Internet DRAFT - draft-martin-nsis-nslp-natfw-security
draft-martin-nsis-nslp-natfw-security
NSIS Working Group M. Martin
Internet-Draft M. Brunner
Expires: April 19, 2004 M. Stiemerling
NEC
C. Aoun
Nortel Networks
October 20, 2003
A NAT/Firewall NSLP security infrastructure
draft-martin-nsis-nslp-security-00
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at http://
www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 19, 2004.
Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved.
Abstract
This document proposes a security infrastructure for the NAT/FW
traversal NSLP of the NSIS protocol. We begin with a description of
the problem, followed by the proposed solution, based on public key
infrastructure. The document finally deals with examples that
clarify the proposed methods.
Martin, et al. Expires April 19, 2004 [Page 1]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Problems to solve . . . . . . . . . . . . . . . . . . . . . . 4
3. Solution requirements . . . . . . . . . . . . . . . . . . . . 5
4. Digital signatures: generic pros and cons . . . . . . . . . . 6
4.1 Public key deployment . . . . . . . . . . . . . . . . . . . . 6
4.2 Computational cost . . . . . . . . . . . . . . . . . . . . . . 6
4.3 Incurred overhead . . . . . . . . . . . . . . . . . . . . . . 7
5. Digital signatures on an NSIS scenario . . . . . . . . . . . . 8
5.1 Public key deployment. Known peers . . . . . . . . . . . . . . 8
5.2 Messages changing en route . . . . . . . . . . . . . . . . . . 8
6. Proposed solution . . . . . . . . . . . . . . . . . . . . . . 10
6.1 Implementation of digital signatures in the NAT/FW NSLP . . . 11
7. Solution examples . . . . . . . . . . . . . . . . . . . . . . 13
7.1 Network with firewalls . . . . . . . . . . . . . . . . . . . . 13
7.2 Network with NATs . . . . . . . . . . . . . . . . . . . . . . 14
7.3 Networks with several Middle boxes . . . . . . . . . . . . . . 15
7.4 Middle boxes on foreign networks . . . . . . . . . . . . . . . 15
8. Optional extensions . . . . . . . . . . . . . . . . . . . . . 17
9. Security Considerations . . . . . . . . . . . . . . . . . . . 18
10. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 19
11. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 20
Normative References . . . . . . . . . . . . . . . . . . . . . 21
Informative References . . . . . . . . . . . . . . . . . . . . 22
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 22
A. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 24
Intellectual Property and Copyright Statements . . . . . . . . 25
Martin, et al. Expires April 19, 2004 [Page 2]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
1. Introduction
The NAT/Firewall traversal NSLP for the NSIS protocol is a highly
sensitive service. Because of its functionality, it can potentially
open paths to networks otherwise protected by NAT/FW infrastructures.
It also has the potential to render NAT/FW infrastructures
inoperative, closing paths or exhausting the resources of the
involved boxes.
For this reason, a tight security scheme has to be devised, to allow
both fine and coarse access control. This draft aims at solving this
problem by using cryptographic digital signatures to authenticate the
peers. Decisions on whether to allow access or not are based on the
authenticity of the requesting peer and the security policy
configured in the box.
Martin, et al. Expires April 19, 2004 [Page 3]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
2. Problems to solve
The NAT/FW traversal NSLP provides the following security sensitive
services:
1. Firewall traversal: override specifically set access rules, and
allow data transfer through firewall devices, both from the
inside out and the outside in.
2. NAT traversal: reach machines in a private network, which were
not meant to be accessible from the outside without specific
setups.
3. Resource allocation: Install packet filters and NAT bindings on a
machine that can only allocate a certain number of them.
Misuse of these services can compromise the network and even render
it inoperable. The NSIS-Threats document [1] shows a number of ways
in which such services can be exploited
Martin, et al. Expires April 19, 2004 [Page 4]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
3. Solution requirements
Given the problems and its exploit possibilities, our solution will
have to cover the following requirements:
1. Nodes must be able to verify the authenticity of the requests
2. Message integrity has to be warranted
3. Nodes must have the last word in deciding whether they accept a
session or not
The requirements listed can only be met by cryptographic methods,
namely, digital signatures. Through its use, nodes could be sure of
who is making a request, and what request it is, and match it with an
access list, or any other more complex decision mechanism.
This approach provides great flexibility, as the decision process can
be arbitrarily complex, and based on trustful data. For instance, we
might want to authorize certain identities, or allow for only a
number of connections per id to be accepted. More open systems with
full access would have a chance to black list users.
Martin, et al. Expires April 19, 2004 [Page 5]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
4. Digital signatures: generic pros and cons
Digital signatures provide a secure way of transmitting messages:
they proof that the author is who he says he is, and that what he is
saying has not been altered. In other words, authentication and
integrity, both strictly necessary if a node has to take security
sensitive actions.
No other mechanism nowadays provides all the functionalities of
public key cryptography, and thus this becomes a perfect candidate to
provide security on the NAT/FW NSLP.
This, of course, comes at a cost; We will face three main problems:
o Signature verification requires the public key of the sender.
This key has to be known and trusted before a signature can be
validated safely.
o Public key cryptography has a high computational cost, in
comparison to other cryptography algorithms and authentication
systems
o Introducing signatures on a message implies a certain overhead
4.1 Public key deployment
The NAT/FW NSLP is expected to enable connections between peers that
don't necessarily know each other. This of course, collides with the
necessity of knowing the public key of the sender to verify it's
signatures.
Later in this document (Section 6.1) we try to analyze what nodes are
likely to know each other, and where we can expect the public keys to
have been securely exchanged.
On the other hand, the necessity of cyphered, authenticated and non
tampered communications seems to set a trend towards proper public
key infrastructure deployments. Nowadays, though, no such public
global infrastructure exists.
4.2 Computational cost
Commonly available public key cryptography provides rather fast
algorithms, with verification/signature times around the 13.0/6.8
milliseconds on 450MHz UltraSPARC II processor [4].
This should not be an excessive load when considering a running
Martin, et al. Expires April 19, 2004 [Page 6]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
server, but is of special relevance when facing Denial of Service
attacks. In this case, the longer it takes to process a request
(even if only to reject it), the easier it is to overload the machine
into uselessness. Performance analysis should be undertaken to
evaluate these risks. We must consider, though, that authentication
and integrity will require some form of cryptography, and that will
require a certain degree of computational power.
4.3 Incurred overhead
Digital signatures, using the DSA algorithm, have a length of about
320 bits, and even shorter algorithms exist [5]
The NSLP packet payload proposed in [6] has a size of 23 bytes.
Adding a signature of 40 bytes implies a 200% packet length increase.
For this reason, we must carefully choose the kind of signature we
use, to minimize the introduced overhead.
Martin, et al. Expires April 19, 2004 [Page 7]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
5. Digital signatures on an NSIS scenario
We have seen the values and the problems involved in digital
signatures. In this section we will particularize it to the
scenarios we will face in an NSIS NAT/FW NSLP.
5.1 Public key deployment. Known peers
If we intend to use digital signatures, we must first inquire on the
availability of the public keys. Middle boxes will have a very
limited number of them available, due to the difficulty of publishing
them securely.
Neighbouring peers can not be assumed to have their public keys
exchanged. The reason is that, even though, a middle box has a very
limited number of one-hop neighbours, it is NSIS NAT/FW NSLP aware
neighbours that we are concerned about. As a first approach, we must
consider that the border middle boxes of each network on the internet
have each other as potential one-nsis-hop peers. This keeps us from
using simpler methods, (may be even not based on public key
cryptography), and forces us to carefully decide whether border
middle boxes will ever know each other, as this is basic for the
solution design.
5.2 Messages changing en route
Let us assume a create message, as defined in [6]. It contains a
source address for the pinhole specification. Let us now suppose it
goes through a NAT. Ideally, an external address and port will be
reserved, and the create message will be modified accordingly.
This step, necessary for the basic protocol functionality, also means
that any previous packet signature will be broken, since the message
changes.
Specifically, the source or target address can change when traversing
a NAT, as shown in Figure 1:
Martin, et al. Expires April 19, 2004 [Page 8]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
+------+ +------+
| NAT1 |-------------------------------| NAT2 |
+------+ +------+
| |
+------+ +------+
| DS | | DR |
+------+ +------+
DS: Data Sender
DR: Data Receiver
Figure 1: Message alterations when traversing NATs
When a create message from DS to DR traverses NAT1, the pinhole
source address must change, since the potential data packets that
will use the pinhole, will appear to come from the NAT1 external
address.
Similarly, when the create packet reaches NAT2, it matches a
reservation, and redirects it to DR. Any other boxes between NAT2
and DR would see the potential data packets as heading towards DR and
not NAT2 any more; for this reason, the destination address of the
pinhole in the create message has to be altered accordingly.
This basically means we will not be able to protect the source and
destination addresses in the NAT/FW NSLP messages, since they change
on the way. Because of that, other mechanisms will have to be
devised, as we will see in Section 6.1
Martin, et al. Expires April 19, 2004 [Page 9]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
6. Proposed solution
At this point, we are left with the necessity of digital signatures,
but also with several restrictions:
o Too many signatures involve excessive overhead, computational
cost, etc..
o We have to consider signature validity, be it because the message
changed, or because the public key is not available
If we manage to use them properly, we will be able to provide
authentication and integrity. But we are also interested in
authorization. The step from authenticating to authorizing is often
policy based. It is then reasonable to assume an arbitrarily complex
decision engine to issue verdicts based on the data we can provide
it.
Note then, that whether an NSIS NAT/FW NSLP request is honored or
not, will depend on the decision engine, which, may or may not take
into consideration the authentication information we provide it. A
first approach to this engine is given in Figure 2.
Session ID ---\
Verified (yes/no) ----\ +----------+ /-- Honored
\ | | /
Pinhole source ------>--| Decision |---<----- Remembered
Verified (yes/no) ------>--| Engine | \
/ | | \-- Rejected
Pinhole destination ----/ +----------+
Verified (yes/no) ---/
Figure 2: The decision engine interface
Based on the Session ID and pinhole specification, and whether that
data has is trustworthy because it has been verified with a known
signature, the decision engine decides from three options:
o Honored: The request is accepted, and the required rules installed
o Remembered: The request is not trusted, and thus not installed,
but is kept awaiting for a certain time, expecting later
validations.
Martin, et al. Expires April 19, 2004 [Page 10]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
o Rejected: The petition is ignored completely
Note that if the decision engine returns a reject, the communication
will not be possible at all.
Possible policies on the decision engines are:
o The basic one: authorize certain sources or destinations to use
certain pinholes
o Allow a certain request rate or amount and deny the rest. For
instance, the node next to an ISP, will allow as many connections
as the ISP contracts
o Allow requests for internal IP's, independently of their
signatures
o Allow all but perform accounting operations
We are now left with the problem of using digital signatures wisely
to provide adequate input to the Decision Engine
6.1 Implementation of digital signatures in the NAT/FW NSLP
What and where we sign is greatly related to trust relationships
between middle boxes. A detailed description of the different kinds
of trust can be found in [1]. In our approach, we expect end to end
trust, and hope for peer to peer trust in some of the hops.
For end to end trust, we will have DS sign the Session ID and include
it in the object. For peer to peer, we will sign the whole object on
each hop. In other words, the object will include:
1. Session ID signature: Session ID signed by DS except for Path
Succeeded messages, where it is signed by the previous hop on the
return path.
2. Previous hop signature: Pinhole source and destination (if
applicable), Session ID and Session ID signed by DS, plus other
objects, all of it signed by the previous hop
The first signature will be added by the NSLP. The second one,
though, since it refers to the whole packet , might be implemented on
the transport layer (NTLP). In the case that the NTLP didn't include
this service, it could be pushed up on the NSLP.
Note that the specific syntax and algorithms used to sign the
messages are not specified here. A standardized flexible option such
Martin, et al. Expires April 19, 2004 [Page 11]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
as CMS [2] could be used, but might be too cumbersome. A simple DSA
signature might suffice.
We recommend looking at the examples in Section 7 for detailed
working flows that help understand this specific use of digital
signatures.
Martin, et al. Expires April 19, 2004 [Page 12]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
7. Solution examples
7.1 Network with firewalls
In this basic network, we have two hosts, on their respective
networks, each behind a firewall that needs to be signaled for the
path to be open. The FW1 belongs to DS's network, and FW2 belongs to
DR's, as the hierarchical structure suggests in Figure 3
+-----+ +-----+
| FW1 |-------------------------------| FW2 |
+-----+ +-----+
| |
+-----+ +-----+
| DS | | DR |
+-----+ +-----+
FW: Firewall
DS: Data Sender
DR: Data Receiver
Figure 3: Firewall network
When the signaling begins, DS sends a create message to FW1. We
expect FW to honour the request for one of these reasons:
o It allows end hosts inside it's network to open pinholes (perhaps
only a given range)
o It knows DS's public key and thus verifies the request using the
previous hop signature, and it's policies allow this transaction
FW2 gets the forwarded packet, but is not likely to honor it, because
it probably does not know FW1's public key, and can not validate it's
origin. We expect it to remember the rule and forward the NSIS
packet.
DR gets it next. It does know DS, and can verify the Session ID
signature. It can also verify the target address, because it is
itself, and it is expecting this signaling (probably because of some
other application layer communication
DR replies then with a Path Succeeded message, that includes the
Session ID signature signed by DR.
Martin, et al. Expires April 19, 2004 [Page 13]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
This message gets to FW2, who does know DR, and so verifies the
Session ID signature. That verifies for him the destination of the
pinhole, and the Session ID, which it was remembering. It is
re-entered into the decision engine, which this time, honours the
request.
It then gets to FW1 which already honoured that Session ID, and to
DS, who starts data transfer on the newly created pinhole path
Note that in this example, the message does not change en route, but
this is only true because there are no NATs on the data path. Note
also that DR and FW2 can not verify the source address. This is a
weakness indeed, but it is not of extreme importance, since any
malicious node that is able to change the nsis packet source address,
is also capable of dropping the data packets afterwards.
7.2 Network with NATs
This network is analogous to the example Section 7.1 but has NATs
instead of firewalls, as shown in Figure 4.
+------+ +------+
| NAT1 |-------------------------------| NAT2 |
+------+ +------+
| |
+-----+ +-----+
| DS | | DR |
+-----+ +-----+
DS: Data Sender
DR: Data Receiver
Figure 4: NAT network
Note how exactly the same signaling (security wise) as in the
previous example would also work here. That is meant to be so,
because DS and DR do not need to know the topology of the data path.
We can see though, how the pinhole source changes after NAT1, and the
pinhole destination changes after NAT2, which means we can not sign
the whole packet at DS, for instance.
From now on, we will refer to the nodes as middle boxes, since, in
what concerns security, there is no change in how we deal with them.
Martin, et al. Expires April 19, 2004 [Page 14]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
7.3 Networks with several Middle boxes
We now increase complexity to show the signaling through more than
one middle box per network, as shown in Figure 5.
+-----+ +-----+
| MB2 |-----------------------------------| MB3 |
+-----+ +-----+
| |
+-----+ +-----+
| MB1 | | MB4 |
+-----+ +-----+
| |
+-----+ +-----+
| DS | | DR |
+-----+ +-----+
MB: Middle box (NAT or Firewall or a combination)
DS: Data Sender
DR: Data Receiver
Figure 5: Several middle boxes per network
DS sends a create message, which is honored by MB1, for the same
reasons as in Section 7.1. We expect MB2 to accept it as well,
because it knows MB1 (peer to peer trust) and the policy allows it.
MB3 and MB4, again as in Section 7.1 will remember the rule, but not
install it. When DR gets it and validates it, MB4 will honor the
request, and will sign the session ID itself. This is what makes MB3
trust the request and honor it.
Again, notice how we can not protect the source address.
7.4 Middle boxes on foreign networks
We now face the problem of middle boxes somewhere on the Internet,
that do not belong to DS's or DR's network, as shown inFigure 6.
Martin, et al. Expires April 19, 2004 [Page 15]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
+-----+ +------+ +-----+
| MB1 |-------------| MB 2 |--------------| MB3 |
+-----+ +------+ +-----+
| |
+-----+ +-----+
| DS | | DR |
+-----+ +-----+
MB: Middle box (NAT or Firewall or a combination)
DS: Data Sender
DR: Data Receiver
Figure 6: Middle boxes on the Internet
This scenario is rather rare, and presents the problem that MB2 is
unlikely to have a peer to peer trust relationship with any of the
other middle boxes. In this case, either the decision engine has a
rather loose policy that accepts unverified requests, or the
communication does not succeed.
Martin, et al. Expires April 19, 2004 [Page 16]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
8. Optional extensions
The proposed combination of signatures and handling is expected to
provide authorization in most of the cases. There is a special case
which might provide an extra level of security by securely
establishing the source of the pinhole in DS's network. This is
achieved by adding an extra signature in the NSLP, next to the
Session ID signature. The data to be signed is the Session ID and
the source of the pinhole. It is to be signed by DS or the last nat
to have modified the source address.
The relevant scenario is shown on Figure 7:
+-----+ +-----+
| FW1 |-----------------------------------| MB2 |
+-----+ +-----+
| |
+-----+ +-----+
| DS | | DR |
+-----+ +-----+
MB: Middle box (NAT or Firewall or a combination)
DS: Data Sender
DR: Data Receiver
Figure 7: End to middle authorization
Assume that MB2 does not know FW1, but it does know DS. Such a case
would be that of a company (MB2) allowing it's employees working
abroad to install pinholes even if connecting through an ISP (which
runs a firewall, FW1). The special signature we added would allow
MB2 to authenticate DS as the source. Something that FW1 could not
do, because it is not known byMB2.
This would be a case of end to middle trust.
Martin, et al. Expires April 19, 2004 [Page 17]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
9. Security Considerations
This entire memo discusses the security implications of using an NSIS
NAT/FW NSLP.
Martin, et al. Expires April 19, 2004 [Page 18]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
10. Conclusions
The proposed method provides a reasonable way to decide wheter to
honor or not NSIS NAT/FW NSLP requests. Peer to peer trust is
expected within the network, and a certain degree of flexibility is
also expected in the pinhole source.
Further field research is required to determine if we are actually
covering most of the real life scenarios.
Martin, et al. Expires April 19, 2004 [Page 19]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
11. Contributors
We would like to acknowledge the excellent contributions of Hannes
Tschofenig to this draft.
Martin, et al. Expires April 19, 2004 [Page 20]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
Normative References
[1] Tschofenig, H. and D. Kroeselberg, "Security Threats for NSIS",
DRAFT draft-ietf-nsis-threats-01.txt, January 2003.
[2] Housley, R., "Cryptographic Message Syntax (CMS)", RFC 3369,
August 2002.
Martin, et al. Expires April 19, 2004 [Page 21]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
Informative References
[3] Tschofenig, H., Buechli, M., Van den Bosch, S. and H.
Schulzrinne, "NSIS Authentication, Authorization and Accounting
Issues", draft-tschofenig-nsis-aaa-issues-01 (work in progress),
March 2003.
[4] Gupta, V., Gupta, S. and S. Chang, "Performance analysis of
Elliptic Curve Cryptography for SSL", September 2002.
[5] Boneh, D., Lynn, B. and H. Schacham, "Short Signatures from the
Weil Pairing", 2001.
[6] Stiemerling, M., Tschofenig, H., Martin, M. and C. Aoun, "A NAT/
Firewall NSIS Signaling Layer Protocol (NSLP)", DRAFT
draft-ietf-nsis-nslp-natfw-00.txt, October 2003.
Authors' Addresses
Miquel Martin
Network Laboratories, NEC Europe Ltd.
Kurfuersten-Anlage 36
Heidelberg 69115
Germany
Phone: +49 (0) 6221 905 11 16
EMail: miquel.martin@ccrle.nec.de
URI:
Marcus Brunner
Network Laboratories, NEC Europe Ltd.
Kurfuersten-Anlage 36
Heidelberg 69115
Germany
Phone: +49 (0) 6221 905 11 29
EMail: brunner@ccrle.nec.de
URI: http://www.brubers.org/marcus
Martin, et al. Expires April 19, 2004 [Page 22]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
Martin Stiemerling
Network Laboratories, NEC Europe Ltd.
Kurfuersten-Anlage 36
Heidelberg 69115
Germany
Phone: +49 (0) 6221 905 11 13
EMail: stiemerling@ccrle.nec.de
URI:
Cedric Aoun
Nortel Networks
France
EMail: cedric.aoun@nortelnetworks.com
Martin, et al. Expires April 19, 2004 [Page 23]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
Appendix A. Acknowledgments
We would like to acknowledge and thank the valuable input Joao Girao
provided for this draft.
Martin, et al. Expires April 19, 2004 [Page 24]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and
standards-related documentation can be found in BCP-11. Copies of
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to
obtain a general license or permission for the use of such
proprietary rights by implementors or users of this specification can
be obtained from the IETF Secretariat.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive
Director.
Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assignees.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
Martin, et al. Expires April 19, 2004 [Page 25]
Internet-Draft NAT/FW NSLP Security infrastructure October 2003
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Martin, et al. Expires April 19, 2004 [Page 26]