source: branches/samba-3.5.x/source4/ldap_server/devdocs/rfc3296.txt

Last change on this file was 414, checked in by Herwig Bauernfeind, 15 years ago

Samba 3.5.0: Initial import

File size: 26.7 KB
Line 
1
2
3
4
5
6
7Network Working Group K. Zeilenga
8Request for Comments: 3296 OpenLDAP Foundation
9Category: Standards Track July 2002
10
11
12 Named Subordinate References in
13 Lightweight Directory Access Protocol (LDAP) Directories
14
15Status of this Memo
16
17 This document specifies an Internet standards track protocol for the
18 Internet community, and requests discussion and suggestions for
19 improvements. Please refer to the current edition of the "Internet
20 Official Protocol Standards" (STD 1) for the standardization state
21 and status of this protocol. Distribution of this memo is unlimited.
22
23Copyright Notice
24
25 Copyright (C) The Internet Society (2002). All Rights Reserved.
26
27Abstract
28
29 This document details schema and protocol elements for representing
30 and managing named subordinate references in Lightweight Directory
31 Access Protocol (LDAP) Directories.
32
33Conventions
34
35 Schema definitions are provided using LDAPv3 description formats
36 [RFC2252]. Definitions provided here are formatted (line wrapped)
37 for readability.
38
39 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
40 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" used in
41 this document are to be interpreted as described in BCP 14 [RFC2119].
42
431. Background and Intended Usage
44
45 The broadening of interest in LDAP (Lightweight Directory Access
46 Protocol) [RFC2251] directories beyond their use as front ends to
47 X.500 [X.500] directories has created a need to represent knowledge
48 information in a more general way. Knowledge information is
49 information about one or more servers maintained in another server,
50 used to link servers and services together.
51
52 This document details schema and protocol elements for representing
53 and manipulating named subordinate references in LDAP directories. A
54 referral object is used to hold subordinate reference information in
55
56
57
58Zeilenga Standards Track [Page 1]
59
60
61RFC 3296 Named Subordinate References in LDAP Directories July 2002
62
63
64 the directory. These referral objects hold one or more URIs
65 [RFC2396] contained in values of the ref attribute type and are used
66 to generate protocol referrals and continuations.
67
68 A control, ManageDsaIT, is defined to allow manipulation of referral
69 and other special objects as normal objects. As the name of control
70 implies, it is intended to be analogous to the ManageDsaIT service
71 option described in X.511(97) [X.511].
72
73 Other forms of knowledge information are not detailed by this
74 document. These forms may be described in subsequent documents.
75
76 This document details subordinate referral processing requirements
77 for servers. This document does not describe protocol syntax and
78 semantics. This is detailed in RFC 2251 [RFC2251].
79
80 This document does not detail use of subordinate knowledge references
81 to support replicated environments nor distributed operations (e.g.,
82 chaining of operations from one server to other servers).
83
842. Schema
85
862.1. The referral Object Class
87
88 A referral object is a directory entry whose structural object class
89 is (or is derived from) the referral object class.
90
91 ( 2.16.840.1.113730.3.2.6
92 NAME 'referral'
93 DESC 'named subordinate reference object'
94 STRUCTURAL
95 MUST ref )
96
97 The referral object class is a structural object class used to
98 represent a subordinate reference in the directory. The referral
99 object class SHOULD be used in conjunction with the extensibleObject
100 object class to support the naming attributes used in the entry's
101 Distinguished Name (DN) [RFC2253].
102
103 Referral objects are normally instantiated at DSEs immediately
104 subordinate to object entries within a naming context held by the
105 DSA. Referral objects are analogous to X.500 subordinate knowledge
106 (subr) DSEs [X.501].
107
108
109
110
111
112
113
114
115Zeilenga Standards Track [Page 2]
116
117
118RFC 3296 Named Subordinate References in LDAP Directories July 2002
119
120
121 In the presence of a ManageDsaIT control, referral objects are
122 treated as normal entries as described in section 3. Note that the
123 ref attribute is operational and will only be returned in a search
124 entry response when requested.
125
126 In the absence of a ManageDsaIT control, the content of referral
127 objects are used to construct referrals and search references as
128 described in Section 4 and, as such, the referral entries are not
129 themselves visible to clients.
130
1312.2 The ref Attribute Type
132
133 ( 2.16.840.1.113730.3.1.34
134 NAME 'ref'
135 DESC 'named reference - a labeledURI'
136 EQUALITY caseExactMatch
137 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
138 USAGE distributedOperation )
139
140 The ref attribute type has directoryString syntax and is case
141 sensitive. The ref attribute is multi-valued. Values placed in the
142 attribute MUST conform to the specification given for the labeledURI
143 attribute [RFC2079]. The labeledURI specification defines a format
144 that is a URI, optionally followed by whitespace and a label. This
145 document does not make use of the label portion of the syntax.
146 Future documents MAY enable new functionality by imposing additional
147 structure on the label portion of the syntax as it appears in the ref
148 attribute.
149
150 If the URI contained in a ref attribute value refers to a LDAP
151 [RFC2251] server, it MUST be in the form of a LDAP URL [RFC2255].
152 The LDAP URL SHOULD NOT contain an explicit scope specifier, filter,
153 attribute description list, or any extensions. The LDAP URL SHOULD
154 contain a non-empty DN. The handling of LDAP URLs with absent or
155 empty DN parts or with explicit scope specifier is not defined by
156 this specification.
157
158 Other URI schemes MAY be used so long as all operations returning
159 referrals based upon the value could be performed. This document
160 does not detail use of non-LDAP URIs. This is left to future
161 specifications.
162
163 The referential integrity of the URI SHOULD NOT be validated by the
164 server holding or returning the URI (whether as a value of the
165 attribute or as part of a referral result or search reference
166 response).
167
168
169
170
171
172Zeilenga Standards Track [Page 3]
173
174
175RFC 3296 Named Subordinate References in LDAP Directories July 2002
176
177
178 When returning a referral result or search continuation, the server
179 MUST NOT return the separator or label portions of the attribute
180 values as part of the reference. When the attribute contains
181 multiple values, the URI part of each value is used to construct the
182 referral result or search continuation.
183
184 The ref attribute values SHOULD NOT be used as a relative name-
185 component of an entry's DN [RFC2253].
186
187 This document uses the ref attribute in conjunction with the referral
188 object class to represent subordinate references. The ref attribute
189 may be used for other purposes as defined by other documents.
190
1913. The ManageDsaIT Control
192
193 The client may provide the ManageDsaIT control with an operation to
194 indicate that the operation is intended to manage objects within the
195 DSA (server) Information Tree. The control causes Directory-specific
196 entries (DSEs), regardless of type, to be treated as normal entries
197 allowing clients to interrogate and update these entries using LDAP
198 operations.
199
200 A client MAY specify the following control when issuing an add,
201 compare, delete, modify, modifyDN, search request or an extended
202 operation for which the control is defined.
203
204 The control type is 2.16.840.1.113730.3.4.2. The control criticality
205 may be TRUE or, if FALSE, absent. The control value is absent.
206
207 When the control is present in the request, the server SHALL NOT
208 generate a referral or continuation reference based upon information
209 held in referral objects and instead SHALL treat the referral object
210 as a normal entry. The server, however, is still free to return
211 referrals for other reasons. When not present, referral objects
212 SHALL be handled as described above.
213
214 The control MAY cause other objects to be treated as normal entries
215 as defined by subsequent documents.
216
2174. Named Subordinate References
218
219 A named subordinate reference is constructed by instantiating a
220 referral object in the referencing server with ref attribute values
221 which point to the corresponding subtree maintained in the referenced
222 server. In general, the name of the referral object is the same as
223 the referenced object and this referenced object is a context prefix
224 [X.501].
225
226
227
228
229Zeilenga Standards Track [Page 4]
230
231
232RFC 3296 Named Subordinate References in LDAP Directories July 2002
233
234
235 That is, if server A holds "DC=example,DC=net" and server B holds
236 "DC=sub,DC=example,DC=net", server A may contain a referral object
237 named "DC=sub,DC=example,DC=net" which contains a ref attribute with
238 value of "ldap://B/DC=sub,DC=example,DC=net".
239
240 dn: DC=sub,DC=example,DC=net
241 dc: sub
242 ref: ldap://B/DC=sub,DC=example,DC=net
243 objectClass: referral
244 objectClass: extensibleObject
245
246 Typically the DN of the referral object and the DN of the object in
247 the referenced server are the same.
248
249 If the ref attribute has multiple values, all the DNs contained
250 within the LDAP URLs SHOULD be equivalent. Administrators SHOULD
251 avoid configuring naming loops using referrals.
252
253 Named references MUST be treated as normal entries if the request
254 includes the ManageDsaIT control as described in section 3.
255
2565. Scenarios
257
258 The following sections contain specifications of how referral objects
259 should be used in different scenarios followed by examples that
260 illustrate that usage. The scenarios described here consist of
261 referral object handling when finding target of a non-search
262 operation, when finding the base of a search operation, and when
263 generating search references. Lastly, other operation processing
264 considerations are presented.
265
266 It is to be noted that, in this document, a search operation is
267 conceptually divided into two distinct, sequential phases: (1)
268 finding the base object where the search is to begin, and (2)
269 performing the search itself. The first phase is similar to, but not
270 the same as, finding the target of a non-search operation.
271
272 It should also be noted that the ref attribute may have multiple
273 values and, where these sections refer to a single ref attribute
274 value, multiple ref attribute values may be substituted and SHOULD be
275 processed and returned (in any order) as a group in a referral or
276 search reference in the same way as described for a single ref
277 attribute value.
278
279 Search references returned for a given request may be returned in any
280 order.
281
282
283
284
285
286Zeilenga Standards Track [Page 5]
287
288
289RFC 3296 Named Subordinate References in LDAP Directories July 2002
290
291
2925.1. Example Configuration
293
294 For example, suppose the contacted server (hosta) holds the entry
295 "O=MNN,C=WW" and the entry "CN=Manager,O=MNN,C=WW" and the following
296 referral objects:
297
298 dn: OU=People,O=MNN,C=WW
299 ou: People
300 ref: ldap://hostb/OU=People,O=MNN,C=US
301 ref: ldap://hostc/OU=People,O=MNN,C=US
302 objectClass: referral
303 objectClass: extensibleObject
304
305 dn: OU=Roles,O=MNN,C=WW
306 ou: Roles
307 ref: ldap://hostd/OU=Roles,O=MNN,C=WW
308 objectClass: referral
309 objectClass: extensibleObject
310
311 The first referral object provides the server with the knowledge that
312 subtree "OU=People,O=MNN,C=WW" is held by hostb and hostc (e.g., one
313 is the master and the other a shadow). The second referral object
314 provides the server with the knowledge that the subtree
315 "OU=Roles,O=MNN,C=WW" is held by hostd.
316
317 Also, in the context of this document, the "nearest naming context"
318 means the deepest context which the object is within. That is, if
319 the object is within multiple naming contexts, the nearest naming
320 context is the one which is subordinate to all other naming contexts
321 the object is within.
322
3235.2. Target Object Considerations
324
325 This section details referral handling for add, compare, delete,
326 modify, and modify DN operations. If the client requests any of
327 these operations, there are four cases that the server must handle
328 with respect to the target object.
329
330 The DN part MUST be modified such that it refers to the appropriate
331 target in the referenced server (as detailed below). Even where the
332 DN to be returned is the same as the target DN, the DN part SHOULD
333 NOT be trimmed.
334
335 In cases where the URI to be returned is a LDAP URL, the server
336 SHOULD trim any present scope, filter, or attribute list from the URI
337 before returning it. Critical extensions MUST NOT be trimmed or
338 modified.
339
340
341
342
343Zeilenga Standards Track [Page 6]
344
345
346RFC 3296 Named Subordinate References in LDAP Directories July 2002
347
348
349 Case 1: The target object is not held by the server and is not within
350 or subordinate to any naming context nor subordinate to any
351 referral object held by the server.
352
353 The server SHOULD process the request normally as appropriate for
354 a non-existent base which is not within any naming context of the
355 server (generally return noSuchObject or a referral based upon
356 superior knowledge reference information). This document does not
357 detail management or processing of superior knowledge reference
358 information.
359
360 Case 2: The target object is held by the server and is a referral
361 object.
362
363 The server SHOULD return the URI value contained in the ref
364 attribute of the referral object appropriately modified as
365 described above.
366
367 Example: If the client issues a modify request for the target object
368 of "OU=People,O=MNN,c=WW", the server will return:
369
370 ModifyResponse (referral) {
371 ldap://hostb/OU=People,O=MNN,C=WW
372 ldap://hostc/OU=People,O=MNN,C=WW
373 }
374
375 Case 3: The target object is not held by the server, but the nearest
376 naming context contains no referral object which the target object
377 is subordinate to.
378
379 If the nearest naming context contains no referral object which
380 the target is subordinate to, the server SHOULD process the
381 request as appropriate for a nonexistent target (generally return
382 noSuchObject).
383
384 Case 4: The target object is not held by the server, but the nearest
385 naming context contains a referral object which the target object
386 is subordinate to.
387
388 If a client requests an operation for which the target object is
389 not held by the server and the nearest naming context contains a
390 referral object which the target object is subordinate to, the
391 server SHOULD return a referral response constructed from the URI
392 portion of the ref value of the referral object.
393
394
395
396
397
398
399
400Zeilenga Standards Track [Page 7]
401
402
403RFC 3296 Named Subordinate References in LDAP Directories July 2002
404
405
406 Example: If the client issues an add request where the target object
407 has a DN of "CN=Manager,OU=Roles,O=MNN,C=WW", the server will
408 return:
409
410 AddResponse (referral) {
411 ldap://hostd/CN=Manager,OU=Roles,O=MNN,C=WW"
412 }
413
414 Note that the DN part of the LDAP URL is modified such that it
415 refers to the appropriate entry in the referenced server.
416
4175.3. Base Object Considerations
418
419 This section details referral handling for base object processing
420 within search operations. Like target object considerations for
421 non-search operations, there are the four cases.
422
423 In cases where the URI to be returned is a LDAP URL, the server MUST
424 provide an explicit scope specifier from the LDAP URL prior to
425 returning it. In addition, the DN part MUST be modified such that it
426 refers to the appropriate target in the referenced server (as
427 detailed below).
428
429 If aliasing dereferencing was necessary in finding the referral
430 object, the DN part of the URI MUST be replaced with the base DN as
431 modified by the alias dereferencing such that the return URL refers
432 to the new target object per [RFC2251, 4.1.11].
433
434 Critical extensions MUST NOT be trimmed nor modified.
435
436 Case 1: The base object is not held by the server and is not within
437 nor subordinate to any naming context held by the server.
438
439 The server SHOULD process the request normally as appropriate for
440 a non-existent base which not within any naming context of the
441 server (generally return a superior referral or noSuchObject).
442 This document does not detail management or processing of superior
443 knowledge references.
444
445 Case 2: The base object is held by the server and is a referral
446 object.
447
448 The server SHOULD return the URI value contained in the ref
449 attribute of the referral object appropriately modified as
450 described above.
451
452
453
454
455
456
457Zeilenga Standards Track [Page 8]
458
459
460RFC 3296 Named Subordinate References in LDAP Directories July 2002
461
462
463 Example: If the client issues a subtree search in which the base
464 object is "OU=Roles,O=MNN,C=WW", the server will return
465
466 SearchResultDone (referral) {
467 ldap://hostd/OU=Roles,O=MNN,C=WW??sub
468 }
469
470 If the client were to issue a base or oneLevel search instead of
471 subtree, the returned LDAP URL would explicitly specify "base" or
472 "one", respectively, instead of "sub".
473
474 Case 3: The base object is not held by the server, but the nearest
475 naming context contains no referral object which the base object
476 is subordinate to.
477
478 If the nearest naming context contains no referral object which
479 the base is subordinate to, the request SHOULD be processed
480 normally as appropriate for a nonexistent base (generally return
481 noSuchObject).
482
483 Case 4: The base object is not held by the server, but the nearest
484 naming context contains a referral object which the base object is
485 subordinate to.
486
487 If a client requests an operation for which the target object is
488 not held by the server and the nearest naming context contains a
489 referral object which the target object is subordinate to, the
490 server SHOULD return a referral response which is constructed from
491 the URI portion of the ref value of the referral object.
492
493 Example: If the client issues a base search request for
494 "CN=Manager,OU=Roles,O=MNN,C=WW", the server will return
495
496 SearchResultDone (referral) {
497 ldap://hostd/CN=Manager,OU=Roles,O=MNN,C=WW??base"
498 }
499
500 If the client were to issue a subtree or oneLevel search instead
501 of subtree, the returned LDAP URL would explicitly specify "sub"
502 or "one", respectively, instead of "base".
503
504 Note that the DN part of the LDAP URL is modified such that it
505 refers to the appropriate entry in the referenced server.
506
507
508
509
510
511
512
513
514Zeilenga Standards Track [Page 9]
515
516
517RFC 3296 Named Subordinate References in LDAP Directories July 2002
518
519
5205.4. Search Continuation Considerations
521
522 For search operations, once the base object has been found and
523 determined not to be a referral object, the search may progress. Any
524 entry matching the filter and scope of the search which is not a
525 referral object is returned to the client normally as described in
526 [RFC2251].
527
528 For each referral object within the requested scope, regardless of
529 the search filter, the server SHOULD return a SearchResultReference
530 which is constructed from the URI component of values of the ref
531 attribute. If the URI component is not a LDAP URL, it should be
532 returned as is. If the LDAP URL's DN part is absent or empty, the DN
533 part must be modified to contain the DN of the referral object. If
534 the URI component is a LDAP URL, the URI SHOULD be modified to add an
535 explicit scope specifier.
536
537 Subtree Example:
538
539 If a client requests a subtree search of "O=MNN,C=WW", then in
540 addition to any entries within scope which match the filter, hosta
541 will also return two search references as the two referral objects
542 are within scope. One possible response might be:
543
544 SearchEntry for O=MNN,C=WW
545 SearchResultReference {
546 ldap://hostb/OU=People,O=MNN,C=WW??sub
547 ldap://hostc/OU=People,O=MNN,C=WW??sub
548 }
549 SearchEntry for CN=Manager,O=MNN,C=WW
550 SearchResultReference {
551 ldap://hostd/OU=Roles,O=MNN,C=WW??sub
552 }
553 SearchResultDone (success)
554
555 One Level Example:
556
557 If a client requests a one level search of "O=MNN,C=WW" then, in
558 addition to any entries one level below the "O=MNN,C=WW" entry
559 matching the filter, the server will also return two search
560 references as the two referral objects are within scope. One
561 possible sequence is shown:
562
563
564
565
566
567
568
569
570
571Zeilenga Standards Track [Page 10]
572
573
574RFC 3296 Named Subordinate References in LDAP Directories July 2002
575
576
577 SearchResultReference {
578 ldap://hostb/OU=People,O=MNN,C=WW??base
579 ldap://hostc/OU=People,O=MNN,C=WW??base
580 }
581 SearchEntry for CN=Manager,O=MNN,C=WW
582 SearchResultReference {
583 ldap://hostd/OU=Roles,O=MNN,C=WW??base
584 }
585 SearchResultDone (success)
586
587 Note: Unlike the examples in Section 4.5.3.1 of RFC 2251, the LDAP
588 URLs returned with the SearchResultReference messages contain, as
589 required by this specification, an explicit scope specifier.
590
5915.6. Other Considerations
592
593 This section details processing considerations for other operations.
594
5955.6.1 Bind
596
597 Servers SHOULD NOT return referral result code if the bind name (or
598 authentication identity or authorization identity) is (or is
599 subordinate to) a referral object but MAY use the knowledge
600 information to process the bind request (such as in support a future
601 distributed operation specification). Where the server makes no use
602 of the knowledge information, the server processes the request
603 normally as appropriate for a non-existent authentication or
604 authorization identity (e.g., return invalidCredentials).
605
6065.6.2 Modify DN
607
608 If the newSuperior is a referral object or is subordinate to a
609 referral object, the server SHOULD return affectsMultipleDSAs. If
610 the newRDN already exists but is a referral object, the server SHOULD
611 return affectsMultipleDSAs instead of entryAlreadyExists.
612
6136. Security Considerations
614
615 This document defines mechanisms that can be used to tie LDAP (and
616 other) servers together. The information used to tie services
617 together should be protected from unauthorized modification. If the
618 server topology information is not public information, it should be
619 protected from unauthorized disclosure as well.
620
621
622
623
624
625
626
627
628Zeilenga Standards Track [Page 11]
629
630
631RFC 3296 Named Subordinate References in LDAP Directories July 2002
632
633
6347. Acknowledgments
635
636 This document borrows heavily from previous work by IETF LDAPext
637 Working Group. In particular, this document is based upon "Named
638 Referral in LDAP Directories" (an expired Internet Draft) by
639 Christopher Lukas, Tim Howes, Michael Roszkowski, Mark C. Smith, and
640 Mark Wahl.
641
6428. Normative References
643
644 [RFC2079] Smith, M., "Definition of an X.500 Attribute Type and an
645 Object Class to Hold Uniform Resource Identifiers (URIs)",
646 RFC 2079, January 1997.
647
648 [RFC2119] Bradner, S., "Key Words for use in RFCs to Indicate
649 Requirement Levels", BCP 14, RFC 2119, March 1997.
650
651 [RFC2251] Wahl, M., Howes, T. and S. Kille, "Lightweight Directory
652 Access Protocol (v3)", RFC 2251, December 1997.
653
654 [RFC2252] Wahl, M., Coulbeck, A., Howes, T. and S. Kille,
655 "Lightweight Directory Access Protocol (v3): Attribute
656 Syntax Definitions", RFC 2252, December 1997.
657
658 [RFC2253] Wahl, M., Kille, S. and T. Howes, "Lightweight Directory
659 Access Protocol (v3): UTF-8 String Representation of
660 Distinguished Names", RFC 2253, December 1997.
661
662 [RFC2255] Howes, T. and M. Smith, "The LDAP URL Format", RFC 2255,
663 December, 1997.
664
665 [RFC2396] Berners-Lee, T., Fielding, R. and L. Masinter, "Uniform
666 Resource Identifiers (URI): Generic Syntax", RFC 2396,
667 August 1998.
668
669 [X.501] ITU-T, "The Directory: Models", X.501, 1993.
670
6719. Informative References
672
673 [X.500] ITU-T, "The Directory: Overview of Concepts, Models, and
674 Services", X.500, 1993.
675
676 [X.511] ITU-T, "The Directory: Abstract Service Definition", X.500,
677 1997.
678
679
680
681
682
683
684
685Zeilenga Standards Track [Page 12]
686
687
688RFC 3296 Named Subordinate References in LDAP Directories July 2002
689
690
69110. Author's Address
692
693 Kurt D. Zeilenga
694 OpenLDAP Foundation
695
696 EMail: Kurt@OpenLDAP.org
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742Zeilenga Standards Track [Page 13]
743
744
745RFC 3296 Named Subordinate References in LDAP Directories July 2002
746
747
74811. Full Copyright Statement
749
750 Copyright (C) The Internet Society (2002). All Rights Reserved.
751
752 This document and translations of it may be copied and furnished to
753 others, and derivative works that comment on or otherwise explain it
754 or assist in its implementation may be prepared, copied, published
755 and distributed, in whole or in part, without restriction of any
756 kind, provided that the above copyright notice and this paragraph are
757 included on all such copies and derivative works. However, this
758 document itself may not be modified in any way, such as by removing
759 the copyright notice or references to the Internet Society or other
760 Internet organizations, except as needed for the purpose of
761 developing Internet standards in which case the procedures for
762 copyrights defined in the Internet Standards process must be
763 followed, or as required to translate it into languages other than
764 English.
765
766 The limited permissions granted above are perpetual and will not be
767 revoked by the Internet Society or its successors or assigns.
768
769 This document and the information contained herein is provided on an
770 "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
771 TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
772 BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
773 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
774 MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
775
776Acknowledgement
777
778 Funding for the RFC Editor function is currently provided by the
779 Internet Society.
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799Zeilenga Standards Track [Page 14]
800
801
Note: See TracBrowser for help on using the repository browser.