draft-templin-rfc4214bis-01

[フレーム]

Network Working Group F. Templin
Internet-Draft Boeing Phantom Works
Intended status: Informational T. Gleeson
Expires: September 30, 2007 Cisco Systems K.K.
 M. Talwar
 D. Thaler
 Microsoft Corporation
 March 29, 2007
 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
 draft-templin-rfc4214bis-01.txt
Status of this Memo
 By submitting this Internet-Draft, each author represents that any
 applicable patent or other IPR claims of which he or she is aware
 have been or will be disclosed, and any of which he or she becomes
 aware will be disclosed, in accordance with Section 6 of BCP 79.
 Internet-Drafts are working documents of the Internet Engineering
 Task Force (IETF), its areas, and its working groups. Note that
 other groups may also distribute working documents as Internet-
 Drafts.
 Internet-Drafts are draft documents valid for a maximum of six months
 and may be updated, replaced, or obsoleted by other documents at any
 time. It is inappropriate to use Internet-Drafts as reference
 material or to cite them other than as "work in progress."
 The list of current Internet-Drafts can be accessed at
 http://www.ietf.org/ietf/1id-abstracts.txt.
 The list of Internet-Draft Shadow Directories can be accessed at
 http://www.ietf.org/shadow.html.
 This Internet-Draft will expire on September 30, 2007.
Copyright Notice
 Copyright (C) The IETF Trust (2007).
Abstract
 The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) connects
 dual-stack (IPv6/IPv4) routers over IPv4 networks. ISATAP views the
 IPv4 network as a link layer for IPv6 and supports an automatic
 tunneling abstraction similar to the Non-Broadcast Multiple Access
Templin, et al. Expires September 30, 2007 [Page 1]

Internet-Draft ISATAP March 2007
 (NBMA) model.
1. Introduction
 This document specifies a simple mechanism called the Intra-Site
 Automatic Tunnel Addressing Protocol (ISATAP) that connects dual-
 stack (IPv6/IPv4) routers over IPv4 networks. Dual-stack routers use
 ISATAP to automatically tunnel IPv6 packets in IPv4, i.e., ISATAP
 views the IPv4 network as a link layer for IPv6.
 ISATAP enables automatic tunneling whether global or private IPv4
 addresses are used, and presents a Non-Broadcast Multiple Access
 (NBMA) abstraction similar to [RFC2491][RFC2492][RFC2529][RFC3056].
 The main objectives of this document are to: 1) describe the domain
 of applicability, 2) specify addressing requirements, 3) specify
 automatic tunneling using ISATAP, 4) specify the operation of IPv6
 Neighbor Discovery over ISATAP interfaces, and 5) discuss Site
 Administration, Security, and IANA considerations.
2. Requirements
 The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
 SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
 document, are to be interpreted as described in [BCP14].
 This document also uses internal conceptual variables to describe
 protocol behavior and external variables that an implementation must
 allow system administrators to change. The specific variable names,
 how their values change, and how their settings influence protocol
 behavior are provided in order to demonstrate protocol behavior. An
 implementation is not required to have them in the exact form
 described here, as long as its external behavior is consistent with
 that described in this document.
3. Terminology
 The terminology of [RFC2460][RFC2461] applies to this document. The
 following additional terms are defined:
 ISATAP node:
 A dual-stack (IPv6/IPv4) router that implements the specifications
 in this document.
Templin, et al. Expires September 30, 2007 [Page 2]

Internet-Draft ISATAP March 2007
 ISATAP interface:
 An ISATAP node's Non-Broadcast Multi-Access (NBMA) IPv6 interface,
 used for automatic tunneling of IPv6 packets in IPv4.
 ISATAP interface identifier:
 An IPv6 interface identifier with an embedded IPv4 address
 constructed as specified in Section 6.1.
 ISATAP address:
 An IPv6 unicast address that matches an on-link prefix on an
 ISATAP interface of the node, and that includes an ISATAP
 interface identifier.
 locator:
 An IPv4 address-to-interface mapping; i.e., a node's IPv4 address
 and its associated interface.
 locator set:
 A set of locators associated with an ISATAP interface. Each
 locator in the set belongs to the same site.
4. Domain of Applicability
 ISATAP provides a link for connecting ISATAP nodes within Mobile Ad-
 Hoc Networks (MANETs), as well as mechanisms for autoconfiguration
 and discovery of multiple Internet gateways. A "MANET" may be as
 large as an Autonomous System (AS) or as small as an individual site,
 and may also be a subnetwork of a large site. An ISATAP node (and
 its downstream-attached links) is a "site" unto itself, and a MANET
 is therefore a "site-of-sites".
 It is important to note that the term "MANET" could mean anything
 from a network of mobile platforms (e.g., planes, trains and
 automobiles), to a home network, to a singleton node with an
 arbitrarily-complex network of physical or virtual nodes within. In
 particular, a site does not have to be highly mobile or even wireless
 to be considered a MANET.
 Extensions to the above domain of applicability (e.g., by combining
 the mechanisms in this document with those in other technical
 specifications) are out of the scope of this document.
5. Node Requirements
 ISATAP nodes observe the common functionality requirements for IPv6
 nodes found in [RFC4294] and the requirements for dual IP layer
Templin, et al. Expires September 30, 2007 [Page 3]

Internet-Draft ISATAP March 2007
 operation found in ([RFC4213], Section 2). They also implement the
 additional features specified in this document.
6. Addressing Requirements
6.1. ISATAP Interface Identifiers
 ISATAP interface identifiers are constructed in Modified EUI-64
 format ([RFC4291], Section 2.5.1 and Appendix A) by concatenating the
 24-bit IANA OUI (00-00-5E), the 8-bit hexadecimal value 0xFE, and a
 32-bit IPv4 address in network byte order as follows:
 |0 1|1 3|3 6|
 |0 5|6 1|2 3|
 +----------------+----------------+--------------------------------+
 |000000ug00000000|0101111011111110|mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm|
 +----------------+----------------+--------------------------------+
 The "u" bit (universal/local) is set to 1, but the interface
 identifier MUST NOT be considered unique outside the scope of the
 site; i.e., it may or may not be unique on a global basis. "g" is the
 individual/group bit, and "m" are the bits of the IPv4 address.
6.2. ISATAP Interface Address Configuration
 Each ISATAP interface configures a set of locators consisting of IPv4
 address-to-interface mappings from a single site; i.e., an ISATAP
 interface's locator set MUST NOT span multiple sites.
 When an IPv4 address is removed from an interface, the corresponding
 locator SHOULD be removed from its associated locator set(s). When a
 new IPv4 address is assigned to an interface, the corresponding
 locator MAY be added to the appropriate locator set(s).
 ISATAP interfaces form ISATAP interface identifiers from IPv4
 addresses in their locator set and use them to create link-local
 ISATAP addresses ([RFC2462], Section 5.3).
6.3. Multicast/Anycast
 It is not possible to assume the general availability of wide-area
 IPv4 multicast, so (unlike 6over4 [RFC2529]) ISATAP must assume that
 its underlying IPv4 carrier network only has unicast capability.
 Support for IPv6 multicast over ISATAP interfaces is not described in
 this document.
 Similarly, support for Reserved IPv6 Subnet Anycast Addresses is not
Templin, et al. Expires September 30, 2007 [Page 4]

Internet-Draft ISATAP March 2007
 described in this document.
7. Automatic Tunneling
 ISATAP interfaces use the basic tunneling mechanisms specified in
 ([RFC4213], Section 3). The following sub-sections describe
 additional specifications.
7.1. Encapsulation
 ISATAP addresses are mapped to a link-layer address by a static
 computation; i.e., the last four octets are treated as an IPv4
 address.
7.2. Handling ICMPv4 Errors
 ISATAP interfaces SHOULD process ARP failures and persistent ICMPv4
 errors as link-specific information indicating that a path to a
 neighbor may have failed ([RFC2461], Section 7.3.3).
7.3. Decapsulation
 The specification in ([RFC4213], Section 3.6) is used. Additionally,
 when an ISATAP node receives an IPv4 protocol 41 datagram that does
 not belong to a configured tunnel interface, it determines whether
 the packet's IPv4 destination address and arrival interface match a
 locator configured in an ISATAP interface's locator set.
 If an ISATAP interface that configures a matching locator is found,
 the decapsulator MUST verify that the packet's IPv4 source address is
 correct for the encapsulated IPv6 source address. The IPv4 source
 address is correct if:
 o the IPv6 source address is an ISATAP address that embeds the IPv4
 source address in its interface identifier, or
 o the IPv4 source address is a member of the Potential Router List
 (see Section 8.1).
 Packets for which the IPv4 source address is incorrect for this
 ISATAP interface are checked to determine whether they belong to
 another tunnel interface.
7.4. Link-Local Addresses
 ISATAP interfaces use link-local addresses constructed as specified
 in Section 6 of this document.
Templin, et al. Expires September 30, 2007 [Page 5]

Internet-Draft ISATAP March 2007
7.5. Neighbor Discovery over Tunnels
 ISATAP interfaces use the specifications for neighbor discovery found
 in the following section of this document.
8. Neighbor Discovery for ISATAP Interfaces
 ISATAP interfaces use the neighbor discovery mechanisms specified in
 [RFC2461]. The following sub-sections describe specifications that
 are also implemented.
8.1. Conceptual Model of a Host
 To the list of Conceptual Data Structures ([RFC2461], Section 5.1),
 ISATAP interfaces add the following:
 Potential Router List (PRL)
 A set of entries about potential routers; used to support router
 and prefix discovery. Each entry ("PRL(i)") has an associated
 timer ("TIMER(i)"), and an IPv4 address ("V4ADDR(i)") that
 represents a router's advertising ISATAP interface.
8.2. Router and Prefix Discovery - Router Specification
 Advertising ISATAP interfaces send Solicited Router Advertisement
 messages as specified in ([RFC2461], Section 6.2.6) except that the
 messages are sent directly to the soliciting node; i.e., they might
 not be received by other nodes on the link.
8.3. Router and Prefix Discovery - Host Specification
 The Host Specification in ([RFC2461], Section 6.3) is used. The
 following sub-sections describe specifications added by ISATAP
 interfaces.
8.3.1. Host Variables
 To the list of host variables ([RFC2461], Section 6.3.2), ISATAP
 interfaces add the following:
 PrlRefreshInterval
 Time in seconds between successive refreshments of the PRL after
 initialization. The designated value of all ones (0xffffffff)
 represents infinity.
 Default: 3600 seconds
Templin, et al. Expires September 30, 2007 [Page 6]

Internet-Draft ISATAP March 2007
 MinRouterSolicitInterval
 Minimum time in seconds between successive solicitations of the
 same advertising ISATAP interface. The designated value of all
 ones (0xffffffff) represents infinity.
8.3.2. Potential Router List Initialization
 ISATAP nodes initialize an ISATAP interface's PRL with IPv4 addresses
 discovered via manual configuration, a DNS Fully Qualified Domain
 Name (FQDN) [STD13], a DHCPv4 option, a DHCPv4 vendor-specific
 option, or an unspecified alternate method. FQDNs are established
 via manual configuration or an unspecified alternate method. FQDNs
 are resolved into IPv4 addresses through a static host file lookup,
 querying the DNS service, querying a site-specific name service, or
 with an unspecified alternate method.
 After initializing an ISATAP interface's PRL, the node sets a timer
 for the interface to PrlRefreshInterval seconds and re-initializes
 the interface's PRL as specified above when the timer expires. When
 an FQDN is used, and when it is resolved via a service that includes
 TTLs with the IPv4 addresses returned (e.g., DNS 'A' resource records
 [STD13]), the timer SHOULD be set to the minimum of
 PrlRefreshInterval and the minimum TTL returned. (Zero-valued TTLs
 are interpreted to mean that the PRL is re-initialized before each
 Router Solicitation event; see Section 8.3.4.)
8.3.3. Processing Received Router Advertisements
 To the list of checks for validating Router Advertisement messages
 ([RFC2461], Section 6.1.1), ISATAP interfaces add the following:
 o IP Source Address is a link-local ISATAP address that embeds
 V4ADDR(i) for some PRL(i).
 Valid Router Advertisements received on an ISATAP interface are
 processed as specified in ([RFC2461], Section 6.3.4).
8.3.4. Sending Router Solicitations
 To the list of events after which Router Solicitation messages may be
 sent ([RFC2461], Section 6.3.7), ISATAP interfaces add the following:
 o TIMER(i) for some PRL(i) expires.
 Since unsolicited Router Advertisements may be incomplete and/or
 absent, ISATAP nodes MAY schedule periodic Router Solicitation events
 for certain PRL(i)s by setting the corresponding TIMER(i).
Templin, et al. Expires September 30, 2007 [Page 7]

Internet-Draft ISATAP March 2007
 When periodic Router Solicitation events are scheduled, the node
 SHOULD set TIMER(i) so that the next event will refresh remaining
 lifetimes stored for PRL(i) before they expire, including the Router
 Lifetime, Valid Lifetimes received in Prefix Information Options, and
 Route Lifetimes received in Route Information Options [RFC4191].
 TIMER(i) MUST be set to no less than MinRouterSolicitInterval seconds
 where MinRouterSolicitInterval is configurable for the node, or for a
 specific PRL(i), with a conservative default value (e.g., 2 minutes).
 When TIMER(i) expires, the node sends Router Solicitation messages as
 specified in ([RFC2461], Section 6.3.7) except that the messages are
 sent directly to PRL(i); i.e., they might not be received by other
 routers. While the node continues to require periodic Router
 Solicitation events for PRL(i), and while PRL(i) continues to act as
 a router, the node resets TIMER(i) after each expiration event as
 described above.
8.4. Neighbor Unreachability Detection
 ISATAP nodes SHOULD perform Neighbor Unreachability Detection
 ([RFC2461], Section 7.3), but this might not scale in all
 environments.
 After address resolution, ISATAP nodes SHOULD perform an initial
 reachability confirmation by sending Neighbor Solicitation messages
 and receiving a Neighbor Advertisement message, but this might not
 scale in all environments.
9. Site Administration Considerations
 Site administrators maintain a Potential Router List (PRL) of IPv4
 addresses representing advertising ISATAP interfaces of routers.
 The PRL is commonly maintained as an FQDN for the ISATAP service in
 the site's name service (see Section 8.3.2). There are no mandatory
 rules for the selection of the FQDN, but site administrators are
 encouraged to use the convention "isatap.domainname" (e.g.,
 isatap.example.com).
 When the site's name service includes TTLs with the IPv4 addresses
 returned, site administrators SHOULD configure the TTLs with
 conservative values to minimize control traffic.
10. Security Considerations
 Implementers should be aware that, in addition to possible attacks
Templin, et al. Expires September 30, 2007 [Page 8]

Internet-Draft ISATAP March 2007
 against IPv6, security attacks against IPv4 must also be considered.
 Use of IP security at both IPv4 and IPv6 levels should nevertheless
 be avoided, for efficiency reasons. For example, if IPv6 is running
 encrypted, encryption of IPv4 would be redundant unless traffic
 analysis is felt to be a threat. If IPv6 is running authenticated,
 then authentication of IPv4 will add little. Conversely, IPv4
 security will not protect IPv6 traffic once it leaves the ISATAP
 domain. Therefore, implementing IPv6 security is required even if
 IPv4 security is available.
 The threats associated with IPv6 Neighbor Discovery are described in
 [RFC3756].
 There is a possible spoofing attack in which spurious ip-protocol-41
 packets are injected into an ISATAP link from outside. Since an
 ISATAP link spans an entire IPv4 site, restricting access to the link
 can be achieved by restricting access to the site; i.e., by having
 site border routers implement IPv4 ingress filtering and
 ip-protocol-41 filtering.
 Another possible spoofing attack involves spurious ip-protocol-41
 packets injected from within an ISATAP link by a node pretending to
 be a router. The Potential Router List (PRL) provides a list of IPv4
 addresses representing advertising ISATAP interfaces of routers that
 hosts use in filtering decisions. Site administrators should ensure
 that the PRL is kept up to date, and that the resolution mechanism
 (see Section 9) cannot be subverted.
 The use of temporary addresses [RFC3041] and Cryptographically
 Generated Addresses [RFC3972] on ISATAP interfaces is outside the
 scope of this specification.
11. IANA Considerations
 The IANA has specified the format for Modified EUI-64 address
 construction ([RFC4291], Appendix A) in the IANA Ethernet Address
 Block. The text in Appendix A of this document has been offered as
 an example specification. The current version of the IANA registry
 for Ether Types can be accessed at:
 http://www.iana.org/assignments/ethernet-numbers
12. Acknowledgements
 The ideas in this document are not original, and the authors
 acknowledge the original architects. Portions of this work were
Templin, et al. Expires September 30, 2007 [Page 9]

Internet-Draft ISATAP March 2007
 sponsored through SRI International and Nokia internal projects and
 government contracts. Government sponsors include Monica Farah
 Stapleton and Russell Langan (U.S. Army CECOM ASEO), and Dr. Allen
 Moshfegh (U.S. Office of Naval Research). SRI International sponsors
 include Dr. Mike Frankel, J. Peter Marcotullio, Lou Rodriguez, and
 Dr. Ambatipudi Sastry.
 The following are acknowledged for providing peer review input: Jim
 Bound, Rich Draves, Cyndi Jung, Ambatipudi Sastry, Aaron Schrader,
 Ole Troan, and Vlad Yasevich.
 The following are acknowledged for their significant contributions:
 Alain Durand, Hannu Flinck, Jason Goldschmidt, Nathan Lutchansky,
 Karen Nielsen, Mohan Parthasarathy, Chirayu Patel, Art Shelest,
 Markku Savela, Pekka Savola, Margaret Wasserman, Brian Zill and
 members of the IPv6 working group.
 The authors acknowledge the work done by Brian Carpenter and Cyndi
 Jung in RFC2529 that introduced the concept of intra-site automatic
 tunneling. This concept was later called: "Virtual Ethernet" and
 researched by Quang Nguyen under the guidance of Dr. Lixia Zhang.
13. Modified EUI-64 Addresses in the IANA Ethernet Address Block
 Modified EUI-64 addresses ([RFC4291], Section 2.5.1 and Appendix A)
 in the IANA Ethernet Address Block are formed by concatenating the
 24-bit IANA OUI (00-00-5E) with a 40-bit extension identifier and
 inverting the "u" bit; i.e., the "u" bit is set to one (1) to
 indicate universal scope and set to zero (0) to indicate local scope.
 Modified EUI-64 addresses have the following appearance in memory
 (bits transmitted right-to-left within octets, octets transmitted
 left-to-right):
 0 23 63
 | OUI | extension identifier |
 000000ug00000000 01011110xxxxxxxx xxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx
 When the first two octets of the extension identifier encode the
 hexadecimal value 0xFFFE, the remainder of the extension identifier
 encodes a 24-bit vendor-supplied id as follows:
 0 23 39 63
 | OUI | 0xFFFE | vendor-supplied id |
 000000ug00000000 0101111011111111 11111110xxxxxxxx xxxxxxxxxxxxxxxx
 When the first octet of the extension identifier encodes the
Templin, et al. Expires September 30, 2007 [Page 10]

Internet-Draft ISATAP March 2007
 hexadecimal value 0xFE, the remainder of the extension identifier
 encodes a 32-bit IPv4 address as follows:
 0 23 31 63
 | OUI | 0xFE | IPv4 address |
 000000ug00000000 0101111011111110 xxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx
14. Changes since RFC4214 
 o updated domain of applicability.
 o clarified the use of the "u" bit in ISATAP interface identifiers.
 o updated acknowledgements to correct historical background.
 o updated references.
15. References
15.1. Normative References
 [RFC1035] Mockapetris, P., "Domain names - implementation and
 specification", STD 13, RFC 1035, November 1987.
 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
 Requirement Levels", BCP 14, RFC 2119, March 1997.
 [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
 (IPv6) Specification", RFC 2460, December 1998.
 [RFC2461] Narten, T., Nordmark, E., and W. Simpson, "Neighbor
 Discovery for IP Version 6 (IPv6)", RFC 2461,
 December 1998.
 [RFC2462] Thomson, S. and T. Narten, "IPv6 Stateless Address
 Autoconfiguration", RFC 2462, December 1998.
 [RFC4213] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms
 for IPv6 Hosts and Routers", RFC 4213, October 2005.
 [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
 Architecture", RFC 4291, February 2006.
Templin, et al. Expires September 30, 2007 [Page 11]

Internet-Draft ISATAP March 2007
15.2. Informative References
 [RFC2491] Armitage, G., Schulter, P., Jork, M., and G. Harter, "IPv6
 over Non-Broadcast Multiple Access (NBMA) networks",
 RFC 2491, January 1999.
 [RFC2492] Armitage, G., Schulter, P., and M. Jork, "IPv6 over ATM
 Networks", RFC 2492, January 1999.
 [RFC2529] Carpenter, B. and C. Jung, "Transmission of IPv6 over IPv4
 Domains without Explicit Tunnels", RFC 2529, March 1999.
 [RFC3041] Narten, T. and R. Draves, "Privacy Extensions for
 Stateless Address Autoconfiguration in IPv6", RFC 3041,
 January 2001.
 [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains
 via IPv4 Clouds", RFC 3056, February 2001.
 [RFC3756] Nikander, P., Kempf, J., and E. Nordmark, "IPv6 Neighbor
 Discovery (ND) Trust Models and Threats", RFC 3756,
 May 2004.
 [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)",
 RFC 3972, March 2005.
 [RFC4191] Draves, R. and D. Thaler, "Default Router Preferences and
 More-Specific Routes", RFC 4191, November 2005.
 [RFC4294] Loughney, J., "IPv6 Node Requirements", RFC 4294,
 April 2006.
Authors' Addresses
 Fred L. Templin
 Boeing Phantom Works
 P.O. Box 3707 MC 7L-49
 Seattle, WA 98124
 USA
 Email: fltemplin@acm.org
Templin, et al. Expires September 30, 2007 [Page 12]

Internet-Draft ISATAP March 2007
 Tim Gleeson
 Cisco Systems K.K.
 Shinjuku Mitsui Building
 2-1-1 Nishishinjuku, Shinjuku-ku
 Tokyo 163-0409
 Japan
 Email: tgleeson@cisco.com
 Mohit Talwar
 Microsoft Corporation
 One Microsoft Way
 Redmond, WA 98052-6399
 US
 Phone: +1 425 705 3131
 Email: mohitt@microsoft.com
 Dave Thaler
 Microsoft Corporation
 One Microsoft Way
 Redmond, WA 98052-6399
 US
 Phone: +1 425 703 8835
 Email: dthaler@microsoft.com
Templin, et al. Expires September 30, 2007 [Page 13]

Internet-Draft ISATAP March 2007
Full Copyright Statement
 Copyright (C) The IETF Trust (2007).
 This document is subject to the rights, licenses and restrictions
 contained in BCP 78, and except as set forth therein, the authors
 retain all their rights.
 This document and the information contained herein are provided on an
 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
 THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
 OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
 THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
 The IETF takes no position regarding the validity or scope of any
 Intellectual Property Rights or other rights that might be claimed to
 pertain to the implementation or use of the technology described in
 this document or the extent to which any license under such rights
 might or might not be available; nor does it represent that it has
 made any independent effort to identify any such rights. Information
 on the procedures with respect to rights in RFC documents can be
 found in BCP 78 and BCP 79.
 Copies of IPR disclosures made to the IETF Secretariat and any
 assurances of licenses to be made available, or the result of an
 attempt made to obtain a general license or permission for the use of
 such proprietary rights by implementers or users of this
 specification can be obtained from the IETF on-line IPR repository at
 http://www.ietf.org/ipr.
 The IETF invites any interested party to bring to its attention any
 copyrights, patents or patent applications, or other proprietary
 rights that may cover technology that may be required to implement
 this standard. Please address the information to the IETF at
 ietf-ipr@ietf.org.
Acknowledgment
 Funding for the RFC Editor function is provided by the IETF
 Administrative Support Activity (IASA).
Templin, et al. Expires September 30, 2007 [Page 14]

AltStyle によって変換されたページ (->オリジナル) /