Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM (was: Re: pim wglc for 3228bis, 3376bis and 3810bis)

Leonard Giuliano <lenny@juniper.net> Tue, 19 December 2023 21:11 UTC

Return-Path: <lenny@juniper.net>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AEFEFC14F615; Tue, 19 Dec 2023 13:11:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="151EYXaC"; dkim=pass (1024-bit key) header.d=juniper.net header.b="e9ag5+ve"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HuKEh7d8Q0S8; Tue, 19 Dec 2023 13:11:18 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9067C14CE4D; Tue, 19 Dec 2023 13:10:51 -0800 (PST)
Received: from pps.filterd (m0108159.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 3BJKHeIv031021; Tue, 19 Dec 2023 13:10:35 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= date:from:to:cc:subject:in-reply-to:message-id:references :mime-version:content-type; s=PPS1017; bh=/8+0sWiN/EA+rKBaInUeZc 2oWN97qopeLugeWouhgqo=; b=151EYXaCJI1pKP7rQypTuj39nFOHK0Gv8vCYlT ft3NYQiHmNLbUYxLiMlkcuFDn5CjGn+dotis2pDI3YgwkzXP7auC1JZ0G+QWVg0I H1/bZaqIvfrSH1jqYv3M6QKp/u9dxbHC3yuRspXrtUJUlIMI9KRDtOal0e0ULBOR b6A8hu0WXarsH5Q03qvb07QOmoe0sfETDYwlfN1nCXCUquDV0BJ2pSOjUuu3GgC7 gVsicML11v/5h6VTVGx83zAgimf1bBT70oBEHSOBL2niuC+mT5kA2UTQRcEkv9cy a2TIk2HjYTw27x50z98RX1AmtCmNNaAjat5AD9tCoEN+sB9w==
Received: from cy4pr02cu007.outbound.protection.outlook.com (mail-westcentralusazlp17011016.outbound.protection.outlook.com [40.93.6.16]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3v399019r7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 19 Dec 2023 13:10:35 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dQLQ2wau/l3BZVIufdbu1X8gPwuN9A4Li1E1dro47BkkXqvem09K5DNHuwidsg7gH66tsU6iR1DyLJLTrudFlciwulHcXvw22wZvIw6hLqO77uuR3Fkf6w3K/zTqoxE58KGx0zrwMSt8cyfIgfp2O4/HU+0gFxPfmY4G/Yg3S4KvIRGWuQI5kBRZR1iz4UwHEhPymxq45VRIcqev3MbygpKl4aupOwZjhRiYVOAqN7Uq4Pa3+eqOT3f6TumMvTo7zB9ReIJr73X3YyZQyHytlskJVj5kPAY+87w6wlz3UOppIFUbXELMJK8U9Zr610x1IsCH3XvHep5+Fm9FDFrwNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/8+0sWiN/EA+rKBaInUeZc2oWN97qopeLugeWouhgqo=; b=MO9pOYn4kgL4RZ2aSH/vh8i3b8zNQqzkUpPc0mXRTSkI//MGMrX4B/jcyNjeDwXrn2JCjQUPX8burkwxoD6cV/kf72E4dzbhO8E3OOcFUpY/Xe99DrTBfjPF+C+LILFKQNPjaja9cFa3huAd2navY8WQVhsOZ2vRArKJ3L/87UEeMwPGyl/7gKiCanRsctTk/On2VdN38YNEqKbxPk8v8HJHpe5+NaGzEletmZ8/+318FoB4N+VtmJGfbvqVVhCtxq1w57ICBV8tsoWKfUUS2ojyIFhlgLgS7VxLDOc2P3Nsc9pubhHneEDMYRL3BCcgRRYWSEc9adGKEdHjETNtjg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip is 66.129.242.15) smtp.rcpttodomain=fenron.com smtp.mailfrom=juniper.net; dmarc=fail (p=reject sp=reject pct=100) action=oreject header.from=juniper.net; dkim=none (message not signed); arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/8+0sWiN/EA+rKBaInUeZc2oWN97qopeLugeWouhgqo=; b=e9ag5+veVHwnHzFY4ymF0VN69/Vd4QC/U2v8ijIk+jlhrFrcewUaZUCvfixvHbL1+DAYhFh9qliO73dL3g34kYtZEqYCv4SCbJnCPsD+5KFLwIUi+xwukCNHUe/mf9sFjbOd2FbOsBgkgTQ6KOqPzmfGLmUP7npRLFxAm0ozaqo=
Received: from BN9PR03CA0590.namprd03.prod.outlook.com (2603:10b6:408:10d::25) by DS0PR05MB9128.namprd05.prod.outlook.com (2603:10b6:8:c7::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.37; Tue, 19 Dec 2023 21:10:32 +0000
Received: from BN8NAM12FT088.eop-nam12.prod.protection.outlook.com (2603:10b6:408:10d:cafe::14) by BN9PR03CA0590.outlook.office365.com (2603:10b6:408:10d::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7113.18 via Frontend Transport; Tue, 19 Dec 2023 21:10:32 +0000
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is 66.129.242.15) smtp.mailfrom=juniper.net; dkim=none (message not signed) header.d=none;dmarc=fail action=oreject header.from=juniper.net;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.242.15 as permitted sender)
Received: from p-exchfe-eqx-02.jnpr.net (66.129.242.15) by BN8NAM12FT088.mail.protection.outlook.com (10.13.182.177) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7113.18 via Frontend Transport; Tue, 19 Dec 2023 21:10:32 +0000
Received: from p-exchbe-eqx-02.jnpr.net (10.104.9.15) by p-exchfe-eqx-02.jnpr.net (10.104.9.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Tue, 19 Dec 2023 15:10:31 -0600
Received: from p-exchbe-eqx-02.jnpr.net (10.104.9.15) by p-exchbe-eqx-02.jnpr.net (10.104.9.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Tue, 19 Dec 2023 15:10:31 -0600
Received: from p-mailhub01.juniper.net (10.104.20.6) by p-exchbe-eqx-02.jnpr.net (10.104.9.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39 via Frontend Transport; Tue, 19 Dec 2023 15:10:31 -0600
Received: from eng-mail03.juniper.net (eng-mail03.juniper.net [10.108.22.11]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id 3BJLAUXx003838; Tue, 19 Dec 2023 13:10:30 -0800 (envelope-from lenny@juniper.net)
Received: from eng-mail03.juniper.net (localhost [127.0.0.1]) by eng-mail03.juniper.net (8.16.1/8.14.9) with ESMTPS id 3BJL9Nbe076717 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 19 Dec 2023 13:09:23 -0800 (PST) (envelope-from lenny@juniper.net)
Received: from localhost (lenny@localhost) by eng-mail03.juniper.net (8.16.1/8.16.1/Submit) with ESMTP id 3BJL9Hdu076714; Tue, 19 Dec 2023 13:09:17 -0800 (PST) (envelope-from lenny@juniper.net)
X-Authentication-Warning: eng-mail03.juniper.net: lenny owned process doing -bs
Date: Tue, 19 Dec 2023 13:09:17 -0800
From: Leonard Giuliano <lenny@juniper.net>
To: "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>
CC: Toerless Eckert <tte@cs.fau.de>, Stig Venaas <stig@venaas.com>, "zzhang@juniper.net" <zzhang@juniper.net>, "brian@innovationslab.net" <brian@innovationslab.net>, "n.leymann@telekom.de" <n.leymann@telekom.de>, "pim@ietf.org" <pim@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>, "fenner@fenron.com" <fenner@fenron.com>, Dave Katz <dkatz@juniper.net>
In-Reply-To: <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com>
Message-ID: <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: BN8NAM12FT088:EE_|DS0PR05MB9128:EE_
X-MS-Office365-Filtering-Correlation-Id: ecd2dd57-8f1a-465b-6149-08dc00d6ef92
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: KOFn8/KsCDWVG9TnZGz1gz1XwnWCpLbGZaoMvsEiExJcLWqH4r3NL7ihovof45eEQ5R4lzkQu9UUQ9g61CA1M9N8t7ApBx2aIuFyIKpdNBJcw5NL//f5z8/R+EKQfwzKVG1DyD0D8iJHyPSZ87VqduSRrf6uK2YPLNXiQggfx8PuUO6AF0Db2ctxhq5HdsKKGRQ2MkCu2gjJAp2aCKB7B4JI/YjU/C+gBx715WJYsOU4y0fdsHEIEyaJ/BSFhJEApfgCcRRA0bYuU8HA5FFsF185khTL5jY14LSsLFboPRC0D+tFG+dcOcxNGJL5ZCxGwUKEB6YD7J649ZBiX+0JvNRyKwbopsE7SIgsrFIb7ol8a6zLzjAI58WI2xc3KGG20i5Va19Vo7LJuABhxMinF7h+vCn5JkcUOVOqna4hOh6pONPhMgAbGffSXDOYaabLrJyQf3PtGV60p9tEw4JcEpHZwrphbwePZmUbyDV22plG/h3FBkocJuhBQwgfnffBEqXjGjVRuGjRnsO4qFb1HjQUQvqGBN3NviXdsUIhTRLrG3sG1OdcWUsv47YaYZfMFOiEdzDOHpgdVJeKV8Z7yIH2OhS9NNki+kzjxzwNoc5NKjnqO9l1it2yuXSwicnqaT8YLOEM9natiRjhtn99TktTaniR+2qb0Tl4pduh8u27aLqCvthR5da9So5Szo1/gTj21KNcrWOei833XxS7yfgye2lH5Yb0rxXVBy7evK6sx/QWuf3hcPxHhoicFG/JXMzA0noUHkuAGUpfjR1C+jDl9AOVdzcNyyZP+XV48sT+F98n3ma6GJpFa+rM4wzD
X-Forefront-Antispam-Report: CIP:66.129.242.15; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:p-exchfe-eqx-02.jnpr.net; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(4636009)(136003)(346002)(39860400002)(396003)(376002)(230922051799003)(64100799003)(451199024)(186009)(82310400011)(1800799012)(36840700001)(46966006)(40470700004)(2906002)(36860700001)(5660300002)(66899024)(31696002)(36756003)(41300700001)(86362001)(81166007)(82740400003)(356005)(426003)(26005)(336012)(66574015)(966005)(40480700001)(107886003)(478600001)(83380400001)(2616005)(70586007)(316002)(54906003)(70206006)(31686004)(8936002)(47076005)(40460700003)(8676002)(4326008)(36900700001); DIR:OUT; SFP:1102;
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Dec 2023 21:10:32.0866 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ecd2dd57-8f1a-465b-6149-08dc00d6ef92
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.242.15]; Helo=[p-exchfe-eqx-02.jnpr.net]
X-MS-Exchange-CrossTenant-AuthSource: BN8NAM12FT088.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR05MB9128
X-Proofpoint-GUID: j_m7f4FapvWvpeStT-nJqepdYaeq1lms
X-Proofpoint-ORIG-GUID: j_m7f4FapvWvpeStT-nJqepdYaeq1lms
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-12-09_02,2023-12-07_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 mlxscore=0 phishscore=0 priorityscore=1501 malwarescore=0 adultscore=0 spamscore=0 clxscore=1011 bulkscore=0 mlxlogscore=999 impostorscore=0 lowpriorityscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2311290000 definitions=main-2312190156
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/Nyz5o1CAgqNetgpangAC-TmduEQ>
X-Mailman-Approved-At: Thu, 21 Dec 2023 11:28:46 -0800
Subject: Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM (was: Re: pim wglc for 3228bis, 3376bis and 3810bis)
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Dec 2023 21:11:22 -0000

As I understand, RFC4604 explicitly prevents SSM service from being killed 
by the presence of an IGMPv1/2 host (assuming the router is SSM aware, 
which in 2023 is a fairly valid assumption).  That is bc the router should 
ignore any v1/v2 reports in the ssm range (232/8).  And as I understand, 
RFC3376 Sect 7.3.2 provides backwards compatibility for v1/2 hosts, but 
only on a *per-group* basis- not for the whole LAN.

Combining the two, SSM service is protected in SSM range (232/8).  In 
non-SSM range, due to backward compat, you could lose SSM behavior- but 
since you are in non-SSM range, all bets were off in the first place.

So unless I'm missing something, I don't see see the risk of SSM being 
killed by v3 backwards compatibility.  Adding DKatz, who know this stuff 
way better than me in case I misinterpreted any of these specs.


-Lenny

On Mon, 18 Dec 2023, Holland, Jake wrote:

| 
| On 12/14/23, 1:29 PM, "pim on behalf of Toerless Eckert" <pim-bounces@ietf.org <mailto:pim-bounces@ietf.org> on behalf of tte@cs.fau.de <mailto:tte@cs.fau.de>> wrote:
| > The elephant IMHO is that rfc3376bis is so far not including changes to IGMPv3 behaviors
| > about backeward compatibility with v1/v2 routers on the LAN, and exactly this behavior is
| > killing SSM in deployment because any such router when it becomes querier will kill SSM
| > ... because hosts will revert to v1/v2 and not report their SSM (S,G) memberships.
| 
| +1, this is a serious problem.  The current default behavior bakes a DOS for SSM into the
| protocol.
| 
| > If there are routers that have config options to disable this backward compatibility with
| > older routers, i would love to learn about it.
| 
| When using linux routing there is `sysctl net.ipv4.force_igmp_version=3`, but it says because
| of the difference in the security considerations between MLD and IGMP it doesn't actually
| ignore v1 and v2 even when it's set:
| https://urldefense.com/v3/__https://sysctl-explorer.net/net/ipv4/force_igmp_version/__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZENUoioNQ$
| 
| (MLD permits an "ignore v1 completely" setting, but says it should only be used when
| source filtering is critical:
| https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/rfc3810*section-10.2__;Iw!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZEHCk8UTw$  )
| 
| > - Replace with something like:
| >
| > This revision of IGMPv3 version 3 removes automatic fallback to IGMP version 2 and version 1
| > routers on the same network as specified in [RFC3376]. Instead,
| > such older version router behavior MUST be explicitly configured.
| 
| While I agree that to the greatest extent we can induce, IGMPv3 queriers from now
| on should maintain the capability to propagate SSM and accept IGMPv3 membership
| reports under all circumstances (even when there is an IGMPv1 or v2 receiver on the
| LAN), I'm not sure it makes sense to ship text that makes all the currently deployed
| routers retroactively non-compliant with a MUST in the new IGMPv3.
| 
| But I'd support adding a section that describes the problem and provides a well-
| justified and strong recommendation that the default behavior be changed from
| what's in RFC 3376 and that a config option be provided to ignore IGMPv1 and v2
| packets, like with MLD.
| 
| It might be worth saying something like now that we have RFC 8815 and in light of
| the experimental status of RFC 3618 (MSDP) and its deployment BCP in 4611, source
| filtering should always be considered critical for clients that support it?  (Not sure that's
| necessary, just a brainstorming idea to point to some of the docs that cover new
| operational experience since 3376...)
| 
| > IGMPv3 routers MUST have a configuration option, disabled by default, to operate
| > as an IGMPv2 router. When enabled, all procedures of [RFC2236] apply. Configuring this
| > option is necessary in the presence of non-IGMPv3 capable IGMP snooping switches or
| > PIM routers. These are rare but may still be depoyed.
| >
| > When operating in IGMP version 3, routers MUST ignore version 1 and version 2 queries.
| > In version 3, the presence of those older version queries constitutes a misconfiguration
| > or attack, and these messages SHOULD result in logging of an error (rate-limited).
| >
| > - And in an appropriate part of the host behavior:
| >
| > IGMP version 3 hosts MUST have a configuration option, disabled by default, to ignore
| > IGMP version 1 and version 2 queries. This option SHOULD be auto-enabled when the host
| > is running SSM receiver applications, and hence depends on IGMP version 3 to operate in the
| > network.
| >
| > This is about as much as i think we can do if we still want to go full standard with rfc3376bis.
| > I can think of no operational deployment where the introduction of devices with existing
| > older RFC compatibility would cause interoperability issues. At worst the new router would
| > need to be explicitly configured for IGMPv2, which in my experience most routers deployed
| > into IGMPv3 environments are done anyhow.
| >
| > Comments welcome. Would love to see positive replies in which case i will be happy to explicitly
| > sugest the text changes for this elephant issue to the draft.
| 
| Thanks for raising this, Toerless, the IGMP downgrade problem has been a major source of pain
| for some deployments that rely on SSM.
| 
| - Jake
| 
| 
| _______________________________________________
| MBONED mailing list
| MBONED@ietf.org
| https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZG9c7AK9g$
|