draft-ietf-apex-party-01.txt   draft-ietf-apex-party-02.txt 
Network Working Group E. Dixon Network Working Group E. Dixon
Internet-Draft H. Franklin Internet-Draft H. Franklin
Expires: October 30, 2001 J. Kint Expires: January 7, 2002 J. Kint
Invisible Worlds, Inc. Invisible Worlds, Inc.
G. Klyne G. Klyne
Baltimore Technologies Baltimore Technologies
D. New D. New
S. Pead S. Pead
M. Rose M. Rose
Invisible Worlds, Inc. Invisible Worlds, Inc.
July 9, 2001
The APEX Option Party Pack, Part Deux! The APEX Option Party Pack, Part Deux!
draft-ietf-apex-party-01 draft-ietf-apex-party-02
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 38 skipping to change at page 1, line 39
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on October 30, 2001. This Internet-Draft will expire on January 7, 2002.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2001). All Rights Reserved. Copyright (C) The Internet Society (2001). All Rights Reserved.
Abstract Abstract
APEX, at its core, provides a best-effort application-layer datagram APEX, at its core, provides a best-effort application-layer datagram
service. Options are used to alter the semantics of the core service. Options are used to alter the semantics of the core
service. This memo defines various options to change the default service. This memo defines various options to change the default
skipping to change at page 2, line 25 skipping to change at page 2, line 25
4. Initial Registrations . . . . . . . . . . . . . . . . . . . 16 4. Initial Registrations . . . . . . . . . . . . . . . . . . . 16
4.1 Registration: The attachOverride Option . . . . . . . . . . 16 4.1 Registration: The attachOverride Option . . . . . . . . . . 16
4.2 Registration: The dataTiming Option . . . . . . . . . . . . 16 4.2 Registration: The dataTiming Option . . . . . . . . . . . . 16
4.3 Registration: The hold4Endpoint Option . . . . . . . . . . . 16 4.3 Registration: The hold4Endpoint Option . . . . . . . . . . . 16
5. The APEX Party Pack DTD . . . . . . . . . . . . . . . . . . 17 5. The APEX Party Pack DTD . . . . . . . . . . . . . . . . . . 17
6. Security Considerations . . . . . . . . . . . . . . . . . . 18 6. Security Considerations . . . . . . . . . . . . . . . . . . 18
References . . . . . . . . . . . . . . . . . . . . . . . . . 19 References . . . . . . . . . . . . . . . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 19 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 19
A. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 21 A. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 21
B. IANA Considerations . . . . . . . . . . . . . . . . . . . . 22 B. IANA Considerations . . . . . . . . . . . . . . . . . . . . 22
C. Changes from draft-ietf-apex-party-00 . . . . . . . . . . . 23 C. Revision History . . . . . . . . . . . . . . . . . . . . . . 23
C.1 Changes from draft-ietf-apex-party-01 . . . . . . . . . . . 23
C.2 Changes from draft-ietf-apex-party-00 . . . . . . . . . . . 23
Full Copyright Statement . . . . . . . . . . . . . . . . . . 24 Full Copyright Statement . . . . . . . . . . . . . . . . . . 24
1. The attachOverride Option 1. The attachOverride Option
Section 4.1 contains the APEX option registration for the Section 4.1 contains the APEX option registration for the
"attachOverride" option. "attachOverride" option.
The default behavior of the APEX relaying mesh, in the absence of The default behavior of the APEX relaying mesh, in the absence of
processing options, is to allow at most one application to attach as processing options, is to allow at most one application to attach as
a particular endpoint, on a "first come, first served" basis. The a particular endpoint, on a "first come, first served" basis. The
skipping to change at page 19, line 8 skipping to change at page 19, line 8
o The hold4Endpoint option (Section 3) may be used to facilitate o The hold4Endpoint option (Section 3) may be used to facilitate
denial-of-service attacks. Accordingly, an administrator may wish denial-of-service attacks. Accordingly, an administrator may wish
to impose administrative limits on this attribute (e.g., always to impose administrative limits on this attribute (e.g., always
require that the "dataTiming" option also be present with a short- require that the "dataTiming" option also be present with a short-
lived "noLaterThan" attribute). lived "noLaterThan" attribute).
References References
[1] Rose, M., Klyne, G. and D. Crocker, "The Application Exchange [1] Rose, M., Klyne, G. and D. Crocker, "The Application Exchange
Core", draft-ietf-apex-core-03 (work in progress), May 2001. Core", draft-ietf-apex-core-04 (work in progress), July 2001.
[2] Newman, D., "Deliver By SMTP Service Extension", RFC 2852, June [2] Newman, D., "Deliver By SMTP Service Extension", RFC 2852, June
2000. 2000.
Authors' Addresses Authors' Addresses
Eric Dixon Eric Dixon
Invisible Worlds, Inc. Invisible Worlds, Inc.
131 Stony Circle 131 Stony Circle
Suite 500 Suite 500
skipping to change at page 23, line 5 skipping to change at page 23, line 5
Appendix A. Acknowledgements Appendix A. Acknowledgements
The authors gratefully acknowledge the contributions of Chris Newman The authors gratefully acknowledge the contributions of Chris Newman
and Bob Wyman. Further, the dataTiming option is similar in function and Bob Wyman. Further, the dataTiming option is similar in function
to "Deliver By" SMTP service extension defined by Dan Newman in [2]. to "Deliver By" SMTP service extension defined by Dan Newman in [2].
Appendix B. IANA Considerations Appendix B. IANA Considerations
The IANA makes the registrations specified in Section 4. The IANA makes the registrations specified in Section 4.
Appendix C. Changes from draft-ietf-apex-party-00 Appendix C. Revision History
C.1 Changes from draft-ietf-apex-party-01
o A page-break was fixed.
C.2 Changes from draft-ietf-apex-party-00
o When terminating an association due to processing the o When terminating an association due to processing the
"attachOverride" option, the "code" attribute of the terminate "attachOverride" option, the "code" attribute of the terminate
operation must be supplied. operation must be supplied.
o A small number of typos were corrected. o A small number of typos were corrected.
Full Copyright Statement Full Copyright Statement
Copyright (C) The Internet Society (2001). All Rights Reserved. Copyright (C) The Internet Society (2001). All Rights Reserved.
 End of changes. 7 change blocks. 
6 lines changed or deleted 15 lines changed or added

This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/