Internet DRAFT - draft-lendl-sip-peering-policy
draft-lendl-sip-peering-policy
Network Working Group O. Lendl
Internet-Draft enum.at
Expires: June 25, 2006 December 22, 2005
Publishing SIP Peering Policy
draft-lendl-sip-peering-policy-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on June 25, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
This documents proposes the use of DNS entries to publish a SIP
proxy's policy for accepting incoming calls. Such published policies
can be used to selectively establish peering relationships between
VoIP service providers.
Lendl Expires June 25, 2006 [Page 1]
Internet-Draft SIP Peering Policy December 2005
Table of Contents
1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Requirements . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Federations . . . . . . . . . . . . . . . . . . . . . . . . 6
5. Publication of per-Domain Policies . . . . . . . . . . . . . 7
6. Resource Records . . . . . . . . . . . . . . . . . . . . . . 8
6.1 Federation Membership . . . . . . . . . . . . . . . . . . 8
6.2 Technical Restrictions . . . . . . . . . . . . . . . . . . 9
6.3 Interpretation rules . . . . . . . . . . . . . . . . . . . 10
7. The Big Picture . . . . . . . . . . . . . . . . . . . . . . 11
7.1 Relation to Infrastructure ENUM . . . . . . . . . . . . . 11
7.2 Call Processing Algorithm . . . . . . . . . . . . . . . . 12
7.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . 12
8. Security Considerations . . . . . . . . . . . . . . . . . . 13
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . 14
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 14
11.1 Normative References . . . . . . . . . . . . . . . . . . 14
11.2 Informative References . . . . . . . . . . . . . . . . . 14
Author's Address . . . . . . . . . . . . . . . . . . . . . . 15
Intellectual Property and Copyright Statements . . . . . . . 16
Lendl Expires June 25, 2006 [Page 2]
Internet-Draft SIP Peering Policy December 2005
1. Terminology
This document uses the terminology as defined in
draft-meyer-voipeer-terminology-01.txt [5].
The acronym VSP will stand for "VoIP Service Provider".
FIXME: Nothing in this document requires VSPs to be commercial
service providers, the same principles and algorithms apply to
enterprises and private SIP proxies as well. Depending on the
discussions in the SPEERMINT WG, later revisions of this draft may
thus use the term Internet Telephony Administrative Domain (ITAD)
instead of VSP.
2. Introduction
Open and standard-compliant SIP services on the Internet are per
definition interoperable, hence 'interconnected'. No extra work
needs to be done to route calls between these services as long as the
user is able to enter full SIP URIs. If the user-interface is
restricted (e.g. by using an analogue telephone adaptor in
combination with a 12-key telephone) then ENUM as defined by RFC 3761
[1] can be used to map telephone numbers to SIP URIs.
PSTN replacement services usually use a sequence of digits as the
dial-string and not SIP URIs. These digits can be translated to
E.164 [4] numbers, thus ENUM could be used to interconnect two such
services on a VoIP basis. Due to a variety of technical, political,
and commercial reasons these services often do not assign public SIP
URIs to their customers and do not accept incoming SIP calls from the
Internet. Such services usually use the PSTN as the default network
for voice interconnection.
Interconnecting two VoIP services via the PSTN is wasteful:
o Voice quality is degraded by repeated transcoding.
o Service limitation: IM, presence and video capabilities are lost
during PSTN transit.
o PSTN transit is usually charged by the minute.
The original SIP framework is similar to electronic mail: all SIP
URIs are resolvable via DNS and the associated SIP servers are
reachable via the public Internet. As the model email shows, this is
a powerful and open architecture which does not distinguish between
the servers of a service-provider, an enterprise or a private person.
This model has shown to have several drawbacks as well:
Lendl Expires June 25, 2006 [Page 3]
Internet-Draft SIP Peering Policy December 2005
SPAM
As anybody can send email from any computer connected to the
Internet unwanted communication of questionable motives are a
plague.
Sender Identity
There is no technical protection build into the system which
guarantees the authenticity of sender identity. This is widely
exploited both by email worms, phishing and other frauds.
Right now, there is extensive work being done to combat these
problems of the open email system. These fixes usually work be
restricting the openness of email and by adding cryptographic
signatures to email.
There are some interesting proposals regarding end-to-end
authentication in the SIP context as well:
draft-ietf-sip-identity-06.txt [6] is one example.
The PSTN uses a different mode: carriers trust each other and each
carrier is supposed to authenticate and police its own customers.
As VoIP services are starting to build interconnections they are
trying to avoid the pitfalls of a completely open interconnection
regime. Implementing User ENUM as described in RFC 3761 is a binary
choice: Either you publish the SIP URIs and operate an open SIP
server or you don't. There is no middle ground where a service-
provider can announce that he is willing to accept some incoming
calls via SIP but will reject others. The protocol described in this
document is designed to publish such policy choices in an
interoperable fashion by means of the DNS.
Over the last years, a number of companies have established SIP
peering fabrics based on either private ENUM trees or SIP redirect
proxies. These services solve the problem of interconnection between
members but have scaling issues when a VSP wants to participate in
more than one of such services.
There is thus a need to introduce a generic approach to these ad-hoc
peering solutions. The main aim needs to be to avoid a sequential
trying of peering fabrics. Instead, a simple query needs to suffice
to tell the originating network whether peering is possible and which
peering framework it can use to route a call.
Lendl Expires June 25, 2006 [Page 4]
Internet-Draft SIP Peering Policy December 2005
3. Requirements
A system for selective VoIP interconnection needs to fulfill the
following requirements:
Unified solution for all peering policies
The method shall be extensible to cover existing and future
peering policies. These start by a closed system which accepts
only incoming calls from selected peers (i.e. a set of bilateral
peerings) and include the model of membership in a number of
peering fabrics or carrier clubs. The case of an open SIP proxy
should be covered as a special case as well.
Domain Based
Although the initial call routing may be based on E.164 numbers a
generic peering method should not rely on numbers but rather on
URIs. We assume that all SIP URIs with the same domain-part share
the same set of peering policies, thus the domain of the SIP URI
may be used as the primary key to any information regarding the
reachability of that SIP URI.
No blocked calls
An originating VSP shall be able to determine whether a SIP URI is
open for direct interconnection without actually sending a SIP
INVITE. This is important as unsuccessful call attempts are
highly undesirable as they can introduce high delays due to
timeouts and can act as an unintended denial of service attack.
(e.g. by repeated TLS handshakes)
Scaling
The maintenance of the system needs to scale beyond simple lists
of peering partners. It needs to incorporate aggregation
mechanisms to avoid scaling with O(n*n), where n is the number of
participating VoIP services. Per-VSP opt-in without consultation
of a centralized 'peering registry', but rather by publishing
local configuration choices only is highly desirable. The
distributed management of DNS is a good example for the
scalability of this approach.
Independence of lower layers
The system needs to be independent of details on what technologies
are used route the call and which are used to ensure that only
approved peering partner actually connect to the destination SIP
Lendl Expires June 25, 2006 [Page 5]
Internet-Draft SIP Peering Policy December 2005
proxy. It should not matter whether restrictions are implemented
by private L3 connectivity ("walled gardens"), firewalls, TLS
policies or SIP proxy configuration.
Administrative and technical policies
The reasons for declining vs. accepting incoming calls from a
prospective peering partner can be both administrative
(contractual, legal, commercial, or business decisions) and
technical (certain QoS parameters, TLS keys, domainkeys, ...).
The method should accommodate all conceivable policies.
Minimal additional cost on call initiation
Since each call setup implies execution of the proposed algorithm
it should incur minimal overhead and delay, and employ caching
wherever possible to avoid extra protocol roundtrips.
Look beyond SIP
The problem of selective peering is not limited to SIP-based
communication. Other protocols may benefit from a generic
framework as well, such as SMTP mail. The proposed system thus
should be generic enough to encompass other protocols as well.
4. Federations
The proposed method is based upon the concept of a "Federation". A
federation in this context is defined as follows:
A Federation is a group of VoIP service providers which
* agree to receive calls from each other via SIP,
* agree on a set of administrative rules for such calls
(settlement, abuse-handling, ...), and
* agree on specific rules for the technical details of the
interconnection.
This document does not define what these rules can be and how they
are communicated to all members of a federation. There is no
requirement to make those rules public.
Federations shall use fully qualified domain names as their
identifiers.
All SIP service providers are assumed to be a member of a federation
with the same name as their domain.
Lendl Expires June 25, 2006 [Page 6]
Internet-Draft SIP Peering Policy December 2005
The federation named "." (just a dot, the empty domain) stands for
the public Internet. A SIP service provider who announces his
membership in "." will accept calls as defined in the generic SIP
standard documents.
FIXME: Or perhaps use URIs as in XML name-spaces instead of domains.
Examples:
o A set of VoIP service providers form an association and agree to
accept calls from each other via the public Internet as long as
the SIP call uses TCP/TLS as transport protocol and presents a
X.509 cert which was signed by the association's own CA.
o A set of VoIP service providers build a L3 network dedicated to
VoIP peering ("walled garden", similar to the 3GPP GRX network).
They agree to accept calls from all participants in that network
and bill each other via a clearinghouse.
o A set of VoIP service providers agree to accept calls originating
from within the same country. They use a set of firewall rules to
block calls from abroad.
o Peering fabric based on SIP: A company sets up a SIP proxy which
acts as a forwarding proxy between the SIP proxies of all
participating VSPs. The group of these VSP form a federation
whose technical rules state that calls have to be routed via that
central proxy.
5. Publication of per-Domain Policies
The domain part of the destination SIP URI is the natural key for the
peering policy of the SIP proxy serving that domain. It is thus a
sensible choice to publish the policy for incoming calls towards a
SIP URI in the DNS zone of its domain.
There are two types of policies a VSP may advertise:
o A list of federations which this domain belongs to.
Federations are identified by domain names thus this is a list of
domains.
If a VSP announces its membership in a federation, it declares
that it will accept calls originating from all other members of
that federation. There is no need to announce technical details,
as members of that federation already are assumed to know how to
talk to each other.
Lendl Expires June 25, 2006 [Page 7]
Internet-Draft SIP Peering Policy December 2005
o Technical requirements for contacting the SIP proxy serving this
domain.
This is similar to RFC 3263 [3], but with an important
distinction: The premise of RFC 3263 is universal connectivity
between SIP services. In that context, the aim is to select the
best transport protocol for SIP and determine the correct IP
address and port. The aim here is different: universal
connectivity is NOT assumed, rather the protocol is used to
determine whether a connection is possible in the first place.
There are no defaults to fall back to.
Publishing technical requirements are a way of expressing "I don't
usually accept calls from the Internet, but if you can do X or (Y
and Z) then I'll accept your calls.". Such policy announcements
are independent of any federation rules: they cannot be used to
alter the technical rules of a federation.
6. Resource Records
FIXME: the RRs described are here to illustrate the basic idea.
Suggestions on the format are explicitly welcome.
SIP proxies following the optional parts of RFC 3263 already query
for NAPTR records in the destinations domain. Adding SIP peering
policy information in NAPTRs increases the size of the DNS response
but does not incur an extra network roundtrip.
To accomodate these larger DNS responses is it recommended that these
lookups utilize EDNS0 to avoid fallbacks to TCP queries. FIXME: make
EDNS0 mandatory as in [8]?
6.1 Federation Membership
The following NAPTR records indicate federation memberships of the
SIP proxy serving this domain:
Lendl Expires June 25, 2006 [Page 8]
Internet-Draft SIP Peering Policy December 2005
; order pref flags service regexp replacement
IN NAPTR 10 50 "p" "D2F+SIP" "" voip.vix.at.
IN NAPTR 20 50 "p" "D2F+SIP" "" voip.example.com.
;
; Interpretation:
;
; This VSP prefers calls under the rule of voip.vix.at but
; will also accept calls from other members of the
; voip.example.com federation.
;
; Calls from the public Internet will not be accepted.
;
Figure 1
o FIXME formal spec.
o FIXME flags? 'p' for "policy"
o FIXME service? D2F stands for "domain to federation". If we use
URIs as namespace, then "D2U+FED:SIP" could be possible.
o FIXME do we want more than one federation in one NAPTR, e.g.
"voip.vix.at+xconnect.com" to save space in he NS answer? In that
case we need to use the regexp field and not the replacement.
o FIXME if we use URIs for federation Ids, then they move into the
regexp as well.
The order/preference fields are used to indicate a preference under
which federation's rules it prefers to receive the call.
6.2 Technical Restrictions
RFC 3261 mandates support for TCP, TLS and UDP in all SIP proxies.
RFC 3263 builds on that. Quote:
If a SIP proxy, redirect server, or registrar is to be contacted
through the lookup of NAPTR records, there MUST be at least three
records - one with a "SIP+D2T" service field, one with a "SIP+D2U"
service field, and one with a "SIPS+D2T" service field.
This "MUST" needs to be reconsidered in this context, as it forces
VSP to accept calls over unsecured SIP transports.
Parts of the technical policies (e.g. "we accept only calls via TCP/
TLS") can be expressed with the means of RFC 3263, others (e.g.
"domainkeys are required", "sip-indentity-signatures required")
cannot.
FIXME There needs to be a consensus on how to express which
algorithms are required. This name-space needs to be defined and
administered. (IANA? URNs like in XML-DSIG?)
Lendl Expires June 25, 2006 [Page 9]
Internet-Draft SIP Peering Policy December 2005
The syntax must be expressive enough to say ((ALG1 and ALG2) or (ALG3
and ALG4)).
Proposed syntax:
; order pref flags service regexp replacement
IN NAPTR 10 50 "p" "D2P+SIP" "!.*!urn:ietf:sip:identity!" .
IN NAPTR 10 51 "p" "D2P+SIP" "!.*!urn:ietf:sip:calist:THAWTE+FREECA!" .
IN NAPTR 20 50 "p" "D2P+SIP" "!.*!urn:ietf:sip:domainkeys!" .
IN NAPTR 20 51 "p" "D2P+SIP" "!.*!urn:ietf:sip:TLS!" .
;
; Interpretation:
;
; This VSP will accept calls from the public Internet if
; the request is signed according to SIP-Identity using certs
; signed by THAWTE or FREECA.
;
; Alternatively,
;
; calls arriving via TLS and signed with domainskeys are
; accepted as well.
;
Figure 2
o FIXME formal spec.
o FIXME flags? Still 'p' for policy?
o FIXME service? D2P stands for "domain to policy". As we use URNs
as namespace, things like "D2U+POLICY:SIP" could be possible.
o FIXME RFC 3263 uses "SIP+D2U", "SIP+D2T" and "SIP+D2S". ENUM uses
the service in a reverse way, e.g. "E2U+sip" or "E2U+H323". Do
we go with the ENUM example or the RFC3263 precedent?
6.3 Interpretation rules
o If no NAPTR records as defined by this document are found in the
target domain, then the normal rules according to RFC 3263 apply.
o If a domain announces its memberships in the special federation
"." then it will accept calls under the RFC 3263 regime.
o If a domain announces membership in multiple federations, then it
will accept calls according to the rules of each federations. If
a VSP participates in one or several private peering fabrics and
accepts calls from the public internet as well, then it needs to
announce membership in those federations and in ".".
o For the purpose of the call routing algorithm, technical
restrictions can be regarded as ad-hoc federation definitions.
All entries with the same priority field taken together act as the
definition of a federation which uses the public Internet as the
Lendl Expires June 25, 2006 [Page 10]
Internet-Draft SIP Peering Policy December 2005
Layer 3 network and where SIP proxies conform to these
restrictions.
o If technical restrictions and federation memberships are
announced, then an originating VSP can use either the federation's
rules or the public Internet with the appropriate protocols to
make the call.
o RRs for technical restrictions cannot be used to modify the rules
of a federation.
7. The Big Picture
7.1 Relation to Infrastructure ENUM
Private VoIP interconnection fabrics as they are in operation right
now do a good job of facilitating the peering if the originating VSP
selects the right fabric for each call. As long a VSP only
participates in two or three such fabrics sequential trying of these
fabrics may be feasible. The delays caused by unsuccessful dips add
up and a disruption of any one such service can impact the overall
call processing times. Parallel querying of all peering systems is
an option to cope with multiple peering system, but this does
increase the complexity of the call processing.
Each peering dip into any fabric's routing logic answers the
following questions:
1. Is the destination reachable via SIP in the context of this
fabric?
2. What call setup method and parameters should I use? (e.g. use
TLS? Which cert to present? Route the call via a special SBC?
Do some L3 magic to ensure QoS?)
There is reason to assume that the proliferation of VoIP peering
points will be similar to that of layer 3 peering points. A larger
VSP might thus be participating in a significant number of such
fabrics.
If we split up the dip from above into
1. Is the destination reachable via SIP at all?
2. Will the destination network accept calls from me?
3. What call setup method and parameters should I use?
then the first two can be be implemented with a public lookup which
is unified over all peering fabrics. Infrastructure ENUM will take
care of the first point. This document defines a solution for the
Lendl Expires June 25, 2006 [Page 11]
Internet-Draft SIP Peering Policy December 2005
second.
The third item can well be implemented in a propriety and private
fashion.
7.2 Call Processing Algorithm
E.164 Based calling:
1. Collect the dial-string from user
2. Apply the dial-plan to get an E.164 number
3. Use ENUM to map the number to a SIP URI (perhaps using
draft-haberler-carrier-enum-01 [7])
4. Query for NAPTR records in the domain of the SIP URI
5. If neither "D2F+SIP" nor "D2P+SIP" entries are found, then the
destination proxy does not support policy announcements as
defined by this document. Route the call according to RFC 3263
(i.e. query for SRV, then A records).
6. Group all "D2P+SIP" entries by the order field. Create a list
containing these groups, a "D2F+SIP" entry with the
destination's domain and order 0, and all "D2F+SIP" entries from
the DNS. Sort this list according to the order field.
7. Loop over this sorted list (lowest order first). For each entry
try:
8. If the entry is of type "D2F+SIP", check if the federation of
this record is in the the originating SIP service provider's own
list of federations (which includes "." if the originating VSP
chooses to do termination to open SIP proxies). If yes, try to
complete the call according to the well-known rules of that
federation. If for some reason this does not work as
advertised, continue with the algorithm.
9. If the entry is a group of "D2P+SIP" records, check if all
technical restrictions can be met. If yes, place the call using
that specifications. Once again, if this does not work as
advertised, continue with the algorithm.
10. [end of loop]
11. If no usable entries have been found, then this call cannot be
routed via SIP.
URI based calls start with step 4.
7.3 Examples
In all the following examples, a private peering arangement between
the calling and the called VSP takes precedence over all other
options.
Lendl Expires June 25, 2006 [Page 12]
Internet-Draft SIP Peering Policy December 2005
One federation
$ORIGIN example.com
; order pref flags service regexp replacement
IN NAPTR 10 50 "p" "D2F+SIP" "" voip.vix.at.
IN NAPTR 20 50 "p" "D2F+SIP" "" .
;
In this case, example.com announces that it prefers calls via the
"voip.vix.at" framework, but is also willing to accept calls from
the Internet.
Federations and technical restrictions
; order pref flags service regexp replacement
IN NAPTR 10 50 "p" "D2F+SIP" "" voip.vix.at.
IN NAPTR 20 50 "p" "D2P+SIP" "!.*!urn:ietf:sip:domainkeys!" .
;
In order to contact the SIP proxy for example.com, the originating
SIP proxy must either use the "voip.vix.at" framework (preferred)
or use a domainkeys-signed request over the public Internet.
Federations and complex technical restrictions
; order pref flags service regexp replacement
IN NAPTR 10 50 "p" "D2F+SIP" "" voip.vix.at.
IN NAPTR 20 50 "p" "D2P+SIP" "!.*!urn:ietf:sip:TLS!" .
IN NAPTR 20 51 "p" "D2P+SIP" "!.*!urn:ietf:sip:calist:THAWTE!" .
IN NAPTR 30 50 "p" "D2F+SIP" "" voip-exchange.example.org.
;
In this example, the sending VSP has the following options:
1. Use the rules of "voip.vix.at" (preferred).
2. Connect via the public Internet using TLS with a cert signed
by THAWTE.
3. Use the rules of "voip-exchange.example.org".
8. Security Considerations
The NAPTRs proposed here publish information which is not public if
VSP just rely on private interconnection agreements. These records
are similar to the public routing registries for BGP4 as maintained
by the RIRs. They are just records indicating who peers with whom
but do not hold details on how the interconnection is achieved.
Lendl Expires June 25, 2006 [Page 13]
Internet-Draft SIP Peering Policy December 2005
The published technical requirements for incoming calls could be used
by malicious callers to find possible attack vectors. This should be
a non-issue for all VSP who do not rely on security-by-obscurity.
The publishing of the peering policy via the DNS RR described in this
draft will reduce the number of unwanted calls, as all well-meaning
VSP will follow them, but these records cannot substitute measures to
actually enforce the published peering policy.
9. IANA Considerations
FIXME: This document defines an IANA registry for the technical
restrictions fields.
FIXME: This document registers the protocol fields XXXX in NAPTRs.
10. Acknowledgements
The author would like to thank Michael Haberler, Alexander Mayrhofer,
Richard Stastny, and John Todd for their contributions.
11. References
11.1 Normative References
[1] Faltstrom, P. and M. Mealling, "The E.164 to Uniform Resource
Identifiers (URI) Dynamic Delegation Discovery System (DDDS)
Application (ENUM)", RFC 3761, April 2004.
[2] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
Session Initiation Protocol", RFC 3261, June 2002.
[3] Rosenberg, J. and H. Schulzrinne, "Session Initiation Protocol
(SIP): Locating SIP Servers", RFC 3263, June 2002.
11.2 Informative References
[4] ITU-T, "The international public telecommunication numbering
plan", Recommendation E.164, May 1997.
[5] Meyer, D., "Terminology for Describing VoIP Peering and
Interconnect", draft-meyer-voipeer-terminology-01 (work in
progress), October 2005.
[6] Peterson, J. and C. Jennings, "Enhancements for Authenticated
Identity Management in the Session Initiation Protocol (SIP)",
draft-ietf-sip-identity-06 (work in progress), October 2005.
Lendl Expires June 25, 2006 [Page 14]
Internet-Draft SIP Peering Policy December 2005
[7] Haberler, M. and R. Stastny, "Combined User and Carrier ENUM in
the e164.arpa tree", draft-haberler-carrier-enum-01 (work in
progress), October 2005.
[8] Conroy, L. and J. Reid, "ENUM Requirement for EDNS0 Support",
draft-conroy-enum-edns0-01 (work in progress), October 2005.
Author's Address
Otmar Lendl
enum.at GmbH
Karlsplatz 1/9
Wien A-1010
Austria
Phone: +43 1 5056416 33
Email: otmar.lendl@enum.at
URI: http://www.enum.at/
Lendl Expires June 25, 2006 [Page 15]
Internet-Draft SIP Peering Policy December 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Lendl Expires June 25, 2006 [Page 16]