1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613
|
<pre>Network Working Group P. Jayaraman
Request for Comments: 5193 Net.Com
Category: Informational R. Lopez
Univ. of Murcia
Y. Ohba, Ed.
Toshiba
M. Parthasarathy
Nokia
A. Yegin
Samsung
May 2008
Protocol for Carrying Authentication for Network Access (PANA) Framework
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Abstract
This document defines the general Protocol for Carrying
Authentication for Network Access (PANA) framework functional
elements, high-level call flow, and deployment environments.
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-2">2</a>
<a href="#section-1.1">1.1</a>. Specification of Requirements ..............................<a href="#page-2">2</a>
<a href="#section-2">2</a>. General PANA Framework ..........................................<a href="#page-2">2</a>
<a href="#section-3">3</a>. Call Flow .......................................................<a href="#page-5">5</a>
<a href="#section-4">4</a>. Environments ....................................................<a href="#page-6">6</a>
<a href="#section-5">5</a>. Security Considerations .........................................<a href="#page-8">8</a>
<a href="#section-6">6</a>. Acknowledgments .................................................<a href="#page-8">8</a>
<a href="#section-7">7</a>. References ......................................................<a href="#page-8">8</a>
<a href="#section-7.1">7.1</a>. Normative References .......................................<a href="#page-8">8</a>
<a href="#section-7.2">7.2</a>. Informative References .....................................<a href="#page-9">9</a>
<span class="grey">Jayaraman, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
PANA (Protocol for carrying Authentication for Network Access) is a
link-layer agnostic network access authentication protocol that runs
between a client that wants to gain access to the network and a
server on the network side. PANA defines a new Extensible
Authentication Protocol (EAP) [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>] lower layer that uses IP
between the protocol end points.
The motivation to define such a protocol and the requirements are
described in [<a href="./rfc4058" title=""Protocol for Carrying Authentication for Network Access (PANA) Requirements"">RFC4058</a>]. Protocol details are documented in
[<a href="./rfc5191" title=""Protocol for Carrying Authentication for Network Access (PANA)"">RFC5191</a>]. Upon following a successful PANA authentication, per-
data-packet security can be achieved by using physical security,
link-layer ciphering, or IPsec [<a href="#ref-PANA-IPSEC" title=""PANA Enabling IPsec based Access Control"">PANA-IPSEC</a>]. The server
implementation of PANA may or may not be colocated with the entity
enforcing the per-packet access control function. When the server
for PANA and per-packet access control entities are separate, a
protocol (e.g., [<a href="#ref-ANCP-PROTO" title=""Protocol for Access Node Control Mechanism in Broadband Networks"">ANCP-PROTO</a>]) may be used to carry information
between the two nodes.
PANA is intended to be used in any access network regardless of the
underlying security. For example, the network might be physically
secured, or secured by means of cryptographic mechanisms after the
successful client-network authentication. While it is mandatory for
a PANA deployment to implement behavior that ensures the integrity of
PANA messages when the EAP method produces MSK, it is not mandatory
to implement support for network security at the link-layer or
network-layer.
This document defines the general framework for describing how these
various PANA and other network access authentication elements
interact with each other, especially considering the two basic types
of deployment environments (see <a href="#section-4">Section 4</a>).
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>. Specification of Requirements</span>
In this document, several words are used to signify the requirements
of the specification. These words are often capitalized. The key
words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document
are to be interpreted as described in [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. General PANA Framework</span>
PANA is designed to facilitate the authentication and authorization
of clients in access networks. PANA is an EAP [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>] lower layer
that carries EAP authentication methods encapsulated inside EAP
between a client node and a server in the access network. While PANA
<span class="grey">Jayaraman, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
enables the authentication process between the two entities, it is
only a part of an overall AAA (Authentication, Authorization and
Accounting) and access control framework. A AAA and access control
framework using PANA is comprised of four functional entities.
Figure 1 illustrates these functional entities and the interfaces
(protocols, APIs) among them.
RADIUS,
Diameter,
+-----+ PANA +-----+ LDAP, API, etc. +-----+
| PaC |<----------------->| PAA |<------------------->| AS |
+-----+ +-----+ +-----+
^ ^
| |
| +-----+ |
IKE, +-------->| EP |<--------+ ANCP, API, etc.
4-way handshake, +-----+
etc. .
.
.
v
Data traffic
Figure 1: PANA Functional Model
PANA Client (PaC):
The PaC is the client implementation of PANA. This entity resides
on the node that is requesting network access. PaCs can be end
hosts, such as laptops, PDAs, cell phones, desktop PCs, or routers
that are connected to a network via a wired or wireless interface.
A PaC is responsible for requesting network access and engaging in
the authentication process using PANA.
PANA Authentication Agent (PAA):
The PAA is the server implementation of PANA. A PAA is in charge
of interfacing with the PaCs for authenticating and authorizing
them for the network access service.
The PAA consults an authentication server in order to verify the
credentials and rights of a PaC. If the authentication server
resides on the same node as the PAA, an API is sufficient for this
interaction. When they are separated (a much more common case in
public access networks), a protocol needs to run between the two.
AAA protocols like RADIUS [<a href="./rfc2865" title=""Remote Authentication Dial In User Service (RADIUS)"">RFC2865</a>] and Diameter [<a href="./rfc3588" title=""Diameter Base Protocol"">RFC3588</a>] are
commonly used for this purpose.
<span class="grey">Jayaraman, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
The PAA is also responsible for updating the access control state
(i.e., filters) depending on the creation and deletion of the
authorization state. The PAA communicates the updated state to
the Enforcement Points (EPs) in the network. If the PAA and EP
are residing on the same node, an API is sufficient for this
communication. Otherwise, a protocol is required to carry the
authorized client attributes from the PAA to the EP.
The PAA resides on a node that is typically called a NAS (network
access server) in the access network. For example, on a BRAS
(Broadband Remote Access Server) [<a href="#ref-DSL" title=""DSL Forum TR-059 DSL Evolution - Architecture Requirements for the Support of QoS-Enabled IP Services"">DSL</a>] in DSL networks, or PDSN
(Packet Data Serving Node) [<a href="#ref-3GPP2" title=""cdma2000 Wireless IP Network Standard"">3GPP2</a>] in 3GPP2 networks. The PAA may
be one or more IP hops away from the PaCs.
Authentication Server (AS):
The server implementation that is in charge of verifying the
credentials of a PaC that is requesting the network access
service. The AS receives requests from the PAA on behalf of the
PaCs, and responds with the result of verification together with
the authorization parameters (e.g., allowed bandwidth, IP
configuration, etc). This is the server that terminates the EAP
and the EAP methods. The AS might be hosted on the same node as
the PAA, on a dedicated node on the access network, or on a
central server somewhere in the Internet.
Enforcement Point (EP):
The access control implementation that is in charge of allowing
access (data traffic) of authorized clients while preventing
access by others. An EP learns the attributes of the authorized
clients from the PAA.
The EP uses non-cryptographic or cryptographic filters to
selectively allow and discard data packets. These filters may be
applied at the link layer or the IP layer [<a href="#ref-PANA-IPSEC" title=""PANA Enabling IPsec based Access Control"">PANA-IPSEC</a>]. When
cryptographic access control is used, a secure association
protocol [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>] needs to run between the PaC and EP. After
completion of the secure association protocol, link- or network-
layer per-packet security (for example TKIP, IPsec ESP) is enabled
for integrity protection, data origin authentication, replay
protection, and optionally confidentiality protection.
An EP is located between the access network (the topology within
reach of any client) and the accessed network (the topology within
reach of only authorized clients). It must be located
strategically in a local area network to minimize the access of
unauthorized clients. It is recommended but not mandated that the
<span class="grey">Jayaraman, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
EP be on the path between the PaC and the PAA for the
aforementioned reason. For example, the EP can be hosted on the
switch that is directly connected to the clients in a wired
network. That way the EP can drop unauthorized packets before
they reach any other client node or nodes beyond the local area
network.
Some of the entities may be colocated depending on the deployment
scenario. For example, the PAA and EP would be on the same node
(BRAS) in DSL networks. In that case, a simple API is sufficient
between the PAA and EP. In small enterprise deployments, the PAA and
AS may be hosted on the same node (access router) that eliminates the
need for a protocol run between the two. The decision to colocate
these entities or otherwise, and their precise location in the
network topology, are deployment decisions that are out of the scope
of this document.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Call Flow</span>
Figure 2 illustrates the signaling flow for authorizing a client for
network access.
PaC EP PAA AS
| | | |
IP address ->| | | |
config. | PANA | | AAA |
|<------------------------------>|<-------------->|
| | Provisioning | |
(Optional) | |<-------------->| |
IP address ->| | | |
reconfig. | Sec.Assoc. | | |
|<------------->| | |
| | | |
| Data traffic | | |
|<-----------------> | |
| | | |
Figure 2: PANA Signaling Flow
The EP on the access network allows general data traffic from any
authorized PaC, whereas it allows only a limited type of traffic
(e.g., PANA, DHCP, router discovery, etc.) for the unauthorized PaCs.
This ensures that the newly attached clients have the minimum access
service to engage in PANA and get authorized for the unlimited
service.
The PaC dynamically or statically configures an IP address prior to
running PANA. After the successful PANA authentication, depending on
<span class="grey">Jayaraman, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
the deployment scenario, the PaC may need to re-configure its IP
address or configure additional IP address(es). For example, a
link-local IPv6 address may be used for PANA and the PaC may be
allowed to configure additional global IPv6 address(es) upon
successful authentication. Another example: A PaC may be limited to
using an IPv4 link-local address during PANA, and allowed to
reconfigure its interface with a non-link-local IPv4 address after
the authentication. General-purpose applications cannot use the
interface until PANA authentication succeeds and appropriate IP
address configuration takes place.
An initially unauthorized PaC starts PANA authentication by
discovering the PAA, followed by the EAP exchange over PANA. The PAA
interacts with the AS during this process. Upon receiving the
authentication and authorization result from the AS, the PAA informs
the PaC about the result of its network access request.
If the PaC is authorized to gain access to the network, the PAA also
sends the PaC-specific attributes (e.g., IP address, cryptographic
keys, etc.) to the EP by using another protocol. The EP uses this
information to alter its filters to allow data traffic from and to
the PaC to pass through.
In case cryptographic access control needs to be enabled after PANA
authentication, a secure association protocol runs between the PaC
and the EP. Dynamic parameters required for that protocol (e.g.,
endpoint identity, shared secret) are derived from successful PANA
authentication; these parameters are used to authenticate the PaC to
the EP and vice-versa as part of creating the security association.
For example, see [<a href="#ref-PANA-IPSEC" title=""PANA Enabling IPsec based Access Control"">PANA-IPSEC</a>] for how it is done for IKE [<a href="./rfc2409" title=""The Internet Key Exchange (IKE)"">RFC2409</a>]
[<a href="./rfc4306" title=""Internet Key Exchange (IKEv2) Protocol"">RFC4306</a>] based on using a key-generating EAP method for PANA between
the PaC and PAA. The secure association protocol exchange produces
the required security associations between the PaC and the EP to
enable cryptographic data traffic protection. Per-packet
cryptographic data traffic protection introduces additional per-
packet overhead but the overhead exists only between the PaC and EP
and will not affect communications beyond the EP.
Finally, filters that are installed at the EP allow general purpose
data traffic to flow between the PaC and the intranet/Internet.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Environments</span>
PANA can be used on any network environment whether there is a
lower-layer secure channel between the PaC and the EP prior to PANA,
or one has to be enabled upon successful PANA authentication.
<span class="grey">Jayaraman, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
With regard to network access authentication, two types of networks
need to be considered:
a. Networks where a secure channel is already available prior to
running PANA
This type of network is characterized by the existence of
protection against spoofing and eavesdropping. Nevertheless, user
authentication and authorization is required for network
connectivity.
a.1. One example is a DSL network where lower-layer security is
provided by a physical means. Physical protection of the
network wiring ensures that practically there is only one
client that can send and receive IP packets on the link.
a.2. Another example is a cdma2000 network where the lower-layer
security is provided by means of cryptographic protection.
By the time the client requests access to the network-layer
services, it is already authenticated and authorized for
accessing the radio channel, and link-layer ciphering is
enabled.
The presence of a secure channel before the PANA exchange
eliminates the need for executing a secure association protocol
after PANA. The PANA session can be associated with the
communication channel it was carried over. Also, the choice of
EAP authentication method depends on the presence of this security
while PANA is running.
b. Networks where a secure channel is created after running PANA
These are the networks where there is no lower-layer protection
prior to running PANA. Successful PANA authentication enables the
generation of cryptographic keys that are used with a secure
association protocol to enable per-packet cryptographic
protection.
PANA authentication is run on an insecure channel that is
vulnerable to eavesdropping and spoofing. The choice of EAP
method must be resilient to the possible attacks associated with
such an environment. Furthermore, the EAP method must be able to
create cryptographic keys that will later be used by the secure
association protocol.
<span class="grey">Jayaraman, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
Whether to use
b.1. link-layer per-packet security or
b.2. network-layer per-packet security
is a deployment decision and outside the scope of this document.
This decision also dictates the choice of the secure association
protocol. If link-layer protection is used, the protocol would be
link-layer specific. If IP-layer protection is used, the secure
association protocol would be IKE and the per-packet security
would be provided by IPsec AH/ESP regardless of the underlying
link-layer technology.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Security Considerations</span>
Security is discussed throughout this document. For protocol-
specific security considerations, refer to [<a href="./rfc4016" title=""Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements"">RFC4016</a>] and [<a href="./rfc5191" title=""Protocol for Carrying Authentication for Network Access (PANA)"">RFC5191</a>].
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Acknowledgments</span>
We would like to thank Bernard Aboba, Yacine El Mghazli, Randy
Turner, Hannes Tschofenig, Lionel Morand, Mark Townsley, Jari Arkko,
Pekka Savola, Tom Yu, Joel Halpern, Lakshminath Dondeti, David Black,
and IEEE 802.11 Working Group for their valuable comments.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. References</span>
<span class="h3"><a class="selflink" id="section-7.1" href="#section-7.1">7.1</a>. Normative References</span>
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC3748">RFC3748</a>] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
H. Levkowetz, Ed., "Extensible Authentication Protocol
(EAP)", <a href="./rfc3748">RFC 3748</a>, June 2004.
[<a id="ref-RFC2409">RFC2409</a>] Harkins, D. and D. Carrel, "The Internet Key Exchange
(IKE)", <a href="./rfc2409">RFC 2409</a>, November 1998.
[<a id="ref-RFC4306">RFC4306</a>] Kaufman, C., Ed., "Internet Key Exchange (IKEv2)
Protocol", <a href="./rfc4306">RFC 4306</a>, December 2005.
[<a id="ref-RFC4058">RFC4058</a>] Yegin, A., Ed., Ohba, Y., Penno, R., Tsirtsis, G., and
C. Wang, "Protocol for Carrying Authentication for
Network Access (PANA) Requirements", <a href="./rfc4058">RFC 4058</a>, May 2005.
<span class="grey">Jayaraman, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
[<a id="ref-RFC5191">RFC5191</a>] Forsberg, D., Ohba, Y., Ed., Patil, B., Tschofenig, H.,
and A. Yegin, "Protocol for Carrying Authentication for
Network Access (PANA)", <a href="./rfc5191">RFC 5191</a>, May 2008.
[<a id="ref-DSL">DSL</a>] DSL Forum Architecture and Transport Working Group, "DSL
Forum TR-059 DSL Evolution - Architecture Requirements
for the Support of QoS-Enabled IP Services", September
2003.
<span class="h3"><a class="selflink" id="section-7.2" href="#section-7.2">7.2</a>. Informative References</span>
[<a id="ref-RFC2865">RFC2865</a>] Rigney, C., Willens, S., Rubens, A., and W. Simpson,
"Remote Authentication Dial In User Service (RADIUS)",
<a href="./rfc2865">RFC 2865</a>, June 2000.
[<a id="ref-RFC3588">RFC3588</a>] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J.
Arkko, "Diameter Base Protocol", <a href="./rfc3588">RFC 3588</a>, September
2003.
[<a id="ref-RFC4016">RFC4016</a>] Parthasarathy, M., "Protocol for Carrying Authentication
and Network Access (PANA) Threat Analysis and Security
Requirements", <a href="./rfc4016">RFC 4016</a>, March 2005.
[<a id="ref-ANCP-PROTO">ANCP-PROTO</a>] Wadhwa, S., Moisand, J., Subramanian, S., Haag, T., and
N. Voigt, "Protocol for Access Node Control Mechanism in
Broadband Networks", Work in Progress, November 2007.
[<a id="ref-PANA-IPSEC">PANA-IPSEC</a>] Parthasarathy, M., "PANA Enabling IPsec based Access
Control", Work in Progress, July 2005.
[<a id="ref-3GPP2">3GPP2</a>] 3rd Generation Partnership Project 2, "cdma2000 Wireless
IP Network Standard", 3GPP2 P.S0001-B/v2.0, September
2004.
<span class="grey">Jayaraman, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
Authors' Addresses
Prakash Jayaraman
Network Equipment Technologies, Inc.
6900 Paseo Padre Parkway
Fremont, CA 94555
USA
Phone: +1 510 574 2305
EMail: prakash_jayaraman@net.com
Rafa Marin Lopez
University of Murcia
30100 Murcia
Spain
Phone: +34 968 398 501
EMail: rafa@um.es
Yoshihiro Ohba
Toshiba America Research, Inc.
1 Telcordia Drive
Piscateway, NJ 08854
USA
Phone: +1 732 699 5305
EMail: yohba@tari.toshiba.com
Mohan Parthasarathy
Nokia
313 Fairchild Drive
Mountain View, CA 94043
USA
Phone: +1 408 734 8820
EMail: mohanp@sbcglobal.net
Alper E. Yegin
Samsung
Istanbul,
Turkey
EMail: a.yegin@partner.samsung.com
<span class="grey">Jayaraman, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc5193">RFC 5193</a> PANA Framework May 2008</span>
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Jayaraman, et al. Informational [Page 11]
</pre>
|