DRINKS S. Channabasappa, Ed. Internet-Draft CableLabs Intended status: Informational M. Dolly, Ed. Expires: April 30, 2009 AT&T Labs October 27, 2008 DRINKS Use cases and Protocol Requirements draft-channabasappa-drinks-usecases-requirements-00 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on April 30, 2009. Copyright Notice Copyright (C) The IETF Trust (2008). Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 1] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 Abstract This document presents use cases that illustrate what constitutes session establishment data, the functional components that need them, and the protocol requirements for provisioning and managing session establishment data within the identified functional components. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1. Provisioning a Registry . . . . . . . . . . . . . . . . . 5 3.2. Provisioning an ENUM Server . . . . . . . . . . . . . . . 6 3.3. LRF and LUF . . . . . . . . . . . . . . . . . . . . . . . 6 3.3.1. LRF . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.3.2. LUF . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.4. SSP . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.4.1. Generic SSP . . . . . . . . . . . . . . . . . . . . . 8 3.4.2. Small SSP . . . . . . . . . . . . . . . . . . . . . . 8 3.4.3. Large SSP . . . . . . . . . . . . . . . . . . . . . . 9 3.5. Miscellaneous Use Cases . . . . . . . . . . . . . . . . . 10 3.5.1. Separation of Responsibility . . . . . . . . . . . . . 10 3.5.2. Intra-Network vs Inter-Network . . . . . . . . . . . . 10 3.5.3. Massive Sunrise Provisioning . . . . . . . . . . . . . 10 3.5.4. Real-Time Provisioning . . . . . . . . . . . . . . . . 11 3.5.5. Establishing Destination Groups . . . . . . . . . . . 11 3.5.6. Direct and Selective Peering . . . . . . . . . . . . . 11 3.5.7. Indirect Peering to Selected Destinations . . . . . . 11 3.5.8. Fully Qualified TN Destinations . . . . . . . . . . . 12 3.5.9. TN Range Destinations . . . . . . . . . . . . . . . . 12 3.5.10. RN Destinations . . . . . . . . . . . . . . . . . . . 12 3.5.11. Non-TN Destinations . . . . . . . . . . . . . . . . . 12 3.5.12. Peering Relationship Management . . . . . . . . . . . 12 3.5.13. Peering Grant/Acceptance . . . . . . . . . . . . . . . 12 3.5.14. Points of Egress . . . . . . . . . . . . . . . . . . . 13 3.5.15. Tier 2 . . . . . . . . . . . . . . . . . . . . . . . . 13 3.5.16. Non-blocking transactions . . . . . . . . . . . . . . 13 4. Security Considerations . . . . . . . . . . . . . . . . . . . 14 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 16 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17 7.1. Normative References . . . . . . . . . . . . . . . . . . . 17 7.2. Informative References . . . . . . . . . . . . . . . . . . 17 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 18 Intellectual Property and Copyright Statements . . . . . . . . . . 19 Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 2] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 1. Introduction This document captures the use cases that have been proposed so far within the DRINKS requirements design team. The goal is to seek working group feedback to identify a set of in-scope use cases. The end result of the use cases is to identify the data model and requirements for provisioning and managing session establishment data. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 3] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. This document also reuses the SIP terminology defined in [RFC3261]. The Lookup Function (LUF), Location Routing Functions (LRF) and other session peering terms are defined [I-D.ietf-speermint-terminology]. In addition, this document specifies the following additional terms. Destination Group: a set of global telephone numbers, dial codes or public identities that can be associated with a given Destination. A Destination Group logically groups data elements that share a common Destination together. Public Identity: a generic term that refers to a telephone number(TN), a range of TNs, an email address, or other identity as deemed appropriate. A public identity is represented as a globally routable URIs of a user address (e.g., mailto:john.doe@example.net, sip:paul.speermint@example.com). Routing Group: a logical grouping of routes. A Destination Group may be associated with one or more routing groups based on its association with the data recipient group. Data Recipient Group: a list of SIP Service Providers (SSPs) that have access to the associated Destination Group data. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 4] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 3. Use Cases This Section contains the use cases presented so far. The use cases are logically grouped into functional areas: provisioning a registry, provisioning an ENUM server, LRF & LUF, and SIP Service Provider (SSP). Use cases that are are not presently grouped are specified in Section 3.5. 3.1. Provisioning a Registry This Section targets use cases concerned with the provisioning of session establishment data in the registry. Provisioning can be accomplished in (near) real time through an automated interface (e.g., from a service provisioning system) or by specifying an effective date and time. When an effective date/time is used, the registry validates the format and enters it into the registry database with the effective date & time. The following use cases are considered: 1. Provisioning destination groups and associated routing information. 2. Provisioning data recipient groups. 3. Provisioning a public identity or range of TNs: A globally routable TN or another type of public identity is provisioned and assigned to a Destination Group. No effective date is provided as it is desired to be made effective in (near) real time meaning as soon as validations (format) are complete, the data is entered into the Registry database. A distribution function may pick up the provisioned instance in real-time or in batch mode to distribute to each address server. Note that it is assumed that the routing information for the Destination Group has already been defined. This is another Use Case. 4. Public Identity is taken out of service: A public identity (including a TN, or a TN range) is taken out of service because it is no longer valid. The Registry receives a delete operation and removes the public identity from its database. This may also trigger a number of delete updates during the distribution operations to appropriate deletes to each address server. 5. Assigning a set of TNs to a different Destination Group changing their routing: A set of public identities (e.g., set of TNs) are assigned a different Destination Group which effectively changes their routing information. This may be due to a network re- arrangement, a Signaling path Border Element being split into Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 5] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 two, or a need to do maintenance, two carriers merging, or other considerations. This scenario can also include an effective date and time. 6. Moving an SSP from one Data Recipient Group to another: An SSP would like to re-assign the Destination Groups it shares with a peer and move the peer SSP from one Data Recipient Group to another. This action effectively changes the routing for all public identities and associated services to the routing information associated with the new Data Recipient Group and Destination Group. 7. Defining a Routing Group: A Routing Group is a set of routes that may include routes for a number of different public identities, e.g., TNs, IM identifier, email. A Destination Group may be associated with 1 or more Routing Groups based on its association with the Data Recipient Group. 3.2. Provisioning an ENUM Server This Section targets use cases concerned with the provisioning of session establishment data in the ENUM Server. The following use cases have been proposed: 1. Provisioning a Public Identify or set of Public Identities at an effective date/time. 2. A Public Identify is taken out of service at an effective date/ time. 3. Assigning a set of Public Identities to a different destination group, thereby changing their routing. 3.3. LRF and LUF This Section contains use cases related to LRF and LUF. They are presented in the following sub-sections. 3.3.1. LRF 1. Source service provider direct connection (bi-lateral): A service provider may be connected directly with a peer network hosting the ultimate SIP destination. Thesource service provider is able to translate to obtain the ultimate destination through LUF. 2. Source service provider direct connection (bi-lateral): A service provider may be connected directly with a peer network Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 6] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 hosting the SIP destination. The source service provider is not able to translate to the ultimate destination because the LUF does not contain a translation. 3. Source service provider direct connection (bi-lateral): A service provider may be connected directly with a peer network not hosting the SIP destination. The Source service provider is not able to translate to the ultimate destination because the LUF does not contain a translation. The selected target network is able to perform the LUF to identify the ultimate destination. 4. Source service provider is not connected directly with a peer network hosting the ultimate SIP destination rather through an intermediate transit network which is connected to a peer network hosting the ultimate SIP destination. Note that variations in use cases 1, 2 & 3 all apply. 5. Source service provider is not connected directly with a peer network hosting the ultimate SIP destination, rather to a clearing house network which is connected to a peer network hosting the ultimate SIP destination. 6. Source service provider is not connected directly with a peer network hosting the ultimate SIP destination rather through more than one intermediate transit networks which are all connected to a peer network hosting the ultimate SIP destination. The source service provider has to chose the transit service provider to select. 7. Source service provider has multiple paths to a destination network both on inter-network connections and inter-transit network connections. The source service provider wants to select different transit networks and different routes to those networks based on various criteria such as traffic load, capacity, cost, latency, etc. 8. Roaming mobile user uses IMS service accessed through local breakout, the service is located outside the serving network. 9. Roaming mobile user is disconnected from emergency service call (via IMS local breakout). The PSAP is located in a network outside of the serving network. The PSAP initiates a callback to the mobile which should go to the serving network, not the home network from the network the PSAP is located in. 10. A transit network connected to the source service provider has had a route change or a network connectivity change which needs to be communicated to its peer networks. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 7] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 11. A transit network has a change in the domains it is able to reach (added, dropped/unavailable, route change) which it needs to send to its peer networks. 12. The transit network uses LRF to route internally to the network and to select one of several possible exit points, next hop transit network and specific connection between networks. 13. The service provider may have fixed domain routing specified in the LRF which overrides the domain routing provided by peer networks. 14. The service provider may have fixed routing specified in the LRF as a default until a peer network identifies it is able to provide alternate (better) routing. 3.3.2. LUF A service provider's LUF is connected to several different Registries some for national numbers, some for enterprise identifiers (e.g. @example.com translating to @example.nt for an enterprise user who has a mobile with a public user identity or GRUU (3GPP TS 23.228) which is part of an enterprise domain. {What if there is a collision and conflict between some particular number or domain between registries?} 3.4. SSP This Section contains SIP Service Provider specific use cases. They are presented in the following sub-sections. 3.4.1. Generic SSP An SSP provisions a registry to offer different routes to different interconnecting parties. The SSP uses the same routes for an aggregation of public identities (e.g., TNs) and desires to be able to specify routing for the aggregate. Routes consist of a set of RRs of any legitimate type. 3.4.2. Small SSP The small SSP provides coverage to a small city only with 3 different peer interconnects: 1) To another small SSP covering an adjacent small city; 2) to a mid-sized SSP providing coverage to the remainder of the state; 3 to a large multi-national SSP providing SSP transit services for the remainder of the world. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 8] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 3.4.2.1. Configuring small SSP routing The small SSP with a small number of SSP peer arrangements prefers to statically define and provision the SED routing through network engineering tools by the network engineering staff. This is because the domain coverage of each peer SSP will not change very frequently and the small SSP does not want to incur the cost and complexity of a dynamically established routing data. 3.4.2.2. Small SSP LUF/LRF consolidation A small SSP only needs a single network element to handle its entire LUF/LRF needs and as such combines the LUF and LRF. The routing associations in this network element are provisioned statically through network management tools by network operation or engineering staff. 3.4.3. Large SSP The large SSP provides coverage to a large country: the SSP is administratively divided into regions. The SSP provides SSP transit services to smaller SSPs operating in the same areas. The SSP has both direct SSP connections for national and international service and indirect SSP connections for international service to some countries based on traffic levels. This results in multiple possible routes to some destination SSPs through different intermediate SSPs. Each SSP region has a different sub-set of peer SSPs that it is directly connected to (e.g. Some regions may have to route internally to another SSP region to reach the destination SSP). 3.4.3.1. Configuring large SSP routing The large SSP has a large number of direct and indirect peer arrangements along with multiple possible routes to the same destination SSP. The large SSP prefers to only provision the SSP peers and have the elements such as SBCs learn the routes based on peer SSP advertisements to eliminate routing errors (loops, dead ends, etc.) which are service affecting and almost impossible to troubleshoot in a network of this size. 3.4.3.2. Large SSP LUF/LRF separation and LRF distribution A large SSP needs to centralize its LUF but split off the LRF for deployment in decentralized regional network elements. The routing associations in the regional LRFs are provisioned dynamically through advertisements by the large SSP peering SSPs regarding which domains they are able to handle. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 9] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 3.4.3.3. Large SSP peering with a small SSP A large SSP peers with a small SSP. The small SSP is unable to support the cost and complexity of dynamically advertising to its peer SSPs the domains it is able to reach directly or indirectly. The large SSP provisions routing association data statically representing the domains which the small SSP can reach either directly or indirectly, through network management tools by network operation or engineering staff. 3.5. Miscellaneous Use Cases This Section contains all the use cases that were not categorized as belonging to the specific groups indicated above. Based on further discussions these may be re-classified. 3.5.1. Separation of Responsibility An SSP's business practices are such that; (i) network engineering and planning personnel are responsible for provisioning the points of interconnect (e.g. hosts and IP addressing information), and (ii) back office systems are responsible for number management provisioning of TNs. An example flow would be: a network engineer establishes physical interconnect with a peering SSP's network and provisions associated domain name, host, and IP addressing information, which is provisioned to the registry/ENUMserver. Separately, for each new service subscription, the SSP's back office system provisions the associated TNs or other public identities. 3.5.2. Intra-Network vs Inter-Network SSP wishes to provision their intra-network Session Establishment Data (SED) such that it enables current and future network services to identify and route real-time sessions. For example, in the case of VoIP calls it allows one CMS (calling) to discover another (called). The SSP provisions IP addressing information of each CMS, which is provisioned to the registry/ENUMserver but only distributed to their own local ENUM server. This SED may differ from the SED that is distributed to other local ENUM servers. 3.5.3. Massive Sunrise Provisioning Based on configurable thresholds, sunrise may imply a batch asynchronous provisioning process. For instance, an SSP has commissioned a new ENUM server and wishes to download a very large number of telephone numbers. Rather than stream individual TNs in real-time, one at a time, towards the ENUM server the SSP's back- office system prefers to perform the operation as a set of one or Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 10] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 more batches. The SSP has just commissioned a new ENUM server which they plan to employ as a centralized routing server. The network engineering group has provisioned, upon their ENUM server, the IP addressing information of all CMS which constitute the SSP's topology. During a regularly scheduled maintenance window the SSP would like to download from its back office system the TNs associated with each CMS. 3.5.4. Real-Time Provisioning Post-sunrise, an SSP wishes to have their back-office systems add or remove TNs per normal business operations. Over the course of a day there is churn in the SSP's subscriber base and as such they would like the ability to stream, in real-time, additions, modifications and deletions. 3.5.5. Establishing Destination Groups An SSP wishes to control the flow of traffic into their network (ingress) based on groupings of Public Identities, called Destination Groups. Associating each group of Public Identities with a specific set of ingress SBEs or points-of-interconnect. The SSP, for example, sub-divides the country into four regions: North-East, South-East, Mid-West, and West-Coast. For each region they establish points-of- interconnect with peers and provision the associated SED hostnames or IP addresses of the SBEs used for ingress traffic. Against each region they provision the served Public Identities in to the Destination Groups and associate those destination groups with the appropriate points of ingres. The destination groups and points of ingress are provisioned to the Registyr/Enumserver. Need to separate this use case into two. 3.5.6. Direct and Selective Peering In this case the SSP is the actual carrier-of-record; the entity serving the end user. And the SSP wishes to communicate different SED data to some of its peers that wish to route to its destinations. So the SSP has implemented direct points-of-interconnect with each peer and therefore would like address-resolution to result in different answers depending on which peer is asking. 3.5.7. Indirect Peering to Selected Destinations The SSP transit provider wishes to provide transit peering points for a set of destinations. But that set of destinations does not align with the destination groups that already exist. The SSP wishes to establish its own destination groups for the destinations that it provides transit to. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 11] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 3.5.8. Fully Qualified TN Destinations The SSP wishes to add or remove one or multiple fully qualified TN destinations in a single provisioning request. 3.5.9. TN Range Destinations The SSP wishes to add or remove one or multiple TN Range destinations in a single provisioning request. TN Ranges support number ranges that need not be 'blocks'. In other words the TN range start can be any number and the TN range end can be any number that is greater than the TN range start. 3.5.10. RN Destinations The SSP does not wish to provision individual TNs, but instead, for ease of management, wishes to provision RNs. Each RN effectively represents a set of individual TNs, and that set of TNs is assumed to change 'automatically' as TNs are ported in and ported out. 3.5.11. Non-TN Destinations An SSP chooses to peer their messaging service with another SSPs picture/video mail service. Allowing a user to send and receive pictures and/or video messages to a mobile user's handset, for example. The important aspect of this use case is that it goes beyond simply mapping TNs to IP addresses/hostnames that describe points-of-interconnect between peering network SSP's. Rather, for each user the SSP provisions the subscriber's email address (i.e. jane.doe@example.com). This mapping allows the mobile multimedia messaging service center (MMSC) to use the subscriber email address as the lookup key and route messages accordingly. 3.5.12. Peering Relationship Management An SSP wishes to have the peering relationship management process factilitated through automation. An SSP can offer itself as a Peer to another SSP and that peer can accept or reject that peering relationship. 3.5.13. Peering Grant/Acceptance An SSP wishes to facilitate the establishment of peering relationships and interconenct points with its peers. It submits a grant to a potential peering partner for a point of interconnect. The Grantee can accept or ignore the grant. The act of granting and accepting is facilitated by an automation process. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 12] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 3.5.14. Points of Egress An SSP has a peering relation ship with a peer. And when sending messages to that peer's point of interconnection, the originating SSP wishes to egress through one or more points of egress. These points of egree may vary for an given peer. 3.5.15. Tier 2 An SSP maintains a Tier 2 name server that contains the NAPTR records that constitute the terminal step in the LUF. The SSP needs to provision an registry to direct queries for the SSPs numbers to the Tier 2. Usually queries to the registry should return NS records, but, in cases where the Tier 2 uses a different domain suffix from that used in the registry, CNAME records may be employed instead. 3.5.16. Non-blocking transactions An SSP is loading a large update in the registry (for example, a large amount of adds & delete operations due to a Destination Group being split into 2). In the meantime, the SSP wants to change a route linked with another Destination Group because it has been misconfigured . Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 13] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 4. Security Considerations Session establishment data allows for the routing of SIP sesions within, and between, SIP Service Providers. Access to this data can compromise the routing of sessions and expose a SIP Service Provider to attacks such as service hijacking and denial of service. The data can be compromised by vulnerable functional components and interfaces identified within the use cases. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 14] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 5. IANA Considerations This document does not register any values in IANA registries. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 15] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 6. Acknowledgments This document is a result of various discussions held by the DRINKS requirements design team, which is comprised of the following individuals, in alphabetical order: Deborah A Guyton (Telcordia), Gregory Schumacher (Sprint), Jean-Francois Mule (CableLabs), Kenneth Cartwright (Verisign), Manjul Maharishi (Verisign), Penn Pfautz (AT&T Corp), the co-chairs (Richard Shockey, Nuestar; and Alexander Mayrhofer, enum.at GmbH), and the editors of this document. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 16] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 7. References 7.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. 7.2. Informative References [I-D.espp-protocol] Cartwright, K., Dimig, S., Teodoro, M., and J-F. Mule, "ENUM-SIP Server Provisioning Protocol (ESPP)", draft-mule-peppermint-espp-protocol-02.txt (work in progress), July 2008. [I-D.ietf-speermint-terminology] Malas, D. and D. Meyer, "SPEERMINT Terminology", draft-ietf-speermint-terminology-16 (work in progress), February 2008. [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002. [RFC3263] Rosenberg, J. and H. Schulzrinne, "Session Initiation Protocol (SIP): Locating SIP Servers", RFC 3263, June 2002. [RFC3761] Faltstrom, P. and M. Mealling, "The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)", RFC 3761, April 2004. Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 17] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 Authors' Addresses Sumanth Channabasappa CableLabs 858 Coal Creek Circle Louisville, CO 80027 USA Email: sumanth@cablelabs.com Martin Dolly AT&T Labs USA Email: mdolly AT att.com Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 18] Internet-Draft channabasappa-drinks-usecases-reqs October 2008 Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Acknowledgment Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA). Channabasappa, Ed. & Dolly, Ed. Expires April 30, 2009 [Page 19]