One document matched: draft-haddad-privacy-omipv6-anonymity-00.txt
Internet Engineering Task Force Wassim Haddad
Mobility Privacy Suresh Krishnan
Internet Draft Ericsson Research
Expires December 2005 Francis Dupont
Point6
Marcelo Bagnulo
UC3M
Hannes Tschofenig
Siemens
June 2005
Anonymity and Unlinkability Extension for CGA-OMIPv6
<draft-haddad-privacy-omipv6-anonymity-00>
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with section 6 of BCP 79.
This document is an Internet Draft and is in full conformance with
all provisions of Section 10 of RFC 2026.
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its
areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-
Drafts as reference material or to cite them other than as
"work in progress."
The list of current Internet Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Distribution of this memo is unlimited
Abstract
The "Optimized Mobile IPv6 with CGA" [CGA-OMIPv6] protocol
specifies a new route optimization (RO) technique. This document
describes a new extension to be added to the CGA-OMIPv6 protocol
in order to provide the anonymity and the unlinkability at the
IP layer.
Haddad, et al. Expires December 2005 [Page 1]
INTERNET-DRAFT OMIPv6 Privacy June 2005
Table of contents
1. Introduction................................................2
2. Terminology.................................................2
3. Glossary....................................................3
4. Problem Statement...........................................4
5. Proposed Solution...........................................6
6. Packet Format...............................................9
7. Privacy Considerations.....................................11
8. Security Considerations....................................12
9. Normative References.......................................13
10. Informative References....................................13
11. Authors' Addresses........................................14
Intellectual Property Statement...............................16
Disclaimer of Validity........................................16
Copyright Statement...........................................16
1. Introduction
CGA-OMIPv6 (called "OMIPv6" in the rest of the document for
simplicity) protocol specifies a new route optimization (RO),
which reduces the amount of signaling messages, the handover
latency and improves the overall security.
However, OMIPv6 protocol lacks privacy support, namely
anonymity/pseudonymity and unlinkability. Supporting these
privacy aspects in OMIPv6 would allow a mobile user to move
outside its home network without disclosing its real IPv6 home
address, and thereby to prevent the ability to correlate
actions at this layer.
This document describes privacy extensions to the OMIPv6
protocol.
2. Terminology
The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", "MAY"
in this document are to be interpreted as described in RFC 2219
[TERM].
Haddad, et al. Expires December 2005 [Page 2]
INTERNET-DRAFT OMIPv6 Privacy June 2005
3. Glossary
Anonymity
Anonymity ensures that a user may use a resource or service
without disclosing the user's identity.
Anonymity in wireless networks means that neither the mobile
node nor its system software shall by default expose any
information, that allows any conclusions on the owner or
current use of the node.
Consequently, in scenarios where a device and/or network
identifiers are used (e.g., MAC address, IP address),
neither the communication partner nor any outside attacker
should be able to disclose the relationship between the
respective identifier and the user's identity.
Pseudonymity
Pseudonymity is a weaker property related to anonymity. It
means that one cannot identify an entity, but it may be
possible to prove that two pseudonymous acts were performed
by the same entity.
Unlinkability
Two events are unlinkable if they are no more and no less
related than they are related concerning the a-priori
knowledge.
Unlinkability ensures that a user may make use of resources
or services without others being able to link the use of
these services together.
In hiding the mobile node's current location, unlinkability
feature removes any possible correlation between two
successive IP handovers performed by the same mobile node.
For more information about privacy aspects and location privacy
please refer to [MOMIPRIV].
Haddad, et al. Expires December 2005 [Page 3]
INTERNET-DRAFT OMIPv6 Privacy June 2005
4. Problem Statement
OMIPv6 protocol introduces a new route optimization (RO) mode,
which reduces the load of signaling messages, i.e., mainly by
eliminating the HoTI/HoT messages, offers a semi-permanent
security association (SA) between the mobile node (MN) and the
correspondent node (CN) and improves the overall security of
the MN <-> CN communication.
However, OMIPv6 allows the CN and any potential eavesdropper
located on the path between the MN and the CN to first identify
the mobile node via its IPv6 Home Address (HoA) and then to
trace its movements in real time across the Internet, thus
seriously violating its privacy. Such scenario is feasible by
simply looking into the Binding Update (BU) message(s) sent by
the MN to the CN, which carries among other parameters, the MN's
HoA and its new current topological location, i.e., disclosed in
its care-of address (CoA).
In addition to the BU message(s), the eavesdropper can learn
and trace the MN's movements by looking into the data packets
exchanged with the CN.
In fact, the main RO mode (detailed in [MIPv6]) defined two
mobility extension headers, which carry the MN's home address.
The first one is the Home Address Option (HAO) and is inserted
in each data packet sent by the MN to the CN on the direct path.
The second one is a Routing Header (RH) and is inserted in each
data packet sent by the CN to the MN on the direct path.
Based on the above, it appears that in order to keep the
exchange of data packets between the two endpoints flowing on
the direct path, only the home address can be hidden from both
the CN and any potential eavesdropper(s) located on the direct
path.
Consequently, any solution for the privacy problem in OMIPv6
MUST prevent the CN from falling back to the bidirectional (BT)
mode under any circumstance(s), since data packets sent by the
CN are addressed to the MN's HoA. The BT mode is detailed in
[MIPv6].
But it should be noted that replacing the real MN's HoA with a
static (or even dynamic) pseudo-HoA can still allow the
eavesdropper to correlate between MN's movements across the
Internet, thus breaking the unlinkability feature. Such
correlation can be accomplished by simply tracing the BU
messages via the sequence number carried by each message. The
seriousness of such correlation is tightly related to how
difficult is for the eavesdropper to discover the MN's real HoA
(e.g., based on prior knowledge and/or other identifier(s),
which are already known or can be discovered at a further stage,
Haddad, et al. Expires December 2005 [Page 4]
INTERNET-DRAFT OMIPv6 Privacy June 2005
etc). In fact, such knowledge can reveal all MN's pseudo-HAs and
their corresponding CoAs as well as the exact time of each
movement.
The unlinkability feature can also be broken if an eavesdropper
is able to correlate between two data packets exchanged between
the MN and the CN and carrying different CoAs, but associated to
the same pseudo-HoA. Such correlation may reveal the exact time
of the MN's movement(s) regardless of the content of the BU
message. In addition, tracing the BU message may also help the
eavesdropper correlate between the MIPv6 signaling messages and
the data packets (namely the pseudo-HoA and/or CoA carried by
the BU message with the address(es) carried by the data packet.
Consequently, we argue that any solution for privacy related
to the network layer mobility only should also offer the
unlinkability feature by fulfilling the following requirements:
- prevent disclosing the MN's HoA in any BU message.
- avoid using the same pseudo-HoA in more than one BU
message.
- prevent the possibility of tracing the BU messages via the
sequence number.
- prevent any correlation between data packets exchanged
with the current CoA and the next BU message sent after
performing an IP handover.
- prevent any correlation between data carried by the BU
message and data packets exchanged after receiving the BA
message.
Finally, it should be noted that any potential solution, which
addresses privacy as motivated above, should take the scenario
where a mobile node starts communicating end-to-end with a CN
from its home network before switching to a foreign network(s)
into consideration.
Haddad, et al. Expires December 2005 [Page 5]
INTERNET-DRAFT OMIPv6 Privacy June 2005
5. Proposed Solution
Our suggested solution can be used regardless of whether the MN
is establishing its session from its home network or from a
visited network. It consists of three components:
a) the "P" bit that is carried in the Pre-Binding Update (PBU),
the Pre-Binding Test (PBT) and the Binding Update (BU)
message; this bit demands additional processing guidelines
(including sequence number handling).
b) replacing the home address carried within the Home Address
Option (HAO) with an ephemeral identifier.
c) associating the interface identifier (iid) of the MN's home
address with the cryptographically-Based Identifiers (CBID).
As a first step, a Pre-Binding Update (PBU) message is sent
directly from the MN to the CN. The PBU message carried a newly
introduced Privacy (P) bit set and thereby asks the CN to skip
any home address test, and also to avoid any possible fallback
to the bidirectional tunneling mode (described in [MIPv6])
during the subsequent data exchange.
The MN MUST set the "P" bit in the PBU message, regardless of
the MN's location (also while staying at the home network), and
in the BU message sent after receiving the Pre-Binding Test
(PBT) message from the CN.
Additionally, the MN MUST replace the home address inserted in
the Home Address Option (HAO) with a "Virtual Home Address"
(VHoA). The VHoA sent in the first BU message MUST be a
statistically unique cryptographically generated and verifiable
identifier [CBID]. Note that using the CBID technology in Mobile
IPv6 for privacy purposes has been introduced in [MIPriv].
During the first exchange of signaling messages between the two
endpoints, and in order to enable the CN to check if it is still
talking to the same MN when receiving the first BU message, the
MN MUST insert in the PBU message the value obtained from
hashing the VHoA (note that in this case, the VHoA is the CBID,
thus the value is equal to SHA1(CBID) in the PBU message.
After receiving the PBU message, the CN computes a challenge
from the MN's CoA, the content of the HAO and a local secret.
Then it inserts the challenge into the PBT message and returns
it to the MN. When the MN gets the PBT message, it sends a BU
message carrying the "P" bit, the challenge and inserts the real
CBID into the HAO. Note that the iid of the MN's CoA sent in the
Haddad, et al. Expires December 2005 [Page 6]
INTERNET-DRAFT OMIPv6 Privacy June 2005
PBU and the BU messages SHOULD be generated from hashing the
CBID in the following way:
iid(CoA) = First(64, SHA1(CBID))
Where:
- SHA1 is a hashing function
- CBID is a cryptographically generated identifier
- First(size,input) is a function used to indicate
truncation of the input data so that only the first
size bits remain to be used.
- iid is the interface identifier
Upon receiving the first BU message with the "P" bit set, the CN
starts by checking its validity. For this purpose, it will hash
the content of the HAO, i.e., the CBID, and compares the first
64 bits of the resulting hash with the CoA's iid. After that, it
will re-compute the challenge and compare it to the one sent in
the message. The third step after a successful validation would
be to create an entry in the BCE for the MN's VHoA and the CoA.
The CN computes also a long lifetime shared secret (i.e., SKbm)
and sends it back to the MN in the BA message as described in
[OMIPv6].
The presence of the "P" bit in the BU message is also used to
request the CN to replace the sequence number carried by the BU
message, in its BCE with the "next" value, i.e., expected in
the next BU message sent by the MN. Such value is called the
"Sequence Value" SQV and is used to prevent replay attacks and
to allow the CN to identify the MN's corresponding entry in its
BCEs when processing a BU message carrying the "P" bit.
In OMIPv6, each time the MN sends a BU message, it MUST
increment the sequence number. With the privacy extensions
introduced by this document, both endpoints MUST increment the
SQV with a constant value equal to the one obtained from hashing
the SKbm. Finally, the incremented SQV is hashed, inserted by
the MN into the BU message and sent it to the CN.
The two entities MUST compute the next SQV (nSQV) in the
following way:
Khbm = SHA1(SKbm)
nSQV = First(64, SHA1((pSQV) | Khbm))
Where:
Haddad, et al. Expires December 2005 [Page 7]
INTERNET-DRAFT OMIPv6 Privacy June 2005
- SKbm is a long lifetime binding management key
- Khbm is the hashed binding management key
- pSQV is the previous SQV, i.e., SQV sent in the last BU
message sent by the MN and already processed by the CN.
- nSQV is the hasht value of the next SQV computed during
updating the BCE with the BU message carrying the pSQV.
The CN MUST compute and store the nSQV during creating/updating
the MN's entry in its BCE, and the MN MUST compute and send a
new SQV in all subsequent BU messages sent to the CN.
In addition, all subsequent BU messages sent after the first
one, SHOULD carry a VHoA, which is generated from hashing the
nCoA, i.e., nVHoA is equal to SHA1(nCoA), sent in the message.
However, it should be noted that the CN SHOULD NOT store in the
MN's corresponding entry the new CoA (nCoA) and new VHoA (nVHoA)
carried in the BU message. In fact, besides computing the nSQV
and storing it in the corresponding entry, the CN SHOULD also
compute another address pair (CoA, VHoA) to be used in the data
packets exchange following the BCE creation/update. These two
addresses are called "expected CoA" (eCoA) and "expected VHoA"
(eVHoA).
The two expected addresses are computed in the following way:
iid(eCoA) = First(64, SHA1(Khbm | nCoA Subnet Prefix))
eVHoA = SHA1(eCoA)
Where:
- nCoA is the MN's care-of address sent in the BU message.
- eVHoA is the pseudo-home address carried in the HAO and
RH headers in all data packets.
The subnet prefix of the nCoA MUST be the same as the one sent
by the MN in the BU message (note that this technique is similar
to the one defined in [HBA]). Note that in such scenario, the CN
MUST update the MN's entry in its BCE with the eCoA and eVHoA.
However, the BA message sent to the MN MUST carry the nCoA and
nVHoA.
As mentioned above, when the MN sends a BU message carrying the
"P" bit, the SQV MUST be used alone by the CN to detect the
presence of an entry corresponding to the MN in its BCE. If an
entry containing the same SQV is found, then the CN SHOULD
proceed to check the signature before updating the corresponding
entry with the eCoA, eVHoA and nSQV.
Haddad, et al. Expires December 2005 [Page 8]
INTERNET-DRAFT OMIPv6 Privacy June 2005
6. Packet Format
This proposal defines a new bit called the Privacy (P) bit to be
added to the Pre-BU and BU messages. The MN MUST set the "P" bit
in both messages and in all subsequent BU messages as long as it
needs to keep its real home IP address undisclosed.
When used in the Pre-BU message, the "P" bit indicates to the CN
to limit the address test to the CoA only and also to include
the VHoA in computing the nonce value sent in the Pre-Binding
Test (PBT) message.
When used in the BU message, the "P" bit is used for three
different purposes. The first one is to ask the CN to use the
sequence number to locate the MN's corresponding BCE. The second
one is to notify the CN to NOT send any data packet carrying the
MN's home pseudo-address, i.e., VHAO, as destination address.
The third purpose is to ask the CN to compute the eCoA, the
eVHoA, the new SQV and store them in the MN's corresponding BCE.
When used in the Pre-BU message, the structure of the message
will be as it follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|P| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Care-of Address +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Pre-Binding Update Cookie +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility Options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Haddad, et al. Expires December 2005 [Page 9]
NTERNET-DRAFT OMIPv6 Privacy June 2005
The different fields carried in the Pre-BU message are detailed
in [OMIPv6].
When used in the BU message, the structure of the message will
be as it follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|A|H|L|K|P| Reserved | Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The different fields carried in the BU message are detailed in
[MIPv6].
Haddad, et al. Expires December 2005 [Page 10]
INTERNET-DRAFT OMIPv6 Privacy June 2005
7. Privacy Considerations
This memo describes an extension, which makes the MN's real
identity anonymous for both the CN and any malicious
eavesdropper(s) located on the path between the MN and the CN.
Our solution aims to present the MN's HoA as any other CoA that
the MN may use during its movements across the Internet.
However, our solution is based on the assumption that the BU
messages exchanged between the MN and its HA are protected with
an ESP tunnel according to [MIP6-IKE] and [MIP6-IKEv2].
The suggested solution provides the anonymity feature to the MN
during exchanging data packets and signaling messages with the
CN. It also provides the unlinkability feature during and after
performing IP handovers, by making it difficult for an
eavesdropper to correlate between two successive IP handoffs
performed by the same MN. The unlinkability between these events
aims to enhance the anonymity feature.
However, it should be noted that the unlinkability protection is
limited against eavesdroppers located on the path between the MN
and the CN and does not prevent the CN to trace the MN's
movements in real time.
The suggested solution allows the MN to select when and where
the anonymity feature should be activated. But it should be
noted that it works only when the MN initiates the session.
Actually, when the CN initiates the session, it uses the MN's
home address (HoA). In such scenario, the MN can hide its
current location from the CN by switching to the bidirectional
tunneling mode.
It is worth mentioning that the anonymity concept is very much
context dependent. In order to quantify anonymity with concrete
situations, one would have to describe the system context, which
is practically not always possible for large open systems
[ANON].
Consequently, the efficiency of the suggested solution is
strongly related to two key factors: the diversity and load of
the traffic circulating in parallel with the MN's traffic, on
the same portion(s) of the direct path, which is monitored by an
eavesdropper(s).
Finally, the suggested solution strongly recommends using the
Privacy Extension proposal [PRIVACY], in configuring the care-of
address(es) sent by the MN in all BU messages except for the BU
message sent after receiving a PBT message, i.e., in which the
CoA is derived from the CBID.
Haddad, et al. Expires December 2005 [Page 11]
INTERNET-DRAFT OMIPv6 Privacy June 2005
8. Security Considerations
The suggested solution does not introduce new attacks nor does
it amplify threats. However, it is important to mention that it
makes the switch to the MIPv6 BT mode impossible.
The suggested solution aims to hide the mobile user's real
identity when moving outside its home network or from its home
network to foreign networks. Making the MN anonymous (with
regard to the used home address) to potential eavesdroppers may
help to prevent attacks, thus improves the overall security.
Haddad, et al. Expires December 2005 [Page 12]
INTERNET-DRAFT OMIPv6 Privacy June 2005
9. Normative References
[CGA-OMIPv6] W. Haddad, L. Madour, J. Arkko and F. Dupont,
"Applying Cryptographically Generated Addresses to
Optimize MIPv6 (CGA-OMIPv6)",
draft-haddad-mip6-cga-omipv6-04, May, 2005.
[MIPv6] D. Johnson, C. Perkins and J. Arkko, "Mobility
Support in IPv6", RFC 3775, June 2004.
[MIP6-IKE] J. Arkko, V. Devarapalli, F. Dupont, "Using IPsec
to Protect Mobile IPv6 Signaling Between Mobile
Nodes and Home Agents", RFC 3776, June 2004.
[MIP6-IKEv2] V. Devarapalli, "Mobile IPv6 Operation with IKEv2
and the revised IPsec Architecture",
draft-ietf-mip6-ikev2-ipsec-01, February 2005.
[TERM] S. Bradner, "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
10. Informative References
[ANON] A. Pfitzmann et al. "Anonymity, Unobservability,
Pseudonymity, and Identity Management - A Proposal
for Terminology", Draft v0.21, September, 2004.
[CBID] G. Montenegro, C. Castelluccia, "Cryptographically-
Based Identifiers (CBID): Concepts and Applications",
ACM Transaction on Information and System Security
(TISSEC), February 2004.
[HBA] M. Bagnulo, "Hash Based Addresses (HBA)",
draft-ietf-multi6-hba-00, December 2004.
[MIPriv] C. Castelluccia, F. Dupont, G. Montenegro, "A Simple
Privacy Extension to Mobile IPv6", IEEE/IFIP
International Conference on Mobile and Wireless
Communication Networks (MWCN), Paris, France, October
Haddad, et al. Expires December 2005 [Page 13]
INTERNET-DRAFT OMIPv6 Privacy June 2005
2004.
[MOMIPRIV] W. Haddad, E. Nordmark, F. Dupont, M. Bagnulo, S.
Park and B. Patil, "Privacy for Mobile and
Multi-homed Nodes: MoMiPriv Problem Statement",
draft-haddad-momipriv-problem-statement-01,
February 2005.
[PRIVACY] T. Narten, R. Draves and S. Krishnan, "Privacy
Extensions for Stateless Address Autoconfiguration
in IPv6", draft-ietf-ipv6-privacy-address-v2-04,
May 2005.
11. Authors' Addresses
Wassim Haddad
Ericsson Research
8400, Decarie Blvd
Town of Mount Royal
Quebec H4P 2N2
Canada
Phone: +1 514 345 7900 (#2334)
E-Mail: Wassim.Haddad@ericsson.com
Suresh Krishnan
Ericsson Research
8400, Decarie Blvd
Town of Mount Royal
Quebec H4P 2N2
Canada
Phone: +1 514 345 7900 (#2871)
E-Mail: Suresh.Krishnan@ericsson.com
Francis Dupont
Point6
c/o GET/ENST Bretagne
Campus de Rennes
2, rue de la Chataigneraie
CS 17607
35576 Cesson-Sevigne Cedex
France
Haddad, et al. Expires December 2005 [Page 14]
INTERNET-DRAFT OMIPv6 Privacy June 2005
E-Mail: Francis.Dupont@enst-bretagne.fr
Marcelo Bagnulo
Universidad Carlos III de Madrid
Av. Universidad 30
Leganes, Madrid 28911
SPAIN
Phone: +34 91 6249500
E-Mail: marcelo@it.uc3m.es
URI: http://www.it.uc3m.es
Hannes Tschofenig
Siemens AG
Otto-Hahn-Ring 6
81739 Munich
Germany
EMail: Hannes.Tschofenig@siemens.com
Haddad, et al. Expires December 2005 [Page 15]
INTERNET-DRAFT OMIPv6 Privacy June 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of
any Intellectual Property Rights or other rights that might be
claimed to pertain to the implementation or use of the
technology described in this document or the extent to which any
license under such rights might or might not be available; nor
does it represent that it has made any independent effort to
identify any such rights. Information on the IETF's procedures
with respect to rights in IETF Documents can be found in BCP 78
and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the
use of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR
repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention
any copyrights, patents or patent applications, or other
proprietary rights that may cover technology that may be
required to implement this standard. Please address the
information to the IETF at ietf-ipr@ietf.org.
The IETF has been notified of intellectual property rights
claimed in regard to some or all of the specification contained
in this document. For more information consult the online list
of claimed rights.
Disclaimer of Validity
This document and the information contained herein are provided
on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY
THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY
RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is
subject to the rights, licenses and restrictions contained in
BCP 78, and except as set forth therein, the authors retain all
their rights.
Haddad, et al. Expires December 2005 [Page 16]
| PAFTECH AB 2003-2026 | 2026-04-21 02:04:25 |