
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@16198 ec53bebd-3082-4978-b11e-865c3cabbd6b
1234 lines
18 KiB
Plaintext
1234 lines
18 KiB
Plaintext
|
||
|
||
|
||
NETWORK WORKING GROUP N. Williams
|
||
Internet-Draft Sun
|
||
Expires: April 19, 2006 October 16, 2005
|
||
|
||
|
||
Guide to the GSS-APIv3
|
||
draft-ietf-kitten-gssapi-v3-guide-to-01.txt
|
||
|
||
Status of this Memo
|
||
|
||
By submitting this Internet-Draft, each author represents that any
|
||
applicable patent or other IPR claims of which he or she is aware
|
||
have been or will be disclosed, and any of which he or she becomes
|
||
aware will be disclosed, in accordance with Section 6 of BCP 79.
|
||
|
||
Internet-Drafts are working documents of the Internet Engineering
|
||
Task Force (IETF), its areas, and its working groups. Note that
|
||
other groups may also distribute working documents as Internet-
|
||
Drafts.
|
||
|
||
Internet-Drafts are draft documents valid for a maximum of six months
|
||
and may be updated, replaced, or obsoleted by other documents at any
|
||
time. It is inappropriate to use Internet-Drafts as reference
|
||
material or to cite them other than as "work in progress."
|
||
|
||
The list of current Internet-Drafts can be accessed at
|
||
http://www.ietf.org/ietf/1id-abstracts.txt.
|
||
|
||
The list of Internet-Draft Shadow Directories can be accessed at
|
||
http://www.ietf.org/shadow.html.
|
||
|
||
This Internet-Draft will expire on April 19, 2006.
|
||
|
||
Copyright Notice
|
||
|
||
Copyright (C) The Internet Society (2005).
|
||
|
||
Abstract
|
||
|
||
Extensions to the GSS-APIv2 are needed for a number of reasons. This
|
||
documents describes the extensions being proposed, the resons,
|
||
possible future directions, and portability, IANA and security
|
||
considerations. This document does not define any protocol or
|
||
interface and is purely informational.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 1]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
Table of Contents
|
||
|
||
1. Conventions used in this document . . . . . . . . . . . . . . 3
|
||
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
|
||
3. A Pseudo-Mechanism OID for the GSS-API Itself . . . . . . . . 6
|
||
4. Mechanism Attribute Inquiry Facilities . . . . . . . . . . . . 7
|
||
5. Security Context Extensibility Extensions . . . . . . . . . . 8
|
||
6. Credential Extensibility Extensions . . . . . . . . . . . . . 9
|
||
7. Credential Export/Import . . . . . . . . . . . . . . . . . . . 10
|
||
8. GSS_Store_cred() . . . . . . . . . . . . . . . . . . . . . . . 11
|
||
9. Pseudo-Mechanism Stacking . . . . . . . . . . . . . . . . . . 12
|
||
10. Naming Extensions . . . . . . . . . . . . . . . . . . . . . . 13
|
||
11. Additional Name Types . . . . . . . . . . . . . . . . . . . . 14
|
||
12. GSS_Pseudo_random() . . . . . . . . . . . . . . . . . . . . . 15
|
||
13. Channel Bindings Specifications . . . . . . . . . . . . . . . 16
|
||
14. Semantic and Miscallaneous Extensions . . . . . . . . . . . . 17
|
||
15. Portability Considerations . . . . . . . . . . . . . . . . . . 18
|
||
16. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19
|
||
17. Security Considerations . . . . . . . . . . . . . . . . . . . 20
|
||
18. Normative . . . . . . . . . . . . . . . . . . . . . . . . . . 20
|
||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . 21
|
||
Intellectual Property and Copyright Statements . . . . . . . . 22
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 2]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
1. Conventions used in this document
|
||
|
||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||
document are to be interpreted as described in [RFC2119].
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 3]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
2. Introduction
|
||
|
||
[NOTE: the references section is current fairly empty; the various
|
||
KITTEN WG work items will be added to this I-D in a subsequent
|
||
revision.]
|
||
|
||
Since the advent of the GSS-APIv2 it has come to be used in a number
|
||
of Internet (and other) protocols and a number of implementations
|
||
exist. In that time implementors and protocol designers have come to
|
||
understand both, the GSS-API's strengths, and its shortcommings; we
|
||
believe now that a number of extensions to the GSS-API are needed.
|
||
Here these proposed extensions, forming what we may call the GSS-API
|
||
version 3, are described at a high-level.;
|
||
|
||
Some of these extensions are intended to facilitate further
|
||
extensions, so that further major revisions to the GSS-API may not be
|
||
necessary. Others are intended to fill voids in the the GSS-APIv2.
|
||
|
||
The extensions being proposed are:
|
||
|
||
A pseudo-mechanism OID for the GSS-API itself
|
||
|
||
Mechanism attribute inquiry facilities
|
||
|
||
Security context extensibility extensions
|
||
|
||
Credential extensibility extensions
|
||
|
||
Credential export/import
|
||
|
||
GSS_Store_cred(), for making delegated credentials available for
|
||
acquisition
|
||
|
||
Pseudo-mechanism stacking
|
||
|
||
Naming extensions, to facilitate authorization by identifiers
|
||
other than names
|
||
|
||
Additional name types, specifically domain-based naming
|
||
|
||
A pseudo-random function interface
|
||
|
||
Channel bindings specifications
|
||
|
||
Semantic extensions relating to thread- and/or fork-safety
|
||
|
||
[Have I missed anything? I have a feeling I have. Re-keying?]
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 4]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
...
|
||
|
||
Additionally, because we foresee future minor extensions, including,
|
||
specifically, extensions which may impact the various namespaces
|
||
associated with APIs (symbol names, constant values, class names,
|
||
etc...) we also propose the establishment of IANA registries for
|
||
these namespaces.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 5]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
3. A Pseudo-Mechanism OID for the GSS-API Itself
|
||
|
||
A mechanism OID is assigned to identify and refer to the GSS-API
|
||
iself. This is necessary to enable the use of extended inquiry
|
||
interfaces to inquire about features of a GSS-API implementation
|
||
specifically, apart from actual mechanisms.
|
||
|
||
But also, this OID is needed for better error handling, so that minor
|
||
status codes produced in generic contexts that lack a mechanism OID
|
||
can be distinguished from minor status codes for a "default"
|
||
mechanism and properly displayed.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 6]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
4. Mechanism Attribute Inquiry Facilities
|
||
|
||
In the course of designing a pseudo-mechanism stacking facility, as
|
||
well as while considering the impact of all of these extensions on
|
||
portability, a need for interfaces through which to discover or
|
||
inquire by features provided by GSS-API mechanisms was discovered.
|
||
|
||
The proposed mechanism attribute inquiry interfaces consist of:
|
||
|
||
GSS_Inquire_mech_attrs_for_mech()
|
||
|
||
GSS_Indicate_mechs_by_mech_attrs()
|
||
|
||
GSS_Display_mech_attr()
|
||
|
||
These extensions facilitate portability by allowing GSS-APIv3
|
||
applications to discover the features provided by a given
|
||
implementation of the GSS-API or any mechanisms. These extensions
|
||
are also useful in facilitating stackable pseudo-mechanisms.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 7]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
5. Security Context Extensibility Extensions
|
||
|
||
In order to facilitate future security context options we introduce a
|
||
GSS_Create_sec_context() interface that creates a security context
|
||
object, for use with extensions and with GSS_Init_sec_context(),
|
||
GSS_Accept_sec_context(), and GSS_Inquire_sec_context(). Such
|
||
security contexts are in a non-established state until they are
|
||
established through the use of GSS_Init_sec_context() or
|
||
GSS_Accept_sec_context().
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 8]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
6. Credential Extensibility Extensions
|
||
|
||
In order to facilitate future extensions to GSS credentials we
|
||
introduce a GSS_Create_credential(), similar to
|
||
GSS_Create_sec_context(), interface that creates an "empty"
|
||
credential.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 9]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
7. Credential Export/Import
|
||
|
||
To allow for passing of credentials between different "session
|
||
contexts," between different hosts, or for storage of post-dated
|
||
credentials, we introduce a credential export/import facility, much
|
||
like the security context export/import facility of the GSS-APIv2.
|
||
|
||
Together with credential extensibility and other extensions this
|
||
facility may allow for:
|
||
|
||
Credential delegation at any time
|
||
|
||
Post-dated credentials, and storage of the such for subsequent
|
||
use.
|
||
|
||
...?
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 10]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
8. GSS_Store_cred()
|
||
|
||
This extension fills a void in the GSS-APIv2 where delegated
|
||
credentials could not be used except in the context of the same
|
||
process that received them. With this extension acceptor
|
||
applications can now make delegated credentials available for use,
|
||
with GSS_Acquire_cred() et. al., in other process contexts.
|
||
|
||
[Manipulation of "credential stores" is (may be?) out of scope for
|
||
this document.]
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 11]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
9. Pseudo-Mechanism Stacking
|
||
|
||
A number of pseudo-mechanisms are being proposed which are designed
|
||
to "stack" atop other mechanisms. The possiblities are many,
|
||
including: a compression mechanism, a perfect forward security
|
||
mechanism, an many others.
|
||
|
||
The GSS-APIv2 only had concrete mechanisms and one pseudo-mechanism
|
||
(SPNEGO) available. With this proposal the mechanism taxonomy is
|
||
quite expanded:
|
||
|
||
Concrete mechanisms (e.g., the Kerberos V mechanism)
|
||
|
||
Composite mechanisms (a concrete mechanism composed with one or
|
||
more stackable pseudo-mechanisms)
|
||
|
||
Stackable pseudo-mechanisms
|
||
|
||
Other pseudo-mechanisms (e.g., SPNEGO, the GSS-API itself)
|
||
|
||
Although composed mechanisms may be made available for use by GSS-
|
||
APIv2 applications without any further extensions, use of stackable
|
||
pseudo-mechanisms can complicate mechanism negotiation; additionally,
|
||
discovery of mechanisms appropriate for use in one or another context
|
||
would require hard-coding information about them in GSS-APIv2
|
||
applications. Extensions to the GSS-APIv2 could facilitate use of
|
||
composite.
|
||
|
||
The mechanism attribute inquiry facilities, together with the
|
||
forllowing additional interfaces, provide for a complete interface to
|
||
mechanism composition and for managing the complexity of mechanism
|
||
negotiation:
|
||
|
||
GSS_Compose_oid()
|
||
|
||
GSS_Decompose_oid()
|
||
|
||
GSS_Release_oid()
|
||
|
||
GSS_Indicate_negotiable_mechs()
|
||
|
||
GSS_Negotiate_mechs()
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 12]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
10. Naming Extensions
|
||
|
||
Some applications make use of exported names, as produced by
|
||
GSS_Export_name(), to create/manage/evaluate access control lists; we
|
||
call this name-based authorization.
|
||
|
||
Exported names typically encode names that are meant for display to
|
||
humans, not internal identifiers.
|
||
|
||
In practice this creates a number of problems. E.g., the referential
|
||
integrity of such access control lists is hard to maintain as
|
||
principals are added, removed, renamed or old principal names reused.
|
||
|
||
Additionally, some mechanisms may lack a notion of a "canonical" name
|
||
for some or all of their principals. Such mechanisms cannot be used
|
||
by applications that rely on name-based authorization.
|
||
|
||
<Describe the proposed extensions in this area.>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 13]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
11. Additional Name Types
|
||
|
||
<Decribe domain-based names and the need for them.>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 14]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
12. GSS_Pseudo_random()
|
||
|
||
<Decribe GSS_Pseudo_random() and the need for it.>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 15]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
13. Channel Bindings Specifications
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 16]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
14. Semantic and Miscallaneous Extensions
|
||
|
||
The GSS-APIv2 specifications say nothing about the thread-safety,
|
||
much less the fork-safety, of the GSS-API. Thread-safety and fork-
|
||
safety are, after all, platform- and/or language-specific matters.
|
||
But as support for multi-threading spreads the matter of thread-
|
||
safety cannot be avoided. The matter of fork-safety is specific to
|
||
platforms that provide a "fork()" function, or similar.
|
||
|
||
<describe the GSS-APIv3's thread-safety requirements>
|
||
|
||
<reference the portability considerations section>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 17]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
15. Portability Considerations
|
||
|
||
The potential for additional generic, mechanism-specific, language
|
||
binding-specific and, most importantly, semantic extensions to the
|
||
GSS-APIv3 may create application portability problems. The mechanism
|
||
attribute inquiry facilities of the GSS-APIv3 and the pseudo-
|
||
mechanism OID for the GSS-API itself double as a run-time facility
|
||
for discovery of feature availability. Run-time feature discovery
|
||
facilities, in turn, can be used at application build-time as well by
|
||
building small applications to display the available features.
|
||
|
||
<...>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 18]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
16. IANA Considerations
|
||
|
||
<Describe the namespace issues associated with future minor
|
||
extensions to the GSS-APIv3 and the IANA registries to be created to
|
||
cope with them.>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 19]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
17. Security Considerations
|
||
|
||
<...>
|
||
|
||
18. Normative
|
||
|
||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
||
|
||
[RFC2743] Linn, J., "Generic Security Service Application Program
|
||
Interface Version 2, Update 1", RFC 2743, January 2000.
|
||
|
||
[RFC2744] Wray, J., "Generic Security Service API Version 2 :
|
||
C-bindings", RFC 2744, January 2000.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 20]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
Author's Address
|
||
|
||
Nicolas Williams
|
||
Sun Microsystems
|
||
5300 Riata Trace Ct
|
||
Austin, TX 78727
|
||
US
|
||
|
||
Email: Nicolas.Williams@sun.com
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 21]
|
||
|
||
Internet-Draft Guide to the GSS-APIv3 October 2005
|
||
|
||
|
||
Intellectual Property Statement
|
||
|
||
The IETF takes no position regarding the validity or scope of any
|
||
Intellectual Property Rights or other rights that might be claimed to
|
||
pertain to the implementation or use of the technology described in
|
||
this document or the extent to which any license under such rights
|
||
might or might not be available; nor does it represent that it has
|
||
made any independent effort to identify any such rights. Information
|
||
on the procedures with respect to rights in RFC documents can be
|
||
found in BCP 78 and BCP 79.
|
||
|
||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||
assurances of licenses to be made available, or the result of an
|
||
attempt made to obtain a general license or permission for the use of
|
||
such proprietary rights by implementers or users of this
|
||
specification can be obtained from the IETF on-line IPR repository at
|
||
http://www.ietf.org/ipr.
|
||
|
||
The IETF invites any interested party to bring to its attention any
|
||
copyrights, patents or patent applications, or other proprietary
|
||
rights that may cover technology that may be required to implement
|
||
this standard. Please address the information to the IETF at
|
||
ietf-ipr@ietf.org.
|
||
|
||
|
||
Disclaimer of Validity
|
||
|
||
This document and the information contained herein are provided on an
|
||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||
|
||
|
||
Copyright Statement
|
||
|
||
Copyright (C) The Internet Society (2005). This document is subject
|
||
to the rights, licenses and restrictions contained in BCP 78, and
|
||
except as set forth therein, the authors retain all their rights.
|
||
|
||
|
||
Acknowledgment
|
||
|
||
Funding for the RFC Editor function is currently provided by the
|
||
Internet Society.
|
||
|
||
|
||
|
||
|
||
Williams Expires April 19, 2006 [Page 22]
|
||
|
||
|