1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
|
Network Working Group S. Leinen
Request for Comments: 3955 SWITCH
Category: Informational October 2004
Evaluation of Candidate Protocols for
IP Flow Information Export (IPFIX)
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2004).
Abstract
This document contains an evaluation of the five candidate protocols
for an IP Flow Information Export (IPFIX) protocol, based on the
requirements document produced by the IPFIX Working Group. The
protocols are characterized and grouped in broad categories, and
evaluated against specific requirements. Finally, a recommendation
is made to select the NetFlow v9 protocol as the basis for the IPFIX
specification.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Protocol Summaries . . . . . . . . . . . . . . . . . . . . . . 2
2.1. CRANE. . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2. Diameter . . . . . . . . . . . . . . . . . . . . . . . . 4
2.3. LFAP . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.4. NetFlow v9 . . . . . . . . . . . . . . . . . . . . . . . 5
2.5. Streaming IPDR . . . . . . . . . . . . . . . . . . . . . 6
3. Broad Classification of Candidate Protocols . . . . . . . . . 7
3.1. Design Goals . . . . . . . . . . . . . . . . . . . . . . 7
3.2. Data Representation. . . . . . . . . . . . . . . . . . . 8
3.3. Protocol Flow. . . . . . . . . . . . . . . . . . . . . . 9
4. Item-Level Compliance Evaluation . . . . . . . . . . . . . . . 10
4.1. Meter Reliability (5.1). . . . . . . . . . . . . . . . . 10
4.2. Sampling (5.2) . . . . . . . . . . . . . . . . . . . . . 11
4.3. Overload Behavior (5.3). . . . . . . . . . . . . . . . . 12
4.4. Timestamps (5.4) . . . . . . . . . . . . . . . . . . . . 12
4.5. Time Synchronization (5.5) . . . . . . . . . . . . . . . 12
4.6. Flow Expiration (5.6). . . . . . . . . . . . . . . . . . 13
Leinen Informational [Page 1]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
4.7. Ignore Port Copy (5.9) . . . . . . . . . . . . . . . . . 13
4.8. Information Model (6.1). . . . . . . . . . . . . . . . . 13
4.9. Data Model (6.2) . . . . . . . . . . . . . . . . . . . . 13
4.10. Data Transfer (6.3). . . . . . . . . . . . . . . . . . . 14
5. Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.1. Recommendation . . . . . . . . . . . . . . . . . . . . . 19
6. Security Considerations. . . . . . . . . . . . . . . . . . . . 19
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 19
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 20
8.1. Normative References . . . . . . . . . . . . . . . . . . 20
8.2. Informative References . . . . . . . . . . . . . . . . . 20
Appendix. A Note on References to the Candidate Protocol
Documents. . . . . . . . . . . . . . . . . . . . . . . 22
Author's Address. . . . . . . . . . . . . . . . . . . . . . . . . 22
Full Copyright Statement. . . . . . . . . . . . . . . . . . . . . 23
1. Introduction
The IP Flow Information Export (IPFIX) Working Group has been
chartered to select a protocol for the export of flow information
from traffic-observing devices (such as routers or dedicated probes).
To this end, an evaluation team was formed to evaluate submitted
protocols. Each protocol was represented by an advocate, who
submitted a specific evaluation document for the respective protocol
against the requirements document [1]. The specification of each
protocol was itself available as one or several Internet-Drafts,
sometimes referring normatively to documents from outside the IETF.
This document contains an evaluation of the submitted protocols with
respect to the requirements document, and on a more general level, to
the working group charter.
The following IPFIX candidate protocol submissions were evaluated:
o CRANE [7], [8]
o Diameter [9], [10]
o LFAP [11], [12], [13]
o NetFlow v9 [2], [15], [16]
o Streaming IPDR [17], [18]
This document uses terminology defined in [1] intermixed with that
from submissions to explain the mapping between the two.
2. Protocol Summaries
In the following, each candidate protocol is described briefly,
highlighting its specific distinguishing features.
Leinen Informational [Page 2]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
2.1. CRANE
XACCT's Common Reliable Accounting for Network Element Protocol
Version 1.0 [7][8] is described as a protocol for the transmission of
accounting information from "Network Elements" to "mediation" and
"business support systems".
2.1.1. CRANE Protocol Operation
The exporting side is the CRANE client, the collecting side is the
CRANE server. Note that it is the server that is responsible for
initiating the connection to the client. A client can have multiple
simultaneous connections to different servers for robustness. Each
server has an associated priority. A client only exports to the
server with the highest priority that is perceived operational.
Clients and servers exchange messages over a reliable protocol such
as TCP [3] or (preferably) the Stream Control Transmission Protocol
(SCTP) [5]. The protocol uses application-layer acknowledgements as
an indication of successful processing by the server. Strong
authentication or data confidentiality aren't supported by the
protocol, but can be supported by lower-layer mechanisms such as
IPsec [20] or TLS [21].
The protocol is bidirectional over the entire duration of a session.
There are 20 different message types. The protocol supports template
negotiation, not only at startup but also later on in a session, as
well as general status inquiries. There is a separate version
negotiation protocol defined over UDP.
2.1.2. CRANE Data Encoding
Data encoding is based on templates. Templates contain "keys"
representing items in data records. Clients (exporters) publish
templates to servers (collectors). Servers can then select the
subset of fields in a template that they are interested in. The
client will suppress keys that haven't been selected by the server.
Data records contain references to template and configuration
instances. They also carry sequence numbers (DSNs for Data Sequence
Numbers). These sequence numbers can be used to de-duplicate data
records that have been delivered multiple times during
failover/fail-back in redundant configurations. A "duplicate" bit is
set in these situations as a hint for the de-duplication process.
Leinen Informational [Page 3]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
The encoding of (flow information) data records themselves is very
compact. The client (exporter) can choose to send data in big-endian
(network byte order) or little-endian format. There are eighteen
fixed-size key types, as well as five variable-length string and
binary data (BLOB) types.
2.2. Diameter
Diameter [9][10] is an evolution of the Remote Authentication Dial In
User Service (RADIUS) protocol [22]. RADIUS is widely used to
outsource authentication and authorization in dialup access
environments. Diameter is a generalized and extensible protocol
intended to support Authentication, Authorization and Accounting
(AAA) requirements of different applications. Dialup and Mobile IPv4
are examples of such applications defined in the IETF.
2.2.1. Diameter Protocol Operation
Diameter is a peer-to-peer protocol. The base protocol defines
fourteen command codes, organized as seven request/response command
pairs. Presumably, only a subset of these would be used in a pure
IPFIX application. Diameter includes capability negotiation and
error notifications. Diameter operates over TCP or (preferred) SCTP.
There is a framework for end-to-end security, the mechanisms for
which are defined in a separate document. IPsec or TLS can be used
to provide authentication or encryption at the underlying layers.
2.2.2. Diameter Data Encoding
Diameter conveys data in the form of attribute/value pairs (AVPs).
An AVP consists of eight bytes of header plus the space to store the
data, which depends on the data format. There are numerous
predefined AVP data formats, including signed and unsigned integer
types, each in 32 and 64 bit variants, IPv4 and IPv6 addresses, as
well as others. The advocacy document [10] suggests that the
predefined data formats IPFilterRule and/or QoSFilterRule could be
extended to represent IP Flow Information. Such rules are
represented as readable UTF-8 strings. Alternatively, new AVPs could
be defined to represent flow information.
2.3. LFAP
LFAP [11][12][13] started out as the "Lightweight Flow Admission
Protocol" and was used to outsource shortcut creation decisions on
flow-based routers, as well as to provide per-flow statistics. Later
versions removed the admission function and changed the name to
"Lightweight Flow Accounting Protocol".
Leinen Informational [Page 4]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
2.3.1. LFAP Protocol Operation
The exporter in LFAP is called the Connection Control Entity (CCE),
and the collector is the Flow Accounting Server (FAS). These
entities communicate with each other over a TCP connection. LFAP
knows thirteen message types, including operations for connection
management, version negotiation, flow information messages and
administrative requests. Authentication and encryption can be
provided by IPsec or TLS at lower layers. Additionally, the LFAP
protocol itself supports four levels of security using HMAC-MD5
authentication and DES-CBC encryption. Note that DES is now widely
regarded as not adequately secure, because its small key size makes
brute-force attacks viable.
A distinguishing feature is that LFAP has two different message types
for flow information: A Flow Accounting Request (FAR) message is sent
when a new flow is identified at the CCE (meter/exporter).
Accounting information is sent later in one or multiple Flow Update
Notification (FUN) messages. A collector must match each FUN to a
Flow ID previously sent in a FAR.
The LFAP document also defines a set of useful statistics about the
accounting process. A separate MIB document [14] is provided for
management of LFAP entities using SNMP.
2.3.2. LFAP Data Encoding
LFAP encodes data in a Type/Length/Value format with four bytes of
overhead per data item (two bytes for the type and two bytes for the
length field).
2.4. NetFlow v9
NetFlow v9 [2][15] is a generalized version of Cisco's NetFlow
protocol. Previous versions of NetFlow, in particular version 5,
have been widely implemented and used for the exporting and
collecting of IP flow information.
2.4.1. NetFlow Protocol Operation
NetFlow uses a very simple protocol, with the exporter sending
template, options, and data "FlowSets" to the collector. FlowSets
are sequences of data records of similar format. NetFlow is the only
one of the candidate protocols that works over UDP [4]. Because of
the simple unidirectional nature of the protocol, it should be
relatively straightforward to add mappings to other transport
protocols such as SCTP or TCP.
Leinen Informational [Page 5]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
The use of SCTP to transport NetFlow v9 has been suggested in [16].
The suggested mapping describes how control and data can be mapped to
different streams within a single SCTP connection, and suggests that
the Partial Reliability extension [23] be used on data streams. In
the proposed mapping, the exporter would initiate the connection.
2.4.2. NetFlow Data Encoding
NetFlow v9 uses a template facility to describe exported data. The
data itself is represented in a compact way using network byte order.
2.5. Streaming IPDR
Streaming IPDR [17][18] is an application of the Network Data
Management-Usage (NDM-U) for IP Services specification version 3.1
[19]. It has been developed by the Internet Protocol Detail Record
Organization (IPDR, Inc. or ipdr.org). The terminology used is
similar to CRANE's, talking about Service Elements (SEs), mediation
systems and Business Support Systems (BSS).
2.5.1. Streaming IPDR Protocol Operation
Streaming IPDR operates over TCP. There is a "Trivial TCP Delivery"
mode as well as an "Acknowledged TCP Delivery" or "Reliable
Streaming" mode. The latter uses application-layer acknowledgements
for increased reliability.
The protocol is basically unidirectional. The exporter opens a
connection towards the collector, then sends a header followed by a
set of record descriptors. Then it can send "Usage Event" records
corresponding to these descriptors until the connection is
terminated. New record descriptors can be sent at any time.
Messages carry sequence numbers that are used for de-duplication
during failover. They are also referenced by application-level
acknowledgements when Reliable Streaming is used.
2.5.2. Streaming IPDR Data Encoding
IPDR uses an information modeling technique based on the XML-Schema
language [24]. Data can be represented in XML or in a streamlined
encoding based on the External Data Representation [25]. XDR forms
the basis of Sun's Remote Procedure Call and Network File System
protocols, and has proven to be both space- and processing-efficient.
Leinen Informational [Page 6]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
3. Broad Classification of Candidate Protocols
In order to evaluate the candidate protocols against the higher-level
requirements laid out in the IPFIX Working Group charter, it is
useful to group them into broader categories.
3.1. Design Goals
One way to look at the candidate protocols is to study the goals that
have directed their respective design. Note that the intention is
not to exclude protocols that have been designed with a different
class of applications in mind, but simply to better understand the
different tradeoffs that distinguish the protocols.
3.1.1. High-Performance Flow Metering (NetFlow, LFAP)
Of the candidate protocols, Cisco's NetFlow is the purest example of
a highly specialized protocol that has been designed with the sole
objective of conveying accounting data from flow-aware routers at
high rates. Starting from a fixed set of accounting fields, it has
been extended a few times over the years to support additional fields
and various types of aggregation in the metering/exporting process.
Riverstone's LFAP is similarly focused, except that it originated in
a protocol to outsource the decision whether to create shortcuts in
flow-based routers. This is still manifest in an increased emphasis
on reliable operation, and in the split reporting of flow information
using Flow Accounting Request (FAR) and Flow Update Notification
(FUN) messages.
It has been pointed out that split reporting as done by LFAP can
reduce memory requirements at the exporter. This concerns a subset
of attributes that are neither "key" attributes which define flows,
nor attributes such as packet or byte counters that must be updated
for each packet anyway. On the other hand, when there are many
short-lived flows, the number of flow export messages will be
significantly higher than with "unitary" flow export models, and the
collector will have to keep state about active flows until they are
terminated.
3.1.2. Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE)
Streaming IPDR and CRANE describe themselves as protocols to
facilitate the reliable transfer of accounting information between
Network Elements (or more generally "Service Elements" in the case of
IPDR) and Mediation Systems or Business Support Systems (BSS). They
Leinen Informational [Page 7]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
reflect a view of the accounting problem and of network system
architectures that originates in traditional "vertically integrated"
telecommunications.
Both protocols also emphasize extensibility with the goal of
applicability to a wide range of accounting tasks.
IPDR is based on NDM-U, which uses the XML-Schema language for
machine-readable specification of accounting data structures, while
using the efficient XDR encoding for the actual data transfer.
CRANE uses templates to describe exported data. These templates are
negotiated between collector and exporter and can change during a
session.
3.1.3. General-Purpose AAA (Diameter)
Diameter is another example of a broader-purpose protocol, in that it
covers aspects of authentication and authorization as well as
accounting. This explains its strong emphasis on security and
reliability. The design also takes into account various types of
intermediate agents.
3.2. Data Representation
IPFIX is intended to be deployed, among others, in high-speed routers
and to be used for exporting detailed flow data at high flow rates.
Therefore it is useful to look at the tradeoffs between the
efficiency of data representation and the extensibility of data
models. The two main efficiency goals should be (1) to minimize the
export data rate and (2) to minimize data encoding overhead in the
exporter. The overhead of decoding flow data at the collector is
deemed less critical, and is partly covered by efficiency target (2),
since an encoding that is easy on the encoder is often also easy on
the decoder.
3.2.1. Externally Described Encoding (CRANE, IPDR, NetFlow)
The protocols in this group use an external mechanism to fully
describe the format in which flow data is encoded. The mechanisms
are "templates" in the case of CRANE and NetFlow, and a subset of the
XML-Schema language, or alternatively XDR IDL, for IPDR.
Leinen Informational [Page 8]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
A fully external data format description allows for very compact
encoding, with data components such as 32-bit integers taking up only
four octets. The XDR representation used in IPDR additionally
ensures that larger fields are always aligned on 32-bit boundaries,
which can reduce processing requirements at both the exporter and the
collector, at a slight cost of space (thus bandwidth) due to padding.
Most protocols specify "network byte order" or "big-endian" format in
the export data format. CRANE is the only protocol where the
exporter may choose the byte ordering. The principal benefit is that
this lowers the processing demand on exporters based on little-endian
architectures.
3.2.2. Partly Self-describing Encoding (Diameter, LFAP)
Diameter and LFAP represent flow data using Type/Length/Value
encodings. While this makes it possible to partly decode flow data
without full context information - possibly useful for debugging - it
does increase the encoding size and thus the bandwidth requirements
both on the wire and in the exporter and collector.
LFAP has a "multi-record" encoding which claims to provide similar
wire efficiency as the externally described encodings while still
supporting diagnostic tools.
3.3. Protocol Flow
Another criterion for classification is the flow of protocol messages
between exporter and collector.
3.3.1. Mainly Unidirectional Protocols (IPDR, NetFlow)
In IPDR and NetFlow, the data flow is essentially from exporter to
collector, with the collector only sending acknowledgements. The
protocols send data descriptions (templates) on session
establishment, and then start sending flow export data based on these
templates. "Meta-information" about the operational status of the
metering and exporting processes (for example about the sampling
parameters in force at a given moment) is conveyed using a special
type of "Option" template in NetFlow v9. IPDR currently doesn't have
definitions for such "meta-data" types, but they could easily be
defined outside the protocol proper.
Leinen Informational [Page 9]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
3.3.2. Bidirectional Protocols (CRANE, LFAP)
CRANE allows for negotiation of the templates used for data export at
the start of a session, and also allows negotiated template updates
later on. CRANE sessions include an exporter and potentially several
collectors, so these negotiations can involve more than two parties.
LFAP has an initial phase of version negotiation, followed by a phase
of "data negotiation". After these startup phases, the exporter
sends FAR and FUN messages to the collector. However, either party
may also send Administrative Request (AR) messages to the other, and
will normally receive Administrative Request Answers (ARA) in
response. Administrative Requests can be used for status inquiries,
including information about a specific active flow, or for
negotiation of the "Information Elements" that the collector wants
the exporter to export.
3.3.3. Unidirectional after Negotiation (Diameter)
Diameter has a general capabilities negotiation mechanism. The use
of Diameter for IPFIX hasn't been described in sufficient detail to
determine how capabilities negotiation would be used. After
negotiation, the protocol would operate in essentially unidirectional
mode, with Accounting-Request (ACR) messages flowing from the
exporter to the collector, and Accounting-Answer (ACA) messages
flowing back.
4. Item-Level Compliance Evaluation
The template for protocol advocates noted that not all requirements
in [1] apply directly to the flow export protocol. In particular,
sections 4 (Distinguishing Flows) and 5 (Metering Process) mainly
specify requirements on the metering mechanism that "feeds" the
exporter. However, in some cases they require information about the
metering process to be reported to collectors, so the flow export
protocol must support conveying this information.
4.1. Meter Reliability (5.1)
CRANE, Diameter, IPDR consider requirement 5.1 (reliability of the
metering process or indication of "missing reliability") out of scope
for the IPFIX protocol, which presumably means that they assume the
metering process to be reliable.
The NetFlow v9 advocacy document takes a similar stance when it
claims "Total Compliance. The metering process is reliable."
(although this has been documented not to be true for all current
Cisco implementations of NetFlow v5).
Leinen Informational [Page 10]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
LFAP is the only protocol that explicitly addresses the possibility
that data might be lost in the metering process, and provides useful
statistics for the collectors to estimate, not just the amount of
flow data that was lost, but also the amount of data that was not
unaccounted for.
Note that in the general case, it can be considered unrealistic to
assume total reliability of a flow-based metering process in all
situations, unless sampling or coarse flow definitions are used.
With the fine-grained flow classification mechanisms mandated by
IPFIX, it is easy to imagine traffic where each - possibly very small
- packet would create a new flow. This kind of traffic is in fact
encountered in practice during aggressive port scans, and will
eventually lead to table overflows or exceeding of memory bandwidth
at the meter.
While some of these situations can be handled by dropping data later
on in the exporter, data transfer, or collector, or by transitioning
the meter to sampling mode (or increasing the sampling interval), it
will sometimes be considered the lesser evil to simply report on the
data that couldn't be accounted for. Currently LFAP is the only
protocol that supports this.
4.2. Sampling (5.2)
CRANE and IPDR don't mention the possibility of sampling. This is
natural because they are targeted towards telco-grade accounting,
where sampling would be considered inadmissible. Since support for
sampling is a "MAY" requirement, its lack could be tolerated, but
severely restricts the applicability of these protocols in places of
high aggregation, where absolute precision is not necessary. This
includes applications such as traffic profiling, traffic engineering,
and large-scale attack/intrusion detection, but also usage-based
accounting applications where charging based on sampling is agreed
upon.
The Diameter advocate acknowledges the existence of sampling and
suggests to define new (grouped) AVPs to carry information about the
sampling parameters in use.
LFAP does not currently support sampling, although its advocate
contends that adding support for this would be relatively
straightforward, without going into too much detail.
NetFlow v9 does support sampling (and many implementations and
deployments of sampled NetFlow exist for previous NetFlow versions).
Option Data is supposed to convey sampling configuration, although no
sampling-related field types have yet been defined in the document.
Leinen Informational [Page 11]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
4.3. Overload Behavior (5.3)
The requirements document suggests that meters adapt to overload
situations, for example by changing to sampling (or reducing the
sampling rate if sampling is already in effect), by changing the flow
definition to coarser flow categories (thinning), by stopping to
meter, or by reducing packet processing.
In these situations, the requirements document mandates that flow
information from before the modification of metering behavior can be
cleanly distinguished from flow information from after the
modification. For the suggested mitigation methods of sampling or
thinning, this essentially means that all existing flows have to be
expired, and an entirely new set of flows must be started. This is
undesirable because it causes a peak of resource usage in an already
overloaded situation.
LFAP and NetFlow claim to handle this requirement, both by supporting
only the simple overload mitigation methods that don't require the
entire set of existing flows to be expired. The NetFlow advocate
claims that the reporting requirement could be easily met by expiring
existing flows with the old template, while sending a new template
for new flows. While it is true that NetFlow handles this
requirement in a very graceful manner, the general performance issue
remains.
CRANE, Diameter, and IPDR consider the requirement out of scope for
the protocol, although Diameter summarily acknowledges the possible
need for new AVP definitions related to mitigation methods.
4.4. Timestamps (5.4)
All protocols support reporting of timestamps with the required (one
centisecond) or better precision.
4.5. Time Synchronization (5.5)
While all other protocols have timestamp types that are relative to a
well-known reference time, timestamps in NetFlow are reported
relative to the sysUpTime of the exporting device. For applications
that require the absolute start/end times of flows, this means that
exporter sysUpTime has to be matched with absolute time. Although
every NetFlow export packet header contains a "UNIX Secs" field, it
cannot be used for UTC synchronization without loss of precision,
because this field only has 1-second resolution.
Leinen Informational [Page 12]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
4.6. Flow Expiration (5.6)
As currently specified, this requirement concerns the metering
process only and has no bearing on the export protocol.
If it is desired to export the reason for flow expiration (e.g.,
inactivity timeout, active flow timeout, expiration to reclaim
resources, or observation of a flow termination indication such as a
TCP FIN segment), then none of the protocols currently supports this,
although each could be extended to do so.
4.7. Ignore Port Copy (5.9)
This requirement only concerns the metering process and has no
bearing on the export protocol.
4.8. Information Model (6.1)
All candidate protocols have information models that can represent
all required and all optional attributes. The Diameter contribution
lacks some detail on how exactly the IPFIX-specific attributes should
be mapped.
4.9. Data Model (6.2)
4.9.1. Data Model Extensibility
Each candidate protocol defines a data model that allows for some
degree of extensibility.
CRANE uses Keys to specify fields in templates. A key "specification
MUST consist of the description and the data type of the accounting
item." Apparently extensibility is intended, but it is not clear
whether adding a new Key really only involves writing a textual
description and deciding upon a base type. Every Key also has a 32-
bit Key ID, but from the current specification they don't seem to
carry global semantics.
Diameter's Attribute/Value Pairs (AVP) have a 32-bit identifier (AVP
Code) administered by IANA. In addition, there is an optional 32-bit
Vendor-ID that can contain an SMI Enterprise Number for vendor-
defined attributes. If the Vendor-ID (and a corresponding flag in
the attribute) is set, the AVP Code becomes local to that vendor.
IPDR uses a subset of the XML-Schema language for extensibility, thus
allowing for vendor- and application-specific extensions of the data
model.
Leinen Informational [Page 13]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
In LFAP, flow attributes are defined as Information Elements. There
is a 16-bit IE type code (which is carried in the export protocol for
every IE). One type code is reserved for vendor-specific extensions.
Arbitrary sub-types of the vendor-specific IE can be defined using
ASN.1 Object IDs (OIDs).
In NetFlow v9 as reviewed, data items are identified by a sixteen-bit
field type. 26 field types are defined in the document. The
document suggests to look check a Web page at Cisco Systems' site for
the current list of field types. It would be preferable if the
administration of the field type space would be delegated to IANA.
4.9.2. Flexible Flow Record Definition
All protocols allow for flexible flow record definitions. CRANE and
LFAP make the selection/negotiation of the attributes to be included
in flow records a part of the protocol, the other protocols leave
this to outside configuration mechanisms.
4.10. Data Transfer (6.3)
4.10.1. Congestion Awareness (6.3.1)
All protocols except for NetFlow v9 operate over a single TCP or SCTP
transport connection, and inherit the congestion-friendliness of
these protocols.
NetFlow v9 was initially defined to operate over UDP, but specified
in a transport-independent manner. Recently, a document [16] has
been issued that describes how NetFlow v9 can be run over SCTP with
the proposed Partial Reliability extension. This transport mapping
would fill the congestion awareness requirement.
4.10.2. Reliability (6.3.2)
The requirements in the area of reliability are specified as follows:
If flow records can be lost during transfer, this must be indicated
to the collector in a way that permits the number of lost records to
be gauged; and the protocol must be open to reliability extensions
including retransmission of lost flow records, detection of
exporter/collector disconnection and fail-over, and acknowledgement
of flow records by the collecting process (application-level
acknowledgements).
Here are a few observations regarding the candidate protocols'
approaches to reliability. Note that the requirement for multiple
collectors (8.3) also touches on the issue of reliability.
Leinen Informational [Page 14]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
CRANE, Diameter, and IPDR, as protocols that strive to be carrier-
grade accounting protocols, understandably exhibit a strong emphasis
on near-total reliability of the flow export process. All three
protocols use application-level acknowledgements (in case of IPDR,
optionally) to include the entire collection process in the feedback
loop. Indications of "lack of reliability" (lost flow data) are
somewhat unnatural to these protocols, because they take every effort
to never lose anything. These protocols seem suitable in situations
where one would rather drop a packet than forward it unaccounted for.
LFAP has application-level acknowledgements, and it also reports
detailed statistics about lost flows and the amount of data that
couldn't be accounted for. It represents a middle ground in that it
acknowledges that accounting reliability will sometimes be sacrificed
for the benefit of other tasks, such as switching packets, and
provides the tools to gracefully deal with such situations.
NetFlow v9 is the only protocol for which the use of a "reliable"
transport protocol is optional, and the only protocol that doesn't
support application-level acknowledgements. In all fairness, it
should be noted that it is a very simple and efficient protocol, so
in an actual deployment it might exhibit a higher level of
reliability than some of the other protocols given the same amount of
resources.
4.10.3. Security (6.3.3)
4.10.3.1. IPsec and TLS
All protocols can use, and their descriptions in fact recommend them
to use, lower-layer security mechanisms such as IPsec and, with the
exception of NetFlow v9 over UDP, TLS. It can be argued that in all
envisioned usage scenarios for IPFIX, both IPsec and TLS provide
sufficient protection against the main identified threats of flow
data disclosure and forgery.
The Diameter document is the only protocol definition that goes into
sufficient level of detail with respect to the application of these
mechanisms, in particular the negotiation of certificates and ciphers
in TLS, and the use of IKE [6] for IPsec. Diameter also mandates
that either IPsec or TLS be used.
4.10.3.2. Application-level Security
Diameter suggests an additional end-to-end security framework for
dealing with untrusted third-party agents. I am not entirely
convinced that this additional level of security justifies the
additional complexity in the context of IPFIX.
Leinen Informational [Page 15]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
LFAP [11] is the only other protocol that includes some higher-level
security mechanisms, providing four levels of security including no
security, authenticated peers, flow data authentication, and flow
data encryption using HMAC-MD5-96 and DES-CBC.
As far as the author can judge (not being a security expert), LFAP's
built-in support for authentication and encryption doesn't provide
significant additional security compared with the use of TLS or
IPsec. It is potentially useful in situations where TLS or IPsec are
unavailable for some reason, although in the context of IPFIX
scenarios, it should be possible to assume support for these lower-
layer mechanisms if the participating devices are capable of the
necessary cryptographic methods at all.
4.10.4. Push and Pull Mode Reporting (6.4)
All protocols support the mandatory "push" mode.
The optional "pull" mode could be supported relatively easily in
Diameter, and is foreseen in NDM-U, the basis of the Streaming IPDR
proposal. CRANE, LFAP and NetFlow don't have a "pull" mode. For
CRANE and LFAP, adding one would not violate the spirit of the
protocols because they are already two-way, and in fact LFAP already
foresees inquiries about specific active flows using Administrative
Request (AR) messages with a RETURN_INDICATED_FLOWS Command Code IE.
4.10.5. Regular Reporting Interval (6.5)
As stated, this requirement concerns the metering process only and
has no bearing on the export protocol.
4.10.6. Notification on Specific Events (6.6)
The specific events listed in the requirements documents as examples
for "specific events" are "the arrival of the first packet of a new
flow and the termination of a flow after flow timeout". For the
former, only LFAP explicitly generates messages upon creation of a
new flow. NetFlow always exported flow information on expiration of
flows, either due to timeout or due to an indication of flow
termination. The other protocols are unspecific about when flow
information is exported.
On "specific events" in general, all protocols have some mechanism
that could be used for notification of asynchronous events. An
example for such an event would be that the sampling rate of the
meter was changed in response to a change in the load on the
exporting process.
Leinen Informational [Page 16]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
CRANE has Status Request/Status Response messages, but as defined,
Status Requests can only be issued by the server (collector), so they
cannot be used by the server to signal asynchronous events. As in
IPDR, this could be circumvented by defining templates for meta-
information.
Diameter could use special Accounting-Request messages for event
notification.
IPDR would presumably define pseudo-"Usage Events" using an XML
Schema so that events can be reported along with usage data.
LFAP has Administrative Requests (AR) that can be initiated from
either side. The currently defined ARs are all information inquiries
or reconfiguration requests, but new ARs could be defined to provide
unsolicited information about specific asynchronous events. The LFAP
MIB also defines some traps/notifications. SNMP notifications are
useful to signal events to a network management system, but they are
less attractive as a mechanism to signal events that should be
somehow handled by a collector.
In NetFlow v9, Option Data FlowSets are defined to convey information
about the metering and export processes. The current document
specifies that Option Data should be exported periodically, although
this requirement will be relaxed for asynchronous events. It should
be noted that periodical export of option flowsets (and also of
templates) may have been considered necessary because NetFlow can run
over an unreliable transport; it seems less natural when a reliable
transport such as TCP is used.
4.10.7. Anonymization (6.7)
None of the protocols include explicit support for anonymization.
All protocols could be extended to convey when and how anonymization
is being performed by an exporter, using mechanisms similar to those
that would be used to report on sampling.
4.10.8. Several Collecting Processes (8.3)
CRANE, Diameter, and IPDR all support multiple collectors in a backup
configuration. The failover case is analyzed in some detail, with
support for data buffering and de-duplication in failover situations.
NetFlow takes a more simple-minded approach in that it allows
multiple (currently: two) collectors to be configured in an exporter.
Both collectors will generally receive all data and could use
sequence numbers and inter-collector communication to de-duplicate
them. This is a simple way to improve availability but may also be
Leinen Informational [Page 17]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
considered to be wasteful, both in terms of bandwidth and in terms of
other exporter resources. With the current UDP mapping it is easy
enough to send multiple copies of datagrams to different collectors,
but when SCTP or TCP is used, sending all data over multiple
connections will exacerbate performance issues.
Failover in LFAP must take into account that flow information is
split into FARs and FUNs. When a (primary) FAS A fails, a secondary
FAS B will receive FUNs for flows whose FARs had only been sent to A.
If such FUNs are to be handled correctly in the failover case, then
either the set of active flows must be kept in sync between the
primary and backup FASs, or the exporting CCE must have a way to
generate new FARs on failover.
5. Conclusions
Every candidate protocol has its strengths and weaknesses. If the
primary goal of the IPFIX standardization effort were to define a
carrier-grade accounting protocol that can also be used to carry IP
flow information, then one of CRANE, Diameter and Streaming IPDR
would probably be the candidate of choice.
But since the goal is to standardize existing practice in the area of
IP Flow Information Export, it makes sense to analyze why previous
versions of NetFlow have been so widely implemented and used. The
strong position of Cisco in the router market certainly played a
major role, but we should not underestimate the value of having a
simple and streamlined protocol that "does one thing and does it
well". It has been extremely easy to write NetFlow collecting
processes, as all the protocol demands from a collector is to sit
there and receive data. This model is no longer adequate when one
wants to support increased levels of reliability or dynamically
changing semantics for data export. But NetFlow remains a simple
protocol, mainly by leaving out issues of configuration/negotiation.
So far, the biggest issue with NetFlow is that it could not resolve
itself to mandate a reliable (and congestion-friendly) transport.
This could easily be fixed, and bring with it some additional
possibilities for simplifications. For example it would no longer be
necessary to periodically retransmit Template FlowSets, and Option
Data FlowSets could become a more versatile way of reporting meta-
information about the metering and exporting processes either
synchronously or asynchronously. Application-level acknowledgements
- possibly as an option - would be a low-impact addition to improve
overall reliability.
Leinen Informational [Page 18]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
LFAP is also relatively focused on flow information export, but
carries around too much baggage from its youth as the Lightweight
Flow Admission Protocol. The bidirectional nature and large number
of message types in the protocol are one symptom of this, the
separation of flow information into FARs and FUNs - which must be
matched at the collector - are another. Data encoding is less
space-efficient than that of CRANE, NetFlow or IPDR, and will present
a performance issue at high flow rates.
LFAP's indications of unaccounted data and its MIB are excellent
features that would be very useful in many operational situations.
5.1. Recommendation
It is the opinion of the evaluation team that the goals of the IPFIX
WG charter would best be served by starting with NetFlow v9, working
on lacking mechanisms in the areas of transport, security,
reliability, and redundant configurations, and doing so very
carefully in order to retain as much simplicity as possible and to
avoid overloading the protocol. By starting from the simplest
protocol that meets a large percentage of the specific requirements,
we can hope to arrive at a protocol that meets all requirements and
still allows widespread and cost-effective implementation.
As evaluated, NetFlow v9 doesn't specify any security mechanisms.
The IPFIX protocol specification must specify how the security
requirements in section 6.3.3 of [1] can be assured. The IPFIX
specification must be specific about the choice of security-
supporting protocol(s) and about all relevant issues such as security
negotiation, protocol modes permitted, and key management.
The other important requirement that isn't fulfilled by NetFlow v9
today is support for a congestion-aware protocol (see section 6.3.1
of [1]). So a mapping to a known congestion-friendly protocol such
as TCP, or, as suggested in [16], (PR-)SCTP, is considered as another
necessary step in the preparation of the IPFIX specification.
6. Security Considerations
The security mechanisms of the candidate protocols were discussed in
Section 4.10.3.
7. Acknowledgements
Many of the issues have been discussed with the other members of the
IPFIX evaluation team: Juergen Quittek, Mark Fullmer, Ram Gopal, and
Reinaldo Penno. Many participants on the ipfix mailing list provided
valuable feedback, including Vamsidhar Valluri, Paul Calato, Tal
Leinen Informational [Page 19]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
Givoly, Jeff Meyer, Robert Lowe, Benoit Claise, and Carter Bullard.
Bert Wijnen, Steve Bellovin, Russ Housley, and Allison Mankin
provided valuable feedback during AD and IESG review.
8. References
8.1. Normative References
[1] Quittek, J., Zseby, T., Claise, B., and S. Zander,
"Requirements for IP Flow Information Export", RFC 3917,
October 2004.
[2] Claise, B., Ed., "Cisco Systems NetFlow Services Export Version
9", RFC 3954, October 2004.
[3] Postel, J., "Transmission Control Protocol", STD 7, RFC 793,
September 1981.
[4] Postel, J., "User Datagram Protocol", STD 6, RFC 768, August
1980.
[5] Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer,
H., Taylor, T., Rytina, I., Kalla, M., Zhang, L., and V.
Paxson, "Stream Control Transmission Protocol", RFC 2960,
October 2000.
[6] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)",
RFC 2409, November 1998.
8.2. Informative References
[7] Zhang, K. and E. Elkin, "XACCT's Common Reliable Accounting for
Network Element (CRANE) Protocol Specification Version 1.0",
RFC 3423, November 2002.
[8] Zhang, K., "Evaluation of the CRANE Protocol Against IPFIX
Requirements", Work in Progress, September 2002.
[9] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. Arkko,
"Diameter Base Protocol", RFC 3588, September 2003.
[10] Zander, S., "Evaluation of Diameter Protocol against IPFIX
Requirements", Work in Progress, September 2002.
[11] Calato, P. and M. MacFaden, "Light-weight Flow Accounting
Protocol Specification Version 5.0", July 2002.
Leinen Informational [Page 20]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
[12] Calato, P. and M. MacFaden, "Light-weight Flow Accounting
Protocol Data Definition Specification Version 5.0", July 2002.
[13] Calato, P., "Evaluation Of Protocol LFAP Against IPFIX
Requirements", Work in Progress, September 2002.
[14] Calato, P. and M. MacFaden, "Light-weight Flow Accounting
Protocol MIB", Work in Progress, September 2002.
[15] Claise, B., "Evaluation Of NetFlow Version 9 Against IPFIX
Requirements", Work in Progress, September 2002.
[16] Djernaes, M., "Cisco Systems NetFlow Services Export Version 9
Transport", Work in Progress, February 2003.
[17] Meyer, J., "Reliable Streaming Internet Protocol Detail
Records", Work in Progress, August 2002.
[18] Meyer, J., "Evaluation Of Streaming IPDR Against IPFIX
Requirements", Work in Progress, September 2002.
[19] Internet Protocol Detail Record Organization, "Network Data
Management - Usage (NDM-U) For IP-Based Services Version 3.1",
April 2002. URL: http://www.ipdr.org/documents/NDM-U_3.1.pdf
[20] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", RFC 2401, November 1998.
[21] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", RFC
2246, January 1999.
[22] Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote
Authentication Dial In User Service (RADIUS)", RFC 2865, June
2000.
[23] Stewart, R., Ramalho, M., Xie, Q., Tuexen, M., and P. Conrad,
"Stream Control Transmission Protocol (SCTP) Partial
Reliability Extension", RFC 3758, May 2004.
[24] DeRose, S., Maler, E. and D. Orchard, "XML 1.0 Recommendation",
W3C FirstEdition REC-xml-19980210, February 1998.
[25] Srinivasan, R., "XDR: External Data Representation Standard",
RFC 1832, August 1995.
[26] <http://www.nmops.org/>
[27] <http://www.ipdr.org/>
Leinen Informational [Page 21]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
Appendix A. A Note on References to the Candidate Protocol Documents
At the time of the evaluation, the candidate protocol definitions, as
well as their respective accompanying advocacy documents, were
available as Internet-Drafts. As of the time of publication of this
document, some of the protocols have been published as RFCs, others
are still being revised as Internet-Drafts, and some will have
expired. This document attempts to extract the relevant information
from the individual protocol definitions and, in the context of the
IPFIX requirements, provide a meaningful comparison between them.
Since this evaluation proposes to use NetFlow v9 as the basis for the
IPFIX protocol, only the reference to this protocol is considered
"normative", although strictly spoken, the present document doesn't
define any protocol, and the selected protocol will have to be
further refined to become the IPFIX protocol.
In the interest of stable references, the bibliography points to RFCs
where those have become available (for DIAMETER and CRANE). Other
protocols are still available only as Internet-Drafts and may
eventually expire. The LFAP drafts - which already have expired -
are still available from the www.nmops.org Web site [26] (as well as
other places). The IPDR documents are available on the IPDR Web site
[27].
Author's Address
Simon Leinen
SWITCH
Limmatquai 138
P.O. Box
CH-8021 Zurich
Switzerland
Phone: +41 1 268 1536
EMail: simon@switch.ch
Leinen Informational [Page 22]
^L
RFC 3955 Evaluation of Candidate Protocols for IPFIX October 2004
Full Copyright Statement
Copyright (C) The Internet Society (2004).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and at www.rfc-editor.org, and except as set
forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the ISOC's procedures with respect to rights in ISOC Documents can
be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Leinen Informational [Page 23]
^L
|