Internet DRAFT - draft-kwon-aaa-nemo

draft-kwon-aaa-nemo






NEMO Working Group                                               T. Kwon
Internet-Draft                                                   S. Baek
Expires: January 12, 2006                                        S. Pack
                                                                 Y. Choi
                                               Seoul National University
                                                           July 11, 2005


                              AAA for NEMO
                       draft-kwon-aaa-nemo-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on January 12, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   The purpose of this paper is to describe an AAA protocol designed for
   NEMO services.  The proposed AAA protocol retains the NEMO mobility
   transparency in the NEMO basic support protocol, while providing all
   the required AAA functionalities for mobile network nodes.  In
   addition, the proposed AAA protocol reduces authentication latency by
   localizing AAA process.



Kwon, et al.            Expires January 12, 2006                [Page 1]

Internet-Draft                AAA for NEMO                     July 2005


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3

   2.  Terms and Abbreviations  . . . . . . . . . . . . . . . . . . .  3
     2.1   General Terms  . . . . . . . . . . . . . . . . . . . . . .  3
     2.2   Payloads . . . . . . . . . . . . . . . . . . . . . . . . .  4
     2.3   Messages . . . . . . . . . . . . . . . . . . . . . . . . .  5

   3.  The Model and Assumption . . . . . . . . . . . . . . . . . . .  5

   4.  AAA Protocol . . . . . . . . . . . . . . . . . . . . . . . . .  7
     4.1   MR Authentication  . . . . . . . . . . . . . . . . . . . .  7
       4.1.1   Inter-Domain AAA Procedure . . . . . . . . . . . . . .  7
       4.1.2   Intra-Domain AAA Procedure . . . . . . . . . . . . . .  9
     4.2   VMN Authentication . . . . . . . . . . . . . . . . . . . . 10

   5.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 12

       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 13

       Intellectual Property and Copyright Statements . . . . . . . . 15





























Kwon, et al.            Expires January 12, 2006                [Page 2]

Internet-Draft                AAA for NEMO                     July 2005


1.  Introduction

   According to NEMO terminologies [1], a mobile network (NEMO) is
   defined as a network whose point of attachment to the Internet varies
   as it moves about.  A NEMO consists of mobile routers (MRs) and
   mobile network nodes (MNNs).  Each NEMO has a home network to which
   its home address belongs.  When a NEMO is in its home network, the
   NEMO is identified by its home address (HoA).  On the other hand, the
   NEMO configures a care-of-address (CoA) on the egress link when the
   NEMO is away from the home network.  At the same time, on the ingress
   link, the MNNs of the NEMO configures CoAs, which are derived from
   the subnet prefix (i.e.  NEMO prefix) in the home network.  This NEMO
   prefix remains assigned to the NEMO while it is away from the home
   network.  The assigned NEMO prefix is registered with the home agent
   (HA) by the NEMO basic support protocol [2].

   To make NEMO services feasible in public wireless Internet, well-
   defined authentication, authorization, and accounting (AAA) protocols
   should be accompanied.  However, to the best of our knowledge, no
   specific AAA protocols have been proposed for NEMO support.  Even if
   a number of AAA protocols have been proposed for host mobility, all
   of them are based on per-node AAA operations.  Therefore, it cannot
   directly applied to NEMO environments containing both local fixed
   nodes (LFNs) and visiting mobile nodes (VMNs).  In this document, we
   propose a novel AAA protocol that provides efficient AAA procedures
   in NEMO environments.

2.  Terms and Abbreviations

2.1  General Terms

   Attendent : An AAA entity which is the local AAA system entry point.
   The attendant extracts identification and authorization data sent by
   the MR or the VMN and forwards them to AAAL in order to request
   authentication.

   AAAH : AAA server of the home network.

   AAAL : AAA server of the foreign network.

   MR : mobile router.

   AR : access router.

   VMN : visiting mobile node.  A VMN is temporarily attached to the
   MR's subnet by obtaining its CoA from the NEMO prefix.

   LFN : local fixed node.  This belongs to the mobile network and is



Kwon, et al.            Expires January 12, 2006                [Page 3]

Internet-Draft                AAA for NEMO                     July 2005


   unable to change its point of attachment.

   MNN : mobile network node.  MNNs such as VMN and LFN are nodes in a
   NEMO.

   MN : mobile node [4].

2.2  Payloads

   LC (local challenge) : a challenge issued by the attendant.  This is
   a random number for authentication procedures.

   NAI (network access identifier) : identitiy of MR or VMN.  MRs and
   VMNs are identified by their network access identifiers.

   RPI (replay protection indicator) : Either a timestamp or a random
   number can be used as an RPI.

   H@ : Home Address

   HA@ : Home Agent Address

   SA (security association) : a relationship between a sender and a
   receiver that afforcd security services to the traffic carried
   between peers.

   key_aaa : an AAA key in the pre-shared SA between an MR and an AAAH

   CR (Credential) : an AAA credential which is used by the AAAH to
   authenticate the MR or the VMN.  The MR or VMN encrypts the LC using
   the key in the pre-defined SA with its AAAH.  The encrypted value is
   called as a credential.

   CR_L (Local Credential) : an AAA credential which is used by the AAAL
   to authenticate the MR.  The MR encrypts the LC using the key_local.
   The encrypted value is called as a local credential.

   key_local : a dynamic key in the temporal SA between an MR and an
   AAAL server

   key_home : a dynamic key in the temporal SA between and an MR and its
   HA

   SP_LOCAL : security parameters to establish an temporal SA between an
   MR and an AAAL

   SP_HOME : security parameters to establish an temporal SA between an
   MR and its HA



Kwon, et al.            Expires January 12, 2006                [Page 4]

Internet-Draft                AAA for NEMO                     July 2005


2.3  Messages

   In this section, the fields of the new proposed messages are
   detailed.

   Attendant Solicit (AS) : An IPv6 router solicitation message with the
   extended AAA option

   Attendant Advertisement (AA) : An IPv6 router advertisement message
   with extended AAA option

   Athentication Request (AReq) : NAI, RPI, H@, HA@, LC, CR

   Authentication Reply (ARep) :NAI, RPI, H@, HA@, SP_HOME, SP_LOCAL

   AA-Mobile-Router-Request (AMR)  : NAI, RPI, H@, HA@, LC, CR

   AA-Mobile-Router-Answer (AMA)  :  NAI, RPI, H@, HA@, SP_LOCAL,
   SP_HOME

   AA-Home-Agent-Request (AHR)  :  NAI, RPI, H@, SP_HOME

   AA-Home-Agent-Answer (AHA) : NAI, H@

   AA-Mobile-Router-Local-Request (AMLR) : NAI, RPI, H@, HA@, LC, CR_L

   AA-Mobile-Router-Local-Answer (AMLA) : NAI, RPI, H@, HA@

3.  The Model and Assumption

   In this section, the AAA architecture for NEMO services is introduced
   with basic assumptions and concepts such as SA and challenge/response
   authentication.


















Kwon, et al.            Expires January 12, 2006                [Page 5]

Internet-Draft                AAA for NEMO                     July 2005


        Foreign Domain               Home Domain of MR              Home Domain of VMN
          +--------+    "AAA network"    +--------+   "AAA network"     +--------+
          |  AAAL  |<------------------->|  AAAH  |<------------------->|  AAAH  |
          | server |                     | server |                     | server |
          +--------+                     +--------+                     +--------+
              ^                               ^                              ^
              |                               |                              |
              |                               |                              |
              v                               v                              v
         +-----------+                  +---------+                    +---------+
         |    AAA    |                  |  Home   |                    |  Home   |
         | Attendant |                  |  Agent  |                    |  Agent  |
         +-----------+                  +---------+                    +---------+
              ^
              |
              |
              v
          +--------+
          | Mobile |
          | Router |
          +--------+
              ^
              |
              |
              v
          +----------+
          | Visiting |
          |  Mobile  |
          |   Node   |
          +----------+

          Figure 1. NEMO AAA Architecture

   Figure 1 illustrates a reference architecture for AAA in NEMO
   environments, which is similar to that of Mobile IPv6 [4,5].  The AAA
   architecture is based on the DIAMETER protocol [3].

   The AAA architecture consists of multiple autonomous wireless
   networks, each of which is called a domain.  Each domain has an AAAH
   server and/or an AAAL server in order to authenticate any node in a
   DIAMETER-compliant manner.  The AAAH server of the MR has the profile
   of the MR and it shares a long-term key with the MR.  Likewise, the
   AAAH server of the VMN shares a long-term key with the VMN.  The AAAL
   server takes charge of an AAA procedure for a visiting NEMO (VMNs and
   MRs).  We assume that the AAAL server also serves as the home AAA
   server for an AR by keeping a long-term key.  The trust relationship
   between the AAAH server of the MR and the AAAL server of the visited
   network is maintained through the DIAMETER protocol.  When the NEMO



Kwon, et al.            Expires January 12, 2006                [Page 6]

Internet-Draft                AAA for NEMO                     July 2005


   changes its point of attachment, the MR needs to be authenticated and
   authorized before it accesses the same foreign network (intra-domain
   handoff) or a new foreign network (inter-domain handoff).  To
   accomplish this, the MR and AR authenticate each other through a
   mutual authentication procedure that involves both the AAAH server of
   the MR and the AAAL server of the AR.  An attendant (which is the
   same as the AAA client) is an entity that requests authentication
   procedures to the AAA system.  In Mobile IPv6 networks, ARs normally
   act as the attendants for an MN [4].  In our protocol, the AR serves
   as an attendant for the MR's authentication, while the MR serves as
   an attendant for VMN's authentication.  In the latter case, the MR
   broadcasts attendant advertisement messages and receives
   authentication request messages from VMNs within the NEMO.

   Regarding SAs, it is assumed that the MR's AAAH and the VMN's AAAH
   have a pre-established SA.  In addition, it is assumed that the MR
   and LFNs have already authenticated each other by some mechanism,
   which is out of the scope of this document.

4.  AAA Protocol

4.1  MR Authentication

4.1.1  Inter-Domain AAA Procedure

   When a NEMO enters a new foreign network domain, an inter-domain AAA
   procedure is initiated.  Since the MR does not have any SA with the
   AAAL server in the foreign network domain, it should be authenticated
   with its AAAH server located in its home network domain.  The message
   flows for the inter-domain AAA procedure are depicted in figure 2.





















Kwon, et al.            Expires January 12, 2006                [Page 7]

Internet-Draft                AAA for NEMO                     July 2005


      MR          attendant(AR)                   AAAL    AAAH         HA
       |               |                           |       |           |
       |     AS        |                           |       |           |
       |-------------->|                           |       |           |
       |               |                           |       |           |
       |     AA        |                           |       |           |
       |<--------------|                           |       |           |
       |               |                           |       |           |
       |    AReq       |                           |       |           |
       |-------------->|            AMR            |       |           |
       |               |-------------------------->|  AMR  |           |
       |               |                           |----- >|    AHR    |
       |               |                           |       |---------->|
       |               |                           |       |           |
       |               |                           |       |    AHA    |
       |               |                           |  AMA  |<----------|
       |               |            AMA            |<------|           |
       |    ARep       |<--------------------------|       |           |
       |<--------------|                           |       |           |
       |               |                           |       |           |

       Figure 2. AAA procedures of MR : inter-domain handoff.


   1) The MR sends an Attendant Solicit (AS) message to the attendant,
   i.e.  AR.

   2) As a response to the AS message, the AR sends an Attendant
   Advertisement (AA) message including an LC.  Even without the AS
   message, the AR broadcasts AA messages periodically.

   3) The MR encrypts the received LC value using the long-term SA with
   its AAAH server and makes a CR, which is used for the MR's AAAH
   server to authenticate the MR.  Then, the MR sends an AReq message
   that contains the LC and CR to the attendant.  The AReq message also
   contains the NAI for the AAAL server to identify MR's home domain and
   the RPI for the MR to protect from replay attack.

   4) When the attendant (AR) receives the AReq message, the attendant
   converts it into an AMR message, which is a new DIAMETER message.
   And then, the attendant sends the AMR message to the AAAL server in
   the foreign domain.

   5) The AAAL server detects that it cannot authenticate the MR locally
   by checking the NAI field and hence forwards the AMR message to the
   MR's AAAH.  When the AAAH server receives the AMR message, it
   decrypts the CR using the pre-established SA and compares the result
   with the LC value.  If these two values are identical, the MR is



Kwon, et al.            Expires January 12, 2006                [Page 8]

Internet-Draft                AAA for NEMO                     July 2005


   successfully authenticated.  Then, the AAAH server constructs key
   materials to make two dynamic keys: one is a key_local (to be
   explained later) for intra-domain AAA procedures in the foreign
   domain and the other is a key_home to make a secure bi-directional
   tunnel between the MR and the MR's HA.  For the construction of
   key_local and key_home at the MR, SP_HOME and SP_LOCAL are also
   generated.  These security parameters are encrypted using the long-
   term key between the MR and AAAH server to avoid the possibility of
   exposure to other network entities.  If there is no HA address in the
   AMR message, the AAAH server will assign an HA for the MR.

   6) The AAAH server informs the HA of the MR's NAI and SP_HOME by the
   AHR message.

   7) The HA constructs key_home by using SP_HOME and replies with an
   AHA message for confirmation.

   8) The AMA message is used for the AAAH server to notify the AAAL
   server of the AAA result.  When the AAAL server receives the AMA
   message with authentication approval, the AAAL server decrypts the
   message using the long-term key with the AAAH server, records the
   MR's NAI, and constructs key_local.

   9) The AAAL server will relay the same AMA message from the AAAH
   server except for the SP_LOCAL to the attendant.

   10) When receiving the AMA message, the attendant learns that the MR
   is authenticated and grants the MR's network access.  In addition,
   the attendant informs the MR of the result by the ARep message
   containing SP_HOME, SP_LOCAL, home agent address, etc.

4.1.2  Intra-Domain AAA Procedure

   While a NEMO changes its point of attachment within the same foreign
   domain, we propose that the MR be authenticated through a localized
   AAA procedure with the AAAL server in the foreign network without any
   interaction with the MR's AAAH server.  That is, the AAAL of the
   foreign network can authenticate the MR by the key_local.













Kwon, et al.            Expires January 12, 2006                [Page 9]

Internet-Draft                AAA for NEMO                     July 2005


      MR         attendant(AR)                    AAAL
       |               |                           |
       |     AS        |                           |
       |-------------->|                           |
       |               |                           |
       |     AA        |                           |
       |<--------------|                           |
       |               |                           |
       |    AReq       |                           |
       |-------------->|           AMLR            |
       |               |-------------------------->|
       |               |                           |
       |               |                           |
       |               |                           |
       |               |                           |
       |               |                           |
       |               |           AMLA            |
       |    ARep       |<--------------------------|
       |<--------------|                           |
       |               |                           |

       Figure 3. AAA procedures of an MR : intra-domain handoff.


   Figure 3 illustrates the intra-domain AAA procedure.  As a response
   to the AA message, the VMN sends the AReq message containing CR_L,
   which is different from CR used in the inter-domain AAA procedure.
   CR_L is an authentication code generated from the key_local.  The
   attendant constructs an AMLR DIAMETER message and sends it to the
   AAAL server.  When the AAAL server receives the AMLR message, the
   AAAL server authenticates the MR by using key_local that is already
   stored at the AAAL server and informs the attendant of the result by
   the AMLA message.  Then, the attendant will relay the result by the
   ARep message.

4.2  VMN Authentication

   A VMN is a visiting MN that accesses the Internet through an MR in a
   NEMO.  According to the NEMO basic support protocol [2], the VMN does
   not need to know whether its new router is the AR or the MR.
   Therefore, the AAA scheme for VMNs should be also transparent to this
   issue.  In our AAA protocol, the MR serves as an attendant for VMNs
   and the MR's AAAH server serves as an AAAL server.  Accordingly, the
   VMN will deem the MR to be in the MR's home network.







Kwon, et al.            Expires January 12, 2006               [Page 10]

Internet-Draft                AAA for NEMO                     July 2005


      VMN         attendant(MR)     HA_MR  AAAH_MR    AAAH_VMN      HA_VMN
       |               |              |       |           |            |
       |     AS        |              |       |           |            |
       |-------------->|              |       |           |            |
       |               |              |       |           |            |
       |     AA        |              |       |           |            |
       |<--------------|              |       |           |            |
       |               |              |       |           |            |
       |    AReq       |              |       |           |            |
       |-------------->|     AMR      |       |           |            |
       |               |--------------|----- >|           |            |
       |               |              |       |    AMR    |            |
       |               |              |       |---------->|            |
       |               |              |       |           |    AHR     |
       |               |              |       |           |----------->|
       |               |              |       |           |            |
       |               |              |       |           |<-----------|
       |               |              |       |    AMA    |    AHA     |
       |               |              |       |<----------|            |
       |               |     AMA      |       |           |            |
       |    ARep       |<-------------|-------|           |            |
       |<--------------|              |       |           |            |
       |               |              |       |           |            |

       Figure 4. Authentication of a VMN

   Figure 4 illustrates message flows for the AAA procedure when a VMN
   is attached to a NEMO.  As mentioned above, the MR acts as an
   attendant.  Hence, the MR broadcasts AA messages periodically or
   responds to an AS message from the VMN with an AS message.  The VMN
   creates CR using the shared SA with its AAAH server VMN and sends an
   AReq message to the MR.  Then, the MR converts the AReq message into
   a DIAMETER message, AMR, and sends it to the MR's AAAH server AAAH_MR
   through a secured bi-directional tunnel.  When AAAH_MR receives the
   AMR message, it relays the AMR message to AAAH_VMN that has a shared
   SA and requests the AAA procedure for the VMN .  The AAAH_VMN
   authenticates the VMN.  During this steps, the key_home, key_local,
   SP_HOME, and SP_LOCAL are created similarly to the inter-domain AAA
   procedure of the MR.

   While a NEMO is roaming in a foreign network, VMNs within the NEMO do
   not need to know that the NEMO changes its point of attachment.
   Thus, VMNs do not have to register their locations to their HAs when
   the NEMO hands off.  This mobility transparency is the key advantage
   of the NEMO basic support protocol [2].  While keeping the mobility
   transparency, the AAAL server of the foreign network cannot detect
   the existence of VMNs.  Even if the mobility transparency is
   beneficial since it reduces the registration traffic, it makes it



Kwon, et al.            Expires January 12, 2006               [Page 11]

Internet-Draft                AAA for NEMO                     July 2005


   hard for the AAAL server to account the network usages of VMNs.  We
   propose that the AAAL server in the foreign domain be able to account
   the total network usage of the NEMO (not individual VMNs) and then
   this collective accounting information is sent to the MR's AAAH
   server.  Also, the MR's AAAH server maintains the accounting
   information for the MR as well as individual VMNs.  In NEMO basic
   support [2], all packets destined to MNNs are tunneled at the MR's
   HA, so that the MR's HA can keep track of individual LFNs and VMNs.
   We assume that the MR's HA will report this information to the AAAH
   server.  Consequently, the MR's AAAH server can differentiate the
   accounting information for MRs and VMNs.  In addition, we assume that
   the MR's AAAH server and the VMN's AAAH server have a trust
   relationship and a shared SA.  Therefore, the accounting information
   collected at the MR's AAAH server is securely transferred to the
   VMN's AAAH server.

   The mobility transparency causes another problem, which is how to
   authorize VMNs to use the NEMO's network service when the NEMO moves
   to a foreign domain that has a different billing policy.  To solve
   this problem, an MR sends an AA message requesting re-authentication
   of VMNs.  From the AA message, the VMN determines whether it performs
   a new AAA procedure or not.  In this paper, we assume that each
   network domain can have a different policy, so that the VMN performs
   an AAA procedure per inter-domain handoff.


5.  References

   [1]  Ernst, T. and H. Lach, "Network Mobility Support Terminology",
        draft-ietf-nemo-terminology-03 (work in progress),
        February 2005.

   [2]  Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert,
        "Network Mobility (NEMO) Basic Support Protocol", RFC 3963,
        January 2005.

   [3]  Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. Arkko,
        "Diameter Base Protocol", RFC 3588, September 2003.

   [4]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
        IPv6", RFC 3775, June 2004.

   [5]  Franck, F. and C. Perkins, "Diameter Mobile IPv6 Application",
        draft-le-aaa-diameter-mobileipv6-04 (work in progress),
        November 2004.






Kwon, et al.            Expires January 12, 2006               [Page 12]

Internet-Draft                AAA for NEMO                     July 2005


Authors' Addresses

   Taekyoung Kwon
   Seoul National University
   Multimedia and Mobile Communications Lab., Seoul National Univ.
   Shillim-dong, Kwanak-gu
   Seoul  151-744
   Korea

   Phone: +82-2-880-9105
   Fax:   +82-872-2045
   Email: tkkwon@snu.ac.kr
   URI:   http://mmlab.snu.ac.kr/~tk/


   Sungmin baek
   Seoul National University
   Multimedia and Mobile Communications Lab., Seoul National Univ.
   Shillim-dong, Kwanak-gu
   Seoul  151-744
   Korea

   Phone: +82-2-880-9147
   Fax:   +82-872-2045
   Email: smbaek@mmlab.snu.ac.kr
   URI:   http://mmlab.snu.ac.kr/~smbaek/


   Sangheon Pack
   Seoul National University
   Multimedia and Mobile Communications Lab., Seoul National Univ.
   Shillim-dong, Kwanak-gu
   Seoul  151-744
   Korea

   Phone: +82-2-880-1832
   Fax:   +82-872-2045
   Email: shpack@mmlab.snu.ac.kr
   URI:   http://mmlab.snu.ac.kr/~shpack/












Kwon, et al.            Expires January 12, 2006               [Page 13]

Internet-Draft                AAA for NEMO                     July 2005


   Yanghee Choi
   Seoul National University
   Multimedia and Mobile Communications Lab., Seoul National Univ.
   Shillim-dong, Kwanak-gu
   Seoul  151-744
   Korea

   Phone: +82-2-880-7303
   Fax:   +82-872-2045
   Email: yhchoi@snu.ac.kr
   URI:   http://mmlab.snu.ac.kr/~yhchoi/








































Kwon, et al.            Expires January 12, 2006               [Page 14]

Internet-Draft                AAA for NEMO                     July 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Kwon, et al.            Expires January 12, 2006               [Page 15]