draft-ietf-radext-rfc2486bis-06.txt | rfc4282.txt | |||
---|---|---|---|---|
Network Working Group B. Aboba | Network Working Group B. Aboba | |||
Internet-Draft Microsoft | Request for Comments: 4282 Microsoft | |||
Obsoletes: 2486 (if approved) M. Beadles | Obsoletes: 2486 M. Beadles | |||
Expires: January 19, 2006 SmartPipes | Category: Standards Track ENDFORCE | |||
J. Arkko | J. Arkko | |||
Ericsson | Ericsson | |||
P. Eronen | P. Eronen | |||
Nokia | Nokia | |||
July 18, 2005 | December 2005 | |||
The Network Access Identifier | The Network Access Identifier | |||
draft-ietf-radext-rfc2486bis-06 | ||||
Status of this Memo | ||||
By submitting this Internet-Draft, each author represents that any | ||||
applicable patent or other IPR claims of which he or she is aware | ||||
have been or will be disclosed, and any of which he or she becomes | ||||
aware will be disclosed, in accordance with Section 6 of BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF), its areas, and its working groups. Note that | ||||
other groups may also distribute working documents as Internet- | ||||
Drafts. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | ||||
and may be updated, replaced, or obsoleted by other documents at any | ||||
time. It is inappropriate to use Internet-Drafts as reference | ||||
material or to cite them other than as "work in progress." | ||||
The list of current Internet-Drafts can be accessed at | ||||
http://www.ietf.org/ietf/1id-abstracts.txt. | ||||
The list of Internet-Draft Shadow Directories can be accessed at | Status of This Memo | |||
http://www.ietf.org/shadow.html. | ||||
This Internet-Draft will expire on January 19, 2006. | This document specifies an Internet standards track protocol for the | |||
Internet community, and requests discussion and suggestions for | ||||
improvements. Please refer to the current edition of the "Internet | ||||
Official Protocol Standards" (STD 1) for the standardization state | ||||
and status of this protocol. Distribution of this memo is unlimited. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (C) The Internet Society (2005). | Copyright (C) The Internet Society (2005). | |||
Abstract | Abstract | |||
In order to provide roaming services, it is necessary to have a | In order to provide roaming services, it is necessary to have a | |||
standardized method for identifying users. This document defines the | standardized method for identifying users. This document defines the | |||
syntax for the Network Access Identifier (NAI), the user identity | syntax for the Network Access Identifier (NAI), the user identity | |||
submitted by the client during network authentication. "Roaming" may | submitted by the client during network authentication. "Roaming" may | |||
be loosely defined as the ability to use any one of multiple Internet | be loosely defined as the ability to use any one of multiple Internet | |||
Service Providers (ISPs), while maintaining a formal, customer-vendor | Service Providers (ISPs), while maintaining a formal, customer-vendor | |||
relationship with only one. Examples of where roaming capabilities | relationship with only one. Examples of where roaming capabilities | |||
might be required include ISP "confederations" and ISP-provided | might be required include ISP "confederations" and ISP-provided | |||
corporate network access support. This document is a revised version | corporate network access support. This document is a revised version | |||
of RFC 2486 which originally defined NAIs. Enhancements include | of RFC 2486, which originally defined NAIs. Enhancements include | |||
international character set and privacy support, as well as a number | international character set and privacy support, as well as a number | |||
of corrections to the original RFC. | of corrections to the original RFC. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction ....................................................2 | |||
1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.1. Terminology ................................................3 | |||
1.2 Requirements language . . . . . . . . . . . . . . . . . . 4 | 1.2. Requirements Language ......................................4 | |||
1.3 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 1.3. Purpose ....................................................4 | |||
2. NAI Definition . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. NAI Definition ..................................................4 | |||
2.1 Formal Syntax . . . . . . . . . . . . . . . . . . . . . . 5 | 2.1. Formal Syntax ..............................................4 | |||
2.2 NAI Length Considerations . . . . . . . . . . . . . . . . 6 | 2.2. NAI Length Considerations ..................................6 | |||
2.3 Support for Username Privacy . . . . . . . . . . . . . . . 7 | 2.3. Support for Username Privacy ...............................6 | |||
2.4 International Character Sets . . . . . . . . . . . . . . . 7 | 2.4. International Character Sets ...............................7 | |||
2.5 Compatibility with E-Mail Usernames . . . . . . . . . . . 9 | 2.5. Compatibility with E-Mail Usernames ........................8 | |||
2.6 Compatibility with DNS . . . . . . . . . . . . . . . . . . 9 | 2.6. Compatibility with DNS .....................................8 | |||
2.7 Realm Construction . . . . . . . . . . . . . . . . . . . . 9 | 2.7. Realm Construction .........................................8 | |||
2.8 Examples . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 2.8. Examples ..................................................10 | |||
3. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | 3. Security Considerations ........................................10 | |||
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 | 4. IANA Considerations ............................................11 | |||
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 5. References .....................................................11 | |||
5.1 Normative References . . . . . . . . . . . . . . . . . . . 12 | 5.1. Normative References ......................................11 | |||
5.2 Informative References . . . . . . . . . . . . . . . . . . 13 | 5.2. Informative References ....................................12 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 14 | Appendix A. Changes from RFC 2486 ................................14 | |||
A. Changes from RFC 2486 . . . . . . . . . . . . . . . . . . . . 14 | Appendix B. Acknowledgements .....................................14 | |||
B. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15 | ||||
Intellectual Property and Copyright Statements . . . . . . . . 17 | ||||
1. Introduction | 1. Introduction | |||
Considerable interest exists for a set of features that fit within | Considerable interest exists for a set of features that fit within | |||
the general category of "roaming capability" for network access, | the general category of "roaming capability" for network access, | |||
including dialup Internet users, Virtual Private Network (VPN) usage, | including dialup Internet users, Virtual Private Network (VPN) usage, | |||
wireless LAN authentication, and other applications. Interested | wireless LAN authentication, and other applications. Interested | |||
parties have included: | parties have included the following: | |||
o Regional Internet Service Providers (ISPs) operating within a | o Regional Internet Service Providers (ISPs) operating within a | |||
particular state or province, looking to combine their efforts | particular state or province, looking to combine their efforts | |||
with those of other regional providers to offer dialup service | with those of other regional providers to offer dialup service | |||
over a wider area. | over a wider area. | |||
o National ISPs wishing to combine their operations with those of | o National ISPs wishing to combine their operations with those of | |||
one or more ISPs in another nation to offer more comprehensive | one or more ISPs in another nation to offer more comprehensive | |||
dialup service in a group of countries or on a continent. | dialup service in a group of countries or on a continent. | |||
o Wireless LAN hotspots providing service to one or more ISPs. | o Wireless LAN hotspots providing service to one or more ISPs. | |||
o Businesses desiring to offer their employees a comprehensive | o Businesses desiring to offer their employees a comprehensive | |||
package of dialup services on a global basis. Those services may | package of dialup services on a global basis. Those services may | |||
include Internet access as well as secure access to corporate | include Internet access as well as secure access to corporate | |||
intranets via a VPN, enabled by tunneling protocols such as Point- | intranets via a VPN, enabled by tunneling protocols such as the | |||
to-Point Tunneling Protocol (PPTP) [RFC2637], Layer 2 Forwarding | Point-to-Point Tunneling Protocol (PPTP) [RFC2637], the Layer 2 | |||
(L2F) protocol [RFC2341], Layer 2 Tunneling Protocol (L2TP) | Forwarding (L2F) protocol [RFC2341], the Layer 2 Tunneling | |||
[RFC2661], and IPsec tunnel mode [RFC2401]. | Protocol (L2TP) [RFC2661], and the IPsec tunnel mode [RFC2401]. | |||
In order to enhance the interoperability of roaming services, it is | In order to enhance the interoperability of roaming services, it is | |||
necessary to have a standardized method for identifying users. This | necessary to have a standardized method for identifying users. This | |||
document defines syntax for the Network Access Identifier (NAI). | document defines syntax for the Network Access Identifier (NAI). | |||
Examples of implementations that use the NAI, and descriptions of its | Examples of implementations that use the NAI, and descriptions of its | |||
semantics, can be found in [RFC2194]. | semantics, can be found in [RFC2194]. | |||
This document is a revised version of RFC 2486 [RFC2486] which | This document is a revised version of RFC 2486 [RFC2486], which | |||
originally defined NAIs. Differences and enhancements compared to | originally defined NAIs. Differences and enhancements compared to | |||
RFC 2486 are listed in Appendix A. | RFC 2486 are listed in Appendix A. | |||
1.1 Terminology | 1.1. Terminology | |||
This document frequently uses the following terms: | This document frequently uses the following terms: | |||
Network Access Identifier | Network Access Identifier | |||
The Network Access Identifier (NAI) is the user identity submitted | The Network Access Identifier (NAI) is the user identity submitted | |||
by the client during network access authentication. In roaming, | by the client during network access authentication. In roaming, | |||
the purpose of the NAI is to identify the user as well as to | the purpose of the NAI is to identify the user as well as to | |||
assist in the routing of the authentication request. Please note | assist in the routing of the authentication request. Please note | |||
that the NAI may not necessarily be the same as the user's e-mail | that the NAI may not necessarily be the same as the user's e-mail | |||
address or the user identity submitted in an application layer | address or the user identity submitted in an application layer | |||
authentication. | authentication. | |||
Network Access Server | Network Access Server | |||
The Network Access Server (NAS) is the device that clients connect | The Network Access Server (NAS) is the device that clients connect | |||
to in order to get access to the network. In PPTP terminology | to in order to get access to the network. In PPTP terminology, | |||
this is referred to as the PPTP Access Concentrator (PAC), and in | this is referred to as the PPTP Access Concentrator (PAC), and in | |||
L2TP terminology, it is referred to as the L2TP Access | L2TP terminology, it is referred to as the L2TP Access | |||
Concentrator (LAC). In IEEE 802.11, it is referred to as an | Concentrator (LAC). In IEEE 802.11, it is referred to as an | |||
Access Point. | Access Point. | |||
Roaming Capability | Roaming Capability | |||
Roaming capability can be loosely defined as the ability to use | Roaming capability can be loosely defined as the ability to use | |||
any one of multiple Internet service providers (ISPs), while | any one of multiple Internet Service Providers (ISPs), while | |||
maintaining a formal, customer-vendor relationship with only one. | maintaining a formal, customer-vendor relationship with only one. | |||
Examples of cases where roaming capability might be required | Examples of cases where roaming capability might be required | |||
include ISP "confederations" and ISP-provided corporate network | include ISP "confederations" and ISP-provided corporate network | |||
access support. | access support. | |||
Tunneling Service | Tunneling Service | |||
A tunneling service is any network service enabled by tunneling | A tunneling service is any network service enabled by tunneling | |||
protocols such as PPTP, L2F, L2TP, and IPsec tunnel mode. One | protocols such as PPTP, L2F, L2TP, and IPsec tunnel mode. One | |||
example of a tunneling service is secure access to corporate | example of a tunneling service is secure access to corporate | |||
intranets via a Virtual Private Network (VPN). | intranets via a Virtual Private Network (VPN). | |||
1.2 Requirements language | 1.2. Requirements Language | |||
In this document, the key words "MAY", "MUST, "MUST NOT", "OPTIONAL", | In this document, the key words "MAY", "MUST, "MUST NOT", "OPTIONAL", | |||
"RECOMMENDED", "SHOULD", and "SHOULD NOT", are to be interpreted as | "RECOMMENDED", "SHOULD", and "SHOULD NOT", are to be interpreted as | |||
described in [RFC2119]. | described in [RFC2119]. | |||
1.3 Purpose | 1.3. Purpose | |||
As described in [RFC2194], there are a number of providers offering | As described in [RFC2194], there are a number of providers offering | |||
network access services, and the number of Internet Service Providers | network access services, and the number of Internet Service Providers | |||
involved in roaming consortia is increasing rapidly. | involved in roaming consortia is increasing rapidly. | |||
In order to be able to offer roaming capability, one of the | In order to be able to offer roaming capability, one of the | |||
requirements is to be able to identify the user's home authentication | requirements is to be able to identify the user's home authentication | |||
server. For use in roaming, this function is accomplished via the | server. For use in roaming, this function is accomplished via the | |||
Network Access Identifier (NAI) submitted by the user to the NAS in | Network Access Identifier (NAI) submitted by the user to the NAS in | |||
the initial network authentication. It is also expected that NASes | the initial network authentication. It is also expected that NASes | |||
will use the NAI as part of the process of opening a new tunnel, in | will use the NAI as part of the process of opening a new tunnel, in | |||
order to determine the tunnel endpoint. | order to determine the tunnel endpoint. | |||
2. NAI Definition | 2. NAI Definition | |||
2.1 Formal Syntax | 2.1. Formal Syntax | |||
The grammar for the NAI is given below, described in Augmented | The grammar for the NAI is given below, described in Augmented | |||
Backus-Naur Form (ABNF) as documented in [RFC2234]. The grammar for | Backus-Naur Form (ABNF) as documented in [RFC4234]. The grammar for | |||
the username is based on [RFC0821], and the grammar for the realm is | the username is based on [RFC0821], and the grammar for the realm is | |||
an updated version of [RFC1035]. | an updated version of [RFC1035]. | |||
nai = username | nai = username | |||
nai =/ "@" realm | nai =/ "@" realm | |||
nai =/ username "@" realm | nai =/ username "@" realm | |||
username = dot-string | username = dot-string | |||
dot-string = string | dot-string = string | |||
dot-string =/ dot-string "." string | dot-string =/ dot-string "." string | |||
skipping to change at page 6, line 28 | skipping to change at page 5, line 43 | |||
c =/ %x7E ; '~' allowed | c =/ %x7E ; '~' allowed | |||
; DEL not allowed | ; DEL not allowed | |||
c =/ %x80-FF ; UTF-8-Octet allowed (not in RFC 2486) | c =/ %x80-FF ; UTF-8-Octet allowed (not in RFC 2486) | |||
; Where UTF-8-octet is any octet in the | ; Where UTF-8-octet is any octet in the | |||
; multi-octet UTF-8 representation of a | ; multi-octet UTF-8 representation of a | |||
; unicode codepoint above %x7F. | ; unicode codepoint above %x7F. | |||
; Note that c must also satisfy rules in | ; Note that c must also satisfy rules in | |||
; Section 2.4, including, for instance, | ; Section 2.4, including, for instance, | |||
; checking that no prohibited output is | ; checking that no prohibited output is | |||
; used (see also Section 2.3 of | ; used (see also Section 2.3 of | |||
; [I-D.ietf-sasl-saslprep]). | ; [RFC4013]). | |||
x = %x00-FF ; all 128 ASCII characters, no exception; | x = %x00-FF ; all 128 ASCII characters, no exception; | |||
; as well as all UTF-8-octets as defined | ; as well as all UTF-8-octets as defined | |||
; above (this was not allowed in | ; above (this was not allowed in | |||
; RFC 2486). Note that x must nevertheless | ; RFC 2486). Note that x must nevertheless | |||
; again satisfy the Section 2.4 rules. | ; again satisfy the Section 2.4 rules. | |||
realm = 1*( label "." ) label | realm = 1*( label "." ) label | |||
label = let-dig *(ldh-str) | label = let-dig *(ldh-str) | |||
ldh-str = *( alpha / digit / "-" ) let-dig | ldh-str = *( alpha / digit / "-" ) let-dig | |||
let-dig = alpha / digit | let-dig = alpha / digit | |||
alpha = %x41-5A ; 'A'-'Z' | alpha = %x41-5A ; 'A'-'Z' | |||
alpha =/ %x61-7A ; 'a'-'z' | alpha =/ %x61-7A ; 'a'-'z' | |||
digit = %x30-39 ; '0'-'9' | digit = %x30-39 ; '0'-'9' | |||
2.2 NAI Length Considerations | 2.2. NAI Length Considerations | |||
Devices handling NAIs MUST support an NAI length of at least 72 | Devices handling NAIs MUST support an NAI length of at least 72 | |||
octets. Support for an NAI length of 253 octets is RECOMMENDED. | octets. Support for an NAI length of 253 octets is RECOMMENDED. | |||
However, the following implementation issues should be considered: | However, the following implementation issues should be considered: | |||
o NAIs are often transported in the User-Name attribute of Remote | o NAIs are often transported in the User-Name attribute of the | |||
Authentication Dial In User Service (RADIUS) protocol. | Remote Authentication Dial-In User Service (RADIUS) protocol. | |||
Unfortunately, RFC 2865 [RFC2865] Section 5.1 states that "the | Unfortunately, RFC 2865 [RFC2865], Section 5.1, states that "the | |||
ability to handle at least 63 octets is recommended." As a | ability to handle at least 63 octets is recommended." As a | |||
result, it may not be possible to transfer NAIs beyond 63 octets | result, it may not be possible to transfer NAIs beyond 63 octets | |||
through all devices. In addition, since only a single User-Name | through all devices. In addition, since only a single User-Name | |||
attribute may be included in a RADIUS message and the maximum | attribute may be included in a RADIUS message and the maximum | |||
attribute length is 253 octets, RADIUS is unable to support NAI | attribute length is 253 octets; RADIUS is unable to support NAI | |||
lengths beyond 253 octets. | lengths beyond 253 octets. | |||
o NAIs can also be transported in the User-Name attribute of | o NAIs can also be transported in the User-Name attribute of | |||
Diameter [RFC3588], which supports content lengths up to 2^24 - 9 | Diameter [RFC3588], which supports content lengths up to 2^24 - 9 | |||
octets. As a result, NAIs processed only by Diameter nodes can be | octets. As a result, NAIs processed only by Diameter nodes can be | |||
very long. Unfortunately, an NAI transported over Diameter may | very long. Unfortunately, an NAI transported over Diameter may | |||
eventually be translated to RADIUS, in which case the above | eventually be translated to RADIUS, in which case the above | |||
limitations apply. | limitations apply. | |||
2.3 Support for Username Privacy | 2.3. Support for Username Privacy | |||
Interpretation of the "username" part of the NAI depends on the realm | Interpretation of the username part of the NAI depends on the realm | |||
in question. Therefore, the "username" part SHOULD be treated as | in question. Therefore, the "username" part SHOULD be treated as | |||
opaque data when processed by nodes that are not a part of the | opaque data when processed by nodes that are not a part of the | |||
authoritative domain (in the sense of Section 4) for that realm. | authoritative domain (in the sense of Section 4) for that realm. | |||
In some situations NAIs are are used together with a separate | In some situations, NAIs are used together with a separate | |||
authentication method that can transfer the username part in a more | authentication method that can transfer the username part in a more | |||
secure manner to increase privacy. In this case, NAIs MAY be | secure manner to increase privacy. In this case, NAIs MAY be | |||
provided in an abbreviated form by omitting the username part. | provided in an abbreviated form by omitting the username part. | |||
Omitting the username part is RECOMMENDED over using a fixed username | Omitting the username part is RECOMMENDED over using a fixed username | |||
part, such as "anonymous", since it provides an unambiguous way to | part, such as "anonymous", since it provides an unambiguous way to | |||
determine whether the username is intended to uniquely identify a | determine whether the username is intended to uniquely identify a | |||
single user. | single user. | |||
For roaming purposes it is typically necessary to locate the | For roaming purposes, it is typically necessary to locate the | |||
appropriate backend authentication server for the given NAI before | appropriate backend authentication server for the given NAI before | |||
the authentication conversation can proceed. As a result, the realm | the authentication conversation can proceed. As a result, the realm | |||
portion is typically required in order for the authentication | portion is typically required in order for the authentication | |||
exchange to be routed to the appropriate server. | exchange to be routed to the appropriate server. | |||
2.4 International Character Sets | 2.4. International Character Sets | |||
This specification allows both international usernames and realms. | This specification allows both international usernames and realms. | |||
International usernames are based on the use of Unicode characters, | International usernames are based on the use of Unicode characters, | |||
encoded as UTF-8 and processed with a certain algorithm to ensure a | encoded as UTF-8 and processed with a certain algorithm to ensure a | |||
canonical representation. The realm part internationalization is | canonical representation. Internationalization of the realm portion | |||
based on International Domain Name (IDN) [RFC3490]. | of the NAI is based on "Internationalizing Domain Names in | |||
Applications (IDNA)" [RFC3490]. | ||||
In order to ensure a canonical representation, characters of the | In order to ensure a canonical representation, characters of the | |||
username portion in an NAI MUST fulfill both the ABNF in this | username portion in an NAI MUST fulfill the ABNF in this | |||
specification as well as the requirements specified in [I-D.ietf- | specification as well as the requirements specified in [RFC4013]. | |||
sasl-saslprep]. These requirements consist of the following: | These requirements consist of the following: | |||
o Mapping requirements, as specified in Section 2.1 of [I-D.ietf- | o Mapping requirements, as specified in Section 2.1 of [RFC4013]. | |||
sasl-saslprep]. Mapping consists of mapping certain characters to | Mapping consists of mapping certain characters to others (such as | |||
others (such as SPACE) in order to increase the likelihood of | SPACE) in order to increase the likelihood of correctly performed | |||
correctly performed comparisons. | comparisons. | |||
o Normalization requirements, as specified in Section 2.2 of | o Normalization requirements, as specified in Section 2.2 of | |||
[I-D.ietf-sasl-saslprep], also designed to assist comparisons. | [RFC4013], are also designed to assist in comparisons. | |||
o Prohibited output. Certain characters are not permitted in | o Prohibited output. Certain characters are not permitted in | |||
correctly formed strings that follow Section 2.3 of [I-D.ietf- | correctly formed strings that follow Section 2.3 of [RFC4013]. | |||
sasl-saslprep]. Ensuring that NAIs conform to their ABNF is not | Ensuring that NAIs conform to their ABNF is not sufficient; it is | |||
sufficient, it is also necessary to ensure that they do not | also necessary to ensure that they do not contain prohibited | |||
contain prohibited output. | output. | |||
o Bidirectional characters are handled as specified in Section 2.4 | o Bidirectional characters are handled as specified in Section 2.4 | |||
of [I-D.ietf-sasl-saslprep]. | of [RFC4013]. | |||
o Unassigned code points are specified in Section 2.5 of [I-D.ietf- | o Unassigned code points are specified in Section 2.5 of [RFC4013]. | |||
sasl-saslprep]. The use of unassigned code points is prohibited. | The use of unassigned code points is prohibited. | |||
The mapping, normalization, and bidirectional character processing | The mapping, normalization, and bidirectional character processing | |||
MUST be performed by end systems that take international text as | MUST be performed by end systems that take international text as | |||
input. In a network access setting, such systems are typically the | input. In a network access setting, such systems are typically the | |||
client and the AAA server. NAIs are sent over the wire in their | client and the Authentication, Authorization, and Accounting (AAA) | |||
canonical form, and tasks such as normalization do not typically need | server. NAIs are sent over the wire in their canonical form, and | |||
to be performed by nodes that just pass NAIs around or receive them | tasks such as normalization do not typically need to be performed by | |||
from the network. End systems MUST also perform checking for | nodes that just pass NAIs around or receive them from the network. | |||
prohibited output and unassigned code points. Other systems MAY | End systems MUST also perform checking for prohibited output and | |||
perform such checks, when they know that a particular data item is a | unassigned code points. Other systems MAY perform such checks, when | |||
NAI. | they know that a particular data item is an NAI. | |||
The realm name is an "IDN-unaware domain name slot" as defined in | The realm name is an "IDN-unaware domain name slot" as defined in | |||
[RFC3490]. That is, it can contain only ASCII characters. An | [RFC3490]. That is, it can contain only ASCII characters. An | |||
implementation MAY support internationalized domain names (IDNs) | implementation MAY support Internationalized Domain Names (IDNs) | |||
using the ToASCII operation; see [RFC3490] for more information. | using the ToASCII operation; see [RFC3490] for more information. | |||
The responsibility for the conversion of international domain names | The responsibility for the conversion of internationalized domain | |||
to ASCII is left for the end-systems, such as network access clients | names to ASCII is left for the end systems, such as network access | |||
and AAA servers. Similarly, we expect domain name comparisons, | clients and AAA servers. Similarly, we expect domain name | |||
matching, resolution, and AAA routing to be performed on the ASCII | comparisons, matching, resolution, and AAA routing to be performed on | |||
versions of the international domain names. This provides a | the ASCII versions of the internationalized domain names. This | |||
canonical representation, ensures that intermediate systems such as | provides a canonical representation, ensures that intermediate | |||
AAA proxies do not need to perform translations, and can be expected | systems such as AAA proxies do not need to perform translations, and | |||
to work through systems that are unaware of international character | can be expected to work through systems that are unaware of | |||
sets. | international character sets. | |||
2.5 Compatibility with E-Mail Usernames | 2.5. Compatibility with E-Mail Usernames | |||
As proposed in this document, the Network Access Identifier is of the | As proposed in this document, the Network Access Identifier is of the | |||
form user@realm. Please note that while the user portion of the NAI | form user@realm. Please note that while the user portion of the NAI | |||
is based on the BNF described in [RFC0821], it has been extended for | is based on the BNF described in [RFC0821], it has been extended for | |||
internationalization support as well as for purposes of Section 2.7, | internationalization support as well as for purposes of Section 2.7, | |||
and is not necessarily compatible with the usernames used in e-mail. | and is not necessarily compatible with the usernames used in e-mail. | |||
Note also that the internationalization requirements for NAIs and | Note also that the internationalization requirements for NAIs and | |||
e-mail addresses are different, since the former need to be typed in | e-mail addresses are different, since the former need to be typed in | |||
only by the user himself and his own operator, not by others. | only by the user himself and his own operator, not by others. | |||
2.6 Compatibility with DNS | 2.6. Compatibility with DNS | |||
The BNF of the realm portion allows the realm to begin with a digit, | The BNF of the realm portion allows the realm to begin with a digit, | |||
which is not permitted by the BNF described in [RFC1035]. This | which is not permitted by the BNF described in [RFC1035]. This | |||
change was made to reflect current practice; although not permitted | change was made to reflect current practice; although not permitted | |||
by the BNF described in [RFC1035], FQDNs such as 3com.com are | by the BNF described in [RFC1035], Fully Qualified Domain Names | |||
commonly used, and accepted by current software. | (FQDNs) such as 3com.com are commonly used and accepted by current | |||
software. | ||||
2.7 Realm Construction | 2.7. Realm Construction | |||
NAIs are used, among other purposes, for routing AAA transactions to | NAIs are used, among other purposes, for routing AAA transactions to | |||
the user's home realm. Usually, the home realm appears in the realm | the user's home realm. Usually, the home realm appears in the realm | |||
portion of the NAI, but in some cases a different realm can be used. | portion of the NAI, but in some cases a different realm can be used. | |||
This may be useful, for instance, when the home realm is only | This may be useful, for instance, when the home realm is reachable | |||
reachable via another mediating realm. | only via another mediating realm. | |||
Such usage may prevent interoperability unless the parties involved | Such usage may prevent interoperability unless the parties involved | |||
have a mutual agreement that the usage is allowed. In particular, | have a mutual agreement that the usage is allowed. In particular, | |||
NAIs MUST NOT use a different realm than the home realm unless the | NAIs MUST NOT use a different realm than the home realm unless the | |||
sender has explicit knowledge that (a) the specified other realm is | sender has explicit knowledge that (a) the specified other realm is | |||
available and (b) the other realm supports such usage. The sender | available and (b) the other realm supports such usage. The sender | |||
may determine the fulfillment of these conditions through a database, | may determine the fulfillment of these conditions through a database, | |||
dynamic discovery, or other means not specified here. Note that the | dynamic discovery, or other means not specified here. Note that the | |||
first condition is affected by roaming, as the availability of the | first condition is affected by roaming, as the availability of the | |||
other realm may depend on the user's location or the desired | other realm may depend on the user's location or the desired | |||
skipping to change at page 10, line 17 | skipping to change at page 9, line 30 | |||
In this case, the part before the (non-escaped) '!' MUST be a realm | In this case, the part before the (non-escaped) '!' MUST be a realm | |||
name as defined in the ABNF in Section 2.1. This realm name is an | name as defined in the ABNF in Section 2.1. This realm name is an | |||
"IDN-unaware domain name slot", just like the realm name after the | "IDN-unaware domain name slot", just like the realm name after the | |||
"@" character; see Section 2.4 for details. When receiving such an | "@" character; see Section 2.4 for details. When receiving such an | |||
NAI, the other realm MUST convert the format back to | NAI, the other realm MUST convert the format back to | |||
"user@homerealm.example.net" when passing the NAI forward, as well as | "user@homerealm.example.net" when passing the NAI forward, as well as | |||
applying appropriate AAA routing for the transaction. | applying appropriate AAA routing for the transaction. | |||
The conversion process may apply also recursively. That is, after | The conversion process may apply also recursively. That is, after | |||
the conversion the result may still have one or more '!' characters | the conversion, the result may still have one or more '!' characters | |||
in the username. For instance, the NAI | in the username. For instance, the NAI | |||
other2.example.net!home.example.net!user@other1.example.net | other2.example.net!home.example.net!user@other1.example.net | |||
would first be converted in other1.example.net to | would first be converted in other1.example.net to | |||
home.example.net!user@other2.example.net | home.example.net!user@other2.example.net | |||
and then at other2.example.net finally to | and then at other2.example.net finally to | |||
user@homerealm.example.net | user@homerealm.example.net | |||
Note that the syntax described in this section is optional, and is | Note that the syntax described in this section is optional and is not | |||
not a part of the ABNF. The '!' character may appear in the username | a part of the ABNF. The '!' character may appear in the username | |||
portion of a NAI for other purposes as well, and in those cases the | portion of an NAI for other purposes as well, and in those cases, the | |||
rules outlined here do not apply; the interpretation of the username | rules outlined here do not apply; the interpretation of the username | |||
is up to an agreement between the identified user and the realm given | is up to an agreement between the identified user and the realm given | |||
after the '@' character. | after the '@' character. | |||
2.8 Examples | 2.8. Examples | |||
Examples of valid Network Access Identifiers include: | Examples of valid Network Access Identifiers include the following: | |||
bob | bob | |||
joe@example.com | joe@example.com | |||
fred@foo-9.example.com | fred@foo-9.example.com | |||
jack@3rd.depts.example.com | jack@3rd.depts.example.com | |||
fred.smith@example.com | fred.smith@example.com | |||
fred_smith@example.com | fred_smith@example.com | |||
fred$@example.com | fred$@example.com | |||
fred=?#$&*+-/^smith@example.com | fred=?#$&*+-/^smith@example.com | |||
nancy@eng.example.net | nancy@eng.example.net | |||
eng.example.net!nancy@example.net | eng.example.net!nancy@example.net | |||
eng%nancy@example.net | eng%nancy@example.net | |||
@privatecorp.example.net | @privatecorp.example.net | |||
alice@xn--tmonesimerkki-bfbb.example.net | ||||
\(user\)@example.net | \(user\)@example.net | |||
alice@xn--tmonesimerkki-bfbb.example.net | ||||
The last example uses an IDN converted into an ASCII representation. | The last example uses an IDN converted into an ASCII representation. | |||
Examples of invalid Network Access Identifiers include: | Examples of invalid Network Access Identifiers include the following: | |||
fred@example | fred@example | |||
fred@example_9.com | fred@example_9.com | |||
fred@example.net@example.net | fred@example.net@example.net | |||
fred.@example.net | fred.@example.net | |||
eng:nancy@example.net | eng:nancy@example.net | |||
eng;nancy@example.net | eng;nancy@example.net | |||
(user)@example.net | (user)@example.net | |||
<nancy>@example.net | <nancy>@example.net | |||
3. Security Considerations | 3. Security Considerations | |||
Since an NAI reveals the home affiliation of a user, it may assist an | Since an NAI reveals the home affiliation of a user, it may assist an | |||
attacker in further probing the username space. Typically this | attacker in further probing the username space. Typically, this | |||
problem is of most concern in protocols which transmit the user name | problem is of most concern in protocols that transmit the username in | |||
in clear-text across the Internet, such as in RADIUS, described in | clear-text across the Internet, such as in RADIUS, described in | |||
[RFC2865] and [RFC2866]. In order to prevent snooping of the user | [RFC2865] and [RFC2866]. In order to prevent snooping of the | |||
name, protocols may use confidentiality services provided by | username, protocols may use confidentiality services provided by | |||
protocols transporting them, such RADIUS protected by IPsec [RFC3579] | protocols transporting them, such as RADIUS protected by IPsec | |||
or Diameter protected by TLS [RFC3588]. | [RFC3579] or Diameter protected by TLS [RFC3588]. | |||
This specification adds the possibility of hiding the username part | This specification adds the possibility of hiding the username part | |||
in the NAI, by omitting it. As discussed in Section 2.3, this is | in the NAI, by omitting it. As discussed in Section 2.3, this is | |||
possible only when NAIs are used together with a separate | possible only when NAIs are used together with a separate | |||
authentication method that can transfer the username in a secure | authentication method that can transfer the username in a secure | |||
manner. In some cases application-specific privacy mechanism have | manner. In some cases, application-specific privacy mechanism have | |||
also been used with NAIs. For instance, some Extensible | also been used with NAIs. For instance, some Extensible | |||
Authentication Protocol (EAP) methods apply method-specific | Authentication Protocol (EAP) methods apply method-specific | |||
pseudonyms in the username part of the NAI [RFC3748]. While neither | pseudonyms in the username part of the NAI [RFC3748]. While neither | |||
of these approaches can protect the realm part, their advantage over | of these approaches can protect the realm part, their advantage over | |||
transport protection is that privacy of the username is protected | transport protection is that privacy of the username is protected, | |||
even through intermediate nodes such as NASes. | even through intermediate nodes such as NASes. | |||
4. IANA Considerations | 4. IANA Considerations | |||
In order to to avoid creating any new administrative procedures, | In order to avoid creating any new administrative procedures, | |||
administration of the NAI realm namespace piggybacks on the | administration of the NAI realm namespace piggybacks on the | |||
administration of the DNS namespace. | administration of the DNS namespace. | |||
NAI realm names are required to be unique and the rights to use a | NAI realm names are required to be unique, and the rights to use a | |||
given NAI realm for roaming purposes are obtained coincident with | given NAI realm for roaming purposes are obtained coincident with | |||
acquiring the rights to use a particular Fully Qualified Domain Name | acquiring the rights to use a particular Fully Qualified Domain Name | |||
(FQDN). Those wishing to use an NAI realm name should first acquire | (FQDN). Those wishing to use an NAI realm name should first acquire | |||
the rights to use the corresponding FQDN. Using an NAI realm without | the rights to use the corresponding FQDN. Using an NAI realm without | |||
ownership of the corresponding FQDN creates the possibility of | ownership of the corresponding FQDN creates the possibility of | |||
conflict and therefore is to be discouraged. | conflict and therefore is to be discouraged. | |||
Note that the use of an FQDN as the realm name does not require use | Note that the use of an FQDN as the realm name does not require use | |||
of the DNS for location of the authentication server. While Diameter | of the DNS for location of the authentication server. While Diameter | |||
[RFC3588] supports the use of DNS for location of authentication | [RFC3588] supports the use of DNS for location of authentication | |||
servers, existing RADIUS implementations typically use proxy | servers, existing RADIUS implementations typically use proxy | |||
configuration files in order to locate authentication servers within | configuration files in order to locate authentication servers within | |||
a domain and perform authentication routing. The implementations | a domain and perform authentication routing. The implementations | |||
described in [RFC2194] did not use DNS for location of the | described in [RFC2194] did not use DNS for location of the | |||
authentication server within a domain. Similarly, existing | authentication server within a domain. Similarly, existing | |||
implementations have not found a need for dynamic routing protocols, | implementations have not found a need for dynamic routing protocols | |||
or propagation of global routing information. Note also that there | or propagation of global routing information. Note also that there | |||
is no requirement that that the NAI represent a valid email address. | is no requirement that the NAI represent a valid email address. | |||
5. References | 5. References | |||
5.1 Normative References | 5.1. Normative References | |||
[RFC1035] Mockapetris, P., "Domain names - implementation and | [RFC1035] Mockapetris, P., "Domain names - implementation and | |||
specification", STD 13, RFC 1035, November 1987. | specification", STD 13, RFC 1035, November 1987. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
[RFC2234] Crocker, D. and P. Overell, "Augmented BNF for Syntax | [RFC4234] Crocker, D. and P. Overell, "Augmented BNF for | |||
Specifications: ABNF", RFC 2234, November 1997. | Syntax Specifications: ABNF", RFC 4234, October | |||
2005. | ||||
[RFC3490] Faltstrom, P., Hoffman, P., and A. Costello, | [RFC3490] Faltstrom, P., Hoffman, P., and A. Costello, | |||
"Internationalizing Domain Names in Applications (IDNA)", | "Internationalizing Domain Names in Applications | |||
RFC 3490, March 2003. | (IDNA)", RFC 3490, March 2003. | |||
[I-D.ietf-sasl-saslprep] | [RFC4013] Zeilenga, K., "SASLprep: Stringprep Profile for User | |||
Zeilenga, K., "SASLprep: Stringprep profile for user names | Names and Passwords", RFC 4013, February 2005. | |||
and passwords", draft-ietf-sasl-saslprep-10 (work in | ||||
progress), July 2004. | ||||
5.2 Informative References | 5.2. Informative References | |||
[RFC0821] Postel, J., "Simple Mail Transfer Protocol", STD 10, | [RFC0821] Postel, J., "Simple Mail Transfer Protocol", STD 10, | |||
RFC 821, August 1982. | RFC 821, August 1982. | |||
[RFC2194] Aboba, B., Lu, J., Alsop, J., Ding, J., and W. Wang, | [RFC2194] Aboba, B., Lu, J., Alsop, J., Ding, J., and W. Wang, | |||
"Review of Roaming Implementations", RFC 2194, | "Review of Roaming Implementations", RFC 2194, | |||
September 1997. | September 1997. | |||
[RFC2341] Valencia, A., Littlewood, M., and T. Kolar, "Cisco Layer | [RFC2341] Valencia, A., Littlewood, M., and T. Kolar, "Cisco | |||
Two Forwarding (Protocol) "L2F"", RFC 2341, May 1998. | Layer Two Forwarding (Protocol) "L2F"", RFC 2341, | |||
May 1998. | ||||
[RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the | [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for | |||
Internet Protocol", RFC 2401, November 1998. | the Internet Protocol", RFC 2401, November 1998. | |||
[RFC2486] Aboba, B. and M. Beadles, "The Network Access Identifier", | [RFC2486] Aboba, B. and M. Beadles, "The Network Access | |||
RFC 2486, January 1999. | Identifier", RFC 2486, January 1999. | |||
[RFC2637] Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, | [RFC2637] Hamzeh, K., Pall, G., Verthein, W., Taarud, J., | |||
W., and G. Zorn, "Point-to-Point Tunneling Protocol", | Little, W., and G. Zorn, "Point-to-Point Tunneling | |||
RFC 2637, July 1999. | Protocol", RFC 2637, July 1999. | |||
[RFC2661] Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, | [RFC2661] Townsley, W., Valencia, A., Rubens, A., Pall, G., | |||
G., and B. Palter, "Layer Two Tunneling Protocol "L2TP"", | Zorn, G., and B. Palter, "Layer Two Tunneling | |||
RFC 2661, August 1999. | Protocol "L2TP"", RFC 2661, August 1999. | |||
[RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, | [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, | |||
"Remote Authentication Dial In User Service (RADIUS)", | "Remote Authentication Dial In User Service | |||
RFC 2865, June 2000. | (RADIUS)", RFC 2865, June 2000. | |||
[RFC2866] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000. | ||||
[RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication | ||||
Dial In User Service) Support For Extensible | ||||
Authentication Protocol (EAP)", RFC 3579, September 2003. | ||||
[RFC3588] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. | ||||
Arkko, "Diameter Base Protocol", RFC 3588, September 2003. | ||||
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | ||||
Levkowetz, "Extensible Authentication Protocol (EAP)", | ||||
RFC 3748, June 2004. | ||||
[I-D.ietf-eap-netsel-problem] | ||||
Arkko, J. and B. Aboba, "Network Discovery and Selection | ||||
within the EAP Framework", | ||||
draft-ietf-eap-netsel-problem-02 (work in progress), | ||||
October 2004. | ||||
Authors' Addresses | ||||
Bernard Aboba | ||||
Microsoft | ||||
One Microsoft Way | ||||
Redmond, WA 98052 | ||||
USA | ||||
Email: bernarda@microsoft.com | ||||
Mark A. Beadles | ||||
SmartPipes | ||||
565 Metro Place South Suite 300 | ||||
Dublin OH 43017 | ||||
USA | ||||
Email: mbeadles@smartpipes.com | [RFC2866] Rigney, C., "RADIUS Accounting", RFC 2866, June | |||
2000. | ||||
Jari Arkko | [RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote | |||
Ericsson | Authentication Dial In User Service) Support For | |||
Jorvas 02420 | Extensible Authentication Protocol (EAP)", RFC 3579, | |||
Finland | September 2003. | |||
Email: jari.arkko@ericsson.com | [RFC3588] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., | |||
and J. Arkko, "Diameter Base Protocol", RFC 3588, | ||||
September 2003. | ||||
Pasi Eronen | [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., | |||
Nokia Research Center | and H. Levkowetz, "Extensible Authentication | |||
P.O. Box 407 | Protocol (EAP)", RFC 3748, June 2004. | |||
FIN-00045 Nokia Group | ||||
Finland | ||||
Email: pasi.eronen@nokia.com | [netsel-problem] Arkko, J. and B. Aboba, "Network Discovery and | |||
Selection Problem", Work in Progress, October 2005. | ||||
Appendix A. Changes from RFC 2486 | Appendix A. Changes from RFC 2486 | |||
This draft contains the following updates with respect to the | This document contains the following updates with respect to the | |||
original NAI definition in RFC 2486 [RFC2486]: | original NAI definition in RFC 2486 [RFC2486]: | |||
o International character set support has been added for both | o International character set support has been added for both | |||
usernames and realms. Note that this implies character codes 128 | usernames and realms. Note that this implies character codes 128 | |||
- 255 may be used in the username portion, which may be | - 255 may be used in the username portion, which may be | |||
unacceptable to nodes that only support RFC 2486. Many devices | unacceptable to nodes that only support RFC 2486. Many devices | |||
already allow this behaviour, however. | already allow this behaviour, however. | |||
o Username privacy support has been added. Note that NAIs without a | o Username privacy support has been added. Note that NAIs without a | |||
username (for privacy) may not be acceptable to RFC 2486 compliant | username (for privacy) may not be acceptable to RFC 2486-compliant | |||
nodes. Many devices already allow this behaviour, however. | nodes. Many devices already allow this behaviour, however. | |||
o A recommendation to support NAI length of at least 253 octets has | o A recommendation to support NAI length of at least 253 octets has | |||
been added, and compatibility considerations among NAI lengths in | been added, and compatibility considerations among NAI lengths in | |||
this specification and various AAA protocols are discussed. Note | this specification and various AAA protocols are discussed. Note | |||
that long NAIs may not be acceptable to RFC 2486 compliant nodes. | that long NAIs may not be acceptable to RFC 2486-compliant nodes. | |||
o The mediating network syntax and its implications have been fully | o The mediating network syntax and its implications have been fully | |||
described and not given only as an example. Note that this syntax | described and not given only as an example. Note that this syntax | |||
is not intended to be a full solution to network discovery and | is not intended to be a full solution to network discovery and | |||
selection needs as defined in [I-D.ietf-eap-netsel-problem]. | selection needs as defined in [netsel-problem]. Rather, it is | |||
Rather, it is intended as a clarification of RFC 2486. | intended as a clarification of RFC 2486. | |||
However, as discussed in Section 2.7, this specification requires | However, as discussed in Section 2.7, this specification requires | |||
that this syntax be applied only when there is explicit knowledge | that this syntax be applied only when there is explicit knowledge | |||
that the peer system supports such syntax. | that the peer system supports such syntax. | |||
o The realm BNF entry definition has been changed to avoid an error | o The realm BNF entry definition has been changed to avoid an error | |||
(infinite recursion) in the original specification. | (infinite recursion) in the original specification. | |||
o Several clarifications and improvements have been incorporated to | o Several clarifications and improvements have been incorporated | |||
the ABNF specification for NAIs. | into the ABNF specification for NAIs. | |||
Appendix B. Acknowledgements | Appendix B. Acknowledgements | |||
Thanks to Glen Zorn for many useful discussions of this problem | Thanks to Glen Zorn for many useful discussions of this problem | |||
space, and to Farid Adrangi for suggesting the representation of | space, and to Farid Adrangi for suggesting the representation of | |||
mediating networks in NAIs. Jonathan Rosenberg reported the BNF | mediating networks in NAIs. Jonathan Rosenberg reported the BNF | |||
error. Dale Worley suggested clarifications of the x and special BNF | error. Dale Worley suggested clarifications of the x and special BNF | |||
entries. Arne Norefors reported the length differences between RFC | entries. Arne Norefors reported the length differences between RFC | |||
2486 and RFC 2865. Paul Hoffman helped with the international | 2486 and RFC 2865. Paul Hoffman helped with the international | |||
character set issues. Kalle Tammela, Stefaan De Cnodder, Nagi | character set issues. Kalle Tammela, Stefaan De Cnodder, Nagi | |||
Jonnala, Bert Wijnen, Blair Bullock, Yoshihiro Ohba, Ignacio Goyret, | Jonnala, Bert Wijnen, Blair Bullock, Yoshihiro Ohba, Ignacio Goyret, | |||
John Loughney, Henrik Levkowetz, Ted Hardie, Bill Fenner, Sam | John Loughney, Henrik Levkowetz, Ted Hardie, Bill Fenner, Sam | |||
Hartman, and Richard Perlman provided many useful comments on this | Hartman, and Richard Perlman provided many useful comments on this | |||
draft. The ABNF validator at http://www.apps.ietf.org/abnf.html was | document. The ABNF validator at http://www.apps.ietf.org/abnf.html | |||
used to verify the syntactic correctness of the ABNF in Section 2.1. | was used to verify the syntactic correctness of the ABNF in | |||
Section 2.1. | ||||
Intellectual Property Statement | Authors' Addresses | |||
Bernard Aboba | ||||
Microsoft | ||||
One Microsoft Way | ||||
Redmond, WA 98052 | ||||
USA | ||||
EMail: bernarda@microsoft.com | ||||
Mark A. Beadles | ||||
ENDFORCE | ||||
565 Metro Place South Suite 300 | ||||
Dublin OH 43017 | ||||
USA | ||||
EMail: mbeadles@endforce.com | ||||
Jari Arkko | ||||
Ericsson | ||||
Jorvas 02420 | ||||
Finland | ||||
EMail: jari.arkko@ericsson.com | ||||
Pasi Eronen | ||||
Nokia Research Center | ||||
P.O. Box 407 | ||||
FIN-00045 Nokia Group | ||||
Finland | ||||
EMail: pasi.eronen@nokia.com | ||||
Full Copyright Statement | ||||
Copyright (C) The Internet Society (2005). | ||||
This document is subject to the rights, licenses and restrictions | ||||
contained in BCP 78, and except as set forth therein, the authors | ||||
retain all their rights. | ||||
This document and the information contained herein are provided on an | ||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | ||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | ||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | ||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | ||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
Intellectual Property | ||||
The IETF takes no position regarding the validity or scope of any | The IETF takes no position regarding the validity or scope of any | |||
Intellectual Property Rights or other rights that might be claimed to | Intellectual Property Rights or other rights that might be claimed to | |||
pertain to the implementation or use of the technology described in | pertain to the implementation or use of the technology described in | |||
this document or the extent to which any license under such rights | this document or the extent to which any license under such rights | |||
might or might not be available; nor does it represent that it has | might or might not be available; nor does it represent that it has | |||
made any independent effort to identify any such rights. Information | made any independent effort to identify any such rights. Information | |||
on the procedures with respect to rights in RFC documents can be | on the procedures with respect to rights in RFC documents can be | |||
found in BCP 78 and BCP 79. | found in BCP 78 and BCP 79. | |||
Copies of IPR disclosures made to the IETF Secretariat and any | Copies of IPR disclosures made to the IETF Secretariat and any | |||
assurances of licenses to be made available, or the result of an | assurances of licenses to be made available, or the result of an | |||
attempt made to obtain a general license or permission for the use of | attempt made to obtain a general license or permission for the use of | |||
such proprietary rights by implementers or users of this | such proprietary rights by implementers or users of this | |||
specification can be obtained from the IETF on-line IPR repository at | specification can be obtained from the IETF on-line IPR repository at | |||
http://www.ietf.org/ipr. | http://www.ietf.org/ipr. | |||
The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
rights that may cover technology that may be required to implement | rights that may cover technology that may be required to implement | |||
this standard. Please address the information to the IETF at | this standard. Please address the information to the IETF at ietf- | |||
ietf-ipr@ietf.org. | ipr@ietf.org. | |||
Disclaimer of Validity | ||||
This document and the information contained herein are provided on an | ||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | ||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | ||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | ||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | ||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
Copyright Statement | ||||
Copyright (C) The Internet Society (2005). This document is subject | ||||
to the rights, licenses and restrictions contained in BCP 78, and | ||||
except as set forth therein, the authors retain all their rights. | ||||
Acknowledgment | Acknowledgement | |||
Funding for the RFC Editor function is currently provided by the | Funding for the RFC Editor function is currently provided by the | |||
Internet Society. | Internet Society. | |||
End of changes. 80 change blocks. | ||||
237 lines changed or deleted | 220 lines changed or added | |||
This html diff was produced by rfcdiff 1.28, available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |