One document matched: draft-weniger-autoconf-pdad-olsr-00.txt
Network Working Group K. Weniger
Internet-Draft Panasonic
Expires: August 21, 2006 February 17, 2006
PDAD-OLSR: Passive Duplicate Address Detection for OLSR
draft-weniger-autoconf-pdad-olsr-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 21, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This draft proposes PDAD-OLSR, a solution for configured address
uniqueness maintenance in MANETs running the OLSR protocol. It
utilizes the Passive Duplicate Address Detection (PDAD) concept,
which enables nodes to passively detect duplicate addresses in the
network (e.g., occurring after network merging) by analyzing received
routing protocol messages. Due to its passive nature, PDAD-OLSR is
very efficient in terms of bandwidth consumption. Moreover, it can
prevent the contamination of routing tables with wrong routing
information resulting from an address conflict.
Weniger Expires August 21, 2006 [Page 1]
Internet-Draft PDAD February 2006
Table of Contents
1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Introduction and Problem Description . . . . . . . . . . . . 4
3. Overview of the Passve DAD concept . . . . . . . . . . . . . 5
4. PDAD Algorithms for OLSR . . . . . . . . . . . . . . . . . . 6
4.1 Data structures and parameters . . . . . . . . . . . . . . 6
4.2 PDAD-Source Address (SA) . . . . . . . . . . . . . . . . . 7
4.3 PDAD-Sequence Numbers (SN) . . . . . . . . . . . . . . . . 7
4.4 PDAD-Sequence Number Difference (SND) . . . . . . . . . . 8
4.5 PDAD-Sequence Numbers Equal (SNE) . . . . . . . . . . . . 8
4.6 PDAD-SNs Always Increment (SNI) . . . . . . . . . . . . . 8
4.7 PDAD-Neighborhood History (NH) . . . . . . . . . . . . . . 8
4.8 PDAD-Link States (LS) . . . . . . . . . . . . . . . . . . 9
4.9 PDAD-extended Neighborhood History (eNH) . . . . . . . . . 9
4.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . 10
4.11 Detecting sequence number wrap-arounds . . . . . . . . . 11
5. Conflict resolution and related issues . . . . . . . . . . . 12
5.1 Preventing dissemination of false routing information . . 12
5.2 Conflict resolution . . . . . . . . . . . . . . . . . . . 12
5.3 Handling address changes . . . . . . . . . . . . . . . . . 12
6. Message Formats . . . . . . . . . . . . . . . . . . . . . . 13
6.1 PDAD-eNH Hint Message . . . . . . . . . . . . . . . . . . 13
6.2 Conflict Resolution Message . . . . . . . . . . . . . . . 13
7. Security Considerations . . . . . . . . . . . . . . . . . . 14
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 15
8.1 Normative References . . . . . . . . . . . . . . . . . . . 15
8.2 Informative References . . . . . . . . . . . . . . . . . . 15
Author's Address . . . . . . . . . . . . . . . . . . . . . . 16
Intellectual Property and Copyright Statements . . . . . . . 17
Weniger Expires August 21, 2006 [Page 2]
Internet-Draft PDAD February 2006
1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [1].
The terminology of OLSR [2] is used.
Weniger Expires August 21, 2006 [Page 3]
Internet-Draft PDAD February 2006
2. Introduction and Problem Description
Address autoconfiguration is a fundamental issue in MANETs, since
routing protocols assume unique IP addresses in the network and
manual assignment is often not applicable. Solutions for traditional
IP networks such as DHCP [5], DHCPv6 [6], zeroconf [7] or IPv6
Stateless Address Autoconfiguration [8] cannot be applied to MANETs
due to their special properties (see [3] and [10] for an overview of
problems and approaches for MANET address autoconfiguation).
Duplicate Address Detection (DAD) is an essential part of (stateless)
address autoconfiguration. In MANETs, addresses may become duplicate
when they are already assigned to nodes, .e.g, after optimistic
address assignment or after two or more independently configured
MANETs merge to one network. This problem is also referred to as
configured address uniqueness maintenance problem. Not re-using
addresses in different (unconnected) MANETs by constructing IP
addresses based on pre-configured globally unique (hardware) IDs such
as IEEE MAC addresses may solve this problem without DAD, however,
this is not applicable in all scenarios for the following reasons:
o Addresses based on pre-configured globally unique IDs are usually
not 100\% globally unique, e.g., a IEEE MAC address configured at
a specific network interface may be changed by the user, devices
with duplicate MAC addresses exist on the market (non-registered
or erroneous manufacturing), and some devices may not have
globally unique hardware IDs (e.g., sensors)
o Addresses based on pre-configured globally unique IDs may have
negative implications on privacy [4]
o Since this approach requires long addresses (to be able to address
all existing devices), it is only possible with IPv6, not with
IPv4
o Long addresses result in a significant increase of signaling
traffic, e.g., of the routing protocol. Dynamically assigning
locally unique addresses and re-using them in different MANETs is
more efficient, since such addresses may be shorter or can easily
be compressed to short addresses (see [9])
This draft proposes a solution for configured address uniqueness
maintenance in a network running the OLSR protocol [2]. Both IPv4
and IPv6 are supported. The selection and assignment of addresses is
out of scope of this draft. Multiple network interfaces and OLSRv2
are not considered in this version of the draft.
Weniger Expires August 21, 2006 [Page 4]
Internet-Draft PDAD February 2006
3. Overview of the Passve DAD concept
PDAD was first proposed in [11] and later refined and integrated in a
complete address autoconfiguration solution [9]. It defines a set of
rather simple algorithms that allows nodes to detect address
conflicts in the network based on routing protocol anomalies. A
specific combination of algorithms is supposed to to detect all
conflicts in the network running a specific routing protocol. The
basic idea of PDAD is to exploit the fact that some protocol events
occur in case of a duplicate address, but (almost) never in case of a
unique address.
PDAD-enabled nodes derive information about the state of the routing
protocol daemon running on another node and belonging to a specific
address (e.g., address A) from incoming routing protocol messages.
If the node's address equals A, this information is then compared to
the information about the state of the own daemon in order to detect
a possible conflict of the node's own address. If the node's address
does not equal A, it compares the information to information about
the state derived from another recently received routing protocol
message containing this address (address A) in order to detect a
possible conflict of another node's address.
Since the state of a routing protocol daemon is changing over time, a
node receiving a routing protocol message must have information about
the time this routing protocol message has been sent. Without
synchronized clocks and additional information in the messages, this
time can only be estimated. Here, it is assumed that the time
interval during which a specific routing protocol message is
completely disseminated in the network is bounded by the time span
T_D, and that T_D can be estimated. In this case, routing protocol
messages received by a node can never be older than T_D (complete
dissemination of a message does not mean that the message reaches all
nodes, it just means that it is not forwarded anymore in the
network). This assumption holds if the ad hoc routing protocol uses
a duplicate cache, if nodes do not store to be forwarded routing
information for unpredictable time spans and if queuing and media
access delays are bounded. In fact, all well-known ad hoc routing
protocols implicitly assume a certain maximum dissemination time,
since otherwise they would not be able to distinguish fresh from
stale routing information after sequence number wrap-arounds.
Weniger Expires August 21, 2006 [Page 5]
Internet-Draft PDAD February 2006
4. PDAD Algorithms for OLSR
In the following, PDAD algorithms for OLSR are presented. They
utilize different parameters in TC and HELLO messages such as link
states (neighbor interface addresses), link codes and addresses in
routing protocol messages as well as addresses in the IP header. All
of the following algorithms must be applied in combination to enable
the detection of all conflicts in the network.
4.1 Data structures and parameters
In addition to the OLSR data structures (information repositories),
each node conceptually maintains two tables for PDAD: a Last Received
Protocol Messages (LRM) table and a Neighbor History (NH) table.
The Last Received Protocol Messages (LRM) table contains information
about the last TC and HELLO protocol message received from a specific
originator address. It has the following structure:
o Originator Address
o Message Type
o Message Sequence Number
o Neighbor Interface Addresses (with corresponding Link Codes if
HELLO message)
o Receive Time
The Neighbor History (NH) table contains the history of neighboring
node addresses and is build from received HELLO messages. Entries
older than T_D can be deleted. The entries have the following
structure:
o Neighbor Interface Address
o Last time the receiver has selected this neighbor interface
address as MPR
o Last time the receiver has been selected as MPR by this neighbor
interface address
o Receive Time of HELLO message
The following protocol parameters are used:
Weniger Expires August 21, 2006 [Page 6]
Internet-Draft PDAD February 2006
+----------------------+----------------------+---------------------+
| Parameter name | Meaning | Default value |
+----------------------+----------------------+---------------------+
| SN_MAX | Maximum possible | 65535 |
| | sequence number | |
| | value | |
| | | |
| T_D | Maximum time a | 30s |
| | message is | |
| | disseminated in | |
| | network | |
| | | |
| SN_RATE | Maximum rate of | 5 |
| | message sequence | |
| | number | |
| | incrementation | |
+----------------------+----------------------+---------------------+
4.2 PDAD-Source Address (SA)
If a node receives a TC or HELLO message and the source address in
the IP header is equal to the receiver's address, a conflict of this
address is detected. If the message is a HELLO messages, the
originator address can be used instead, since it is equal to the IP
source address.
The assumption behind this algorithm is that the IP source address is
always the address of the last forwarder. This is true for OLSR,
since it uses application-layer forwarding of TC messages. Care must
be taken by implementers that broadcast messages are not duplicated
within the sending node and internally delivered to the IP stack as
received message.
4.3 PDAD-Sequence Numbers (SN)
If a node receives a TC or HELLO message, it compares the originator
address with its own address. If they equal and the sequence number
in the message is lower than the receiver's sequence number, a
conflict of the originator address is detected. However, this
conditions is also true when a sequence number wrap-arounds occurs.
Hence, it must be ensured that this is not the case. A mechanism to
detect a possible sequence number wrap-around is described in section
Section 4.11.
The assumptions behind this algorithm are that sequence numbers are
incremented with a certain maximum rate and that each node only
Weniger Expires August 21, 2006 [Page 7]
Internet-Draft PDAD February 2006
increments its own internal sequence number counter.
4.4 PDAD-Sequence Number Difference (SND)
If a node receives a TC or HELLO message, it compares the sequence
number in the message with the sequence number in the previously
received message with the same message type and from the same
originator address (obtained from its LRM table). If the sequence
number difference is higher than a threshold SNDTHRES, a conflict of
the originator address is detected. SNDTHRES can be computed as
follows: SNDTHRES=(|T_R1-T_R2|+T_D)*SN_RATE with T_R1 and T_R2 the
receive time of message 1 and 2, respectively. Note that the
computation of the sequence number difference must consider wrap-
arounds. This can be achieved by calculating the difference with
min(|SN1-SN2|,SN_MAX-|SN1-SN2|).
4.5 PDAD-Sequence Numbers Equal (SNE)
If an intermediate node receives a TC or HELLO message, it searches
its LRM table for a message with the same message type value and the
same tuple <sequence number, originator address>. If a matching
entry is found, the node compares the neighbor interface addresses in
both messages. A conflict is detected if they differ. Only messages
arriving in the last SN_MAX/SN_RATE-T_D should be considered due to
possible sequence number wrap-arounds.
The assumption behind this algorithm is that the tuple <sequence
number, originator address> uniquely identifies a messages in case of
unique addresses.
4.6 PDAD-SNs Always Increment (SNI)
If a node receives a HELLO message, it compares the sequence number
in the message with the sequence number in the previous HELLO message
from the same originator address. If the sequence number in the new
message is lower, a conflict of the originator address is detected.
Again, sequence number wrap-arounds must be considered. A mechanism
to detect a possible sequence number wrap-arounds is described in
section Section 4.11.
The assumption is that HELLO messages sent by a specific node are
received in the order they are sent (i.e., with increasing sequence
numbers), since they are not forwarded and hence cannot "overtake"
each other.
4.7 PDAD-Neighborhood History (NH)
If a node receives a TC message, it checks whether its own address is
Weniger Expires August 21, 2006 [Page 8]
Internet-Draft PDAD February 2006
part of the neighbor interface addresses in the TC message. If this
is the case and the link code indicates a bidirectional (or
symmetric) link, the node searches the originator address in its NH
table. If it cannot find the address in the table with a receive
time higher than the current time minus T_D, a conflict of the node's
address is detected. Otherwise, the node additionally checks whether
the NH table indicates that the node has selected the found address
as MPR within the last T_D. If this is not the case, a conflict is
detected.
The assumption behind this algorithm is that a TC message only
contains neighbors that have selected the originator address as MPRs.
If all addresses in the network are unique, a node having an address
equal to one of the neighbor interface addresses in a received TC
message must have been a neighbor of the originator address.
4.8 PDAD-Link States (LS)
If a node receives a TC message with its own address as originator
address, it searches in its NH table for each of the neighbor
interface addresses. If at least one address is not found with a
receive time higher than the current time minus T_D, a conflict of
the originator address is detected. If all addresses have been
found, but NH table indicates that the node's address has not been
selected as MPR by the found address within the last T_D, a conflict
is detected.
4.9 PDAD-extended Neighborhood History (eNH)
If a node receives a TC message, it checks for each neighbor
interface addresses in the message if it is a neighbor. This can be
done by checking the OLSR neighborhood or local link information base
or the LRM table. For each found neighbor address, the node searches
in the LRM table for previously received HELLO messages from this
address. For each found HELLO message, it checks whether the
originator address of the TC message is contained in the set of
neighbor interface addresses of the found HELLO message. If this is
not the case, this is a hint for a conflict of the originator address
of the HELLO message. If this is the case, the node additionally
checks the link codes of the respective neighbor interface addresses
in the HELLO message. If they indicate that the originator address
of the TC message has not been selected as MPR within the last T_D by
the originator address of the HELLO message, the node has another
hint for a conflict of the originator address of the HELLO message.
However, the receiver cannot be sure whether a conflict exists or
not, since it is not aware of the NH table of the respective
neighbor. Hence, if a hint for a conflict is detected, it sends an
hint message to the originator address of the respective HELLO
Weniger Expires August 21, 2006 [Page 9]
Internet-Draft PDAD February 2006
message, which then can make the decision based on its NH table. The
format for the hint message is specified in Section 6.
This algorithm is basically the PDAD-NH algorithm executed on behalf
of a neighboring node. Minimal local signaling is needed, which
means that this algorithm is not completely passive. A rate control
mechanism can be implemented to limit the sending rate of hint
messages triggered by a hint about the same possible address
conflict. Furthermore, less signaling is required if each node
additionally stores the neighborhood history of each neighbor.
However, this requires extra amount of memory and hence is optional.
4.10 Summary
This section summarizes the properties of the PDAD algorithms.
+------------+------------+-------------+-------------+-------------+
| Algorithm | Relevant | Potentially | Maximum | Completely |
| | parameters | conflicting | distance | passive |
| | in message | nodes | between | |
| | | | conflicting | |
| | | | nodes | |
+------------+------------+-------------+-------------+-------------+
| PDAD-SA | sequence | originator/ | 1 hop | yes |
| | number, IP | forwarder | | |
| | source | and | | |
| | address | receiver | | |
| | | | | |
| PDAD-SN | sequence | originator | n hops | yes |
| | number, | and | | |
| | originator | receiver | | |
| | address | | | |
| | | | | |
| PDAD-SND | sequence | both | n hops | yes |
| | number, | originators | | |
| | originator | | | |
| | address | | | |
| | | | | |
| PDAD-SNE | sequence | both | n hops | yes |
| | number, | originators | | |
| | originator | | | |
| | address | | | |
| | | | | |
| PDAD-SNI | sequence | both | 2 hops | yes |
| | number, | originators | | |
| | originator | | | |
| | address | | | |
| | | | | |
Weniger Expires August 21, 2006 [Page 10]
Internet-Draft PDAD February 2006
| PDAD-LS | neighbor | originator | n hops | yes |
| | addresses, | and | | |
| | originator | receiver | | |
| | address | | | |
| | | | | |
| PDAD-NH | neighbor | neighbor of | n hops | yes |
| | addresses, | originator | | |
| | originator | and | | |
| | address | receiver | | |
| | | | | |
| PDAD-eNH | neighbor | neighbor of | n hops | no |
| | addresses, | originator | | |
| | originator | and | | |
| | address | neighbor | | |
+------------+------------+-------------+-------------+-------------+
4.11 Detecting sequence number wrap-arounds
Wrap-arounds can occur because of the limited sequence number space.
Wrap-around events are rare if the sequence number space is large.
If unique addresses in the network, a message dissemination time of
T_D, and a constant sequence number increase rate of SN_RATE are
assumed, the maximum difference of the sequence number value from
receiver and sender point of view is SN_THRES=SN_RATE*T_D.
Consequently, a wrap-around can only have occured if the lower
sequence number value s1 is smaller than SN_THRES and the higher
sequence number value s2 is bigger than SN_MAX-SN_THRES+s1. When a
duplicate address is detected based on PDAD-SN or PDAD-SNI, a node
receives routing protocol messages with a sequence number value lower
than its own or lower than the value in a previous message from that
address. Only if the above condition is not true, the node may be
sure that the reason for this event is an address conflict and not a
wrap-around.
Weniger Expires August 21, 2006 [Page 11]
Internet-Draft PDAD February 2006
5. Conflict resolution and related issues
5.1 Preventing dissemination of false routing information
To prevent the dissemination of false routing information emerging
from an address conflict, a routing protocol message indicating an
address conflict should not be forwarded.
5.2 Conflict resolution
If an algorithm detects a conflict of the receivers's address, the
node changes its IP address in order to resolve the conflict. If a
conflict is detected by an intermediate node, this node should send a
conflict resolution message to the conflicting address. The format
for this message is specified in Section 6. One goal of the conflict
resolution should be to minimize the number of address changes in the
network. Hence, only one node should be forced to change its
address. Hence, the conflict resolution messages shall be delivered
to the node that triggered the conflict detection. Therefore, the
destination address is set to the conflicting address and the next
hop should be the last forwarder of the received routing protocol
message that triggered the conflict detection. The latter can be
achieved with the IPv4 loose source routing or the IPv6 routing
header.
5.3 Handling address changes
Care must be taken when a node changes its IP address regarding the
bidirectional link states and the MPR selection, because both are
based on the context of the old address. Hence, a node has to set
all its link states to asymmetric and remove all addresses from its
MPR selector set. Without these modifications, PDAD-NH would
immediately detect a conflict of the new address even if it is
unique.
Weniger Expires August 21, 2006 [Page 12]
Internet-Draft PDAD February 2006
6. Message Formats
6.1 PDAD-eNH Hint Message
The message is encapsulated in an OLSR packet header. The message
format is equal to the TC message format, but has another message
type value (TBD). The IP destination address is set to the
originator address of the received TC message (see Section 4.9).
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ANSN | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Advertised Neighbor Main Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Advertised Neighbor Main Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
6.2 Conflict Resolution Message
The message is encapsulated in an OLSR packet header. The message
only contains the conflicting address. The IP destination address is
set to the conflicting address and a IPv6 routing header or IPv4
loose source option is added, which contains the address of the last
forwarder of the routing protocol message that triggered the conflict
detection. Message type is TBD.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Conflicting Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Weniger Expires August 21, 2006 [Page 13]
Internet-Draft PDAD February 2006
7. Security Considerations
TBD
Weniger Expires August 21, 2006 [Page 14]
Internet-Draft PDAD February 2006
8. References
8.1 Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[2] Clausen, T. and P. Jacquet, "Optimized Link State Routing
Protocol (OLSR)", RFC 3626, October 2003.
[3] Singh, S., "Ad hoc network autoconfiguration: definition and
problem statement", draft-singh-autoconf-adp-00 (work in
progress), February 2005.
8.2 Informative References
[4] Narten, T. and R. Draves, "Privacy Extensions for Stateless
Address Autoconfiguration in IPv6", RFC 3041, January 2001.
[5] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131,
March 1997.
[6] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M.
Carney, "Dynamic Host Configuration Protocol for IPv6
(DHCPv6)", RFC 3315, July 2003.
[7] Cheshire, S., Aboba, B., and E. Guttman, "Dynamic Configuration
of IPv4 Link-Local Addresses", RFC 3927, March 2005.
[8] Thomson, S. and T. Narten, "IPv6 Stateless Address
Autoconfiguration", RFC 2462, December 1998.
[9] Weniger, K., "PACMAN: Passive Autoconfiguration for Mobile Ad
hoc Networks", IEEE Journal of Selected Areas of Communications
(JSAC), Vol. 23 No. 3, March 2005.
[10] Weniger, K., "Address Autoconfiguration in Mobile Ad Hoc
Networks: Current Approaches and Future Directions", IEEE
Network Magazine , July 2004.
[11] Weniger, K., "Passive Duplicate Address Detection in Mobile Ad
hoc Networks", IEEE Wireless Communications and Networking
Conference (WCNC), New Orleans, USA, March 2003.
Weniger Expires August 21, 2006 [Page 15]
Internet-Draft PDAD February 2006
Author's Address
Kilian A. Weniger
Panasonic R&D Center Germany
Monzastr. 4c
Langen 63225
Germany
Phone: +49 6103 766 137
Email: kilian.weniger@eu.panasonic.com
Weniger Expires August 21, 2006 [Page 16]
Internet-Draft PDAD February 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Weniger Expires August 21, 2006 [Page 17]
| PAFTECH AB 2003-2026 | 2026-04-23 05:42:40 |