Patel, L. Jalil Status: Standards Track Stream: IETF Date: August 2021 Mailbox: adrian@olddog.co.uk, jdrake@juniper.net, erosen52@gmail.com, keyur@arrcus.com, luay.jalil@verizon.com Pages: 12 Updates/Obsoletes/SeeAlso: None I-D Tag: draft-ietf-bess-datacenter-gateway-13.txt URL: https://www.rfc-editor.org/info/rfc9125 DOI: 10.17487/RFC9125 Data centers are attached to the Internet or a backbone network by gateway routers. One data center typically has more than one gateway for commercial, load-balancing, and resiliency reasons. Other sites, such as access networks, also need to be connected across backbone networks through gateways. This document defines a mechanism using the BGP Tunnel Encapsulation attribute to allow data center gateway routers to advertise routes to the prefixes reachable in the site, including advertising them on behalf of other gateways at the same site. This allows segment routing to be used to identify multiple paths across the Internet or backbone network between different gateways. The paths can be selected for load-balancing, resilience, and quality purposes. This document is a product of the BGP Enabled Services Working Group of the IETF. This is now a Proposed Standard. STANDARDS TRACK: This document specifies an Internet Standards Track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the Official Internet Protocol Standards (https://www.rfc-editor.org/standards) for the standardization state and status of this protocol. Distribution of this memo is unlimited. This announcement is sent to the IETF-Announce and rfc-dist lists. To subscribe or unsubscribe, see https://www.ietf.org/mailman/listinfo/ietf-announce https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist For searching the RFC series, see https://www.rfc-editor.org/search For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk Requests for special distribution should be addressed to either the author of the RFC in question, or to rfc-editor@rfc-editor.org. Unless specifically noted otherwise on the RFC itself, all RFCs are for unlimited distribution. The RFC Editor Team Association Management Solutions, LLC From nobody Sun Aug 29 15:42:04 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 998493A1B95; Sun, 29 Aug 2021 15:42:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -9.598 X-Spam-Level: X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=JAn9T+2o; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=NRzYCfMj Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XTm8n_tCRT8D; Sun, 29 Aug 2021 15:41:55 -0700 (PDT) Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A0973A1B92; Sun, 29 Aug 2021 15:41:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=38003; q=dns/txt; s=iport; t=1630276915; x=1631486515; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=HHuscPpO+5G1xozOCcIV72am98DTwcuCtJUnkjOI4Zc=; b=JAn9T+2or564D4TvZda5bmstlI4WtwAdKuKwm/qtRRjK4gsLVik2Yl91 xeK0SkLoPjbHAYVnDXHmbenLjsfRgGKLpWFyyUJVA3WGYZBlkXbnt+CbC MSNbcL0CFQXVwj2JfFuIFNYN7k+nRh+G5Wbp+60uFZ+bP96UqdiKKCoMY U=; X-IPAS-Result: =?us-ascii?q?A0CcAgAuDCxhl5JdJa1aHAEBAQEBAQcBARIBAQQEAQGCG?= =?us-ascii?q?YEjMFF+WjcxhEeDSAOFOYgGlTyFEYJTA1QLAQEBDQEBNwoEAQGEbgIXghoCJ?= =?us-ascii?q?TgTAQIEAQEBAQMCAwEBAQEFAQEFAQEBAgEGBBQBAQEBAQEBAYEIhWgNhkMCA?= =?us-ascii?q?QMSER0BASsMAQ8CAQg4AQkCAgIwJQEBBAENJ4JPAYF+VwMvAQIMnXkBgToCi?= =?us-ascii?q?h96gTGBAYIIAQEGBASBOgIOQYJ/GII0AwaBOoJ/gnRTSAEBgm6DfCccgUlEg?= =?us-ascii?q?RUnDBCBZYEBPoJiAQECAYEkZoJqNoIuhW4tPgY+JgQNMwMOAjBLCkYJCwofF?= =?us-ascii?q?xOSAYNHiGWNRZIfCoMrikCDOpBiBSiDZYtmlzaWGIxCkzYphQcCBAIEBQIOA?= =?us-ascii?q?QEGgXgigVtwFWUBgj5QGQ+OIBmDWYUUhUp0AgE1AgYBCgEBAwmPQoJIAQ?= IronPort-PHdr: A9a23:DtyGqx3ErifHfNNzsmDPsVBlVkEcU/3cPhYYrJEgjuEGfqei+sHkO 0rSrbVogUTSVIrWo/RDl6LNsq/mVGBBhPTJsH0LfJFWERNQj8IQkl8gGMPDAkr+f7bmaiUgF 5FEU1lot3iwLUlSHpP4YFvf6n2/5DIfAFPxLw1wc+/0AYXVyc+w0rPaxg== IronPort-HdrOrdr: A9a23:jhIhT6CJHrwtgt3lHej1sseALOsnbusQ8zAXPh9KKCC9I/b3qy nxppsmPEfP+UkssHFJo6HmBEDyewKjyXcV2/hQAV7GZmnbUQSTXfpfBOfZsljd8mjFh5JgPM RbAutD4b/LfCJHZK/BiWHSebtNsbr3kpxAx92uskuFJjsaDZ2Imj0JcjpzZXcGPTWua6BJcK a0145inX6NaH4XZsO0Cj0uRO7YveDGk5rgfFovGwMnwBPmt0Lr1JfKVzyjmjsOWTJGxrkvtU LflRbi26mlu/anjjfBym7o6YhMkteJ8KoHOCXMsLlQFtzfsHfvWG1TYczagNnzmpD21L8eqq iKn/7nBbUp15qeRBDunfKn4XiQ7N9n0Q6T9bbfuwq/nSQ8LwhKVPaoQuliA0fkAgMbzaNBOO gg5RPri7NHSRzHhyjz/N7OSlVjkVe1u2MrlaoJg2VYSpZ2Us4ckWUzxjIeLH47JlO21GnnKp gZMOjMoPJNNV+KZXHQuWdihNSqQ3QoBx+DBkwPoNac3TRalG1wixJw/r1Qol4QsJYmD5VU7e XNNapl0LlIU88NdKp4QOMMW9G+BGDBSQ/FdGiSPVPkHqcaPG+lke+53JwloOWxPJAYxpo7n5 rMFFteqG4pYkrrTdaD2ZVamyq9C1lVnQ6dgv22wqIJ+4EUaICbRRFreWpe2vdI+c9vd/Ezc8 zDT65rPw== X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.84,362,1620691200"; d="scan'208,217";a="743279606" Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 Aug 2021 22:41:53 +0000 Received: from mail.cisco.com (xbe-rcd-003.cisco.com [173.37.102.18]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 17TMfq9J012308 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Sun, 29 Aug 2021 22:41:53 GMT Received: from xfe-aln-004.cisco.com (173.37.135.124) by xbe-rcd-003.cisco.com (173.37.102.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Sun, 29 Aug 2021 17:41:52 -0500 Received: from xfe-aln-005.cisco.com (173.37.135.125) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Sun, 29 Aug 2021 17:41:52 -0500 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Sun, 29 Aug 2021 17:41:52 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bMredC0NisaO4hA9c4unRBIHGdylXhs0Q1k/NMZQineb3fWr3QhZ+QKJfghMDp+Fm2UylLEcAjkAXsQbj4VLVYfYIK2wqCc5mLux3xcNF1m8U11I3szGgUY9/pTXsrT3XCSLTNX8Bm9rHfUCihvWlPgo2p6jiJCEtELDjHO5demjwO6RA40nBc67dVpfMMMFw338CkrdCeqS30eBCqfmmnTNPU/qHFMIaGjPuaAjO8Q7UdbqB21cPO6a5t3TO7EkTIkeYPxbR6zd2vRnr2U7uGvx5PmvZNlmu+pdB8dv+KrgdXYl8iFvjL/+cf9pk2N1mucLQcyuhZdTyJm9JzfCoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HHuscPpO+5G1xozOCcIV72am98DTwcuCtJUnkjOI4Zc=; b=gFHwCdXOjlPtjUB1ENylep6ECUnFa+k7KoWqITPnpmAkjrNc9yubi7V3N1NBLg+cP7y5rZkCbZDvoHrdGVCWimN1+sfX/zHD5DEblIN6BE+IbkbVL68mBlmZ4BFb6siWf6EGogWnPoGLin/Hq6NXGMlka91HiOW9MUicjcg8ajUEUOvbMrySu9MBDjFlEjmBjR87baT4F+VtZ9WBtijDhK1iwdTcorMLu67IwiB7k2zVKyECNkvzlcmFtwDWo1F4/ZsvR9OAVURcnBZJlJA1jgzb30KPQgSgXNLastg9S81Rm4Eoc4HWEznVkFqBLyFt3gsges908v4kug/ezoj57g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HHuscPpO+5G1xozOCcIV72am98DTwcuCtJUnkjOI4Zc=; b=NRzYCfMjtD7J4iePSn6bZr58280A8r7ykuu/DhmL9huYi0zRYAYoHpQNQUw4Exa78XfmBegR+M37vN4cttig0UFpCoMMlv2NrfImtub+P7ajQP2w4k9/hEkMrV11VH7DsGIyEoGL6/X9qNIW7KFCNTOnef0SivrEgxirH7KbO5Y= Received: from BYAPR11MB2726.namprd11.prod.outlook.com (52.135.223.19) by SJ0PR11MB4896.namprd11.prod.outlook.com (20.182.115.84) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.20; Sun, 29 Aug 2021 22:41:49 +0000 Received: from BYAPR11MB2726.namprd11.prod.outlook.com ([fe80::870:ae22:d043:5d97]) by BYAPR11MB2726.namprd11.prod.outlook.com ([fe80::870:ae22:d043:5d97%5]) with mapi id 15.20.4457.024; Sun, 29 Aug 2021 22:41:49 +0000 From: "Neeraj Malhotra (nmalhotr)" To: "Dikshit, Saumya" , "draft-ietf-bess-evpn-irb-extended-mobility@ietf.org" CC: "bess-chairs@ietf.org" , "bess@ietf.org" Thread-Topic: Few queries on draft-ietf-bess-evpn-irb-extended-mobility Thread-Index: AdeQ0SpvsCHKrZuwR5W3DmRfbwf3vQCZ47ngAmzp2gA= Date: Sun, 29 Aug 2021 22:41:49 +0000 Message-ID: <01846CF6-B536-4B4C-8594-F28F5C2C0800@cisco.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/10.10.1b.201012 authentication-results: hpe.com; dkim=none (message not signed) header.d=none;hpe.com; dmarc=none action=none header.from=cisco.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: cfce997c-9d88-49e2-a7f8-08d96b3e306e x-ms-traffictypediagnostic: SJ0PR11MB4896: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2726.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(346002)(396003)(136003)(376002)(39860400002)(9326002)(166002)(86362001)(316002)(296002)(36756003)(54906003)(66446008)(66476007)(66556008)(83380400001)(8676002)(110136005)(6486002)(2616005)(66946007)(6506007)(8936002)(26005)(966005)(4326008)(5660300002)(64756008)(33656002)(186003)(38070700005)(71200400001)(2906002)(38100700002)(122000001)(6512007)(76116006)(478600001)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?MUF2Y1ZmVTF4d1ZpNW5nTUEweG9hcGpmcHlCLzZYeE54eCtZSllnM01WMEtF?= =?utf-8?B?Z1NsV0hiWlErRVIvbTRBb29xRmR4MmhwVkV0NjYyNnU3R0Q4QVpXekUrWWN4?= =?utf-8?B?bkZBMktFSVlKeHpjZTBCbUtaYU1MRkk5U3g5cDhwcE8zVitaQXdFc0laVTBm?= =?utf-8?B?dzhUWlNJdjM5eXk2VnBLWkpFWEVBSTVIcjZ6SzhtNWxjb0h5T3J6TkZJb2Fn?= =?utf-8?B?ZG4zQ2xxbzNFREF4eTlQeThVK3JCSy9vVjN4alQ5d3U4QnJJbEtua1czSlFz?= =?utf-8?B?QmdFODBvYWlNTDVJbjNvVGhiMDdaMnF2TzBsYklqNVBlU29VS3dEaFh0WW5E?= =?utf-8?B?a3BCUjlyRkZWYy9CdkFMeVpaRU5RcXFvZk9MZWYvcCtxTVNGQUMzaElqMVlE?= =?utf-8?B?QmpRRncwbzIvekpEa0pUWkhGWkFBb3RYOVRpV05ZOGkwd09sRzVGRXpGU3VN?= =?utf-8?B?ZzN4OTZqR3U5S1RPTjQ1bytheUFORm41TG9pNWk3WU5xZDhFWTNEdURUK1Mv?= =?utf-8?B?eUVZbVFicHdoQWVlTlRUakVNSDRvM2xIbjBvOHNLL0lPZk9pNDZOMkdmdHVZ?= =?utf-8?B?L080ZlloSGZOSTdJYXluMlJjN2NiVzhoY3Z5bnVVUjMzMFIzMSs1bXhTSUJq?= =?utf-8?B?T01pZjk2SWRFREVPYlo1SmhRbWJVWjArTlZ4S0lRTk5HbDNkNHZxY0doTzN5?= =?utf-8?B?SlZDYU1leEdrdTdJd2hueU5NZmRJekhIVXlaOXBEcUp5U1lsUWErWXRYeTc1?= =?utf-8?B?Z1JvMHloTXhIL2ErdFc5MnNOT0Q3K0hnWVUwVnVxK2pYd3NpLzZFRCtQTWYy?= =?utf-8?B?cFQyM0c4a0dIV04wVXVjZkVhbmhmcktSTmpYSFRkc1NsaXZ0Z1MzNUxQK2Vx?= =?utf-8?B?VTQ5UlJFMHh4SUF4bi85ekdWWEJ5dWowWmFIbEo2WE9jeERPMm9EWHJsb3dq?= =?utf-8?B?ZlFjT1VUTWlYRVkxYU45Y2V4eVhibk5WMkZyYnBJRlRndzFPYkluaGJDYk1r?= =?utf-8?B?Zk1uOVFvVjlibjF1YTdNQU4xTDJmS2EyR3ZGQ3VKdUdWSTlwYkRoREN6cisx?= =?utf-8?B?cXB4MzVsMUM1cnE0MUUzWS82Ly9Yek5ydjJ2U29QdEY4WW1JK3FmQldENjNP?= =?utf-8?B?N1llcURrUGUvSlRDYWdzUUtlMloxVi9ENWtRUmJ4dTNZMmppa1dkNHVaT0M0?= =?utf-8?B?a2pUNVZ3YUY3R0EzNFV5ZDJmSmtCbXVVZVVvUDJHSk8wcWo1S3lUVjhsck5E?= =?utf-8?B?UWlUWCthaGFibktSNU9vVStQTmVtWGN4ZldJK3RTM1RvblEvcWV4RHRtazJp?= =?utf-8?B?ZjFmQXhTZFZUcHBKRlJIdE5oTDdvcWlXbmhzQVlaZEI3amkzQWhBTFdWRDNt?= =?utf-8?B?aTE0dzIzWFRkZFRLQ3laTlRPaGg3bGpSR1VCWGFPUjhUY29XZ29ZUXB1Mk9m?= =?utf-8?B?U21oT2xpajMrMDY5aDZ1aHYycGgvK1VWd1lyelRRL2VpR0ZCVzg2eHpiT25P?= =?utf-8?B?WjhxRDg3eTl2ZzM4ZTJ4ZXVkem5mOHg2Rm1RVDVYOHRFU0pRUS9SaUVhaU51?= =?utf-8?B?R3pOTG94U1NCTHJUN3YxcE5lZGJScFFkcEM2ZG94alI5N3JJYnJEc3MzTmFG?= =?utf-8?B?NmV2bXVQa2VGNzdCTzdXWUhqWXI3MFY3ak9uUFZIQkowSnRVbWQzUVBWVUJu?= =?utf-8?B?WDQyZGw1enRJTWUyTVhHZlJIMDJ4Y0VvZWJEeEM2enpiOUJ3QldPT1RpczVw?= =?utf-8?Q?V7Jz6ualxytlGtcclgQ25b8Nx27s+mfkqmxXn1M?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_01846CF6B5364B4C8594F28F5C2C0800ciscocom_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2726.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: cfce997c-9d88-49e2-a7f8-08d96b3e306e X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Aug 2021 22:41:49.3039 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: YfMDVyJgC/MI/98vgs6uEaF0aI3xVv8TXuvY8V0b6GRmLfxkg2lkVBPEo0FRYHR3DdIUUK5cYHe+A8sIOB6pTA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB4896 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.37.102.18, xbe-rcd-003.cisco.com X-Outbound-Node: rcdn-core-10.cisco.com Archived-At: Subject: Re: [bess] Few queries on draft-ietf-bess-evpn-irb-extended-mobility X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Aug 2021 22:42:01 -0000 --_000_01846CF6B5364B4C8594F28F5C2C0800ciscocom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 DQpIaSBTYXVteWEsDQoNCkFwb2xvZ2llcyBmb3IgdGhlIGRlbGF5LCBhbmQgbWFueSB0aGFua3Mg Zm9yIHNvbWUgZ29vZCBjb21tZW50cyBhbmQgcXVlc3Rpb25zLiBQbGVhc2Ugc2VlIGFuc3dlcnMg aW5saW5lOg0KDQpIZWxsbyBBdXRob3JzIG9mICBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0 ZW5kZWQtbW9iaWxpdHk6DQoNCkkgaGF2ZSBmb2xsb3dpbmcgcXVlcmllcyBhbmQgY29tbWVudHMg YWJvdXQgdGhpcyBkcmFmdCDigJxkcmFmdC1pZXRmLWJlc3MtZXZwbi1pbnRlci1zdWJuZXQtZm9y d2FyZGluZ+KAnS4NClBsZWFzZSBoZWxwIGNsYXJpZnkuDQoNCj4+Pj5TZWN0aW9uIGh0dHBzOi8v ZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4 dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4xDQoNCk1VU1QgYmUgYXQgbGVhc3QgZXF1YWwg dG8gY29ycmVzcG9uZGluZyBTWU5DIE1BQyBzZXF1ZW5jZSBudW1iZXINCiAgICAgIGlmIG9uZSBp cyBwcmVzZW50Lg0KQ2FuIHdlIGZvcm1hbGx5IGRlZmluZSB3aGF0IGEg4oCcU1lOQyBNQUMgc2Vx dWVuY2UgbnVtYmVy4oCdID8NCg0KW05NXTogc3VyZSwgd2lsbCBkZWZpbmUgaW4gdGhlIG5leHQg cmV2aXNpb24uIEl0IHJlZmVycyB0byBzZXF1ZW5jZSBudW1iZXIgcmVjZWl2ZWQgd2l0aCB0aGUg TUFDIFNZTkNlZCBmcm9tIGFub3RoZXIgUEUgc2hhcmluZyB0aGUgc2FtZSBFU0kuDQoNCj4+Pj5T ZWN0aW9uIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1i ZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zDQoNCuKAnE1BQyBN eCB3aXRoIGEgc2VxdWVuY2UgbnVtYmVyIHRoYXQgaXMgaGlnaGVyIHRoYW4gb3IgZXF1YWwgdG8N CiAgIHNlcXVlbmNlIG51bWJlciBhc3NpZ25lZCB0byBhIExPQ0FMIHJvdXRlIGZvciBNQUMgTXg6 DQogICBvICBQRSBNVVNUIHRyaWdnZXIgcHJvYmUgYW5kIGRlbGV0aW9uIHByb2NlZHVyZSBmb3Ig YWxsIExPQ0FMIElQcw0KICAgICAgYXNzb2NpYXRlZCB3aXRoIE1BQyBNeC4NCiAgIG8gIFBFIE1V U1QgdHJpZ2dlciBkZWxldGlvbiBwcm9jZWR1cmUgZm9yIExPQ0FMIE1BQyByb3V0ZSBmb3IgTXgu DQoNCuKAnQ0KQXMgcGVyIHJmYzc0MjMsIGlmIGVxdWFsIHNlcXVlbmNlIG51bWJlciBpcyByZWNl aXZlZCwgdGhlbiB0aGUgb25lIHB1Ymxpc2hlZCB3aXRoIGxvd2VyIHZ0ZXAtaXAgaXMgcmV0YWlu ZWQsIGFuZCB0aGUgb3RoZXIgb25lIGlzIHdpdGhkcmF3bi4NCldoaWxlIHRoaXMgc2VjdGlvbiB0 YWxrcyBhYm91dCBwcm9iaW5nIGl0IGFnYWluLg0KVGhpcyBzaG91bGQgYmUgY2FsbGVkIG91dCBp biB0aGUgSW50ZXJvcCBzZWN0aW9uIGFzIHdlbGwsIGZvciB0aGUgY28tZXhpc3RlbmNlIG9mIG9s ZCBydWxlIGFuZCBuZXdseSBkZWZpbmVkDQoNCltOTV06IHN1cmUsIHRoYXTigJlzIGEgZ29vZCBw b2ludC4gV2lsbCBjbGFyaWZ5IGluIHRoZSBuZXh0IHJldmlzaW9uIOKAkyBlc3NlbnRpYWxseSwg dGhlIHJ1bGUgaW4gUkZDIDc0MzIgc3RpbGwgbmVlZHMgdG8gYmUgYXBwbGllZCB0byBlcXVhbCBz ZXF1ZW5jZSBudW1iZXIgc2NlbmFyaW8sIGJ1dCBhIHByb2JlIG11c3QgYXMgd2VsbCBiZSBkb25l IGZvciBhbGwgYXNzb2NpYXRlZCBJUHMgdG8gaGFuZGxlIHRyYW5zaWVudCByYWNlIGNvbmRpdGlv bnMuIElmIGluZGVlZCB0aGUgaG9zdCBpcyBhdHRhY2hlZCB0byB0aGUgUEUgd2l0aCBsb3dlciBW VEVQIElQLCBhIHN1Y2Nlc3NmdWwgcHJvYmUgd2lsbCBmb3JjZSBhIHNlcXVlbmNlIG51bWJlciBp bmNyZW1lbnQgYW5kIHJlc29sdmUgdGhlIHJhY2UgT1IgbGVhZCB0byBkdXBsaWNhdGUgZGV0ZWN0 aW9uLg0KDQpRdW90aW5nIGZyb20gIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0 bWwvcmZjNzQzMiNzZWN0aW9uLTE1Og0KDQrigJxJZiB0d28gKG9yIG1vcmUpIFBFcyBhZHZlcnRp c2UgdGhlIHNhbWUgTUFDDQoNCiAgIGFkZHJlc3Mgd2l0aCB0aGUgc2FtZSBzZXF1ZW5jZSBudW1i ZXIgYnV0IGRpZmZlcmVudCBFdGhlcm5ldCBzZWdtZW50DQoNCiAgIGlkZW50aWZpZXJzLCBhIFBF IHRoYXQgcmVjZWl2ZXMgdGhlc2Ugcm91dGVzIHNlbGVjdHMgdGhlIHJvdXRlDQoNCiAgIGFkdmVy dGlzZWQgYnkgdGhlIFBFIHdpdGggdGhlIGxvd2VzdCBJUCBhZGRyZXNzIGFzIHRoZSBiZXN0IHJv dXRl4oCdDQoNCg0KPj4+PiBTZWN0aW9uIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9j L2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rp b24tOC42DQoNCuKAnCAgIGFuIGludGVyLW9wIHNjZW5hcmlvIHdpdGggYSBkaWZmZXJlbnQgaW1w bGVtZW50YXRpb24gY291bGQgYXJpc2UsDQoNCiAgIHdoZXJlIGEgUEUgaW1wbGVtZW50YXRpb24g bm9uLWNvbXBsaWFudCB3aXRoIHRoaXMgZG9jdW1lbnQgb3Igd2l0aA0KDQogICBSRkMgNzQzMjxo dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL3JmYzc0MzI+IGFzc2lnbnMgYW5k IGFkdmVydGlzZXMgaW5kZXBlbmRlbnQgc2VxdWVuY2UgbnVtYmVycyB0byBNQUMNCg0KICAgYW5k IE1BQytJUCByb3V0ZXPigJ0NCkhvdyBkbyB3ZSBleHBlY3QgdGhpcyBpbXBsZW1lbnRhdGlvbiB0 byBpbnRlci1vcCwgYXMgaXQgbWF5IGV4cGVjdCB0d28gZGlmZmVyZW50IE1BQy1vbmx5IGFuZCBN QUMtSVAgYWR2ZXJ0aXNlbWVudCBmcm9tIHJlbW90ZSBwZWVycyBhcyB3ZWxsLj8NCkNhbiB3ZSBw YXJhcGhyYXNlIHRoaXMgPw0KDQpbTk1dOiBjb3JyZWN0LCBmb3IgYSBzY2VuYXJpbyB3aGVyZSBu byBNQUMgcm91dGUgaXMgYWR2ZXJ0aXNlZCwgYSBub24tY29tcGxpYW50IGltcGxlbWVudGF0aW9u IG1heSBzZW5kIGRpZmZlcmVudCBzZXF1ZW5jZSBudW1iZXJzIGZvciBtdWx0aXBsZSBNQUMtSVBz IHdpdGggdGhlIHNhbWUgTUFDLiBIYW5kbGluZyBmb3Igc3VjaCBhIHNjZW5hcmlvIHNob3VsZCBi ZSBleHBsaWNpdGx5IGNhbGxlZCBvdXQgYXMgd2VsbC4gV2lsbCBhZGQgdG8gbmV4dCByZXZpc2lv bi4NCg0KDQo+Pj4+IFNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRt bC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04 LjgNCg0K4oCcRm9sbG93aW5nIGEgaG9zdCBtb3ZlIGZyb20gUEUxIHRvIFBFMiwgdGhlIGhvc3Qn cyBNQUMgaXMNCg0KICAgICAgZGlzY292ZXJlZCBhdCBQRTIgYXMgYSBsb2NhbCBNQUMgdmlhIGEg ZGF0YSBmcmFtZXMgcmVjZWl2ZWQgZnJvbQ0KDQogICAgICB0aGUgaG9zdC7igJ0NCg0KRG8gd2Ug bmVlZCB0byBjYWxsIG91dCB0aGUgbWlzY29uZmlndXJhdGlvbiBjYXNlLCB3aGVyZSBhIHByb2Jl IG1heSBsZWFkIHRvIERVUCByZXNwb25zZXMsDQoNCm9uZSBmcm9tIHRoZSAobG9jYWwgbGVhcm5p bmcpIGFjY2VzcyBzaWRlIGFuZCBvdGhlciBvbmUgYWNyb3NzIHRoZSBmYWJyaWMgKG92ZXJsYXkg dHVubmVsKS4NCg0KDQoNCltOTV06IEltcGxlbWVudGF0aW9uIGRvbuKAmXQgbm9ybWFsbHkgaGFu ZGxlIEFSUCBmcm9tIHRoZSBjb3JlIHNpZGUgdG8gcHJvdGVjdCBhZ2FpbnN0IHN1Y2ggbWlzLWNv bmZpZ3VyYXRpb25zLiBUaGlzIGlzIGFuIG9wdGlvbmFsIHNlY3Rpb24gdGhhdCBpbmNsdWRlcyBz dWdnZXN0aW9ucyBmb3IgYmV0dGVyIGNvbnZlcmdlbmNlLiBIZW5jZSwgd2FudCB0byByZWZyYWlu IGZyb20gYmVpbmcgdG9vIHByZXNjcmlwdGl2ZSBhYm91dCBob3cgbiBpbXBsZW1lbnRhdGlvbiBt YXkgY2hvb3NlIHRvIHByb3RlY3QgZnJvbSBzdWNoIG1pcy1jb25maWd1cmF0aW9ucy4NCg0KDQo+ Pj4+IFNlY3Rpb24gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1p ZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUjc2VjdGlvbi0xMC40LjENCg0K 4oCcdW5mcmVlemluZyB0aGUNCg0KICAgICAgcm91dGUgYXQgdGhlIEZST1pFTiBsb2NhdGlvbiB3 aWxsIHJlc3VsdCBpbiB0aGUgcm91dGUgYmVpbmcNCg0KICAgICAgYWR2ZXJ0aXNlZCB3aXRoIGEg aGlnaGVyIHNlcXVlbmNlIG51bWJlci7igJ0NCldoeSBhcmUgd2UgdHlpbmcgcHJvYmluZyB3aXRo IOKAnHVuZnJlZXppbmfigJ0gPyBGUk9aRU4gd2lsbCB0eXBpY2FsbHkgaW5kaWNhdGUgZHJvcHBp bmcgb2YgZmxvd3MuIFByb2JpbmcgY2FuIHN0aWxsIGdvIG9uIGluIHBhcmFsbGVsID8NCkNhbiB0 aGlzIGJlIGNhbGxlZCBvdXQgZXhwbGljaXRseS4NCg0KW05NXTogVGhlcmUgaXMgbm8gcHJvYmlu ZyByZXF1aXJlbWVudCBmb3IgdW5mcmVlemluZy4gVGhpcyBzZWN0aW9uIGlzIGp1c3QgZXhwbGFp bmluZywgaG93IHRoZSB1bmZyZWV6aW5nIHdpbGwgcmVzb2x2ZSB0aGUgc2NlbmFyaW8gZm9sbG93 aW5nIHJlbW92YWwgb2YgZHVwbGljYXRlIGhvc3QgZnJvbSBsb2NhdGlvbiBBLCByZWdhcmRsZXNz IG9mIHdoZXRoZXIgdGhlIGZyZWV6aW5nIGFuZCB1bmZyZWV6aW5nIGlzIGRvbmUgYXQgbG9jYXRp b24gQSBPUiBCIChzaW5jZSBkdXBsaWNhdGUgcHJvY2VkdXJlIGNvdWxkIGNhdXNlIGZyZWV6aW5n IHRvIGhhcHBlbiBhdCBhbnkgb2YgbG9jYXRpb24gQSBPUiBCKS4gSG9wZSwgdGhpcyBjbGFyaWZp ZXMuDQoNCj4+Pj4gU2VjdGlvbiAiIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0 bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24t NC4zLjEiIDoNCiIgW0lQNywgTTFdIGlzIGxlYXJudCBhcyBhIG5ldyByb3V0ZSBhdA0KICAgW1BF MywgUEU0XSBhbmQgYWR2ZXJ0aXNlZCB0byByZW1vdGUgUEVzIHdpdGggYSBzZXF1ZW5jZSBudW1i ZXIgb2YgMC4NCiAgIEFzIGEgcmVzdWx0LCBMMyByZWFjaGFiaWxpdHkgdG8gSVA3IHdvdWxkIGJl IGVzdGFibGlzaGVkIGFjcm9zcyB0aGUNCiAgIG92ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0 eSBwcm9jZWR1cmUgZm9yIE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhcw0KICAgYSByZXN1bHQgb2Yg dGhpcyBNQUMtSVAgcm91dGUgYWR2ZXJ0aXNlbWVudCINCg0KSWYgYSBob3N0IGlzIG1vdmVkIHdp dGggdGhlIHNhbWUgTUFDLCB0aGUgZm9sbG93aW5nIGlzIHN0aWxsIGJlaW5nIGZvbGxvd2luZyBp biBjdXJyZW50IGltcGxlbWVudGF0aW9uKHMpOg0KLSBFaXRoZXIgIk1BQy1vbmx5LXJvdXRlIiBv ciAiTUFDLUlQLXJvdXRlIiBhZHZlcnRpc2VtZW50LCB0aGUgc2VxdWVuY2UgbnVtYmVyIGlzIGJ1 bXBlZCBpbiBib3RoIGNhc2VzDQotIE9uIHJlY2VpdmluZyBzaWRlLA0KICAgICAgLSAgdGhlIHNl cXVlbmNlLW51bWJlciBpcyBwaWNrZWQgdXAgZnJvbSAiTUFDLW9ubHktcm91dGUiIG9yICJNQUMt SVAtcm91dGUiIGFuZCBhcHBsaWVkIHRvIE1BQyBsZWFybmluZ3MNCiAgICAgIC0gdGhlIGJ1bXBl ZCB1cCBzZXF1ZW5jZSBudW1iZXIgbGVhZHMgYSB3aXRoZHJhdyBvZiAiTUFDLW9ubHkiIG9yICJN QUMtSVAtcm91dGUiIGZyb20gdGhlIGluZmVyaW9yIChlYXJsaWVyKSBwdWJsaXNoZXINCg0KS2lu ZGx5IGhlbHAgZXhwbGFpbiwgaWYgdGhlIHRleHQgbWVudGlvbmVkIGluIOKAnHNlY3Rpb24gNC4z LjHigJ0gaXMgY3JlYXRpbmcgc29tZSBkb3VidHMgcmVnYXJkaW5nIHRoZSB3YXkgdGhpbmdzIG9w ZXJhdGUgd2l0aCBjdXJyZW50IHN0YW5kYXJkcy4NClRob3VnaCBJIGRlZmluaXRlbHkgYmVsaWV2 ZSB0aGF0IHRoaXMgbGl0ZXJhdHVyZSBkb2VzIGF3YXkgd2l0aCBsb3Qgb2YgZXhpc3RpbmcgYW1i aWd1aXRpZXMuDQpJIHRoaW5rIHdlIG5lZWQgdG8gcGFyYXBocmFzZSB0aGlzIHNlY3Rpb24gYXRs ZWFzdC4NCg0KW05NXTogSWYgdGhlIE1BQy1JUCBmb2xsb3dpbmcgYSBob3N0IG1vdmUgaXMgbGVh cm50IHdpdGggYSBkaWZmZXJlbnQgSVAsIHRoaXMgZHJhZnQgZXhwbGljaXRseSBjYWxscyBvdXQg dGhlIHByb2NlZHVyZSB0byBhc3NvY2lhdGUgc2VxdWVuY2UgbnVtYmVyIHdpdGggdGhlIE1BQyAr IGluaGVyaXRhbmNlIHRvIGVuc3VyZSB0aGF0IHNlcXVlbmNlIG51bWJlciBpcyBpbmRlZWQgaW5j cmVtZW50ZWQgZXZlbiB3aXRoIGEgZGlmZmVyZW50IElQLiBJZiBhbiBpbXBsZW1lbnRhdGlvbiBp cyBhbHJlYWR5IGRvaW5nIHRoaXMsIHRoZW4gd2UgYXJlIGdvb2QuIFNvbWUgZWFybHkgaW1wbGVt ZW50YXRpb25zIGFzc2lnbmVkIGluZGVwZW5kZW50IHNlcXVlbmNlIG51bWJlcnMgdG8gZWFjaCBN QUMrSVAga2V5IHRoYXQgaGFkIHByb2JsZW1zIGluIElQIGNoYW5nZSBzY2VuYXJpb3MuDQoNClRo YW5rcywNCk5lZXJhag0KDQoNCg== --_000_01846CF6B5364B4C8594F28F5C2C0800ciscocom_ Content-Type: text/html; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2 IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3Jt YWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGluOw0KCW1hcmdpbi1i b3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBO ZXcgUm9tYW4iLHNlcmlmO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxl LXByaW9yaXR5Ojk5Ow0KCWNvbG9yOmJsdWU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9 DQphOnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9y aXR5Ojk5Ow0KCWNvbG9yOnB1cnBsZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCnBy ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IkhUTUwgUHJlZm9y bWF0dGVkIENoYXIiOw0KCW1hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZv bnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6IkNvdXJpZXIgTmV3Ijt9DQpwLm1zb25vcm1h bDAsIGxpLm1zb25vcm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25v cm1hbDsNCgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1z by1tYXJnaW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6 MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCnNwYW4uSFRNTFBy ZWZvcm1hdHRlZENoYXINCgl7bXNvLXN0eWxlLW5hbWU6IkhUTUwgUHJlZm9ybWF0dGVkIENoYXIi Ow0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUtbGluazoiSFRNTCBQcmVmb3Jt YXR0ZWQiOw0KCWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0KcC5lbWFpbHF1b3RlLCBsaS5l bWFpbHF1b3RlLCBkaXYuZW1haWxxdW90ZQ0KCXttc28tc3R5bGUtbmFtZTplbWFpbHF1b3RlOw0K CW1zby1tYXJnaW4tdG9wLWFsdDphdXRvOw0KCW1hcmdpbi1yaWdodDowaW47DQoJbXNvLW1hcmdp bi1ib3R0b20tYWx0OmF1dG87DQoJbWFyZ2luLWxlZnQ6MS4wcHQ7DQoJZm9udC1zaXplOjEyLjBw dDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9DQpzcGFuLkVtYWlsU3R5 bGUyMQ0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIs c2Fucy1zZXJpZjsNCgljb2xvcjojMUY0OTdEO30NCnNwYW4uZ3JleQ0KCXttc28tc3R5bGUtbmFt ZTpncmV5O30NCnNwYW4uRW1haWxTdHlsZTIzDQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0K CWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0Kc3Bh bi5FbWFpbFN0eWxlMjQNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6 IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVtYWlsU3R5bGUy NQ0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJy aSIsc2Fucy1zZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21z by1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29y ZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBp biAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwv c3R5bGU+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1 cnBsZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkhpIFNhdW15YSw8bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+Jm5ic3A7PC9v OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+QXBv bG9naWVzIGZvciB0aGUgZGVsYXksIGFuZCBtYW55IHRoYW5rcyBmb3Igc29tZSBnb29kIGNvbW1l bnRzIGFuZCBxdWVzdGlvbnMuIFBsZWFzZSBzZWUgYW5zd2VycyBpbmxpbmU6PG86cD48L286cD48 L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SGVsbG8g QXV0aG9ycyBvZiZuYnNwOyBkcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxp dHk6PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5JIGhhdmUgZm9s bG93aW5nIHF1ZXJpZXMgYW5kIGNvbW1lbnRzIGFib3V0IHRoaXMgZHJhZnQg4oCcZHJhZnQtaWV0 Zi1iZXNzLWV2cG4taW50ZXItc3VibmV0LWZvcndhcmRpbmfigJ0uPC9zcGFuPjxvOnA+PC9vOnA+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0Qi PlBsZWFzZSBoZWxwIGNsYXJpZnkuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpw PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xv cjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7U2VjdGlvbg0KPGEgaHJlZj0iaHR0cHM6Ly9kYXRh dHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5k ZWQtbW9iaWxpdHktMDUjc2VjdGlvbi04LjEiPg0KaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9y Zy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1pcmItZXh0ZW5kZWQtbW9iaWxpdHktMDUj c2VjdGlvbi04LjE8L2E+PC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjxwcmU+PGk+PHNwYW4g c3R5bGU9ImNvbG9yOmJsYWNrIj5NVVNUIGJlIGF0IGxlYXN0IGVxdWFsIHRvIGNvcnJlc3BvbmRp bmcgU1lOQyBNQUMgc2VxdWVuY2UgbnVtYmVyPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyBpZiBvbmUgaXMgcHJlc2VudC48L3NwYW4+PC9pPjxvOnA+PC9v OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5 N0QiPkNhbiB3ZSBmb3JtYWxseSBkZWZpbmUgd2hhdCBhIOKAnFNZTkMgTUFDIHNlcXVlbmNlIG51 bWJlcuKAnSA/PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD48L286cD48L3NwYW4+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwv c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPltOTV06IHN1 cmUsIHdpbGwgZGVmaW5lIGluIHRoZSBuZXh0IHJldmlzaW9uLiBJdCByZWZlcnMgdG8gc2VxdWVu Y2UgbnVtYmVyIHJlY2VpdmVkIHdpdGggdGhlIE1BQyBTWU5DZWQgZnJvbSBhbm90aGVyIFBFIHNo YXJpbmcgdGhlIHNhbWUgRVNJLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48 L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6 IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0O1NlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tOC4zIj4NCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv ZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3Nl Y3Rpb24tOC4zPC9hPjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNr Ij5NQUMgTXggd2l0aCBhIHNlcXVlbmNlIG51bWJlciB0aGF0IGlzIGhpZ2hlciB0aGFuIDxzcGFu IHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdzttc28taGlnaGxpZ2h0OnllbGxvdyI+b3IgZXF1YWw8 L3NwYW4+IHRvPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291 cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBzZXF1ZW5jZSBudW1iZXIg YXNzaWduZWQgdG8gYSBMT0NBTCByb3V0ZSBmb3IgTUFDIE14Ojwvc3Bhbj48L2k+PG86cD48L286 cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw LjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+Jm5i c3A7Jm5ic3A7IG8mbmJzcDsgUEUgTVVTVCB0cmlnZ2VyDQo8c3BhbiBzdHlsZT0iYmFja2dyb3Vu ZDp5ZWxsb3c7bXNvLWhpZ2hsaWdodDp5ZWxsb3ciPnByb2JlIGFuZCBkZWxldGlvbiBwcm9jZWR1 cmU8L3NwYW4+IGZvciBhbGwgTE9DQUwgSVBzPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsgYXNzb2NpYXRlZCB3aXRoIE1BQyBNeC48L3NwYW4+PC9pPjxvOnA+ PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGk+PHNwYW4gc3R5bGU9ImZvbnQtc2l6 ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2si PiZuYnNwOyZuYnNwOyBvJm5ic3A7IFBFIE1VU1QgdHJpZ2dlcg0KPHNwYW4gc3R5bGU9ImJhY2tn cm91bmQ6eWVsbG93O21zby1oaWdobGlnaHQ6eWVsbG93Ij5kZWxldGlvbiBwcm9jZWR1cmUgZm9y IExPQ0FMIE1BQzwvc3Bhbj4gcm91dGUgZm9yIE14Ljwvc3Bhbj48L2k+PG86cD48L286cD48L3A+ DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+4oCdPC9zcGFuPjwvaT48bzpwPjwv bzpwPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMx RjQ5N0QiPkFzIHBlciByZmM3NDIzLCBpZiBlcXVhbCBzZXF1ZW5jZSBudW1iZXIgaXMgcmVjZWl2 ZWQsIHRoZW4gdGhlIG9uZSBwdWJsaXNoZWQgd2l0aCBsb3dlciB2dGVwLWlwIGlzIHJldGFpbmVk LCBhbmQgdGhlIG90aGVyIG9uZSBpcyB3aXRoZHJhd24uPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPldoaWxl IHRoaXMgc2VjdGlvbiB0YWxrcyBhYm91dCBwcm9iaW5nIGl0IGFnYWluLjwvc3Bhbj48bzpwPjwv bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0 OTdEIj5UaGlzIHNob3VsZCBiZSBjYWxsZWQgb3V0IGluIHRoZSBJbnRlcm9wIHNlY3Rpb24gYXMg d2VsbCwgZm9yIHRoZSBjby1leGlzdGVuY2Ugb2Ygb2xkIHJ1bGUgYW5kIG5ld2x5IGRlZmluZWQN Cjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5bTk1dOiBzdXJlLCB0aGF0 4oCZcyBhIGdvb2QgcG9pbnQuIFdpbGwgY2xhcmlmeSBpbiB0aGUgbmV4dCByZXZpc2lvbiDigJMg ZXNzZW50aWFsbHksIHRoZSBydWxlIGluIFJGQyA3NDMyIHN0aWxsIG5lZWRzIHRvIGJlIGFwcGxp ZWQgdG8gZXF1YWwgc2VxdWVuY2UgbnVtYmVyIHNjZW5hcmlvLCBidXQgYSBwcm9iZQ0KIG11c3Qg YXMgd2VsbCBiZSBkb25lIGZvciBhbGwgYXNzb2NpYXRlZCBJUHMgdG8gaGFuZGxlIHRyYW5zaWVu dCByYWNlIGNvbmRpdGlvbnMuIElmIGluZGVlZCB0aGUgaG9zdCBpcyBhdHRhY2hlZCB0byB0aGUg UEUgd2l0aCBsb3dlciBWVEVQIElQLCBhIHN1Y2Nlc3NmdWwgcHJvYmUgd2lsbCBmb3JjZSBhIHNl cXVlbmNlIG51bWJlciBpbmNyZW1lbnQgYW5kIHJlc29sdmUgdGhlIHJhY2UgT1IgbGVhZCB0byBk dXBsaWNhdGUgZGV0ZWN0aW9uLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48 L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFG NDk3RCI+UXVvdGluZyBmcm9tJm5ic3A7DQo8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmll dGYub3JnL2RvYy9odG1sL3JmYzc0MzIjc2VjdGlvbi0xNSI+aHR0cHM6Ly9kYXRhdHJhY2tlci5p ZXRmLm9yZy9kb2MvaHRtbC9yZmM3NDMyI3NlY3Rpb24tMTU8L2E+Ojwvc3Bhbj48bzpwPjwvbzpw PjwvcD4NCjxwcmU+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj7igJxJZiB0d28gKG9yIG1vcmUp IFBFcyBhZHZlcnRpc2UgdGhlIHNhbWUgTUFDPC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJl PjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGFkZHJlc3Mgd2l0aCB0aGUg c2FtZSBzZXF1ZW5jZSBudW1iZXIgYnV0IGRpZmZlcmVudCBFdGhlcm5ldCBzZWdtZW50PC9zcGFu PjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7 Jm5ic3A7IGlkZW50aWZpZXJzLCBhIFBFIHRoYXQgcmVjZWl2ZXMgdGhlc2Ugcm91dGVzIHNlbGVj dHMgdGhlIHJvdXRlPC9zcGFuPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJj b2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IGFkdmVydGlzZWQgYnkgdGhlIFBFIHdpdGggdGhlIDxz cGFuIHN0eWxlPSJiYWNrZ3JvdW5kOnllbGxvdzttc28taGlnaGxpZ2h0OnllbGxvdyI+bG93ZXN0 IElQIGFkZHJlc3MgYXMgdGhlIGJlc3Qgcm91dGU8L3NwYW4+4oCdPC9zcGFuPjxvOnA+PC9vOnA+ PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3 RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4m Z3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0 Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5 LTA1I3NlY3Rpb24tOC42Ij4NCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwv ZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC42 PC9hPjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtj b2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsm bmJzcDsgYW4gaW50ZXItb3Agc2NlbmFyaW8gd2l0aCBhIGRpZmZlcmVudCBpbXBsZW1lbnRhdGlv biBjb3VsZCBhcmlzZSw8L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wcmU+DQo8cHJlPjxpPjxzcGFu IHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IHdoZXJlIGEgUEUgaW1wbGVtZW50YXRp b24gbm9uLWNvbXBsaWFudCB3aXRoIHRoaXMgZG9jdW1lbnQgb3Igd2l0aDwvc3Bhbj48L2k+PG86 cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsm bmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9yZmM3 NDMyIj5SRkMgNzQzMjwvYT4gYXNzaWducyBhbmQgYWR2ZXJ0aXNlcyBpbmRlcGVuZGVudCBzZXF1 ZW5jZSBudW1iZXJzIHRvIE1BQzwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+ PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsgYW5kIE1BQytJUCByb3V0ZXPi gJ08L3NwYW4+PC9pPjxvOnA+PC9vOnA+PC9wcmU+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SG93IGRvIHdlIGV4cGVjdCB0aGlzIGltcGxlbWVu dGF0aW9uIHRvIGludGVyLW9wLCBhcyBpdCBtYXkgZXhwZWN0IHR3byBkaWZmZXJlbnQgTUFDLW9u bHkgYW5kIE1BQy1JUCBhZHZlcnRpc2VtZW50IGZyb20gcmVtb3RlIHBlZXJzIGFzIHdlbGwuPzwv c3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJp Zjtjb2xvcjojMUY0OTdEIj5DYW4gd2UgcGFyYXBocmFzZSB0aGlzID88L3NwYW4+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5z LXNlcmlmIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZiI+W05NXTogY29ycmVjdCwgZm9yIGEgc2NlbmFyaW8gd2hl cmUgbm8gTUFDIHJvdXRlIGlzIGFkdmVydGlzZWQsIGEgbm9uLWNvbXBsaWFudCBpbXBsZW1lbnRh dGlvbiBtYXkgc2VuZCBkaWZmZXJlbnQgc2VxdWVuY2UgbnVtYmVycyBmb3IgbXVsdGlwbGUgTUFD LUlQcyB3aXRoIHRoZSBzYW1lIE1BQy4gSGFuZGxpbmcNCiBmb3Igc3VjaCBhIHNjZW5hcmlvIHNo b3VsZCBiZSBleHBsaWNpdGx5IGNhbGxlZCBvdXQgYXMgd2VsbC4gV2lsbCBhZGQgdG8gbmV4dCBy ZXZpc2lvbi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7 LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNw Ozwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu cy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0OyZndDsmZ3Q7IFNlY3Rpb24NCjxhIGhyZWY9 Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2 cG4taXJiLWV4dGVuZGVkLW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44Ij4NCmh0dHBzOi8vZGF0YXRy YWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4taXJiLWV4dGVuZGVk LW1vYmlsaXR5LTA1I3NlY3Rpb24tOC44PC9hPjwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8 cHJlPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj7igJw8L3NwYW4+PHNwYW4gc3R5 bGU9ImNvbG9yOmJsYWNrIj5Gb2xsb3dpbmcgYSBob3N0IG1vdmUgZnJvbSBQRTEgdG8gUEUyLCB0 aGUgaG9zdCdzIE1BQyBpczwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNw YW4gc3R5bGU9ImNvbG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgZGlz Y292ZXJlZCBhdCBQRTIgYXMgYSBsb2NhbCBNQUMgdmlhIGEgZGF0YSBmcmFtZXMgcmVjZWl2ZWQg ZnJvbTwvc3Bhbj48L2k+PG86cD48L286cD48L3ByZT4NCjxwcmU+PGk+PHNwYW4gc3R5bGU9ImNv bG9yOmJsYWNrIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgdGhlIGhvc3Qu4oCdPC9z cGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHByZT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6Ymxh Y2siPkRvIHdlIG5lZWQgdG8gY2FsbCBvdXQgdGhlIG1pc2NvbmZpZ3VyYXRpb24gY2FzZSwgd2hl cmUgYSBwcm9iZSBtYXkgbGVhZCB0byBEVVAgcmVzcG9uc2VzLCA8L3NwYW4+PG86cD48L286cD48 L3ByZT4NCjxwcmU+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOmJsYWNrIj5vbmUgZnJvbSB0aGUgKGxv Y2FsIGxlYXJuaW5nKSBhY2Nlc3Mgc2lkZSBhbmQgb3RoZXIgb25lIGFjcm9zcyB0aGUgZmFicmlj IChvdmVybGF5IHR1bm5lbCkuPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD48L286cD48L3Nw YW4+PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+ PC9wcmU+DQo8cHJlPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+W05NXTogSW1wbGVtZW50YXRpb24gZG9u4oCZ dCBub3JtYWxseSBoYW5kbGUgQVJQIGZyb20gdGhlIGNvcmUgc2lkZSB0byBwcm90ZWN0IGFnYWlu c3Qgc3VjaCBtaXMtY29uZmlndXJhdGlvbnMuIFRoaXMgaXMgYW4gb3B0aW9uYWwgc2VjdGlvbiB0 aGF0IGluY2x1ZGVzIHN1Z2dlc3Rpb25zIGZvciBiZXR0ZXIgY29udmVyZ2VuY2UuIEhlbmNlLCB3 YW50IHRvIHJlZnJhaW4gZnJvbSBiZWluZyB0b28gcHJlc2NyaXB0aXZlIGFib3V0IGhvdyBuIGlt cGxlbWVudGF0aW9uIG1heSBjaG9vc2UgdG8gcHJvdGVjdCBmcm9tIHN1Y2ggbWlzLWNvbmZpZ3Vy YXRpb25zLjxvOnA+PC9vOnA+PC9zcGFuPjwvcHJlPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90 OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJz cDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jmd0OyZndDsmZ3Q7Jmd0OyBTZWN0aW9uDQo8YSBocmVm PSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1l dnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTEwLjQuMSI+DQpodHRwczovL2Rh dGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRl bmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTEwLjQuMTwvYT48L3NwYW4+PC9pPjxvOnA+PC9vOnA+ PC9wPg0KPHByZT48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom cXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+4oCcPC9zcGFuPjxz cGFuIHN0eWxlPSJjb2xvcjpibGFjayI+dW5mcmVlemluZyB0aGU8L3NwYW4+PC9pPjxvOnA+PC9v OnA+PC9wcmU+DQo8cHJlPjxpPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7IHJvdXRlIGF0IHRoZSBGUk9aRU4gbG9jYXRpb24gd2lsbCByZXN1 bHQgaW4gdGhlIHJvdXRlIGJlaW5nPC9zcGFuPjwvaT48bzpwPjwvbzpwPjwvcHJlPg0KPHByZT48 aT48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyBhZHZlcnRpc2VkIHdpdGggYSBoaWdoZXIgc2VxdWVuY2UgbnVtYmVyLuKAnTwvc3Bhbj48L2k+ PG86cD48L286cD48L3ByZT4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtj b2xvcjojMUY0OTdEIj5XaHkgYXJlIHdlIHR5aW5nIHByb2Jpbmcgd2l0aCDigJx1bmZyZWV6aW5n 4oCdID8gRlJPWkVOIHdpbGwgdHlwaWNhbGx5IGluZGljYXRlIGRyb3BwaW5nIG9mIGZsb3dzLiBQ cm9iaW5nIGNhbiBzdGlsbCBnbyBvbiBpbiBwYXJhbGxlbCA/PC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkNh biB0aGlzIGJlIGNhbGxlZCBvdXQgZXhwbGljaXRseS48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy aWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssc2Fucy1zZXJpZiI+W05NXTogVGhlcmUgaXMgbm8gcHJvYmluZyByZXF1aXJlbWVudCBmb3Ig dW5mcmVlemluZy4gVGhpcyBzZWN0aW9uIGlzIGp1c3QgZXhwbGFpbmluZywgaG93IHRoZSB1bmZy ZWV6aW5nIHdpbGwgcmVzb2x2ZSB0aGUgc2NlbmFyaW8gZm9sbG93aW5nIHJlbW92YWwgb2YgZHVw bGljYXRlIGhvc3QgZnJvbQ0KIGxvY2F0aW9uIEEsIHJlZ2FyZGxlc3Mgb2Ygd2hldGhlciB0aGUg ZnJlZXppbmcgYW5kIHVuZnJlZXppbmcgaXMgZG9uZSBhdCBsb2NhdGlvbiBBIE9SIEIgKHNpbmNl IGR1cGxpY2F0ZSBwcm9jZWR1cmUgY291bGQgY2F1c2UgZnJlZXppbmcgdG8gaGFwcGVuIGF0IGFu eSBvZiBsb2NhdGlvbiBBIE9SIEIpLiBIb3BlLCB0aGlzIGNsYXJpZmllcy48bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj4mZ3Q7Jmd0 OyZndDsmZ3Q7IFM8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5lY3Rpb24gJnF1b3Q7DQo8YSBocmVm PSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtYmVzcy1l dnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4xIj4NCjxzcGFuIHN0eWxl PSJjb2xvcjojMDU2M0MxIj5odHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2Ry YWZ0LWlldGYtYmVzcy1ldnBuLWlyYi1leHRlbmRlZC1tb2JpbGl0eS0wNSNzZWN0aW9uLTQuMy4x PC9zcGFuPjwvYT4mcXVvdDsgOjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90 O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mcXVvdDsgW0lQNywgTTFdIGlzIGxlYXJudCBhcyBhIG5ldyBy b3V0ZSBhdDwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVy IE5ldyZxdW90OyI+Jm5ic3A7Jm5ic3A7IFtQRTMsIFBFNF0gYW5kIGFkdmVydGlzZWQgdG8gcmVt b3RlIFBFcyB3aXRoIGEgc2VxdWVuY2UgbnVtYmVyIG9mIDAuPC9zcGFuPjwvaT48bzpwPjwvbzpw PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mbmJzcDsmbmJzcDsgQXMg YSByZXN1bHQsIEwzIHJlYWNoYWJpbGl0eSB0byBJUDcgd291bGQgYmUgZXN0YWJsaXNoZWQgYWNy b3NzIHRoZTwvc3Bhbj48L2k+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVy IE5ldyZxdW90OyI+Jm5ic3A7Jm5ic3A7IG92ZXJsYXksIGhvd2V2ZXIsIE1BQyBtb2JpbGl0eSBw cm9jZWR1cmUgZm9yIE1BQzEgd2lsbCBub3QgdHJpZ2dlciBhczwvc3Bhbj48L2k+PG86cD48L286 cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48aT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw LjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+Jm5ic3A7Jm5ic3A7IGEg cmVzdWx0IG9mIHRoaXMgTUFDLUlQIHJvdXRlIGFkdmVydGlzZW1lbnQmcXVvdDs8L3NwYW4+PC9p PjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4m bmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNh bnMtc2VyaWYiPklmIGEgaG9zdCBpcyBtb3ZlZCB3aXRoIHRoZSBzYW1lIE1BQywgdGhlIGZvbGxv d2luZyBpcyBzdGlsbCBiZWluZyBmb2xsb3dpbmcgaW4gY3VycmVudCBpbXBsZW1lbnRhdGlvbihz KTo8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt c2VyaWYiPi0gRWl0aGVyICZxdW90O01BQy1vbmx5LXJvdXRlJnF1b3Q7IG9yICZxdW90O01BQy1J UC1yb3V0ZSZxdW90OyBhZHZlcnRpc2VtZW50LCB0aGUgc2VxdWVuY2UgbnVtYmVyIGlzIGJ1bXBl ZCBpbiBib3RoIGNhc2VzPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy aSZxdW90OyxzYW5zLXNlcmlmIj4tIE9uIHJlY2VpdmluZyBzaWRlLA0KPC9zcGFuPjxvOnA+PC9v OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsgLSZuYnNwOyB0aGUgc2VxdWVuY2UtbnVtYmVyIGlzIHBpY2tl ZCB1cCBmcm9tICZxdW90O01BQy1vbmx5LXJvdXRlJnF1b3Q7IG9yICZxdW90O01BQy1JUC1yb3V0 ZSZxdW90OyBhbmQgYXBwbGllZCB0byBNQUMgbGVhcm5pbmdzPC9zcGFuPjxvOnA+PC9vOnA+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsgLSB0aGUgYnVtcGVkIHVwIHNlcXVlbmNlIG51bWJlciBsZWFkcyBhIHdp dGhkcmF3IG9mICZxdW90O01BQy1vbmx5JnF1b3Q7IG9yICZxdW90O01BQy1JUC1yb3V0ZSZxdW90 OyBmcm9tIHRoZSBpbmZlcmlvciAoZWFybGllcikgcHVibGlzaGVyPC9zcGFuPjxvOnA+PC9vOnA+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8L3NwYW4+ PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPktp bmRseSBoZWxwIGV4cGxhaW4sIGlmIHRoZSB0ZXh0IG1lbnRpb25lZCBpbiDigJxzZWN0aW9uIDQu My4x4oCdIGlzIGNyZWF0aW5nIHNvbWUgZG91YnRzIHJlZ2FyZGluZyB0aGUgd2F5IHRoaW5ncyBv cGVyYXRlIHdpdGggY3VycmVudCBzdGFuZGFyZHMuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5UaG91Z2ggSSBkZWZpbml0ZWx5IGJl bGlldmUgdGhhdCB0aGlzIGxpdGVyYXR1cmUgZG9lcyBhd2F5IHdpdGggbG90IG9mIGV4aXN0aW5n IGFtYmlndWl0aWVzLjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm cXVvdDssc2Fucy1zZXJpZiI+SSB0aGluayB3ZSBuZWVkIHRvIHBhcmFwaHJhc2UgdGhpcyBzZWN0 aW9uIGF0bGVhc3QuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx dW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPltOTV06IElmIHRoZSBNQUMtSVAgZm9sbG93aW5n IGEgaG9zdCBtb3ZlIGlzIGxlYXJudCB3aXRoIGEgZGlmZmVyZW50IElQLCB0aGlzIGRyYWZ0IGV4 cGxpY2l0bHkgY2FsbHMgb3V0IHRoZSBwcm9jZWR1cmUgdG8gYXNzb2NpYXRlIHNlcXVlbmNlIG51 bWJlciB3aXRoIHRoZSBNQUMgKyBpbmhlcml0YW5jZQ0KIHRvIGVuc3VyZSB0aGF0IHNlcXVlbmNl IG51bWJlciBpcyBpbmRlZWQgaW5jcmVtZW50ZWQgZXZlbiB3aXRoIGEgZGlmZmVyZW50IElQLiBJ ZiBhbiBpbXBsZW1lbnRhdGlvbiBpcyBhbHJlYWR5IGRvaW5nIHRoaXMsIHRoZW4gd2UgYXJlIGdv b2QuIFNvbWUgZWFybHkgaW1wbGVtZW50YXRpb25zIGFzc2lnbmVkIGluZGVwZW5kZW50IHNlcXVl bmNlIG51bWJlcnMgdG8gZWFjaCBNQUMrSVAga2V5IHRoYXQgaGFkIHByb2JsZW1zIGluIElQIGNo YW5nZQ0KIHNjZW5hcmlvcy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+VGhhbmtzLDxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+TmVlcmFqJm5ic3A7 PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNl cmlmIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_01846CF6B5364B4C8594F28F5C2C0800ciscocom_-- From nobody Sun Aug 29 23:06:05 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAB113A1486 for ; Sun, 29 Aug 2021 23:06:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DGLsL5dDpY_q for ; Sun, 29 Aug 2021 23:05:56 -0700 (PDT) Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 469C73A1485 for ; Sun, 29 Aug 2021 23:05:55 -0700 (PDT) Received: by rfc-editor.org (Postfix, from userid 30) id 48DC4F406D6; Sun, 29 Aug 2021 23:05:36 -0700 (PDT) To: rfc-editor@rfc-editor.org X-PHP-Originating-Script: 1005:errata_mail_lib.php From: RFC Errata System Cc: og.r4@protonmail.com, adrian@olddog.co.uk, jdrake@juniper.net, erosen52@gmail.com, keyur@arrcus.com, luay.jalil@verizon.com, bess@ietf.org Content-Type: text/plain; charset=UTF-8 Message-Id: <20210830060536.48DC4F406D6@rfc-editor.org> Date: Sun, 29 Aug 2021 23:05:36 -0700 (PDT) Archived-At: Subject: [bess] [Editorial Errata Reported] RFC9125 (6668) X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Aug 2021 06:06:04 -0000 The following errata report has been submitted for RFC9125, "Gateway Auto-Discovery and Route Advertisement for Site Interconnection Using Segment Routing". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid6668 -------------------------------------- Type: Editorial Reported by: OGR4 Section: 9125 Original Text ------------- Internet Engineering Task Force (IETF) A. Farrel Request for Comments: 9125 Old Dog Consulting Category: Standards Track J. Drake ISSN: 2070-1721 E. Rosen Juniper Networks K. Patel Arrcus, Inc. L. Jalil Verizon August 2021 Gateway Auto-Discovery and Route Advertisement for Site Interconnection Using Segment Routing Abstract Data centers are attached to the Internet or a backbone network by gateway routers. One data center typically has more than one gateway for commercial, load-balancing, and resiliency reasons. Other sites, such as access networks, also need to be connected across backbone networks through gateways. This document defines a mechanism using the BGP Tunnel Encapsulation attribute to allow data center gateway routers to advertise routes to the prefixes reachable in the site, including advertising them on behalf of other gateways at the same site. This allows segment routing to be used to identify multiple paths across the Internet or backbone network between different gateways. The paths can be selected for load-balancing, resilience, and quality purposes. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc9125. Copyright Notice Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction 2. Requirements Language 3. Site Gateway Auto-Discovery 4. Relationship to BGP - Link State and Egress Peer Engineering 5. Advertising a Site Route Externally 6. Encapsulation 7. IANA Considerations 8. Security Considerations 9. Manageability Considerations 9.1. Relationship to Route Target Constraint 10. References 10.1. Normative References 10.2. Informative References Acknowledgements Authors' Addresses 1. Introduction Data centers (DCs) are critical components of the infrastructure used by network operators to provide services to their customers. DCs (sites) are interconnected by a backbone network, which consists of any number of private networks and/or the Internet. DCs are attached to the backbone network by routers that are gateways (GWs). One DC typically has more than one GW for various reasons including commercial preferences, load balancing, or resiliency against connection or device failure. Segment Routing (SR) ([RFC8402]) is a protocol mechanism that can be used within a DC as well as for steering traffic that flows between two DC sites. In order for a source site (also known as an ingress site) that uses SR to load-balance the flows it sends to a destination site (also known as an egress site), it needs to know the complete set of entry nodes (i.e., GWs) for that egress DC from the backbone network connecting the two DCs. Note that it is assumed that the connected set of DC sites and the border nodes in the backbone network on the paths that connect the DC sites are part of the same SR BGP - Link State (LS) instance (see [RFC7752] and [RFC9086]) so that traffic engineering using SR may be used for these flows. Other sites, such as access networks, also need to be connected across backbone networks through gateways. For illustrative purposes, consider the ingress and egress sites shown in Figure 1 as separate Autonomous Systems (ASes) (noting that the sites could be implemented as part of the ASes to which they are attached, or as separate ASes). The various ASes that provide connectivity between the ingress and egress sites could each be constructed differently and use different technologies such as IP; MPLS using global table routing information from BGP; MPLS IP VPN; SR-MPLS IP VPN; or SRv6 IP VPN. That is, the ingress and egress sites can be connected by tunnels across a variety of technologies. This document describes how SR Segment Identifiers (SIDs) are used to identify the paths between the ingress and egress sites. The solution described in this document is agnostic as to whether the transit ASes do or do not have SR capabilities. The solution uses SR to stitch together path segments between GWs and through the Autonomous System Border Routers (ASBRs). Thus, there is a requirement that the GWs and ASBRs are SR capable. The solution supports the SR path being extended into the ingress and egress sites if they are SR capable. The solution defined in this document can be seen in the broader context of site interconnection in [SR-INTERCONNECT]. That document shows how other existing protocol elements may be combined with the solution defined in this document to provide a full system, but it is not a necessary reference for understanding this document. Suppose that there are two gateways, GW1 and GW2 as shown in Figure 1, for a given egress site and that they each advertise a route to prefix X, which is located within the egress site with each setting itself as next hop. One might think that the GWs for X could be inferred from the routes' next-hop fields, but typically it is not the case that both routes get distributed across the backbone: rather only the best route, as selected by BGP, is distributed. This precludes load-balancing flows across both GWs. ----------------- --------------------- | Ingress | | Egress ------ | | Site | | Site |Prefix| | | | | | X | | | | | ------ | | -- | | --- --- | | |GW| | | |GW1| |GW2| | -------++-------- ----+-----------+-+-- | \ | / | | \ | / | | -+------------- --------+--------+-- | | ||ASBR| ----| |---- |ASBR| |ASBR| | | | | ---- |ASBR+------+ASBR| ---- ---- | | | | ----| |---- | | | | | | | | | | ----| |---- | | | | AS1 |ASBR+------+ASBR| AS2 | | | | ----| |---- | | | --------------- -------------------- | --+-----------------------------------------------+-- | |ASBR| |ASBR| | | ---- AS3 ---- | | | ----------------------------------------------------- Figure 1: Example Site Interconnection The obvious solution to this problem is to use the BGP feature that allows the advertisement of multiple paths in BGP (known as Add- Paths) ([RFC7911]) to ensure that all routes to X get advertised by BGP. However, even if this is done, the identity of the GWs will be lost as soon as the routes get distributed through an ASBR that will set itself to be the next hop. And if there are multiple ASes in the backbone, not only will the next hop change several times, but the Add-Paths technique will experience scaling issues. This all means that the Add-Paths approach is effectively limited to sites connected over a single AS. This document defines a solution that overcomes this limitation and works equally well with a backbone constructed from one or more ASes using the Tunnel Encapsulation attribute ([RFC9012]) as follows: When a GW to a given site advertises a route to a prefix X within that site, it will include a Tunnel Encapsulation attribute that contains the union of the Tunnel Encapsulation attributes advertised by each of the GWs to that site, including itself. In other words, each route advertised by a GW identifies all of the GWs to the same site (see Section 3 for a discussion of how GWs discover each other), i.e., the Tunnel Encapsulation attribute advertised by each GW contains multiple Tunnel TLVs, one or more from each active GW, and each Tunnel TLV will contain a Tunnel Egress Endpoint sub-TLV that identifies the GW for that Tunnel TLV. Therefore, even if only one of the routes is distributed to other ASes, it will not matter how many times the next hop changes, as the Tunnel Encapsulation attribute will remain unchanged. To put this in the context of Figure 1, GW1 and GW2 discover each other as gateways for the egress site. Both GW1 and GW2 advertise themselves as having routes to prefix X. Furthermore, GW1 includes a Tunnel Encapsulation attribute, which is the union of its Tunnel Encapsulation attribute and GW2's Tunnel Encapsulation attribute. Similarly, GW2 includes a Tunnel Encapsulation attribute, which is the union of its Tunnel Encapsulation attribute and GW1's Tunnel Encapsulation attribute. The gateway in the ingress site can now see all possible paths to X in the egress site regardless of which route is propagated to it, and it can choose one or balance traffic flows as it sees fit. 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Site Gateway Auto-Discovery To allow a given site's GWs to auto-discover each other and to coordinate their operations, the following procedures are implemented: * A route target ([RFC4360]) MUST be attached to each GW's auto- discovery route (defined below), and its value MUST be set to a value that indicates the site identifier. The rules for constructing a route target are detailed in [RFC4360]. It is RECOMMENDED that a Type x00 or x02 route target be used. * Site identifiers are set through configuration. The site identifiers MUST be the same across all GWs to the site (i.e., the same identifier is used by all GWs to the same site) and MUST be unique across all sites that are connected (i.e., across all GWs to all sites that are interconnected). * Each GW MUST construct an import filtering rule to import any route that carries a route target with the same site identifier that the GW itself uses. This means that only these GWs will import those routes, and that all GWs to the same site will import each other's routes and will learn (auto-discover) the current set of active GWs for the site. The auto-discovery route that each GW advertises consists of the following: * IPv4 or IPv6 Network Layer Reachability Information (NLRI) ([RFC4760]) containing one of the GW's loopback addresses (that is, with an AFI/SAFI pair that is one of the following: IPv4/NLRI used for unicast forwarding (1/1); IPv6/NLRI used for unicast forwarding (2/1); IPv4/NLRI with MPLS Labels (1/4); or IPv6/NLRI with MPLS Labels (2/4)). * A Tunnel Encapsulation attribute ([RFC9012]) containing the GW's encapsulation information encoded in one or more Tunnel TLVs. To avoid the side effect of applying the Tunnel Encapsulation attribute to any packet that is addressed to the GW itself, the address advertised for auto-discovery MUST be a different loopback address than is advertised for packets directed to the gateway itself. As described in Section 1, each GW will include a Tunnel Encapsulation attribute with the GW encapsulation information for each of the site's active GWs (including itself) in every route advertised externally to that site. As the current set of active GWs changes (due to the addition of a new GW or the failure/removal of an existing GW), each externally advertised route will be re-advertised with a new Tunnel Encapsulation attribute, which reflects the current set of active GWs. If a gateway becomes disconnected from the backbone network, or if the site operator decides to terminate the gateway's activity, it MUST withdraw the advertisements described above. This means that remote gateways at other sites will stop seeing advertisements from or about this gateway. Note that if the routing within a site is broken (for example, such that there is a route from one GW to another but not in the reverse direction), then it is possible that incoming traffic will be routed to the wrong GW to reach the destination prefix; in this degraded network situation, traffic may be dropped. Note that if a GW is (mis)configured with a different site identifier from the other GWs to the same site, then it will not be auto- discovered by the other GWs (and will not auto-discover the other GWs). This would result in a GW for another site receiving only the Tunnel Encapsulation attribute included in the BGP best route, i.e., the Tunnel Encapsulation attribute of the (mis)configured GW or that of the other GWs. 4. Relationship to BGP - Link State and Egress Peer Engineering When a remote GW receives a route to a prefix X, it uses the Tunnel Egress Endpoint sub-TLVs in the containing Tunnel Encapsulation attribute to identify the GWs through which X can be reached. It uses this information to compute SR Traffic Engineering (SR TE) paths across the backbone network looking at the information advertised to it in SR BGP - Link State (BGP-LS) ([RFC9085]) and correlated using the site identity. SR Egress Peer Engineering (EPE) ([RFC9086]) can be used to supplement the information advertised in BGP-LS. 5. Advertising a Site Route Externally When a packet destined for prefix X is sent on an SR TE path to a GW for the site containing X (that is, the packet is sent in the ingress site on an SR TE path that describes the whole path including those parts that are within the egress site), it needs to carry the receiving GW's SID for X such that this SID becomes the next SID that is due to be processed before the GW completes its processing of the packet. To achieve this, each Tunnel TLV in the Tunnel Encapsulation attribute contains a Prefix-SID sub-TLV ([RFC9012]) for X. As defined in [RFC9012], the Prefix-SID sub-TLV is only for IPv4/IPV6 Labeled Unicast routes, so the solution described in this document only applies to routes of those types. If the use of the Prefix-SID sub-TLV for routes of other types is defined in the future, further documents will be needed to describe their use for site interconnection consistent with this document. Alternatively, if MPLS SR is in use and if the GWs for a given egress site are configured to allow GWs at remote ingress sites to perform SR TE through that egress site for a prefix X, then each GW to the egress site computes an SR TE path through the egress site to X and places each in an MPLS Label Stack sub-TLV ([RFC9012]) in the SR Tunnel TLV for that GW. Please refer to Section 7 of [SR-INTERCONNECT] for worked examples of how the SID stack is constructed in this case and how the advertisements would work. 6. Encapsulation If a site is configured to allow remote GWs to send packets to the site in the site's native encapsulation, then each GW to the site will also include multiple instances of a Tunnel TLV for that native encapsulation in externally advertised routes: one for each GW. Each Tunnel TLV contains a Tunnel Egress Endpoint sub-TLV with the address of the GW that the Tunnel TLV identifies. A remote GW may then encapsulate a packet according to the rules defined via the sub-TLVs included in each of the Tunnel TLVs. 7. IANA Considerations IANA maintains the "BGP Tunnel Encapsulation Attribute Tunnel Types" registry in the "Border Gateway Protocol (BGP) Tunnel Encapsulation" registry. IANA had previously assigned the value 17 from this subregistry for "SR Tunnel", referencing this document as an Internet-Draft. At that time, the assignment policy for this range of the registry was "First Come First Served" [RFC8126]. IANA has marked that assignment as deprecated. IANA may reclaim that codepoint at such a time that the registry is depleted. 8. Security Considerations From a protocol point of view, the mechanisms described in this document can leverage the security mechanisms already defined for BGP. Further discussion of security considerations for BGP may be found in the BGP specification itself ([RFC4271]) and in the security analysis for BGP ([RFC4272]). The original discussion of the use of the TCP MD5 signature option to protect BGP sessions is found in [RFC5925], while [RFC6952] includes an analysis of BGP keying and authentication issues. The mechanisms described in this document involve sharing routing or reachability information between sites, which may mean disclosing information that is normally contained within a site. So it needs to be understood that normal security paradigms based on the boundaries of sites are weakened and interception of BGP messages may result in information being disclosed to third parties. Discussion of these issues with respect to VPNs can be found in [RFC4364], while [RFC7926] describes many of the issues associated with the exchange of topology or TE information between sites. Particular exposures resulting from this work include: * Gateways to a site will know about all other gateways to the same site. This feature applies within a site, so it is not a substantial exposure, but it does mean that if the BGP exchanges within a site can be snooped or if a gateway can be subverted, then an attacker may learn the full set of gateways to a site. This would facilitate more effective attacks on that site. * The existence of multiple gateways to a site becomes more visible across the backbone and even into remote sites. This means that an attacker is able to prepare a more comprehensive attack than exists when only the locally attached backbone network (e.g., the AS that hosts the site) can see all of the gateways to a site. For example, a Denial-of-Service attack on a single GW is mitigated by the existence of other GWs, but if the attacker knows about all the gateways, then the whole set can be attacked at once. * A node in a site that does not have external BGP peering (i.e., is not really a site gateway and cannot speak BGP into the backbone network) may be able to get itself advertised as a gateway by letting other genuine gateways discover it (by speaking BGP to them within the site), so it may get those genuine gateways to advertise it as a gateway into the backbone network. This would allow the malicious node to attract traffic without having to have secure BGP peerings with out-of-site nodes. * An external party intercepting BGP messages anywhere between sites may learn information about the functioning of the sites and the locations of endpoints. While this is not necessarily a significant security or privacy risk, it is possible that the disclosure of this information could be used by an attacker. * If it is possible to modify a BGP message within the backbone, it may be possible to spoof the existence of a gateway. This could cause traffic to be attracted to a specific node and might result in traffic not being delivered. All of the issues in the list above could cause disruption to site interconnection, but they are not new protocol vulnerabilities so much as new exposures of information that SHOULD be protected against using existing protocol mechanisms such as securing the TCP sessions over which the BGP messages flow. Furthermore, it is a general observation that if these attacks are possible, then it is highly likely that far more significant attacks can be made on the routing system. It should be noted that BGP peerings are not discovered but always arise from explicit configuration. Given that the gateways and ASBRs are connected by tunnels that may run across parts of the network that are not trusted, data center operators using the approach set out in this network MUST consider using gateway-to-gateway encryption to protect the data center traffic. Additionally, due consideration MUST be given to encrypting end-to-end traffic as it would be for any traffic that uses a public or untrusted network for transport. 9. Manageability Considerations The principal configuration item added by this solution is the allocation of a site identifier. The same identifier MUST be assigned to every GW to the same site, and each site MUST have a different identifier. This requires coordination, probably through a central management agent. It should be noted that BGP peerings are not discovered but always arise from explicit configuration. This is no different from any other BGP operation. The site identifiers that are configured and carried in route targets (see Section 3) are an important feature to ensure that all of the gateways to a site discover each other. Therefore, it is important that this value is not misconfigured since that would result in the gateways not discovering each other and not advertising each other. 9.1. Relationship to Route Target Constraint In order to limit the VPN routing information that is maintained at a given route reflector, [RFC4364] suggests that route reflectors use "Cooperative Route Filtering", which was renamed "Outbound Route Filtering" and defined in [RFC5291]. [RFC4684] defines an extension to that mechanism to include support for multiple autonomous systems and asymmetric VPN topologies such as hub-and-spoke. The mechanism in RFC 4684 is known as Route Target Constraint (RTC). An operator would not normally configure RTC by default for any AFI/ SAFI combination and would only enable it after careful consideration. When using the mechanisms defined in this document, the operator should carefully consider the effects of filtering routes. In some cases, this may be desirable, and in others, it could limit the effectiveness of the procedures. 10. References 10.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, DOI 10.17487/RFC4271, January 2006, . [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended Communities Attribute", RFC 4360, DOI 10.17487/RFC4360, February 2006, . [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, "Multiprotocol Extensions for BGP-4", RFC 4760, DOI 10.17487/RFC4760, January 2007, . [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, DOI 10.17487/RFC5925, June 2010, . [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and S. Ray, "North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP", RFC 7752, DOI 10.17487/RFC7752, March 2016, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, "The BGP Tunnel Encapsulation Attribute", RFC 9012, DOI 10.17487/RFC9012, April 2021, . 10.2. Informative References [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", RFC 4272, DOI 10.17487/RFC4272, January 2006, . [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February 2006, . [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, R., Patel, K., and J. Guichard, "Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, November 2006, . [RFC5291] Chen, E. and Y. Rekhter, "Outbound Route Filtering Capability for BGP-4", RFC 5291, DOI 10.17487/RFC5291, August 2008, . [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of BGP, LDP, PCEP, and MSDP Issues According to the Keying and Authentication for Routing Protocols (KARP) Design Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, . [RFC7911] Walton, D., Retana, A., Chen, E., and J. Scudder, "Advertisement of Multiple Paths in BGP", RFC 7911, DOI 10.17487/RFC7911, July 2016, . [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., Ceccarelli, D., and X. Zhang, "Problem Statement and Architecture for Information Exchange between Interconnected Traffic-Engineered Networks", BCP 206, RFC 7926, DOI 10.17487/RFC7926, July 2016, . [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 8126, DOI 10.17487/RFC8126, June 2017, . [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., Decraene, B., Litkowski, S., and R. Shakir, "Segment Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, July 2018, . [RFC9085] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Gredler, H., and M. Chen, "Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing", RFC 9085, DOI 10.17487/RFC9085, August 2021, . [RFC9086] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Patel, K., Ray, S., and J. Dong, "Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing BGP Egress Peer Engineering", RFC 9086, DOI 10.17487/RFC9086, August 2021, . [SR-INTERCONNECT] Farrel, A. and J. Drake, "Interconnection of Segment Routing Sites - Problem Statement and Solution Landscape", Work in Progress, Internet-Draft, draft-farrel-spring-sr- domain-interconnect-06, 19 May 2021, . Acknowledgements Thanks to Bruno Rijsman, Stephane Litkowski, Boris Hassanov, Linda Dunbar, Ravi Singh, and Daniel Migault for review comments, and to Robert Raszuk for useful discussions. Gyan Mishra provided a helpful GenArt review, and John Scudder and Benjamin Kaduk made helpful comments during IESG review. Authors' Addresses Adrian Farrel Old Dog Consulting Email: adrian@olddog.co.uk John Drake Juniper Networks Email: jdrake@juniper.net Eric Rosen Juniper Networks Email: erosen52@gmail.com Keyur Patel Arrcus, Inc. Email: keyur@arrcus.com Luay Jalil Verizon Email: luay.jalil@verizon.com Corrected Text -------------- Internet Engineering Task Force (IETF) A. Farrel Request for Comments: 9125 Old Dog Consulting Category: Standards Track J. Drake ISSN: 2070-1721 E. Rosen Juniper Networks K. Patel Arrcus, Inc. L. Jalil Verizon August 2021 Gateway Auto-Discovery and Route Advertisement for Site Interconnection Using Segment Routing Abstract Data centers are attached to the Internet or a backbone network by gateway routers. One data center typically has more than one gateway for commercial, load-balancing, and resiliency reasons. Other sites, such as access networks, also need to be connected across backbone networks through gateways. This document defines a mechanism using the BGP Tunnel Encapsulation attribute to allow data center gateway routers to advertise routes to the prefixes reachable in the site, including advertising them on behalf of other gateways at the same site. This allows segment routing to be used to identify multiple paths across the Internet or backbone network between different gateways. The paths can be selected for load-balancing, resilience, and quality purposes. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc9125. Copyright Notice Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction 2. Requirements Language 3. Site Gateway Auto-Discovery 4. Relationship to BGP - Link State and Egress Peer Engineering 5. Advertising a Site Route Externally 6. Encapsulation 7. IANA Considerations 8. Security Considerations 9. Manageability Considerations 9.1. Relationship to Route Target Constraint 10. References 10.1. Normative References 10.2. Informative References Acknowledgements Authors' Addresses 1. Introduction Data centers (DCs) are critical components of the infrastructure used by network operators to provide services to their customers. DCs (sites) are interconnected by a backbone network, which consists of any number of private networks and/or the Internet. DCs are attached to the backbone network by routers that are gateways (GWs). One DC typically has more than one GW for various reasons including commercial preferences, load balancing, or resiliency against connection or device failure. Segment Routing (SR) ([RFC8402]) is a protocol mechanism that can be used within a DC as well as for steering traffic that flows between two DC sites. In order for a source site (also known as an ingress site) that uses SR to load-balance the flows it sends to a destination site (also known as an egress site), it needs to know the complete set of entry nodes (i.e., GWs) for that egress DC from the backbone network connecting the two DCs. Note that it is assumed that the connected set of DC sites and the border nodes in the backbone network on the paths that connect the DC sites are part of the same SR BGP - Link State (LS) instance (see [RFC7752] and [RFC9086]) so that traffic engineering using SR may be used for these flows. Other sites, such as access networks, also need to be connected across backbone networks through gateways. For illustrative purposes, consider the ingress and egress sites shown in Figure 1 as separate Autonomous Systems (ASes) (noting that the sites could be implemented as part of the ASes to which they are attached, or as separate ASes). The various ASes that provide connectivity between the ingress and egress sites could each be constructed differently and use different technologies such as IP; MPLS using global table routing information from BGP; MPLS IP VPN; SR-MPLS IP VPN; or SRv6 IP VPN. That is, the ingress and egress sites can be connected by tunnels across a variety of technologies. This document describes how SR Segment Identifiers (SIDs) are used to identify the paths between the ingress and egress sites. The solution described in this document is agnostic as to whether the transit ASes do or do not have SR capabilities. The solution uses SR to stitch together path segments between GWs and through the Autonomous System Border Routers (ASBRs). Thus, there is a requirement that the GWs and ASBRs are SR capable. The solution supports the SR path being extended into the ingress and egress sites if they are SR capable. The solution defined in this document can be seen in the broader context of site interconnection in [SR-INTERCONNECT]. That document shows how other existing protocol elements may be combined with the solution defined in this document to provide a full system, but it is not a necessary reference for understanding this document. Suppose that there are two gateways, GW1 and GW2 as shown in Figure 1, for a given egress site and that they each advertise a route to prefix X, which is located within the egress site with each setting itself as next hop. One might think that the GWs for X could be inferred from the routes' next-hop fields, but typically it is not the case that both routes get distributed across the backbone: rather only the best route, as selected by BGP, is distributed. This precludes load-balancing flows across both GWs. ----------------- --------------------- | Ingress | | Egress ------ | | Site | | Site |Prefix| | | | | | X | | | | | ------ | | -- | | --- --- | | |GW| | | |GW1| |GW2| | -------++-------- ----+-----------+-+-- | \ | / | | \ | / | | -+------------- --------+--------+-- | | ||ASBR| ----| |---- |ASBR| |ASBR| | | | | ---- |ASBR+------+ASBR| ---- ---- | | | | ----| |---- | | | | | | | | | | ----| |---- | | | | AS1 |ASBR+------+ASBR| AS2 | | | | ----| |---- | | | --------------- -------------------- | --+-----------------------------------------------+-- | |ASBR| |ASBR| | | ---- AS3 ---- | | | ----------------------------------------------------- Figure 1: Example Site Interconnection The obvious solution to this problem is to use the BGP feature that allows the advertisement of multiple paths in BGP (known as Add- Paths) ([RFC7911]) to ensure that all routes to X get advertised by BGP. However, even if this is done, the identity of the GWs will be lost as soon as the routes get distributed through an ASBR that will set itself to be the next hop. And if there are multiple ASes in the backbone, not only will the next hop change several times, but the Add-Paths technique will experience scaling issues. This all means that the Add-Paths approach is effectively limited to sites connected over a single AS. This document defines a solution that overcomes this limitation and works equally well with a backbone constructed from one or more ASes using the Tunnel Encapsulation attribute ([RFC9012]) as follows: When a GW to a given site advertises a route to a prefix X within that site, it will include a Tunnel Encapsulation attribute that contains the union of the Tunnel Encapsulation attributes advertised by each of the GWs to that site, including itself. In other words, each route advertised by a GW identifies all of the GWs to the same site (see Section 3 for a discussion of how GWs discover each other), i.e., the Tunnel Encapsulation attribute advertised by each GW contains multiple Tunnel TLVs, one or more from each active GW, and each Tunnel TLV will contain a Tunnel Egress Endpoint sub-TLV that identifies the GW for that Tunnel TLV. Therefore, even if only one of the routes is distributed to other ASes, it will not matter how many times the next hop changes, as the Tunnel Encapsulation attribute will remain unchanged. To put this in the context of Figure 1, GW1 and GW2 discover each other as gateways for the egress site. Both GW1 and GW2 advertise themselves as having routes to prefix X. Furthermore, GW1 includes a Tunnel Encapsulation attribute, which is the union of its Tunnel Encapsulation attribute and GW2's Tunnel Encapsulation attribute. Similarly, GW2 includes a Tunnel Encapsulation attribute, which is the union of its Tunnel Encapsulation attribute and GW1's Tunnel Encapsulation attribute. The gateway in the ingress site can now see all possible paths to X in the egress site regardless of which route is propagated to it, and it can choose one or balance traffic flows as it sees fit. 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Site Gateway Auto-Discovery To allow a given site's GWs to auto-discover each other and to coordinate their operations, the following procedures are implemented: * A route target ([RFC4360]) MUST be attached to each GW's auto- discovery route (defined below), and its value MUST be set to a value that indicates the site identifier. The rules for constructing a route target are detailed in [RFC4360]. It is RECOMMENDED that a Type x00 or x02 route target be used. * Site identifiers are set through configuration. The site identifiers MUST be the same across all GWs to the site (i.e., the same identifier is used by all GWs to the same site) and MUST be unique across all sites that are connected (i.e., across all GWs to all sites that are interconnected). * Each GW MUST construct an import filtering rule to import any route that carries a route target with the same site identifier that the GW itself uses. This means that only these GWs will import those routes, and that all GWs to the same site will import each other's routes and will learn (auto-discover) the current set of active GWs for the site. The auto-discovery route that each GW advertises consists of the following: * IPv4 or IPv6 Network Layer Reachability Information (NLRI) ([RFC4760]) containing one of the GW's loopback addresses (that is, with an AFI/SAFI pair that is one of the following: IPv4/NLRI used for unicast forwarding (1/1); IPv6/NLRI used for unicast forwarding (2/1); IPv4/NLRI with MPLS Labels (1/4); or IPv6/NLRI with MPLS Labels (2/4)). * A Tunnel Encapsulation attribute ([RFC9012]) containing the GW's encapsulation information encoded in one or more Tunnel TLVs. To avoid the side effect of applying the Tunnel Encapsulation attribute to any packet that is addressed to the GW itself, the address advertised for auto-discovery MUST be a different loopback address than is advertised for packets directed to the gateway itself. As described in Section 1, each GW will include a Tunnel Encapsulation attribute with the GW encapsulation information for each of the site's active GWs (including itself) in every route advertised externally to that site. As the current set of active GWs changes (due to the addition of a new GW or the failure/removal of an existing GW), each externally advertised route will be re-advertised with a new Tunnel Encapsulation attribute, which reflects the current set of active GWs. If a gateway becomes disconnected from the backbone network, or if the site operator decides to terminate the gateway's activity, it MUST withdraw the advertisements described above. This means that remote gateways at other sites will stop seeing advertisements from or about this gateway. Note that if the routing within a site is broken (for example, such that there is a route from one GW to another but not in the reverse direction), then it is possible that incoming traffic will be routed to the wrong GW to reach the destination prefix; in this degraded network situation, traffic may be dropped. Note that if a GW is (mis)configured with a different site identifier from the other GWs to the same site, then it will not be auto- discovered by the other GWs (and will not auto-discover the other GWs). This would result in a GW for another site receiving only the Tunnel Encapsulation attribute included in the BGP best route, i.e., the Tunnel Encapsulation attribute of the (mis)configured GW or that of the other GWs. 4. Relationship to BGP - Link State and Egress Peer Engineering When a remote GW receives a route to a prefix X, it uses the Tunnel Egress Endpoint sub-TLVs in the containing Tunnel Encapsulation attribute to identify the GWs through which X can be reached. It uses this information to compute SR Traffic Engineering (SR TE) paths across the backbone network looking at the information advertised to it in SR BGP - Link State (BGP-LS) ([RFC9085]) and correlated using the site identity. SR Egress Peer Engineering (EPE) ([RFC9086]) can be used to supplement the information advertised in BGP-LS. 5. Advertising a Site Route Externally When a packet destined for prefix X is sent on an SR TE path to a GW for the site containing X (that is, the packet is sent in the ingress site on an SR TE path that describes the whole path including those parts that are within the egress site), it needs to carry the receiving GW's SID for X such that this SID becomes the next SID that is due to be processed before the GW completes its processing of the packet. To achieve this, each Tunnel TLV in the Tunnel Encapsulation attribute contains a Prefix-SID sub-TLV ([RFC9012]) for X. As defined in [RFC9012], the Prefix-SID sub-TLV is only for IPv4/IPV6 Labeled Unicast routes, so the solution described in this document only applies to routes of those types. If the use of the Prefix-SID sub-TLV for routes of other types is defined in the future, further documents will be needed to describe their use for site interconnection consistent with this document. Alternatively, if MPLS SR is in use and if the GWs for a given egress site are configured to allow GWs at remote ingress sites to perform SR TE through that egress site for a prefix X, then each GW to the egress site computes an SR TE path through the egress site to X and places each in an MPLS Label Stack sub-TLV ([RFC9012]) in the SR Tunnel TLV for that GW. Please refer to Section 7 of [SR-INTERCONNECT] for worked examples of how the SID stack is constructed in this case and how the advertisements would work. 6. Encapsulation If a site is configured to allow remote GWs to send packets to the site in the site's native encapsulation, then each GW to the site will also include multiple instances of a Tunnel TLV for that native encapsulation in externally advertised routes: one for each GW. Each Tunnel TLV contains a Tunnel Egress Endpoint sub-TLV with the address of the GW that the Tunnel TLV identifies. A remote GW may then encapsulate a packet according to the rules defined via the sub-TLVs included in each of the Tunnel TLVs. 7. IANA Considerations IANA maintains the "BGP Tunnel Encapsulation Attribute Tunnel Types" registry in the "Border Gateway Protocol (BGP) Tunnel Encapsulation" registry. IANA had previously assigned the value 17 from this subregistry for "SR Tunnel", referencing this document as an Internet-Draft. At that time, the assignment policy for this range of the registry was "First Come First Served" [RFC8126]. IANA has marked that assignment as deprecated. IANA may reclaim that codepoint at such a time that the registry is depleted. 8. Security Considerations From a protocol point of view, the mechanisms described in this document can leverage the security mechanisms already defined for BGP. Further discussion of security considerations for BGP may be found in the BGP specification itself ([RFC4271]) and in the security analysis for BGP ([RFC4272]). The original discussion of the use of the TCP MD5 signature option to protect BGP sessions is found in [RFC5925], while [RFC6952] includes an analysis of BGP keying and authentication issues. The mechanisms described in this document involve sharing routing or reachability information between sites, which may mean disclosing information that is normally contained within a site. So it needs to be understood that normal security paradigms based on the boundaries of sites are weakened and interception of BGP messages may result in information being disclosed to third parties. Discussion of these issues with respect to VPNs can be found in [RFC4364], while [RFC7926] describes many of the issues associated with the exchange of topology or TE information between sites. Particular exposures resulting from this work include: * Gateways to a site will know about all other gateways to the same site. This feature applies within a site, so it is not a substantial exposure, but it does mean that if the BGP exchanges within a site can be snooped or if a gateway can be subverted, then an attacker may learn the full set of gateways to a site. This would facilitate more effective attacks on that site. * The existence of multiple gateways to a site becomes more visible across the backbone and even into remote sites. This means that an attacker is able to prepare a more comprehensive attack than exists when only the locally attached backbone network (e.g., the AS that hosts the site) can see all of the gateways to a site. For example, a Denial-of-Service attack on a single GW is mitigated by the existence of other GWs, but if the attacker knows about all the gateways, then the whole set can be attacked at once. * A node in a site that does not have external BGP peering (i.e., is not really a site gateway and cannot speak BGP into the backbone network) may be able to get itself advertised as a gateway by letting other genuine gateways discover it (by speaking BGP to them within the site), so it may get those genuine gateways to advertise it as a gateway into the backbone network. This would allow the malicious node to attract traffic without having to have secure BGP peerings with out-of-site nodes. * An external party intercepting BGP messages anywhere between sites may learn information about the functioning of the sites and the locations of endpoints. While this is not necessarily a significant security or privacy risk, it is possible that the disclosure of this information could be used by an attacker. * If it is possible to modify a BGP message within the backbone, it may be possible to spoof the existence of a gateway. This could cause traffic to be attracted to a specific node and might result in traffic not being delivered. All of the issues in the list above could cause disruption to site interconnection, but they are not new protocol vulnerabilities so much as new exposures of information that SHOULD be protected against using existing protocol mechanisms such as securing the TCP sessions over which the BGP messages flow. Furthermore, it is a general observation that if these attacks are possible, then it is highly likely that far more significant attacks can be made on the routing system. It should be noted that BGP peerings are not discovered but always arise from explicit configuration. Given that the gateways and ASBRs are connected by tunnels that may run across parts of the network that are not trusted, data center operators using the approach set out in this network MUST consider using gateway-to-gateway encryption to protect the data center traffic. Additionally, due consideration MUST be given to encrypting end-to-end traffic as it would be for any traffic that uses a public or untrusted network for transport. 9. Manageability Considerations The principal configuration item added by this solution is the allocation of a site identifier. The same identifier MUST be assigned to every GW to the same site, and each site MUST have a different identifier. This requires coordination, probably through a central management agent. It should be noted that BGP peerings are not discovered but always arise from explicit configuration. This is no different from any other BGP operation. The site identifiers that are configured and carried in route targets (see Section 3) are an important feature to ensure that all of the gateways to a site discover each other. Therefore, it is important that this value is not misconfigured since that would result in the gateways not discovering each other and not advertising each other. 9.1. Relationship to Route Target Constraint In order to limit the VPN routing information that is maintained at a given route reflector, [RFC4364] suggests that route reflectors use "Cooperative Route Filtering", which was renamed "Outbound Route Filtering" and defined in [RFC5291]. [RFC4684] defines an extension to that mechanism to include support for multiple autonomous systems and asymmetric VPN topologies such as hub-and-spoke. The mechanism in RFC 4684 is known as Route Target Constraint (RTC). An operator would not normally configure RTC by default for any AFI/ SAFI combination and would only enable it after careful consideration. When using the mechanisms defined in this document, the operator should carefully consider the effects of filtering routes. In some cases, this may be desirable, and in others, it could limit the effectiveness of the procedures. 10. References 10.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, DOI 10.17487/RFC4271, January 2006, . [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended Communities Attribute", RFC 4360, DOI 10.17487/RFC4360, February 2006, . [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, "Multiprotocol Extensions for BGP-4", RFC 4760, DOI 10.17487/RFC4760, January 2007, . [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, DOI 10.17487/RFC5925, June 2010, . [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and S. Ray, "North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP", RFC 7752, DOI 10.17487/RFC7752, March 2016, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, "The BGP Tunnel Encapsulation Attribute", RFC 9012, DOI 10.17487/RFC9012, April 2021, . 10.2. Informative References [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", RFC 4272, DOI 10.17487/RFC4272, January 2006, . [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February 2006, . [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, R., Patel, K., and J. Guichard, "Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, November 2006, . [RFC5291] Chen, E. and Y. Rekhter, "Outbound Route Filtering Capability for BGP-4", RFC 5291, DOI 10.17487/RFC5291, August 2008, . [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of BGP, LDP, PCEP, and MSDP Issues According to the Keying and Authentication for Routing Protocols (KARP) Design Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, . [RFC7911] Walton, D., Retana, A., Chen, E., and J. Scudder, "Advertisement of Multiple Paths in BGP", RFC 7911, DOI 10.17487/RFC7911, July 2016, . [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., Ceccarelli, D., and X. Zhang, "Problem Statement and Architecture for Information Exchange between Interconnected Traffic-Engineered Networks", BCP 206, RFC 7926, DOI 10.17487/RFC7926, July 2016, . [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 8126, DOI 10.17487/RFC8126, June 2017, . [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., Decraene, B., Litkowski, S., and R. Shakir, "Segment Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, July 2018, . [RFC9085] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Gredler, H., and M. Chen, "Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing", RFC 9085, DOI 10.17487/RFC9085, August 2021, . [RFC9086] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Patel, K., Ray, S., and J. Dong, "Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing BGP Egress Peer Engineering", RFC 9086, DOI 10.17487/RFC9086, August 2021, . [SR-INTERCONNECT] Farrel, A. and J. Drake, "Interconnection of Segment Routing Sites - Problem Statement and Solution Landscape", Work in Progress, Internet-Draft, draft-farrel-spring-sr- domain-interconnect-06, 19 May 2021, . Acknowledgements Thanks to Bruno Rijsman, Stephane Litkowski, Boris Hassanov, Linda Dunbar, Ravi Singh, and Daniel Migault for review comments, and to Robert Raszuk for useful discussions. Gyan Mishra provided a helpful GenArt review, and John Scudder and Benjamin Kaduk made helpful comments during IESG review. Authors' Addresses OG R4 Old Dog Consulting Email: og.r4@protonmail.com John Drace Juniper Networks Email: jdrake@juniper.net Eric Rossen Juniper Networks Email: erosen52@gmail.com Keyur Pattel Arrcus, Inc. Email: keyur@arrcus.com Luay Jaloil Verizon Email: luay.jalil@verizon.com Notes ----- audit Instructions: ------------- This erratum is currently posted as "Reported". If necessary, please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party can log in to change the status and edit the report, if necessary. -------------------------------------- RFC9125 (draft-ietf-bess-datacenter-gateway-13) -------------------------------------- Title : Gateway Auto-Discovery and Route Advertisement for Site Interconnection Using Segment Routing Publication Date : August 2021 Author(s) : A. Farrel, J. Drake, E. Rosen, K. Patel, L. Jalil Category : PROPOSED STANDARD Source : BGP Enabled Services Area : Routing Stream : IETF Verifying Party : IESG From nobody Mon Aug 30 02:58:34 2021 Return-Path: X-Original-To: bess@ietf.org Delivered-To: bess@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E86F3A07A3; Mon, 30 Aug 2021 02:58:31 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: Gorry Fairhurst via Datatracker To: Cc: bess@ietf.org, draft-ietf-bess-evpn-bum-procedure-updates.all@ietf.org, last-call@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.36.0 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <163031751099.5706.4501681867544517566@ietfa.amsl.com> Reply-To: Gorry Fairhurst Date: Mon, 30 Aug 2021 02:58:31 -0700 Archived-At: Subject: [bess] Tsvart last call review of draft-ietf-bess-evpn-bum-procedure-updates-09 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Aug 2021 09:58:31 -0000 Reviewer: Gorry Fairhurst Review result: Ready with Nits This document has been reviewed as part of the transport area review team's ongoing effort to review key IETF documents. These comments were written primarily for the transport area directors, but are copied to the document's authors and WG to allow them to address any issues raised and also to the IETF discussion list for information. When done at the time of IETF Last Call, the authors should consider this review as part of the last-call comments they receive. Please always CC tsv-art@ietf.org if you reply to or forward this review. This document specifies procedure updates for broadcast, unknown unicast, and multicast (BUM) traffic in Ethernet VPNs (EVPN), including selective multicast, and provider tunnel segmentation. There is a normative reference to draft-ietf-bess-evpn-igmp-mld-proxy, which normatively refers to this spec. This draft focusses on topics beneath the transport layer. It does not appear to introduce specific transport protocol concerns. 1. A common concern for transports using tunnels is the topic of fragmentation and packet size discovery. This is not mentioned, and it could be useful to point to the relevant section of a spec (I note that path "segmentation" in this draft relates to something different, in RFC 7524). 2. A general comment is that the draft section 1 states "It is expected that audience is familiar with EVPN and MVPN concepts and terminologies", I suggest it would none-the-less be very helpful to: * Include appropriate RFC references to where these terms are defined (.e.g. RFC7432?); * Check all the abbreviations and either define each in section 1 or simply expand on first use in this document; 3. Section 8. Describes a temporary IANA assignment, which I presume publication of this draft confirms? I expect an IANA note to this effect would help the IANA Team. From nobody Mon Aug 30 13:24:32 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54E5A3A2111 for ; Mon, 30 Aug 2021 13:24:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AVMxQGNpPp_R for ; Mon, 30 Aug 2021 13:24:22 -0700 (PDT) Received: from mail.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 491613A2110 for ; Mon, 30 Aug 2021 13:24:22 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 1F8A838A082; Mon, 30 Aug 2021 13:24:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PY7Owt2dzya4; Mon, 30 Aug 2021 13:24:22 -0700 (PDT) Received: from [192.168.1.16] (cpe-76-95-228-63.socal.res.rr.com [76.95.228.63]) by c8a.amsl.com (Postfix) with ESMTPSA id A6ABA38A080; Mon, 30 Aug 2021 13:24:21 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) From: Chris Smiley In-Reply-To: <20210830060536.48DC4F406D6@rfc-editor.org> Date: Mon, 30 Aug 2021 13:24:20 -0700 Cc: RFC Errata System Content-Transfer-Encoding: quoted-printable Message-Id: <9412EEED-6341-4838-A3A6-F4D585367022@amsl.com> References: <20210830060536.48DC4F406D6@rfc-editor.org> To: John E Drake , erosen52@gmail.com, keyur@arrcus.com, luay.jalil@verizon.com, Adrian Farrel , bess@ietf.org X-Mailer: Apple Mail (2.3445.104.11) Archived-At: Subject: Re: [bess] [Editorial Errata Reported] RFC9125 (6668) X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Aug 2021 20:24:30 -0000 Greetings, FYI - this report has been deleted as junk. Thank you. RFC Editor/cs > On Aug 29, 2021, at 11:05 PM, RFC Errata System = wrote: >=20 > The following errata report has been submitted for RFC9125, > "Gateway Auto-Discovery and Route Advertisement for Site = Interconnection Using Segment Routing". >=20 > -------------------------------------- > You may review the report below and at: > https://www.rfc-editor.org/errata/eid6668 >=20 > -------------------------------------- > Type: Editorial > Reported by: OGR4 >=20 > Section: 9125 >=20 > Original Text > ------------- >=20 >=20 >=20 >=20 > Internet Engineering Task Force (IETF) A. = Farrel > Request for Comments: 9125 Old Dog = Consulting > Category: Standards Track J. = Drake > ISSN: 2070-1721 E. = Rosen > Juniper = Networks > K. = Patel > Arrcus, = Inc. > L. = Jalil > = Verizon > August = 2021 >=20 >=20 > Gateway Auto-Discovery and Route Advertisement for Site = Interconnection > Using Segment Routing >=20 > Abstract >=20 > Data centers are attached to the Internet or a backbone network by > gateway routers. One data center typically has more than one = gateway > for commercial, load-balancing, and resiliency reasons. Other = sites, > such as access networks, also need to be connected across backbone > networks through gateways. >=20 > This document defines a mechanism using the BGP Tunnel Encapsulation > attribute to allow data center gateway routers to advertise routes = to > the prefixes reachable in the site, including advertising them on > behalf of other gateways at the same site. This allows segment > routing to be used to identify multiple paths across the Internet or > backbone network between different gateways. The paths can be > selected for load-balancing, resilience, and quality purposes. >=20 > Status of This Memo >=20 > This is an Internet Standards Track document. >=20 > This document is a product of the Internet Engineering Task Force > (IETF). It represents the consensus of the IETF community. It has > received public review and has been approved for publication by the > Internet Engineering Steering Group (IESG). Further information on > Internet Standards is available in Section 2 of RFC 7841. >=20 > Information about the current status of this document, any errata, > and how to provide feedback on it may be obtained at > https://www.rfc-editor.org/info/rfc9125. >=20 > Copyright Notice >=20 > Copyright (c) 2021 IETF Trust and the persons identified as the > document authors. All rights reserved. >=20 > This document is subject to BCP 78 and the IETF Trust's Legal > Provisions Relating to IETF Documents > (https://trustee.ietf.org/license-info) in effect on the date of > publication of this document. Please review these documents > carefully, as they describe your rights and restrictions with = respect > to this document. Code Components extracted from this document must > include Simplified BSD License text as described in Section 4.e of > the Trust Legal Provisions and are provided without warranty as > described in the Simplified BSD License. >=20 > Table of Contents >=20 > 1. Introduction > 2. Requirements Language > 3. Site Gateway Auto-Discovery > 4. Relationship to BGP - Link State and Egress Peer Engineering > 5. Advertising a Site Route Externally > 6. Encapsulation > 7. IANA Considerations > 8. Security Considerations > 9. Manageability Considerations > 9.1. Relationship to Route Target Constraint > 10. References > 10.1. Normative References > 10.2. Informative References > Acknowledgements > Authors' Addresses >=20 > 1. Introduction >=20 > Data centers (DCs) are critical components of the infrastructure = used > by network operators to provide services to their customers. DCs > (sites) are interconnected by a backbone network, which consists of > any number of private networks and/or the Internet. DCs are = attached > to the backbone network by routers that are gateways (GWs). One DC > typically has more than one GW for various reasons including > commercial preferences, load balancing, or resiliency against > connection or device failure. >=20 > Segment Routing (SR) ([RFC8402]) is a protocol mechanism that can be > used within a DC as well as for steering traffic that flows between > two DC sites. In order for a source site (also known as an ingress > site) that uses SR to load-balance the flows it sends to a > destination site (also known as an egress site), it needs to know = the > complete set of entry nodes (i.e., GWs) for that egress DC from the > backbone network connecting the two DCs. Note that it is assumed > that the connected set of DC sites and the border nodes in the > backbone network on the paths that connect the DC sites are part of > the same SR BGP - Link State (LS) instance (see [RFC7752] and > [RFC9086]) so that traffic engineering using SR may be used for = these > flows. >=20 > Other sites, such as access networks, also need to be connected > across backbone networks through gateways. For illustrative > purposes, consider the ingress and egress sites shown in Figure 1 as > separate Autonomous Systems (ASes) (noting that the sites could be > implemented as part of the ASes to which they are attached, or as > separate ASes). The various ASes that provide connectivity between > the ingress and egress sites could each be constructed differently > and use different technologies such as IP; MPLS using global table > routing information from BGP; MPLS IP VPN; SR-MPLS IP VPN; or SRv6 = IP > VPN. That is, the ingress and egress sites can be connected by > tunnels across a variety of technologies. This document describes > how SR Segment Identifiers (SIDs) are used to identify the paths > between the ingress and egress sites. >=20 > The solution described in this document is agnostic as to whether = the > transit ASes do or do not have SR capabilities. The solution uses = SR > to stitch together path segments between GWs and through the > Autonomous System Border Routers (ASBRs). Thus, there is a > requirement that the GWs and ASBRs are SR capable. The solution > supports the SR path being extended into the ingress and egress = sites > if they are SR capable. >=20 > The solution defined in this document can be seen in the broader > context of site interconnection in [SR-INTERCONNECT]. That document > shows how other existing protocol elements may be combined with the > solution defined in this document to provide a full system, but it = is > not a necessary reference for understanding this document. >=20 > Suppose that there are two gateways, GW1 and GW2 as shown in > Figure 1, for a given egress site and that they each advertise a > route to prefix X, which is located within the egress site with each > setting itself as next hop. One might think that the GWs for X = could > be inferred from the routes' next-hop fields, but typically it is = not > the case that both routes get distributed across the backbone: = rather > only the best route, as selected by BGP, is distributed. This > precludes load-balancing flows across both GWs. >=20 > ----------------- --------------------- > | Ingress | | Egress ------ | > | Site | | Site |Prefix| | > | | | | X | | > | | | ------ | > | -- | | --- --- | > | |GW| | | |GW1| |GW2| | > -------++-------- ----+-----------+-+-- > | \ | / | > | \ | / | > | -+------------- --------+--------+-- | > | ||ASBR| ----| |---- |ASBR| |ASBR| | | > | | ---- |ASBR+------+ASBR| ---- ---- | | > | | ----| |---- | | > | | | | | | > | | ----| |---- | | > | | AS1 |ASBR+------+ASBR| AS2 | | > | | ----| |---- | | > | --------------- -------------------- | > --+-----------------------------------------------+-- > | |ASBR| |ASBR| | > | ---- AS3 ---- | > | | > ----------------------------------------------------- >=20 > Figure 1: Example Site Interconnection >=20 > The obvious solution to this problem is to use the BGP feature that > allows the advertisement of multiple paths in BGP (known as Add- > Paths) ([RFC7911]) to ensure that all routes to X get advertised by > BGP. However, even if this is done, the identity of the GWs will be > lost as soon as the routes get distributed through an ASBR that will > set itself to be the next hop. And if there are multiple ASes in = the > backbone, not only will the next hop change several times, but the > Add-Paths technique will experience scaling issues. This all means > that the Add-Paths approach is effectively limited to sites = connected > over a single AS. >=20 > This document defines a solution that overcomes this limitation and > works equally well with a backbone constructed from one or more ASes > using the Tunnel Encapsulation attribute ([RFC9012]) as follows: >=20 > When a GW to a given site advertises a route to a prefix X within > that site, it will include a Tunnel Encapsulation attribute that > contains the union of the Tunnel Encapsulation attributes > advertised by each of the GWs to that site, including itself. >=20 > In other words, each route advertised by a GW identifies all of the > GWs to the same site (see Section 3 for a discussion of how GWs > discover each other), i.e., the Tunnel Encapsulation attribute > advertised by each GW contains multiple Tunnel TLVs, one or more = from > each active GW, and each Tunnel TLV will contain a Tunnel Egress > Endpoint sub-TLV that identifies the GW for that Tunnel TLV. > Therefore, even if only one of the routes is distributed to other > ASes, it will not matter how many times the next hop changes, as the > Tunnel Encapsulation attribute will remain unchanged. >=20 > To put this in the context of Figure 1, GW1 and GW2 discover each > other as gateways for the egress site. Both GW1 and GW2 advertise > themselves as having routes to prefix X. Furthermore, GW1 includes = a > Tunnel Encapsulation attribute, which is the union of its Tunnel > Encapsulation attribute and GW2's Tunnel Encapsulation attribute. > Similarly, GW2 includes a Tunnel Encapsulation attribute, which is > the union of its Tunnel Encapsulation attribute and GW1's Tunnel > Encapsulation attribute. The gateway in the ingress site can now = see > all possible paths to X in the egress site regardless of which route > is propagated to it, and it can choose one or balance traffic flows > as it sees fit. >=20 > 2. Requirements Language >=20 > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", > "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and > "OPTIONAL" in this document are to be interpreted as described in > BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all > capitals, as shown here. >=20 > 3. Site Gateway Auto-Discovery >=20 > To allow a given site's GWs to auto-discover each other and to > coordinate their operations, the following procedures are > implemented: >=20 > * A route target ([RFC4360]) MUST be attached to each GW's auto- > discovery route (defined below), and its value MUST be set to a > value that indicates the site identifier. The rules for > constructing a route target are detailed in [RFC4360]. It is > RECOMMENDED that a Type x00 or x02 route target be used. >=20 > * Site identifiers are set through configuration. The site > identifiers MUST be the same across all GWs to the site (i.e., = the > same identifier is used by all GWs to the same site) and MUST be > unique across all sites that are connected (i.e., across all GWs > to all sites that are interconnected). >=20 > * Each GW MUST construct an import filtering rule to import any > route that carries a route target with the same site identifier > that the GW itself uses. This means that only these GWs will > import those routes, and that all GWs to the same site will = import > each other's routes and will learn (auto-discover) the current = set > of active GWs for the site. >=20 > The auto-discovery route that each GW advertises consists of the > following: >=20 > * IPv4 or IPv6 Network Layer Reachability Information (NLRI) > ([RFC4760]) containing one of the GW's loopback addresses (that > is, with an AFI/SAFI pair that is one of the following: IPv4/NLRI > used for unicast forwarding (1/1); IPv6/NLRI used for unicast > forwarding (2/1); IPv4/NLRI with MPLS Labels (1/4); or IPv6/NLRI > with MPLS Labels (2/4)). >=20 > * A Tunnel Encapsulation attribute ([RFC9012]) containing the GW's > encapsulation information encoded in one or more Tunnel TLVs. >=20 > To avoid the side effect of applying the Tunnel Encapsulation > attribute to any packet that is addressed to the GW itself, the > address advertised for auto-discovery MUST be a different loopback > address than is advertised for packets directed to the gateway > itself. >=20 > As described in Section 1, each GW will include a Tunnel > Encapsulation attribute with the GW encapsulation information for > each of the site's active GWs (including itself) in every route > advertised externally to that site. As the current set of active = GWs > changes (due to the addition of a new GW or the failure/removal of = an > existing GW), each externally advertised route will be re-advertised > with a new Tunnel Encapsulation attribute, which reflects the = current > set of active GWs. >=20 > If a gateway becomes disconnected from the backbone network, or if > the site operator decides to terminate the gateway's activity, it > MUST withdraw the advertisements described above. This means that > remote gateways at other sites will stop seeing advertisements from > or about this gateway. Note that if the routing within a site is > broken (for example, such that there is a route from one GW to > another but not in the reverse direction), then it is possible that > incoming traffic will be routed to the wrong GW to reach the > destination prefix; in this degraded network situation, traffic may > be dropped. >=20 > Note that if a GW is (mis)configured with a different site = identifier > from the other GWs to the same site, then it will not be auto- > discovered by the other GWs (and will not auto-discover the other > GWs). This would result in a GW for another site receiving only the > Tunnel Encapsulation attribute included in the BGP best route, i.e., > the Tunnel Encapsulation attribute of the (mis)configured GW or that > of the other GWs. >=20 > 4. Relationship to BGP - Link State and Egress Peer Engineering >=20 > When a remote GW receives a route to a prefix X, it uses the Tunnel > Egress Endpoint sub-TLVs in the containing Tunnel Encapsulation > attribute to identify the GWs through which X can be reached. It > uses this information to compute SR Traffic Engineering (SR TE) = paths > across the backbone network looking at the information advertised to > it in SR BGP - Link State (BGP-LS) ([RFC9085]) and correlated using > the site identity. SR Egress Peer Engineering (EPE) ([RFC9086]) can > be used to supplement the information advertised in BGP-LS. >=20 > 5. Advertising a Site Route Externally >=20 > When a packet destined for prefix X is sent on an SR TE path to a GW > for the site containing X (that is, the packet is sent in the = ingress > site on an SR TE path that describes the whole path including those > parts that are within the egress site), it needs to carry the > receiving GW's SID for X such that this SID becomes the next SID = that > is due to be processed before the GW completes its processing of the > packet. To achieve this, each Tunnel TLV in the Tunnel = Encapsulation > attribute contains a Prefix-SID sub-TLV ([RFC9012]) for X. >=20 > As defined in [RFC9012], the Prefix-SID sub-TLV is only for = IPv4/IPV6 > Labeled Unicast routes, so the solution described in this document > only applies to routes of those types. If the use of the Prefix-SID > sub-TLV for routes of other types is defined in the future, further > documents will be needed to describe their use for site > interconnection consistent with this document. >=20 > Alternatively, if MPLS SR is in use and if the GWs for a given = egress > site are configured to allow GWs at remote ingress sites to perform > SR TE through that egress site for a prefix X, then each GW to the > egress site computes an SR TE path through the egress site to X and > places each in an MPLS Label Stack sub-TLV ([RFC9012]) in the SR > Tunnel TLV for that GW. >=20 > Please refer to Section 7 of [SR-INTERCONNECT] for worked examples = of > how the SID stack is constructed in this case and how the > advertisements would work. >=20 > 6. Encapsulation >=20 > If a site is configured to allow remote GWs to send packets to the > site in the site's native encapsulation, then each GW to the site > will also include multiple instances of a Tunnel TLV for that native > encapsulation in externally advertised routes: one for each GW. = Each > Tunnel TLV contains a Tunnel Egress Endpoint sub-TLV with the = address > of the GW that the Tunnel TLV identifies. A remote GW may then > encapsulate a packet according to the rules defined via the sub-TLVs > included in each of the Tunnel TLVs. >=20 > 7. IANA Considerations >=20 > IANA maintains the "BGP Tunnel Encapsulation Attribute Tunnel Types" > registry in the "Border Gateway Protocol (BGP) Tunnel Encapsulation" > registry. >=20 > IANA had previously assigned the value 17 from this subregistry for > "SR Tunnel", referencing this document as an Internet-Draft. At = that > time, the assignment policy for this range of the registry was = "First > Come First Served" [RFC8126]. >=20 > IANA has marked that assignment as deprecated. IANA may reclaim = that > codepoint at such a time that the registry is depleted. >=20 > 8. Security Considerations >=20 > =46rom a protocol point of view, the mechanisms described in this > document can leverage the security mechanisms already defined for > BGP. Further discussion of security considerations for BGP may be > found in the BGP specification itself ([RFC4271]) and in the = security > analysis for BGP ([RFC4272]). The original discussion of the use of > the TCP MD5 signature option to protect BGP sessions is found in > [RFC5925], while [RFC6952] includes an analysis of BGP keying and > authentication issues. >=20 > The mechanisms described in this document involve sharing routing or > reachability information between sites, which may mean disclosing > information that is normally contained within a site. So it needs = to > be understood that normal security paradigms based on the boundaries > of sites are weakened and interception of BGP messages may result in > information being disclosed to third parties. Discussion of these > issues with respect to VPNs can be found in [RFC4364], while > [RFC7926] describes many of the issues associated with the exchange > of topology or TE information between sites. >=20 > Particular exposures resulting from this work include: >=20 > * Gateways to a site will know about all other gateways to the same > site. This feature applies within a site, so it is not a > substantial exposure, but it does mean that if the BGP exchanges > within a site can be snooped or if a gateway can be subverted, > then an attacker may learn the full set of gateways to a site. > This would facilitate more effective attacks on that site. >=20 > * The existence of multiple gateways to a site becomes more visible > across the backbone and even into remote sites. This means that > an attacker is able to prepare a more comprehensive attack than > exists when only the locally attached backbone network (e.g., the > AS that hosts the site) can see all of the gateways to a site. > For example, a Denial-of-Service attack on a single GW is > mitigated by the existence of other GWs, but if the attacker = knows > about all the gateways, then the whole set can be attacked at > once. >=20 > * A node in a site that does not have external BGP peering (i.e., = is > not really a site gateway and cannot speak BGP into the backbone > network) may be able to get itself advertised as a gateway by > letting other genuine gateways discover it (by speaking BGP to > them within the site), so it may get those genuine gateways to > advertise it as a gateway into the backbone network. This would > allow the malicious node to attract traffic without having to = have > secure BGP peerings with out-of-site nodes. >=20 > * An external party intercepting BGP messages anywhere between = sites > may learn information about the functioning of the sites and the > locations of endpoints. While this is not necessarily a > significant security or privacy risk, it is possible that the > disclosure of this information could be used by an attacker. >=20 > * If it is possible to modify a BGP message within the backbone, it > may be possible to spoof the existence of a gateway. This could > cause traffic to be attracted to a specific node and might result > in traffic not being delivered. >=20 > All of the issues in the list above could cause disruption to site > interconnection, but they are not new protocol vulnerabilities so > much as new exposures of information that SHOULD be protected = against > using existing protocol mechanisms such as securing the TCP sessions > over which the BGP messages flow. Furthermore, it is a general > observation that if these attacks are possible, then it is highly > likely that far more significant attacks can be made on the routing > system. It should be noted that BGP peerings are not discovered but > always arise from explicit configuration. >=20 > Given that the gateways and ASBRs are connected by tunnels that may > run across parts of the network that are not trusted, data center > operators using the approach set out in this network MUST consider > using gateway-to-gateway encryption to protect the data center > traffic. Additionally, due consideration MUST be given to = encrypting > end-to-end traffic as it would be for any traffic that uses a public > or untrusted network for transport. >=20 > 9. Manageability Considerations >=20 > The principal configuration item added by this solution is the > allocation of a site identifier. The same identifier MUST be > assigned to every GW to the same site, and each site MUST have a > different identifier. This requires coordination, probably through = a > central management agent. >=20 > It should be noted that BGP peerings are not discovered but always > arise from explicit configuration. This is no different from any > other BGP operation. >=20 > The site identifiers that are configured and carried in route = targets > (see Section 3) are an important feature to ensure that all of the > gateways to a site discover each other. Therefore, it is important > that this value is not misconfigured since that would result in the > gateways not discovering each other and not advertising each other. >=20 > 9.1. Relationship to Route Target Constraint >=20 > In order to limit the VPN routing information that is maintained at = a > given route reflector, [RFC4364] suggests that route reflectors use > "Cooperative Route Filtering", which was renamed "Outbound Route > Filtering" and defined in [RFC5291]. [RFC4684] defines an extension > to that mechanism to include support for multiple autonomous systems > and asymmetric VPN topologies such as hub-and-spoke. The mechanism > in RFC 4684 is known as Route Target Constraint (RTC). >=20 > An operator would not normally configure RTC by default for any AFI/ > SAFI combination and would only enable it after careful > consideration. When using the mechanisms defined in this document, > the operator should carefully consider the effects of filtering > routes. In some cases, this may be desirable, and in others, it > could limit the effectiveness of the procedures. >=20 > 10. References >=20 > 10.1. Normative References >=20 > [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate > Requirement Levels", BCP 14, RFC 2119, > DOI 10.17487/RFC2119, March 1997, > . >=20 > [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A > Border Gateway Protocol 4 (BGP-4)", RFC 4271, > DOI 10.17487/RFC4271, January 2006, > . >=20 > [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended > Communities Attribute", RFC 4360, DOI 10.17487/RFC4360, > February 2006, . >=20 > [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, > "Multiprotocol Extensions for BGP-4", RFC 4760, > DOI 10.17487/RFC4760, January 2007, > . >=20 > [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP > Authentication Option", RFC 5925, DOI 10.17487/RFC5925, > June 2010, . >=20 > [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., = and > S. Ray, "North-Bound Distribution of Link-State and > Traffic Engineering (TE) Information Using BGP", RFC = 7752, > DOI 10.17487/RFC7752, March 2016, > . >=20 > [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC > 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, > May 2017, . >=20 > [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, > "The BGP Tunnel Encapsulation Attribute", RFC 9012, > DOI 10.17487/RFC9012, April 2021, > . >=20 > 10.2. Informative References >=20 > [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", > RFC 4272, DOI 10.17487/RFC4272, January 2006, > . >=20 > [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private > Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, = February > 2006, . >=20 > [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, > R., Patel, K., and J. Guichard, "Constrained Route > Distribution for Border Gateway Protocol/MultiProtocol > Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual > Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, > November 2006, . >=20 > [RFC5291] Chen, E. and Y. Rekhter, "Outbound Route Filtering > Capability for BGP-4", RFC 5291, DOI 10.17487/RFC5291, > August 2008, . >=20 > [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of > BGP, LDP, PCEP, and MSDP Issues According to the Keying > and Authentication for Routing Protocols (KARP) Design > Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, > . >=20 > [RFC7911] Walton, D., Retana, A., Chen, E., and J. Scudder, > "Advertisement of Multiple Paths in BGP", RFC 7911, > DOI 10.17487/RFC7911, July 2016, > . >=20 > [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., > Ceccarelli, D., and X. Zhang, "Problem Statement and > Architecture for Information Exchange between > Interconnected Traffic-Engineered Networks", BCP 206, > RFC 7926, DOI 10.17487/RFC7926, July 2016, > . >=20 > [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for > Writing an IANA Considerations Section in RFCs", BCP 26, > RFC 8126, DOI 10.17487/RFC8126, June 2017, > . >=20 > [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., > Decraene, B., Litkowski, S., and R. Shakir, "Segment > Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, > July 2018, . >=20 > [RFC9085] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Gredler, > H., and M. Chen, "Border Gateway Protocol - Link State > (BGP-LS) Extensions for Segment Routing", RFC 9085, > DOI 10.17487/RFC9085, August 2021, > . >=20 > [RFC9086] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Patel, = K., > Ray, S., and J. Dong, "Border Gateway Protocol - Link > State (BGP-LS) Extensions for Segment Routing BGP Egress > Peer Engineering", RFC 9086, DOI 10.17487/RFC9086, August > 2021, . >=20 > [SR-INTERCONNECT] > Farrel, A. and J. Drake, "Interconnection of Segment > Routing Sites - Problem Statement and Solution = Landscape", > Work in Progress, Internet-Draft, draft-farrel-spring-sr- > domain-interconnect-06, 19 May 2021, > spring-sr-domain-interconnect-06>. >=20 > Acknowledgements >=20 > Thanks to Bruno Rijsman, Stephane Litkowski, Boris Hassanov, Linda > Dunbar, Ravi Singh, and Daniel Migault for review comments, and to > Robert Raszuk for useful discussions. Gyan Mishra provided a = helpful > GenArt review, and John Scudder and Benjamin Kaduk made helpful > comments during IESG review. >=20 > Authors' Addresses >=20 > Adrian Farrel > Old Dog Consulting >=20 > Email: adrian@olddog.co.uk >=20 >=20 > John Drake > Juniper Networks >=20 > Email: jdrake@juniper.net >=20 >=20 > Eric Rosen > Juniper Networks >=20 > Email: erosen52@gmail.com >=20 >=20 > Keyur Patel > Arrcus, Inc. >=20 > Email: keyur@arrcus.com >=20 >=20 > Luay Jalil > Verizon >=20 > Email: luay.jalil@verizon.com >=20 > Corrected Text > -------------- >=20 >=20 >=20 >=20 > Internet Engineering Task Force (IETF) A. = Farrel > Request for Comments: 9125 Old Dog = Consulting > Category: Standards Track J. = Drake > ISSN: 2070-1721 E. = Rosen > Juniper = Networks > K. = Patel > Arrcus, = Inc. > L. = Jalil > = Verizon > August = 2021 >=20 >=20 > Gateway Auto-Discovery and Route Advertisement for Site = Interconnection > Using Segment Routing >=20 > Abstract >=20 > Data centers are attached to the Internet or a backbone network by > gateway routers. One data center typically has more than one = gateway > for commercial, load-balancing, and resiliency reasons. Other = sites, > such as access networks, also need to be connected across backbone > networks through gateways. >=20 > This document defines a mechanism using the BGP Tunnel Encapsulation > attribute to allow data center gateway routers to advertise routes = to > the prefixes reachable in the site, including advertising them on > behalf of other gateways at the same site. This allows segment > routing to be used to identify multiple paths across the Internet or > backbone network between different gateways. The paths can be > selected for load-balancing, resilience, and quality purposes. >=20 > Status of This Memo >=20 > This is an Internet Standards Track document. >=20 > This document is a product of the Internet Engineering Task Force > (IETF). It represents the consensus of the IETF community. It has > received public review and has been approved for publication by the > Internet Engineering Steering Group (IESG). Further information on > Internet Standards is available in Section 2 of RFC 7841. >=20 > Information about the current status of this document, any errata, > and how to provide feedback on it may be obtained at > https://www.rfc-editor.org/info/rfc9125. >=20 > Copyright Notice >=20 > Copyright (c) 2021 IETF Trust and the persons identified as the > document authors. All rights reserved. >=20 > This document is subject to BCP 78 and the IETF Trust's Legal > Provisions Relating to IETF Documents > (https://trustee.ietf.org/license-info) in effect on the date of > publication of this document. Please review these documents > carefully, as they describe your rights and restrictions with = respect > to this document. Code Components extracted from this document must > include Simplified BSD License text as described in Section 4.e of > the Trust Legal Provisions and are provided without warranty as > described in the Simplified BSD License. >=20 > Table of Contents >=20 > 1. Introduction > 2. Requirements Language > 3. Site Gateway Auto-Discovery > 4. Relationship to BGP - Link State and Egress Peer Engineering > 5. Advertising a Site Route Externally > 6. Encapsulation > 7. IANA Considerations > 8. Security Considerations > 9. Manageability Considerations > 9.1. Relationship to Route Target Constraint > 10. References > 10.1. Normative References > 10.2. Informative References > Acknowledgements > Authors' Addresses >=20 > 1. Introduction >=20 > Data centers (DCs) are critical components of the infrastructure = used > by network operators to provide services to their customers. DCs > (sites) are interconnected by a backbone network, which consists of > any number of private networks and/or the Internet. DCs are = attached > to the backbone network by routers that are gateways (GWs). One DC > typically has more than one GW for various reasons including > commercial preferences, load balancing, or resiliency against > connection or device failure. >=20 > Segment Routing (SR) ([RFC8402]) is a protocol mechanism that can be > used within a DC as well as for steering traffic that flows between > two DC sites. In order for a source site (also known as an ingress > site) that uses SR to load-balance the flows it sends to a > destination site (also known as an egress site), it needs to know = the > complete set of entry nodes (i.e., GWs) for that egress DC from the > backbone network connecting the two DCs. Note that it is assumed > that the connected set of DC sites and the border nodes in the > backbone network on the paths that connect the DC sites are part of > the same SR BGP - Link State (LS) instance (see [RFC7752] and > [RFC9086]) so that traffic engineering using SR may be used for = these > flows. >=20 > Other sites, such as access networks, also need to be connected > across backbone networks through gateways. For illustrative > purposes, consider the ingress and egress sites shown in Figure 1 as > separate Autonomous Systems (ASes) (noting that the sites could be > implemented as part of the ASes to which they are attached, or as > separate ASes). The various ASes that provide connectivity between > the ingress and egress sites could each be constructed differently > and use different technologies such as IP; MPLS using global table > routing information from BGP; MPLS IP VPN; SR-MPLS IP VPN; or SRv6 = IP > VPN. That is, the ingress and egress sites can be connected by > tunnels across a variety of technologies. This document describes > how SR Segment Identifiers (SIDs) are used to identify the paths > between the ingress and egress sites. >=20 > The solution described in this document is agnostic as to whether = the > transit ASes do or do not have SR capabilities. The solution uses = SR > to stitch together path segments between GWs and through the > Autonomous System Border Routers (ASBRs). Thus, there is a > requirement that the GWs and ASBRs are SR capable. The solution > supports the SR path being extended into the ingress and egress = sites > if they are SR capable. >=20 > The solution defined in this document can be seen in the broader > context of site interconnection in [SR-INTERCONNECT]. That document > shows how other existing protocol elements may be combined with the > solution defined in this document to provide a full system, but it = is > not a necessary reference for understanding this document. >=20 > Suppose that there are two gateways, GW1 and GW2 as shown in > Figure 1, for a given egress site and that they each advertise a > route to prefix X, which is located within the egress site with each > setting itself as next hop. One might think that the GWs for X = could > be inferred from the routes' next-hop fields, but typically it is = not > the case that both routes get distributed across the backbone: = rather > only the best route, as selected by BGP, is distributed. This > precludes load-balancing flows across both GWs. >=20 > ----------------- --------------------- > | Ingress | | Egress ------ | > | Site | | Site |Prefix| | > | | | | X | | > | | | ------ | > | -- | | --- --- | > | |GW| | | |GW1| |GW2| | > -------++-------- ----+-----------+-+-- > | \ | / | > | \ | / | > | -+------------- --------+--------+-- | > | ||ASBR| ----| |---- |ASBR| |ASBR| | | > | | ---- |ASBR+------+ASBR| ---- ---- | | > | | ----| |---- | | > | | | | | | > | | ----| |---- | | > | | AS1 |ASBR+------+ASBR| AS2 | | > | | ----| |---- | | > | --------------- -------------------- | > --+-----------------------------------------------+-- > | |ASBR| |ASBR| | > | ---- AS3 ---- | > | | > ----------------------------------------------------- >=20 > Figure 1: Example Site Interconnection >=20 > The obvious solution to this problem is to use the BGP feature that > allows the advertisement of multiple paths in BGP (known as Add- > Paths) ([RFC7911]) to ensure that all routes to X get advertised by > BGP. However, even if this is done, the identity of the GWs will be > lost as soon as the routes get distributed through an ASBR that will > set itself to be the next hop. And if there are multiple ASes in = the > backbone, not only will the next hop change several times, but the > Add-Paths technique will experience scaling issues. This all means > that the Add-Paths approach is effectively limited to sites = connected > over a single AS. >=20 > This document defines a solution that overcomes this limitation and > works equally well with a backbone constructed from one or more ASes > using the Tunnel Encapsulation attribute ([RFC9012]) as follows: >=20 > When a GW to a given site advertises a route to a prefix X within > that site, it will include a Tunnel Encapsulation attribute that > contains the union of the Tunnel Encapsulation attributes > advertised by each of the GWs to that site, including itself. >=20 > In other words, each route advertised by a GW identifies all of the > GWs to the same site (see Section 3 for a discussion of how GWs > discover each other), i.e., the Tunnel Encapsulation attribute > advertised by each GW contains multiple Tunnel TLVs, one or more = from > each active GW, and each Tunnel TLV will contain a Tunnel Egress > Endpoint sub-TLV that identifies the GW for that Tunnel TLV. > Therefore, even if only one of the routes is distributed to other > ASes, it will not matter how many times the next hop changes, as the > Tunnel Encapsulation attribute will remain unchanged. >=20 > To put this in the context of Figure 1, GW1 and GW2 discover each > other as gateways for the egress site. Both GW1 and GW2 advertise > themselves as having routes to prefix X. Furthermore, GW1 includes = a > Tunnel Encapsulation attribute, which is the union of its Tunnel > Encapsulation attribute and GW2's Tunnel Encapsulation attribute. > Similarly, GW2 includes a Tunnel Encapsulation attribute, which is > the union of its Tunnel Encapsulation attribute and GW1's Tunnel > Encapsulation attribute. The gateway in the ingress site can now = see > all possible paths to X in the egress site regardless of which route > is propagated to it, and it can choose one or balance traffic flows > as it sees fit. >=20 > 2. Requirements Language >=20 > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", > "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and > "OPTIONAL" in this document are to be interpreted as described in > BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all > capitals, as shown here. >=20 > 3. Site Gateway Auto-Discovery >=20 > To allow a given site's GWs to auto-discover each other and to > coordinate their operations, the following procedures are > implemented: >=20 > * A route target ([RFC4360]) MUST be attached to each GW's auto- > discovery route (defined below), and its value MUST be set to a > value that indicates the site identifier. The rules for > constructing a route target are detailed in [RFC4360]. It is > RECOMMENDED that a Type x00 or x02 route target be used. >=20 > * Site identifiers are set through configuration. The site > identifiers MUST be the same across all GWs to the site (i.e., = the > same identifier is used by all GWs to the same site) and MUST be > unique across all sites that are connected (i.e., across all GWs > to all sites that are interconnected). >=20 > * Each GW MUST construct an import filtering rule to import any > route that carries a route target with the same site identifier > that the GW itself uses. This means that only these GWs will > import those routes, and that all GWs to the same site will = import > each other's routes and will learn (auto-discover) the current = set > of active GWs for the site. >=20 > The auto-discovery route that each GW advertises consists of the > following: >=20 > * IPv4 or IPv6 Network Layer Reachability Information (NLRI) > ([RFC4760]) containing one of the GW's loopback addresses (that > is, with an AFI/SAFI pair that is one of the following: IPv4/NLRI > used for unicast forwarding (1/1); IPv6/NLRI used for unicast > forwarding (2/1); IPv4/NLRI with MPLS Labels (1/4); or IPv6/NLRI > with MPLS Labels (2/4)). >=20 > * A Tunnel Encapsulation attribute ([RFC9012]) containing the GW's > encapsulation information encoded in one or more Tunnel TLVs. >=20 > To avoid the side effect of applying the Tunnel Encapsulation > attribute to any packet that is addressed to the GW itself, the > address advertised for auto-discovery MUST be a different loopback > address than is advertised for packets directed to the gateway > itself. >=20 > As described in Section 1, each GW will include a Tunnel > Encapsulation attribute with the GW encapsulation information for > each of the site's active GWs (including itself) in every route > advertised externally to that site. As the current set of active = GWs > changes (due to the addition of a new GW or the failure/removal of = an > existing GW), each externally advertised route will be re-advertised > with a new Tunnel Encapsulation attribute, which reflects the = current > set of active GWs. >=20 > If a gateway becomes disconnected from the backbone network, or if > the site operator decides to terminate the gateway's activity, it > MUST withdraw the advertisements described above. This means that > remote gateways at other sites will stop seeing advertisements from > or about this gateway. Note that if the routing within a site is > broken (for example, such that there is a route from one GW to > another but not in the reverse direction), then it is possible that > incoming traffic will be routed to the wrong GW to reach the > destination prefix; in this degraded network situation, traffic may > be dropped. >=20 > Note that if a GW is (mis)configured with a different site = identifier > from the other GWs to the same site, then it will not be auto- > discovered by the other GWs (and will not auto-discover the other > GWs). This would result in a GW for another site receiving only the > Tunnel Encapsulation attribute included in the BGP best route, i.e., > the Tunnel Encapsulation attribute of the (mis)configured GW or that > of the other GWs. >=20 > 4. Relationship to BGP - Link State and Egress Peer Engineering >=20 > When a remote GW receives a route to a prefix X, it uses the Tunnel > Egress Endpoint sub-TLVs in the containing Tunnel Encapsulation > attribute to identify the GWs through which X can be reached. It > uses this information to compute SR Traffic Engineering (SR TE) = paths > across the backbone network looking at the information advertised to > it in SR BGP - Link State (BGP-LS) ([RFC9085]) and correlated using > the site identity. SR Egress Peer Engineering (EPE) ([RFC9086]) can > be used to supplement the information advertised in BGP-LS. >=20 > 5. Advertising a Site Route Externally >=20 > When a packet destined for prefix X is sent on an SR TE path to a GW > for the site containing X (that is, the packet is sent in the = ingress > site on an SR TE path that describes the whole path including those > parts that are within the egress site), it needs to carry the > receiving GW's SID for X such that this SID becomes the next SID = that > is due to be processed before the GW completes its processing of the > packet. To achieve this, each Tunnel TLV in the Tunnel = Encapsulation > attribute contains a Prefix-SID sub-TLV ([RFC9012]) for X. >=20 > As defined in [RFC9012], the Prefix-SID sub-TLV is only for = IPv4/IPV6 > Labeled Unicast routes, so the solution described in this document > only applies to routes of those types. If the use of the Prefix-SID > sub-TLV for routes of other types is defined in the future, further > documents will be needed to describe their use for site > interconnection consistent with this document. >=20 > Alternatively, if MPLS SR is in use and if the GWs for a given = egress > site are configured to allow GWs at remote ingress sites to perform > SR TE through that egress site for a prefix X, then each GW to the > egress site computes an SR TE path through the egress site to X and > places each in an MPLS Label Stack sub-TLV ([RFC9012]) in the SR > Tunnel TLV for that GW. >=20 > Please refer to Section 7 of [SR-INTERCONNECT] for worked examples = of > how the SID stack is constructed in this case and how the > advertisements would work. >=20 > 6. Encapsulation >=20 > If a site is configured to allow remote GWs to send packets to the > site in the site's native encapsulation, then each GW to the site > will also include multiple instances of a Tunnel TLV for that native > encapsulation in externally advertised routes: one for each GW. = Each > Tunnel TLV contains a Tunnel Egress Endpoint sub-TLV with the = address > of the GW that the Tunnel TLV identifies. A remote GW may then > encapsulate a packet according to the rules defined via the sub-TLVs > included in each of the Tunnel TLVs. >=20 > 7. IANA Considerations >=20 > IANA maintains the "BGP Tunnel Encapsulation Attribute Tunnel Types" > registry in the "Border Gateway Protocol (BGP) Tunnel Encapsulation" > registry. >=20 > IANA had previously assigned the value 17 from this subregistry for > "SR Tunnel", referencing this document as an Internet-Draft. At = that > time, the assignment policy for this range of the registry was = "First > Come First Served" [RFC8126]. >=20 > IANA has marked that assignment as deprecated. IANA may reclaim = that > codepoint at such a time that the registry is depleted. >=20 > 8. Security Considerations >=20 > =46rom a protocol point of view, the mechanisms described in this > document can leverage the security mechanisms already defined for > BGP. Further discussion of security considerations for BGP may be > found in the BGP specification itself ([RFC4271]) and in the = security > analysis for BGP ([RFC4272]). The original discussion of the use of > the TCP MD5 signature option to protect BGP sessions is found in > [RFC5925], while [RFC6952] includes an analysis of BGP keying and > authentication issues. >=20 > The mechanisms described in this document involve sharing routing or > reachability information between sites, which may mean disclosing > information that is normally contained within a site. So it needs = to > be understood that normal security paradigms based on the boundaries > of sites are weakened and interception of BGP messages may result in > information being disclosed to third parties. Discussion of these > issues with respect to VPNs can be found in [RFC4364], while > [RFC7926] describes many of the issues associated with the exchange > of topology or TE information between sites. >=20 > Particular exposures resulting from this work include: >=20 > * Gateways to a site will know about all other gateways to the same > site. This feature applies within a site, so it is not a > substantial exposure, but it does mean that if the BGP exchanges > within a site can be snooped or if a gateway can be subverted, > then an attacker may learn the full set of gateways to a site. > This would facilitate more effective attacks on that site. >=20 > * The existence of multiple gateways to a site becomes more visible > across the backbone and even into remote sites. This means that > an attacker is able to prepare a more comprehensive attack than > exists when only the locally attached backbone network (e.g., the > AS that hosts the site) can see all of the gateways to a site. > For example, a Denial-of-Service attack on a single GW is > mitigated by the existence of other GWs, but if the attacker = knows > about all the gateways, then the whole set can be attacked at > once. >=20 > * A node in a site that does not have external BGP peering (i.e., = is > not really a site gateway and cannot speak BGP into the backbone > network) may be able to get itself advertised as a gateway by > letting other genuine gateways discover it (by speaking BGP to > them within the site), so it may get those genuine gateways to > advertise it as a gateway into the backbone network. This would > allow the malicious node to attract traffic without having to = have > secure BGP peerings with out-of-site nodes. >=20 > * An external party intercepting BGP messages anywhere between = sites > may learn information about the functioning of the sites and the > locations of endpoints. While this is not necessarily a > significant security or privacy risk, it is possible that the > disclosure of this information could be used by an attacker. >=20 > * If it is possible to modify a BGP message within the backbone, it > may be possible to spoof the existence of a gateway. This could > cause traffic to be attracted to a specific node and might result > in traffic not being delivered. >=20 > All of the issues in the list above could cause disruption to site > interconnection, but they are not new protocol vulnerabilities so > much as new exposures of information that SHOULD be protected = against > using existing protocol mechanisms such as securing the TCP sessions > over which the BGP messages flow. Furthermore, it is a general > observation that if these attacks are possible, then it is highly > likely that far more significant attacks can be made on the routing > system. It should be noted that BGP peerings are not discovered but > always arise from explicit configuration. >=20 > Given that the gateways and ASBRs are connected by tunnels that may > run across parts of the network that are not trusted, data center > operators using the approach set out in this network MUST consider > using gateway-to-gateway encryption to protect the data center > traffic. Additionally, due consideration MUST be given to = encrypting > end-to-end traffic as it would be for any traffic that uses a public > or untrusted network for transport. >=20 > 9. Manageability Considerations >=20 > The principal configuration item added by this solution is the > allocation of a site identifier. The same identifier MUST be > assigned to every GW to the same site, and each site MUST have a > different identifier. This requires coordination, probably through = a > central management agent. >=20 > It should be noted that BGP peerings are not discovered but always > arise from explicit configuration. This is no different from any > other BGP operation. >=20 > The site identifiers that are configured and carried in route = targets > (see Section 3) are an important feature to ensure that all of the > gateways to a site discover each other. Therefore, it is important > that this value is not misconfigured since that would result in the > gateways not discovering each other and not advertising each other. >=20 > 9.1. Relationship to Route Target Constraint >=20 > In order to limit the VPN routing information that is maintained at = a > given route reflector, [RFC4364] suggests that route reflectors use > "Cooperative Route Filtering", which was renamed "Outbound Route > Filtering" and defined in [RFC5291]. [RFC4684] defines an extension > to that mechanism to include support for multiple autonomous systems > and asymmetric VPN topologies such as hub-and-spoke. The mechanism > in RFC 4684 is known as Route Target Constraint (RTC). >=20 > An operator would not normally configure RTC by default for any AFI/ > SAFI combination and would only enable it after careful > consideration. When using the mechanisms defined in this document, > the operator should carefully consider the effects of filtering > routes. In some cases, this may be desirable, and in others, it > could limit the effectiveness of the procedures. >=20 > 10. References >=20 > 10.1. Normative References >=20 > [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate > Requirement Levels", BCP 14, RFC 2119, > DOI 10.17487/RFC2119, March 1997, > . >=20 > [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A > Border Gateway Protocol 4 (BGP-4)", RFC 4271, > DOI 10.17487/RFC4271, January 2006, > . >=20 > [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended > Communities Attribute", RFC 4360, DOI 10.17487/RFC4360, > February 2006, . >=20 > [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, > "Multiprotocol Extensions for BGP-4", RFC 4760, > DOI 10.17487/RFC4760, January 2007, > . >=20 > [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP > Authentication Option", RFC 5925, DOI 10.17487/RFC5925, > June 2010, . >=20 > [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., = and > S. Ray, "North-Bound Distribution of Link-State and > Traffic Engineering (TE) Information Using BGP", RFC = 7752, > DOI 10.17487/RFC7752, March 2016, > . >=20 > [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC > 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, > May 2017, . >=20 > [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, > "The BGP Tunnel Encapsulation Attribute", RFC 9012, > DOI 10.17487/RFC9012, April 2021, > . >=20 > 10.2. Informative References >=20 > [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", > RFC 4272, DOI 10.17487/RFC4272, January 2006, > . >=20 > [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private > Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, = February > 2006, . >=20 > [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, > R., Patel, K., and J. Guichard, "Constrained Route > Distribution for Border Gateway Protocol/MultiProtocol > Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual > Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, > November 2006, . >=20 > [RFC5291] Chen, E. and Y. Rekhter, "Outbound Route Filtering > Capability for BGP-4", RFC 5291, DOI 10.17487/RFC5291, > August 2008, . >=20 > [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of > BGP, LDP, PCEP, and MSDP Issues According to the Keying > and Authentication for Routing Protocols (KARP) Design > Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, > . >=20 > [RFC7911] Walton, D., Retana, A., Chen, E., and J. Scudder, > "Advertisement of Multiple Paths in BGP", RFC 7911, > DOI 10.17487/RFC7911, July 2016, > . >=20 > [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., > Ceccarelli, D., and X. Zhang, "Problem Statement and > Architecture for Information Exchange between > Interconnected Traffic-Engineered Networks", BCP 206, > RFC 7926, DOI 10.17487/RFC7926, July 2016, > . >=20 > [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for > Writing an IANA Considerations Section in RFCs", BCP 26, > RFC 8126, DOI 10.17487/RFC8126, June 2017, > . >=20 > [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., > Decraene, B., Litkowski, S., and R. Shakir, "Segment > Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, > July 2018, . >=20 > [RFC9085] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Gredler, > H., and M. Chen, "Border Gateway Protocol - Link State > (BGP-LS) Extensions for Segment Routing", RFC 9085, > DOI 10.17487/RFC9085, August 2021, > . >=20 > [RFC9086] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Patel, = K., > Ray, S., and J. Dong, "Border Gateway Protocol - Link > State (BGP-LS) Extensions for Segment Routing BGP Egress > Peer Engineering", RFC 9086, DOI 10.17487/RFC9086, August > 2021, . >=20 > [SR-INTERCONNECT] > Farrel, A. and J. Drake, "Interconnection of Segment > Routing Sites - Problem Statement and Solution = Landscape", > Work in Progress, Internet-Draft, draft-farrel-spring-sr- > domain-interconnect-06, 19 May 2021, > spring-sr-domain-interconnect-06>. >=20 > Acknowledgements >=20 > Thanks to Bruno Rijsman, Stephane Litkowski, Boris Hassanov, Linda > Dunbar, Ravi Singh, and Daniel Migault for review comments, and to > Robert Raszuk for useful discussions. Gyan Mishra provided a = helpful > GenArt review, and John Scudder and Benjamin Kaduk made helpful > comments during IESG review. >=20 > Authors' Addresses >=20 > OG R4 > Old Dog Consulting >=20 > Email: og.r4@protonmail.com >=20 >=20 > John Drace > Juniper Networks >=20 > Email: jdrake@juniper.net >=20 >=20 > Eric Rossen > Juniper Networks >=20 > Email: erosen52@gmail.com >=20 >=20 > Keyur Pattel > Arrcus, Inc. >=20 > Email: keyur@arrcus.com >=20 >=20 > Luay Jaloil > Verizon >=20 > Email: luay.jalil@verizon.com >=20 > Notes > ----- > audit >=20 > Instructions: > ------------- > This erratum is currently posted as "Reported". If necessary, please > use "Reply All" to discuss whether it should be verified or > rejected. When a decision is reached, the verifying party =20 > can log in to change the status and edit the report, if necessary.=20 >=20 > -------------------------------------- > RFC9125 (draft-ietf-bess-datacenter-gateway-13) > -------------------------------------- > Title : Gateway Auto-Discovery and Route Advertisement = for Site Interconnection Using Segment Routing > Publication Date : August 2021 > Author(s) : A. Farrel, J. Drake, E. Rosen, K. Patel, L. = Jalil > Category : PROPOSED STANDARD > Source : BGP Enabled Services > Area : Routing > Stream : IETF > Verifying Party : IESG >=20 From nobody Tue Aug 31 11:33:57 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CB483A0A22; Tue, 31 Aug 2021 11:33:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.45 X-Spam-Level: X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=aoGHMer7; dkim=pass (1024-bit key) header.d=juniper.net header.b=MtgfWrFW Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8sHQkpf1ty3m; Tue, 31 Aug 2021 11:33:38 -0700 (PDT) Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAEB13A0A1F; Tue, 31 Aug 2021 11:33:37 -0700 (PDT) Received: from pps.filterd (m0108159.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.1.2/8.16.0.43) with SMTP id 17VGj3Pv008256; Tue, 31 Aug 2021 11:33:37 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=Z9zLuMIjIIY+UoUUn2n+P0h4axVc5DjOFUeK48b6DFI=; b=aoGHMer77y7FK+h0R+jKdnJLEfvCxo9xLbTBdE6E67jK5XbsokVmXReHISuUlaeHqTco 5XvDfSJN5m168VYR/fz+4yGl29IZuQqW6fKbCyMgwLNHrdGDPa5ZasSFmu+yuU4RhmeX FMFckbvKyUYiqyWf7GM+UArvQqahHWQ/nbRdDpPLGRoSJIV5QFQWeDv9BTChKQxYN1QM xq7Y+S/uYqccxGI7/ER5AnN/1EwWTyFcr37/7BUf0QWe0omy12LrSxc5gH+x6+N9Kx/2 U3vBqCLHg0DmAZgMgGrr+BWjZXg3AbH/0QwkkpIu4GeulYIiPdmyXTaClQspuHHebPWA 5w== Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2103.outbound.protection.outlook.com [104.47.70.103]) by mx0a-00273201.pphosted.com with ESMTP id 3asfpthqub-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 31 Aug 2021 11:33:36 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AR4WDsR8MJ1HWfUPkZ/lZJ6lVVC2cD8i7ln7PQc3DTYprygGIAu44ffvAxRAB2o+NR9XA7PvvMqQjmLo8wyTAeQktAiyeDl1g7VmDxFL6vqhJJMEY98Z685j3b+c1xk7CY+VgHqlaLNyFoxJabkMAOBTxnbUo3xMZM/aF8aYA4yzAzf8oWBdFkVs0rJF2LwvszdX4SfZCBZxs+HgXcC4NJyd0hNUW8dLTqcGeGKaWZcC2R6WlAYT8m1apvC4S0bKiNiesTUzPurEINHpw+IJa1JVqPKL9PeTcKhwfF//o1koimmobaQH7vX0px5ML+auxhOaA6fyG/l+rzRaYPLv7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Z9zLuMIjIIY+UoUUn2n+P0h4axVc5DjOFUeK48b6DFI=; b=Yzbe/MX5vBkV2bYC554UCmM5OJSlzUhawwJH3wFZl43CAd3NemECreFeKBBdWvjou5sZx7EHfVWMTf4JTfF/EW0CT8mpb/hmdEH2AUIGwp2jBmawstCthSU2nen29Y53QeRBAM0fJfNZA/N/spiRzfMdhHXDezSCDj3UcWB6GPJ7gbhT7fTh5JmECumW8uwZ6QfIZsYSDjxk/jnuDjR/IYdMWmYW5YKwTDfG5/jeAPj1IsgWb6rs++e6/ryvn0/Snpl5Y9Ph0jNJhC3VHv9q8PTK9ctmYq3Q08m3IMDpgn1WOI4ylw4337iBhaXOtJ5Guxmez4km90o/c13R3pU4Ag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z9zLuMIjIIY+UoUUn2n+P0h4axVc5DjOFUeK48b6DFI=; b=MtgfWrFWoAyYCnWJvj/8raCusTYKymw98xPhqfhSCEZXUmf8MH7i3e94gR0OFeI2XCJjDcAt11iKkHVNR5TvrmOng1ZS/dAHtCsXxEEQZ1W4OrKHMHSovoZOxz8gVTFwMdeKGC0rthWK9Yymk+aCvcgCHposTrrsxujJi0XWdqA= Received: from CO1PR05MB8088.namprd05.prod.outlook.com (2603:10b6:303:f3::23) by CO1PR05MB8266.namprd05.prod.outlook.com (2603:10b6:303:fd::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.14; Tue, 31 Aug 2021 18:33:34 +0000 Received: from CO1PR05MB8088.namprd05.prod.outlook.com ([fe80::24d5:c8ef:b797:8b68]) by CO1PR05MB8088.namprd05.prod.outlook.com ([fe80::24d5:c8ef:b797:8b68%5]) with mapi id 15.20.4478.019; Tue, 31 Aug 2021 18:33:34 +0000 From: John E Drake To: "Ali Sajassi (sajassi)" , "Bocci, Matthew (Nokia - GB)" , "bess@ietf.org" , "draft-ietf-bess-evpn-lsp-ping@ietf.org" Thread-Topic: Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 Thread-Index: AQHXjSHrLk5K96Ha502EnoU7V5R926uIQapSgAXRZSA= Date: Tue, 31 Aug 2021 18:33:34 +0000 Message-ID: References: <0B5439E0-0204-4AF2-ACAC-CFB0CE884712@nokia.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.6.100.41 dlp-reaction: no-action msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2021-08-31T18:33:32Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=d5a833a5-cf26-498d-9196-297eff0812f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=2 authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none; dmarc.ietf.org; dmarc=none action=none header.from=juniper.net; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: a714c907-9a4c-47ec-1ebf-08d96cadd70f x-ms-traffictypediagnostic: CO1PR05MB8266: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: vYU5CxpXOKTJ0D4ZwnpomzzKJSXmRrVXKjS+hURCS5FnLUeeBYGuOsexbMwKKvf3FWuSI7t33eknHK29Vx7K0TpMye0FJvQTqk421caMmuDySPamZ96+lASQ23JK9FsDDAfDkETSqqyvWHUnPr3Sd47xvX6/SW4Q9bUe56YWbe0yWBgfLa/CwvBF1LrMtclW3SWBt65kOWhhgOeOK7AGvr9xzImPwcTZBhq0Wm5B8r/ZqeGy0jpQ/mf41muYvcfHf9TqEe2cFWxW3lsCHcek+zZTxvdsF/+x29Jyc57YNqiZ7q94luS6+KPboi5oTGR61Fqn3KELmu3DpS/PSl32krrU3c16mXND+t7eYYrL/bpvET8toU5V+PSenvPhxABToB/agtuo5ZC2gxCE/d8S76joU7zCKXPpJFEF6E3QD45DTySxDoJ6CFVfibyh0/QPP676eXHxJMWKP8LVkKLJVjNHrkYzLKvvopQRTB5iz2tiEC6t0KFKFV2M3EYkJlGVg2K/mbmRUfGgUmeOA51UdqVszJ7jhAHi2RqALEZ4SahoVOs31R3CNV0L5b0UxDtjg4zSvcoJTVuvKlsoByP/Gk77q8bMxjfB/as+KXMqJCsxyLtT6IOkPn1WB6z6JTKLHzWyDStsqrRw8XHJusg4bnh70IhrjV5xKIn4AOhcyvf5cJPL3FhVDkpPnV0wvAjaHVtnYEmn1PD2CeNGbdg7H6w+vx2tEDsrrd1k4uHLn3ts5o+WWSH5nuRmTEBaeXmL08UAvkQ1qlMqV3EYkE7ITg2912oHwVJhh2INKu1c6Xb1aMn/b7/1FfR8FdpT5Jq6f4YCc4oLem7uRzIZ88m89w== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR05MB8088.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(110136005)(71200400001)(2906002)(66946007)(508600001)(316002)(9326002)(26005)(52536014)(66574015)(38070700005)(83380400001)(66446008)(64756008)(66556008)(76116006)(66476007)(8936002)(966005)(33656002)(166002)(122000001)(9686003)(55016002)(38100700002)(86362001)(5660300002)(7696005)(6506007)(53546011)(186003)(8676002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Mk9jQ3JYM3dIMnNTTGtmVFh5b2E4TDNoOENkdjNNNVQrYU5wUWJ2ckVzMCs1?= =?utf-8?B?WlFOYUFtQzAzZ1dzL0UxaEM0WldST1RJZ3JaL08wYnVoSWRWZ0tSa0JLZ3Ju?= =?utf-8?B?b3NZMG9Nb3huVXRzL0F0T2JWNk9heWUzTklPSkErVzBOeGJBSnJzVEg0MkVE?= =?utf-8?B?RkY1aUdudDlVd1pGd0tLSDkzNTdTaWwzNklJUVkrWmdOT3IyTnZneWM0RnNZ?= =?utf-8?B?emNXd1pBVjBXY3NQdzRjSjBLU3gvRW9HYWJmQ0YwVlJvbSt1elJTZzZTVGcv?= =?utf-8?B?QWRTZmdMdDAzTDBLZmFlK3JWemZvUXRGRUplaUE0ajluUllOamxUV1NWZjBm?= =?utf-8?B?VStiYzJqd3FsNkhzUnhHR3JGT1RucmZPNzVYUTduOGFGS1ExQWMyeVlzUUVC?= =?utf-8?B?bnRRWWJmdDIydER4OSsyT0JmQ3VTZTZyenBwUFNPdXl6Nk53bHJ5SjcrZk45?= =?utf-8?B?VGNpRnZVTGI3bWVwYnB1VVA4cnI2U0VjbWxuVU1iMDYxd25yZGl0K3luYjJV?= =?utf-8?B?Ni9YUGViMk91SWsvdW9INlYxSXpLWjE2THNuUmZJdzIxZ0pnM2V1Qi9sQTVL?= =?utf-8?B?UlNXU0F1b3IrMHpmeGk1eDEvZ2wxdFBSUmd3L1ZPQlJsS0FQQlZDODJGQzJG?= =?utf-8?B?N2x5eXNQekpVNjZhV1dmViszaVVVS3h4ODQ2c0FzT0puRVZQWXY0YzNXS1lz?= =?utf-8?B?Uk5QNzlCT1VncjJ6bVlrR1o1Vk1jcXNZUG02S25yMWpjc3FhbkRPbWx6bVFo?= =?utf-8?B?MnI5TXRXUjhhYlpoYk9XaFF2NFYyZ01BSXlBaEVyZ21mTVFCL3dJOEJZMi9V?= =?utf-8?B?L2lQSHBzVzhuVjhrUXRsQklIU2I2T01zQS9QYlRlR3ZCelo4c0dsRFhkaU1y?= =?utf-8?B?bC9GU2RNQjFOb3lZZ0NSUEFwdjBqU0hQOTMyeHNrRkQrTWMwa1RYaTZuTnQ0?= =?utf-8?B?eWFNWGd4ZHczOXJaWGpGVlVsQlZtMmczc3licEN2TjRxeU9MbHB2eVF0ZHBh?= =?utf-8?B?NmdOckFrM05WNEo3SVpmVGY4VmFucUF1Y0NlVmxNaGxsSVNuajdMK01lM0JP?= =?utf-8?B?U3k2bSt4cDI0NUI2SlovVkFORUdSZ2Q1WXVnZ0NoT0tTYzlYblNJb05KTUdU?= =?utf-8?B?ZWkwSXBTZGE5ak13QzJMd1QzVTltWE9TL1ZQWFZGQytpSktxS09vZWp3RmNk?= =?utf-8?B?VEJJVFJIeC9FSFpFREdWVVpzdkR4SzlFMlpJSlVnSTZ1NlpyUHFOMnlNMkVL?= =?utf-8?B?d1N0eU1LVmdNYzRpWkQ5NENXVkNiSVRydzJOcm0wZWZnZ1h0dk90TW9hQ1hp?= =?utf-8?B?alU5eTJrd2tsNnlrT000ZXQzNU42L2ZMNVhRaVB1M25FMEtCQTNaWHQzNE9G?= =?utf-8?B?djVOUEs1RXNBVkg0SVZ5Q0l1TWJldGswaFJyNUhwWnZvSGVmc3hsekJtdEwx?= =?utf-8?B?OGVReVBaMHFwL1daWkVJcjlRU3lCMHNwMkd6dFNrQVoxd2RpUFh2Rit1S2Z0?= =?utf-8?B?cE9NWWsyZjF2ekZ0R2kvM2R6NFlDZWtPdXhsSUVVTGtQWEYzaEh4QkRkU2hx?= =?utf-8?B?ajIwUFgvYWhEclY4MmlqTkJLWGNaRnNTUWx0K0dQbXk4WmhkRjQ3YnlibXhz?= =?utf-8?B?YlgyY0NPY2lLMjBqOUsyQ2ZpakhTb2tmRWlrRTNhYnJvWFJidm8zSmh1WUs5?= =?utf-8?B?OXRxWjZxR3N2M0ltZm8rY1Qvd2oyMjI0V2o0VlNmU05uTGJyNjdmcDNQTzFW?= =?utf-8?Q?j1hqejxAmwHaPPujlL7mSgu4LCfN+oEkgp8zj2S?= x-ms-exchange-transport-forked: True Content-Type: multipart/alternative; boundary="_000_CO1PR05MB8088C1596C134FE2958CF5D1C7CC9CO1PR05MB8088namp_" MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR05MB8088.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a714c907-9a4c-47ec-1ebf-08d96cadd70f X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Aug 2021 18:33:34.2093 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: FNj7nSsfbadrSW0lOZsaG5a2cX1QBIkAPnbnFCOBS/Qw9Tkf6Yn33ghif7e0UapxIyTOhxhI771XTSudxM8AQw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR05MB8266 X-Proofpoint-GUID: zuVo670tg2kia8yJv3jf_ILFICG1R1Hn X-Proofpoint-ORIG-GUID: zuVo670tg2kia8yJv3jf_ILFICG1R1Hn X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.182.1,Aquarius:18.0.790,Hydra:6.0.391,FMLib:17.0.607.475 definitions=2021-08-31_08,2021-08-31_01,2020-04-07_01 X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 spamscore=0 impostorscore=0 bulkscore=0 lowpriorityscore=0 mlxscore=0 phishscore=0 priorityscore=1501 adultscore=0 mlxlogscore=999 malwarescore=0 suspectscore=0 clxscore=1011 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108310102 Archived-At: Subject: Re: [bess] Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 31 Aug 2021 18:33:44 -0000 --_000_CO1PR05MB8088C1596C134FE2958CF5D1C7CC9CO1PR05MB8088namp_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGksDQoNCkkgYWdyZWUgd2l0aCBBbGkuDQoNCllvdXJzIElycmVzcGVjdGl2ZWx5LA0KDQpKb2hu DQoNCg0KDQpKdW5pcGVyIEJ1c2luZXNzIFVzZSBPbmx5DQpGcm9tOiBCRVNTIDxiZXNzLWJvdW5j ZXNAaWV0Zi5vcmc+IE9uIEJlaGFsZiBPZiBBbGkgU2FqYXNzaSAoc2FqYXNzaSkNClNlbnQ6IEZy aWRheSwgQXVndXN0IDI3LCAyMDIxIDk6NTQgUE0NClRvOiBCb2NjaSwgTWF0dGhldyAoTm9raWEg LSBHQikgPG1hdHRoZXcuYm9jY2lAbm9raWEuY29tPjsgYmVzc0BpZXRmLm9yZzsgZHJhZnQtaWV0 Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmcNClN1YmplY3Q6IFJlOiBbYmVzc10gSW1wbGVt ZW50YXRpb24gcG9sbCBmb3IgZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDUNCg0KW0V4 dGVybmFsIEVtYWlsLiBCZSBjYXV0aW91cyBvZiBjb250ZW50XQ0KDQpIaSBNYXR0aGV3LA0KDQpT b21lIG9mIHRoZSBjby1hdXRob3JzIGFyZSBvbiBQVE8gYW5kIEkgY291bGRu4oCZdCByZWFjaCB0 aGVtICh0eXBpY2FsIG9mIHRoZSBtb250aCBvZiBBdWd1c3QpLiBTbywgSeKAmWQgbGlrZSB0byBn ZXQgYSBiaXQgbW9yZSBleHRlbnNpb24uDQoNClJlZ2FyZGluZyB0aGUgdHdvIHF1ZXN0aW9ucyBi ZWxvdzoNCg0KICAxLiAgTXkgY29tcGFueSBoYXNu4oCZdCBpbXBsZW1lbnRlZCBpdC4NCiAgMi4g IEkgZG8gdGhpbmsgdGhhdCB3ZSBzaG91bGQgcHJvY2VzcyB3aXRoIHRoZSBwdWJsaWNhdGlvbiBh cyBpdCBkZXNjcmliZXMgaG93IExTUCBwaW5nIGNhbiBiZSB1c2VkIHRvIGRldGVjdCBkYXRhLXBs YW5lIGZhaWx1cmVzIGZvciB2YXJpb3VzIEVWUE4gZnVuY3Rpb25hbGl0eSBpbmNsdWRpbmcgYWxp YXNpbmcsIHNwbGl0LWhvcml6b24gZmlsdGVyaW5nIHVzaW5nIEVTSSBsYWJlbCwgbXVsdGljYXN0 LCBsMi11bmljYXN0LCBsMy11bmljYXN0LCBJUkIsIGV0Yy4gRm9yIE1QTFMgdHJhbnNwb3J0IHR1 bm5lbCwgSSBhbSBub3QgYXdhcmUgb2YgYW55IG90aGVyIHRvb2wvZHJhZnQgdGhhdCBhbGxvd3Mg dXMgdG8gZG8gZGF0YS1wbGFuZSBmYWlsdXJlIGRldGVjdGlvbi4gVGh1cywgSSB0aGluayBpdCBp cyBpbXBvcnRhbnQgdG8gcHJvY2VlZCB3aXRoIGl0cyBwdWJsaWNhdGlvbnMuDQoNClN0aWxsIEni gJlkIGxpa2UgdG8gaGVhciBmcm9tIG90aGVyIGNvLWF1dGhvcnMgYW5kIG90aGVyIHBlb3BsZSBp biB0aGlzIGNvbW11bml0eS4NCg0KUmVnYXJkcywNCkFsaQ0KDQpGcm9tOiBCb2NjaSwgTWF0dGhl dyAoTm9raWEgLSBHQikgPG1hdHRoZXcuYm9jY2lAbm9raWEuY29tPG1haWx0bzptYXR0aGV3LmJv Y2NpQG5va2lhLmNvbT4+DQpEYXRlOiBNb25kYXksIEF1Z3VzdCA5LCAyMDIxIGF0IDY6MjUgQU0N ClRvOiBiZXNzQGlldGYub3JnPG1haWx0bzpiZXNzQGlldGYub3JnPiA8YmVzc0BpZXRmLm9yZzxt YWlsdG86YmVzc0BpZXRmLm9yZz4+LCBkcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRm Lm9yZzxtYWlsdG86ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmc+IDxkcmFm dC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9yZzxtYWlsdG86ZHJhZnQtaWV0Zi1iZXNz LWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmc+Pg0KU3ViamVjdDogSW1wbGVtZW50YXRpb24gcG9sbCBm b3IgZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDUNCldHIGFuZCBBdXRob3JzDQoNClVu Zm9ydHVuYXRlbHkgSSBoYXZlIG5vdCBzZWVuIGFueSByZXNwb25zZXMgaW5kaWNhdGluZyB0aGF0 IHRoZXJlIGFyZSBhbnkga25vd24gaW1wbGVtZW50YXRpb25zIG9mIHRoaXMgZHJhZnQuIEkgYWxz byBkaWQgbm90IHNlZSBhbnkgcmVzcG9uc2VzIHRvIFN0ZXBoYW5lJ3MgcXVlc3Rpb24gaWYgd2Ug c2hvdWxkIHByb2NlZWQgcmVnYXJkbGVzcy4NCg0KQXMgcGVyIHRoZSBCRVNTIFdHIGltcGxlbWVu dGF0aW9uIHBvbGljeSAoaHR0cHM6Ly9tYWlsYXJjaGl2ZS5pZXRmLm9yZy9hcmNoL21zZy9iZXNz L2NHM1gxdFRxYl92UEM0cmc1NlNFZGtqcURwdy88aHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9f X2h0dHBzOi9tYWlsYXJjaGl2ZS5pZXRmLm9yZy9hcmNoL21zZy9iZXNzL2NHM1gxdFRxYl92UEM0 cmc1NlNFZGtqcURwdy9fXzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6 R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpMeUZtbGk0djhuTTNObyQ+KSwgcGxlYXNlIGNhbiB5b3Ug cmVzcG9uZCB0byB0aGlzIGVtYWlsIGluZGljYXRpbmcgZWl0aGVyOg0KDQotIFRoYXQgeW91IGFy ZSBhd2FyZSBvZiBhbnkgaW1wbGVtZW50YXRpb25zIChpZGVhbGx5IHByb3ZpZGluZyBzb21lIGRl dGFpbHMpDQotIElmIHlvdSBhcmUgbm90IGF3YXJlIG9mIGFueSwgaWYgeW91IHRoaW5rIHRoZSBX RyBzaG91bGQgcHJvY2VlZCB3aXRoIHRoZSBkcmFmdCdzIHB1YmxpY2F0aW9uIGFuZCB3aHkuDQoN Ckkgd2lsbCBjbG9zZSB0aGlzIHBvbGwgb24gMjV0aCBBdWd1c3QgMjAyMS4NCg0KUmVnYXJkcw0K DQpNYXR0aGV3DQoNCg0K77u/T24gMTQvMDYvMjAyMSwgMTc6MzgsICJCRVNTIG9uIGJlaGFsZiBv ZiBpbnRlcm5ldC1kcmFmdHNAaWV0Zi5vcmc8bWFpbHRvOmludGVybmV0LWRyYWZ0c0BpZXRmLm9y Zz4iIDxiZXNzLWJvdW5jZXNAaWV0Zi5vcmcgb24gYmVoYWxmIG9mIGludGVybmV0LWRyYWZ0c0Bp ZXRmLm9yZzxtYWlsdG86YmVzcy1ib3VuY2VzQGlldGYub3JnJTIwb24lMjBiZWhhbGYlMjBvZiUy MGludGVybmV0LWRyYWZ0c0BpZXRmLm9yZz4+IHdyb3RlOg0KDQoNCiAgICBBIE5ldyBJbnRlcm5l dC1EcmFmdCBpcyBhdmFpbGFibGUgZnJvbSB0aGUgb24tbGluZSBJbnRlcm5ldC1EcmFmdHMgZGly ZWN0b3JpZXMuDQogICAgVGhpcyBkcmFmdCBpcyBhIHdvcmsgaXRlbSBvZiB0aGUgQkdQIEVuYWJs ZWQgU2VydmljZVMgV0cgb2YgdGhlIElFVEYuDQoNCiAgICAgICAgICAgIFRpdGxlICAgICAgICAg ICA6IExTUC1QaW5nIE1lY2hhbmlzbXMgZm9yIEVWUE4gYW5kIFBCQi1FVlBODQogICAgICAgICAg ICBBdXRob3JzICAgICAgICAgOiBQYXJhZyBKYWluDQogICAgICAgICAgICAgICAgICAgICAgICAg ICAgICBTYW1lciBTYWxhbQ0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQWxpIFNhamFz c2kNCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFNhbWkgQm91dHJvcw0KICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgR3JlZyBNaXJza3kNCiAgICAgICAgIEZpbGVuYW1lICAgICAg ICA6IGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1LnR4dA0KICAgICAgICAgUGFnZXMg ICAgICAgICAgIDogMTUNCiAgICAgICAgIERhdGUgICAgICAgICAgICA6IDIwMjEtMDYtMTQNCg0K ICAgIEFic3RyYWN0Og0KICAgICAgIExTUC1QaW5nIGlzIGEgd2lkZWx5IGRlcGxveWVkIE9wZXJh dGlvbiwgQWRtaW5pc3RyYXRpb24sIGFuZA0KICAgICAgIE1haW50ZW5hbmNlIChPQU0pIG1lY2hh bmlzbSBpbiBNUExTIG5ldHdvcmtzLiAgVGhpcyBkb2N1bWVudA0KICAgICAgIGRlc2NyaWJlcyBt ZWNoYW5pc21zIGZvciBkZXRlY3RpbmcgZGF0YS1wbGFuZSBmYWlsdXJlcyB1c2luZyBMU1AgUGlu Zw0KICAgICAgIGluIE1QTFMgYmFzZWQgRVZQTiBhbmQgUEJCLUVWUE4gbmV0d29ya3MuDQoNCg0K ICAgIFRoZSBJRVRGIGRhdGF0cmFja2VyIHN0YXR1cyBwYWdlIGZvciB0aGlzIGRyYWZ0IGlzOg0K ICAgIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtYmVzcy1ldnBu LWxzcC1waW5nLzxodHRwczovL3VybGRlZmVuc2UuY29tL3YzL19faHR0cHM6L2RhdGF0cmFja2Vy LmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy9fXzshIU5FdDZ5TWFP LWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpMeUZt bGk0Q0ZadkpBTSQ+DQoNCiAgICBUaGVyZSBpcyBhbHNvIGFuIGh0bWxpemVkIHZlcnNpb24gYXZh aWxhYmxlIGF0Og0KICAgIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDU8aHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9f X2h0dHBzOi9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZw bi1sc3AtcGluZy0wNV9fOyEhTkV0NnlNYU8tZ2shUm9RZE4xeHJuZ0c3d0VQU0M2QXFIZXNRdHpH dkJNUDgyY29zeWVPMFBZWmpUR0E1Skx5Rm1saTRSTFQyLTVRJD4NCg0KICAgIEEgZGlmZiBmcm9t IHRoZSBwcmV2aW91cyB2ZXJzaW9uIGlzIGF2YWlsYWJsZSBhdDoNCiAgICBodHRwczovL3d3dy5p ZXRmLm9yZy9yZmNkaWZmP3VybDI9ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDU8aHR0 cHM6Ly91cmxkZWZlbnNlLmNvbS92My9fX2h0dHBzOi93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwy PWRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1X187ISFORXQ2eU1hTy1nayFSb1FkTjF4 cm5nRzd3RVBTQzZBcUhlc1F0ekd2Qk1QODJjb3N5ZU8wUFlaalRHQTVKTHlGbWxpNDRVd0U1eWck Pg0KDQoNCiAgICBJbnRlcm5ldC1EcmFmdHMgYXJlIGFsc28gYXZhaWxhYmxlIGJ5IGFub255bW91 cyBGVFAgYXQ6DQogICAgZnRwOi8vZnRwLmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy88aHR0cHM6 Ly91cmxkZWZlbnNlLmNvbS92My9fX2Z0cDovZnRwLmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy9f XzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQ WVpqVEdBNUpMeUZtbGk0dHJEcVVUWSQ+DQoNCg0KICAgIF9fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fDQogICAgQkVTUyBtYWlsaW5nIGxpc3QNCiAgICBCRVNT QGlldGYub3JnPG1haWx0bzpCRVNTQGlldGYub3JnPg0KICAgIGh0dHBzOi8vd3d3LmlldGYub3Jn L21haWxtYW4vbGlzdGluZm8vYmVzczxodHRwczovL3VybGRlZmVuc2UuY29tL3YzL19faHR0cHM6 L3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2Jlc3NfXzshIU5FdDZ5TWFPLWdrIVJvUWRO MXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpMeUZtbGk0WW9UcWtB YyQ+DQo= --_000_CO1PR05MB8088C1596C134FE2958CF5D1C7CC9CO1PR05MB8088namp_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy IDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpMYXRvOw0KCXBhbm9zZS0xOjIgMTUgNSAy IDIgMiA0IDMgMiAzO30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGku TXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJZm9udC1zaXplOjExLjBw dDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQphOmxpbmssIHNwYW4uTXNv SHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpibHVlOw0KCXRleHQt ZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5Nc29MaXN0UGFyYWdyYXBoLCBsaS5Nc29MaXN0UGFy YWdyYXBoLCBkaXYuTXNvTGlzdFBhcmFncmFwaA0KCXttc28tc3R5bGUtcHJpb3JpdHk6MzQ7DQoJ bWFyZ2luLXRvcDowaW47DQoJbWFyZ2luLXJpZ2h0OjBpbjsNCgltYXJnaW4tYm90dG9tOjBpbjsN CgltYXJnaW4tbGVmdDouNWluOw0KCWZvbnQtc2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNh bGlicmkiLHNhbnMtc2VyaWY7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTkNCgl7bXNvLXN0eWxlLXR5cGU6 cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29s b3I6d2luZG93dGV4dDt9DQpwLm1zaXBmb290ZXIzMGIzZDUzOCwgbGkubXNpcGZvb3RlcjMwYjNk NTM4LCBkaXYubXNpcGZvb3RlcjMwYjNkNTM4DQoJe21zby1zdHlsZS1uYW1lOm1zaXBmb290ZXIz MGIzZDUzODsNCgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0K CW1zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNp emU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCi5Nc29DaHBE ZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7 fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBp biAxLjBpbiAxLjBpbiAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rp b24xO30NCi8qIExpc3QgRGVmaW5pdGlvbnMgKi8NCkBsaXN0IGwwDQoJe21zby1saXN0LWlkOjQy NTkyNTYzNjsNCgltc28tbGlzdC10ZW1wbGF0ZS1pZHM6MzQxNDUzNjA0O30NCkBsaXN0IGwxDQoJ e21zby1saXN0LWlkOjUzOTcwNzkyNjsNCgltc28tbGlzdC10eXBlOmh5YnJpZDsNCgltc28tbGlz dC10ZW1wbGF0ZS1pZHM6ODAxMTM4NDA2IDY3Njk4NzA1IDY3Njk4NzEzIDY3Njk4NzE1IDY3Njk4 NzAzIDY3Njk4NzEzIDY3Njk4NzE1IDY3Njk4NzAzIDY3Njk4NzEzIDY3Njk4NzE1O30NCkBsaXN0 IGwxOmxldmVsMQ0KCXttc28tbGV2ZWwtdGV4dDoiJTFcKSI7DQoJbXNvLWxldmVsLXRhYi1zdG9w Om5vbmU7DQoJbXNvLWxldmVsLW51bWJlci1wb3NpdGlvbjpsZWZ0Ow0KCXRleHQtaW5kZW50Oi0u MjVpbjt9DQpAbGlzdCBsMTpsZXZlbDINCgl7bXNvLWxldmVsLW51bWJlci1mb3JtYXQ6YWxwaGEt bG93ZXI7DQoJbXNvLWxldmVsLXRhYi1zdG9wOm5vbmU7DQoJbXNvLWxldmVsLW51bWJlci1wb3Np dGlvbjpsZWZ0Ow0KCXRleHQtaW5kZW50Oi0uMjVpbjt9DQpAbGlzdCBsMTpsZXZlbDMNCgl7bXNv LWxldmVsLW51bWJlci1mb3JtYXQ6cm9tYW4tbG93ZXI7DQoJbXNvLWxldmVsLXRhYi1zdG9wOm5v bmU7DQoJbXNvLWxldmVsLW51bWJlci1wb3NpdGlvbjpyaWdodDsNCgl0ZXh0LWluZGVudDotOS4w cHQ7fQ0KQGxpc3QgbDE6bGV2ZWw0DQoJe21zby1sZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1s ZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotLjI1aW47fQ0KQGxpc3Qg bDE6bGV2ZWw1DQoJe21zby1sZXZlbC1udW1iZXItZm9ybWF0OmFscGhhLWxvd2VyOw0KCW1zby1s ZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0 ZXh0LWluZGVudDotLjI1aW47fQ0KQGxpc3QgbDE6bGV2ZWw2DQoJe21zby1sZXZlbC1udW1iZXIt Zm9ybWF0OnJvbWFuLWxvd2VyOw0KCW1zby1sZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1sZXZl bC1udW1iZXItcG9zaXRpb246cmlnaHQ7DQoJdGV4dC1pbmRlbnQ6LTkuMHB0O30NCkBsaXN0IGwx OmxldmVsNw0KCXttc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCgltc28tbGV2ZWwtbnVtYmVyLXBv c2l0aW9uOmxlZnQ7DQoJdGV4dC1pbmRlbnQ6LS4yNWluO30NCkBsaXN0IGwxOmxldmVsOA0KCXtt c28tbGV2ZWwtbnVtYmVyLWZvcm1hdDphbHBoYS1sb3dlcjsNCgltc28tbGV2ZWwtdGFiLXN0b3A6 bm9uZTsNCgltc28tbGV2ZWwtbnVtYmVyLXBvc2l0aW9uOmxlZnQ7DQoJdGV4dC1pbmRlbnQ6LS4y NWluO30NCkBsaXN0IGwxOmxldmVsOQ0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDpyb21hbi1s b3dlcjsNCgltc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCgltc28tbGV2ZWwtbnVtYmVyLXBvc2l0 aW9uOnJpZ2h0Ow0KCXRleHQtaW5kZW50Oi05LjBwdDt9DQpvbA0KCXttYXJnaW4tYm90dG9tOjBp bjt9DQp1bA0KCXttYXJnaW4tYm90dG9tOjBpbjt9DQotLT48L3N0eWxlPjwhLS1baWYgZ3RlIG1z byA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIg Lz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVs YXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8 L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJF Ti1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSIgc3R5bGU9IndvcmQtd3JhcDpicmVhay13 b3JkIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5I aSw8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SSBhZ3JlZSB3aXRoIEFsaS48bzpwPjwvbzpwPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPllvdXJzIElycmVzcGVjdGl2ZWx5LDxvOnA+PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj5Kb2huPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8 L286cD48L3A+DQo8cCBjbGFzcz0ibXNpcGZvb3RlcjMwYjNkNTM4IiBhbGlnbj0iY2VudGVyIiBz dHlsZT0ibWFyZ2luOjBpbjt0ZXh0LWFsaWduOmNlbnRlciI+DQo8c3BhbiBzdHlsZT0iZm9udC1z aXplOjcuMHB0O2NvbG9yOmJsYWNrIj5KdW5pcGVyIEJ1c2luZXNzIFVzZSBPbmx5PC9zcGFuPjxv OnA+PC9vOnA+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLWxlZnQ6c29saWQg Ymx1ZSAxLjVwdDtwYWRkaW5nOjBpbiAwaW4gMGluIDQuMHB0Ij4NCjxkaXY+DQo8ZGl2IHN0eWxl PSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNFMUUxRTEgMS4wcHQ7cGFkZGluZzozLjBw dCAwaW4gMGluIDBpbiI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj5Gcm9tOjwvYj4gQkVTUyAm bHQ7YmVzcy1ib3VuY2VzQGlldGYub3JnJmd0OyA8Yj5PbiBCZWhhbGYgT2YgPC9iPg0KQWxpIFNh amFzc2kgKHNhamFzc2kpPGJyPg0KPGI+U2VudDo8L2I+IEZyaWRheSwgQXVndXN0IDI3LCAyMDIx IDk6NTQgUE08YnI+DQo8Yj5Ubzo8L2I+IEJvY2NpLCBNYXR0aGV3IChOb2tpYSAtIEdCKSAmbHQ7 bWF0dGhldy5ib2NjaUBub2tpYS5jb20mZ3Q7OyBiZXNzQGlldGYub3JnOyBkcmFmdC1pZXRmLWJl c3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9yZzxicj4NCjxiPlN1YmplY3Q6PC9iPiBSZTogW2Jlc3Nd IEltcGxlbWVudGF0aW9uIHBvbGwgZm9yIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1 PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86 cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibGluZS1oZWln aHQ6MTIuMHB0O2JhY2tncm91bmQ6I0ZGRUI5QyI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox MC41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7TGF0byZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOmJsYWNr Ij5bRXh0ZXJuYWwgRW1haWwuIEJlIGNhdXRpb3VzIG9mIGNvbnRlbnRdPG86cD48L286cD48L3Nw YW4+PC9iPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkhpIE1hdHRoZXcsPG86cD48L286cD48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPlNvbWUgb2YgdGhlIGNvLWF1dGhvcnMgYXJlIG9uIFBUTyBhbmQgSSBjb3VsZG7igJl0 IHJlYWNoIHRoZW0gKHR5cGljYWwgb2YgdGhlIG1vbnRoIG9mIEF1Z3VzdCkuIFNvLCBJ4oCZZCBs aWtlIHRvIGdldCBhIGJpdCBtb3JlIGV4dGVuc2lvbi48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ UmVnYXJkaW5nIHRoZSB0d28gcXVlc3Rpb25zIGJlbG93OjxvOnA+PC9vOnA+PC9wPg0KPG9sIHN0 eWxlPSJtYXJnaW4tdG9wOjBpbiIgc3RhcnQ9IjEiIHR5cGU9IjEiPg0KPGxpIGNsYXNzPSJNc29M aXN0UGFyYWdyYXBoIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MGluO21zby1saXN0OmwxIGxldmVsMSBs Zm8zIj5NeSBjb21wYW55IGhhc27igJl0IGltcGxlbWVudGVkIGl0LjxvOnA+PC9vOnA+PC9saT48 bGkgY2xhc3M9Ik1zb0xpc3RQYXJhZ3JhcGgiIHN0eWxlPSJtYXJnaW4tbGVmdDowaW47bXNvLWxp c3Q6bDEgbGV2ZWwxIGxmbzMiPkkgZG8gdGhpbmsgdGhhdCB3ZSBzaG91bGQgcHJvY2VzcyB3aXRo IHRoZSBwdWJsaWNhdGlvbiBhcyBpdCBkZXNjcmliZXMgaG93IExTUCBwaW5nIGNhbiBiZSB1c2Vk IHRvIGRldGVjdCBkYXRhLXBsYW5lIGZhaWx1cmVzIGZvciB2YXJpb3VzIEVWUE4gZnVuY3Rpb25h bGl0eSBpbmNsdWRpbmcgYWxpYXNpbmcsIHNwbGl0LWhvcml6b24NCiBmaWx0ZXJpbmcgdXNpbmcg RVNJIGxhYmVsLCBtdWx0aWNhc3QsIGwyLXVuaWNhc3QsIGwzLXVuaWNhc3QsIElSQiwgZXRjLiBG b3IgTVBMUyB0cmFuc3BvcnQgdHVubmVsLCBJIGFtIG5vdCBhd2FyZSBvZiBhbnkgb3RoZXIgdG9v bC9kcmFmdCB0aGF0IGFsbG93cyB1cyB0byBkbyBkYXRhLXBsYW5lIGZhaWx1cmUgZGV0ZWN0aW9u LiBUaHVzLCBJIHRoaW5rIGl0IGlzIGltcG9ydGFudCB0byBwcm9jZWVkIHdpdGggaXRzIHB1Ymxp Y2F0aW9ucy4NCjxvOnA+PC9vOnA+PC9saT48L29sPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86 cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5TdGlsbCBJ4oCZZCBsaWtl IHRvIGhlYXIgZnJvbSBvdGhlciBjby1hdXRob3JzIGFuZCBvdGhlciBwZW9wbGUgaW4gdGhpcyBj b21tdW5pdHkuPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNw OzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPlJlZ2FyZHMsPG86cD48L286cD48L3A+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5BbGk8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9y ZGVyLXRvcDpzb2xpZCAjQjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGluIDBpbiAwaW4iPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1ib3R0b206MTIuMHB0Ij48Yj48c3Bh biBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtjb2xvcjpibGFjayI+RnJvbToNCjwvc3Bhbj48L2I+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29sb3I6YmxhY2siPkJvY2NpLCBNYXR0aGV3 IChOb2tpYSAtIEdCKSAmbHQ7PGEgaHJlZj0ibWFpbHRvOm1hdHRoZXcuYm9jY2lAbm9raWEuY29t Ij5tYXR0aGV3LmJvY2NpQG5va2lhLmNvbTwvYT4mZ3Q7PGJyPg0KPGI+RGF0ZTogPC9iPk1vbmRh eSwgQXVndXN0IDksIDIwMjEgYXQgNjoyNSBBTTxicj4NCjxiPlRvOiA8L2I+PGEgaHJlZj0ibWFp bHRvOmJlc3NAaWV0Zi5vcmciPmJlc3NAaWV0Zi5vcmc8L2E+ICZsdDs8YSBocmVmPSJtYWlsdG86 YmVzc0BpZXRmLm9yZyI+YmVzc0BpZXRmLm9yZzwvYT4mZ3Q7LA0KPGEgaHJlZj0ibWFpbHRvOmRy YWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nQGlldGYub3JnIj5kcmFmdC1pZXRmLWJlc3MtZXZw bi1sc3AtcGluZ0BpZXRmLm9yZzwvYT4gJmx0OzxhIGhyZWY9Im1haWx0bzpkcmFmdC1pZXRmLWJl c3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9yZyI+ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdA aWV0Zi5vcmc8L2E+Jmd0Ozxicj4NCjxiPlN1YmplY3Q6IDwvYj5JbXBsZW1lbnRhdGlvbiBwb2xs IGZvciBkcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNTxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tYm90 dG9tOjEyLjBwdCI+V0cgYW5kIEF1dGhvcnM8YnI+DQo8YnI+DQpVbmZvcnR1bmF0ZWx5IEkgaGF2 ZSBub3Qgc2VlbiBhbnkgcmVzcG9uc2VzIGluZGljYXRpbmcgdGhhdCB0aGVyZSBhcmUgYW55IGtu b3duIGltcGxlbWVudGF0aW9ucyBvZiB0aGlzIGRyYWZ0LiBJIGFsc28gZGlkIG5vdCBzZWUgYW55 IHJlc3BvbnNlcyB0byBTdGVwaGFuZSdzIHF1ZXN0aW9uIGlmIHdlIHNob3VsZCBwcm9jZWVkIHJl Z2FyZGxlc3MuPGJyPg0KPGJyPg0KQXMgcGVyIHRoZSBCRVNTIFdHIGltcGxlbWVudGF0aW9uIHBv bGljeSAoPGEgaHJlZj0iaHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9fX2h0dHBzOi9tYWlsYXJj aGl2ZS5pZXRmLm9yZy9hcmNoL21zZy9iZXNzL2NHM1gxdFRxYl92UEM0cmc1NlNFZGtqcURwdy9f XzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQ WVpqVEdBNUpMeUZtbGk0djhuTTNObyQiPmh0dHBzOi8vbWFpbGFyY2hpdmUuaWV0Zi5vcmcvYXJj aC9tc2cvYmVzcy9jRzNYMXRUcWJfdlBDNHJnNTZTRWRranFEcHcvPC9hPiksDQogcGxlYXNlIGNh biB5b3UgcmVzcG9uZCB0byB0aGlzIGVtYWlsIGluZGljYXRpbmcgZWl0aGVyOjxicj4NCjxicj4N Ci0gVGhhdCB5b3UgYXJlIGF3YXJlIG9mIGFueSBpbXBsZW1lbnRhdGlvbnMgKGlkZWFsbHkgcHJv dmlkaW5nIHNvbWUgZGV0YWlscyk8YnI+DQotIElmIHlvdSBhcmUgbm90IGF3YXJlIG9mIGFueSwg aWYgeW91IHRoaW5rIHRoZSBXRyBzaG91bGQgcHJvY2VlZCB3aXRoIHRoZSBkcmFmdCdzIHB1Ymxp Y2F0aW9uIGFuZCB3aHkuPGJyPg0KPGJyPg0KSSB3aWxsIGNsb3NlIHRoaXMgcG9sbCBvbiAyNXRo IEF1Z3VzdCAyMDIxLjxicj4NCjxicj4NClJlZ2FyZHM8YnI+DQo8YnI+DQpNYXR0aGV3PGJyPg0K Jm5ic3A7PGJyPg0KPGJyPg0K77u/T24gMTQvMDYvMjAyMSwgMTc6MzgsICZxdW90O0JFU1Mgb24g YmVoYWxmIG9mIDxhIGhyZWY9Im1haWx0bzppbnRlcm5ldC1kcmFmdHNAaWV0Zi5vcmciPg0KaW50 ZXJuZXQtZHJhZnRzQGlldGYub3JnPC9hPiZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmJlc3Mt Ym91bmNlc0BpZXRmLm9yZyUyMG9uJTIwYmVoYWxmJTIwb2YlMjBpbnRlcm5ldC1kcmFmdHNAaWV0 Zi5vcmciPmJlc3MtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgaW50ZXJuZXQtZHJhZnRz QGlldGYub3JnPC9hPiZndDsgd3JvdGU6PGJyPg0KPGJyPg0KPGJyPg0KJm5ic3A7Jm5ic3A7Jm5i c3A7IEEgTmV3IEludGVybmV0LURyYWZ0IGlzIGF2YWlsYWJsZSBmcm9tIHRoZSBvbi1saW5lIElu dGVybmV0LURyYWZ0cyBkaXJlY3Rvcmllcy48YnI+DQombmJzcDsmbmJzcDsmbmJzcDsgVGhpcyBk cmFmdCBpcyBhIHdvcmsgaXRlbSBvZiB0aGUgQkdQIEVuYWJsZWQgU2VydmljZVMgV0cgb2YgdGhl IElFVEYuPGJyPg0KPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IFRpdGxlJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDogTFNQLVBpbmcgTWVjaGFuaXNt cyBmb3IgRVZQTiBhbmQgUEJCLUVWUE48YnI+DQombmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgQXV0aG9ycyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA6IFBhcmFnIEphaW48YnI+DQom bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsgU2FtZXIgU2FsYW08YnI+DQombmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgQWxpIFNhamFzc2k8YnI+DQombmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgU2FtaSBCb3V0cm9z PGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7IEdyZWcgTWlyc2t5PGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7IEZpbGVuYW1lJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7IDogZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDUudHh0PGJyPg0K Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IFBhZ2VzJm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 IDogMTU8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsgRGF0ZSZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyA6IDIwMjEtMDYtMTQ8YnI+DQo8YnI+DQombmJzcDsmbmJzcDsmbmJz cDsgQWJzdHJhY3Q6PGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IExT UC1QaW5nIGlzIGEgd2lkZWx5IGRlcGxveWVkIE9wZXJhdGlvbiwgQWRtaW5pc3RyYXRpb24sIGFu ZDxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBNYWludGVuYW5jZSAo T0FNKSBtZWNoYW5pc20gaW4gTVBMUyBuZXR3b3Jrcy4mbmJzcDsgVGhpcyBkb2N1bWVudDxicj4N CiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBkZXNjcmliZXMgbWVjaGFuaXNt cyBmb3IgZGV0ZWN0aW5nIGRhdGEtcGxhbmUgZmFpbHVyZXMgdXNpbmcgTFNQIFBpbmc8YnI+DQom bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgaW4gTVBMUyBiYXNlZCBFVlBOIGFu ZCBQQkItRVZQTiBuZXR3b3Jrcy48YnI+DQo8YnI+DQo8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsg VGhlIElFVEYgZGF0YXRyYWNrZXIgc3RhdHVzIHBhZ2UgZm9yIHRoaXMgZHJhZnQgaXM6PGJyPg0K Jm5ic3A7Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vdXJsZGVmZW5zZS5jb20vdjMvX19o dHRwczovZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1w aW5nL19fOyEhTkV0NnlNYU8tZ2shUm9RZE4xeHJuZ0c3d0VQU0M2QXFIZXNRdHpHdkJNUDgyY29z eWVPMFBZWmpUR0E1Skx5Rm1saTRDRlp2SkFNJCI+DQpodHRwczovL2RhdGF0cmFja2VyLmlldGYu b3JnL2RvYy9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy88L2E+PGJyPg0KPGJyPg0KJm5i c3A7Jm5ic3A7Jm5ic3A7IFRoZXJlIGlzIGFsc28gYW4gaHRtbGl6ZWQgdmVyc2lvbiBhdmFpbGFi bGUgYXQ6PGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vdXJsZGVmZW5z ZS5jb20vdjMvX19odHRwczovZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJhZnQtaWV0 Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDVfXzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFND NkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpMeUZtbGk0UkxUMi01USQiPg0KaHR0cHM6 Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3At cGluZy0wNTwvYT48YnI+DQo8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsgQSBkaWZmIGZyb20gdGhl IHByZXZpb3VzIHZlcnNpb24gaXMgYXZhaWxhYmxlIGF0Ojxicj4NCiZuYnNwOyZuYnNwOyZuYnNw OyA8YSBocmVmPSJodHRwczovL3VybGRlZmVuc2UuY29tL3YzL19faHR0cHM6L3d3dy5pZXRmLm9y Zy9yZmNkaWZmP3VybDI9ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDVfXzshIU5FdDZ5 TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpM eUZtbGk0NFV3RTV5ZyQiPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRyYWZ0 LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1PC9hPjxicj4NCjxicj4NCjxicj4NCiZuYnNwOyZu YnNwOyZuYnNwOyBJbnRlcm5ldC1EcmFmdHMgYXJlIGFsc28gYXZhaWxhYmxlIGJ5IGFub255bW91 cyBGVFAgYXQ6PGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vdXJsZGVm ZW5zZS5jb20vdjMvX19mdHA6L2Z0cC5pZXRmLm9yZy9pbnRlcm5ldC1kcmFmdHMvX187ISFORXQ2 eU1hTy1nayFSb1FkTjF4cm5nRzd3RVBTQzZBcUhlc1F0ekd2Qk1QODJjb3N5ZU8wUFlaalRHQTVK THlGbWxpNHRyRHFVVFkkIj4NCmZ0cDovL2Z0cC5pZXRmLm9yZy9pbnRlcm5ldC1kcmFmdHMvPC9h Pjxicj4NCjxicj4NCjxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyBfX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyBCRVNT IG1haWxpbmcgbGlzdDxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyA8YSBocmVmPSJtYWlsdG86QkVT U0BpZXRmLm9yZyI+QkVTU0BpZXRmLm9yZzwvYT48YnI+DQombmJzcDsmbmJzcDsmbmJzcDsgPGEg aHJlZj0iaHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9fX2h0dHBzOi93d3cuaWV0Zi5vcmcvbWFp bG1hbi9saXN0aW5mby9iZXNzX187ISFORXQ2eU1hTy1nayFSb1FkTjF4cm5nRzd3RVBTQzZBcUhl c1F0ekd2Qk1QODJjb3N5ZU8wUFlaalRHQTVKTHlGbWxpNFlvVHFrQWMkIj4NCmh0dHBzOi8vd3d3 LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vYmVzczwvYT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_CO1PR05MB8088C1596C134FE2958CF5D1C7CC9CO1PR05MB8088namp_-- From nobody Tue Aug 31 14:36:50 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36E713A0745; Tue, 31 Aug 2021 14:36:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.794 X-Spam-Level: X-Spam-Status: No, score=-1.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UtOAoX-pf9DO; Tue, 31 Aug 2021 14:36:41 -0700 (PDT) Received: from mxus.zteusa.com (mxus.zteusa.com [4.14.134.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D5253A0736; Tue, 31 Aug 2021 14:36:41 -0700 (PDT) Received: from mse-us.zte.com.cn (unknown [10.36.11.29]) by Forcepoint Email with ESMTPS id 87B3580946642ACE6856; Wed, 1 Sep 2021 05:36:39 +0800 (CST) Received: from mgapp02.zte.com.cn ([10.36.9.143]) by mse-us.zte.com.cn with SMTP id 17VLabDF055447; Wed, 1 Sep 2021 05:36:37 +0800 (GMT-8) (envelope-from gregory.mirsky@ztetx.com) Received: from mapi (mgapp01[null]) by mapi (Zmail) with MAPI id mid81; Wed, 1 Sep 2021 05:36:35 +0800 (CST) Date: Wed, 1 Sep 2021 05:36:35 +0800 (CST) X-Zmail-TransId: 2af9612ea0e3b028b180 X-Mailer: Zmail v1.0 Message-ID: <202109010536357895706@zte.com.cn> In-Reply-To: References: 0B5439E0-0204-4AF2-ACAC-CFB0CE884712@nokia.com, BY5PR11MB42607626E070F40254A2E853B0C99@BY5PR11MB4260.namprd11.prod.outlook.com, CO1PR05MB8088C1596C134FE2958CF5D1C7CC9@CO1PR05MB8088.namprd05.prod.outlook.com Mime-Version: 1.0 From: To: Cc: , , , Content-Type: multipart/mixed; boundary="=====_001_next=====" X-MAIL: mse-us.zte.com.cn 17VLabDF055447 Archived-At: Subject: Re: [bess] =?utf-8?q?Implementation_poll_for_draft-ietf-bess-evpn-ls?= =?utf-8?q?p-ping-05?= X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 31 Aug 2021 21:36:47 -0000 --=====_001_next===== Content-Type: multipart/related; boundary="=====_002_next=====" --=====_002_next===== Content-Type: multipart/alternative; boundary="=====_003_next=====" --=====_003_next===== Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: base64 SGkgTWF0dGhldywNCg0KDQpteSBhcG9sb2dpZXMgZm9yIHRoZSBiZWxhdGVkIHJlc3BvbnNlOg0K DQpJIGFtIHN0aWxsIGF3YWl0aW5nIGEgcmVzcG9uc2UgZnJvbSBvdXIgcHJvZHVjdCB0ZWFtIG9u IHdoZXRoZXIgYW55IHBhcnQgb2YgdGhlIGRyYWZ0IGlzIHN1cHBvcnRlZC4NCg0KSSBjb25jdXIg d2l0aCBBbGkuIExTUCBQaW5nIGlzIGEgYnJvYWRseSB1c2VkIE9BTSB0b29sIGRldGVjdGluZyBh bmQgbG9jYWxpemluZyBmYWlsdXJlcywgaW5jbHVkaW5nIGRpc2NyZXBhbmNpZXMgYmV0d2VlbiB0 aGUgZGF0YSBhbmQgY29udHJvbCBwbGFuZXMuIFRoZSBkb2N1bWVudCBkZWZpbmVzIG5lY2Vzc2Fy eSBUYXJnZXQgRkVDIHN1Yi1UTFZzIGZvciBFVlBOIGFuZCBNVlBOIGNhc2VzLg0KDQoNCg0KDQoN Cg0KDQoNClJlZ2FyZHMsDQoNCg0KR3JlZyBNaXJza3kNCg0KDQoNCg0KDQoNClNyLiBTdGFuZGFy ZGl6YXRpb24gRXhwZXJ0DQrpooTnoJTmoIflh4bpg6gv5pyJ57q/56CU56m26ZmiL+aciee6v+S6 p+WTgee7j+iQpemDqCBTdGFuZGFyZCBQcmVyZXNlYXJjaCBEZXB0Li9XaXJlbGluZSBQcm9kdWN0 IFImRCBJbnN0aXR1dGUvV2lyZWxpbmUgUHJvZHVjdCBPcGVyYXRpb24gRGl2aXNpb24NCg0KDQoN Cg0KDQoNCg0KDQoNCkU6IGdyZWdvcnkubWlyc2t5QHp0ZXR4LmNvbSANCnd3dy56dGUuY29tLmNu DQoNCg0KDQoNCg0KDQpPcmlnaW5hbCBNYWlsDQoNCg0KDQpTZW5kZXI6IEpvaG5FRHJha2UNClRv OiBBbGkgU2FqYXNzaSAoc2FqYXNzaSk7Qm9jY2ksIE1hdHRoZXcgKE5va2lhIC0gR0IpO2Jlc3NA aWV0Zi5vcmc7ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmc7DQpEYXRlOiAy MDIxLzA4LzMxIDExOjM0DQpTdWJqZWN0OiBSZTogW2Jlc3NdIEltcGxlbWVudGF0aW9uIHBvbGwg Zm9yIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1DQoNCg0KX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCkJFU1MgbWFpbGluZyBsaXN0DQpCRVNT QGlldGYub3JnDQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2Jlc3MNCg0K IA0KDQpIaSwNCg0KDQogDQoNCg0KSSBhZ3JlZSB3aXRoIEFsaS4NCg0KDQogDQoNCg0KWW91cnMg SXJyZXNwZWN0aXZlbHksDQoNCg0KIA0KDQoNCkpvaG4NCg0KDQoNCiANCg0KDQogDQoNCg0KSnVu aXBlciBCdXNpbmVzcyBVc2UgT25seQ0KDQoNCg0KDQpGcm9tOiBCRVNTIDxiZXNzLWJvdW5jZXNA aWV0Zi5vcmc+IE9uIEJlaGFsZiBPZiBBbGkgU2FqYXNzaSAoc2FqYXNzaSkNCiBTZW50OiBGcmlk YXksIEF1Z3VzdCAyNywgMjAyMSA5OjU0IFBNDQogVG86IEJvY2NpLCBNYXR0aGV3IChOb2tpYSAt IEdCKSA8bWF0dGhldy5ib2NjaUBub2tpYS5jb20+OyBiZXNzQGlldGYub3JnOyBkcmFmdC1pZXRm LWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9yZw0KIFN1YmplY3Q6IFJlOiBbYmVzc10gSW1wbGVt ZW50YXRpb24gcG9sbCBmb3IgZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDUNCg0KDQoN Cg0KIA0KDQoNCltFeHRlcm5hbCBFbWFpbC4gQmUgY2F1dGlvdXMgb2YgY29udGVudF0NCg0KDQog DQoNCg0KSGkgTWF0dGhldywNCg0KDQogDQoNCg0KU29tZSBvZiB0aGUgY28tYXV0aG9ycyBhcmUg b24gUFRPIGFuZCBJIGNvdWxkbuKAmXQgcmVhY2ggdGhlbSAodHlwaWNhbCBvZiB0aGUgbW9udGgg b2YgQXVndXN0KS4gU28sIEnigJlkIGxpa2UgdG8gZ2V0IGEgYml0IG1vcmUgZXh0ZW5zaW9uLg0K DQoNCiANCg0KDQpSZWdhcmRpbmcgdGhlIHR3byBxdWVzdGlvbnMgYmVsb3c6DQoNCk15IGNvbXBh bnkgaGFzbuKAmXQgaW1wbGVtZW50ZWQgaXQuDQoNCkkgZG8gdGhpbmsgdGhhdCB3ZSBzaG91bGQg cHJvY2VzcyB3aXRoIHRoZSBwdWJsaWNhdGlvbiBhcyBpdCBkZXNjcmliZXMgaG93IExTUCBwaW5n IGNhbiBiZSB1c2VkIHRvIGRldGVjdCBkYXRhLXBsYW5lIGZhaWx1cmVzIGZvciB2YXJpb3VzIEVW UE4gZnVuY3Rpb25hbGl0eSBpbmNsdWRpbmcgYWxpYXNpbmcsIHNwbGl0LWhvcml6b24gZmlsdGVy aW5nIHVzaW5nIEVTSSBsYWJlbCwgbXVsdGljYXN0LCBsMi11bmljYXN0LCBsMy11bmljYXN0LCBJ UkIsIGV0Yy4gRm9yIE1QTFMgdHJhbnNwb3J0IHR1bm5lbCwgSSBhbSBub3QgYXdhcmUgb2YgYW55 IG90aGVyIHRvb2wvZHJhZnQgdGhhdCBhbGxvd3MgdXMgdG8gZG8gZGF0YS1wbGFuZSBmYWlsdXJl IGRldGVjdGlvbi4gVGh1cywgSSB0aGluayBpdCBpcyBpbXBvcnRhbnQgdG8gcHJvY2VlZCB3aXRo IGl0cyBwdWJsaWNhdGlvbnMuDQoNCg0KIA0KDQoNClN0aWxsIEnigJlkIGxpa2UgdG8gaGVhciBm cm9tIG90aGVyIGNvLWF1dGhvcnMgYW5kIG90aGVyIHBlb3BsZSBpbiB0aGlzIGNvbW11bml0eS4N Cg0KDQogDQoNCg0KUmVnYXJkcywNCg0KDQpBbGkNCg0KDQogDQoNCg0KDQpGcm9tOiBCb2NjaSwg TWF0dGhldyAoTm9raWEgLSBHQikgPG1hdHRoZXcuYm9jY2lAbm9raWEuY29tPg0KIERhdGU6IE1v bmRheSwgQXVndXN0IDksIDIwMjEgYXQgNjoyNSBBTQ0KIFRvOiBiZXNzQGlldGYub3JnIDxiZXNz QGlldGYub3JnPiwgZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmcgPGRyYWZ0 LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nQGlldGYub3JnPg0KIFN1YmplY3Q6IEltcGxlbWVudGF0 aW9uIHBvbGwgZm9yIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1DQoNCg0KDQpXRyBh bmQgQXV0aG9ycw0KIA0KIFVuZm9ydHVuYXRlbHkgSSBoYXZlIG5vdCBzZWVuIGFueSByZXNwb25z ZXMgaW5kaWNhdGluZyB0aGF0IHRoZXJlIGFyZSBhbnkga25vd24gaW1wbGVtZW50YXRpb25zIG9m IHRoaXMgZHJhZnQuIEkgYWxzbyBkaWQgbm90IHNlZSBhbnkgcmVzcG9uc2VzIHRvIFN0ZXBoYW5l J3MgcXVlc3Rpb24gaWYgd2Ugc2hvdWxkIHByb2NlZWQgcmVnYXJkbGVzcy4NCiANCiBBcyBwZXIg dGhlIEJFU1MgV0cgaW1wbGVtZW50YXRpb24gcG9saWN5IChodHRwczovL21haWxhcmNoaXZlLmll dGYub3JnL2FyY2gvbXNnL2Jlc3MvY0czWDF0VHFiX3ZQQzRyZzU2U0Vka2pxRHB3LyksIHBsZWFz ZSBjYW4geW91IHJlc3BvbmQgdG8gdGhpcyBlbWFpbCBpbmRpY2F0aW5nIGVpdGhlcjoNCiANCiAt IFRoYXQgeW91IGFyZSBhd2FyZSBvZiBhbnkgaW1wbGVtZW50YXRpb25zIChpZGVhbGx5IHByb3Zp ZGluZyBzb21lIGRldGFpbHMpDQogLSBJZiB5b3UgYXJlIG5vdCBhd2FyZSBvZiBhbnksIGlmIHlv dSB0aGluayB0aGUgV0cgc2hvdWxkIHByb2NlZWQgd2l0aCB0aGUgZHJhZnQncyBwdWJsaWNhdGlv biBhbmQgd2h5Lg0KIA0KIEkgd2lsbCBjbG9zZSB0aGlzIHBvbGwgb24gMjV0aCBBdWd1c3QgMjAy MS4NCiANCiBSZWdhcmRzDQogDQogTWF0dGhldw0KICANCiANCiDvu79PbiAxNC8wNi8yMDIxLCAx NzozOCwgIkJFU1Mgb24gYmVoYWxmIG9mIGludGVybmV0LWRyYWZ0c0BpZXRmLm9yZyIgPGJlc3Mt Ym91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgaW50ZXJuZXQtZHJhZnRzQGlldGYub3JnPiB3 cm90ZToNCiANCiANCiAgICAgQSBOZXcgSW50ZXJuZXQtRHJhZnQgaXMgYXZhaWxhYmxlIGZyb20g dGhlIG9uLWxpbmUgSW50ZXJuZXQtRHJhZnRzIGRpcmVjdG9yaWVzLg0KICAgICBUaGlzIGRyYWZ0 IGlzIGEgd29yayBpdGVtIG9mIHRoZSBCR1AgRW5hYmxlZCBTZXJ2aWNlUyBXRyBvZiB0aGUgSUVU Ri4NCiANCiAgICAgICAgICAgICBUaXRsZSAgICAgICAgICAgOiBMU1AtUGluZyBNZWNoYW5pc21z IGZvciBFVlBOIGFuZCBQQkItRVZQTg0KICAgICAgICAgICAgIEF1dGhvcnMgICAgICAgICA6IFBh cmFnIEphaW4NCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTYW1lciBTYWxhbQ0KICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFsaSBTYWphc3NpDQogICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgU2FtaSBCb3V0cm9zDQogICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgR3JlZyBNaXJza3kNCiAgICAgICAgICBGaWxlbmFtZSAgICAgICAgOiBkcmFmdC1pZXRmLWJl c3MtZXZwbi1sc3AtcGluZy0wNS50eHQNCiAgICAgICAgICBQYWdlcyAgICAgICAgICAgOiAxNQ0K ICAgICAgICAgIERhdGUgICAgICAgICAgICA6IDIwMjEtMDYtMTQNCiANCiAgICAgQWJzdHJhY3Q6 DQogICAgICAgIExTUC1QaW5nIGlzIGEgd2lkZWx5IGRlcGxveWVkIE9wZXJhdGlvbiwgQWRtaW5p c3RyYXRpb24sIGFuZA0KICAgICAgICBNYWludGVuYW5jZSAoT0FNKSBtZWNoYW5pc20gaW4gTVBM UyBuZXR3b3Jrcy4gIFRoaXMgZG9jdW1lbnQNCiAgICAgICAgZGVzY3JpYmVzIG1lY2hhbmlzbXMg Zm9yIGRldGVjdGluZyBkYXRhLXBsYW5lIGZhaWx1cmVzIHVzaW5nIExTUCBQaW5nDQogICAgICAg IGluIE1QTFMgYmFzZWQgRVZQTiBhbmQgUEJCLUVWUE4gbmV0d29ya3MuDQogDQogDQogICAgIFRo ZSBJRVRGIGRhdGF0cmFja2VyIHN0YXR1cyBwYWdlIGZvciB0aGlzIGRyYWZ0IGlzOg0KICAgICBo dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3At cGluZy8NCiANCiAgICAgVGhlcmUgaXMgYWxzbyBhbiBodG1saXplZCB2ZXJzaW9uIGF2YWlsYWJs ZSBhdDoNCiAgICAgaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFmdC1p ZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNQ0KIA0KICAgICBBIGRpZmYgZnJvbSB0aGUgcHJldmlv dXMgdmVyc2lvbiBpcyBhdmFpbGFibGUgYXQ6DQogICAgIGh0dHBzOi8vd3d3LmlldGYub3JnL3Jm Y2RpZmY/dXJsMj1kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNQ0KIA0KIA0KICAgICBJ bnRlcm5ldC1EcmFmdHMgYXJlIGFsc28gYXZhaWxhYmxlIGJ5IGFub255bW91cyBGVFAgYXQ6DQog ICAgIGZ0cDovL2Z0cC5pZXRmLm9yZy9pbnRlcm5ldC1kcmFmdHMvDQogDQogDQogICAgIF9fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQogICAgIEJFU1MgbWFp bGluZyBsaXN0DQogICAgIEJFU1NAaWV0Zi5vcmcNCiAgICAgaHR0cHM6Ly93d3cuaWV0Zi5vcmcv bWFpbG1hbi9saXN0aW5mby9iZXNz --=====_003_next===== Content-Type: text/html ; charset="UTF-8" Content-Transfer-Encoding: base64 PGRpdiBjbGFzcz0iemNvbnRlbnRSb3ciPjxwIHN0eWxlPSJjb2xvcjogcmdiKDE0LCAxNiwgMjYp OyBtYXJnaW4tdG9wOiAwcHQ7IG1hcmdpbi1ib3R0b206IDBwdDsgYmFja2dyb3VuZC1pbWFnZTog aW5pdGlhbDsgYmFja2dyb3VuZC1hdHRhY2htZW50OiBpbml0aWFsOyBiYWNrZ3JvdW5kLXNpemU6 IGluaXRpYWw7IGJhY2tncm91bmQtb3JpZ2luOiBpbml0aWFsOyBiYWNrZ3JvdW5kLWNsaXA6IGlu aXRpYWw7IGJhY2tncm91bmQtcG9zaXRpb246IGluaXRpYWw7IGJhY2tncm91bmQtcmVwZWF0OiBp bml0aWFsOyI+PHNwYW4gc3R5bGU9Im1hcmdpbi10b3A6IDBwdDsgbWFyZ2luLWJvdHRvbTogMHB0 OyBiYWNrZ3JvdW5kLWltYWdlOiBpbml0aWFsOyBiYWNrZ3JvdW5kLWF0dGFjaG1lbnQ6IGluaXRp YWw7IGJhY2tncm91bmQtc2l6ZTogaW5pdGlhbDsgYmFja2dyb3VuZC1vcmlnaW46IGluaXRpYWw7 IGJhY2tncm91bmQtY2xpcDogaW5pdGlhbDsgYmFja2dyb3VuZC1wb3NpdGlvbjogaW5pdGlhbDsg YmFja2dyb3VuZC1yZXBlYXQ6IGluaXRpYWw7IiBkYXRhLXByZXNlcnZlci1zcGFjZXM9InRydWUi PkhpIE1hdHRoZXcsPC9zcGFuPjwvcD48cCBzdHlsZT0iY29sb3I6IHJnYigxNCwgMTYsIDI2KTsg bWFyZ2luLXRvcDogMHB0OyBtYXJnaW4tYm90dG9tOiAwcHQ7IGJhY2tncm91bmQtaW1hZ2U6IGlu aXRpYWw7IGJhY2tncm91bmQtYXR0YWNobWVudDogaW5pdGlhbDsgYmFja2dyb3VuZC1zaXplOiBp bml0aWFsOyBiYWNrZ3JvdW5kLW9yaWdpbjogaW5pdGlhbDsgYmFja2dyb3VuZC1jbGlwOiBpbml0 aWFsOyBiYWNrZ3JvdW5kLXBvc2l0aW9uOiBpbml0aWFsOyBiYWNrZ3JvdW5kLXJlcGVhdDogaW5p dGlhbDsiPjxzcGFuIHN0eWxlPSJtYXJnaW4tdG9wOiAwcHQ7IG1hcmdpbi1ib3R0b206IDBwdDsg YmFja2dyb3VuZC1pbWFnZTogaW5pdGlhbDsgYmFja2dyb3VuZC1hdHRhY2htZW50OiBpbml0aWFs OyBiYWNrZ3JvdW5kLXNpemU6IGluaXRpYWw7IGJhY2tncm91bmQtb3JpZ2luOiBpbml0aWFsOyBi YWNrZ3JvdW5kLWNsaXA6IGluaXRpYWw7IGJhY2tncm91bmQtcG9zaXRpb246IGluaXRpYWw7IGJh Y2tncm91bmQtcmVwZWF0OiBpbml0aWFsOyIgZGF0YS1wcmVzZXJ2ZXItc3BhY2VzPSJ0cnVlIj5t eSBhcG9sb2dpZXMgZm9yIHRoZSBiZWxhdGVkIHJlc3BvbnNlOjwvc3Bhbj48L3A+PG9sIHN0eWxl PSJjb2xvcjogcmdiKDE0LCAxNiwgMjYpOyBtYXJnaW4tdG9wOiAwcHQ7IG1hcmdpbi1ib3R0b206 IDBwdDsgYmFja2dyb3VuZC1pbWFnZTogaW5pdGlhbDsgYmFja2dyb3VuZC1hdHRhY2htZW50OiBp bml0aWFsOyBiYWNrZ3JvdW5kLXNpemU6IGluaXRpYWw7IGJhY2tncm91bmQtb3JpZ2luOiBpbml0 aWFsOyBiYWNrZ3JvdW5kLWNsaXA6IGluaXRpYWw7IGJhY2tncm91bmQtcG9zaXRpb246IGluaXRp YWw7IGJhY2tncm91bmQtcmVwZWF0OiBpbml0aWFsOyIgY2xhc3M9IiBsaXN0LXBhZGRpbmdsZWZ0 LTIiPjxsaT48cD48c3BhbiBzdHlsZT0ibWFyZ2luLXRvcDogMHB0OyBtYXJnaW4tYm90dG9tOiAw cHQ7IGJhY2tncm91bmQtaW1hZ2U6IGluaXRpYWw7IGJhY2tncm91bmQtYXR0YWNobWVudDogaW5p dGlhbDsgYmFja2dyb3VuZC1zaXplOiBpbml0aWFsOyBiYWNrZ3JvdW5kLW9yaWdpbjogaW5pdGlh bDsgYmFja2dyb3VuZC1jbGlwOiBpbml0aWFsOyBiYWNrZ3JvdW5kLXBvc2l0aW9uOiBpbml0aWFs OyBiYWNrZ3JvdW5kLXJlcGVhdDogaW5pdGlhbDsiIGRhdGEtcHJlc2VydmVyLXNwYWNlcz0idHJ1 ZSI+SSBhbSBzdGlsbCBhd2FpdGluZyBhIHJlc3BvbnNlIGZyb20gb3VyIHByb2R1Y3QgdGVhbSBv biB3aGV0aGVyIGFueSBwYXJ0IG9mIHRoZSBkcmFmdCBpcyBzdXBwb3J0ZWQuPC9zcGFuPjwvcD48 L2xpPjxsaT48cD48c3BhbiBzdHlsZT0ibWFyZ2luLXRvcDogMHB0OyBtYXJnaW4tYm90dG9tOiAw cHQ7IGJhY2tncm91bmQtaW1hZ2U6IGluaXRpYWw7IGJhY2tncm91bmQtYXR0YWNobWVudDogaW5p dGlhbDsgYmFja2dyb3VuZC1zaXplOiBpbml0aWFsOyBiYWNrZ3JvdW5kLW9yaWdpbjogaW5pdGlh bDsgYmFja2dyb3VuZC1jbGlwOiBpbml0aWFsOyBiYWNrZ3JvdW5kLXBvc2l0aW9uOiBpbml0aWFs OyBiYWNrZ3JvdW5kLXJlcGVhdDogaW5pdGlhbDsiIGRhdGEtcHJlc2VydmVyLXNwYWNlcz0idHJ1 ZSI+SSBjb25jdXIgd2l0aCBBbGkuIExTUCBQaW5nIGlzIGEgYnJvYWRseSB1c2VkIE9BTSB0b29s IGRldGVjdGluZyBhbmQgbG9jYWxpemluZyBmYWlsdXJlcywgaW5jbHVkaW5nIGRpc2NyZXBhbmNp ZXMgYmV0d2VlbiB0aGUgZGF0YSBhbmQgY29udHJvbCBwbGFuZXMuIFRoZSBkb2N1bWVudCBkZWZp bmVzIG5lY2Vzc2FyeSBUYXJnZXQgRkVDIHN1Yi1UTFZzIGZvciBFVlBOIGFuZCBNVlBOIGNhc2Vz Ljwvc3Bhbj48L3A+PC9saT48L29sPjxwIHN0eWxlPSJmb250LXNpemU6MTJweDtmb250LWZhbWls eTpzYW5zLXNlcmlmOyI+PGJyPjwvcD48ZGl2IGNsYXNzPSJ6TWFpbFNpZ24iIHVub25hbWVjaD0i R3JlZ29yeTEwMjExOTE1IiB1bm9uYW1lZW49ImdyZWdvcnkgbWlyc2t5MTAyMTE5MTUiPjxkaXYg Y2xhc3M9InpNYWlsU2lnbkNvbnRlbnQiPjxkaXY+PGRpdj48ZGl2PjxwIHN0eWxlPSJmb250LWZh bWlseTog5a6L5L2TOyBmb250LXNpemU6MTRweDsgbGluZS1oZWlnaHQ6IG5vcm1hbDsgd2lkb3dz OiAxOyI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxNHB4O2NvbG9yOiM1ODU5NUI7Zm9udC1mYW1p bHk65b6u6L2v6ZuF6buRO2ZvbnQtc2l6ZToxNHB4OyI+PHNwYW4gY2xhc3M9InNpZ25lZGl0Ij5S ZWdhcmRzLDwvc3Bhbj48L3NwYW4+PC9wPjxwIHN0eWxlPSJmb250LWZhbWlseTog5a6L5L2TOyBm b250LXNpemU6MTRweDsgbGluZS1oZWlnaHQ6IG5vcm1hbDsgd2lkb3dzOiAxOyI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxNHB4O2NvbG9yOiM1ODU5NUI7Zm9udC1mYW1pbHk65b6u6L2v6ZuF6buR Ij48c3BhbiBjbGFzcz0ic2lnbmVkaXQiIGlkPSJzaWduX25hbWUiPkdyZWcgTWlyc2t5PC9zcGFu Pjwvc3Bhbj48L3A+PHAgc3R5bGU9ImZvbnQtc2l6ZToxNHB4OyBsaW5lLWhlaWdodDogbm9ybWFs OyB3aWRvd3M6IDE7Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjE0cHg7Y29sb3I6IzU4NTk1Qjtm b250LWZhbWlseTrlvq7ova/pm4Xpu5E7Zm9udC1zaXplOjE0cHg7Ij48c3BhbiBzdHlsZT0iIj48 c3BhbiBjbGFzcz0ic2lnbmVkaXQiPjxicj48L3NwYW4+PC9zcGFuPjwvc3Bhbj48L3A+PHAgc3R5 bGU9IndpZG93czogMTsiPjxmb250IGNvbG9yPSIjNTg1OTViIiBmYWNlPSLlvq7ova/pm4Xpu5Ei PlNyLiBTdGFuZGFyZGl6YXRpb24gRXhwZXJ0PC9mb250Pjxicj48c3BhbiBzdHlsZT0iZm9udC1m YW1pbHk6IOW+rui9r+mbhem7kTsgZm9udC1zaXplOiAxMHB4OyBsaW5lLWhlaWdodDogbm9ybWFs OyBjb2xvcjogcmdiKDg4LCA4OSwgOTEpOyI+PHNwYW4gY2xhc3M9InNpZ25lZGl0IiBpZD0ic2ln bl9kZXB0Ij7pooTnoJTmoIflh4bpg6gv5pyJ57q/56CU56m26ZmiL+aciee6v+S6p+WTgee7j+iQ pemDqDwvc3Bhbj4gPHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OkFyaWFsIj4gPHNwYW4gY2xhc3M9 InNpZ25lZGl0IiBpZD0ic2lnbl9kZXB0X2VuZyI+U3RhbmRhcmQgUHJlcmVzZWFyY2ggRGVwdC4v V2lyZWxpbmUgUHJvZHVjdCBSJmFtcDtEIEluc3RpdHV0ZS9XaXJlbGluZSBQcm9kdWN0IE9wZXJh dGlvbiBEaXZpc2lvbjwvc3Bhbj48L3NwYW4+PC9zcGFuPjwvcD48cCBzdHlsZT0iZm9udC1zaXpl OjE0cHg7IGxpbmUtaGVpZ2h0OiBub3JtYWw7IHdpZG93czogMTsiPjxzcGFuIHN0eWxlPSJmb250 LXNpemU6MTRweDtjb2xvcjojNTg1OTVCO2ZvbnQtZmFtaWx5OuW+rui9r+mbhem7kTtmb250LXNp emU6MTRweDsiPjxzcGFuIHN0eWxlPSIiPjxzcGFuIGNsYXNzPSJzaWduZWRpdCI+PGJyPjwvc3Bh bj48L3NwYW4+PC9zcGFuPjwvcD48cCBzdHlsZT0iZm9udC1zaXplOjE0cHg7IGxpbmUtaGVpZ2h0 OiBub3JtYWw7IHdpZG93czogMTsiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTRweDtjb2xvcjoj NTg1OTVCO2ZvbnQtZmFtaWx5OuW+rui9r+mbhem7kTtmb250LXNpemU6MTRweDsiPjwvc3Bhbj48 L3A+PHRhYmxlIHN0eWxlPSJjb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTog5a6L5L2T OyB3aWRvd3M6IDE7Ij48dGJvZHk+PHRyIGNsYXNzPSJmaXJzdFJvdyI+PHRkIHZhbGlnbj0idG9w IiB3aWR0aD0iMTAwIj48aW1nIGlkPSJzaWduLWljb24iIHdpZHRoPSIxMzAiIGhlaWdodD0iMTIw IiBzaWduPSJzaWduOjlhZTNlMjE0YzE3ZDQ5ZWQ5MzVkODdjNjc0YmEzZWUyIiBzcmM9ImNpZDo5 YWUzZTIxNGMxN2Q0OWVkOTM1ZDg3YzY3NGJhM2VlMiI+PC90ZD48dGQgdmFsaWduPSJ0b3AiIHdp ZHRoPSI1MDAiIHN0eWxlPSJ3b3JkLWJyZWFrOiBicmVhay1hbGw7Ij48aW1nIGlkPSJzaWduLWxv Z28iIHdpZHRoPSIxMTUiIGhlaWdodD0iMzgiIHNpZ249InNpZ246MjQyNDJlNTYzN2FmNDI4ODkx YzRkYjczMWU3NzY1YWQiIHNyYz0iY2lkOjI0MjQyZTU2MzdhZjQyODg5MWM0ZGI3MzFlNzc2NWFk Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjE0cHg7Y29sb3I6IzU4NTk1Qjtmb250LWZhbWlseTrl vq7ova/pm4Xpu5EiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTpBcmlhbCI+PGJyPjxzcGFuIHN0 eWxlPSJjb2xvcjojMDA4RkQ0Ij5FPC9zcGFuPjogPHNwYW4gY2xhc3M9InNpZ25lZGl0IiBpZD0i c2lnbl9lbWFpbCI+PGEgaHJlZj0ibWFpbHRvOmdyZWdvcnkubWlyc2t5QHp0ZXR4LmNvbSI+Z3Jl Z29yeS5taXJza3lAenRldHguY29tPC9hPjwvc3Bhbj4gPGJyPjxzcGFuIHN0eWxlPSJjb2xvcjoj MDA4RkQ0Ij48YSBocmVmPSJodHRwOi8vd3d3Lnp0ZS5jb20uY24vIiB0YXJnZXQ9Il9ibGFuayI+ d3d3Lnp0ZS5jb20uY248L2E+PC9zcGFuPjwvc3Bhbj48L3NwYW4+PC90ZD48L3RyPjwvdGJvZHk+ PC90YWJsZT48c3BhbiBzdHlsZT0ibGluZS1oZWlnaHQ6IG5vcm1hbDsgd2lkb3dzOiAxOyBmb250 LXNpemU6MTRweDs7Y29sb3I6IzU4NTk1Yjtmb250LXNpemU6MTBweCI+PC9zcGFuPjwvZGl2Pjwv ZGl2PjwvZGl2PjwvZGl2PjwvZGl2PjxkaXY+PGRpdiBjbGFzcz0iemhpc3RvcnlSb3ciIHN0eWxl PSJkaXNwbGF5OmJsb2NrIj48ZGl2IGNsYXNzPSJ6aGlzdG9yeURlcyIgc3R5bGU9IndpZHRoOiAx MDAlOyBoZWlnaHQ6IDI4cHg7IGxpbmUtaGVpZ2h0OiAyOHB4OyBiYWNrZ3JvdW5kLWNvbG9yOiAj RTBFNUU5OyBjb2xvcjogIzEzODhGRjsgdGV4dC1hbGlnbjogY2VudGVyOyIgbGFuZ3VhZ2UtZGF0 YT0iSGlzdG9yeU9yZ1R4dCI+T3JpZ2luYWwgTWFpbDwvZGl2PjxkaXYgaWQ9Inp3cml0ZUhpc3Rv cnlDb250YWluZXIiPjxkaXYgY2xhc3M9ImNvbnRyb2wtZ3JvdXAgemhpc3RvcnlQYW5lbCI+PGRp diBjbGFzcz0iemhpc3RvcnlIZWFkZXIiIHN0eWxlPSJwYWRkaW5nOiA4cHg7IGJhY2tncm91bmQt Y29sb3I6ICNGNUY2Rjg7Ij48ZGl2PjxzdHJvbmcgbGFuZ3VhZ2UtZGF0YT0iSGlzdG9yeVNlbmRl clR4dCI+U2VuZGVyOiZuYnNwOzwvc3Ryb25nPjxzcGFuIGNsYXNzPSJ6cmVhZFVzZXJOYW1lIj5K b2huRURyYWtlPGpkcmFrZT00MGp1bmlwZXIubmV0QGRtYXJjLmlldGYub3JnPjwvamRyYWtlPTQw anVuaXBlci5uZXRAZG1hcmMuaWV0Zi5vcmc+PC9zcGFuPjwvZGl2PjxkaXY+PHN0cm9uZyBsYW5n dWFnZS1kYXRhPSJIaXN0b3J5VE9UeHQiPlRvOiZuYnNwOzwvc3Ryb25nPjxzcGFuIGNsYXNzPSJ6 cmVhZFVzZXJOYW1lIiBzdHlsZT0iZGlzcGxheTogaW5saW5lOyI+QWxpIFNhamFzc2kgKHNhamFz c2kpPHNhamFzc2k9NDBjaXNjby5jb21AZG1hcmMuaWV0Zi5vcmc+Ozwvc2FqYXNzaT00MGNpc2Nv LmNvbUBkbWFyYy5pZXRmLm9yZz48L3NwYW4+PHNwYW4gY2xhc3M9InpyZWFkVXNlck5hbWUiIHN0 eWxlPSJkaXNwbGF5OiBpbmxpbmU7Ij5Cb2NjaSwgTWF0dGhldyAoTm9raWEgLSBHQik8bWF0dGhl dy5ib2NjaUBub2tpYS5jb20+OzwvbWF0dGhldy5ib2NjaUBub2tpYS5jb20+PC9zcGFuPjxzcGFu IGNsYXNzPSJ6cmVhZFVzZXJOYW1lIiBzdHlsZT0iZGlzcGxheTogaW5saW5lOyI+YmVzc0BpZXRm Lm9yZzxiZXNzQGlldGYub3JnPjs8L2Jlc3NAaWV0Zi5vcmc+PC9zcGFuPjxzcGFuIGNsYXNzPSJ6 cmVhZFVzZXJOYW1lIiBzdHlsZT0iZGlzcGxheTogaW5saW5lOyI+ZHJhZnQtaWV0Zi1iZXNzLWV2 cG4tbHNwLXBpbmdAaWV0Zi5vcmc8ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5v cmc+OzwvZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmc+PC9zcGFuPjwvZGl2 PjxkaXY+PHN0cm9uZyBsYW5ndWFnZS1kYXRhPSJIaXN0b3J5RGF0ZVR4dCI+RGF0ZTombmJzcDs8 L3N0cm9uZz48c3BhbiBjbGFzcz0iIj4yMDIxLzA4LzMxIDExOjM0PC9zcGFuPjwvZGl2PjxkaXY+ PHN0cm9uZyBsYW5ndWFnZS1kYXRhPSJIaXN0b3J5U3ViamVjdFR4dCI+U3ViamVjdDombmJzcDs8 L3N0cm9uZz48c3BhbiBjbGFzcz0ienJlYWRUaXRsZSI+PHN0cm9uZz5SZTogW2Jlc3NdIEltcGxl bWVudGF0aW9uIHBvbGwgZm9yIGRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nLTA1PC9zdHJv bmc+PC9zcGFuPjwvZGl2PjwvZGl2PjxkaXYgY2xhc3M9InpoaXN0b3J5Q29udGVudCI+PGRpdj5f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj5CRVNTJm5i c3A7bWFpbGluZyZuYnNwO2xpc3Q8YnI+QkVTU0BpZXRmLm9yZzxicj5odHRwczovL3d3dy5pZXRm Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL2Jlc3M8YnI+PGJyPiAgIDxkaXYgY2xhc3M9IldvcmRTZWN0 aW9uMSI+PHAgY2xhc3M9Ik1zb05vcm1hbCI+SGksPG86cD48L286cD48L3A+PHAgY2xhc3M9Ik1z b05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+SSBhZ3Jl ZSB3aXRoIEFsaS48bzpwPjwvbzpwPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNw OzwvbzpwPjwvcD48ZGl2PjxwIGNsYXNzPSJNc29Ob3JtYWwiPllvdXJzIElycmVzcGVjdGl2ZWx5 LDxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9w PjxwIGNsYXNzPSJNc29Ob3JtYWwiPkpvaG48bzpwPjwvbzpwPjwvcD48L2Rpdj48cCBjbGFzcz0i TXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpw PiZuYnNwOzwvbzpwPjwvcD48cCBjbGFzcz0ibXNpcGZvb3RlcjMwYjNkNTM4IiBzdHlsZT0idGV4 dC1hbGlnbjpjZW50ZXI7bWFyZ2luOjBpbjsiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny4wcHQ7 Y29sb3I6YmxhY2siPkp1bmlwZXIgQnVzaW5lc3MgVXNlIE9ubHk8L3NwYW4+PG86cD48L286cD48 L3A+PGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLWxlZnQ6c29saWQgYmx1ZSAxLjVwdDtw YWRkaW5nOjBpbiAwaW4gMGluIDQuMHB0Ij48ZGl2PjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2Jv cmRlci10b3A6c29saWQgI0UxRTFFMSAxLjBwdDtwYWRkaW5nOjMuMHB0IDBpbiAwaW4gMGluIj48 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Ryb25nPkZyb206PC9zdHJvbmc+IEJFU1MgJmx0O2Jlc3Mt Ym91bmNlc0BpZXRmLm9yZyZndDsgPHN0cm9uZz5PbiBCZWhhbGYgT2YgPC9zdHJvbmc+IEFsaSBT YWphc3NpIChzYWphc3NpKTxicj4gPHN0cm9uZz5TZW50Ojwvc3Ryb25nPiBGcmlkYXksIEF1Z3Vz dCAyNywgMjAyMSA5OjU0IFBNPGJyPiA8c3Ryb25nPlRvOjwvc3Ryb25nPiBCb2NjaSwgTWF0dGhl dyAoTm9raWEgLSBHQikgJmx0O21hdHRoZXcuYm9jY2lAbm9raWEuY29tJmd0OzsgYmVzc0BpZXRm Lm9yZzsgZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmc8YnI+IDxzdHJvbmc+ U3ViamVjdDo8L3N0cm9uZz4gUmU6IFtiZXNzXSBJbXBsZW1lbnRhdGlvbiBwb2xsIGZvciBkcmFm dC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNTxvOnA+PC9vOnA+PC9wPjwvZGl2PjwvZGl2Pjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPSJNc29Ob3Jt YWwiIHN0eWxlPSJsaW5lLWhlaWdodDoxMi4wcHQ7YmFja2dyb3VuZDojRkZFQjlDIj48c3Ryb25n PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0xhdG8mcXVv dDssc2Fucy1zZXJpZjtjb2xvcjpibGFjayI+W0V4dGVybmFsIEVtYWlsLiBCZSBjYXV0aW91cyBv ZiBjb250ZW50XTxvOnA+PC9vOnA+PC9zcGFuPjwvc3Ryb25nPjwvcD48cCBjbGFzcz0iTXNvTm9y bWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD48ZGl2PjxwIGNsYXNzPSJNc29Ob3JtYWwiPkhpIE1h dHRoZXcsPG86cD48L286cD48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286 cD48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+U29tZSBvZiB0aGUgY28tYXV0aG9ycyBhcmUgb24g UFRPIGFuZCBJIGNvdWxkbuKAmXQgcmVhY2ggdGhlbSAodHlwaWNhbCBvZiB0aGUgbW9udGggb2Yg QXVndXN0KS4gU28sIEnigJlkIGxpa2UgdG8gZ2V0IGEgYml0IG1vcmUgZXh0ZW5zaW9uLjxvOnA+ PC9vOnA+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNs YXNzPSJNc29Ob3JtYWwiPlJlZ2FyZGluZyB0aGUgdHdvIHF1ZXN0aW9ucyBiZWxvdzo8bzpwPjwv bzpwPjwvcD48b2wgc3R5bGU9Im1hcmdpbi10b3A6MGluIiBzdGFydD0iMSIgdHlwZT0iMSIgY2xh c3M9IiBsaXN0LXBhZGRpbmdsZWZ0LTIiPjxsaT48cD5NeSBjb21wYW55IGhhc27igJl0IGltcGxl bWVudGVkIGl0LjwvcD48bzpwPjwvbzpwPjwvbGk+PGxpPjxwPkkgZG8gdGhpbmsgdGhhdCB3ZSBz aG91bGQgcHJvY2VzcyB3aXRoIHRoZSBwdWJsaWNhdGlvbiBhcyBpdCBkZXNjcmliZXMgaG93IExT UCBwaW5nIGNhbiBiZSB1c2VkIHRvIGRldGVjdCBkYXRhLXBsYW5lIGZhaWx1cmVzIGZvciB2YXJp b3VzIEVWUE4gZnVuY3Rpb25hbGl0eSBpbmNsdWRpbmcgYWxpYXNpbmcsIHNwbGl0LWhvcml6b24g IGZpbHRlcmluZyB1c2luZyBFU0kgbGFiZWwsIG11bHRpY2FzdCwgbDItdW5pY2FzdCwgbDMtdW5p Y2FzdCwgSVJCLCBldGMuIEZvciBNUExTIHRyYW5zcG9ydCB0dW5uZWwsIEkgYW0gbm90IGF3YXJl IG9mIGFueSBvdGhlciB0b29sL2RyYWZ0IHRoYXQgYWxsb3dzIHVzIHRvIGRvIGRhdGEtcGxhbmUg ZmFpbHVyZSBkZXRlY3Rpb24uIFRodXMsIEkgdGhpbmsgaXQgaXMgaW1wb3J0YW50IHRvIHByb2Nl ZWQgd2l0aCBpdHMgcHVibGljYXRpb25zLjwvcD48bzpwPjwvbzpwPjwvbGk+PC9vbD48cCBjbGFz cz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj5T dGlsbCBJ4oCZZCBsaWtlIHRvIGhlYXIgZnJvbSBvdGhlciBjby1hdXRob3JzIGFuZCBvdGhlciBw ZW9wbGUgaW4gdGhpcyBjb21tdW5pdHkuPG86cD48L286cD48L3A+PHAgY2xhc3M9Ik1zb05vcm1h bCI+PG86cD4mbmJzcDs8L286cD48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+UmVnYXJkcyw8bzpw PjwvbzpwPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj5BbGk8bzpwPjwvbzpwPjwvcD48cCBjbGFz cz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD48ZGl2IHN0eWxlPSJib3JkZXI6bm9u ZTtib3JkZXItdG9wOnNvbGlkICNCNUM0REYgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBp biI+PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1ib3R0b206MTIuMHB0Ij48c3Ry b25nPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0O2NvbG9yOmJsYWNrIj5Gcm9tOiA8L3Nw YW4+PC9zdHJvbmc+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29sb3I6YmxhY2siPkJv Y2NpLCBNYXR0aGV3IChOb2tpYSAtIEdCKSAmbHQ7PGEgaHJlZj0ibWFpbHRvOm1hdHRoZXcuYm9j Y2lAbm9raWEuY29tIiB0YXJnZXQ9Il9ibGFuayI+bWF0dGhldy5ib2NjaUBub2tpYS5jb208L2E+ Jmd0Ozxicj4gPHN0cm9uZz5EYXRlOiA8L3N0cm9uZz5Nb25kYXksIEF1Z3VzdCA5LCAyMDIxIGF0 IDY6MjUgQU08YnI+IDxzdHJvbmc+VG86IDwvc3Ryb25nPjxhIGhyZWY9Im1haWx0bzpiZXNzQGll dGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+YmVzc0BpZXRmLm9yZzwvYT4gJmx0OzxhIGhyZWY9Im1h aWx0bzpiZXNzQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+YmVzc0BpZXRmLm9yZzwvYT4mZ3Q7 LCA8YSBocmVmPSJtYWlsdG86ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmdAaWV0Zi5vcmci IHRhcmdldD0iX2JsYW5rIj5kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRmLm9yZzwv YT4gJmx0OzxhIGhyZWY9Im1haWx0bzpkcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZ0BpZXRm Lm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nQGlldGYu b3JnPC9hPiZndDs8YnI+IDxzdHJvbmc+U3ViamVjdDogPC9zdHJvbmc+SW1wbGVtZW50YXRpb24g cG9sbCBmb3IgZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDU8bzpwPjwvbzpwPjwvc3Bh bj48L3A+PC9kaXY+PGRpdj48cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWJvdHRv bToxMi4wcHQiPldHIGFuZCBBdXRob3JzPGJyPiA8YnI+IFVuZm9ydHVuYXRlbHkgSSBoYXZlIG5v dCBzZWVuIGFueSByZXNwb25zZXMgaW5kaWNhdGluZyB0aGF0IHRoZXJlIGFyZSBhbnkga25vd24g aW1wbGVtZW50YXRpb25zIG9mIHRoaXMgZHJhZnQuIEkgYWxzbyBkaWQgbm90IHNlZSBhbnkgcmVz cG9uc2VzIHRvIFN0ZXBoYW5lJ3MgcXVlc3Rpb24gaWYgd2Ugc2hvdWxkIHByb2NlZWQgcmVnYXJk bGVzcy48YnI+IDxicj4gQXMgcGVyIHRoZSBCRVNTIFdHIGltcGxlbWVudGF0aW9uIHBvbGljeSAo PGEgaHJlZj0iaHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9fX2h0dHBzOi9tYWlsYXJjaGl2ZS5p ZXRmLm9yZy9hcmNoL21zZy9iZXNzL2NHM1gxdFRxYl92UEM0cmc1NlNFZGtqcURwdy9fXzshIU5F dDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdB NUpMeUZtbGk0djhuTTNObyQiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL21haWxhcmNoaXZlLmll dGYub3JnL2FyY2gvbXNnL2Jlc3MvY0czWDF0VHFiX3ZQQzRyZzU2U0Vka2pxRHB3LzwvYT4pLCAg cGxlYXNlIGNhbiB5b3UgcmVzcG9uZCB0byB0aGlzIGVtYWlsIGluZGljYXRpbmcgZWl0aGVyOjxi cj4gPGJyPiAtIFRoYXQgeW91IGFyZSBhd2FyZSBvZiBhbnkgaW1wbGVtZW50YXRpb25zIChpZGVh bGx5IHByb3ZpZGluZyBzb21lIGRldGFpbHMpPGJyPiAtIElmIHlvdSBhcmUgbm90IGF3YXJlIG9m IGFueSwgaWYgeW91IHRoaW5rIHRoZSBXRyBzaG91bGQgcHJvY2VlZCB3aXRoIHRoZSBkcmFmdCdz IHB1YmxpY2F0aW9uIGFuZCB3aHkuPGJyPiA8YnI+IEkgd2lsbCBjbG9zZSB0aGlzIHBvbGwgb24g MjV0aCBBdWd1c3QgMjAyMS48YnI+IDxicj4gUmVnYXJkczxicj4gPGJyPiBNYXR0aGV3PGJyPiAm bmJzcDs8YnI+IDxicj4g77u/T24gMTQvMDYvMjAyMSwgMTc6MzgsICJCRVNTIG9uIGJlaGFsZiBv ZiA8YSBocmVmPSJtYWlsdG86aW50ZXJuZXQtZHJhZnRzQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFu ayI+IGludGVybmV0LWRyYWZ0c0BpZXRmLm9yZzwvYT4iICZsdDs8YSBocmVmPSJtYWlsdG86YmVz cy1ib3VuY2VzQGlldGYub3JnJTIwb24lMjBiZWhhbGYlMjBvZiUyMGludGVybmV0LWRyYWZ0c0Bp ZXRmLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmJlc3MtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYg b2YgaW50ZXJuZXQtZHJhZnRzQGlldGYub3JnPC9hPiZndDsgd3JvdGU6PGJyPiA8YnI+IDxicj4g Jm5ic3A7Jm5ic3A7Jm5ic3A7IEEgTmV3IEludGVybmV0LURyYWZ0IGlzIGF2YWlsYWJsZSBmcm9t IHRoZSBvbi1saW5lIEludGVybmV0LURyYWZ0cyBkaXJlY3Rvcmllcy48YnI+ICZuYnNwOyZuYnNw OyZuYnNwOyBUaGlzIGRyYWZ0IGlzIGEgd29yayBpdGVtIG9mIHRoZSBCR1AgRW5hYmxlZCBTZXJ2 aWNlUyBXRyBvZiB0aGUgSUVURi48YnI+IDxicj4gJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IFRpdGxlJm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDogTFNQLVBp bmcgTWVjaGFuaXNtcyBmb3IgRVZQTiBhbmQgUEJCLUVWUE48YnI+ICZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBBdXRob3Jz Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDogUGFyYWcg SmFpbjxicj4gJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7IFNhbWVyIFNhbGFtPGJyPiAmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgQWxpIFNhamFzc2k8YnI+ICZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBTYW1p IEJvdXRyb3M8YnI+ICZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyBHcmVnIE1pcnNreTxicj4gJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IEZpbGVuYW1lJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7IDogZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDUudHh0 PGJyPiAmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgUGFn ZXMmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsgOiAxNTxicj4gJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7IERhdGUmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsgOiAyMDIxLTA2LTE0PGJyPiA8YnI+ICZuYnNwOyZuYnNwOyZu YnNwOyBBYnN0cmFjdDo8YnI+ICZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBM U1AtUGluZyBpcyBhIHdpZGVseSBkZXBsb3llZCBPcGVyYXRpb24sIEFkbWluaXN0cmF0aW9uLCBh bmQ8YnI+ICZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBNYWludGVuYW5jZSAo T0FNKSBtZWNoYW5pc20gaW4gTVBMUyBuZXR3b3Jrcy4mbmJzcDsgVGhpcyBkb2N1bWVudDxicj4g Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGRlc2NyaWJlcyBtZWNoYW5pc21z IGZvciBkZXRlY3RpbmcgZGF0YS1wbGFuZSBmYWlsdXJlcyB1c2luZyBMU1AgUGluZzxicj4gJm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGluIE1QTFMgYmFzZWQgRVZQTiBhbmQg UEJCLUVWUE4gbmV0d29ya3MuPGJyPiA8YnI+IDxicj4gJm5ic3A7Jm5ic3A7Jm5ic3A7IFRoZSBJ RVRGIGRhdGF0cmFja2VyIHN0YXR1cyBwYWdlIGZvciB0aGlzIGRyYWZ0IGlzOjxicj4gJm5ic3A7 Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vdXJsZGVmZW5zZS5jb20vdjMvX19odHRwczov ZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5nL19f OyEhTkV0NnlNYU8tZ2shUm9RZE4xeHJuZ0c3d0VQU0M2QXFIZXNRdHpHdkJNUDgyY29zeWVPMFBZ WmpUR0E1Skx5Rm1saTRDRlp2SkFNJCIgdGFyZ2V0PSJfYmxhbmsiPiBodHRwczovL2RhdGF0cmFj a2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy88L2E+PGJyPiA8 YnI+ICZuYnNwOyZuYnNwOyZuYnNwOyBUaGVyZSBpcyBhbHNvIGFuIGh0bWxpemVkIHZlcnNpb24g YXZhaWxhYmxlIGF0Ojxicj4gJm5ic3A7Jm5ic3A7Jm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vdXJs ZGVmZW5zZS5jb20vdjMvX19odHRwczovZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0bWwvZHJh ZnQtaWV0Zi1iZXNzLWV2cG4tbHNwLXBpbmctMDVfXzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdH N3dFUFNDNkFxSGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpMeUZtbGk0UkxUMi01USQiIHRh cmdldD0iX2JsYW5rIj4gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFm dC1pZXRmLWJlc3MtZXZwbi1sc3AtcGluZy0wNTwvYT48YnI+IDxicj4gJm5ic3A7Jm5ic3A7Jm5i c3A7IEEgZGlmZiBmcm9tIHRoZSBwcmV2aW91cyB2ZXJzaW9uIGlzIGF2YWlsYWJsZSBhdDo8YnI+ ICZuYnNwOyZuYnNwOyZuYnNwOyA8YSBocmVmPSJodHRwczovL3VybGRlZmVuc2UuY29tL3YzL19f aHR0cHM6L3d3dy5pZXRmLm9yZy9yZmNkaWZmP3VybDI9ZHJhZnQtaWV0Zi1iZXNzLWV2cG4tbHNw LXBpbmctMDVfXzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFxSGVzUXR6R3ZCTVA4 MmNvc3llTzBQWVpqVEdBNUpMeUZtbGk0NFV3RTV5ZyQiIHRhcmdldD0iX2JsYW5rIj4gaHR0cHM6 Ly93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRyYWZ0LWlldGYtYmVzcy1ldnBuLWxzcC1waW5n LTA1PC9hPjxicj4gPGJyPiA8YnI+ICZuYnNwOyZuYnNwOyZuYnNwOyBJbnRlcm5ldC1EcmFmdHMg YXJlIGFsc28gYXZhaWxhYmxlIGJ5IGFub255bW91cyBGVFAgYXQ6PGJyPiAmbmJzcDsmbmJzcDsm bmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9fX2Z0cDovZnRwLmlldGYu b3JnL2ludGVybmV0LWRyYWZ0cy9fXzshIU5FdDZ5TWFPLWdrIVJvUWROMXhybmdHN3dFUFNDNkFx SGVzUXR6R3ZCTVA4MmNvc3llTzBQWVpqVEdBNUpMeUZtbGk0dHJEcVVUWSQiIHRhcmdldD0iX2Js YW5rIj4gZnRwOi8vZnRwLmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy88L2E+PGJyPiA8YnI+IDxi cj4gJm5ic3A7Jm5ic3A7Jm5ic3A7IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fPGJyPiAmbmJzcDsmbmJzcDsmbmJzcDsgQkVTUyBtYWlsaW5nIGxpc3Q8YnI+ ICZuYnNwOyZuYnNwOyZuYnNwOyA8YSBocmVmPSJtYWlsdG86QkVTU0BpZXRmLm9yZyIgdGFyZ2V0 PSJfYmxhbmsiPkJFU1NAaWV0Zi5vcmc8L2E+PGJyPiAmbmJzcDsmbmJzcDsmbmJzcDsgPGEgaHJl Zj0iaHR0cHM6Ly91cmxkZWZlbnNlLmNvbS92My9fX2h0dHBzOi93d3cuaWV0Zi5vcmcvbWFpbG1h bi9saXN0aW5mby9iZXNzX187ISFORXQ2eU1hTy1nayFSb1FkTjF4cm5nRzd3RVBTQzZBcUhlc1F0 ekd2Qk1QODJjb3N5ZU8wUFlaalRHQTVKTHlGbWxpNFlvVHFrQWMkIiB0YXJnZXQ9Il9ibGFuayI+ IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vYmVzczwvYT48bzpwPjwvbzpw PjwvcD48L2Rpdj48L2Rpdj48L2Rpdj48L2Rpdj48L2Rpdj48L2Rpdj48L2Rpdj48L2Rpdj48L2Rp dj48L2Rpdj48cD48YnI+PC9wPjwvZGl2Pg== --=====_003_next=====-- --=====_002_next===== Content-Type: image/jpeg; name="=?UTF-8?B?MjQyNDJlNTYzN2FmNDI4ODkxYzRkYjczMWU3NzY1YWQuanBn?=" Content-Disposition: inline; filename="=?UTF-8?B?MjQyNDJlNTYzN2FmNDI4ODkxYzRkYjczMWU3NzY1YWQuanBn?=" Content-Transfer-Encoding: base64 Content-ID: <24242e5637af428891c4db731e7765ad> R0lGODlhcwAmAPcAAAAAAP///wCP1QCP1Pf7/vL5/QCP1gWR1gqT1gyU2AyU1w6V1xWY2BeZ2R6c 2iGd2iyi3C6j3TOl3Tqo3kWt4Emv4Uyw4U2x4lOz4ly35F645GO65WW75me85m6/53XC6IHH64XJ 64bK7IzM7I/N7JXQ7ZfR7pnS7pzT7p3U76PW8KPW76XX8K7b8bDc8rff87vh9Lzh9L7i9cnn9tLr +Nnu+eDx+uf0++n1++33/PD4/PT6/fj8/gKQ1AWR1QeS1QiT1QmT1g+W1xCW1xOX1xia2Bub2Ryb 2R+d2SCd2SKe2iSf2iag2ymh2yqh2yui3DSm3Tio3Typ3j2q3j6q3kCr30Os30eu4Euw4U6x4U+y 4k+y4VGz4lCy4Va141W04li241q341245F+55GW75Ga85Wm95mi95Gq+5Wu+5m2/5m/A53HB6HDA 53HB5nLB53PC53XC53bD53nE6HvF6X3G6X/H6YHI6oHI6YLI6oLI6YbK64TJ6YnL64rM64zM65HP 7JPQ7ZbR7ZrT7qXX76bY8KfY76jZ8Kra8azb8a/c8bDc8bHd8rLd8rXe8rXe8bjg87zi9Lzh873i 88Dj9MPl9cXm9cfm9cnn9c3p9s/q987p9tHr99Lr99Xt+Nbt+Nrv+d/x+eDx+eX0++Tz+u/4/OHy +ePz+ur2+/b7/fr9/vz+/v7//////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEAAK0ALAAAAABzACYA Rwj/AAMIHEiwoMGDCBMqXMiwoUOGiti0mUhxopcBAgZoHKAglcATFaVg3DgAC0U2hgKsKkJyiZqK FUV4bHijx4AHDFmN0BiJ4A2NRFYRJKAAo6WFKzJibOCQEclMB1WxxOgDUQEeqbKm2sEDoQaMhAqS sonE4B2MeQ7WmGlwj0YKCv0oHeDkIUGnAvJCNShVowA7dgXyyXKhsGEJG6kYNqxFUEImGSsQDJFR gOSClUj61cx5wAmEBKJk9JIwTefTaxzaGNnQxhIBex0WAUPwRZoOZnLr3q27Q6CBKXgL742mhUBW e3AP771HlcNSaDjQCVwwByQc1A2+9vtbodONsQn2/8UI2O6F03lP+/1QcEpeJgMbabwyMEzeOQuJ bBSAyC5ejeENNN5GQzBAxIEHNgAGAQZ9JQAlBvUggBIGlYDWQBtYoKGGW1yw4YZacPGhBVjsIRAB B4xEV3YCfZdRgAKNJ0ATLBo01gBlOXSIARgpohAEeQkgSo1EFmnkkUgmqeSSCKkxl3qaMRUBZ5V1 llcHAaQ40lxP+uXQWALkmB0HGplhECYHWADDQ24oJYAVClHilwCgRMVSXiYGhgIZG/TZZxlXaNTD F2X4+adxA+Fg0wBkEGTfACkQhNgAKzR0iop0MvQdgHZu5EdgXw0AYUE2UViQhQKkVdAcQZYSAA9D GP/xxQ4B1KHRFg1h4OYYDzHiJowBDKgiSZXlSZAGeYVFEJhiDnRHXnoM5EOXxO7HmQMGdRJkRtj5 txmwMqoRWBZPplftuXEkxIUJBj2CxUJSVPkGi5sOAO5UA6hqJCql2sVKEBilcRCyAxhQB0GFqEet X3IglAhJlxzEAwPoaSaABV+S1VAmQ+RlREOTBHkGkySXbPLJKKes8sosC6TJllCS9JshC8NsbSUB eFAzZ244FIpSNfrRxADsGoRKQS/ETCWWIShspSMBUGyteu82dGOzCr3AR0EyaESFQU4OAJdDcBC7 SEJjuJmuQTzg+0SSNmG7ECuQDZBAQUlo9AlBg2D/BMVDm2wpQA4KOUISJ53mpa9DJVRmLkZcUgv1 QDRjRMNAI2SUmkAzYDSEcw3xMVcEmj7VqUblPSRGRl2ooMIKK6hAh0Y/kMBC7K9PkBceBeGwUaUB gLKRc/xqZIpD7vkFR0Obwna6AGiAqlEhBY1iUxIG5YFRtAZh1IYOAh090AIY9cRQAUBALsBRzM91 734CICDEAvQvoMAQGNBaELICKDvQ1Wa5kEBi4IJGNMITmTCgAhvhgg8o5QsvMKALcHaQSKRHAAro SlO+ZafHQQ5mAuhDg8AiFo0VBAQCDAAIMWWuKlWGKQZJg5vg5C2/vI92LujKKna4CtAdRAwa8QIL 7YY4xLPErwREHGIVMMI7km0nL4CgjovsdboBiNAumbPYsKpkLUQZRAZ5+dtAOrEAAXwtITjgkiey U68bDiB1RSKARo4QmEOkR3wDOUNlMnCQQrgJPvQyHV+KUCwkAfAhYMjLD4RyECxUJhEESeRmBCAB mMCkBAlpnhsHwAQPWHIifWCQ1UzIEFAEqQsLwQEQ8gIBgWiBS0qbI0JeMJcaHGQV04plXr6kEbkp hBVTEkAPjtcQOWSEVwGQxBw+wMxmOvOZHxiEQnIAgj1o8JZ/gKY2SeDDhejgDW1YnEI+AUm7fIKR LUunOtfJThYFBAA7 --=====_002_next===== Content-Type: image/jpeg; name="=?UTF-8?B?OWFlM2UyMTRjMTdkNDllZDkzNWQ4N2M2NzRiYTNlZTIuanBn?=" Content-Disposition: inline; filename="=?UTF-8?B?OWFlM2UyMTRjMTdkNDllZDkzNWQ4N2M2NzRiYTNlZTIuanBn?=" Content-Transfer-Encoding: base64 Content-ID: <9ae3e214c17d49ed935d87c674ba3ee2> R0lGODlhggB4AHcAACH/C05FVFNDQVBFMi4wAwEAAAAh+QQICgAAACwAAAAAggB4AIcATr79vg2j x+twuSDo8tdNjNSk0mTQ57AojVB4uI7+1GPI3/P+6rKPxan9yjsBes4/gtD+34y61u9jm9rr9vva 7Pek0aolccv///8Baccki9Sj0FwSfM6DtOOAv2Wy1e9Mo92axurf78n9xisLacf+2XNwpN33+vE7 m9r9zkv+89Q0jNWMvebh7/nL5KPR5vbC3vP+5Jxks+NbpN10u+UDg9Gqzuyi0YLx9+aTvuYkhNF/ wDbZ7L0cjNQAdccAZMUlkta73Y0Ybsn+z1CUyk5LnNpiqd88k9f9whz+3YNNqt9EnNr0+/18vOaF weczm9oBjNQae879xzK426PV7fjc8vqIxCek0u79zEP+5qR8r+Cd0u5ss+O84vT+8Mlbqd8Le87M 6fdTnNrl8dMrg9G22e8BXcMKdMsrdcyUyuuMy+xtqd+s1vAsktb+9t3+1muy2Hqs1XTt+f1xsdvE 4/X9012BwQ3u9uIwjelDkteKxTTW6rr+23tTo939xCNEo91ro92DvPd7wOcchNKEwoQ8jNRtvOZN ltg8o90sm9qIvui02YOm0/kri9QLgM/m+f1dseIUg9EMjNQOZsZUqd8NW8I0k9cSdMv+4ZObzOwk fM/H6ff+6Ku24PN1wunV8frz+esyhNHN5quDvOZcnNrU6vczeM2bzVpxr+y/35R7viO73PLb7cOn 0mz++OTE4Z2s2vHj8/oSbsphpN6TyTwAbMmU0O6r05rb7vn9wRTN7PlDi9Ti8M1Dltj+7LvT6LRK ktaTxene+Pw3od2EyetbrOHL5fV0reAse86d2PF6vSlzteMCk9am2PEtldigz/Eckdaz1/Gt1IW6 3IRjreGz3PkBVMBNseEzltg8mOH9yC9sreFVrOBSltgcdMs9ltgkldmKwOdhueUeftAAddCMw+mB v+kNbcnn89ir0+6jzex6tOP90E/q9NyVyPBEqd7R56+k0nH9yTSz2/ILftB8w+mAvyP92G390VQK hNEBdMuEw+kAfdARftD+/v7///8I/wAxCBxIsKDBgwgTKlzIsKHDhxAJMimHAgaGckvoYNgHgg6T JktKMaFRpBSGZSBKyeECogIFLn1iYeDyxSW1LxRiFeMmh8kXarGq9KHGBNdPDLH6cImFC8QyDC9A 0MBABUQTJsaWNMFAZ8koDFn3MemyJBiGVX/SYJiHItNaFFsiLkwH4goTarXSYZihjw2GPvrSyQFx xiMKfRaPgFkV69slY7Es0aOCoVEkY1UaaYpValAkCnIG6SjVeQUFY5E0FAXTBtcmDnmYrHrwhKu+ IhTmnenDJJ0+EBg+1OJ9pdY2DMH0ycCQptayibW+ZvozT67BJrW4gFXXgusVmXS+c/9NR+HslfKr 0slMT0E2GyZr2bRf9YEJkw/RBKaLZj/aKgwUpFNdb/MwIUc6FgX4HwVX/BcLgkhd0QVS6mgUiw3G YICLOhnickWGpahTwUw1uGXdWcGU8kIaGp3o4oswMsSEEpKsUkoT1UVUzAMmxujjjz5SoUMtsFzx ADVyZfLFf0A26eRDxswTxhrArGJME/lBSUd5T3YZC3xdFtSUDuowBSYT8zC5EBMgaGBRmE3OM0sw XMKJQRP6RAemQKvkg8KeCTExgyUt2hkjE1xY0wguhlLRiD5PbFJQVto1xMSXhv54BQo01NnlRA/w eJB9Db3gUaY/XiqHobGAoI8zlBn/REEzOSokxiVZogrjKtzs4+mTqP0gw6oGrXJJHgzRgEKhup6I aAYrjAhnUhr4dVApXJi1UE6ANisXBcXU0kascFYhUqDdHmTMKr96CxEFkOiTCLldzgPJFQnFkkmu CYnhDb+6VlFPPYw6RMEXPzRi0kNXGMKsQhQYYY0l7fKpzxEMdSDGw6iyUUsGejnERDBkzCKTQ1UU Ys1xlqpDilgIlbJNOO5CtMouBXQRS8UHUdAJvQvF8skxppQD0SbEvkhHNDzbyUQYYawyAw0nF8QE FfPYUh0uIaRT1BZX0FF1QVfMEIwuW4q8yhqZpCtQLGlYq9Af+nxQ80Cj/KAP1QRV/wELSJHoA4S+ ZuiAyyj6PIANNVvoAmgzGphxBNBBI+zM2AStoo8lDIHEcbPzAFHLA50KVMoMD+SpzyW94ALDEUux EMUZqrehzkDz9FALGII0fVAslECK+UAVcGH03RGFro8+acQixxWa/NDDH4bYIilSq8YCSz3XgHPG D7MwQUEYooPBN0SxcKMPIr43tG77mc7TRiQg9EJDGKNQM0/SCDGhiyfcSFMf3gGNSPROLunTxzCG 97Z9MaQIl5Ab8qgShmVUQgfGIJVAVBCDJCShBAp4Ax8w4QWB2IcC67CGBmBxLgSqLxEMxEAZZIGs hYyiDxmaoOmoYIxllKNOWVCAA//8II8I4CMXSPADEkZQB04MZBViaB4V3MYQnfzAEjGsQBN6FCj4 xa8NjdgfmHyhgBH4YQQjkEcS+CCPETjAAW1EAj5KiJRYUIMM++DfQ9jQh2BQEQN/JAgd2BDDgP1h dLDYIB+kQEQ4ysMBUsBHDCJQhwjEoAR1SGMWTHiEH0Qikdapgh77tg98LaQIZ7Ab8iayPBnIxBUx wAIS5IEFB9QhCW9QQAmScA985DIFSYhAEmMgEHVEIgMgqEJEmHCFOVFRc5xbCAtmkcO7GaMNtYCV QDiByzfIEguYiEEddukANyoRCxHIAj4CMIJNMgESZwCDWt7VB2tgg2e4WAcXdZj/EDnsI3H7EIg6 bRmDN+AjAkI8IxbQSMs68OGhJXBAABzgBq4AIQN/oJxCZKPPQDZkFeK5G/B+0BoMeCEFSpRHCdLJ h1yMAB/4wEIJMBnOOsgDH5gogTxu6YqZZOCTEYmFRgcSi2CETCGHAeXd2ACCeSbBD1gYgjzkoYAy yuMenKCkF2KQgqrKAwkO4IMHIzACJ9JBDFxQ5kN00gs1GWQetYimQpoAgmq6KxZhUCsGFIAEEQ7x jG/AxBvekAIHYKKMSXRAYV+ahSTkogRvo0IVPEoQWOgjAzA7SPGOx0+FLIMDAcWAG/CBBD5koQ4p wIcCJimPRmKBD5eEIxZSIA8p/2BCmCmoaFZK4hCd1CISbjUIZcEyDy++qCcCkQMFllsFQFSCNwLh KxYGiwlOvAGODsBCLUeggDXyAR+0dAA7kmDVEqphEqaIhnJBAx8DYaAKm5AJBfZRA31Q4o8tCIYp bSWL2xlDHYxhQgX2EwtMuYgOf5ABBeighCcg4gnFUMcHCoWJJNIyBQ+VrXa164BcpCALb3CjTOvw RnkwAAO6SEMImoCIPyBiGGlgQibqwgXQrmR5PajVQVZBQ48GgxppuFIPuNEJY2QCGyCYxxWkdaIQ mOEMpQiBLDKgD73JQBgFeQMStjzR645gwxzuawzwoQ3tFvaN2tgkIGFBBr3V4v8HRfgEKczQhyWY YRmxEIMZejDPhFRgFLdb03rDAIstUQAX89CZgU9kjBlw4TTUWEIfvoCCfPRCx67IAghDSFgzErG1 KvUFJ1Lw5Vpmt5ybjMUyNJCIGdS5CJmQgzrEIKFyZGgV4VjFcD+aCeO6aGeRxUUskuGIWoSWIK5I thtU4AVu4mMEKSjBG9aYhDoQccMOWKIvuDIkQzCFCrho72QBOZDhtqAc+03IEs4QXF3RQQP6qIdD VJBV8mIBqhHgQznTmIKuVnQVjyJGkzSHAob82CP20WCmuqCBB8j7ISpAqRTayAdOhLAE+BArJgQC i4YLHEi42GJvq0ByybrbEvr/EEdEMHHGwmJBtZY0aApOjAE15AMMcanZKtJQigL7XFe4KMIPnlBI hPAhsQ7QhmIXGgAFDEQGP9CBjmN0uEAjVR/tRhUT1iGLPvhaIK7ggxmnasYA5KIOPRXIMkhQBL36 aB76+AZDylGMFyAvDPuYkHWCiIWpyoMdmEi7QIxhiHT7CBfm2Gf/9rRrH9knFlfw2omanQUGVLTc Si66ixSeEBikQWck/8S4DRXyfYTjHOMIg5OoEApjN94hVWeIGM7RNjkERfM+ioUMaqGDYjQCBbgP KggeIIkkD/xYDEkDFxamq1hA4gG1QAFkwkCHguXeGB7SQcIM/6JYqOGo6HLX/zpqUYsn6F0dOgBB 8BlysEbgKxxgEJdSdcWGclgfVZCoBTb0zoRRUPkqMbIPD/ADT0EBTQAGP3AEqhcjpbAMfZYQvVAL bRMUogcjuJAGnrAP+1APnjCBTfB5W6B3g4cNv5UGo2cdbDAI4sIkBsgBS+B2LgJXbcAQmXAMdGB7 VVCBCNQE1OAh8RcqeRIFXZAJP8ABzEcQufMAPQAC+mMdq+AM+pAP6TYrSrYN3BcR52Z1mRIGZ2AG mUAHRxAFGjCGUZAHhIYMCogQ9SAJoVJ+n6MQuLAEP0A66SIHS2ANS/B6LhINmbB+MTMPxrANVYIB m5AMsDAPsNAMGcIEzdAFVP/UBT1QA8xQAw/AWQ5RAUPiSj0zCrvAAnooJoDGECiQFy7SFP2QBnLw CJ84EMbQcFBQAzWgLQ0RC11AB2lwPqPyCauYObWAMQuRBpSwP0FRBX7IBP+UAQD4IojCAanTB0e4 EOWwG7sYERWwDzm3EDhIcroAg3B4GM6wgDAyXwn2jBs1CpWwAn4II5yHEPPQhyfSJw43jcJFVJgi B2pFASRXBbhAB13QBegGdB/IEIcgCwDzEFvwADUwfz8SC/vwBG3QNk0ABAXCBeCQCE/wBIPAAU4g j8lzDrGxEJmwDCZhe6vyeO1BRSMzOlMXI1XADWCQAT9ADVUADNZQDrHQCHr/szx6Yw7eoi+qtCZ0 0AlNYAlcUItXUARfMA/NwI0CMQ+RoE1N0gSpowFGoGuZAAgekQkz8AWGQAM04I6dZRDpsA/zUAXp sAyZIFl0MAq2ljajQgfkCCMVMIpPAAsncykmVGCgMUqZggvLIIvq1hcmxHgeFQtbIBhNEgYaQIDu sgevMAagwAup8As4gAOvkApjcAJj4AINQA7ZQINNEJcNoQ4/cAlZ5yIvcWnNcgKsEAcGIAKgsAdx 8Art0A5BAAesAAqsMA23EAwF6SSrUADdYHdNUgVhEAxr8B7pQAMDUw800AQZpA7Q+SKg8Au/wAt7 wAongAGg0A53IBB30A6g/8Cd7YADDpEOihAGBqJcfJkQxNglcpAHACADVXAEZrA8efIDo1AKoWAG AbWLr0AEogARVPCXDLEEtYCKOagLuthbadBrT9J/efAd20AGbXChjRAK6oALgFAIWzAPowCOEJEK qTCeD6EbNaQQ6nA/gMSeD5EJu3Oa6khUdFCj/Kie7yVUnTQVETEGvIBAaQB+geIsaaAPNSBBubcF LEJZYYBNxRARd+ACY2AdyDUX4XB/EJEJD5APK3lcMpAP+jAIlsiOPaAPlfIQonAKIiAXFbANY3oQ h3AOppRwL7qlXeoiVzAI/AAFm2NXBoEL8RIJircQe5AK7SAXq+CRDPEBNP9Qlgt6giCJkHd6IvtA D5L4AGE0V3lCCV+HAeFpHQ8ioxKxni7qEM2hDwoJI/PgijXQAzKQCUwpKGagASL4EHeQmXCSCTTA ZBFBB70gBrx6KGkwCOujBBwQBYjgCVtglzUHAgA2CqnaEL+wCFMaEaXwBV+xECQopBChC0OljDRg CQ3SCBlQC/oQCZqwDlWAAgAwA+3ZEC4QB9UKEXAnVwlxBSyApQ9BBTRgk0+CV/DRBSShA9DXdplA CuowjWPAAyaKPg7UEPZIjEHxrgWRCWZQC2/SJPi4J1ijBp6QI6pInQ3bJekwCl2Qg6JHBesHA2Iw A6L5IqNQCFr4JLzwCyP/6xAywwIMEYES9HrC8Ahdsg7IEAJ28gqtMK8PsQpnkKL3SjAncjh08q9U 0KkRcQBBcKhBdQWTKhEuAqOL8SSHxpEL0Q5I+y6UdQU0cIPD6IdFWgNbS6ng8Ax2wgoEYB3Xmq0K cQgkUHsk54dayqVPQgP54A5wkgpxgLXJcwa94FHpEAz66hB/+7Zy0Q434AFTcLM/0g6t8AonQgET 5jRpsKXV0CRjcApWYAWqEAeYS53YqZ2Gonzf+ou14AMWwAPfiQ6ikJu6eQDtcAJ3cAC5yZoHMKV3 8At7gAOgMAa/YAD2oAdEMAA7AA/tIAqQ+bt7MJ4iMLyeygPHiwFjIAo//xqblIkBv7ABQfCdLlIK lLAVC4GgtXd7+4oKcyANuBmbrXC17ZAKrZCbrHC/Y3AHrxAHooADrAAH1Dq9cKAHVkALp7ADypAK PNAKv9AOBTwNvADAAnwHIrAIi3DBomAALnCrixAHF2y1ZYuoDyB3CzEP5aC2OciU/RQLY8AK33kH PMALJxCZNOyprMALoJC8rHCod8AKsHkC7SACcKAMqkALqrADv2DDvYsDIsALOKCZQXwCBFzE7cAD vQsKIsAKVby635IOomo1dPoQL3AM65CODNEO8aAKdmAFiyDGYfmLInkiFlsLZTy5hIAACUDHE/QC s4C3gfmb7sMNS/EkjP+AB4FQxwVhLMDAEPUnEnJAkhDxCWxsMLhAsRNEAYUmIxT4CZ+wjVAyFJns EDDwAVSbKcvFECGwfIPZeGmQAWcguaG0C8jwhhNkDH9wpgkRp4acfEZqy9+yDD3oyHyytAyxCltw yhgQuWGyXLiQDi9bMwtGnOznOplQlhRABftBclQEzXASDEJwDMjsEOUAZHRgCJJwDfNgi+CACGyw BY/LBG0brUASDWLgFsLWWcZQBE+xEIeRBgumNcRYCsuKC6XAM5lAZXusjF9iDIVgBKu8wpAgA7Y8 G9jAENEQDM6saniGKsYQCjixClzgIGLzXl1QHlVwgxqSNvsIHzGNFFv/gA2hsgLVwUOmcyphkEEU wAYP/Wtd4Di6wgRwiQE0kAFfwQJkcDssgAx20QRkIAEnQQZ2sw6hoGt3lCGjwIyvaKYUsA2FMCJ9 UAjGIAeksAt2N1zBsA3YDBHBEAUzUNEvYtIawQIaigE5AAFeMwpTjQFYbTcdAAGrIAfbEApcHQUP 8IoPsAxhPdZ7kQcvIAcTAAyk0QfrIJDnQNUQYSAsMAmNELuZEgu6UB4UcC54lT1ThBRELVTtVdPL YwnVQdoCUQWrLcoYsAChMAMM0Y4Su1zOY0LEcik5QQflUCFq0AznfCLzQAkB1BC5ocsEoS/FUAwy IAPFwAVhQAHlwAUt/zARXyAD3AAEPxAFxLzcDNgH7KsQbPAH8bc80HcOTaALmmAG6RAGoZCT+nAG 0ofeqAIDUVAEDFEMZ9AGKJAIFgkNzqAebbIl3KDgT0AJmfC4/h2hdCCiCAFSKpuPuDBuTPE2uCBs dF3hEVGlMiK2JO4kuDALBVDNAxEMRzCzKa5DcTgIfooQTcABDzjj/LQuw1UBZWniPF4zsVAOo9Cp HOqJQ343jgIG0r1jF9ANJbnkWkcHkJEGTsDG+lJcmTAKMlFgtX0y75mjYS4Q/cwEY37mai4TRVEe V1MecoALbj61gLTah2badm7n4QYg49bN8BG2SLHnHx7oGFABK/CCMP9CBYWABmEQCzMw14JiBAU2 C8eBC0rBBC3QB45dCkWQ2f+c2Zx+Ff/8FavgFVyxBOUgG73gFmywBEQ7D9/QNumQB3qRCb1wO+rw Dfhi6/8RDL2QH8GwBAVSDr3A1d9gEaOwBDDQf0UQbtvwDS/QAt0wAxT+EBSQCUaDC2QQCrHwCBBQ CKWACxBQAFgxCLFRCqZwCLFAB8gwAWfhDWLAFWgw16uABoCAAVfgDfcuARewDc9zAR2AASHgDZmt Dt5wFSFwAWYxCt6gszngDak+ChcgABhwDN5wO1pw8UxwDGjwHzPgDVRtAt7gNYBgCgvABGIwDv9h e00yFqdSo/ZRo4BJVIsC0QUZNBaqRwFdoHo4DyCdYBKxYCM+Txk+A/TzQBmxMA+MkvQyUQVKjxTz 0PRRTxU6oyGdIBNYsyphUFxUXx6lwPWusYsBAQA7 --=====_002_next=====-- --=====_001_next=====-- From nobody Tue Aug 31 22:56:22 2021 Return-Path: X-Original-To: bess@ietfa.amsl.com Delivered-To: bess@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096D33A17AE; Tue, 31 Aug 2021 22:56:19 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.996 X-Spam-Level: X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dykcCQF5JYBo; Tue, 31 Aug 2021 22:56:12 -0700 (PDT) Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 058A93A17AA; Tue, 31 Aug 2021 22:56:11 -0700 (PDT) Received: by mail-pf1-x42f.google.com with SMTP id x16so1202432pfh.2; Tue, 31 Aug 2021 22:56:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=aByQ9xME/6E3TV2QE7D3Lsd4rP8InCU1JkCba6J1tYg=; b=kLm2N2+e5l/r0OrVqopEZrqP33MgSkEYLCSNY8FVQMJY8/xUPQDZ+rjLfiPslV1oer pgJB+I+FOep3fAPpIg7K7n7bFYlkgbyHPMZbzgbZqj8kQLKuMZbt87gK6k31hfZBp0H+ djXo8W9jCXd9ZSoao2XafGLJqjZlosiqw6lWFtR7eFEsmiKPxdxp95gUZYBB5zKjUwB4 R2yDiqeYFITzE/KWU+kHLsYIPJLZ6XoRTBthis+zHXI0Fv31e0ozeco8ryRNlIr/6moc b034MqnepJ5EaZ3UZl0BvKl9vQJisBVf+BbMLYcUUzF39SmqoPNBO4OHFXndDMcmtopV t5pg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=aByQ9xME/6E3TV2QE7D3Lsd4rP8InCU1JkCba6J1tYg=; b=QQGvo8bNhzuZ+RMXLbQN1gFwo3qyItGB0aWX7Ve0tPbPM4MHeJIh1YXaui3nOTjbwi J63SCKypDapc4AEE9K44pUmZhF7VvT2gvrHP3h6gu9G+ZsnErsx+AebdPiIdR5OaN1O4 LYPa6yBMNcpJYuYo182O/Jaj7X5JLrTdXsyR4tBNboammHdE6wQaS2YT3Few5yhAEMPC KZYb1z9pHUU0K6QktF8Dmek0XgULNYY+NYfq33/VfqiJcAn6AOFyWRncrJj3M91lcaog y/QT4vgN31SK6R43vt9pRZwIowsXpwB9C5JF7kF0KksoEE6e9v/1TaT3zZgF0TNZnZgE 2cew== X-Gm-Message-State: AOAM532fWAbMl1fDDhcuP5jbW62c07s/OfNXXZUlZKcY8BU/hB3fPb2C FKRKmKzauNGZMUh1eyLKIVW43neye1UsT/ijlAw= X-Google-Smtp-Source: ABdhPJweaqmKSYu41rOKqLaG0yAWdL/nf7/fhlef7MvXfY0bZMjvOix3wSKO0fXqyPtGBOjUnE1nqJpBAjpJEOIxcZ0= X-Received: by 2002:a62:a505:0:b0:3ea:fcc6:f5c9 with SMTP id v5-20020a62a505000000b003eafcc6f5c9mr32651925pfm.20.1630475770239; Tue, 31 Aug 2021 22:56:10 -0700 (PDT) MIME-Version: 1.0 References: <202109010536357895706@zte.com.cn> In-Reply-To: <202109010536357895706@zte.com.cn> From: Gyan Mishra Date: Wed, 1 Sep 2021 01:55:59 -0400 Message-ID: To: gregory.mirsky@ztetx.com Cc: bess@ietf.org, draft-ietf-bess-evpn-lsp-ping@ietf.org, jdrake=40juniper.net@dmarc.ietf.org, matthew.bocci@nokia.com, sajassi=40cisco.com@dmarc.ietf.org Content-Type: multipart/related; boundary="00000000000019dc8805cae8b907" Archived-At: Subject: Re: [bess] Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 X-BeenThere: bess@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: BGP-Enabled ServiceS working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Sep 2021 05:56:20 -0000 --00000000000019dc8805cae8b907 Content-Type: multipart/alternative; boundary="00000000000019dc8605cae8b906" --00000000000019dc8605cae8b906 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable As a WG member providing operators feedback, I agree with Ali that we should proceed with publication. I support progression of this draft. As Greg has noted that LSP OAM ping has been utilized as a critical tool for operations in data plane troubleshooting of control plane against data plane failures. This document describes a critical mechanism for operators to detect data plane failures using the same LSP ping widely used, now being applied to MPLS or SR-MPLS based NG L2 VPN EVPN & PBB-EVPN using 4 new FEC Stack Sub TLVs, EVPN MAC/IP Sub TLV for EVPN Type 2 advertisements, EVPN I-PMSI inclusive P-Tree for EVPN Type 3 advertisement, EVPN Auto discovery Sub TLV for EVPN Type 1 AD advertisement and finally EVPN IP Prefix Sub TLV for EVPN Type 5 advertisement. Kind Regards Gyan Verizon On Tue, Aug 31, 2021 at 5:36 PM wrote: > Hi Matthew, > > my apologies for the belated response: > > 1. > > I am still awaiting a response from our product team on whether any > part of the draft is supported. > 2. > > I concur with Ali. LSP Ping is a broadly used OAM tool detecting and > localizing failures, including discrepancies between the data and cont= rol > planes. The document defines necessary Target FEC sub-TLVs for EVPN an= d > MVPN cases. > > > Regards, > > Greg Mirsky > > > Sr. Standardization Expert > =E9=A2=84=E7=A0=94=E6=A0=87=E5=87=86=E9=83=A8/=E6=9C=89=E7=BA=BF=E7=A0=94= =E7=A9=B6=E9=99=A2/=E6=9C=89=E7=BA=BF=E4=BA=A7=E5=93=81=E7=BB=8F=E8=90=A5= =E9=83=A8 Standard Preresearch Dept./Wireline Product R&D > Institute/Wireline Product Operation Division > > > > E: gregory.mirsky@ztetx.com > www.zte.com.cn > Original Mail > *Sender: *JohnEDrake > *To: *Ali Sajassi (sajassi);Bocci, Matthew (Nokia - GB);bess@ietf.org; > draft-ietf-bess-evpn-lsp-ping@ietf.org; > *Date: *2021/08/31 11:34 > *Subject: **Re: [bess] Implementation poll for > draft-ietf-bess-evpn-lsp-ping-05* > _______________________________________________ > BESS mailing list > BESS@ietf.org > https://www.ietf.org/mailman/listinfo/bess > > Hi, > > > > I agree with Ali. > > > > Yours Irrespectively, > > > > John > > > > > > Juniper Business Use Only > > *From:* BESS *On Behalf Of * Ali Sajassi (sajassi= ) > *Sent:* Friday, August 27, 2021 9:54 PM > *To:* Bocci, Matthew (Nokia - GB) ; bess@ietf.or= g; > draft-ietf-bess-evpn-lsp-ping@ietf.org > *Subject:* Re: [bess] Implementation poll for > draft-ietf-bess-evpn-lsp-ping-05 > > > > *[External Email. Be cautious of content]* > > > > Hi Matthew, > > > > Some of the co-authors are on PTO and I couldn=E2=80=99t reach them (typi= cal of > the month of August). So, I=E2=80=99d like to get a bit more extension. > > > > Regarding the two questions below: > > 1. > > My company hasn=E2=80=99t implemented it. > 2. > > I do think that we should process with the publication as it describes > how LSP ping can be used to detect data-plane failures for various EVP= N > functionality including aliasing, split-horizon filtering using ESI la= bel, > multicast, l2-unicast, l3-unicast, IRB, etc. For MPLS transport tunnel= , I > am not aware of any other tool/draft that allows us to do data-plane > failure detection. Thus, I think it is important to proceed with its > publications. > > > > Still I=E2=80=99d like to hear from other co-authors and other people in = this > community. > > > > Regards, > > Ali > > > > *From: *Bocci, Matthew (Nokia - GB) > *Date: *Monday, August 9, 2021 at 6:25 AM > *To: *bess@ietf.org , > draft-ietf-bess-evpn-lsp-ping@ietf.org < > draft-ietf-bess-evpn-lsp-ping@ietf.org> > *Subject: *Implementation poll for draft-ietf-bess-evpn-lsp-ping-05 > > WG and Authors > > Unfortunately I have not seen any responses indicating that there are any > known implementations of this draft. I also did not see any responses to > Stephane's question if we should proceed regardless. > > As per the BESS WG implementation policy ( > https://mailarchive.ietf.org/arch/msg/bess/cG3X1tTqb_vPC4rg56SEdkjqDpw/ > ), > please can you respond to this email indicating either: > > - That you are aware of any implementations (ideally providing some > details) > - If you are not aware of any, if you think the WG should proceed with th= e > draft's publication and why. > > I will close this poll on 25th August 2021. > > Regards > > Matthew > > > =EF=BB=BFOn 14/06/2021, 17:38, "BESS on behalf of internet-drafts@ietf.or= g" on behalf of internet-drafts@ietf.org> wrote: > > > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the BGP Enabled ServiceS WG of the IETF. > > Title : LSP-Ping Mechanisms for EVPN and PBB-EVPN > Authors : Parag Jain > Samer Salam > Ali Sajassi > Sami Boutros > Greg Mirsky > Filename : draft-ietf-bess-evpn-lsp-ping-05.txt > Pages : 15 > Date : 2021-06-14 > > Abstract: > LSP-Ping is a widely deployed Operation, Administration, and > Maintenance (OAM) mechanism in MPLS networks. This document > describes mechanisms for detecting data-plane failures using LSP > Ping > in MPLS based EVPN and PBB-EVPN networks. > > > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-lsp-ping/ > > > There is also an htmlized version available at: > https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-lsp-ping-0= 5 > > > A diff from the previous version is available at: > https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-bess-evpn-lsp-ping-05 > > > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > > > _______________________________________________ > BESS mailing list > BESS@ietf.org > https://www.ietf.org/mailman/listinfo/bess > > > > _______________________________________________ > BESS mailing list > BESS@ietf.org > https://www.ietf.org/mailman/listinfo/bess > --=20 *Gyan Mishra* *Network Solutions A**rchitect * *Email gyan.s.mishra@verizon.com * *M 301 502-1347* --00000000000019dc8605cae8b906 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable

As a WG member providing operators =C2=A0f= eedback, I agree with Ali that we should proceed with publication.=C2=A0 I = support progression of this draft.

As Greg has noted that LSP OAM ping has been utilized as a criti= cal tool for operations in data plane troubleshooting of control plane agai= nst data plane failures. =C2=A0

This document describes a critical mechanism for operators to det= ect data plane failures using the same LSP ping widely used, now being appl= ied to MPLS or SR-MPLS based =C2=A0NG L2 VPN EVPN & PBB-EVPN using 4 ne= w FEC Stack Sub TLVs, EVPN MAC/IP Sub TLV for EVPN Type 2 advertisements, E= VPN I-PMSI inclusive P-Tree for EVPN Type 3 advertisement, EVPN Auto discov= ery Sub TLV for EVPN Type 1 AD advertisement and finally EVPN IP Prefix Sub= TLV for EVPN Type 5 advertisement.

Kind Regards=C2=A0

Gyan
Verizon=C2=A0
On Tue, Aug 31, 2021 at 5:36 PM <gregory.mirsky@ztetx.com> wrote:
=

Hi Matthew,

my apologies for the belated response:

    I am still awaiting a= response from our product team on whether any part of the draft is support= ed.

  1. = I concur with Ali. LSP Ping is a broadly used OAM tool detecting and locali= zing failures, including discrepancies between the data and control planes.= The document defines necessary Target FEC sub-TLVs for EVPN and MVPN cases= .

Regards,

Greg Mirsky

=

Sr. Standardization Expert
=E9=A2=84=E7=A0=94=E6=A0=87=E5=87=86= =E9=83=A8/=E6=9C=89=E7=BA=BF=E7=A0=94=E7=A9=B6=E9=99=A2/=E6=9C=89=E7=BA=BF= =E4=BA=A7=E5=93=81=E7=BB=8F=E8=90=A5=E9=83=A8 Standard Preresearch Dept./Wireline Product R&D Institute= /Wireline Product Operation Division


=

E: gregory.mirsky@ztetx.com
www.zte.com.cn=
Original Mail
Sender:=C2=A0JohnEDrake
To:=C2=A0Ali Sajas= si (sajassi);Bocci, Mat= thew (Nokia - GB);bess@ietf.org;<= /u>draft-ietf-bess-evpn-lsp-ping@iet= f.org;
Date:=C2=A02021/08/31 11:34
Subject:=C2=A0Re: [bess] Implementati= on poll for draft-ietf-bess-evpn-lsp-ping-05
_______________________________________________
BESS=C2=A0mailing= =C2=A0list
BESS@ietf.= org
https://www.ietf.org/mailman/listinfo/bess

Hi,

=C2= =A0

I agree with Ali.

=C2=A0

You= rs Irrespectively,

=C2=A0=

John

=C2=A0

=C2=A0<= /p>

Juniper Business Use Only

From: BESS <bess-bounces@ietf.org> = On Behalf Of Ali Sajassi (sajassi)
Sent: Friday, August 27, 2021 9:54 PM
To: Bocci, Matthe= w (Nokia - GB) <matthew.bocci@nokia.com>; bess@ietf.org; draft-ietf-bess-evpn-lsp-ping@ietf.org
Subject: Re: [bess] Implementation poll for draft-ie= tf-bess-evpn-lsp-ping-05

=C2=A0

[External Email. Be cautious of co= ntent]

=C2= =A0

Hi Matthew,

=C2=A0

Some of t= he co-authors are on PTO and I couldn=E2=80=99t reach them (typical of the = month of August). So, I=E2=80=99d like to get a bit more extension.<= u>

=C2=A0

Regarding the two questions below:

  1. My company hasn=E2=80=99t implemen= ted it.

  2. I do think that we should process with= the publication as it describes how LSP ping can be used to detect data-pl= ane failures for various EVPN functionality including aliasing, split-horiz= on filtering using ESI label, multicast, l2-unicast, l3-unicast, IRB, etc.= For MPLS transport tunnel, I am not aware of any other tool/draft that all= ows us to do data-plane failure detection. Thus, I think it is important to= proceed with its publications.

=C2=A0

Still I=E2=80=99d lik= e to hear from other co-authors and other people in this community.<= u>

=C2=A0

Regards,

Ali

=

=C2=A0

From: Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.c= om>
Date: Monday, August 9, 2021 at 6:25 AM
= To: be= ss@ietf.org <bess= @ietf.org>, draft-ietf-bess-evpn-lsp-ping@ietf.org <draft-= ietf-bess-evpn-lsp-ping@ietf.org>
Subject: Impl= ementation poll for draft-ietf-bess-evpn-lsp-ping-05

WG and Aut= hors

Unfortunately I have not seen any responses indicating that t= here are any known implementations of this draft. I also did not see any re= sponses to Stephane's question if we should proceed regardless.
As per the BESS WG implementation policy (https://mailarchive.ietf.org/arch/msg/bess/cG3= X1tTqb_vPC4rg56SEdkjqDpw/), please can you respond to this email indic= ating either:

- That you are aware of any implementations (ideally= providing some details)
- If you are not aware of any, if you think th= e WG should proceed with the draft's publication and why.

I wi= ll close this poll on 25th August 2021.

Regards

Matthew =C2=A0

=EF=BB=BFOn 14/06/2021, 17:38, "BESS on behalf of <= a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank"> internet-draf= ts@ietf.org" <bess-bounces@ietf.o= rg on behalf of internet-drafts@ietf.org> wrote:


=C2= =A0=C2=A0=C2=A0 A New Internet-Draft is available from the on-line Internet= -Drafts directories.
=C2=A0=C2=A0=C2=A0 This draft is a work item of th= e BGP Enabled ServiceS WG of the IETF.

=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Title=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : LSP-Ping Mechanisms for EVPN and PBB-EVPN<= br> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Auth= ors=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : Parag Jain
=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0 Samer Salam
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Ali Sajassi =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 Sami Boutros
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Greg = Mirsky
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Filename=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : draft-ietf-bess-evpn-lsp-ping-05.txt=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Pages=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 : 15
=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Date=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 : 2021-06-14

=C2=A0=C2=A0=C2=A0 Abstra= ct:
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 LSP-Ping is a widely deployed = Operation, Administration, and
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Mai= ntenance (OAM) mechanism in MPLS networks.=C2=A0 This document
=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 describes mechanisms for detecting data-plan= e failures using LSP Ping
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 in MPLS = based EVPN and PBB-EVPN networks.


=C2=A0=C2=A0=C2=A0 The IETF= datatracker status page for this draft is:
=C2=A0=C2=A0=C2=A0 https://datatracker.ietf.org/= doc/draft-ietf-bess-evpn-lsp-ping/

=C2=A0=C2=A0=C2=A0 There is= also an htmlized version available at:
=C2=A0=C2=A0=C2=A0 https://datatracker.ietf.or= g/doc/html/draft-ietf-bess-evpn-lsp-ping-05

=C2=A0=C2=A0=C2=A0= A diff from the previous version is available at:
=C2=A0=C2=A0=C2=A0 <= a href=3D"https://urldefense.com/v3/__https:/www.ietf.org/rfcdiff?url2=3Ddr= aft-ietf-bess-evpn-lsp-ping-05__;!!NEt6yMaO-gk!RoQdN1xrngG7wEPSC6AqHesQtzGv= BMP82cosyeO0PYZjTGA5JLyFmli44UwE5yg$" target=3D"_blank"> https://www.ietf.o= rg/rfcdiff?url2=3Ddraft-ietf-bess-evpn-lsp-ping-05


=C2=A0= =C2=A0=C2=A0 Internet-Drafts are also available by anonymous FTP at:
= =C2=A0=C2=A0=C2=A0 ftp://ftp.ietf.org/internet-dra= fts/


=C2=A0=C2=A0=C2=A0 _________________________________= ______________
=C2=A0=C2=A0=C2=A0 BESS mailing list
=C2=A0=C2=A0=C2= =A0 BESS@ietf.org =C2=A0=C2=A0=C2=A0 https://www.ietf.org/m= ailman/listinfo/bess


_______________________________= ________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org/mailman/listinfo/bess
--
--00000000000019dc8605cae8b906-- --00000000000019dc8805cae8b907 Content-Type: image/jpeg; name="24242e5637af428891c4db731e7765ad.jpg" Content-Disposition: inline; filename="24242e5637af428891c4db731e7765ad.jpg" Content-Transfer-Encoding: base64 Content-ID: <17b9fde2f3d58b2e99d1> X-Attachment-Id: 17b9fde2f3d58b2e99d1 R0lGODlhcwAmAPcAAAAAAP///wCP1QCP1Pf7/vL5/QCP1gWR1gqT1gyU2AyU1w6V1xWY2BeZ2R6c 2iGd2iyi3C6j3TOl3Tqo3kWt4Emv4Uyw4U2x4lOz4ly35F645GO65WW75me85m6/53XC6IHH64XJ 64bK7IzM7I/N7JXQ7ZfR7pnS7pzT7p3U76PW8KPW76XX8K7b8bDc8rff87vh9Lzh9L7i9cnn9tLr +Nnu+eDx+uf0++n1++33/PD4/PT6/fj8/gKQ1AWR1QeS1QiT1QmT1g+W1xCW1xOX1xia2Bub2Ryb 2R+d2SCd2SKe2iSf2iag2ymh2yqh2yui3DSm3Tio3Typ3j2q3j6q3kCr30Os30eu4Euw4U6x4U+y 4k+y4VGz4lCy4Va141W04li241q341245F+55GW75Ga85Wm95mi95Gq+5Wu+5m2/5m/A53HB6HDA 53HB5nLB53PC53XC53bD53nE6HvF6X3G6X/H6YHI6oHI6YLI6oLI6YbK64TJ6YnL64rM64zM65HP 7JPQ7ZbR7ZrT7qXX76bY8KfY76jZ8Kra8azb8a/c8bDc8bHd8rLd8rXe8rXe8bjg87zi9Lzh873i 88Dj9MPl9cXm9cfm9cnn9c3p9s/q987p9tHr99Lr99Xt+Nbt+Nrv+d/x+eDx+eX0++Tz+u/4/OHy +ePz+ur2+/b7/fr9/vz+/v7//////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEAAK0ALAAAAABzACYA Rwj/AAMIHEiwoMGDCBMqXMiwoUOGiti0mUhxopcBAgZoHKAglcATFaVg3DgAC0U2hgKsKkJyiZqK FUV4bHijx4AHDFmN0BiJ4A2NRFYRJKAAo6WFKzJibOCQEclMB1WxxOgDUQEeqbKm2sEDoQaMhAqS sonE4B2MeQ7WmGlwj0YKCv0oHeDkIUGnAvJCNShVowA7dgXyyXKhsGEJG6kYNqxFUEImGSsQDJFR gOSClUj61cx5wAmEBKJk9JIwTefTaxzaGNnQxhIBex0WAUPwRZoOZnLr3q27Q6CBKXgL742mhUBW e3AP771HlcNSaDjQCVwwByQc1A2+9vtbodONsQn2/8UI2O6F03lP+/1QcEpeJgMbabwyMEzeOQuJ bBSAyC5ejeENNN5GQzBAxIEHNgAGAQZ9JQAlBvUggBIGlYDWQBtYoKGGW1yw4YZacPGhBVjsIRAB B4xEV3YCfZdRgAKNJ0ATLBo01gBlOXSIARgpohAEeQkgSo1EFmnkkUgmqeSSCKkxl3qaMRUBZ5V1 llcHAaQ40lxP+uXQWALkmB0HGplhECYHWADDQ24oJYAVClHilwCgRMVSXiYGhgIZG/TZZxlXaNTD F2X4+adxA+Fg0wBkEGTfACkQhNgAKzR0iop0MvQdgHZu5EdgXw0AYUE2UViQhQKkVdAcQZYSAA9D GP/xxQ4B1KHRFg1h4OYYDzHiJowBDKgiSZXlSZAGeYVFEJhiDnRHXnoM5EOXxO7HmQMGdRJkRtj5 txmwMqoRWBZPplftuXEkxIUJBj2CxUJSVPkGi5sOAO5UA6hqJCql2sVKEBilcRCyAxhQB0GFqEet X3IglAhJlxzEAwPoaSaABV+S1VAmQ+RlREOTBHkGkySXbPLJKKes8sosC6TJllCS9JshC8NsbSUB eFAzZ244FIpSNfrRxADsGoRKQS/ETCWWIShspSMBUGyteu82dGOzCr3AR0EyaESFQU4OAJdDcBC7 SEJjuJmuQTzg+0SSNmG7ECuQDZBAQUlo9AlBg2D/BMVDm2wpQA4KOUISJ53mpa9DJVRmLkZcUgv1 QDRjRMNAI2SUmkAzYDSEcw3xMVcEmj7VqUblPSRGRl2ooMIKK6hAh0Y/kMBC7K9PkBceBeGwUaUB gLKRc/xqZIpD7vkFR0Obwna6AGiAqlEhBY1iUxIG5YFRtAZh1IYOAh090AIY9cRQAUBALsBRzM91 734CICDEAvQvoMAQGNBaELICKDvQ1Wa5kEBi4IJGNMITmTCgAhvhgg8o5QsvMKALcHaQSKRHAAro SlO+ZafHQQ5mAuhDg8AiFo0VBAQCDAAIMWWuKlWGKQZJg5vg5C2/vI92LujKKna4CtAdRAwa8QIL 7YY4xLPErwREHGIVMMI7km0nL4CgjovsdboBiNAumbPYsKpkLUQZRAZ5+dtAOrEAAXwtITjgkiey U68bDiB1RSKARo4QmEOkR3wDOUNlMnCQQrgJPvQyHV+KUCwkAfAhYMjLD4RyECxUJhEESeRmBCAB mMCkBAlpnhsHwAQPWHIifWCQ1UzIEFAEqQsLwQEQ8gIBgWiBS0qbI0JeMJcaHGQV04plXr6kEbkp hBVTEkAPjtcQOWSEVwGQxBw+wMxmOvOZHxiEQnIAgj1o8JZ/gKY2SeDDhejgDW1YnEI+AUm7fIKR LUunOtfJThYFBAA7 --00000000000019dc8805cae8b907 Content-Type: image/jpeg; name="9ae3e214c17d49ed935d87c674ba3ee2.jpg" Content-Disposition: inline; filename="9ae3e214c17d49ed935d87c674ba3ee2.jpg" Content-Transfer-Encoding: base64 Content-ID: <17b9fde2f3dd7624e902> X-Attachment-Id: 17b9fde2f3dd7624e902 R0lGODlhggB4AHcAACH/C05FVFNDQVBFMi4wAwEAAAAh+QQICgAAACwAAAAAggB4AIcATr79vg2j x+twuSDo8tdNjNSk0mTQ57AojVB4uI7+1GPI3/P+6rKPxan9yjsBes4/gtD+34y61u9jm9rr9vva 7Pek0aolccv///8Baccki9Sj0FwSfM6DtOOAv2Wy1e9Mo92axurf78n9xisLacf+2XNwpN33+vE7 m9r9zkv+89Q0jNWMvebh7/nL5KPR5vbC3vP+5Jxks+NbpN10u+UDg9Gqzuyi0YLx9+aTvuYkhNF/ wDbZ7L0cjNQAdccAZMUlkta73Y0Ybsn+z1CUyk5LnNpiqd88k9f9whz+3YNNqt9EnNr0+/18vOaF weczm9oBjNQae879xzK426PV7fjc8vqIxCek0u79zEP+5qR8r+Cd0u5ss+O84vT+8Mlbqd8Le87M 6fdTnNrl8dMrg9G22e8BXcMKdMsrdcyUyuuMy+xtqd+s1vAsktb+9t3+1muy2Hqs1XTt+f1xsdvE 4/X9012BwQ3u9uIwjelDkteKxTTW6rr+23tTo939xCNEo91ro92DvPd7wOcchNKEwoQ8jNRtvOZN ltg8o90sm9qIvui02YOm0/kri9QLgM/m+f1dseIUg9EMjNQOZsZUqd8NW8I0k9cSdMv+4ZObzOwk fM/H6ff+6Ku24PN1wunV8frz+esyhNHN5quDvOZcnNrU6vczeM2bzVpxr+y/35R7viO73PLb7cOn 0mz++OTE4Z2s2vHj8/oSbsphpN6TyTwAbMmU0O6r05rb7vn9wRTN7PlDi9Ti8M1Dltj+7LvT6LRK ktaTxene+Pw3od2EyetbrOHL5fV0reAse86d2PF6vSlzteMCk9am2PEtldigz/Eckdaz1/Gt1IW6 3IRjreGz3PkBVMBNseEzltg8mOH9yC9sreFVrOBSltgcdMs9ltgkldmKwOdhueUeftAAddCMw+mB v+kNbcnn89ir0+6jzex6tOP90E/q9NyVyPBEqd7R56+k0nH9yTSz2/ILftB8w+mAvyP92G390VQK hNEBdMuEw+kAfdARftD+/v7///8I/wAxCBxIsKDBgwgTKlzIsKHDhxAJMimHAgaGckvoYNgHgg6T JktKMaFRpBSGZSBKyeECogIFLn1iYeDyxSW1LxRiFeMmh8kXarGq9KHGBNdPDLH6cImFC8QyDC9A 0MBABUQTJsaWNMFAZ8koDFn3MemyJBiGVX/SYJiHItNaFFsiLkwH4goTarXSYZihjw2GPvrSyQFx xiMKfRaPgFkV69slY7Es0aOCoVEkY1UaaYpValAkCnIG6SjVeQUFY5E0FAXTBtcmDnmYrHrwhKu+ IhTmnenDJJ0+EBg+1OJ9pdY2DMH0ycCQptayibW+ZvozT67BJrW4gFXXgusVmXS+c/9NR+HslfKr 0slMT0E2GyZr2bRf9YEJkw/RBKaLZj/aKgwUpFNdb/MwIUc6FgX4HwVX/BcLgkhd0QVS6mgUiw3G YICLOhnickWGpahTwUw1uGXdWcGU8kIaGp3o4oswMsSEEpKsUkoT1UVUzAMmxujjjz5SoUMtsFzx ADVyZfLFf0A26eRDxswTxhrArGJME/lBSUd5T3YZC3xdFtSUDuowBSYT8zC5EBMgaGBRmE3OM0sw XMKJQRP6RAemQKvkg8KeCTExgyUt2hkjE1xY0wguhlLRiD5PbFJQVto1xMSXhv54BQo01NnlRA/w eJB9Db3gUaY/XiqHobGAoI8zlBn/REEzOSokxiVZogrjKtzs4+mTqP0gw6oGrXJJHgzRgEKhup6I aAYrjAhnUhr4dVApXJi1UE6ANisXBcXU0kascFYhUqDdHmTMKr96CxEFkOiTCLldzgPJFQnFkkmu CYnhDb+6VlFPPYw6RMEXPzRi0kNXGMKsQhQYYY0l7fKpzxEMdSDGw6iyUUsGejnERDBkzCKTQ1UU Ys1xlqpDilgIlbJNOO5CtMouBXQRS8UHUdAJvQvF8skxppQD0SbEvkhHNDzbyUQYYawyAw0nF8QE FfPYUh0uIaRT1BZX0FF1QVfMEIwuW4q8yhqZpCtQLGlYq9Af+nxQ80Cj/KAP1QRV/wELSJHoA4S+ ZuiAyyj6PIANNVvoAmgzGphxBNBBI+zM2AStoo8lDIHEcbPzAFHLA50KVMoMD+SpzyW94ALDEUux EMUZqrehzkDz9FALGII0fVAslECK+UAVcGH03RGFro8+acQixxWa/NDDH4bYIilSq8YCSz3XgHPG D7MwQUEYooPBN0SxcKMPIr43tG77mc7TRiQg9EJDGKNQM0/SCDGhiyfcSFMf3gGNSPROLunTxzCG 97Z9MaQIl5Ab8qgShmVUQgfGIJVAVBCDJCShBAp4Ax8w4QWB2IcC67CGBmBxLgSqLxEMxEAZZIGs hYyiDxmaoOmoYIxllKNOWVCAA//8II8I4CMXSPADEkZQB04MZBViaB4V3MYQnfzAEjGsQBN6FCj4 xa8NjdgfmHyhgBH4YQQjkEcS+CCPETjAAW1EAj5KiJRYUIMM++DfQ9jQh2BQEQN/JAgd2BDDgP1h dLDYIB+kQEQ4ysMBUsBHDCJQhwjEoAR1SGMWTHiEH0Qikdapgh77tg98LaQIZ7Ab8iayPBnIxBUx wAIS5IEFB9QhCW9QQAmScA985DIFSYhAEmMgEHVEIgMgqEJEmHCFOVFRc5xbCAtmkcO7GaMNtYCV QDiByzfIEguYiEEddukANyoRCxHIAj4CMIJNMgESZwCDWt7VB2tgg2e4WAcXdZj/EDnsI3H7EIg6 bRmDN+AjAkI8IxbQSMs68OGhJXBAABzgBq4AIQN/oJxCZKPPQDZkFeK5G/B+0BoMeCEFSpRHCdLJ h1yMAB/4wEIJMBnOOsgDH5gogTxu6YqZZOCTEYmFRgcSi2CETCGHAeXd2ACCeSbBD1gYgjzkoYAy yuMenKCkF2KQgqrKAwkO4IMHIzACJ9JBDFxQ5kN00gs1GWQetYimQpoAgmq6KxZhUCsGFIAEEQ7x jG/AxBvekAIHYKKMSXRAYV+ahSTkogRvo0IVPEoQWOgjAzA7SPGOx0+FLIMDAcWAG/CBBD5koQ4p wIcCJimPRmKBD5eEIxZSIA8p/2BCmCmoaFZK4hCd1CISbjUIZcEyDy++qCcCkQMFllsFQFSCNwLh KxYGiwlOvAGODsBCLUeggDXyAR+0dAA7kmDVEqphEqaIhnJBAx8DYaAKm5AJBfZRA31Q4o8tCIYp bSWL2xlDHYxhQgX2EwtMuYgOf5ABBeighCcg4gnFUMcHCoWJJNIyBQ+VrXa164BcpCALb3CjTOvw RnkwAAO6SEMImoCIPyBiGGlgQibqwgXQrmR5PajVQVZBQ48GgxppuFIPuNEJY2QCGyCYxxWkdaIQ mOEMpQiBLDKgD73JQBgFeQMStjzR645gwxzuawzwoQ3tFvaN2tgkIGFBBr3V4v8HRfgEKczQhyWY YRmxEIMZejDPhFRgFLdb03rDAIstUQAX89CZgU9kjBlw4TTUWEIfvoCCfPRCx67IAghDSFgzErG1 KvUFJ1Lw5Vpmt5ybjMUyNJCIGdS5CJmQgzrEIKFyZGgV4VjFcD+aCeO6aGeRxUUskuGIWoSWIK5I thtU4AVu4mMEKSjBG9aYhDoQccMOWKIvuDIkQzCFCrho72QBOZDhtqAc+03IEs4QXF3RQQP6qIdD VJBV8mIBqhHgQznTmIKuVnQVjyJGkzSHAob82CP20WCmuqCBB8j7ISpAqRTayAdOhLAE+BArJgQC i4YLHEi42GJvq0ByybrbEvr/EEdEMHHGwmJBtZY0aApOjAE15AMMcanZKtJQigL7XFe4KMIPnlBI hPAhsQ7QhmIXGgAFDEQGP9CBjmN0uEAjVR/tRhUT1iGLPvhaIK7ggxmnasYA5KIOPRXIMkhQBL36 aB76+AZDylGMFyAvDPuYkHWCiIWpyoMdmEi7QIxhiHT7CBfm2Gf/9rRrH9knFlfw2omanQUGVLTc Si66ixSeEBikQWck/8S4DRXyfYTjHOMIg5OoEApjN94hVWeIGM7RNjkERfM+ioUMaqGDYjQCBbgP KggeIIkkD/xYDEkDFxamq1hA4gG1QAFkwkCHguXeGB7SQcIM/6JYqOGo6HLX/zpqUYsn6F0dOgBB 8BlysEbgKxxgEJdSdcWGclgfVZCoBTb0zoRRUPkqMbIPD/ADT0EBTQAGP3AEqhcjpbAMfZYQvVAL bRMUogcjuJAGnrAP+1APnjCBTfB5W6B3g4cNv5UGo2cdbDAI4sIkBsgBS+B2LgJXbcAQmXAMdGB7 VVCBCNQE1OAh8RcqeRIFXZAJP8ABzEcQufMAPQAC+mMdq+AM+pAP6TYrSrYN3BcR52Z1mRIGZ2AG mUAHRxAFGjCGUZAHhIYMCogQ9SAJoVJ+n6MQuLAEP0A66SIHS2ANS/B6LhINmbB+MTMPxrANVYIB m5AMsDAPsNAMGcIEzdAFVP/UBT1QA8xQAw/AWQ5RAUPiSj0zCrvAAnooJoDGECiQFy7SFP2QBnLw CJ84EMbQcFBQAzWgLQ0RC11AB2lwPqPyCauYObWAMQuRBpSwP0FRBX7IBP+UAQD4IojCAanTB0e4 EOWwG7sYERWwDzm3EDhIcroAg3B4GM6wgDAyXwn2jBs1CpWwAn4II5yHEPPQhyfSJw43jcJFVJgi B2pFASRXBbhAB13QBegGdB/IEIcgCwDzEFvwADUwfz8SC/vwBG3QNk0ABAXCBeCQCE/wBIPAAU4g j8lzDrGxEJmwDCZhe6vyeO1BRSMzOlMXI1XADWCQAT9ADVUADNZQDrHQCHr/szx6Yw7eoi+qtCZ0 0AlNYAlcUItXUARfMA/NwI0CMQ+RoE1N0gSpowFGoGuZAAgekQkz8AWGQAM04I6dZRDpsA/zUAXp sAyZIFl0MAq2ljajQgfkCCMVMIpPAAsncykmVGCgMUqZggvLIIvq1hcmxHgeFQtbIBhNEgYaQIDu sgevMAagwAup8As4gAOvkApjcAJj4AINQA7ZQINNEJcNoQ4/cAlZ5yIvcWnNcgKsEAcGIAKgsAdx 8Art0A5BAAesAAqsMA23EAwF6SSrUADdYHdNUgVhEAxr8B7pQAMDUw800AQZpA7Q+SKg8Au/wAt7 wAongAGg0A53IBB30A6g/8Cd7YADDpEOihAGBqJcfJkQxNglcpAHACADVXAEZrA8efIDo1AKoWAG AbWLr0AEogARVPCXDLEEtYCKOagLuthbadBrT9J/efAd20AGbXChjRAK6oALgFAIWzAPowCOEJEK qTCeD6EbNaQQ6nA/gMSeD5EJu3Oa6khUdFCj/Kie7yVUnTQVETEGvIBAaQB+geIsaaAPNSBBubcF LEJZYYBNxRARd+ACY2AdyDUX4XB/EJEJD5APK3lcMpAP+jAIlsiOPaAPlfIQonAKIiAXFbANY3oQ h3AOppRwL7qlXeoiVzAI/AAFm2NXBoEL8RIJircQe5AK7SAXq+CRDPEBNP9Qlgt6giCJkHd6IvtA D5L4AGE0V3lCCV+HAeFpHQ8ioxKxni7qEM2hDwoJI/PgijXQAzKQCUwpKGagASL4EHeQmXCSCTTA ZBFBB70gBrx6KGkwCOujBBwQBYjgCVtglzUHAgA2CqnaEL+wCFMaEaXwBV+xECQopBChC0OljDRg CQ3SCBlQC/oQCZqwDlWAAgAwA+3ZEC4QB9UKEXAnVwlxBSyApQ9BBTRgk0+CV/DRBSShA9DXdplA CuowjWPAAyaKPg7UEPZIjEHxrgWRCWZQC2/SJPi4J1ijBp6QI6pInQ3bJekwCl2Qg6JHBesHA2Iw A6L5IqNQCFr4JLzwCyP/6xAywwIMEYES9HrC8Ahdsg7IEAJ28gqtMK8PsQpnkKL3SjAncjh08q9U 0KkRcQBBcKhBdQWTKhEuAqOL8SSHxpEL0Q5I+y6UdQU0cIPD6IdFWgNbS6ng8Ax2wgoEYB3Xmq0K cQgkUHsk54dayqVPQgP54A5wkgpxgLXJcwa94FHpEAz66hB/+7Zy0Q434AFTcLM/0g6t8AonQgET 5jRpsKXV0CRjcApWYAWqEAeYS53YqZ2Gonzf+ou14AMWwAPfiQ6ikJu6eQDtcAJ3cAC5yZoHMKV3 8At7gAOgMAa/YAD2oAdEMAA7AA/tIAqQ+bt7MJ4iMLyeygPHiwFjIAo//xqblIkBv7ABQfCdLlIK lLAVC4GgtXd7+4oKcyANuBmbrXC17ZAKrZCbrHC/Y3AHrxAHooADrAAH1Dq9cKAHVkALp7ADypAK PNAKv9AOBTwNvADAAnwHIrAIi3DBomAALnCrixAHF2y1ZYuoDyB3CzEP5aC2OciU/RQLY8AK33kH PMALJxCZNOyprMALoJC8rHCod8AKsHkC7SACcKAMqkALqrADv2DDvYsDIsALOKCZQXwCBFzE7cAD vQsKIsAKVby635IOomo1dPoQL3AM65CODNEO8aAKdmAFiyDGYfmLInkiFlsLZTy5hIAACUDHE/QC s4C3gfmb7sMNS/EkjP+AB4FQxwVhLMDAEPUnEnJAkhDxCWxsMLhAsRNEAYUmIxT4CZ+wjVAyFJns EDDwAVSbKcvFECGwfIPZeGmQAWcguaG0C8jwhhNkDH9wpgkRp4acfEZqy9+yDD3oyHyytAyxCltw yhgQuWGyXLiQDi9bMwtGnOznOplQlhRABftBclQEzXASDEJwDMjsEOUAZHRgCJJwDfNgi+CACGyw BY/LBG0brUASDWLgFsLWWcZQBE+xEIeRBgumNcRYCsuKC6XAM5lAZXusjF9iDIVgBKu8wpAgA7Y8 G9jAENEQDM6saniGKsYQCjixClzgIGLzXl1QHlVwgxqSNvsIHzGNFFv/gA2hsgLVwUOmcyphkEEU wAYP/Wtd4Di6wgRwiQE0kAFfwQJkcDssgAx20QRkIAEnQQZ2sw6hoGt3lCGjwIyvaKYUsA2FMCJ9 UAjGIAeksAt2N1zBsA3YDBHBEAUzUNEvYtIawQIaigE5AAFeMwpTjQFYbTcdAAGrIAfbEApcHQUP 8IoPsAxhPdZ7kQcvIAcTAAyk0QfrIJDnQNUQYSAsMAmNELuZEgu6UB4UcC54lT1ThBRELVTtVdPL YwnVQdoCUQWrLcoYsAChMAMM0Y4Su1zOY0LEcik5QQflUCFq0AznfCLzQAkB1BC5ocsEoS/FUAwy IAPFwAVhQAHlwAUt/zARXyAD3AAEPxAFxLzcDNgH7KsQbPAH8bc80HcOTaALmmAG6RAGoZCT+nAG 0ofeqAIDUVAEDFEMZ9AGKJAIFgkNzqAebbIl3KDgT0AJmfC4/h2hdCCiCAFSKpuPuDBuTPE2uCBs dF3hEVGlMiK2JO4kuDALBVDNAxEMRzCzKa5DcTgIfooQTcABDzjj/LQuw1UBZWniPF4zsVAOo9Cp HOqJQ343jgIG0r1jF9ANJbnkWkcHkJEGTsDG+lJcmTAKMlFgtX0y75mjYS4Q/cwEY37mai4TRVEe V1MecoALbj61gLTah2badm7n4QYg49bN8BG2SLHnHx7oGFABK/CCMP9CBYWABmEQCzMw14JiBAU2 C8eBC0rBBC3QB45dCkWQ2f+c2Zx+Ff/8FavgFVyxBOUgG73gFmywBEQ7D9/QNumQB3qRCb1wO+rw Dfhi6/8RDL2QH8GwBAVSDr3A1d9gEaOwBDDQf0UQbtvwDS/QAt0wAxT+EBSQCUaDC2QQCrHwCBBQ CKWACxBQAFgxCLFRCqZwCLFAB8gwAWfhDWLAFWgw16uABoCAAVfgDfcuARewDc9zAR2AASHgDZmt Dt5wFSFwAWYxCt6gszngDak+ChcgABhwDN5wO1pw8UxwDGjwHzPgDVRtAt7gNYBgCgvABGIwDv9h e00yFqdSo/ZRo4BJVIsC0QUZNBaqRwFdoHo4DyCdYBKxYCM+Txk+A/TzQBmxMA+MkvQyUQVKjxTz 0PRRTxU6oyGdIBNYsyphUFxUXx6lwPWusYsBAQA7 --00000000000019dc8805cae8b907--