One document matched: draft-thomson-domain-auth-00.txt



GEOPRIV WG                                                    M. Thomson
Internet-Draft                                           J. Winterbottom
Expires: July 2, 2005                                    Nortel Networks
                                                            January 2005


                    Domain Authorization for PIDF-LO
                    draft-thomson-domain-auth-00.txt

Status of this Memo

   This document is an Internet-Draft and is subject to all provisions
   of section 3 of RFC 3667.  By submitting this Internet-Draft, each
   author represents that any applicable patent or other IPR claims of
   which he or she is aware have been or will be disclosed, and any of
   which he or she become aware will be disclosed, in accordance with
   RFC 3668.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on July 2, 2005.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document describes a standard method for digitally signing
   Presence Information Data Format Location Object (PIDF-LO) documents
   using a subset of the XML Digital Signature specification.  A digital
   signature enables the user of a signed PIDF-LO document to attribute
   that information to an authorized source within the domain of the
   target entity.  A schema is defined for including a domain
   authorization element in the PIDF-LO and a set of XPath filters for



Thomson & Winterbottom    Expires July 2, 2005                  [Page 1]

Internet-Draft                Domain Auth.                  January 2005


   selecting the correct elements for signing.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1   Conventions used in this document  . . . . . . . . . . . .  3
   2.  The Domain Authorization Element . . . . . . . . . . . . . . .  4
     2.1   'expires' attribute  . . . . . . . . . . . . . . . . . . .  4
   3.  Signature Elements . . . . . . . . . . . . . . . . . . . . . .  5
     3.1   PIDF-LO Document Transform . . . . . . . . . . . . . . . .  5
     3.2   Algorithms . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.3   Signature Key Data . . . . . . . . . . . . . . . . . . . .  6
   4.  XML Definitions  . . . . . . . . . . . . . . . . . . . . . . .  7
     4.1   XML Schema . . . . . . . . . . . . . . . . . . . . . . . .  7
     4.2   XPath Filter . . . . . . . . . . . . . . . . . . . . . . .  8
   5.  Examples . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 12
   7.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 13
     7.1   URN Sub-Namespace Registration for
           urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth  . . . . 13
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 13
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 14
       Intellectual Property and Copyright Statements . . . . . . . . 15




























Thomson & Winterbottom    Expires July 2, 2005                  [Page 2]

Internet-Draft                Domain Auth.                  January 2005


1.  Introduction

   Users of location information may desire to be able to attribute this
   information to an authorized entity.  This entity may not have
   provided the information, but they must be able to vouch for its
   accuracy.  In most cases this will mean that the trusted entity
   resides within the same domain, or access network, as the target
   entity.

   This specification describes a means by which a domain authority may
   assume responsibility for the validity of the location information
   provided in a PIDF-LO [I-D.ietf-geopriv-pidf-lo].  A standard form is
   described whereby a domain authority may digitally sign the PIDF-LO
   document.  This signature ensures that a user of the PIDF-LO can
   verify that the presentity identified is at the described location
   within certain time bounds.

   Only selected data are signed within a PIDF, allowing a user freedom
   to change other parts of the document without affecting the
   signature.  A signature only applies to a single tuple element,
   allowing separate tuples to be unsigned, or to be signed separately.
   Elements such as notes, contact information and the privacy
   preferences described in [I-D.ietf-geopriv-pidf-lo] are not signed to
   allow for modification.  The signed elements are restricted to:
   the presentity identifier: the entity attribute of the *presence*
      element.
   timestamp: the timestamp associated with the location information
   location-info: the actual location information
   expires: the time at which the signature expires, this datum is added
      by this specification

1.1  Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

   The term *presentity* is used as defined in RFC 2778 [RFC2778].

   The term *location user* is used to refer to the entity that is
   consuming location information.  In the context of RFC 2778
   [RFC2778], the location user may be a watcher.

   The term *domain authority* is used to refer to the entity that
   assumes responsibility for the accuracy of the information provided
   in the PIDF-LO.





Thomson & Winterbottom    Expires July 2, 2005                  [Page 3]

Internet-Draft                Domain Auth.                  January 2005


2.  The Domain Authorization Element

   This specification describes a new namespace for a domain
   authorization element.  This element contains the digital signature
   described in RFC 3275 [RFC3275] and an expiry time for the signature.

   The "domain-auth" element is added to the "tuple" element that
   contains the "geopriv" element.  Separate "tuple" elements are signed
   separately.  The XML Schema definition for the "domain-auth" element
   is included in Section 4.1.

   The digital signature signs the PIDF-LO document that includes only
   the "tuple" element that the "domain-auth" element is included
   within.  Section 3.1 describes the specific means by which the
   correct elements are selected.

2.1  'expires' attribute

   The "expires" attribute defines the expiry time for the domain
   authorization provided.  A user of the PIDF-LO document MUST consider
   the document to be unsigned beyond the expiry time.






























Thomson & Winterbottom    Expires July 2, 2005                  [Page 4]

Internet-Draft                Domain Auth.                  January 2005


3.  Signature Elements

   The XML Signature specification [RFC3275] describes a means to sign
   XML documents.  The "Signature" element consists of three major
   parts:
   1.  a description of the signed elements, which may be an entire
       document, or selected parts of a document
   2.  a digital signature
   3.  information on the key used to sign the document

3.1  PIDF-LO Document Transform

   Since the content of XML documents is indeterminate based on similar
   data sets, RFC 3275 [RFC3275] describes a set of transforms that may
   be applied to a document before applying a digital signature.

   The input PIDF-LO document MUST be canonicalized using the standard
   algorithm ("http://www.w3.org/TR/2001/REC-xml-c14n-20010315").  Note
   that this canonicalization method removes comments from the source
   document.

   The signature form selected for this document is an enveloped
   signature.  Therefore the enveloped signature transform
   ("http://www.w3.org/2000/09/xmldsig#enveloped-signature") MUST be
   applied to the document.

   A filter is applied to the input document in order to select the
   correct elements for signing.  It is RECOMMENDED that the transformed
   document is also a valid PIDF-LO.  In addition, the transform should
   exclude "tuple" elements other than the element that is directly
   signed.  This ensures that other content may be included in other
   "tuple" elements, including other digital signatures.

   The following elements MUST be selected:
   o  the "presence" element, which includes the "entity" attribute
   o  the "location-info" element and all of its contents
   o  the "timestamp" element associated with the signed "tuple" element
   o  the "domain-auth" element
   The minimum set of elements required to ensure that the signed
   document is a valid PIDF-LO SHOULD also be included.

   The XPath filter defined in Section 4.2 meets the above criteria.
   For convenience, and to reduce the size of a signed PIDF-LO document,
   this transform may be identified by the URN
   "urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth#PIDF-LO".

   Note that any elements from other namespaces included within the
   "domain-auth" element are selected by this XPath filter.  This



Thomson & Winterbottom    Expires July 2, 2005                  [Page 5]

Internet-Draft                Domain Auth.                  January 2005


   ensures that additions to this element are covered by the digital
   signature.

3.2  Algorithms

   As recommended in RFC 3275 [RFC3275], implementations of this
   specification MUST provide the following algorithms:
   digest algorithm: The SHA1 digest, as identified by the URN
      "http://www.w3.org/2000/09/xmldsig#sha1".
   signature algorithm: DSA with SHA1, as identified by the URN
      "http://www.w3.org/2000/09/xmldsig#rsa-sha1".
   canonicalization method: Canonical XML [RFC3076], as identified by
      the URN "http://www.w3.org/TR/2001/REC-xml-c14n-20010315".
   transforms: The enveloped signature transform, as identified by the
      URN "http://www.w3.org/2000/09/xmldsig#enveloped-signature"; and
      the XPath filter transform, as identified by the URN
      "http://www.w3.org/TR/1999/REC-xpath-19991116".

   It is RECOMMENDED that the PKCS1 (RSA-SHA1) signature algorithm, as
   idenfied by "http://www.w3.org/2000/09/xmldsig#rsa-sha1", is also
   supported.

3.3  Signature Key Data

   RFC 3275 [RFC3275] describes a number of methods for describing the
   key used to sign the document.  For this specification, the "KeyInfo"
   element MUST be provided in the "Signature" element.

   The domain authority MUST also describe a means to retrieve an X.509
   certificate that includes the key used to sign the document.  This
   can be either by including an "X509Certificate" element, or by
   referencing another certificate.

   A reference to a certificate within the same document may be made
   using the "X509SubjectName" element or a fragment identifier URI.  A
   fragment identifier URI might be applicable where multiple signatures
   are applied to different parts of the document.  External certificate
   sources SHOULD be described by URI only in the "RetrievalMethod"
   element.  It is RECOMMENDED that the scheme for the RetrievalMethod
   URI indicates a secure protocol, such as HTTPS.

   The domain authority MAY include additional information in the
   "KeyInfo" element that could assist the location user in validating
   the certificate.  For example a certificate chain and certificate
   revocation list may be added.  However, this specification does not
   specify how the location user validates the certificate.





Thomson & Winterbottom    Expires July 2, 2005                  [Page 6]

Internet-Draft                Domain Auth.                  January 2005


4.  XML Definitions

4.1  XML Schema

   The following XML schema describes the "domain-auth" element.  This
   schema defines a new namespace:
   "urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth".

   <?xml version="1.0"?>
   <xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
     targetNamespace="urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth"
     xmlns="urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth"
     xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"
     elementFormDefault="unqualified"
     attributeFormDefault="unqualified">

     <xsd:import namespace="http://www.w3.org/2000/09/xmldsig#"/>

     <xsd:annotation>
       <xsd:documentation>
         This schema defines a means for providing authentication to a
         PIDF-LO.  This schema is also accompanied by a set of
         transforms that should be applied to the signed PIDF-LO.
       </xsd:documentation>
     </xsd:annotation>

     <xsd:element name="domain-auth">
       <xsd:annotation>
         <xsd:documentation>
           The domain authorization that is applied to the PIDF-LO.
           This element should be included within the scope of a
           <tuple> element.
         </xsd:documentation>
       </xsd:annotation>
       <xsd:complexType>
         <xsd:complexContent>
           <xsd:restriction base="xsd:anyType">
             <xsd:sequence>
               <xsd:element ref="dsig:Signature"/>
               <xsd:any namespace="##other" processContents="lax"
                        minOccurs="0" maxOccurs="unbounded"/>
             </xsd:sequence>

             <xsd:attribute name="expires" use="required"
                            type="xsd:dateTime">
               <xsd:annotation>
                 <xsd:documentation>
                   The expiry time associated with the authorization.



Thomson & Winterbottom    Expires July 2, 2005                  [Page 7]

Internet-Draft                Domain Auth.                  January 2005


                 </xsd:documentation>
               </xsd:annotation>
             </xsd:attribute>

           </xsd:restriction>
         </xsd:complexContent>
       </xsd:complexType>
     </xsd:element>

   </xsd:schema>


4.2  XPath Filter

   The following XPath transform follows the recommendations in RFC 3275
   [RFC3275] to select the elements for signing.  This specification
   defines a new URN for this transform:
   "urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth#PIDF-LO".

   <?xml version="1.0"?>
   <dsig:Transform id="PIDF-LO"
      Algorithm="http://www.w3.org/TR/1999/REC-xpath-19991116"
      xmlns:pidf="urn:ietf:params:xml:ns:pidf"
      xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10"
      xmlns:da="urn:urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth"
      xmlns:dsig="http://www.w3.org/2000/09/xmldsig#">
     <dsig:XPath>
       (/pidf:presence
           and not(/pidf:presence/*))
       or (here()/ancestor::pidf:tuple[1]
           and not(here()/ancestor::pidf:tuple[1]/*))
       or (here()/ancestor::pidf:tuple[1]/pidf:status
           and not(here()/ancestor::pidf:tuple[1]/pidf:status/*))
       or here()/ancestor::pidf:tuple[1]/pidf:status/pidf:timestamp
       or (here()/ancestor::pidf:tuple[1]/pidf:status/gp:geopriv
           and not(here()/ancestor::pidf:tuple[1]/pidf:status
                       /gp:geopriv/*))
       or here()/ancestor::pidf:tuple[1]/pidf:status
           /gp:geopriv/gp:location-info
       or (here()/ancestor::pidf:tuple[1]/pidf:status
               /gp:geopriv/gp:usage-rules
           and not(here()/ancestor::pidf:tuple[1]/pidf:status
                       /gp:geopriv/gp:usage-rules/*))
       or here()/ancestor::da:domain-auth[1]
     </dsig:XPath>
   </dsig:Transform>





Thomson & Winterbottom    Expires July 2, 2005                  [Page 8]

Internet-Draft                Domain Auth.                  January 2005


5.  Examples

   A sample, demonstrating a simple form of the signed PIDF-LO document
   is shown below.

   <?xml version="1.0"?>
   <presence xmlns="urn:ietf:params:xml:ns:pidf"
       xmlns:pidf="urn:ietf:params:xml:ns:pidf"
       xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10"
       xmlns:gml="http://opengis.net/gml"
       xmlns:da="urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth"
       xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"
       entity="pres:user@example.com">
     <tuple id="a6fea09">
       <status>
         <gp:geopriv>
           <gp:location-info>
             <gml:position>
               <gml:Point srsName="urn:EPSG:geographicCRS:4979">
                 <gml:pos>-34.407 150.88001 34</gml:pos>
               </gml:Point>
             </gml:position>
           </gp:location-info>
           <gp:usage-rules>
             <gp:retransmission-allowed>no</gp:retransmission-allowed>
             <gp:retention-expiry>
               2004-12-01T21:28:43+10:00
             </gp:retention-expiry>
           </gp:usage-rules>
         </gp:geopriv>
       </status>
       <da:domain-auth expires="2004-12-01T21:28:43+10:00">
         <dsig:Signature>
           <dsig:SignedInfo>
             <dsig:CanonicalizationMethod
     Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
             <dsig:SignatureMethod
     Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"/>
             <dsig:Reference URI="">
               <dsig:Transforms>
                 <dsig:Transform
     Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
                 <dsig:Transform
   Algorithm="urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth#PIDF-LO"
     />
               </dsig:Transforms>
               <dsig:DigestMethod
     Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>



Thomson & Winterbottom    Expires July 2, 2005                  [Page 9]

Internet-Draft                Domain Auth.                  January 2005


               <dsig:DigestValue>
                 60NvZvtdTB+7UnlLp/H24p7h4bs=
               </dsig:DigestValue>
             </dsig:Reference>
           </dsig:SignedInfo>
           <dsig:SignatureValue>
             juS5RhJ884qoFR8flVXd/rbrSDVGn40CapgB7qeQiT+rr0NekEQ6BHhUA8
             dT3+BCTBUQI0dBjlml9lwzENXvS83zRECjzXbMRTUtVZiPZG2pqKPnL2YU
             3A9645UCjTXU+jgFumv7k78hieAGDzNci+PQ9KRmm//icT7JaYztgt4=
           </dsig:SignatureValue>
           <dsig:KeyInfo>
             <dsig:RetrievalMethod
                 URI="https://example.com/signature/pidfsigner.crt"
                 Type="http://www.w3.org/2000/09/xmldsig#X509Data"/>
             <dsig:X509Data>
               <dsig:X509Certificate>
                 fX/ZhCjFyDMhzslI8am62gZedwZ9IIZIwlNRMvEDQB2zds/eEBnIAQ
                 Pl/yRLCLOfZnbA8PXrbFP5igs3qQWScBUjZVjik748HU2sUVZOa90c
                 0mJl2vJs/RwyLW7/uCAfC/I/k9xGr7fneoIW
                 C/I/k9xGr7fneoIW
               </dsig:X509Certificate>
             </dsig:X509Data>
             <dsig:KeyName>A Bogus Certificate</dsig:KeyName>
           </dsig:KeyInfo>
         </dsig:Signature>
       </da:domain-auth>
       <contact>sips:joe@sip.example.com</contact>
       <timestamp>2004-12-01T09:28:43+10:00</timestamp>
     </tuple>
     <note>
       This is a signed presence, however certain elements have been
       removed from the signature, this is one such element.
     </note>
   </presence>

   Note that the digest and signatures are only included to serve as an
   example.  Several elements are included in the above example that
   should not be signed by the domain authority, as described in Section
   3.1, in particular including "usage-rules" and "note-well".












Thomson & Winterbottom    Expires July 2, 2005                 [Page 10]

Internet-Draft                Domain Auth.                  January 2005


   The transform described in Section 3.1 removes extraneous elements,
   resulting in the following PIDF-LO, which only includes the signed
   elements:

   <?xml version="1.0"?>
   <presence xmlns="urn:ietf:params:xml:ns:pidf"
       xmlns:pidf="urn:ietf:params:xml:ns:pidf"
       xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10"
       xmlns:gml="http://opengis.net/gml"
       xmlns:da="urn:urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth"
       xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"
       entity="pres:user@example.com">
     <tuple id="a6fea09">
       <status>
         <gp:geopriv>
           <gp:location-info>
             <gml:position>
               <gml:Point srsName="urn:EPSG:geographicCRS:4979">
                 <gml:pos>-34.407 150.88001 34</gml:pos>
               </gml:Point>
             </gml:position>
           </gp:location-info>
         </gp:geopriv>
       </status>
       <da:domain-auth expires="2004-12-01T21:28:43+10:00">
       </da:domain-auth>
     </tuple>
   </presence>























Thomson & Winterbottom    Expires July 2, 2005                 [Page 11]

Internet-Draft                Domain Auth.                  January 2005


6.  Security Considerations

   The security limitations of this specification are no more
   significant than those already identified in RFC 3275 [RFC3275].  In
   particular the rules 'Only What is Signed is Secure', 'Only What is
   "Seen" Should be Signed', and '"See" What is Signed' SHOULD be
   applied.

   It is RECOMMENDED that where certitude of information is important
   that only the signed information is transmitted or stored, that is,
   the PIDF-LO document formed by performing the transform described in
   Section 3.1.  This ensures that no additional information may be
   misconstrued as being verifiable.  This is particular applicable if
   the contents of the PIDF-LO document are displayed on screen.

   A degree of trust must exist between the domain authority and the
   location user.  It is the responsibility of the location user to
   verify the identity of the domain authority and assert the
   appropriate level of trust.  If the location user is unable to
   validate the identity of the domain authority for any reason, then
   the PIDF-LO document MUST be considered unsigned.






























Thomson & Winterbottom    Expires July 2, 2005                 [Page 12]

Internet-Draft                Domain Auth.                  January 2005


7.  IANA Considerations

7.1  URN Sub-Namespace Registration for
    urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth

   This document registers a new XML namespace, as per the guidelines in
   [RFC3688].

   URI: The URI for this namespace is
     urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth
   Registrant Contact: IETF, GEOPRIV working group, (geopriv@ietf.org),
     Martin Thomson (martin.thomson@nortelnetworks.com).
   XML:
       BEGIN
       <?xml version="1.0"?>
       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML Basic 1.0//EN"
                 "http://www.w3.org/TR/xhtml-basic/xhtml-basic10.dtd">
       <html xmlns="http://www.w3.org/1999/xhtml">
         <head>
           <title>GEOPRIV Domain Authorization Extensions</title>
         </head>
         <body>
           <h1>Domain Authorization Extensions</h1>
           <h2>urn:ietf:params:xml:ns:pidf:geopriv10:domain-auth</h2>
           <p>See <a href="[[[URL of published RFC]]]">RFCXXXX</a>.</p>
         </body>
       </html>
       END


8  References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2778]  Day, M., Rosenberg, J. and H. Sugano, "A Model for
              Presence and Instant Messaging", RFC 2778, February 2000.

   [RFC3076]  Boyer, J., "Canonical XML Version 1.0", RFC 3076, March
              2001.

   [RFC3275]  Eastlake, D., Reagle, J. and D. Solo, "(Extensible Markup
              Language) XML-Signature Syntax and Processing", RFC 3275,
              March 2002.

   [RFC3688]  Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688,
              January 2004.




Thomson & Winterbottom    Expires July 2, 2005                 [Page 13]

Internet-Draft                Domain Auth.                  January 2005


   [I-D.ietf-geopriv-pidf-lo]
              Peterson, J., "A Presence-based GEOPRIV Location Object
              Format", draft-ietf-geopriv-pidf-lo-03 (work in progress),
              September 2004.


Authors' Addresses

   Martin Thomson
   Nortel Networks
   PO Box U87
   University of Wollongong, NSW  2500

   Phone: +61 2 4254 7515
   EMail: martin.thomson@nortel.com
   URI:   http://www.nortel.com/


   James Winterbottom
   Nortel Networks
   PO Box U87
   University of Wollongong, NSW  2500

   Phone: +61 2 4223 3038
   EMail: winterb@nortel.com
   URI:   http://www.nortel.com/

























Thomson & Winterbottom    Expires July 2, 2005                 [Page 14]

Internet-Draft                Domain Auth.                  January 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.

   The IETF has been notified of intellectual property rights claimed in
   regard to some or all of the specification contained in this
   document.  For more information consult the online list of claimed
   rights.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.





Thomson & Winterbottom    Expires July 2, 2005                 [Page 15]

Internet-Draft                Domain Auth.                  January 2005


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.















































Thomson & Winterbottom    Expires July 2, 2005                 [Page 16]


PAFTECH AB 2003-20262026-04-24 02:46:03