Internet DRAFT - draft-klensin-iana-reg-policy
draft-klensin-iana-reg-policy
Network Working Group J. Klensin
Internet-Draft
Expires: January 18, 2006 V. Cerf
MCI
S. Bradner
Harvard University
July 17, 2005
Registration Policies for the IETF and IANA
draft-klensin-iana-reg-policy-01.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 18, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
For many years, the IETF has maintained, via the IANA, registries of
protocol and parameter names and numbers. The primary purpose of
these registries is to ensure that different methods and options are
properly identified and distinguished. Registration of such names or
numbers generally does not necessarily imply approval of the
Klensin, et al. Expires January 18, 2006 [Page 1]
Internet-Draft Registration Policies July 2005
technology in the corresponding protocol. Instead, registration
represents the desire to keep choices distinctly identified,
separated, and public to avoid conflicts in use. In recent years,
various changes in the nature of the instructions given to the IANA,
increased perceptions of scarcity in the number spaces associated
with some of the parameters, and other issues have led to a shift in
emphasis from "registration to keep identifiers unique" toward
evaluations of the quality of proposals for and preferences among
protocols. This document argues that shift is undesirable. It
articulates and clarifies the principles that the reasons for
evaluation of registration requests is to ensure a minimum quality of
definition, that any assertions of scarcity to restrict registrations
must be accompanied by a plan for evaluating and, if appropriate,
eliminating the scarcity problem, and that, if a "no scarcity" plan
is not possible, to establish criteria for making decisions that are
as specific and objective as possible.
This document is intended to update the general considerations of RFC
2434, the specific allocation rules of RFC 2780, and the evaluation
criteria associated with other documents that condition an IANA
registration on Expert Review with IESG oversight or on IESG or IETF
action.
[[NOTE IN DRAFT: The length of this abstract exceeds the RFC Editor's
recommended limits. It will be shortened in future versions, but the
longer one is believed to be helpful for I-D announcements, etc.]]
Klensin, et al. Expires January 18, 2006 [Page 2]
Internet-Draft Registration Policies July 2005
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Registration Principle: Clarity of Definition . . . . . . . 6
3. Registration Principle: Allocating Scarcity . . . . . . . . 6
3.1 Scarcity in Parameter Spaces . . . . . . . . . . . . . . . 6
3.2 Scaling and Scarcity Reduction . . . . . . . . . . . . . . 7
3.3 Legitimacy of Registration Requests . . . . . . . . . . . 8
4. Multiple category or arc registrations . . . . . . . . . . . 8
5. Interpretation of Requirements for IESG Review or
Standards Action . . . . . . . . . . . . . . . . . . . . . . 8
6. Reflections on 2434bis . . . . . . . . . . . . . . . . . . . 9
6.1 Designated Experts . . . . . . . . . . . . . . . . . . . . 9
6.2 Override Procedure . . . . . . . . . . . . . . . . . . . . 10
6.3 Denial of Service Attacks . . . . . . . . . . . . . . . . 10
6.4 Appeals . . . . . . . . . . . . . . . . . . . . . . . . . 10
7. Internationalization Considerations . . . . . . . . . . . . 10
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . 10
9. Security considerations . . . . . . . . . . . . . . . . . . 10
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11
A. Changes from previous version . . . . . . . . . . . . . . . 11
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 11
11.1 Normative References . . . . . . . . . . . . . . . . . . 11
11.2 Informative References . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 13
Intellectual Property and Copyright Statements . . . . . . . 15
Klensin, et al. Expires January 18, 2006 [Page 3]
Internet-Draft Registration Policies July 2005
1. Introduction
For many years, the IETF has maintained, via the IANA registries of
protocol and parameter names and numbers. The original purpose of
these registries was to ensure that different methods and options are
properly identified and distinguished. Registration did not imply
approval of the technology in the corresponding protocol. Instead,
registration represented only the desire to keep distinct options
identified, separated, and public to avoid conflicts.
In recent years, the previous very general instructions to the IANA
about registrations have been superceded by the inclusion of specific
instructions in RFCs that define IETF protocols. These instructions
have included rules for the establishment of the relevant registries
themselves and details on how requests should be submitted, and new
values defined, for any paramaters defined by the RFC. In addition a
number of RFCs have been produced to provide instructions for IETF
protocols that were defined before such instructions began to be
included. Examples of those RFCs containing registration
instructions include [RFC2780], [RFC2939], [RFC3171], [RFC3228],
[RFC3383], [RFC3438], [RFC3474], [RFC3475], [RFC3476], [RFC3575],
[RFC3737], [RFC3818], [RFC3968], and [RFC3969]. These instructions,
coupled with increased perceptions of scarcity in the number spaces
associated with some parameters, have led to a shift in emphasis from
"registration to keep identifiers unique" and toward evaluations of
the quality of proposals and preferences about protocol design.
The distinction between requiring clarity and lack of obvious
conflict in a registration and blocking one unless the quality of the
underlying protocol was adequate was, in retrospect, further confused
by [RFC2434] (which describes elements of the registration model) in
different places, as
o "To insure that such quantities have consistent values and
interpretations in different implementations, their assignment
must be administered by a central authority." (abstract, repeated
in first paragraph of section 1)
o "... preferred way of insuring review, and is particularly
important if any potential interoperability issues can arise.
[...] A new option may define fields that need to be parsed and
acted on, which (if specified poorly) may not fit cleanly with the
architecture of other options or the base protocols on which they
are built." (section 2)
o "Even when the space is essentially unlimited, however, it is
usually desirable to have a minimal review to prevent the hoarding
of or unnecessary wasting of a space." (section 2)
Klensin, et al. Expires January 18, 2006 [Page 4]
Internet-Draft Registration Policies July 2005
RFC 2434 was used as the primary guideline for the RFCs listed above
that define IANA considerations for particular protocols. All three
of the above statements are consistent with other text in RFC 2434,
but the intent of the review is left open. In other words, it
specifies how a review is to be performed, but not the criteria to be
used. The present document argues that the apparent recent shift
from "evaluate a registration request for clarity and to avoid
interoperability problems" is undesirable and explicitly sets out
evaluation principles for registrations. While it may be completely
reasonable to require some specific level of approval of a protocol
with an associated parameter value, especially when the specification
for that allocation explicitly designates IETF approval and
endorsement (see Section 4), this should not be used as a
justification to require "approval" of registrations in general. For
registrations, the principal reasons for review are to ensure
adequate quality in the definitions to permit interoperability, to
avoid redundant or spurious registrations, and to provide those who
request the registrations an opportunity for non-binding IETF
community advice on the nature of the parameters being proposed for
registration or the protocol elements associated with them. A
secondary, but still important, reason involves verification that the
proposed protocol does not contain elements that are likely to cause
serious harm to the Internet. However, the threshold for rejecting a
registration on the basis of "serious harm" should be very high and
represent broad and obvious community consensus. This is the case
first because there might otherwise be suspicion that a claim of harm
was being used to try to block an unpopular protocol or to give a
favored one some advantage. Second, from a registration standpoint,
the best way to handle a dangerous protocol may be to give it clear
and distinct parameter values so its effects can be easily and
accurately identified and quarantined.
It should also be clear from experience with Peer-to-Peer protocols
and other that the IETF does not and cannot control introduction and
use of "non-standard" protocols. So registration is in some sense
only a courtesy to the community. P2P protocols freely violate norms
on the use of particular protocol identifiers and parameters but
since the software often has but a single source, there is no
confusion FOR THOSE INSTANCES of the software that comes from the
same source and uses the same "conventions" albeit non-standard and
even conflicting with standards.
This document articulates and clarifies the principles that (i) the
reasons for evaluation of registration requests is to ensure a
minimum quality of definition, (ii) any assertion of a danger to the
Internet or to the stable operation of other protocols (especially
IETF Standards Track ones) must by supported by a public discussion
to which all relevant parties can contribute, and (iii) that any
Klensin, et al. Expires January 18, 2006 [Page 5]
Internet-Draft Registration Policies July 2005
assertions of scarcity to restrict registrations MUST be accompanied
by a plan for eliminating the scarcity problem or a conclusion,
supported by IETF consensus, that it is not possible to do so and a
corresponding rationing plan for the remaining space. These
principles derive from the assumption that growth and innovation on
the Internet continue to be core values of the IETF and the Internet
community.
In summary, unless the "scarcity" rules of Section 3 apply, this
document updates all "IANA registration" documents and "IANA
considerations" sections of documents to clarify the point that
registration review is to focus on the issues above, rather than on
concerns about, e.g., whether one protocol approach is better than
another one.
2. Registration Principle: Clarity of Definition
By longstanding IANA tradition, almost all protocol number or
parameter registrations must be associated with a description of what
the parameter represents. As mentioned in RFC 2434, while those
descriptions are normally public, the IETF and IANA have sometimes
made provisions for non-public definitions. But, in all cases, the
definitions must be sufficiently clear to avoid any interoperability
problems. Over the years, IANA has regularly sent registration
requests back to the originator for clarification. Today, part of
the purpose of review of registration requests in the IETF is to make
determinations about whether an appropriate level of clarity has been
achieved and about whether the documentation supplied is adequate.
3. Registration Principle: Allocating Scarcity
As suggested in section 2 of [RFC2434], the size of a name space in
which parameters are to be allocated determines whether care must be
taken "to insure that the space doesn't become exhausted". However,
that level of care MUST NOT be interpreted or implemented in an
attempt to apply a single standard of taste or style to the Internet
or otherwise as a mechanism for attempting to suppress innovation. A
limited space requires diligent evaluation of requests to avoid
spurious or vanity registrations and unnecessary ones, including
registrations that are unlikely to ever be used. However, unless
extraordinary circumstances arise, such evaluation must be carried
out on the assumption that the size of the name space is, and will
remain, adequate for all legitimate registrations of values that will
be used with the associated protocols.
3.1 Scarcity in Parameter Spaces
The size requirements for a particular name space may occasionally be
Klensin, et al. Expires January 18, 2006 [Page 6]
Internet-Draft Registration Policies July 2005
underestimated, creating a requirement to minimize allocations and
registrations in that particular name space to avoid a clear danger
of running out of the space. If that situation arises for a
particular name space, and its existence is confirmed by the IESG
after an IETF review and Last Call as described in [RFC2026], then
new registrations may be temporarily restricted to those required to
meet the needs of IETF protocol development. However, such
restrictions MUST NOT be applied without initiation of a plan to
evaluate and, if appropriate, eliminate the scarcity, as discussed in
the next subsection.
3.2 Scaling and Scarcity Reduction
Difficulties with scaling are always a significant risk factor on the
Internet, with regard to both protocol design and administrative
procedures. When a parameter field is of fixed length, estimates
must be made, sometimes under considerable uncertainty and with high
costs associated with incremental size, as to how much parameter
capacity is needed. If such an estimate is incorrect and a
significant danger arises of running out of space, "conservation",
i.e., restrictions on registrations or allocations to save space,
will delay the date on which no further space is available, but will
not eliminate the risk of that occurring. Because of the damaging
effects on Internet innovation of rejecting otherwise-legitimate
registrations because of name space exhaustion, a decision that a
name space is facing a capacity crisis MUST BE made explicitly by the
community, as outlined above, and MUST BE associated with a plan to
expand the relevant name space unless that is deemed to be infeasible
(see below). A plan to expand the name space MAY take the form of
chartering a Working Group or creating an IAB workshop to develop a
plan within an appropriate time, or other approaches may be used.
A determination that the expansion of a name space is infeasible MUST
include criteria for making allocations in the balance of the
existing space and those criteria must be fair and balanced. The
determination of infeasibility and the allocation plan MUST represent
the consensus of the IETF community, determined through the same
mechanisms used to approve a document as a BCP (see [RFC2026]).
It is the explicit intent of this specification that registration
requests not be rejected for reasons of name space shortages unless
either an effort has been initiated to eliminate the shortage or a
formal determination has been made by the community that it is
infeasible or undesirable to do so. Nothing in this document should
be taken as requiring that every limited name space must be expanded,
only that careful consideration of what to do about the scarcity
situation be initiated, and initiated in a way that is visible and
accessible for community participation, immediately upon a
Klensin, et al. Expires January 18, 2006 [Page 7]
Internet-Draft Registration Policies July 2005
determination of scarcity and that the consideration process be
diligently pursued until some consensus conclusion is reached.
3.3 Legitimacy of Registration Requests
[[Note in Draft: This subsection is temporary.]]
Obviously, it must be possible for the IANA and the registration
evaluation process to protect against denial of service attacks by
virtue of a perpetrator registering as many parameters as possible so
as to exhaust the address space. Since that issue exists whether or
not this specification is accepted, it should be addressed generally
in RFC 2434bis and more specifically in individual registry
specification documents or sections. See Section 6.
4. Multiple category or arc registrations
In a number of cases, registration procedures or protocols have
provided for registrations in a number of different categories, where
those categories are associated with different levels of requirements
for registration but where interoperability may be achieved by the
use of any of the categories. Examples of this approach include the
distinction between "user" and "system" port numbers most recently
described in [RFC2780] and the distinctions among the various
registration arcs for media type registrations described in
[RFC2048].
A decision by the IESG or other designated party to require that a
registration be made in a different arc or subsidiary name space than
was proposed is not to be considered a rejection of the registration
request under the terms of this document.
5. Interpretation of Requirements for IESG Review or Standards Action
A requirement for IESG approval, Standards Action, or RFC Publication
implies that IESG approval is an acceptable alternative to the other
two, not an exceptional case unless the requirement contains
additional provisions specifying the conditions for IESG review and
approval. Because, for reasons discussed above, the action on a
registration request SHOULD BE to permit the registration unless
special circumstances apply, the IESG MUST NOT deny a registration
request for other than reasons of clarity without an IETF Last Call
and IETF consensus that the rejection is appropriate for identified
reasons consistent with those discussed in this document. If a
registration request is denied for any reason, that reason must be
stated explicitly and the decision may be appealed under the
procedures specified in [RFC2026] or its successor(s).
Klensin, et al. Expires January 18, 2006 [Page 8]
Internet-Draft Registration Policies July 2005
Inevitably, almost any of the procedures discussed above or in RFC
2434, may result in delays as the application is evaluated. In the
spirit of community comment, input, and consensus, feedback to those
requesting an allocation is desirable and is to be encouraged.
Registration delays while such discussions are ongoing are entirely
appropriate as long as they do not cause unreasonable delays once the
feedback and discussion processes runs their effective course. Of
course, nothing in this document prevents an applicant from
voluntarily withdrawing a registration request at any time that is
deemed appropriate.
6. Reflections on 2434bis
A revision of RFC 2434, known as [RFC2434bis] is being developed.
This section discusses some important interactions between the model
of that document and the one presented here.
6.1 Designated Experts
2434bis is fairly non-specific about the amount of authority that is
reasonably delegated and for what purposes. This document takes the
position that individual decisions, taken out the view of the
community, should be significantly constrained with regard to both
subject matter and process. In particular, designated experts are
seen as appropriate as managers of discussion and feedback and to
evaluate clarity of a specification and not as a decision focus on
the appropriateness of a protocol or registration request. An
exception might be made when the expert is given specific guidance
from the community, but this document views even that as a high-risk
situation.
More generally, designated experts are appropriate only in situations
in which it is reasonable to assume that feedback --on both the
registration and the underlying protocol is sought by those who
request the registration and where that feedback is seen by all
parties as an important part of the process. As one example, a
designated expert may be an appropriate source or channel of advice
to both the requester and other other review bodies on the clarity of
a specification.
The designation and use of such experts is not appropriate for
registries that are, or are likely to be, associated with significant
controversy (of which declared scarcity is almost always an
instance). When controversies about registrations exist or can be
anticipated, an open, public process with community involvement and
practical opportunity for timely appeals is almost always more
appropriate.
Klensin, et al. Expires January 18, 2006 [Page 9]
Internet-Draft Registration Policies July 2005
6.2 Override Procedure
RFC2434bis-02 contains provisions for an override procedure in
section 4.3. The position of this document is that, while such
procedures may be necessary and appropriate, they should be exposed
to full view of the community so that timely feedback and, if
necessary, appeal is possible. Consequently, if the override
procedure is invoked, the IESG should notify the community that it is
being done and, unless the situation involves severe time
constraints, at least a brief Last Call or other request for
community comments should be conducted on the proposed action.
6.3 Denial of Service Attacks
At least in principle, it is possible to attack any registry by
attempting massive registration of names or parameters so as to use
up all of the available space. 2434bis should address this issue, at
least to the extent of recommending that specifications that
establish registries advise on how such attacks are to be repelled
for those registries.
6.4 Appeals
RFC 2434bis prohibits appeals beyond the IAB. There appears to be
little or no justification for barring such appeals if a claim is
made that the procedures are flawed or inadequate.
7. Internationalization Considerations
This document specifies IETF procedures and does not interact with
internationalization.
8. IANA Considerations
This document specifies IETF and IESG considerations in recommending
actions to IANA. It recommends that, when the IETF concludes that
the protocol, extension, or option associated with a registration
request is problematic or dangerous, the entry in the IANA registry
should be annotated to identify the concern and, when appropriate,
point to documentation or other materials that will better explain
the concern or alternatives that might be less problematic. While
this document specifies no particular registry actions for IANA, IANA
should be prepared for requests from the IETF to annotate registry
entries in that way.
9. Security considerations
This document specifies IETF procedures. It should have no direct
Klensin, et al. Expires January 18, 2006 [Page 10]
Internet-Draft Registration Policies July 2005
impact on Internet security. It does, however, firmly advocate the
principle that it is preferable for options or extensions that could
pose security or operational risks to be throughly documented and
carefully identified in preference to hiding them and hoping that
they will disappear.
10. Acknowledgements
Comments were received on discussion leading to this document, or on
a preliminary draft, from Bob Braden, Dave Crocker, Spencer Dawkins,
Ned Freed, John Loughney, and others that contributed to text in this
document and are greatly appreciated.
Appendix A. Changes from previous version
[[Note in draft: This section to be removed before RFC publication.]]
Changes from -00.
1. Added new material to discuss impact with and on RFC2434bis as
Section 6
2. Made several small changes to clarify that name space expansion
is not a requirement, only that serious consideration of the
issue be initiated as soon as scarcity is noted.
3. Made several small changes to clarify that delays in registration
to obtain feedback and to discuss the registration with the
requestor and the community are appropriate as long as they are
not unreasonably prolonged.
11. References
11.1 Normative References
[RFC2026] Bradner, S., "The Internet Standards Process -- Revision
3", BCP 9, RFC 2026, October 1996.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.
11.2 Informative References
[RFC2048] Freed, N., Klensin, J., and J. Postel, "Multipurpose
Internet Mail Extensions (MIME) Part Four: Registration
Procedures", BCP 13, RFC 2048, November 1996.
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 2434,
October 1998.
Klensin, et al. Expires January 18, 2006 [Page 11]
Internet-Draft Registration Policies July 2005
[RFC2434bis]
Narten, T. and B. Carpenter, "Guidelines for Writing an
IANA Considerations Section in RFCs",
draft-narten-iana-considerations-rfc2434bis-02.txt (work
in progress), June 2005.
[RFC2780] Bradner, S. and V. Paxson, "IANA Allocation Guidelines For
Values In the Internet Protocol and Related Headers",
BCP 37, RFC 2780, March 2000.
[RFC2939] Droms, R., "Procedures and IANA Guidelines for Definition
of New DHCP Options and Message Types", BCP 43, RFC 2939,
September 2000.
[RFC3171] Albanna, Z., Almeroth, K., Meyer, D., and M. Schipper,
"IANA Guidelines for IPv4 Multicast Address Assignments",
BCP 51, RFC 3171, August 2001.
[RFC3228] Fenner, B., "IANA Considerations for IPv4 Internet Group
Management Protocol (IGMP)", BCP 57, RFC 3228,
February 2002.
[RFC3383] Zeilenga, K., "Internet Assigned Numbers Authority (IANA)
Considerations for the Lightweight Directory Access
Protocol (LDAP)", BCP 64, RFC 3383, September 2002.
[RFC3438] Townsley, W., "Layer Two Tunneling Protocol (L2TP)
Internet Assigned Numbers Authority (IANA) Considerations
Update", BCP 68, RFC 3438, December 2002.
[RFC3474] Lin, Z. and D. Pendarakis, "Documentation of IANA
assignments for Generalized MultiProtocol Label Switching
(GMPLS) Resource Reservation Protocol - Traffic
Engineering (RSVP-TE) Usage and Extensions for
Automatically Switched Optical Network (ASON)", RFC 3474,
March 2003.
[RFC3475] Aboul-Magd, O., "Documentation of IANA assignments for
Constraint-Based LSP setup using LDP (CR-LDP) Extensions
for Automatic Switched Optical Network (ASON)", RFC 3475,
March 2003.
[RFC3476] Rajagopalan, B., "Documentation of IANA Assignments for
Label Distribution Protocol (LDP), Resource ReSerVation
Protocol (RSVP), and Resource ReSerVation Protocol-Traffic
Engineering (RSVP-TE) Extensions for Optical UNI
Signaling", RFC 3476, March 2003.
Klensin, et al. Expires January 18, 2006 [Page 12]
Internet-Draft Registration Policies July 2005
[RFC3575] Aboba, B., "IANA Considerations for RADIUS (Remote
Authentication Dial In User Service)", RFC 3575,
July 2003.
[RFC3737] Wijnen, B. and A. Bierman, "IANA Guidelines for the
Registry of Remote Monitoring (RMON) MIB modules",
RFC 3737, April 2004.
[RFC3818] Schryver, V., "IANA Considerations for the Point-to-Point
Protocol (PPP)", BCP 88, RFC 3818, June 2004.
[RFC3968] Camarillo, G., "The Internet Assigned Number Authority
(IANA) Header Field Parameter Registry for the Session
Initiation Protocol (SIP)", BCP 98, RFC 3968,
December 2004.
[RFC3969] Camarillo, G., "The Internet Assigned Number Authority
(IANA) Uniform Resource Identifier (URI) Parameter
Registry for the Session Initiation Protocol (SIP)",
BCP 99, RFC 3969, December 2004.
Authors' Addresses
John C Klensin
1770 Massachusetts Ave, #322
Cambridge, MA 02140
USA
Phone: +1 617 491 5735
Email: john-ietf@jck.com
Vinton G. Cerf
MCI
22001 Loudoun County Parkway, F2-4115
Ashburn, VA 20147
USA
Phone: +1 703 886 1690
Email: vinton.g.cerf@mci.com
Klensin, et al. Expires January 18, 2006 [Page 13]
Internet-Draft Registration Policies July 2005
Scott Bradner
Harvard University
29 Oxford St
Cambridge, MA 02138
US
Phone: +1 617 495 3864
Email: sob@harvard.edu
Klensin, et al. Expires January 18, 2006 [Page 14]
Internet-Draft Registration Policies July 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Klensin, et al. Expires January 18, 2006 [Page 15]