Sipping D. Worley Internet-Draft Pingtel Expires: April 8, 2006 October 5, 2005 Call Pickup draft-worley-sipping-pickup-00 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on April 8, 2006. Copyright Notice Copyright (C) The Internet Society (2005). Abstract This document walks through various examples and call flows for implementing "call pickup" operations in SIP telephony. It focuses on distributing as much processing in the user agents in accordance with the philosophy of end-point controlled call-control (EPCC). Worley Expires April 8, 2006 [Page 1] Internet-Draft Call Pickup October 2005 1. Introduction There are several different schemes for implementing call pick-up. The basic method is the one specified in the Sylantro "SIP-B" specification, which despite its proprietary air, uses standard SIP features in an end-point call control (EPCC) style. All other methods are variations on the same theme, usually by using an agent process (in a proxy or communications server) to provide a feature that the user agents are lacking. Almost all the software development effort to support call pick-up is in implementing these agent processes, so we can easily see the trade-off between development effort and which features must be provided by the user agents. Like call transfer, having call pick-up work requires some support from the caller's end. These caller-end features will, therefore, soon come to be considered necessary for any "quality" SIP implementation. Worley Expires April 8, 2006 [Page 2] Internet-Draft Call Pickup October 2005 2. Basic call flow The SIP-B pick-up mechanism is implemented in the user agents. Thus, it requires a more sophisticated user agent to executing the pickup. It also depends on the callee phone producing dialog events, or there being a state agent doing so on its behalf. The basic SIP-B pick-up sequences is as follows. (Only principal messages are shown.) Suppose the incoming call is to the callee phone, extension 123, and the phone executing the pickup is extension 456: Caller Callee Executing 123 456 | | | | 1 INVITE | | |---------------------->| | | | | | | | 2 Call Pickup | | | on 123 | | | | | 3 SUBSCRIBE | | |<------------------| | | | | | 4 NOTIFY | | |------------------>| | | | | 5 INVITE/Replaces | | |<------------------------------------------| | | | | 6 CANCEL | | |---------------------->| | | | | | 7 200 OK | | |------------------------------------------>| | | | | | | Figure 1 1. The caller (AOR Caller@example.com) sends an INVITE with URI 123@example.com to phone 123. 2. The user of phone 456 activates the call pickup feature for extension 123. Worley Expires April 8, 2006 [Page 3] Internet-Draft Call Pickup October 2005 3. Phone 456 sends a SUBSCRIBE with URI 123@example.com to phone 123, requesting "Event: dialog" and "Expires: 0". 4. Phone 123 sends one NOTIFY to phone 456 giving the status of its current dialogs for AOR 123@example.com, which includes the early dialog of INVITE 1 from Caller, and gives the "remote identity" and "remote target" of the dialog (which are the From: and Contact: of INVITE 1), one of which is "Caller@example.com". 5. Phone 456 sends INVITE 5 to Caller@example.com. It has a Replaces: header specifying the dialog parameters sent in the NOTIFY. 6. The caller sends a CANCEL of its INVITE 1 to phone 123. 7. The caller sends a 200 response to the INVITE 5 from phone 456. At this point, Caller is talking to phone 456. Worley Expires April 8, 2006 [Page 4] Internet-Draft Call Pickup October 2005 3. Detailed call flow A complete packet diagram of a SIP-B pickup sequence is as follows. (100 responses are present only if the transport is UDP, and are omitted on this diagram..) Messages in the same transaction are labeled with the same number but successive letters, e.g., 7a, 7b, 7c. Worley Expires April 8, 2006 [Page 5] Internet-Draft Call Pickup October 2005 Caller Target Executing 123 456 | | | | 1a INVITE | | |----------------------->| | | | | | 1b 180 Ringing | | |<-----------------------| | | | | | | | 2a Call Pickup | | | on 123 | | | | | 3a SUBSCRIBE | | |<-------------------| | | | | | 3b 200 OK | | |------------------->| | | | | | 4a NOTIFY | | |------------------->| | | | | | 4b 200 OK | | |<-------------------| | | | | 5a INVITE/Replaces | | |<--------------------------------------------| | | | | 5b 200 OK | | |-------------------------------------------->| | | | | 5c ACK | | |<--------------------------------------------| | | | | 1c CANCEL | | |----------------------->| | | | | | 1d 200 OK | | |<-----------------------| | | | | | 1d 487 Request Term. | | |<-----------------------| | | | | | 1e ACK | | |----------------------->| | | | | | | | Worley Expires April 8, 2006 [Page 6] Internet-Draft Call Pickup October 2005 Figure 2 1. The caller (AOR Caller@example.com) sends an INVITE 1a with URI 123@example.com to phone 123. 2. The user of phone 456 activates the call pickup feature for extension 123. This may be activated by a special button on the phone, or through a dialing prefix which is intercepted by the phone. 3. 4. Phone 456 sends a SUBSCRIBE 3a with URI 123@example.com to extension 123, requesting "Event: dialog" and "Expires: 0". This SUBSCRIBE requests one NOTIFY containing the status of all dialogs involving AOR 123@example.com. 5. Note: This requires that the other phones in the installation can produce dialog event notifications. We discuss below using a state agent to support phones that cannot produce dialog event notifications. 6. Note: Since dialog event notifications can contain sensitive information, the ability to SUBSCRIBE to them should be controlled by authentication. This will be discussed below. 7. Phone 123 sends one NOTIFY 4a to phone 456 giving the status of its current dialogs for AOR 123@example.com, which includes the early dialog of INVITE 1a from Caller, and gives the "remote identity" and/or "remote target" of the dialog (which are the From: and Contact: of INVITE 1a), which is "Caller@example.com". 8. 9. Phone 456 sends to Caller@example.com an INVITE 5a. It has a Replaces: header specifying the dialog parameters sent in NOTIFY 4a. Its URI is the remote target address, and its has a Replaces: header specifying the dialog parameters sent in the NOTIFY. 10. Note: Which does the phone use, the "remote identity" or "remote target" URI? Will different phones do this differently? This places constraints on INVITES that Caller's phone generates. 11. Note: This requires that the Contact: and/or To: sent by Caller's UA is a globally routable URI. However, it is (mostly) OK if the URI forks, as long as at least one fork reached Caller's UA -- the Replaces: header insures that INVITE 5a will Worley Expires April 8, 2006 [Page 7] Internet-Draft Call Pickup October 2005 be rejected by any other UA. Ideally, Caller should be generating GRUUs for its Contact: header and proper AORs for its From: header, but the first is more important. 12. The caller sends a CANCEL 1c of its INVITE 1a to phone 123. 13. The caller sends a 200 response to the INVITE 5a from phone 456. At this point, Caller is talking to phone 456. Worley Expires April 8, 2006 [Page 8] Internet-Draft Call Pickup October 2005 4. Call pickup with proxy Now let us consider call pickup when the organization has a proxy for routing calls. Caller Proxy Target Executing 123 456 | | | | | 1a INVITE | | | |-------------------->| | | | | 1b INVITE | | | |--------------->| | | | 1c 180 Ring. | | | |<---------------| | | 1d 180 Ringing | | | |<--------------------| | | | | | | | | | | 2a Call | | | | Pickup | | | | on 123 | | | | | | | 3a SUBSCRIBE | | |<---------------------------------| | | 3b SUBSCRIBE | | | |--------------->| | | | 3c OK | | | |<---------------| | | | | 3d 200 OK | | |--------------------------------->| | | | | | | | 4a NOTIFY | | | |---------------->| | | | 4b 200 OK | | | |<----------------| | | | | | 5a INVITE/Replaces | | | |<-------------------------------------------------------| | 5b 200 OK | | | |------------------------------------------------------->| | 5c ACK | | | |<-------------------------------------------------------| | | | | | 1e CANCEL | | | |-------------------->| | | | | 1f CANCEL | | | |--------------->| | | | 1g 200 OK | | Worley Expires April 8, 2006 [Page 9] Internet-Draft Call Pickup October 2005 | |<---------------| | | 1h 200 OK | | | |<--------------------| | | | | 1i 487 Req.T | | | |<---------------| | | 1j 487 Req. Term. | | | |<--------------------| | | | 1k ACK | | | |-------------------->| | | | | 1l ACK | | | |--------------->| | | | | | | | | | Figure 3 The major differences in processing are: 1. INVITE 1a and later messages in its transaction go through the proxy, thus allowing the proxy to convert 123@example.com to a series of contact points. 3. SUBSCRIBE 3a also goes through the proxy, so it is also sent to a series of contact points. The proxy should fork the SUBSCRIBE in the same way as it would fork an INVITE, except that it should fork all the contact points in parallel, even if they would fork serially for INVITEs, so phone 456 cab find its target call quickly. As SUBSCRIBE 3a is forked, its request URI is changed from the AOR 123@example.com to various contact URIs, usually the same user name with domain names that are the IP addresses of the phone user agents. This will match the request URIs of the INVITEs 1b, so information about those dialogs will be reported in NOTIFYs. 4. N.B.: Because SUBSCRIBE 3a can be forked, phone 456 should be prepared to receive multiple NOTIFYs from various phones for AOR 123, and be able to select the correct dialog if it discovers more than one. N.B.: Phone 456 should beware that it may see multiple instances of a single forked INVITE (which have the same Call-Id), and not present them to the user as alternatives. N.B.: Phone 456 should beware that one AOR might be forwarded to a URI with a different user name. E.g., "123@example.com" might fork first to an user agent on 123's desk ("123@10.1.200.12") and then to a back-up responder ("789@example.com"). However, a UA that receives SUBSCRIBE 3a will see the same request URI as it saw when it received Worley Expires April 8, 2006 [Page 10] Internet-Draft Call Pickup October 2005 INVITE 1a, and thus will include any dialog it creates in its subsequent NOTIFY 4a. But it may include dialogs that were originally sent to other AORs as well. Unfortunately, there is no clean way to distinguish the dialogs that were originally for 123, as the best approximation is the "local identity" (i.e., "To:" URI), but that may have been an address that forwards to 123. In the end, we don't want to forward one use name to another, so as to avoid this ambiguity. 5. The INVITE/Replaces 5a may be forwarded through the proxy as well. Doing so makes no essential difference to the operation. Worley Expires April 8, 2006 [Page 11] Internet-Draft Call Pickup October 2005 5. Call pickup with proxy and state agent This case is when the phones themselves cannot generate dialog event notices, so that work is delegated to a state agent which receives information from the site's proxy. Caller Proxy State Target Executing Agent 123 456 | | | | | | 1a INVITE | | | | |--------------->| | | | | | 1b INVITE | | | | |-------------------------->| | | | 1c 180 Ring. | | | | |<--------------------------| | | 1d 180 Ringing | | | | |----------------| | | | | | | | | | | State Info. | | | | |++++++++++++++>| | | | | | | | | | | | | 2a | | | | | Call | | | | | Pickup | | | | | on 123 | | | | | | | | | 3a SUBSCRIBE | | |<-----------------------------------------| | | 3b SUBSCRIBE | | | | |-------------->| | | | | 3c OK | | | | |<--------------| | | | | | | 3d 200 OK | | |---------------|------------------------->| | | | | | | | | 4a NOTIFY | | | | |------------------------->| | | | 4b 200 OK | | | | |<-------------------------| | | | | | | | | | | [Remainder of operation is as before.] Figure 4 The major differences in processing are: Worley Expires April 8, 2006 [Page 12] Internet-Draft Call Pickup October 2005 1. The proxy monitors the progress of dialogs and reports state information via a possibly non-SIP channel to the state agent. Since the state agent needs to report only early dialog information, one possible channel is to do a non-blocking fork of every call to 123 to the state agent. (This is a trick that Scott invented.) However, if the state agent will be used to support applications that require knowledge of committed dialogs (e.g., attendant consoles), this technique alone will not be sufficient. 3. The proxy routes SUBSCRIBE 3a not to phone 123 but rather to the state agent. The state agent uses the request URI or the From: URI to determine the user on whose behalf it should generate events. N.B. Since a SIP call can be maintained indefinitely without any signaling, it is possible for the state agent to miss the termination of a call and believe that the call is continuing forever. There needs to be a way to clear such state. Early dialog state can be cleared due to the global time limit on INVITE transactions, but committed dialogs have no intrinsic time limit. One way to be able to reset the state agent would be to have a special class of URIs, and an incoming call for such a URI would clear all dialogs for a corresponding user URI. (Or any dialogs that had not had signaling activity for some time.) In the product, it would probably be required to provide a Web UI as well. Worley Expires April 8, 2006 [Page 13] Internet-Draft Call Pickup October 2005 6. Call pickup with a pickup agent A further case allows calls to be picked up by phones that do not support SIP-B pickup. Essentially, the phone makes a call that is routed to a "pickup agent" which executes the SIP-B pickup process on the phone's behalf. Caller Target pickup Executing 123 Agent 456 | | | | | 1a INVITE | | | |------------------>| | | | 1b 180 Ringing | | | |<------------------| | | | | | | | | | | 2a Dials | | | | *78123 | | | | | | | 3a INVITE | | | |<--------------| | | | | | | 4a SUBSCRIBE | | | |<----------------| | | | 4b 200 OK | | | |---------------->| | | | | | | | 5a NOTIFY | | | |---------------->| | | | 5b OK | | | |<----------------| | | | | | | 3b INVITE/Replaces | | |<------------------------------------| | | 3c 200 OK | | | |------------------------------------>| | | | | 3d 200 OK | | | |-------------->| | 3e ACK | | | |<----------------------------------------------------| | | | | | | | | [Remainder of operation is as before.] Figure 5 The major differences in processing are: Worley Expires April 8, 2006 [Page 14] Internet-Draft Call Pickup October 2005 3. Because the dialed number starts with the pickup prefix "*78", the call is routed (either by a phone dialplan or an outgoing call proxy) to the pickup agent. 4 and 5. The pickup agent executes the same sequence of actions as a SIP-B phone would. 3b. After determining the Caller's URI, the pickup agent appends a Replaces: header to the INVITE and forwards it as if it was proxying the call. Note that if the target phone is represented by a state agent, then the pickup agent and the state agent could communicate by non-SIP means rather than using SUBSCRIBE and NOTIFY. N.B.: There must be a mean for configuring the pickup prefix and arranging for forwarding of those calls to the pickup agent. Worley Expires April 8, 2006 [Page 15] Internet-Draft Call Pickup October 2005 7. With improved pickup agent The previous packet flow is suboptimal in that the pickup agent acts as a non-standard proxy, rewriting an INVITE into an INVITE with Replaces: header. We can adopt a technique from Dan's Park Service document to be strictly conformant: Worley Expires April 8, 2006 [Page 16] Internet-Draft Call Pickup October 2005 Caller Target Pickup Executing 123 Agent 456 | | | | | 1a INVITE | | | |-------------------->| | | | 1b 180 Ringing | | | |<--------------------| | | | | | | | | | | 2a Dials | | | | *78123 | | | | | | | 3a INVITE | | | |<--------------| | | | | | | 4a SUBSCRIBE | | | |<---------------| | | | 4b 200 OK | | | |--------------->| | | | | | | | 5a NOTIFY | | | |--------------->| | | | 5b OK | | | |<---------------| | | | | | | | | 3b 302 | | | | ...?Replace | | | |-------------->| | | | | | 4a INVITE/Replaces | | | |<-----------------------------------------------------| | 4b 200 OK | | | |----------------------------------------------------->| | 4c ACK | | | |<-----------------------------------------------------| | | | | | | | | [Remainder of operation is as before.] Figure 6 The major differences in processing are: 3. Instead of forwarding the INVITE to the Caller, the pickup agent returns a 302 response, whose Contact is a URI for the Caller with the Replaces header specifying dialog 1a. Phone 456 then sends INVITE/Replaces 4a to Caller. Worley Expires April 8, 2006 [Page 17] Internet-Draft Call Pickup October 2005 7.1. With proxy and improved pickup agent Let's combine some of the above flows to show a realistic case, where all signaling goes through the proxy, and we use the "improved" pickup agent to support a phone that does not do call pickup by itself. (I've simplified the diagram by conflating all components of the comm. server. Since the auth proxy keeps iself in the signaling path, all messages go through it. And the pickup agent is implemented as part of the registrar.) Caller Proxy Target Pickup Executing 123 Agent 456 | | | | | | 1a INVITE | | | | |--------------->| | | | | | 1b INVITE | | | | |----------->| | | | | 1c 180 Rin.| | | | |<-----------| | | | 1d 180 Ringing | | | | |<---------------| | | | | | | | | | | | | | 2a | | | | | Dials | | | | | *78123 | | | | | | | | | 3a INVITE | | |<----------------------------------------| | | 3b INVITE | | | | |-------------------------->| | | | | | | | | | 4a SUBSCRIBE | | | |<--------------------------| | | | 4b SUBSC. | | | | |----------->| | | | | 4c 200 OK | | | | |<-----------| | | | | | 4d 200 OK | | | |-------------------------->| | | | | | | | | 5a NOTIFY | | | | |<-----------| | | | | 5b NOTIFY | | | | |-------------------------->| | | | | 5c 200 OK | | | |<--------------------------| | Worley Expires April 8, 2006 [Page 18] Internet-Draft Call Pickup October 2005 | | 5d 200 OK | | | | |----------->| | | | | | | | | | 3c Mov.Temp. Caller?Replaces=xxx | | |<--------------------------| | | | | | | | 6a INVITE/Repl.| | | | |<---------------| | | | | 6b 200 OK | | | | |--------------->| | | | | | 6c 200 OK | | | | |---------------------------------------->| | | 6d ACK | | | | |<----------------------------------------| | 6e ACK | | | | |<---------------| | | | | | | | | | 1e CANCEL | | | | |--------------->| | | | | 1f 200 OK | | | | |<---------------| | | | | | 1g CANCEL | | | | |-------------------------->| | | | 1h 200 OK | | | | |<--------------------------| | | | | 1i 487 Req.T.| | | |<--------------------------| | | 1j 487 Req. Term | | | |<---------------| | | | | 1k ACK | | | | |--------------->| | | | | | | 1l ACK | | | |-------------------------->| | | | | | | | | | | | Figure 7 The overall call flow is: 1. Caller sends invite to the target (123). 2. Executing phone (456) dials *78123. 3. By the normal mechanisms, the INVITE is routed to the registrar. 4. In the registrar, the pickup agent recognizes the dialing prefix *78 and puts the transaction aside for a moment. It initiates a Worley Expires April 8, 2006 [Page 19] Internet-Draft Call Pickup October 2005 SUBSCRIBE with "Expires:0" (one-time) to 123. 5. The target sends a NOTIFY back to the pickup agent. The pickup agent selects this dialog to be picked up, and returns a 302 for INVITE 3b to the proxy. The 302 contains "Contact: ". 6. The proxy starts another fork of INVITE 3a, sending an INVITE with Replaces header to the Caller. This INVITE is accepted, replacing the dialog initiated by INVITE 1a. Caller then sends CANCEL for INVITE 1a, leading to 200 OK responses for the CANCEL and 487 responses for the INVITE, as well as ACKs for the 487 responses. 7.2. Group call pickup There are three kinds of group call pickup: 7.2.1. Picking up any call to any member of a group of individuals This is a pickup directed to "any call to any of the people in my group", that is, being able to pick up a call without having to first determine the specific extension to which it was directed. If the proxy is configured to provide a URI that forwards to all members of the group, a SUBSCRIBE to that URI will be forwarded to all of the relevent user agents. However, no incoming call contains the group URI as part of its dialog identifiaction, so it becomes questionable how the executing phone determines that it can pickup the call. Because the dialog event package does not contain any sort of "start time", there seems to be no clean way to implement the common convention that a pickup that has several possible targets should pick up the call that has been waiting longest. 7.2.2. Picking up a call routed to several individuals In terms of the old key phone systems, this situation is like an extension number that rings on several people's multi-line phones. This can be handled without additional work, because the proxy will already be routing this URI to all of the individuals' user agents, and so it will route a SUBSCRIBE to that URI to all of the user agents as well, ensuring that the executing phone will see information about the incoming call. Worley Expires April 8, 2006 [Page 20] Internet-Draft Call Pickup October 2005 7.2.3. Picking up a call that is not routed to a specific user agent This is the situation of a call when the caller dials a number that is not immediately routed to any particular phone, but rather "rings in limbo" until someone picks it up. Call pickup from this sort of "calling group" is very similar to call pickup from a phone or individual line. We need to provide an intangible user agent for the call to be forked to, and to generate ringing for the desired length of time. (The proxy can terminate ringing, but a UA is needed to generate the 180 Ringing message.) 7.3. Pickup from call park Picking up parked calls is similar to call pickup, assuming that call parking is implemented as a call forward to an intangible UA representing the "parking orbit". The crucial difference is that the dialog being picked up is committed, so the basic sequence needs to be modified in that the INVITE/Replaces is not marked "early-only". This difference needs to be implemented at the executing phone or the pickup agent. 7.4. Call park Call parking is very much like call pickup. To park a call, the phone transfers it to an extension that is maintained by the "park server". The park server is a multi-line software UA that accepts and maintains dialogs to a set of extensions that are defined as "parking orbits". To retrieve a parked call, a phone executes a call pickup operation, except that the parameters of the Replaces header do not include the "early-only" operation, so that the confirmed dialog with the park server can be retrieved. When call pickup and call retrieve are implemented by a pickup agent, the pickup agent is the only component that needs to distinguish the parking orbits and generate the Replaces header specification in its 302 response differently. Worley Expires April 8, 2006 [Page 21] Internet-Draft Call Pickup October 2005 8. Proxying considerations Some of these operations require a considerable number of intangible UAs. (That is, UAs with minimal functionality and no user interface.) It would probably be best if these were implemented not by a series of URIs, but rather one URI specifying a class of intangible UAs with a parameter selecting the individual UA. Some of these operations depend rather sensitively on how URIs are rewritten as a call is forwarded to its various contact points. In general, it is best if "user" part of the URI remains unchanged so that a phone doing a pickup can distinguish which dialogs are possible targets for the pickup. My impression is that this is normally the case. To support this if several extension numbers have the same user agent as a contact point, the user agent accepts INVITEs regardless of the user part of the request URI, and the user agent is configured to register itself as a contact point for each of the configured extension numbers. However, this makes it difficult to set up a forwarding rule that means "if a call to 123 is now answered, fall back to 789". (And only by programming this as a forwarding rule can we implement the behavior "after 3 rings, transfer to...") Assuming that this rule is not to be specifically programmed for the user agents that are contact points for 789, the only way to implement it is to map "123@example.com" to "789@example.com", which loses the original user name. To add complexity, if a call comes in to 123 and then gets forwarded to 789, we want "pickup on 789" to retrieve that call, as well as "pickup on 123". Getting this right may require some tweaks to the SIP-B call pickup algorithm. And note that these aspects of the SIP-B algorithm are not well-defined in the documents. Worley Expires April 8, 2006 [Page 22] Internet-Draft Call Pickup October 2005 9. Security considerations All of these mechanisms (with the exception of using an integrated state agent and pickup agent) depend on SUBSCRIBE/NOTIFY for the dialog event package. But SUBSCRIBE reveals information which could be sensitive -- we have just shown that anyone who can successfully SUBSCRIBE for an extension can take calls from that extension! Thus, we need to ensure that the acceptance of SUBSCRIBEs is controlled by suitable security mechanisms. Fortunately, each user agent is already provided with credentials, which it uses to register with the proxy. We can use the same realm to authenticate SUBSCRIBE requests. But we cannot require each user agent to recognize the credentials of every other user agent. It would seem sensible to have all user agents configured with one set of known requester credentials which are held by the proxy, and have the proxy substitute its credentials for the user agent's credentials when it is forwarding a SUBSCRIBE request from one user agent to another. (How do existing user agents authenticate SUBSCRIBE requests?) 10. References [1] Salzer, J., Reed, D., and D. Clark, "End-to-End Arguments in System Design", November 1984. Worley Expires April 8, 2006 [Page 23] Internet-Draft Call Pickup October 2005 Author's Address Dale R. Worley Pingtel Corp. Worley Expires April 8, 2006 [Page 24] Internet-Draft Call Pickup October 2005 Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society. Worley Expires April 8, 2006 [Page 25]