1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557
|
<pre>Network Working Group R. Housley
Request for Comments: 5083 Vigil Security
Updates: <a href="./rfc3852">3852</a> November 2007
Category: Standards Track
<span class="h1">Cryptographic Message Syntax (CMS)</span>
<span class="h1">Authenticated-Enveloped-Data Content Type</span>
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Abstract
This document describes an additional content type for the
Cryptographic Message Syntax (CMS). The authenticated-enveloped-data
content type is intended for use with authenticated encryption modes.
All of the various key management techniques that are supported in
the CMS enveloped-data content type are also supported by the CMS
authenticated-enveloped-data content type.
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
This document describes an additional content type for the
Cryptographic Message Syntax (CMS) [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>]. The authenticated-
enveloped-data content type is intended for use with authenticated
encryption modes, where an arbitrary content is both authenticated
and encrypted. Also, some associated data in the form of
authenticated attributes can also be authenticated. All of the
various key management techniques that are supported in the CMS
enveloped-data content type are also supported by the CMS
authenticated-enveloped-data content type.
The conventions for using the Advanced Encryption Standard-Counter
with Cipher Block Chaining-Message Authentication Code (AES-CCM) and
the AES-Galois/Counter Mode (GCM) authenticated encryption algorithms
with the CMS authenticated-enveloped-data content type defined in
this document can be found in [<a href="#ref-AESALGS" title=""Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS)"">AESALGS</a>].
The authenticated-enveloped-data content type, like all of the other
CMS content types, employs ASN.1 [<a href="#ref-X.208-88">X.208-88</a>], and it uses both the
Basic Encoding Rules (BER) [<a href="#ref-X.209-88">X.209-88</a>] and the Distinguished Encoding
Rules (DER) [<a href="#ref-X.509-88">X.509-88</a>].
<span class="grey">Housley Standards Track [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>. Terminology</span>
In this document, the key words MUST, MUST NOT, REQUIRED, SHOULD,
SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL are to be interpreted as
described in [<a href="#ref-STDWORDS" title=""Key words for use in RFCs to Indicate Requirement Levels"">STDWORDS</a>].
<span class="h3"><a class="selflink" id="section-1.2" href="#section-1.2">1.2</a>. Version Numbers</span>
The major data structure (AuthEnvelopedData) includes a version
number as the first item in the data structure. The version number
is intended to avoid ASN.1 decode errors. Some implementations do
not check the version number prior to attempting a decode, and then
if a decode error occurs, the version number is checked as part of
the error handling routine. This is a reasonable approach; it places
error processing outside of the fast path. This approach is also
forgiving when an incorrect version number is used by the sender.
Whenever the structure is updated, a higher version number will be
assigned. However, to ensure maximum interoperability, the higher
version number is only used when the new syntax feature is employed.
That is, the lowest version number that supports the generated syntax
is used.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Authenticated-Enveloped-Data Content Type</span>
The authenticated-enveloped-data content type consists of an
authenticated and encrypted content of any type and encrypted
content-authenticated-encryption keys for one or more recipients.
The combination of the authenticated and encrypted content and one
encrypted content-authenticated-encryption key for a recipient is a
"digital envelope" for that recipient. Any type of content can be
enveloped for an arbitrary number of recipients using any of the
supported key management techniques for each recipient. In addition,
authenticated but not encrypted attributes may be provided by the
originator.
The typical application of the authenticated-enveloped-data content
type will represent one or more recipients' digital envelopes on an
encapsulated content.
Authenticated-enveloped-data is constructed by the following steps:
1. A content-authenticated-encryption key for a particular content-
authenticated-encryption algorithm is generated at random.
<span class="grey">Housley Standards Track [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
2. The content-authenticated-encryption key is encrypted for each
recipient. The details of this encryption depend on the key
management algorithm used, but four general techniques are
supported:
Key Transport: the content-authenticated-encryption key is
encrypted in the recipient's public key;
Key Agreement: the recipient's public key and the sender's
private key are used to generate a pairwise symmetric key-
encryption key, then the content-authenticated-encryption
key is encrypted in the pairwise symmetric key-encryption
key;
Symmetric Key-Encryption Keys: the content-authenticated-
encryption key is encrypted in a previously distributed
symmetric key-encryption key; and
Passwords: the content-authenticated-encryption key is
encrypted in a key-encryption key that is derived from a
password or other shared secret value.
3. For each recipient, the encrypted content-authenticated-
encryption key and other recipient-specific information are
collected into a RecipientInfo value, defined in Section 6.2 of
[<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
4. Any attributes that are to be authenticated but not encrypted are
collected in the authenticated attributes.
5. The attributes collected in step 4 are authenticated and the CMS
content is authenticated and encrypted with the content-
authenticated-encryption key. If the authenticated encryption
algorithm requires either the additional authenticated data (AAD)
or the content to be padded to a multiple of some block size,
then the padding is added as described in Section 6.3 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
6. Any attributes that are to be provided without authentication or
encryption are collected in the unauthenticated attributes.
7. The RecipientInfo values for all the recipients, the
authenticated attributes, the unauthenticated attributes, and the
authenticated and encrypted content are collected together to
form an AuthEnvelopedData value as defined in <a href="#section-2.1">Section 2.1</a>.
<span class="grey">Housley Standards Track [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
A recipient opens the digital envelope by decrypting one of the
encrypted content-authenticated-encryption keys, and then using the
recovered key to decrypt and verify the integrity of the
authenticated and encrypted content as well as to verify the
integrity of the authenticated attributes.
The recipient MUST verify the integrity of the received content
before releasing any information, especially the plaintext of the
content. If the integrity verification fails, the receiver MUST
destroy all of the plaintext of the content.
This section is divided into three parts. The first part describes
the AuthEnvelopedData content type, the second part describes the
authentication and encryption process, and the third part describes
the key encryption process.
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. AuthEnvelopedData Type</span>
The following object identifier identifies the authenticated-
enveloped-data content type:
id-ct-authEnvelopedData OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
smime(16) ct(1) 23 }
The authenticated-enveloped-data content type MUST have ASN.1 type
AuthEnvelopedData:
AuthEnvelopedData ::= SEQUENCE {
version CMSVersion,
originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
recipientInfos RecipientInfos,
authEncryptedContentInfo EncryptedContentInfo,
authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
mac MessageAuthenticationCode,
unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
The fields of type AuthEnvelopedData have the following meanings:
version is the syntax version number. It MUST be set to 0.
originatorInfo optionally provides information about the
originator. It is present only if required by the key
management algorithm. It may contain certificates and
Certificate Revocation Lists (CRLs), and the OriginatorInfo
type is defined in Section 6.1 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
<span class="grey">Housley Standards Track [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
recipientInfos is a collection of per-recipient information.
There MUST be at least one element in the collection. The
RecipientInfo type is defined in Section 6.2 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
authEncryptedContentInfo is the authenticated and encrypted
content. The CMS enveloped-data content type uses the same
type to carry the encrypted content. The EncryptedContentInfo
type is defined in Section 6.1 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
authAttrs optionally contains the authenticated attributes. The
CMS authenticated-data content type uses the same type to carry
authenticated attributes. The authAttrs MUST be present if the
content type carried in EncryptedContentInfo is not id-data.
AuthAttributes MUST be DER encoded, even if the rest of the
AuthEnvelopedData structure is BER encoded. The AuthAttributes
type is defined in Section 9.1 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>]; however, in this case,
the message-digest attribute SHOULD NOT be included. Useful
attribute types are defined in Section 11 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
mac is the integrity check value (ICV) or message authentication
code (MAC) that is generated by the authenticated encryption
algorithm. The CMS authenticated-data content type uses the
same type to carry a MAC. In this case, the MAC covers the
authenticated attributes and the content directly, and a digest
algorithm is not used. The MessageAuthenticationCode type is
defined in Section 9.1 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
unauthAttrs optionally contains the unauthenticated attributes.
The CMS authenticated-data content type uses the same type to
carry unauthenticated attributes. The UnauthAttributes type is
defined in Section 9.1 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>]. Useful attribute types are
defined in Section 11 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>].
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>. Authentication and Encryption Process</span>
The content-authenticated-encryption key for the desired content-
authenticated-encryption algorithm is randomly generated.
If the authenticated encryption algorithm requires the content to be
padded to a multiple of some block size, then the padding MUST be
added as described in Section 6.3 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>]. This padding method is
well defined if and only if the block size is less than 256 octets.
If optional authenticated attributes are present, then they are DER
encoded. A separate encoding of the authAttrs field is performed to
construct the authenticated associated data (AAD) input to the
authenticated encryption algorithm. For the purposes of constructing
the AAD, the IMPLICIT [1] tag in the authAttrs field is not used for
<span class="grey">Housley Standards Track [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
the DER encoding: rather a universal SET OF tag is used. That is,
the DER encoding of the SET OF tag, rather than of the IMPLICIT [1]
tag, is to be included in the construction for the AAD along with the
length and content octets of the authAttrs value. If the
authenticated encryption algorithm requires the AAD to be padded to a
multiple of some block size, then the padding MUST be added as
described in Section 6.3 of [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>]. This padding method is well
defined if and only if the block size is less than 256 octets.
If optional authenticated attributes are absent, then zero bits of
input are provided for the AAD input to the authenticated encryption
algorithm.
The inputs to the authenticated encryption algorithm are the content
(the data, which is padded if necessary), the DER-encoded
authenticated attributes (the AAD, which is padded if necessary), and
the content-authenticated-encryption key. Under control of a
content-authenticated-encryption key, the authenticated encryption
operation maps an arbitrary string of octets (the data) to another
string of octets (the ciphertext) and it computes an authentication
tag over the AAD and the data. The encrypted data is included in the
AuthEnvelopedData authEncryptedContentInfo encryptedContent as an
OCTET STRING, and the authentication tag is included in the
AuthEnvelopedData mac.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>. Key Encryption Process</span>
The input to the key encryption process -- the value supplied to the
recipient's key-encryption algorithm -- is just the "value" of the
content-authenticated-encryption key.
Any of the aforementioned key management techniques can be used for
each recipient of the same encrypted content.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Security Considerations</span>
This specification defines an additional CMS content type. The
security considerations provided in [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>] apply to this content type
as well.
Many authenticated encryption algorithms make use of a block cipher
in counter mode to provide encryption. When used properly, counter
mode provides strong confidentiality. Bellare, Desai, Jokipii, and
Rogaway show in [<a href="#ref-BDJR" title=""A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation"">BDJR</a>] that the privacy guarantees provided by
counter mode are at least as strong as those for Cipher Block
Chaining (CBC) mode when using the same block cipher.
<span class="grey">Housley Standards Track [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
Unfortunately, it is easy to misuse counter mode. If counter block
values are ever used for more that one encryption operation with the
same key, then the same key stream will be used to encrypt both
plaintexts, and the confidentiality guarantees are voided.
Fortunately, the CMS authenticated-enveloped-data content type
provides all of the tools needed to avoid misuse of counter mode.
All of the existing key management techniques permit a fresh
content-encryption key to be generated for each content. In
addition, existing authenticated encryption algorithms that make use
of counter mode support the use of an unpredictable nonce value in
the counter block. This unpredictable nonce value (sometimes called
a "salt") should be carried in an algorithm identifier parameter.
Implementations must randomly generate content-authenticated-
encryption keys, padding, and unpredictable nonce values. Also, the
generation of public/private key pairs relies on a random numbers.
The use of inadequate pseudo-random number generators (PRNGs) to
generate cryptographic keys can result in little or no security. An
attacker may find it much easier to reproduce the PRNG environment
that produced the keys, and then searching the resulting small set of
possibilities, rather than brute force searching the whole key space.
The generation of quality random numbers is difficult. <a href="./rfc4086">RFC 4086</a>
[<a href="#ref-RANDOM" title=""Randomness Requirements for Security"">RANDOM</a>] offers important guidance in this area.
If the message-digest attribute is included in the AuthAttributes,
then the attribute value will contain the unencrypted one-way hash
value of the plaintext of the content. Disclosure of this hash value
enables content tracking, and it can be used to determine if the
plaintext matches one or more candidate contents. For these reasons,
the AuthAttributes SHOULD NOT contain the message-digest attribute.
CMS is often used to provide encryption in messaging environments.
In messaging environments, various forms of unsolicited messages
(such as spam and phishing) represent a significant volume of
unwanted traffic. Present mitigation strategies for unwanted message
traffic involve analysis of message plaintext. When recipients
accept unsolicited encrypted messages, they become even more
vulnerable to unwanted traffic since many present mitigation
strategies will be unable to access the plaintext. Therefore,
software that receives messages that have been encrypted using CMS
needs to provide one or more mechanisms to handle the unwanted
message traffic. One approach that does not require disclosure of
keying material to a server is to reject or discard encrypted
messages unless they purport to come from a member of a white list.
<span class="grey">Housley Standards Track [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. ASN.1 Module</span>
CMS-AuthEnvelopedData-2007
{ iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
pkcs-9(9) smime(16) modules(0) cms-authEnvelopedData(31) }
DEFINITIONS IMPLICIT TAGS ::=
BEGIN
-- EXPORTS All
-- The types and values defined in this module are exported for use
-- in the other ASN.1 modules. Other applications may use them for
-- their own purposes.
IMPORTS
-- Imports from <a href="./rfc3852">RFC 3852</a> [<a href="#ref-CMS" title=""Cryptographic Message Syntax (CMS)"">CMS</a>], Section 12.1
AuthAttributes, CMSVersion, EncryptedContentInfo,
MessageAuthenticationCode, OriginatorInfo, RecipientInfos,
UnauthAttributes
FROM CryptographicMessageSyntax2004
{ iso(1) member-body(2) us(840) rsadsi(113549)
pkcs(1) pkcs-9(9) smime(16) modules(0)
cms-2004(24) } ;
id-ct-authEnvelopedData OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
smime(16) ct(1) 23 }
AuthEnvelopedData ::= SEQUENCE {
version CMSVersion,
originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
recipientInfos RecipientInfos,
authEncryptedContentInfo EncryptedContentInfo,
authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
mac MessageAuthenticationCode,
unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
END -- of CMS-AuthEnvelopedData-2007
<span class="grey">Housley Standards Track [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. References</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Normative References</span>
[<a id="ref-CMS">CMS</a>] Housley, R., "Cryptographic Message Syntax (CMS)", <a href="./rfc3852">RFC</a>
<a href="./rfc3852">3852</a>, July 2004.
[<a id="ref-STDWORDS">STDWORDS</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-X.208-88">X.208-88</a>] CCITT. Recommendation X.208: Specification of Abstract
Syntax Notation One (ASN.1). 1988.
[<a id="ref-X.209-88">X.209-88</a>] CCITT. Recommendation X.209: Specification of Basic
Encoding Rules for Abstract Syntax Notation One (ASN.1).
1988.
[<a id="ref-X.509-88">X.509-88</a>] CCITT. Recommendation X.509: The Directory-
Authentication Framework. 1988.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Informative References</span>
[<a id="ref-AESALGS">AESALGS</a>] Housley, R., "Using AES-CCM and AES-GCM Authenticated
Encryption in the Cryptographic Message Syntax (CMS)",
<a href="./rfc5084">RFC 5084</a>, November 2007.
[<a id="ref-BDJR">BDJR</a>] Bellare, M., Desai, A., Jokipii, E., and P. Rogaway, "A
Concrete Security Treatment of Symmetric Encryption:
Analysis of the DES Modes of Operation", Proceedings
38th Annual Symposium on Foundations of Computer
Science, 1997.
[<a id="ref-RANDOM">RANDOM</a>] Eastlake, D., 3rd, Schiller, J., and S. Crocker,
"Randomness Requirements for Security", <a href="https://www.rfc-editor.org/bcp/bcp106">BCP 106</a>, <a href="./rfc4086">RFC</a>
<a href="./rfc4086">4086</a>, June 2005.
Author's Address
Russell Housley
Vigil Security, LLC
918 Spring Knoll Drive
Herndon, VA 20170
USA
EMail: housley@vigilsec.com
<span class="grey">Housley Standards Track [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5083">RFC 5083</a> Authenticated-Enveloped-Data November 2007</span>
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Housley Standards Track [Page 10]
</pre>
|