Internet DRAFT - draft-jesske-sipping-tispan-analysis
draft-jesske-sipping-tispan-analysis
Analysis of TISPAN req. to SIP June 2005
Sipping Working Group
Internet Draft Roland Jesske
Expires: December 28, 2005 Denis Alexeitsev
Deutsche Telekom
Miguel Garcia-Martin
Nokia
June 2005
Analysis of the Input Requirements for the Session Initiation
Protocol (SIP) in support for the European Telecommunications
Standards Institute (ETSI) Next Generation Networks (NGN) simulation
services
draft-jesske-sipping-tispan-analysis-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet- Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on November 24, 2005.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
Jesske Expires - December 2005 [Page 1]
Analysis of TISPAN req. to SIP June 2005
This document analyzes the requirements generated by ETSI to support
NGN simulation services implemented with SIP. The document analyzes
standard solutions that can meet the requirements. Where a standard
solution is not available, the document proposes one or more
solutions. The aim is to provoke discussion within the Internet
community and get early feedback.
Table of Contents
1. Overview
2. Analysis of the TISPAN Simulation Services requirements
2.1 General Requirements[REQ-GEN-1]
2.2 Anonymous Communication Rejection (ACR)[ACR-REQ-1] and [ACR-
REQ-2]
2.3 Terminating Indication Presentation (TIP)/Terminating
Indication Restriction (TIR). [REQ-TIP-1] and [REQ-TIP-2]
2.4 Advice of Charge (AOC) [REQ-AoC-1] and [REQ-AoC-2]
2.5 Communication Completion on Busy Subscriber (CCBS) [REQ-CCBS-
1]- [REQ-CCBS4]
2.6 Communication Completion on no Reply (CCNR) [REQ-CCNR-1]-
[REQ-CCBNR4]
2.7 Malicious Communication IDentification (MCID) [REQ-MCID-1] and
[REQ-MCID-2]
2.8 Communication Waiting (CW) [REQ-7] [REQ-CW-1] and [REQ-CW-2]
2.9 Communication Diversion (CDIV) [REQ-CDIV-1] and [REQ-CDIV-4]
2.10 [REQ-CAT-1] and [REQ-CAT-2]
3. Security Considerations
4. IANA Considerations
1. Overview
This document is a companion document of the Internet Draft
"Input Requirements for the Session Initiation Protocol (SIP) in
support for the European Telecommunications Standards Institute
(ETSI) Next Generation Network (NGN) simulation services" [3]. We
analyze each requirement trying to find an available standard
solution that meets the requirement. When such solution is not known,
we analyze different alternatives that will meet the requirement. The
document's intention is to provoke discussion in the Internet
community in order to find suitable mechanisms that guarantee the
implementation of the requirements within the ETSI NGN timeframe.
2 Analysis of the TISPAN Simulation Services reqirements
The following section could be seen as collected thoughts what
possibilities are given to fulfill the above mentioned requirements.
Jesske Expires - December 2005 [Page 2]
Analysis of TISPAN req. to SIP June 2005
Some of these ideas are still under discussion in ETSI and thus, do
not even represent a firm proposal, but just a collection of
alternatives that require further exploration.
2.1 General Requirements[REQ-GEN-1]
This requirement, since it is generally applicable to all the
requirements, does not require a particular behavior. However,
solutions that meet other requirements should also meet the
constraint of seamlessly interwork with a similar service in the
PSTN.
2.2 Anonymus Communication Rejection (ACR)[ACR-REQ-1] and [ACR-REQ-2]
Requirement [ACR-REQ-1] requires informing the caller that her call
has been rejected due to anonymity. We thought that an application
server that implements the ACR service can either send an instant
message to the caller (if supported) or divert the call to an
announcement player that plays the appropriate audio message,
however, this will be hard to be processed by an automata or a PSTN
gateway. For example, in a PSTN originated call the PSTN should
indicated an appropriate Release Cause (cause 24) due to interaction
with the ACR service. Thus, any solution based on these two proposals
would make difficult to meet REQ-GEN-1. The Release Causes are
described within ETSI EN300 485 [13]
A more sophisticated solution proposes to add a Reason header with an
appropriate Release Cause 24 as described in ETSI EN300 485 [13] to a
603 Decline response. This will allow interworking with the PSTN. Yet
another alternative is to create a new response code, but we believe
it is not really necessary to go into that solution.
As the current Reason header extension header is limited to requests,
some extension is needed to state that the Reason header is valid for
either the 603 (Decline) response, or some other status code as
determined by this discussion.
Requirement [ACR-REQ-2] reads about allowing certain authorized
callers to bypass the ACR service of a given callee. For that we
envision that an application or SIP proxy server that has access to
the caller's user profile is able to add indicate in SIP that the
user is authorized to bypass a potential callee's ACR service. We
propose to add a new P-ACR header field that proxies or application
servers can insert. This header would be subject to the same security
concerns and trusted domain considerations as the P-Asserted-Identity
header field [8].
2.2.1 The P-ACR header field
Jesske Expires - December 2005 [Page 3]
Analysis of TISPAN req. to SIP June 2005
In support for the ACR service [REQ-ACR-2], there is a need to
indicate that in some circumstances the ACR service provided towards
the terminating UE should not apply.
One of these cases is when the originating user has requested privacy
of his asserted identity, but because the user belongs to an
authorized group (e.g., policeman), all SIP request should go through
to the called UA, no matter whether the called user has activated ACR
or not.
In another scenario, a PSTN originated call does not deliver the
asserted identity of the called party (e.g., if the call is
originated in an analogue switch). In this case the PSTN gateway is
not able to provide an asserted identity of the calling party. If the
call is routed to a user who has the ACR service activated, the call
shouldn't be rejected due to ACR.
To tackle this problem we suggest creating a new P-ACR header, which
can be populated by a trusted entity (e.g., an Application Server or
Media Gateway Control Function). The contents of the header will
indicate that willingness of bypassing a potential ACR service in the
called party side, and the motivation for it.
It is the same restrictions for the P-ACR as in RFC3325 for the P-
Asserted-ID described must apply.
Proposed syntax for this header:
P-ACR = "P-ACR" HCOLON p-acr-spec
*(COMMA p-acr-spec)
p-acr-spec = "bypass" *(SEMI due-to-param)
due-to-param = "due-to" EQUAL reason-token
reason-token = "interworking" / "is-authorized" / "network"/
token
Example: P-ACR = bypass;due-to=is-authorized
Header field where proxy ACK BYE CAN INV OPT REG
------------ ----- ----- --- --- --- --- --- ---
P-ACR adr - - - o - -
SUB NOT REF INF UPD PRA
--- --- --- --- --- ---
o - o - - -
MESSAGE PUBLISH
--- ---
Jesske Expires - December 2005 [Page 4]
Analysis of TISPAN req. to SIP June 2005
o o
The draft-ietf-sip-identity was not considered due to the fact that
this draft recommends practices and conventions for identifying end
users in SIP messages, and proposes a way to distribute
cryptographically-secure authenticated identities. This is only for
Requests specified. The P-ACR is especially used for indicating
bypass mechanisms for ACR and the indication how P-Asserted-Identity
was set.
2.3 Terminating Indication Presentation (TIP)/Terminating Indication
Restriction (TIR). [REQ-TIP-1] and [REQ-TIP-2]
The implementation of these requirements need some header to convey
the callee's URI, which might be different from the To header field
or Request-URI, due to, e.g., redirections, call transfer, usage of
PBX extensions, etc.
We believe that the P-Asserted-Identity [8] header field inserted in
responses meets these requirements.
An additional Identity header is needed that is send from the
connected SIP user like the From header from the originating user.
2.3.1 The P-Additional-Identity Header
The P-Additional-Identity header field is used among SIP entities
(typically intermediaries) to carry the identity of the user
sending a SIP response as it was not verified by authentication.
This additional header is needed for example a user calling a PBX
desk (e.g., +49 6151 83 0000 for Deutsche Telekom in Darmstadt) will
be forwarded to an Extension (e.g., +49 6151 83 5940 for Roland
Jesske). It is required that the caller gets the latter identity,
which is allocated to the callee.
PAdditionalID = "P-Additional-Identity" HCOLON PAdditionalID-value
*(COMMA PAdditionalID-value)
PAdditionalID-value = name-addr / addr-spec
A P-Additional-Identity header field value MUST consist of exactly
one name-addr or addr-spec. There may be one or two P-Additional-
Identity values. If there is one value, it MUST be a sip, sips, or
tel URI.
If there are two values, one value MUST be a sip or sips URI and the
other MUST be a tel URI. It is worth noting that proxies can (and
will) add and remove this header field.
This document adds the following entry to Table 2 of [1]:
Jesske Expires - December 2005 [Page 5]
Analysis of TISPAN req. to SIP June 2005
Header field where proxy ACK BYE CAN INV OPT REG
------------ ----- ----- --- --- --- --- --- ---
P-Additional-Identity r adr - o - o o -
SUB NOT REF INF UPD PRA
--- --- --- --- --- ---
o o o - - -
MESSAGE PUBLISH
--- ---
o o
Note: Here is also an ongoing discussion if a new header is needed or
if a existing header could be used to identify the ôrealö connected
user. The Contact or Reply-to header were identified as not usable.
2.4 Advice of Charge (AOC) [REQ-AoC-1] and [REQ-AoC-2]
The Advice of Charge simulation service requires a caller to give an
indication to the network that he wants to receive advice of charge
information for a given communication (e.g., session, subscription,
instant message, etc.). A mechanism to invoke the service based on a
SIP-event base subscription and notification has been analyzed.
However, this solution will introduce a synchronization problem, due
to indicating the request for the service out-of-band. The basic
problem is how to identify the SIP request for which the advice
should be provided prior to sending the request, when such request
has not even been created.
We propose, though, that the SIP request for which the Advice of
Service information is requested is complemented with a new header
that invokes the service. Once the service is properly invoked, there
are a number of available mechanisms to deliver the information to
the user, including but not restricted to, audio visual
announcements, instant message, etc.
A detailed proposal for a new P-AoC header field is described in
draft-garcia-sipping-etsi-ngn-p-headers-00 [7].
2.5 Communication Completion on Busy Subscriber (CCBS) [REQ-CCBS-1]to
[REQ-CCBS4]
Discussion in ETSI TISPAN are leaning towards a segmented
implementation of the CCBS service, where there is an application
server which is serving the caller, and another application server
which serving the callee. The main role of application servers is to
Jesske Expires - December 2005 [Page 6]
Analysis of TISPAN req. to SIP June 2005
provide queue management. This is based on the modelling in the ISDN
stage 2 and operates in this manner to allow interworking with the
related ISDN service through a SIP/PSTN gateway.
We model the actual implementation of the CCBS service according to
the following:
- When the AS of the callee detects that the callee is busy and that
the callee supports the dialog event package [9], it forwards the
busy response to the AS of the caller with an indication that the
CCBS service is possible (i.e. queuing capabilities, and dialog event
are supported, REQ-CCBS-1 and REQ-CCBS-2).
- Upon receipt of this indication, the caller is offered to activate
the CCBS service (e.g. the AS of the caller plays an announcement
with DTMF collection, etc).
- If the caller accepts the service activation, the AS of the caller
subscribes to the CCBS service (e.g. subscribes to the CCBS queue of
the callee to the dialog status of this callee, REQ-CCBS-2).
- Upon receipt of the CCBS subscription request, the AS of the caller
confirms that CCBS monitoring has started,
- the AS of the callee then subscribes to the dialog event [9] of the
callee,
- Upon receipt of a notification that the callee is free, the AS of
the callee, notifies the AS of the caller.
- The AS of the caller sets-up the CCBS call using either a 3rd party
control mechanism of a Refer with an indication that this is a CCBS
call (REQ-CCBS-4).
In order to provide compatibility with terminals that implement the
dialog event package, subscriptions that may originate or terminate
in a terminal will be implemented according to the dialog event
package [9].
Subscriptions not involving terminals (i.e., such as the
subscriptions from one application server to another one) need to be
complemented with additional information (REQ-CCBS-3). It is proposed
to define a new "CCBS" event package for backwards compatibility
purposes. The main difference between the "CCBS" event package and
the ôdialogö event package lies in the way subscriptions and
notifications are handled, there is no need to change the contents of
the XML documents exchanged therein. Consequently, the CCBS event
package notifications should contain a dialog information document as
described in [9]. This allows to "tunnel" dialog information
documents contained in dialog package notifications originated by
endpoints into CCBS package notifications sent by application
servers. The additional information to the dialog event package for
providing queues management and concurs to build a subscription
target is as follows:
Jesske Expires - December 2005 [Page 7]
Analysis of TISPAN req. to SIP June 2005
queue: this information is needed for the application server to know
whether to insert this new subscription in the queue or not. We
suggest to add a new "queue" parameter to the "dialog" Event header
field value. Possible values are "true","false", "suspend" (to
suspend its place in queue), "resume" to resume its place in queue.
Hence, the CCBS Event: header will look like, for example
To start CCBS subscription:
Event: ccbs;queue=true;caller=sip:+390112285111@example.com
To suspend CCBS service (for instance, if caller becomes busy):
Event: ccbs;queue=suspend;caller= sip:+390112285111@example.com
To resume CCBS service:
Event: ccbs;queue=resume;caller= sip:+390112285111@example.com
A value of "ccbs" or "dialog" in the 486 Busy Here response will
indicate the URI where the subscription could be made. This URI
could, e.g., a GRUU. Additionally, the presence in a 486 Busy Here
response of an Allow-Events header field with the value "CCBS" would
help to determine the support for the service. However, RFC 3265 [11]
seems to indicate that the Allow-Evens header is only meaningful in
requests and 200 or 489 responses.
Implementation of REQ-CCBS-3 requires that the second time that the
caller sends the INVITE request to the callee, as a result of an
indication that the callee is not busy any longer, the INVITE request
is marked with an flag indicating that the INVITE is the result of
CCBS service. It is proposed that a Call-Info header field is
extended with a new value of the "purpose" parameter. Hence, at the
time of the CCBS call, the AS can insert the Call-Info: header into
the INVITE message directed to user B when triggering the 3rd party
call, or instruct the terminal to do so in the Refer-To: header
inserting the æCall-Info:Æ header as a URL header (after the æ?Æ
character).
Note: With regard to CCBS the discussion is ongoing what kind of
solution could be taken. If a new Event Package is needed or if the
extension of the existing dialog event package is good enough for
CCBS.
2.6 Communication Completion on no Reply (CCNR) [REQ-CCNR-1] to
[REQ-CCNR-4]
Jesske Expires - December 2005 [Page 8]
Analysis of TISPAN req. to SIP June 2005
The implementation of the CCNR service does not require any extra
implementation beyond the solutions proposed for implementing the
CCBS service.
2.7 Malicious Communication IDentification (MCID) [REQ-MCID-1] and [REQ-
MCID-2]
The implementation of the MCID service suggests to split the solution
into the mechanism whereby a callee can indicate to an application
server that he suspects a call is malicious [REQ-MCID-1], from the
mechanism whereby an application server acquires the caller's
identity if not present in the SIP request [REQ-MCID-2].
A possible solution for implementing REQ-MCID-1 consists of the user
subscribing to a new event package. The application server will act
as a notifier. Since the user does not need to receive any
information, other than a message indicating whether the service has
been successfully activated or not, we propose to do a fetch
operation (as per RFC 3265 [11]) with the new event package.
We propose, therefore, a new event "mcid" event package. The value is
accompanied by package parameters indicating the call to be
identified (e.g., by its from-tag, call-id, and to-tag (if
available)). The event package itself should contain a simple
indication of the acceptance or not of the service.
To implement REQ-MCID-2 we envision that all SIP requests addressed
to the user will be routed through the MCID application server. The
application server will analyze all SIP requests. Two possbilities
might take place: the SIP request contains trusted identity
information (e.g., a trusted P-Asserted-Identity [8] header field, or
an Identity [12] header field); or such identity is not present in
the request, in which case, it might be still available upon request.
This is the sometimes the case when a call is originated in the PSTN,
because sometimes the calling party number is only available upon
request.
To meet this requirement and be able to request the identity of the
originator, we propose a SIP event package for requesting identity
information. In most cases this will not be used, but in cases of
interworking with the PSTN, the PSTN gateway will receive a SUBSCRIBE
request for the new event package, will do the PSTN operations to
retrive the calling party number, and will provide the appropriate
notification to the subscriber (the application server).
2.8 Communication Waiting (CW) [REQ-CW-1] and [REQ-CW-2]
Jesske Expires - December 2005 [Page 9]
Analysis of TISPAN req. to SIP June 2005
A solution that meets REQ-CW-1 suggests to use send an instant
message indicating the ser the relevant parameters of the waiting
call.
To implement REQ-CW-2 we suggest to use a 182 Queue response until
the callee accepts the incoming session.
2.9 Communication Diversion (CDIV) [REQ-CDIV-1] to [REQ-CDIV-4]
For supporting CDIV service we envision the usage of draft-ietf-sip-
history-info-06 [6] and draft-elwell-sipping-redirection-reason-01
[2].We therefore request the adoption of draft-elwell-sipping-
redirection-reason as a working group charter item.
2.10 [REQ-CAT-1] and [REQ-CAT-2]
To support REQ-CAT-1 and REQ-CAT-2 we propose that, a PSTN Gateway
(UA) or SIP proxy that has knowledge of the user's category inserts a
P-Caller-Category header field categorizing the caller.
Sometimes the category of the caller is determined to be "operator".
In such case, the presence of the Accept-Language header field can be
combined to determine the language of the operator.
Use of this mechanism in any other context has serious security
shortcomings, namely that there is absolutely no guarantee that the
information has not been modified, or was even correct in the first
place.
The proposed syntax for this header:
P-Caller-Category = "P-Caller-Category " HCOLON p-cat-spec
*(COMMA p-cat-spec)
p-cat-spec = "operator" / "subscriber" / "data" /
"test" / "payphone" / "mobile" / token
Example: P-Caller-Category = "payphone"
An other possibility is to use the solution described within draft-
mahy-iptel-cpc-00 [14]. This solution was dicussed in the past within
IPTEL but not follwed on
Question is which would be the appropriate way to follow.
4. Security Considerations
Jesske Expires - December 2005 [Page 10]
Analysis of TISPAN req. to SIP June 2005
The requirements in this document are intended to result in a
mechanism with applicability for ETSI NGN and NOT for the general
Internet.
Use of this mechanism in any other context has serious security
shortcomings, namely that there is absolutely no guarantee that the
information has not been modified, or was even correct in the first
place.
5. IANA Considerations
This document discusses implementation possibilities and does not
pretend to be a firm proposal for the implementation of any of the
solutions. Therefore, this document does not provide any action to
IANA.
References
[1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A.,Peterson, J., Sparks, R., Handley, M. and E. Schooler,
"SIP:Session Initiation Protocol", RFC 3261, June 2002.
[2] Elwell, J., "SIP Reason header extension for indicating
redirection reasons", draft-elwell-sipping-redirection-reason-
02.txt (work in progress), June 2005.
[3] Jesske, R., Alexeitsev, D., Garcia-Martin, M. "Input Requirements
for the Session Initiation Protocol (SIP) in support for the
European Telecommunications Standards Institute (ETSI) Next
Generation Network (NGN) simulation services", draft-jesske-
sipping-tispan-requirements-01.txt (work in progress), June 2005.
[4] 3GPP TS 24.229: "IP Multimedia Call Control Protocol based on SIP
and SDP".
[5] Peterson, J., "A Privacy Mechanism for the Session Initiation
Protocol (SIP)", RFC 3323, November 2002.
[6] Barnes, M., "An Extension to the Session Initiation Protocol for
Request History Information", draft-ietf-sip-history-info-06.txt
(work in progress), January 2005.
[7] Garcia-Martin, M. "Private Header (P-Header) Extensions to the
Session Initiation Protocol(SIP) in support of the European
Telecommunications Standards Institute (ETSI) Next Generation
Networks (NGN)", draft-garcia-sipping-etsi-ngn-p-headers-00.txt
(work in progress), June 2005.
Jesske Expires - December 2005 [Page 11]
Analysis of TISPAN req. to SIP June 2005
[8] Jennings C., Peterson J., and Watson M. "Private Extensions to
the Session Initiation Protocol (SIP) for Asserted Identity within
Trusted Networks", RFC 3325, November 2002.
[9] Rosenberg, J., Schulzrinne, H., Mahy, R"An INVITE Initiated
Dialog Event Package for the Session Initiation Protocol (SIP)",
draft-ietf-sipping-dialog-package-06.txt (work in progress), April
2005.
[10] Rosenberg, J. "Obtaining and Using Globally Routable User Agent
(UA) URIs (GRUU) in the Session Initiation Protocol (SIP)", draft-
ietf-sip-gruu-03 (work in progress), February 2005.
[11] Roach, A.B., "Session Initiation Protocol (SIP)-Specific Event
Notification", RFC 3265, June 2002.
[12] Peterson, J., Jennings, C. "Enhancements for Authenticated
Identity Management in the Session Initiation Protocol (SIP)",
draft-ietf-sip-identity-05.txt (work in progress), March 2005.
[13] ETSI EN 300 485: "Integrated Services Digital Network (ISDN);
Definition and usage of cause and location in Digital Subscriber
Signalling System No. one (DSS1) and Signalling System No. 7 (SS7)
ISDN User Part (ISUP) [ITU-T Recommendation Q.850 (1998) with
addendum modified]".
[14] R. Mahy "The Calling Party's Category tel URI Parameter" draft-
mahy-iptel-cpc-00, June 2003
Contributors
Keith Drage
Lucent Technologies
SN5 6PP SWINDON
United Kingdom
Phone: +44 1793 897312
Email: drage@lucent.com
Sebastien Garcin
France Telecom
38-40, Rue du General Leclerc
92130 Issy Les Moulineaux
France
Acknowledgments
Jesske Expires - December 2005 [Page 12]
Analysis of TISPAN req. to SIP June 2005
The authors would like to thank the participants of the ETSI TISPAN
WG3 for the comments and initial review of this document.
Author's Addresses
Roland Jesske
Deutsche Telekom
Am Kavalleriesand 3
64307 Darmstadt
Germany
Phone: +496151835940
Email: r.jesske@t-com.net
Denis Alexeitsev
Deutsche Telekom
Am Kavalleriesand 3
64307 Darmstadt
Germany
Phone: +496151832130
Email: d.alexeitsev@t-com.net
Miguel A. Garcia-Martin
Nokia
P.O. Box 407
NOKIA GROUP, FIN 00045
Finland
EMail: miguel.an.garcia@nokia.com
Full Copyright Statement
Copyright (C) The Internet Society (2005).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
Jesske Expires - December 2005 [Page 13]
Analysis of TISPAN req. to SIP June 2005
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Jesske Expires - December 2005 [Page 14]