diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4405.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4405.txt')
-rw-r--r-- | doc/rfc/rfc4405.txt | 787 |
1 files changed, 787 insertions, 0 deletions
diff --git a/doc/rfc/rfc4405.txt b/doc/rfc/rfc4405.txt new file mode 100644 index 0000000..a519244 --- /dev/null +++ b/doc/rfc/rfc4405.txt @@ -0,0 +1,787 @@ + + + + + + +Network Working Group E. Allman +Request for Comments: 4405 Sendmail, Inc. +Category: Experimental H. Katz + Microsoft Corp. + April 2006 + + + SMTP Service Extension for + Indicating the Responsible Submitter of an E-Mail Message + +Status of This Memo + + This memo defines an Experimental Protocol for the Internet + community. It does not specify an Internet standard of any kind. + Discussion and suggestions for improvement are requested. + Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +IESG Note + + The following documents (RFC 4405, RFC 4406, RFC 4407, and RFC 4408) + are published simultaneously as Experimental RFCs, although there is + no general technical consensus and efforts to reconcile the two + approaches have failed. As such, these documents have not received + full IETF review and are published "AS-IS" to document the different + approaches as they were considered in the MARID working group. + + The IESG takes no position about which approach is to be preferred + and cautions the reader that there are serious open issues for each + approach and concerns about using them in tandem. The IESG believes + that documenting the different approaches does less harm than not + documenting them. + + Note that the Sender ID experiment may use DNS records that may have + been created for the current SPF experiment or earlier versions in + this set of experiments. Depending on the content of the record, + this may mean that Sender-ID heuristics would be applied incorrectly + to a message. Depending on the actions associated by the recipient + with those heuristics, the message may not be delivered or may be + discarded on receipt. + + Participants relying on Sender ID experiment DNS records are warned + that they may lose valid messages in this set of circumstances. + Participants publishing SPF experiment DNS records should consider + + + + +Allman & Katz Experimental [Page 1] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + the advice given in section 3.4 of RFC 4406 and may wish to publish + both v=spf1 and spf2.0 records to avoid the conflict. + + Participants in the Sender-ID experiment need to be aware that the + way Resent-* header fields are used will result in failure to receive + legitimate email when interacting with standards-compliant systems + (specifically automatic forwarders which comply with the standards by + not adding Resent-* headers, and systems which comply with RFC 822 + but have not yet implemented RFC 2822 Resent-* semantics). It would + be inappropriate to advance Sender-ID on the standards track without + resolving this interoperability problem. + + The community is invited to observe the success or failure of the two + approaches during the two years following publication, in order that + a community consensus can be reached in the future. + +Abstract + + This memo defines an extension to the Simple Mail Transfer Protocol + (SMTP) service that allows an SMTP client to specify the responsible + submitter of an e-mail message. The responsible submitter is the + e-mail address of the entity most recently responsible for + introducing a message into the transport stream. This extension + helps receiving e-mail servers efficiently determine whether the SMTP + client is authorized to transmit mail on behalf of the responsible + submitter's domain. + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Conventions Used in This Document ..........................4 + 2. The SUBMITTER Service Extension .................................4 + 3. The SUBMITTER Keyword of the EHLO Command .......................5 + 4. The SUBMITTER Parameter of the MAIL Command .....................5 + 4.1. Setting the SUBMITTER Parameter Value ......................5 + 4.2. Processing the SUBMITTER Parameter .........................5 + 4.3. Transmitting to a Non-SUBMITTER-Aware SMTP Server ..........6 + 5. Examples ........................................................6 + 5.1. Mail Submission ............................................7 + 5.2. Mail Forwarding ............................................7 + 5.3. Mobile User ................................................8 + 5.4. Guest E-Mail Service .......................................9 + 5.5. SUBMITTER Used on a Non-Delivery Report ...................11 + 6. Security Considerations ........................................11 + 7. Acknowledgements ...............................................12 + 8. IANA Considerations ............................................12 + 9. References .....................................................12 + 9.1. Normative References ......................................12 + + + +Allman & Katz Experimental [Page 2] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + +1. Introduction + + The practice of falsifying the identity of the sender of an e-mail + message, commonly called "spoofing", is a prevalent tactic used by + senders of unsolicited commercial e-mail, or "spam". This form of + abuse has highlighted the need to improve identification of the + "responsible submitter" of an e-mail message. + + In this specification, the responsible submitter is the entity most + recently responsible for injecting a message into the e-mail + transport stream. The e-mail address of the responsible submitter + will be referred to as the Purported Responsible Address (PRA) of the + message. The Purported Responsible Domain (PRD) is the domain + portion of that address. + + This specification codifies rules for encoding the purported + responsible address into the SMTP transport protocol. This will + permit receiving SMTP servers to efficiently validate whether or not + the SMTP client is authorized to transmit mail on behalf of the + responsible submitter's domain. + + Broadly speaking, there are two possible approaches for determining + the purported responsible address: either from RFC 2821 [SMTP] + protocol data or from RFC 2822 [MSG-FORMAT] message headers. Each + approach has certain advantages and disadvantages. + + Deriving the purported responsible domain from RFC 2821 data has the + advantage that validation can be performed before the SMTP client has + transmitted the message body. If spoofing is detected, then the SMTP + server has the opportunity, depending upon local policy, to reject + the message before it is ever transmitted. The disadvantage of this + approach is the risk of false positives, that is, incorrectly + concluding that the sender's e-mail address has been spoofed. There + are today legitimate reasons why the Internet domain names used in + RFC 2821 commands may be different from those of the sender of an e- + mail message. + + Deriving the purported responsible domain from RFC 2822 headers has + the advantage that validation can usually be based on an identity + that is displayed to recipients by existing Mail User Agents (MUAs) + as the sender's identity. This aids in detection of a particularly + noxious form of spoofing known as "phishing" in which a malicious + sender attempts to fool a recipient into believing that a message + originates from an entity well known to the recipient. This approach + carries a lower risk of false positives since there are fewer + legitimate reasons for RFC 2822 headers to differ from the true + sender of the message. The disadvantage of this approach is that it + does require parsing and analysis of message headers. In practice, + + + +Allman & Katz Experimental [Page 3] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + much if not all the message body is also transmitted since the SMTP + protocol described in RFC 2821 provides no mechanism to interrupt + message transmission after the DATA command has been issued. + + It is desirable to unify these two approaches in a way that combines + the benefits of both while minimizing their respective disadvantages. + + This specification describes just such a unified approach. It uses + the mechanism described in [SMTP] to describe an extension to the + SMTP protocol. Using this extension, an SMTP client can specify the + e-mail address of the entity most recently responsible for submitting + the message to the SMTP client in a new SUBMITTER parameter of the + SMTP MAIL command. SMTP servers can use this information to validate + that the SMTP client is authorized to transmit e-mail on behalf of + the Internet domain contained in the SUBMITTER parameter. + +1.1. Conventions Used in This Document + + In examples, "C:" and "S:" indicate lines sent by the client and + server, respectively. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [KEYWORDS]. + +2. The SUBMITTER Service Extension + + The following SMTP service extension is hereby defined: + + (1) The name of this SMTP service extension is "Responsible + Submitter"; + + (2) The EHLO keyword value associated with this extension is + "SUBMITTER"; + + (3) The SUBMITTER keyword has no parameters; + + (4) No additional SMTP verbs are defined by this extension; + + (5) An optional parameter is added to the MAIL command using the + esmtp-keyword "SUBMITTER", and is used to specify the e-mail + address of the entity responsible for submitting the message for + delivery; + + (6) This extension is appropriate for the submission protocol + [SUBMIT]. + + + + + +Allman & Katz Experimental [Page 4] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + +3. The SUBMITTER Keyword of the EHLO Command + + An SMTP server includes the SUBMITTER keyword in its EHLO response to + tell the SMTP client that the SUBMITTER service extension is + supported. + + The SUBMITTER keyword has no parameters. + +4. The SUBMITTER Parameter of the MAIL Command + + The syntax of the SUBMITTER parameter is + + "SUBMITTER=" Mailbox + + where Mailbox is the Augmented Backus-Naur Form (ABNF) [ABNF] + production defined in Section 4.1.2 of [SMTP]. Characters such as + SP, "+", and "=" that may occur in Mailbox but are not permitted in + ESMTP parameter values MUST be encoded as "xtext" as described in + Section 4 of [DSN]. + +4.1. Setting the SUBMITTER Parameter Value + + The purpose of the SUBMITTER parameter is to allow the SMTP client to + indicate to the server the purported responsible address of the + message directly in the RFC 2821 protocol. + + Therefore, SMTP clients that support the Responsible Submitter + extension MUST include the SUBMITTER parameter on all messages. This + includes messages containing a null reverse-path in the MAIL command. + + SMTP clients MUST set the SUBMITTER parameter value to the purported + responsible address of the message as defined in [PRA]. This also + applies to messages containing a null reverse-path. + + In some circumstances, described in Section 7 of [SENDER-ID], SMTP + clients may need to add RFC 2822 headers to the message in order to + ensure that the correct SUBMITTER parameter value can be set. + +4.2. Processing the SUBMITTER Parameter + + Receivers of e-mail messages sent with the SUBMITTER parameter SHOULD + select the domain part of the SUBMITTER address value as the + purported responsible domain of the message, and SHOULD perform such + tests, including those defined in [SENDER-ID], as are deemed + necessary to determine whether the connecting SMTP client is + authorized to transmit e-mail messages on behalf of that domain. + + + + + +Allman & Katz Experimental [Page 5] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + If these tests indicate that the connecting SMTP client is not + authorized to transmit e-mail messages on behalf of the SUBMITTER + domain, the receiving SMTP server SHOULD reject the message and when + rejecting MUST use "550 5.7.1 Submitter not allowed." + + If the receiving SMTP server allows the connecting SMTP client to + transmit message data, then the server SHOULD determine the purported + responsible address of the message by examining the RFC 2822 message + headers as described in [PRA]. If this purported responsible address + does not match the address appearing in the SUBMITTER parameter, the + receiving SMTP server MUST reject the message and when rejecting MUST + use "550 5.7.1 Submitter does not match header." + + If no purported responsible address is found according to the + procedure defined in [PRA], the SMTP server SHOULD reject the message + and when rejecting MUST use "554 5.7.7 Cannot verify submitter + address." + + Verifying Mail Transfer Agents (MTAs) are strongly urged to validate + the SUBMITTER parameter against the RFC 2822 headers; otherwise, an + attacker can trivially defeat the algorithm. + + Note that the presence of the SUBMITTER parameter on the MAIL command + MUST NOT change the effective reverse-path of a message. Any + delivery status notifications must be sent to the reverse-path, if + one exists, as per Section 3.7 of [SMTP] regardless of the presence + of a SUBMITTER parameter. If the reverse-path is null, delivery + status notifications MUST NOT be sent to the SUBMITTER address. + + Likewise, the SUBMITTER parameter MUST NOT change the effective reply + address of a message. Replies MUST be sent to the From address or + the Reply-To address, if present, as described in Section 3.6.2 of + [MSG-FORMAT] regardless of the presence of a SUBMITTER parameter. + +4.3. Transmitting to a Non-SUBMITTER-Aware SMTP Server + + Notwithstanding the provisions of Section 4.1 above, when an MTA + transmits a message to another MTA that does not support the + SUBMITTER extension, the forwarding MTA MUST transmit the message + without the SUBMITTER parameter. This should involve no information + loss, since the SUBMITTER parameter is required to contain + information derived from the message headers. + +5. Examples + + This section provides examples of how the SUBMITTER parameter would + be used. The following dramatis personae appear in the examples: + + + + +Allman & Katz Experimental [Page 6] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + alice@example.com: the original sender of each e-mail message. + + bob@company.com.example: the final recipient of each e-mail. + + bob@almamater.edu.example: an e-mail address used by Bob that he has + configured to forward mail to his office account at + bob@company.com.example. + + alice@mobile.net.example: an e-mail account provided to Alice by her + mobile e-mail network carrier. + +5.1. Mail Submission + + Under normal circumstances, Alice would configure her MUA to submit + her message to the mail system using the SUBMIT protocol [SUBMIT]. + The MUA would transmit the message without the SUBMITTER parameter. + The SUBMIT server would validate that the MUA is allowed to submit a + message through some external scheme, perhaps SMTP Authentication + [SMTPAUTH]. Under most circumstances, this would look like a normal, + authenticated SMTP transaction. The SUBMIT server would extract her + name from the RFC 2822 headers for use in the SUBMITTER parameters of + subsequent transmissions of the message. + +5.2. Mail Forwarding + + When Alice sends a message to Bob at his almamater.edu.example + account, the SMTP session from her SUBMIT server might look something + like this: + + S: 220 almamater.edu.example ESMTP server ready + C: EHLO example.com + S: 250-almamater.edu.example + S: 250-DSN + S: 250-AUTH + S: 250-SUBMITTER + S: 250 SIZE + C: MAIL FROM:<alice@example.com> SUBMITTER=alice@example.com + S: 250 <alice@example.com> sender ok + C: RCPT TO:<bob@almamater.edu.example> + S: 250 <bob@almamater.edu.example> recipient ok + C: DATA + S: 354 okay, send message + C: (message body goes here) + C: . + S: 250 message accepted + C: QUIT + S: 221 goodbye + + + + +Allman & Katz Experimental [Page 7] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + The almamater.edu.example MTA must now forward this message to + bob@company.com.example. Although the original sender of the message + is alice@example.com, Alice is not responsible for this most recent + retransmission of the message. That role is filled by + bob@almamater.edu.example, who established the forwarding of mail to + bob@company.com.example. Therefore, the almamater.edu.example MTA + determines a new purported responsible address for the message, + namely, bob@almamater.edu.example, and sets the SUBMITTER parameter + accordingly. The forwarding MTA also inserts a Resent-From header in + the message body to ensure the purported responsible address derived + from the RFC 2822 headers matches the SUBMITTER address. + + S: 220 company.com.example ESMTP server ready + C: EHLO almamater.edu.example + S: 250-company.com.example + S: 250-DSN + S: 250-AUTH + S: 250-SUBMITTER + S: 250 SIZE + C: MAIL FROM:<alice@example.com> + SUBMITTER=bob@almamater.edu.example + S: 250 <alice@example.com> sender ok + C: RCPT TO:<bob@company.com.example> + S: 250 <bob@company.com.example> recipient ok + C: DATA + S: 354 okay, send message + C: Resent-From: bob@almamater.edu.example + C: Received By: ... + C: (message body goes here) + C: . + S: 250 message accepted + C: QUIT + S: 221 goodbye + +5.3. Mobile User + + Alice is at the airport and uses her mobile e-mail device to send a + message to Bob. The message travels through the carrier network + provided by mobile.net.example, but Alice uses her example.com + address on the From line of all her messages so that replies go to + her office mailbox. + + + + + + + + + + +Allman & Katz Experimental [Page 8] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + Here is an example of the SMTP session between the MTAs at + mobile.net.example and almamater.edu.example. + + S: 220 almamater.edu.example ESMTP server ready + C: EHLO mobile.net.example + S: 250-almamater.edu.example + S: 250-DSN + S: 250-AUTH + S: 250-SUBMITTER + S: 250 SIZE + C: MAIL FROM:<alice@example.com> + SUBMITTER=alice@mobile.net.example + S: 250 <alice@example.com> sender ok + C: RCPT TO:<bob@almamater.edu.example> + S: 250 <bob@almamater.edu.example> recipient ok + C: DATA + S: 354 okay, send message + C: Sender: alice@mobile.net.example + C: Received By: ... + C: (message body goes here) + C: . + S: 250 message accepted + C: QUIT + S: 221 goodbye + + Note that mobile.net.example uses the SUBMITTER parameter to + designate alice@mobile.net.example as the responsible submitter for + this message. Further, this MTA also inserts a Sender header to + ensure the purported responsible address derived from the RFC 2822 + headers matches the SUBMITTER address. + + Likewise, conventional ISPs may also choose to use the SUBMITTER + parameter to designate as the responsible submitter the user's + address on the ISP's network if that address is different from the + MAIL FROM address. This may be especially useful for ISPs that host + multiple domains or otherwise share MTAs among multiple domains. + + When the message is subsequently forwarded by the + almamater.edu.example MTA, that MTA will replace the SUBMITTER + parameter with bob@almamater.edu.example as in Section 5.2 and add + its own Resent-From header. + +5.4. Guest E-Mail Service + + While on a business trip, Alice uses the broadband access facilities + provided by the Exemplar Hotel to connect to the Internet and send + e-mail. The hotel routes all outbound e-mail through its own SMTP + server, email.hotel.com.example. + + + +Allman & Katz Experimental [Page 9] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + The SMTP session for Alice's message to Bob from the Exemplar Hotel + would look like this: + + S: 220 almamater.edu.example ESMTP server ready + C: EHLO email.hotel.com.example + S: 250-almamater.edu.example + S: 250-DSN + S: 250-AUTH + S: 250-SUBMITTER + S: 250 SIZE + C: MAIL FROM:<alice@example.com> + SUBMITTER=guest.services@email.hotel.com.example + S: 250 <alice@example.com> sender ok + C: RCPT TO:<bob@almamater.edu.example> + S: 250 <bob@almamater.edu.example> recipient ok + C: DATA + S: 354 okay, send message + C: Resent-From: guest.services@email.hotel.com.example + C: Received By: ... + C: (message body goes here) + C: . + S: 250 message accepted + C: QUIT + S: 221 goodbye + + Note that email.hotel.com.example uses the SUBMITTER parameter to + designate a generic account guest.services@email.hotel.com.example as + the responsible submitter address for this message. A generic + account is used since Alice herself does not have an account at that + domain. Furthermore, this client also inserts a Resent-From header + to ensure the purported responsible address derived from the RFC 2822 + headers with the SUBMITTER address. + + As before, when the message is subsequently forwarded by the + almamater.edu.example MTA, that MTA will replace the SUBMITTER + parameter with bob@almamater.edu.example as in Section 5.2 and add + its own Resent-From header. + + + + + + + + + + + + + + +Allman & Katz Experimental [Page 10] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + +5.5. SUBMITTER Used on a Non-Delivery Report + + Alice sends an incorrectly addressed e-mail message and receives a + non-delivery report from a SUBMITTER-compliant server. + + S: 220 example.com ESMTP server ready + C: EHLO almamater.edu.example + S: 250-example.com + S: 250-DSN + S: 250-AUTH + S: 250-SUBMITTER + S: 250 SIZE + C: MAIL FROM:<> SUBMITTER=mailer-daemon@almamater.edu.example + S: 250 OK + C: RCPT TO:<alice@example.com> + S: 250 OK + C: DATA + S: 354 OK, send message + C: (message body goes here) + C: . + S: 250 message accepted + C: QUIT + S: 221 goodbye + +6. Security Considerations + + This extension provides an optimization to allow an SMTP client to + identify the responsible submitter of an e-mail message in the SMTP + protocol, and to enable SMTP servers to perform efficient validation + of that identity before the message contents are transmitted. + + It is, however, quite possible for an attacker to forge the value of + the SUBMITTER parameter. Furthermore, it is possible for an attacker + to transmit an e-mail message whose SUBMITTER parameter does not + match the purported responsible address of the message as derived + from the RFC 2822 headers. Therefore, the presence of the SUBMITTER + parameter provides, by itself, no assurance of the authenticity of + the message or the responsible submitter. Rather, the SUBMITTER + parameter is intended to provide additional information to receiving + e-mail systems to enable them to efficiently determine the validity + of the responsible submitter, and specifically, whether the SMTP + client is authorized to transmit e-mail on behalf of the purported + responsible submitter's domain. Section 4.2 describes how receiving + e-mail systems should process the SUBMITTER parameter. + + + + + + + +Allman & Katz Experimental [Page 11] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + +7. Acknowledgements + + The idea of an ESMTP extension to convey the identity of the + responsible sender of an e-mail message has many progenitors. Nick + Shelness suggested the idea in a private conversation with one of the + authors. Pete Resnick suggested a variant on the MARID mailing list. + The idea was also discussed on the Anti-Spam Research Group (ASRG) + mailing list. + + The authors would also like to thank the participants of the MARID + working group and the following individuals for their comments and + suggestions, which greatly improved this document: + + Robert Atkinson, Simon Attwell, Roy Badami, Greg Connor, Dave + Crocker, Matthew Elvey, Tony Finch, Ned Freed, Mark Lentczner, Jim + Lyon, Bruce McMillan, Sam Neely, Daryl Odnert, Margaret Olson, + Pete Resnick, Hector Santos, Nick Shelness, Rand Wacker, and Meng + Weng Wong. + +8. IANA Considerations + + The IANA has registered the SUBMITTER SMTP service extension. + +9. References + +9.1. Normative References + + [ABNF] Crocker, D. and P. Overell, "Augmented BNF for Syntax + Specifications: ABNF", RFC 4234, October 2005. + + [DSN] Moore, K., "Simple Mail Transfer Protocol (SMTP) Service + Extension for Delivery Status Notifications (DSNs)", RFC + 3461, January 2003. + + [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [MSG-FORMAT] Resnick, P., "Internet Message Format", RFC 2822, April + 2001. + + [PRA] Lyon, J., "Purported Responsible Address in E-Mail + Messages", RFC 4407, April 2006. + + [SENDER-ID] Lyon, J. and M. Wong, "Sender ID: Authenticating E- + Mail", RFC 4406, April 2006. + + [SUBMIT] Gellens, R. and J. Klensin, "Message Submission for + Mail", RFC 4409, April 2006. + + + +Allman & Katz Experimental [Page 12] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + + [SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 2821, + April 2001. + + [SMTPAUTH] Myers, J., "SMTP Service Extension for Authentication", + RFC 2554, March 1999. + +Authors' Addresses + + Eric Allman + Sendmail, Inc. + 6425 Christie Ave, Suite 400 + Emeryville, CA 94608 + USA + + EMail: eric@sendmail.com + + + Harry Katz + Microsoft Corp. + 1 Microsoft Way + Redmond, WA 98052 + USA + + EMail: hkatz@microsoft.com + + + + + + + + + + + + + + + + + + + + + + + + + + + +Allman & Katz Experimental [Page 13] + +RFC 4405 SMTP Responsible Submitter Extension April 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Allman & Katz Experimental [Page 14] + |