| < draft-norreys-ecrit-authority2individuals-requirements-01.txt | draft-norreys-ecrit-authority2individuals-requirements-02.txt > | |||
|---|---|---|---|---|
| ECRIT S. Norreys | ECRIT S. Norreys | |||
| Internet-Draft BT Group | Internet-Draft BT Group | |||
| Intended status: Informational H. Tschofenig | Intended status: Informational H. Tschofenig | |||
| Expires: January 13, 2009 Nokia Siemens Networks | Expires: September 9, 2009 Nokia Siemens Networks | |||
| H. Schulzrinne | H. Schulzrinne | |||
| Columbia University | Columbia University | |||
| July 12, 2008 | March 8, 2009 | |||
| Requirements for Authority-to-Individuals Communication for Emergency | Authority-to-Individuals Communication for Emergency Situations: | |||
| Situations | Requirements, Terminology and Architecture | |||
| draft-norreys-ecrit-authority2individuals-requirements-01.txt | draft-norreys-ecrit-authority2individuals-requirements-02.txt | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | This Internet-Draft is submitted to IETF in full conformance with the | |||
| applicable patent or other IPR claims of which he or she is aware | provisions of BCP 78 and BCP 79. | |||
| have been or will be disclosed, and any of which he or she becomes | ||||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
| Drafts. | Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on January 13, 2009. | This Internet-Draft will expire on September 9, 2009. | |||
| Copyright Notice | ||||
| Copyright (c) 2009 IETF Trust and the persons identified as the | ||||
| document authors. All rights reserved. | ||||
| This document is subject to BCP 78 and the IETF Trust's Legal | ||||
| Provisions Relating to IETF Documents in effect on the date of | ||||
| publication of this document (http://trustee.ietf.org/license-info). | ||||
| Please review these documents carefully, as they describe your rights | ||||
| and restrictions with respect to this document. | ||||
| Abstract | Abstract | |||
| Public safety agencies need to provide information to the general | Public safety agencies need to provide information to the general | |||
| public before and during large-scale emergencies. While many aspects | public before and during large-scale emergencies. While many aspects | |||
| of such systems are specific to national or local jurisdictions, | of such systems are specific to national or local jurisdictions, | |||
| emergencies span such boundaries and notifications need to reach | emergencies span such boundaries and notifications need to reach | |||
| visitors from other jurisdictions. This document summarizes | visitors from other jurisdictions. This document summarizes | |||
| requirements for protocols to alert individuals within a defined | requirements for protocols to alert individuals within a defined | |||
| geographic area. | geographic area. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 3. Architectures . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 3.1. Closed Warning Notification Provider and Aggregator | |||
| 5. Security considerations . . . . . . . . . . . . . . . . . . . 7 | Groups . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8 | 3.2. Open Communication between Warning Notification | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8 | Provider and Aggregator . . . . . . . . . . . . . . . . . 6 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . . 8 | 3.3. Open Communication towards Warning Notification | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . . 8 | Customers . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8 | 3.4. Notification Population . . . . . . . . . . . . . . . . . 9 | |||
| Intellectual Property and Copyright Statements . . . . . . . . . . 10 | 4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 6. Security considerations . . . . . . . . . . . . . . . . . . . 11 | ||||
| 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . . 11 | ||||
| 8.2. Informative References . . . . . . . . . . . . . . . . . . 11 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12 | ||||
| 1. Introduction | 1. Introduction | |||
| During large-scale emergencies, public safety authorities need to | During large-scale emergencies, public safety authorities need to | |||
| reliably communicate with citizens in the affected areas, to provide | reliably communicate with citizens in the affected areas, to provide | |||
| warnings, indicate whether citizens should evacuate and how, and to | warnings, indicate whether citizens should evacuate and how, and to | |||
| dispel misinformation. Accurate information can reduce the impact of | dispel misinformation. Accurate information can reduce the impact of | |||
| such emergencies. | such emergencies. | |||
| Traditionally, emergency alerting has used church bells, sirens, | Traditionally, emergency alerting has used church bells, sirens, | |||
| skipping to change at page 4, line 40 ¶ | skipping to change at page 4, line 40 ¶ | |||
| The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119], with the | document are to be interpreted as described in [RFC2119], with the | |||
| important qualification that, unless otherwise stated, these terms | important qualification that, unless otherwise stated, these terms | |||
| apply to the design of a protocol conveying emergency alerts and | apply to the design of a protocol conveying emergency alerts and | |||
| early warning messages, not its implementation or application. | early warning messages, not its implementation or application. | |||
| This document reuses the terminology introduced by [3GPP-TR-22.968] | This document reuses the terminology introduced by [3GPP-TR-22.968] | |||
| and modifies it to fit to IETF terminology: | and modifies it to fit to IETF terminology: | |||
| Notification Area: | Notification Population: | |||
| Notification area is an area where warning notifications are sent. | The term notification population refers to the set of warning | |||
| notification consumers that receive a warning notification. | ||||
| Public Warning System: | Public Warning System: | |||
| A public warning system delivers warning notifications provided by | A public warning system delivers warning notifications provided by | |||
| warning notification providers to IP-capable end hosts within | warning notification providers to IP-capable end hosts within | |||
| notification areas. | notification areas. | |||
| Warning Notification: | Warning Notification: | |||
| Warning notifications notify recipients of the occurrence of | Warning notifications inform recipients of the occurrence of | |||
| current or pending public safety-related events and additionally | current or pending public safety-related events and additionally | |||
| may provide users with instructions on what to do and where to get | may provide users with instructions on what to do and where to get | |||
| help for the duration of the emergency. | help for the duration of the emergency. | |||
| Warning Notification Provider: | Warning Notification Provider: | |||
| A warning notification provider is an agency such as a branch of | A warning notification provider is an agency that injects warning | |||
| government or a public transport agency that provides warning | notifications in the communication system. Examples of such | |||
| notifications. A private institution, such as a university, | agencies are branches of governments, public transport providers | |||
| hospital or enterprise, may also provide such warnings to people | or weather organizations. A private institution, such as a | |||
| located within their facilities. | university, hospital or enterprise, may also provide such warnings | |||
| to people located within their facilities. | ||||
| 3. Requirements | Warning Notification Consumer: A warning notification consumer is | |||
| the final recipient of a warning notification from an IP | ||||
| communication point of view. Examples are Web browsers and SIP | ||||
| clients on mobile phones and laptops that process warning | ||||
| notification messages. Once received such a warning is shown to | ||||
| the user (a human) via an appropriately designed user interface to | ||||
| ensure that it is properly understood. | ||||
| The objective of these requirements is to allow authorities dealing | Warning Notification Aggregator: | |||
| with an emergency situation to communicate adequately with effected | ||||
| people in a timely fashion. | ||||
| Req-1: | A warning notification aggregator receives alert notifications | |||
| from different providers, performs security functions (e.g., | ||||
| authentication, authorization) and may need to transform message | ||||
| into a different format before forwarding them towards warning | ||||
| notification consumers. | ||||
| The protocol mechanisms MUST provide real-time message delivery. | 3. Architectures | |||
| Req-2: | The following sub-sections illustrate different architectural | |||
| approaches. | ||||
| The protocol mechanisms MUST deliver messages within a pre-planned | 3.1. Closed Warning Notification Provider and Aggregator Groups | |||
| time frame in the future, as agencies may want to prepare | ||||
| announcements for predictable or likely events. | ||||
| Req-3: | The first architectural variant allows the distribution of warning | |||
| notifications from warning notification providers to warning | ||||
| notification aggregators. The communication is largely in a point- | ||||
| to-point fashion and the number of involved players is rather small, | ||||
| particularly on the side of the warning notification providers. | ||||
| Furthermore, a new warning notification aggregator is allowed to | ||||
| receive warning notifications only after certain verification | ||||
| procedures are conducted and thereby the entire communication | ||||
| infrastructure re-essembles a closed group. To ensure that the | ||||
| content of the warning notifications is properly understood the | ||||
| involved parties are very likely to agree on the detailed semantics | ||||
| of the warning messages prior to distributing any alert. | ||||
| The protocol mechanisms MUST convey sufficient details of the | Figure 1 shows the involved parties graphically. | |||
| emergency situation. | ||||
| Req-4: | +----------------------------------------+ | |||
| | .--------------. | | ||||
| | | Warning | Closed | | ||||
| | | Notification |\ Federation | | ||||
| | Aggregator A | \ | | ||||
| | `--------------' \\ | | ||||
| | \ | | ||||
| | \\ | | ||||
| | \ | | ||||
| | \\ | | ||||
| | \ | | ||||
| | .--------------. .............. | | ||||
| | | Warning | : Warning : | | ||||
| | | Notification |-----: Notification : | | ||||
| | Aggregator B | : Provider : | | ||||
| | `--------------' `..............' | | ||||
| | / | | ||||
| | // | | ||||
| | // | | ||||
| | // | | ||||
| | .--------------. // | | ||||
| | | Warning | // | | ||||
| | | Notification | / | | ||||
| | Aggregator C | | | ||||
| | `--------------' | | ||||
| +----------------------------------------+ | ||||
| The protocol mechanisms MUST provide the public with sufficient | Figure 1: Closed Warning Notification Provider and Aggregator Groups | |||
| instructions to take appropriate actions. | ||||
| Req-5: | An example of this system can be seen in national early warning | |||
| systems where regulatory requirements force warning notification | ||||
| provider and aggregators to work together. | ||||
| 3.2. Open Communication between Warning Notification Provider and | ||||
| Aggregator | ||||
| This model is similar to the closed group presented in the previous | ||||
| section with a difference in the way how warning notification | ||||
| aggregators can retrieve warning notifications from warning | ||||
| notification providers. When the aggregator interacts with the | ||||
| provider then no special client-side authentication procedure is | ||||
| assumed and no access restrictions are enforced. As such, the | ||||
| aggregator might be located anywhere on the Internet to retrieve the | ||||
| warning notifications. Warning notification aggregators might offer | ||||
| their subscribers the ability to receive warnings of a certain type | ||||
| (e.g., weather alerts) for a specific region (e.g., for a specific | ||||
| country or an entire continent). Hence, the aggregator might find | ||||
| the relevant warning notification providers and interacts with them | ||||
| to retrieve alerts. Finally, the aggregator might use different | ||||
| protocol mechanisms (e.g., SMS, Web pages) towards the warning | ||||
| notification customers, often depending on the client capabilities. | ||||
| In general, the number of aggregators is very likely larger than in a | ||||
| closed group but there are no significant challenges with respect to | ||||
| scalability or congestion to expect. | ||||
| Figure 2 shows the involved parties graphically. | ||||
| o | ||||
| \|/ | ||||
| | .............. | ||||
| / \ : Warning : | ||||
| .--------------. : Notification : | ||||
| | Warning | : Provider X : | ||||
| | Notification |-- `..............' | ||||
| Consumer (1)| -- -- | ||||
| `--------------' --- --- / | ||||
| --- .--------------. --- / | ||||
| -- | Warning | --- / | ||||
| --| Notification |-- / | ||||
| Aggregator A | \ / | ||||
| ...... `--------------' \\ / | ||||
| \ // | ||||
| X\ | ||||
| o / \ | ||||
| \|/ / \\ | ||||
| | / \ | ||||
| / \ .--------------. / .............. | ||||
| .--------------. | Warning |/ : Warning : | ||||
| | Warning | ------- | Notification |-----: Notification : | ||||
| | Notification |------ Aggregator B | : Provider Y : | ||||
| Consumer (n)| `--------------' `..............' | ||||
| `--------------' | ||||
| Figure 2: Open Communication between Warning Notification Provider | ||||
| and Aggregator | ||||
| 3.3. Open Communication towards Warning Notification Customers | ||||
| In the following architectural variant the customers directly | ||||
| interact with various warning notification providers that a relevant | ||||
| for a specific type of alert type. In order to learn about the | ||||
| relevant warning notification providers it may be necessary to | ||||
| consult some form of discovery service; this may be done out-of-band | ||||
| via manual configuration or via a protocol mechanism. | ||||
| Scalability and congestion control concerns arise with this scenario | ||||
| as this model assumes an opt-in approach from the customer. The | ||||
| total number of warning notification customers are provider has to | ||||
| serve may be considerable. There are a more security challenges | ||||
| since there are no pre-established trust relationships between the | ||||
| warning notification customers and the providers. | ||||
| .-----------. | ||||
| | Discovery | | ||||
| | Service | | ||||
| `-----------' | ||||
| ^ | ||||
| / | ||||
| / .............. | ||||
| / : Warning : | ||||
| / / : Notification : | ||||
| / // : Provider X : | ||||
| / // `..............' | ||||
| / // | ||||
| o / // | ||||
| \|/ / / | ||||
| | / // | ||||
| / \ v // | ||||
| .--------------. // .............. | ||||
| | Warning | // : Warning : | ||||
| | Notification |-------------------- : Notification : | ||||
| Consumer (1)|-- : Provider Y : | ||||
| `--------------' -- `..............' | ||||
| --- | ||||
| -- | ||||
| --- | ||||
| -- | ||||
| --- | ||||
| -- : Warning : | ||||
| --: Notification : | ||||
| : Provider Y : | ||||
| `..............' | ||||
| Open Communication towards Warning Notification Customers | ||||
| 3.4. Notification Population | ||||
| What warning notification customers are put into the notification | ||||
| population is an important architectural aspect that is largely | ||||
| orthongonal to the architecture presented in Section 3.1 and | ||||
| Section 3.2. | ||||
| In an opt-in model the the warning notification customer need to | ||||
| provide information about what type of alerts it is interested in | ||||
| and, in order for the warning notification aggregator or the warning | ||||
| notification provider to be able to distribute warnings it is | ||||
| necessary for them to know the context, such as the current location, | ||||
| preferred language or device capabilities. This information may be | ||||
| provided by the customer itself or by other entities, such as the | ||||
| access provider. | ||||
| Alternatively, the topological structure of networks is used to | ||||
| distribute warning notifications to all hosts that are located within | ||||
| a specific IP-subsetwork or hosts in a specific link layer broadcast | ||||
| domain. This approach typically requires co-operation from the | ||||
| network provider. | ||||
| 4. Requirements | ||||
| The following requirements are related to the communication protocol | ||||
| and the context. | ||||
| Req-1: | ||||
| The protocol mechanisms MUST allow targeting notifications to | The protocol mechanisms MUST allow targeting notifications to | |||
| specific individuals, groups of individuals or specific geographic | specific individuals, groups of individuals or specific geographic | |||
| regions. Different regions or groups may receive different | regions. Different regions or groups may receive different | |||
| instructions for the same emergency. (For example, people very | instructions for the same disaster. (For example, people very | |||
| close to a chemical spill may be asked to evacuate, while those | close to a chemical spill may be asked to evacuate, while those | |||
| further away may be asked to close windows.) | further away may be asked to close windows.) | |||
| Req-6 | Req-2: | |||
| Early warning notifications MAY be given preferential processing | The protocol solution MUST provide real-time message delivery. | |||
| and delivery treatment. | ||||
| Req-7 | Req-3: | |||
| The solution MUST support the delivery of warning notifications | ||||
| that allow for predictable or likely events. | ||||
| Req-4 | ||||
| The protocol mechanisms MUST allow delivery of messages | The protocol mechanisms MUST allow delivery of messages | |||
| simultaneously to a large audience. | simultaneously to a large audience. | |||
| Req-8 | Req-5 | |||
| The protocol mechanisms MAY provide an option to return a receipt | The protocol mechanisms MAY provide an option to return a receipt | |||
| on reading message. Message alert confirmation SHOULD NOT be | on reading message. However, the confirmation SHOULD NOT be | |||
| required. | required. | |||
| Req-9: | Req-6: | |||
| An emergency notification system MUST be independent of the | The protocol mechanism MUST be independent of the underlying | |||
| underlying access network technology. | access network technology. | |||
| Req-10: | Req-7: | |||
| Protocol mechanisms MUST allow to tailor the message to the | Protocol mechanisms MUST allow to tailor the message to the | |||
| language preferences of the receiver and/or deliver multiple | language preferences of the receiver and/or deliver multiple | |||
| versions in different languages within the same message, so that | versions in different languages within the same message, so that | |||
| the recipient can choose the most appropriate one. | the recipient can choose the most appropriate one. | |||
| Req-11: | Req-8: | |||
| A solution MUST support delivery of notification messages (e.g., | ||||
| with different media types) to those with special needs, such as | ||||
| hearing and vision impaired. | ||||
| Req-12: | ||||
| A user SHOULD be able to indicate the preferred method of | A user SHOULD be able to indicate the preferred method of | |||
| communication to the public warning service, such as notification | communication to the public warning service, such as notification | |||
| by email, different instant messaging protocols or automated voice | by email, different instant messaging protocols or automated voice | |||
| calls. | calls. | |||
| Req-13: | Req-9: | |||
| A solution MUST prevent misuse of the emergency infrastructure by | ||||
| unauthorized entities. | ||||
| Req-14: | ||||
| Emergency notification systems SHOULD identify the message and | ||||
| notification originator, preferably in a cryptographically secure | ||||
| manner. | ||||
| Req-15: | ||||
| A solution MUST offer sufficient details of the emergency | ||||
| situation. | ||||
| Req-16: | ||||
| A solution MUST support integrity protection of early warning | The protocol conveying warning notifications SHOULD identify the | |||
| notifications. | warning notification provider in a secure manner. | |||
| Req-17: | Req-10: | |||
| A solution MUST provide a mechanism for testing authority-to- | The solution MUST provide a mechanism for transmitting warning | |||
| individuals early warning messages just as test support is | notification test messages. | |||
| provided by individuals-to-authority emergency services. | ||||
| Req-18: | Req-11: | |||
| Devices should be able to recognize alerts that requires that the | A solution MUST support delivery of notification messages (e.g., | |||
| device override user interface configurations such as vibrate-only | with different media types) to those with special needs, such as | |||
| mode. (For example, a school closing advisory due to snow may not | hearing and vision impaired. | |||
| require such an immediate alert in the middle of the night.) | ||||
| 4. IANA Considerations | 5. IANA Considerations | |||
| This document does not require actions by IANA. | This document does not require actions by IANA. | |||
| 5. Security considerations | 6. Security considerations | |||
| This document outlines requirements and security security | This document outlines requirements and security security | |||
| requirements are a part of them. | requirements are a part of them. | |||
| 6. Acknowledgments | 7. Acknowledgments | |||
| This document reuses requirements captured outside the IETF, namely | This document reuses requirements captured outside the IETF, namely | |||
| ETSI (with [ETSI-TS-102-182]), and the 3GPP (with [3GPP-TR-22.968]). | ETSI (with [ETSI-TS-102-182]), and the 3GPP (with [3GPP-TR-22.968]). | |||
| We would like to thank the authors of these specifications for their | We would like to thank the authors of these specifications for their | |||
| work. Note, however, that only a small subset of the requirements | work. Note, however, that only a small subset of the requirements | |||
| have been reflected that do not relate to specific deployments, user | have been reflected that do not relate to specific deployments, user | |||
| interface aspects, detailed regulatory requirements, management and | interface aspects, detailed regulatory requirements, management and | |||
| operational considerations, and non-IP specific technologies. | operational considerations, and non-IP specific technologies. | |||
| We would like to thank Leopold Murhammer for his review in July 2007. | We would like to thank Leopold Murhammer for his review in July 2007. | |||
| 7. References | 8. References | |||
| 7.1. Normative References | 8.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| 7.2. Informative References | 8.2. Informative References | |||
| [3GPP-TR-22.968] | [3GPP-TR-22.968] | |||
| , ., "3GPP TR 22.968, V1.0.0 (2007-04), 3rd Generation | , ., "3GPP TR 22.968, V1.0.0 (2007-04), 3rd Generation | |||
| Partnership Project; Technical Specification Group | Partnership Project; Technical Specification Group | |||
| Services and System Aspects; Study for requirements for a | Services and System Aspects; Study for requirements for a | |||
| Public Warning System (PWS) Service (Release 8)", | Public Warning System (PWS) Service (Release 8)", | |||
| December 2006. | December 2006. | |||
| [ETSI-TS-102-182] | [ETSI-TS-102-182] | |||
| , ., "ETSI TS 102 182, V1.2.1 (2006-12), Technical | , ., "ETSI TS 102 182, V1.2.1 (2006-12), Technical | |||
| skipping to change at page 9, line 4 ¶ | skipping to change at page 12, line 15 ¶ | |||
| Authors' Addresses | Authors' Addresses | |||
| Steve Norreys | Steve Norreys | |||
| BT Group | BT Group | |||
| 1 London Road | 1 London Road | |||
| Brentwood, Essex CM14 4QP | Brentwood, Essex CM14 4QP | |||
| UK | UK | |||
| Phone: +44 1277 32 32 20 | Phone: +44 1277 32 32 20 | |||
| Email: steve.norreys@bt.com | Email: steve.norreys@bt.com | |||
| Hannes Tschofenig | Hannes Tschofenig | |||
| Nokia Siemens Networks | Nokia Siemens Networks | |||
| Linnoitustie 6 | Linnoitustie 6 | |||
| Espoo 02600 | Espoo 02600 | |||
| Finland | Finland | |||
| Phone: +358 (50) 4871445 | Phone: +358 (50) 4871445 | |||
| Email: Hannes.Tschofenig@gmx.net | Email: Hannes.Tschofenig@gmx.net | |||
| URI: http://www.tschofenig.priv.at | URI: http://www.tschofenig.priv.at | |||
| Henning Schulzrinne | Henning Schulzrinne | |||
| Columbia University | Columbia University | |||
| Department of Computer Science | Department of Computer Science | |||
| 450 Computer Science Building | 450 Computer Science Building | |||
| New York, NY 10027 | New York, NY 10027 | |||
| US | US | |||
| Phone: +1 212 939 7004 | Phone: +1 212 939 7004 | |||
| Email: hgs+ecrit@cs.columbia.edu | Email: hgs+ecrit@cs.columbia.edu | |||
| URI: http://www.cs.columbia.edu | URI: http://www.cs.columbia.edu | |||
| Full Copyright Statement | ||||
| Copyright (C) The IETF Trust (2008). | ||||
| This document is subject to the rights, licenses and restrictions | ||||
| contained in BCP 78, and except as set forth therein, the authors | ||||
| retain all their rights. | ||||
| This document and the information contained herein are provided on an | ||||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | ||||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | ||||
| THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | ||||
| OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | ||||
| THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | ||||
| WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
| Intellectual Property | ||||
| The IETF takes no position regarding the validity or scope of any | ||||
| Intellectual Property Rights or other rights that might be claimed to | ||||
| pertain to the implementation or use of the technology described in | ||||
| this document or the extent to which any license under such rights | ||||
| might or might not be available; nor does it represent that it has | ||||
| made any independent effort to identify any such rights. Information | ||||
| on the procedures with respect to rights in RFC documents can be | ||||
| found in BCP 78 and BCP 79. | ||||
| Copies of IPR disclosures made to the IETF Secretariat and any | ||||
| assurances of licenses to be made available, or the result of an | ||||
| attempt made to obtain a general license or permission for the use of | ||||
| such proprietary rights by implementers or users of this | ||||
| specification can be obtained from the IETF on-line IPR repository at | ||||
| http://www.ietf.org/ipr. | ||||
| The IETF invites any interested party to bring to its attention any | ||||
| copyrights, patents or patent applications, or other proprietary | ||||
| rights that may cover technology that may be required to implement | ||||
| this standard. Please address the information to the IETF at | ||||
| ietf-ipr@ietf.org. | ||||
| End of changes. 45 change blocks. | ||||
| 96 lines changed or deleted | 269 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||