summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5606.txt
blob: 2e4519486e57df4f1f33c3e6d2a58dcee07ac507 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
Network Working Group                                        J. Peterson
Request for Comments: 5606                                 NeuStar, Inc.
Category: Informational                                        T. Hardie
                                                                Qualcomm
                                                               J. Morris
                                                                     CDT
                                                             August 2009


  Implications of 'retransmission-allowed' for SIP Location Conveyance

Abstract

   This document explores an ambiguity in the interpretation of the
   <retransmission-allowed> element of the Presence Information Data
   Format for Location Objects (PIDF-LO) in cases where PIDF-LO is
   conveyed by the Session Initiation Protocol (SIP).  It provides
   recommendations for how the SIP location conveyance mechanism should
   adapt to this ambiguity.

   Documents standardizing the SIP location conveyance mechanisms will
   be Standards-Track documents processed according to the usual SIP
   process.  This document is intended primarily to provide the SIP
   working group with a statement of the consensus of the GEOPRIV
   working group on this topic.  It secondarily provides tutorial
   information on the problem space for the general reader.

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (c) 2009 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents in effect on the date of
   publication of this document (http://trustee.ietf.org/license-info).
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow



Peterson, et al.             Informational                      [Page 1]
^L
RFC 5606                Location Retransmission              August 2009


   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

Table of Contents

   1. Introduction ....................................................2
   2. Problem Statement ...............................................3
   3. Recommendation ..................................................5
      3.1. Goals ......................................................5
      3.2. Core Semantics .............................................5
      3.3. Limiting Access ............................................6
           3.3.1. Limiting Access Using Public Key Encryption .........6
           3.3.2. Limiting Access Using Location-by-Reference .........7
           3.3.3. Refraining from Including Location Information ......8
      3.4. Choosing among the Available Mechanisms ....................8
      3.5. Indicating Permission to Use Location-Based Routing
           in SIP .....................................................8
      3.6. Behavior of Back-to-Back User Agents ......................10
   4. Security Considerations ........................................10
   5. Acknowledgements ...............................................10
   6. Informative References .........................................11

1.  Introduction

   The Presence Information Data Format for Location Objects (PIDF-LO
   [RFC4119]) carries both location information (LI) and policy
   information set by the Rule Maker, as is stipulated in [RFC3693].
   The policy carried along with LI allows the Rule Maker to restrict,
   among other things, the duration for which LI will be retained by
   recipients and the redistribution of LI by recipients.

   The Session Initiation Protocol [RFC3261] is one proposed Using
   Protocol for PIDF-LO.  The conveyance of PIDF-LO within SIP is
   specified in [LOC-CONVEY].  The common motivation for providing LI in
   SIP is to allow location to be considered in routing the SIP message.
   One example use case would be emergency services, in which the
   location will be used by dispatchers to direct the response.  Another
   use case might be providing location to be used by services
   associated with the SIP session; a location associated with a call to
   a taxi service, for example, might be used to route to a local
   franchisee of a national service and also to route the taxi to pick
   up the caller.




Peterson, et al.             Informational                      [Page 2]
^L
RFC 5606                Location Retransmission              August 2009


   Some ambiguities have arisen in the interpretation of Rule Maker
   policy when PIDF-LO is conveyed by SIP.  The following sections
   explore the problem and provide a recommendation.

2.  Problem Statement

   The <retransmission-allowed> element of RFC 4119 was designed for use
   in an environment like that of Section 4 of RFC 3693, in which
   Location Information (LI) propagates from a Location Generator
   through a Location Server (LS) to a Location Recipient (LR).  In this
   architecture, it is the responsibility of the Location Server to act
   on the rules (policy) governing access control to LI, which are in
   turn set by the Rule Maker.  The most important of these
   responsibilities is delivering LI to authorized Location Recipients
   and denying it to others.  Internal to [RFC4119]-compliant location
   objects (LOs) are additional privacy rules which are intended to
   constrain Location Recipients.  These include the <retransmission-
   allowed> element.  This element is intended to prevent a compromise
   of privacy when an authorized recipient of LI shares that LI with
   third-party entities, principally those who are not authorized by the
   Rule Maker to receive LI.  For example, a user might be willing to
   share their LI with a pizza shop, but they might not want that pizza
   shop to sell their LI to a targeted advertising company that will
   contact the user with coupons for a nearby hair salon.

   Bear in mind, however, that <retransmission-allowed> is not intended
   to provide any protocol-level mechanism to prevent unauthorized
   parties from learning location through means like eavesdropping.  It
   is merely a way to express the preferences of the Rule Maker to the
   LR.  If the LR were, for example, legally bound to follow the privacy
   preferences expressed by Rule Makers, then they might incur liability
   if they ignored the <retransmission-allowed> parameter.  No further
   privacy protection is assumed to be provided by <retransmission-
   allowed>.

   There is a use case for LI that involves embedding it in a SIP
   request that will potentially traverse multiple SIP intermediaries
   before arriving at a user agent server (UAS).  In this use case, one
   or more intermediaries might inspect the LI in order to make a SIP
   routing decision; we will hereafter refer to this as location-based
   routing.  Common examples could include emergency services and other
   more mundane cases where the originator of a SIP request wants to
   reach a service in proximity to a particular geographic location,
   such as contacting a nearby pizza shop.  In both such cases, the UAC
   may intend for selected intermediaries and the UAS to have access to
   the LI.  In the pizza case, for instance, the user agent client (UAC)





Peterson, et al.             Informational                      [Page 3]
^L
RFC 5606                Location Retransmission              August 2009


   shares an address both for location-based routing and additionally so
   that the pizza shop reached by that routing has the address to which
   a pizza should be sent.

   This location-based routing use case for LI has a number of important
   disconnects from the RFC 3693 model.  Unlike the RFC 3693 model,
   there is no LS designating to which specific entities LI will be
   sent.  There may be multiple intermediaries between the UAC and UAS,
   some of which will need or want to inspect LI (which would seem to
   qualify them as LRs) and some of them will not.  While SIP proxy
   servers generally are not [RFC4119]-aware and do not need to inspect
   SIP request bodies in order to perform their function, nothing
   precludes proxy servers inspecting or logging any SIP message bodies,
   including LI.  Furthermore, it is very difficult for the UAC to
   anticipate which intermediaries and which eventual UAS a SIP request
   might reach.

   This architecture is further complicated by the possibility of
   sending location information by-reference, that is, placing a URL
   where LI can be retrieved in SIP requests instead of using a PIDF-LO
   body (commonly called including the PIDF-LO by value).  Depending on
   the qualities of a reference, further authorization checks may be
   performed before LI is retrieved, LI may be customized depending on
   who is asking, and so forth.  As will be discussed in greater detail
   below, the conveyance of a reference may have very different privacy
   properties than conveying a PIDF-LO body by-value in a SIP request.

   In this architecture, the question of who is an "authorized
   recipient" from the point of view of the Rule Maker has been muddy.

   The SIP elements along the path are authorized to receive and forward
   the SIP message; does that make them automatically authorized
   recipients of the LI it contains?  The final target of the SIP
   message will receive the LI along with other information, but it may
   be different than the initial target in a variety of scenarios; is it
   authorized to read the LI?

   These questions and concerns are particularly problematic when
   <retransmission-allowed> is set to "no" (the default case).  This
   core concern might be put as "to whom does <retransmission-allowed>
   apply in location-based routing?"  More specifically:

   Is any entity that reads LI bound by <retransmission-allowed>?  If
   so, does that mean a proxy that performs location-based routing is
   unable to forward a request and complete a SIP call if
   <retransmission-allowed> is "no"?  Alternatively, must they strip the
   location body from the message in order to complete the call?




Peterson, et al.             Informational                      [Page 4]
^L
RFC 5606                Location Retransmission              August 2009


   If the proxy does not understand RFC 4119, it may forward a SIP
   message containing a policy statement <retransmission-allowed> set to
   "no".  Is any proxy that does understand RFC 4119 required to parse
   the LI for this statement, even if it would not do so in order to
   route the message?

   Is there a need for SIP-level indications regarding retransmission
   for the benefit of entities that do not understand RFC 4119?

   Since the UAC cannot anticipate who may receive a SIP request, how do
   we understand who the intended LR is in the location-based routing
   case?  Can a UAC have intended for there to be multiple serial LRs in
   a transmission?  If so, if one LR is authorized to retransmit to
   another LR, how will it know it is not also authorized to transmit LI
   to other third parties (i.e., how will the serial LRs know to whom
   they are authorized to retransmit)?  How could all of this be
   designated?

3.  Recommendation

   The following sections provide a recommendation for how the
   <retransmission-allowed> flag should be understood in a SIP
   environment.  The core semantics of this recommendation represent the
   consensus of the GEOPRIV working group.  While Section 3.5 proposes a
   syntax that might be adopted by the SIP WG to implement these
   semantics in its protocol, the actual syntax of SIP is the
   responsibility of the SIP WG.

3.1.  Goals

   After extensive discussion in both GEOPRIV and SIP contexts, there
   seems to be consensus that a solution for this problem must enable
   location-based routing to work even when the <retransmission-allowed>
   flag is set to "no".  A solution should also give the Rule Maker the
   ability to allow or forbid the use of LI for location-based routing
   and the ability to allow or forbid the use of LI for the consumption
   of the endpoint.

3.2.  Core Semantics

   Consensus has emerged that any SIP entity that receives a SIP message
   containing LI through the operation of SIP's normal routing
   procedures or as a result of location-based routing should be
   considered an authorized recipient of that LI.  Because of this
   presumption, one SIP element may pass the LI to another even if the
   LO it contains has <retransmission-allowed> set to "no"; this sees
   the passing of the SIP message as part of the delivery to authorized
   recipients, rather than as retransmission.  SIP entities are still



Peterson, et al.             Informational                      [Page 5]
^L
RFC 5606                Location Retransmission              August 2009


   enjoined from passing these messages outside the normal routing to
   external entities if <retransmission-allowed> is set to "no", as it
   is the passing to third parties that <retransmission-allowed> is
   meant to control.

   This architecture is considerably different from the presumptions of
   RFC 3963, in that authorized recipients pass the LO on to other
   authorized recipients, but it seems to be the most sensible mechanism
   given SIP's operation.

   To maintain the Rule Maker's ability to affect the consumption of
   this information, two different mechanisms may be used to limit the
   distribution of LI and one may used to limit the sphere in which it
   may be used; these are discussed below.

3.3.  Limiting Access

3.3.1.  Limiting Access Using Public Key Encryption

   One way of limiting access to LI is to encrypt the PIDF-LO object in
   a SIP request.  If the originator knows which specific entity on the
   path needs to inspect the LI, and knows a public key for that entity,
   this is a straightforward matter.  It is even possible to encrypt
   multiple instance of PIDF-LO, containing different policies or levels
   of location granularity, in the same SIP request if multiple entities
   along the path need to inspect the location.

   This is most likely to be effective in cases where the originator
   does not wish the LI to be inspected by intermediate entities and has
   the public key for the target of the SIP message, as it is very
   difficult for the originator to anticipate the intermediaries through
   which a SIP message will pass.  It may also be useful in limited
   environments where the originator has a trust relationship with a
   specific SIP element (e.g., a "home" or first-hop proxy) and it wants
   to reveal that LI only to that element.

   Note that even in the case where the originator intends to encrypt LI
   for the benefit only of the target of the message, it may be quite
   difficult to anticipate the eventual endpoint of the message.  These
   encrypted LIs will not be useful in any case where the anticipation
   of the originators is not met.

   An additional problem posed by this approach is that it requires some
   sort of public key discovery system, which compounds the operational
   complexity significantly.  While this method is included for
   completeness, it is the consensus of the working group that the
   deployment scenarios in which this is appropriate will be relatively
   few; we do not believe it is an appropriate baseline approach.



Peterson, et al.             Informational                      [Page 6]
^L
RFC 5606                Location Retransmission              August 2009


3.3.2.  Limiting Access Using Location-by-Reference

   Another, more feasible approach is leveraging location by reference.
   When a SIP request conveys a reference, it cannot be properly said to
   be conveying location; location is conveyed upon dereferencing the
   URI in the question, and the meaning of <retransmission-allowed> must
   be understood in the context of that conveyance, not the forwarding
   of the SIP request.

   The properties of references, especially the security properties,
   vary significantly depending on the nature and disposition of the
   resource indicated.  Clearly, if the referenced PIDF-LO is available,
   in the same form, to any entity along the SIP signaling path that
   requests it, then inserting a reference has no advantages over
   inserting LI by value (and introduces wasteful complexity).  However,
   if the Rule Maker influences the results of the dereferencing
   process, including determining who can receive LI at what degree of
   granularity and what policies are bound with the LI, the security
   properties are different.

   It might superficially appear that this suffers from the same
   problems as the encryption approach, since the Rule Maker must
   anticipate a set of entities who are authorized to receive location
   information.  The difference is that this set does not need to be
   communicated in the SIP request in order for authorization decisions
   to be made.  There is a world of difference between managing a
   whitelist of a thousand parties that might ask for LI and sending a
   SIP request containing a thousand differently encrypted adumbrations
   on LI -- the former is commonplace and the latter is impossible.
   Additionally, some Rule Maker policies might not even require the
   establishment of an exhaustive whitelist.  For example, it may be
   that there exists a finite set of commercial requestors that the Rule
   Maker would like to block, in a manner similar to the way ad-blockers
   operate in modern web browsers.

   In any system where one makes an authorization decision, a certain
   cost in authentication must be paid -- the greater the assurance the
   greater the cost.  The precise cost will of course depend on the URI
   scheme of the reference.  For SIP, Digest has a low computational
   cost but requires pre-established keys, which limits applicability.
   RFC 4474 Identity does not require any pre-association, but it does
   make signaling more heavyweight and requires the deployment of
   additional features in the network, including a web-like public key
   infrastructure (PKI).

   But even if no authentication takes place, in the Location-by-
   Reference (LbyR) case the meaning of <retransmission-allowed> is
   unambiguous -- each entity to which LI is conveyed in the dereference



Peterson, et al.             Informational                      [Page 7]
^L
RFC 5606                Location Retransmission              August 2009


   process is bound by the retransmission policy.  The cost of the
   reference itself is of course the server that maintains the resource.
   While not every SIP client has access to an appropriate server for
   this purpose, the fact that PIDF-LO builds on the typical SIP
   presence service makes this less implausible than it might be.
   Moreover, the LbyR approach casts the conveyance architecture in a
   manner familiar from RFC 3693, with a Location Server receiving
   requests from Location Recipients, which may be accepted or denied.
   This allows the preservation of the original semantics of
   <retransmission-allowed>.

3.3.3.  Refraining from Including Location Information

   The most fundamental mechanism for limiting access to location
   information is simply not including it.  While location-based routing
   might conceivably occur in almost any SIP message in the future,
   there is no requirement that location be included in the general case
   to support it.  If it is not included and is required, an appropriate
   error indicating the lack may be returned and the choice made to
   continue communication with the information included.  This challenge
   and response will slow the establishment of communication when it is
   required, but it is the most basic way to ensure that location
   distribution is limited to the times when it is required for
   communication to proceed.

3.4.  Choosing among the Available Mechanisms

   Refraining from including location is the most appropriate choice for
   systems that do not wish to reveal location to any party in the SIP
   path.

   Location-by-Reference is generally recommended as the most deployable
   mechanism for limiting access to LI which is passed via a SIP
   message.  It is significantly easier to deploy than public key
   discovery systems, allows for both whitelists and blacklists, and can
   scale in ways that the inclusion of multiple encrypted bodies cannot.
   Encryption may be used in a limited set of circumstance where
   location-by-value must be used.

3.5.  Indicating Permission to Use Location-Based Routing in SIP

   The discussion in Section 3.3.2 describes 3 mechanisms for limiting
   the distribution of LI to specific entities.  There remains the
   problem of limiting the use to which LI included by value or by
   reference may be put.  In order to meet the need to limit that use,
   this document recommends the creation of a syntactical element in SIP
   to carry this information.  As an exemplary concrete proposal, we
   recommend a "Location-Routing-Allowed" header as described below.



Peterson, et al.             Informational                      [Page 8]
^L
RFC 5606                Location Retransmission              August 2009


   When "Location-Routing-Allowed" is set to "Yes", the Rule Maker is
   indicating permission to use the included LI for location-based
   routing.  When "Location-Routing-Allowed" is set to "No", the
   originator is indicating that this use is not permitted.  "Location-
   Routing-Allowed" being set to "No" has no protocol-level mechanism
   for enforcement of this behavior; like the PIDF-LO <retransmission-
   allowed> being set to "no", it is a way for the Rule Maker to express
   a preference to the SIP elements, which are LI recipients.  It may,
   however, present a significant optimization.  Where a location-by-
   reference is included with "Location-Routing-Allowed" set to "No",
   the SIP elements along the path know that they do not need to attempt
   to dereference the location information; this is significantly faster
   than attempting the dereference and being denied at the
   authentication stage.

   We recommend that "Location-Routing-Allowed" be made mandatory-to-
   implement for elements complying with [LOC-CONVEY].

   We recommend that it appear in any SIP message that contains a
   location, whether by reference or by value.

   We recommend that any SIP message containing a location but no
   "Location-Routing-Allowed" header should be treated as containing a
   "Location-Routing-Allowed" header set to "no".

   We recommend that a UA be allowed to insert a "Location-Routing-
   Allowed" header even when it has not included a location, in order to
   set the policy for any locations inserted by other SIP elements.

   This allows the UA to assert that it is a Rule Maker for locations,
   even when the network architecture in which the UA is present inserts
   the location into SIP messages after the UA has originated the SIP
   exchange.

   We recommend that any SIP element inserting a location, whether by
   reference or by value, insert a "Location-Routing-Allowed" header if
   one is not already present.  If one is present, it should not be
   overridden by the SIP element inserting the location.

   We recommend that any SIP element not the originator of a message and
   not inserting a location be enjoined from inserting a "Location-
   Routing-Allowed" header.









Peterson, et al.             Informational                      [Page 9]
^L
RFC 5606                Location Retransmission              August 2009


3.6.  Behavior of Back-to-Back User Agents

   Back-to-back user agent (B2BUA) behavior is often difficult to
   proscribe.  There are many uses of B2BUAs, and the rules that apply
   to location would depend on the actual use case.  This section
   suggests what any SIP mechanism arising from this document might wish
   to consider with regard to B2BUA behavior.

   In most uses of B2BUAs, they act as a simple intermediary between the
   nominal originating and nominal terminating UAs, that is, a proxy
   that does something proxies aren't allowed to do.  In such cases, the
   B2BUA must conform to any new routing-allowed mechanism if it chooses
   an outgoing route.  As this document advises proxies,
   <retransmission-allowed> does not apply to the B2BUA in this case,
   and the B2BUA must copy the LI, the new routing-allowed, and existing
   <retransmission-allowed> values.

   Where the B2BUA in fact does act as an endpoint (terminating the
   session and originating a different session), <retransmission-
   allowed> applies to it, and it must not copy location if
   <retransmission-allowed> is "no".  If it chooses a route for the
   outgoing leg, any new routing-allowed mechanism applies to it.

   Encryption lets the originator control who, including B2BUAs, is
   allowed to see location.  On the other hand, using encryption with
   LI, which is needed for routing, is problematic, in that it is often
   difficult to know in advance which elements do location-based
   routing.  Similarly, using Location-by-Reference instead of location-
   by-value provides additional control to the originator over B2BUA
   behavior by controlling who can dereference.  See Section 3.4 for
   more guidance on this trade off.

4.  Security Considerations

   The privacy and security implications of distributing location
   information are the fundamental subject of this document.

5.  Acknowledgements

   James Polk provided a series of questions regarding the specifics of
   the Location-Routing-Allowed mechanism, and this resulted in the
   recommendations in Section 3.4.  Thanks to Brian Rosen for the text
   on B2BUAs.








Peterson, et al.             Informational                     [Page 10]
^L
RFC 5606                Location Retransmission              August 2009


6.  Informative References

   [LOC-CONVEY] Polk, J. and B. Rosen, "Location Conveyance for the
                Session Initiation Protocol", Work in Progress, March
                2009.

   [RFC3261]    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
                A., Peterson, J., Sparks, R., Handley, M., and E.
                Schooler, "SIP: Session Initiation Protocol", RFC 3261,
                June 2002.

   [RFC3693]    Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and
                J. Polk, "Geopriv Requirements", RFC 3693, February
                2004.

   [RFC4119]    Peterson, J., "A Presence-based GEOPRIV Location Object
                Format", RFC 4119, December 2005.

Authors' Addresses

   Jon Peterson
   NeuStar, Inc.

   EMail: jon.peterson@neustar.biz


   Ted Hardie
   Qualcomm

   EMail: hardie@qualcomm.com


   John Morris
   Center for Democracy & Technology

   EMail: jmorris@cdt.org















Peterson, et al.             Informational                     [Page 11]
^L