asciidoctor-rfc 0.9.0 → 0.9.1

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,168 @@
1
+
2
+
3
+
4
+
5
+ Network Working Group D. Waitzman
6
+ Internet-Draft BBN STC
7
+ Intended status: Informational April 1, 1990
8
+ Expires: October 3, 1990
9
+
10
+
11
+ A Standard for the Transmission of IP Datagrams on Avian Carriers
12
+ rfc-1149
13
+
14
+ Status of This Memo
15
+
16
+ This Internet-Draft is submitted in full conformance with the
17
+ provisions of BCP 78 and BCP 79.
18
+
19
+ Internet-Drafts are working documents of the Internet Engineering
20
+ Task Force (IETF). Note that other groups may also distribute
21
+ working documents as Internet-Drafts. The list of current Internet-
22
+ Drafts is at http://datatracker.ietf.org/drafts/current/.
23
+
24
+ Internet-Drafts are draft documents valid for a maximum of six months
25
+ and may be updated, replaced, or obsoleted by other documents at any
26
+ time. It is inappropriate to use Internet-Drafts as reference
27
+ material or to cite them other than as "work in progress."
28
+
29
+ This Internet-Draft will expire on October 3, 1990.
30
+
31
+ Copyright Notice
32
+
33
+ Copyright (c) 1990 IETF Trust and the persons identified as the
34
+ document authors. All rights reserved.
35
+
36
+ This document is subject to BCP 78 and the IETF Trust's Legal
37
+ Provisions Relating to IETF Documents
38
+ (http://trustee.ietf.org/license-info) in effect on the date of
39
+ publication of this document. Please review these documents
40
+ carefully, as they describe your rights and restrictions with respect
41
+ to this document. Code Components extracted from this document must
42
+ include Simplified BSD License text as described in Section 4.e of
43
+ the Trust Legal Provisions and are provided without warranty as
44
+ described in the Simplified BSD License.
45
+
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+
55
+
56
+ Waitzman Expires October 3, 1990 [Page 1]
57
+
58
+ Internet-Draft IP Datagrams on Avian Carriers April 1990
59
+
60
+
61
+ Table of Contents
62
+
63
+ 1. Overview and Rational . . . . . . . . . . . . . . . . . . . . 2
64
+ 2. Frame Format . . . . . . . . . . . . . . . . . . . . . . . . 2
65
+ 3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 2
66
+ 4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
67
+ Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 3
68
+
69
+ 1. Overview and Rational
70
+
71
+ Avian carriers can provide high delay, low throughput, and low
72
+ altitude service. The connection topology is limited to a single
73
+ point-to-point path for each carrier, used with standard carriers,
74
+ but many carriers can be used without significant interference with
75
+ each other, outside of early spring. This is because of the 3D ether
76
+ space available to the carriers, in contrast to the 1D ether used by
77
+ IEEE802.3. The carriers have an intrinsic collision avoidance
78
+ system, which increases availability. Unlike some network
79
+ technologies, such as packet radio, communication is not limited to
80
+ line-of-sight distance. Connection oriented service is available in
81
+ some cities, usually based upon a central hub topology.
82
+
83
+ 2. Frame Format
84
+
85
+ The IP datagram is printed, on a small scroll of paper, in
86
+ hexadecimal, with each octet separated by whitestuff and blackstuff.
87
+ The scroll of paper is wrapped around one leg of the avian carrier.
88
+ A band of duct tape is used to secure the datagram's edges. The
89
+ bandwidth is limited to the leg length. The MTU is variable, and
90
+ paradoxically, generally increases with increased carrier age. A
91
+ typical MTU is 256 milligrams. Some datagram padding may be needed.
92
+
93
+ Upon receipt, the duct tape is removed and the paper copy of the
94
+ datagram is optically scanned into a electronically transmittable
95
+ form.
96
+
97
+ 3. Discussion
98
+
99
+ Multiple types of service can be provided with a prioritized pecking
100
+ order. An additional property is built-in worm detection and
101
+ eradication. Because IP only guarantees best effort delivery, loss
102
+ of a carrier can be tolerated. With time, the carriers are self-
103
+ regenerating. While broadcasting is not specified, storms can cause
104
+ data loss. There is persistent delivery retry, until the carrier
105
+ drops. Audit trails are automatically generated, and can often be
106
+ found on logs and cable trays.
107
+
108
+
109
+
110
+
111
+
112
+ Waitzman Expires October 3, 1990 [Page 2]
113
+
114
+ Internet-Draft IP Datagrams on Avian Carriers April 1990
115
+
116
+
117
+ 4. Security Considerations
118
+
119
+ Security is not generally a problem in normal operation, but special
120
+ measures must be taken (such as data encryption) when avian carriers
121
+ are used in a tactical environment.
122
+
123
+ Author's Address
124
+
125
+ David Waitzman
126
+ BBN STC
127
+ 10 Moulton Street
128
+ Cambridge MA 02238
129
+
130
+ Phone: (617) 873-4323
131
+ Email: dwaitzman@BBN.COM
132
+
133
+
134
+
135
+
136
+
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+
145
+
146
+
147
+
148
+
149
+
150
+
151
+
152
+
153
+
154
+
155
+
156
+
157
+
158
+
159
+
160
+
161
+
162
+
163
+
164
+
165
+
166
+
167
+
168
+ Waitzman Expires October 3, 1990 [Page 3]
@@ -0,0 +1,168 @@
1
+
2
+
3
+
4
+
5
+ Network Working Group J. Ashworth
6
+ Internet-Draft Ashworth & Associates
7
+ Intended status: Informational April 1, 1997
8
+ Expires: October 3, 1997
9
+
10
+
11
+ The Naming of Hosts
12
+ rfc-2100
13
+
14
+ Status of This Memo
15
+
16
+ This Internet-Draft is submitted in full conformance with the
17
+ provisions of BCP 78 and BCP 79.
18
+
19
+ Internet-Drafts are working documents of the Internet Engineering
20
+ Task Force (IETF). Note that other groups may also distribute
21
+ working documents as Internet-Drafts. The list of current Internet-
22
+ Drafts is at http://datatracker.ietf.org/drafts/current/.
23
+
24
+ Internet-Drafts are draft documents valid for a maximum of six months
25
+ and may be updated, replaced, or obsoleted by other documents at any
26
+ time. It is inappropriate to use Internet-Drafts as reference
27
+ material or to cite them other than as "work in progress."
28
+
29
+ This Internet-Draft will expire on October 3, 1997.
30
+
31
+ Copyright Notice
32
+
33
+ Copyright (c) 1997 IETF Trust and the persons identified as the
34
+ document authors. All rights reserved.
35
+
36
+ This document is subject to BCP 78 and the IETF Trust's Legal
37
+ Provisions Relating to IETF Documents
38
+ (http://trustee.ietf.org/license-info) in effect on the date of
39
+ publication of this document. Please review these documents
40
+ carefully, as they describe your rights and restrictions with respect
41
+ to this document. Code Components extracted from this document must
42
+ include Simplified BSD License text as described in Section 4.e of
43
+ the Trust Legal Provisions and are provided without warranty as
44
+ described in the Simplified BSD License.
45
+
46
+ 1. Introduction
47
+
48
+ This RFC is a commentary on the difficulty of deciding upon an
49
+ acceptably distinctive hostname for one's computer, a problem which
50
+ grows in direct proportion to the logarithmically increasing size of
51
+ the Internet.
52
+
53
+
54
+
55
+
56
+ Ashworth Expires October 3, 1997 [Page 1]
57
+
58
+ Internet-Draft The Naming of Hosts April 1997
59
+
60
+
61
+ Distribution of this memo is unlimited.
62
+
63
+ Except to TS Eliot.
64
+
65
+ And, for that matter, to David Addison, who hates iambic pentameter.
66
+
67
+ 2. Poetry
68
+
69
+ The Naming of Hosts is a difficult matter,
70
+ It isn't just one of your holiday games;
71
+ You may think at first I'm as mad as a hatter
72
+ When I tell you, a host must have THREE DIFFERENT NAMES.
73
+
74
+ First of all, there's the name that the users use daily,
75
+ Such as venus, athena, and cisco, and ames,
76
+ Such as titan or sirius, hobbes or europa--
77
+ All of them sensible everyday names.
78
+
79
+ There are fancier names if you think they sound sweeter,
80
+ Some for the web pages, some for the flames:
81
+ Such as mercury, phoenix, orion, and charon--
82
+ But all of them sensible everyday names.
83
+
84
+ But I tell you, a host needs a name that's particular,
85
+ A name that's peculiar, and more dignified,
86
+ Else how can it keep its home page perpendicular,
87
+ And spread out its data, send pages world wide?
88
+
89
+ Of names of this kind, I can give you a quorum,
90
+ Like lothlorien, pothole, or kobyashi-maru,
91
+ Such as pearly-gates.vatican, or else diplomatic-
92
+ Names that never belong to more than one host.
93
+
94
+ But above and beyond there's still one name left over,
95
+ And that is the name that you never will guess;
96
+ The name that no human research can discover--
97
+ But THE NAMESERVER KNOWS, and will us'ually confess.
98
+
99
+ When you notice a client in rapt meditation,
100
+ The reason, I tell you, is always the same:
101
+ The code is engaged in a deep consultation
102
+ On the address, the address, the address of its name:
103
+
104
+
105
+
106
+
107
+
108
+
109
+
110
+
111
+
112
+ Ashworth Expires October 3, 1997 [Page 2]
113
+
114
+ Internet-Draft The Naming of Hosts April 1997
115
+
116
+
117
+ It's ineffable,
118
+ effable,
119
+ Effanineffable,
120
+ Deep and inscrutable,
121
+ singular
122
+ Name.
123
+
124
+ 3. Credits
125
+
126
+ Thanks to Don Libes, Mark Lottor, and a host of twisted
127
+ individuals^W^Wcreative sysadmins for providing source material for
128
+ this memo, to Andrew Lloyd-Webber, Cameron Mackintosh, and a cast of
129
+ thousands (particularly including Terrance Mann) who drew my
130
+ attention to the necessity, and of course, to Thomas Stearns Eliot,
131
+ for making this all necessary.
132
+
133
+ 4. Security Considerations
134
+
135
+ Security issues are not discussed in this memo.
136
+
137
+ Particularly the cardiac security of certain famous poets.
138
+
139
+ 5. Informative References
140
+
141
+ [1] Libes, D., "Choosing a Name for Your Computer",
142
+ Communications of the ACM Vol. 32, No. 11, Pg. 1289,
143
+ November 1989.
144
+
145
+ [2] Lottor, M., "Domain Name Survey", January 1997,
146
+ <namedroppers@internic.net>.
147
+
148
+ [3] Stearns, TS., "Old Possum's Book of Practical Cats".
149
+
150
+ [4] Wong, M., "Cool Hostnames",
151
+ <http://www.seas.upenn.edu/~mengwong/coolhosts.html>.
152
+
153
+ Author's Address
154
+
155
+ Jay R. Ashworth
156
+ Advanced Technology Consulting
157
+ St. Petersburg FL 33709-4819
158
+
159
+ Phone: +1 813 790 7592
160
+ Email: jra@scfn.thpl.lib.fl.us
161
+
162
+
163
+
164
+
165
+
166
+
167
+
168
+ Ashworth Expires October 3, 1997 [Page 3]
@@ -0,0 +1,336 @@
1
+
2
+
3
+
4
+
5
+ Network Working Group S. Bellovin
6
+ Internet-Draft AT&T Labs Research
7
+ Intended status: Informational April 1, 2003
8
+ Expires: October 3, 2003
9
+
10
+
11
+ The Security Flag in the IPv4 Header
12
+ rfc-3514
13
+
14
+ Abstract
15
+
16
+ Firewalls, packet filters, intrusion detection systems, and the like
17
+ often have difficulty distinguishing between packets that have
18
+ malicious intent and those that are merely unusual. We define a
19
+ security flag in the IPv4 header as a means of distinguishing the two
20
+ cases.
21
+
22
+ Status of This Memo
23
+
24
+ This Internet-Draft is submitted in full conformance with the
25
+ provisions of BCP 78 and BCP 79.
26
+
27
+ Internet-Drafts are working documents of the Internet Engineering
28
+ Task Force (IETF). Note that other groups may also distribute
29
+ working documents as Internet-Drafts. The list of current Internet-
30
+ Drafts is at http://datatracker.ietf.org/drafts/current/.
31
+
32
+ Internet-Drafts are draft documents valid for a maximum of six months
33
+ and may be updated, replaced, or obsoleted by other documents at any
34
+ time. It is inappropriate to use Internet-Drafts as reference
35
+ material or to cite them other than as "work in progress."
36
+
37
+ This Internet-Draft will expire on October 3, 2003.
38
+
39
+ Copyright Notice
40
+
41
+ Copyright (c) 2003 IETF Trust and the persons identified as the
42
+ document authors. All rights reserved.
43
+
44
+ This document is subject to BCP 78 and the IETF Trust's Legal
45
+ Provisions Relating to IETF Documents
46
+ (http://trustee.ietf.org/license-info) in effect on the date of
47
+ publication of this document. Please review these documents
48
+ carefully, as they describe your rights and restrictions with respect
49
+ to this document. Code Components extracted from this document must
50
+ include Simplified BSD License text as described in Section 4.e of
51
+ the Trust Legal Provisions and are provided without warranty as
52
+ described in the Simplified BSD License.
53
+
54
+
55
+
56
+ Bellovin Expires October 3, 2003 [Page 1]
57
+
58
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
59
+
60
+
61
+ Table of Contents
62
+
63
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
64
+ 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 2
65
+ 2. Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
66
+ 3. Setting the Evil Bit . . . . . . . . . . . . . . . . . . . . 3
67
+ 4. Processing of the Evil Bit . . . . . . . . . . . . . . . . . 4
68
+ 5. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 4
69
+ 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
70
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
71
+ 8. Normative References . . . . . . . . . . . . . . . . . . . . 5
72
+ Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 6
73
+
74
+ 1. Introduction
75
+
76
+ Firewalls [CBR03], packet filters, intrusion detection systems, and
77
+ the like often have difficulty distinguishing between packets that
78
+ have malicious intent and those that are merely unusual. The problem
79
+ is that making such determinations is hard. To solve this problem,
80
+ we define a security flag, known as the "evil" bit, in the IPv4
81
+ [RFC0791] header. Benign packets have this bit set to 0; those that
82
+ are used for an attack will have the bit set to 1.
83
+
84
+ 1.1. Terminology
85
+
86
+ The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
87
+ SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
88
+ document, are to be interpreted as described in [RFC2119].
89
+
90
+ 2. Syntax
91
+
92
+ The high-order bit of the IP fragment offset field is the only unused
93
+ bit in the IP header. Accordingly, the selection of the bit position
94
+ is not left to IANA.
95
+
96
+ The bit field is laid out as follows:
97
+
98
+ 0
99
+ +-+
100
+ |E|
101
+ +-+
102
+
103
+ Currently-assigned values are defined as follows:
104
+
105
+ 0x0:
106
+ If the bit is set to 0, the packet has no evil intent. Hosts,
107
+ network elements, etc., SHOULD assume that the packet is harmless,
108
+ and SHOULD NOT take any defensive measures. (We note that this
109
+
110
+
111
+
112
+ Bellovin Expires October 3, 2003 [Page 2]
113
+
114
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
115
+
116
+
117
+ part of the spec is already implemented by many common desktop
118
+ operating systems.)
119
+
120
+ 0x1:
121
+ If the bit is set to 1, the packet has evil intent. Secure
122
+ systems SHOULD try to defend themselves against such packets.
123
+ Insecure systems MAY chose to crash, be penetrated, etc.
124
+
125
+ 3. Setting the Evil Bit
126
+
127
+ There are a number of ways in which the evil bit may be set. Attack
128
+ applications may use a suitable API to request that it be set.
129
+ Systems that do not have other mechanisms MUST provide such an API;
130
+ attack programs MUST use it.
131
+
132
+ Multi-level insecure operating systems may have special levels for
133
+ attack programs; the evil bit MUST be set by default on packets
134
+ emanating from programs running at such levels. However, the system
135
+ _MAY_ provide an API to allow it to be cleared for non-malicious
136
+ activity by users who normally engage in attack behavior.
137
+
138
+ Fragments that by themselves are dangerous MUST have the evil bit
139
+ set. If a packet with the evil bit set is fragmented by an
140
+ intermediate router and the fragments themselves are not dangerous,
141
+ the evil bit MUST be cleared in the fragments, and MUST be turned
142
+ back on in the reassembled packet.
143
+
144
+ Intermediate systems are sometimes used to launder attack
145
+ connections. Packets to such systems that are intended to be relayed
146
+ to a target SHOULD have the evil bit set.
147
+
148
+ Some applications hand-craft their own packets. If these packets are
149
+ part of an attack, the application MUST set the evil bit by itself.
150
+
151
+ In networks protected by firewalls, it is axiomatic that all
152
+ attackers are on the outside of the firewall. Therefore, hosts
153
+ inside the firewall MUST NOT set the evil bit on any packets.
154
+
155
+ Because NAT [RFC3022] boxes modify packets, they SHOULD set the evil
156
+ bit on such packets. "Transparent" http and email proxies SHOULD set
157
+ the evil bit on their reply packets to the innocent client host.
158
+
159
+ Some hosts scan other hosts in a fashion that can alert intrusion
160
+ detection systems. If the scanning is part of a benign research
161
+ project, the evil bit MUST NOT be set. If the scanning per se is
162
+ innocent, but the ultimate intent is evil and the destination site
163
+ has such an intrusion detection system, the evil bit SHOULD be set.
164
+
165
+
166
+
167
+
168
+ Bellovin Expires October 3, 2003 [Page 3]
169
+
170
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
171
+
172
+
173
+ 4. Processing of the Evil Bit
174
+
175
+ Devices such as firewalls MUST drop all inbound packets that have the
176
+ evil bit set. Packets with the evil bit off MUST NOT be dropped.
177
+ Dropped packets SHOULD be noted in the appropriate MIB variable.
178
+
179
+ Intrusion detection systems (IDSs) have a harder problem. Because of
180
+ their known propensity for false negatives and false positives, IDSs
181
+ MUST apply a probabilistic correction factor when evaluating the evil
182
+ bit. If the evil bit is set, a suitable random number generator
183
+ [RFC1750] must be consulted to determine if the attempt should be
184
+ logged. Similarly, if the bit is off, another random number
185
+ generator must be consulted to determine if it should be logged
186
+ despite the setting.
187
+
188
+ The default probabilities for these tests depends on the type of IDS.
189
+ Thus, a signature-based IDS would have a low false positive value but
190
+ a high false negative value. A suitable administrative interface
191
+ MUST be provided to permit operators to reset these values.
192
+
193
+ Routers that are not intended as as security devices SHOULD NOT
194
+ examine this bit. This will allow them to pass packets at higher
195
+ speeds.
196
+
197
+ As outlined earlier, host processing of evil packets is operating-
198
+ system dependent; however, all hosts MUST react appropriately
199
+ according to their nature.
200
+
201
+ 5. Related Work
202
+
203
+ Although this document only defines the IPv4 evil bit, there are
204
+ complementary mechanisms for other forms of evil. We sketch some of
205
+ those here.
206
+
207
+ For IPv6 [RFC2460], evilness is conveyed by two options. The first,
208
+ a hop-by-hop option, is used for packets that damage the network,
209
+ such as DDoS packets. The second, an end-to-end option, is for
210
+ packets intended to damage destination hosts. In either case, the
211
+ option contains a 128-bit strength indicator, which says how evil the
212
+ packet is, and a 128-bit type code that describes the particular type
213
+ of attack intended.
214
+
215
+ Some link layers, notably those based on optical switching, may
216
+ bypass routers (and hence firewalls) entirely. Accordingly, some
217
+ link-layer scheme MUST be used to denote evil. This may involve evil
218
+ lambdas, evil polarizations, etc.
219
+
220
+ DDoS attack packets are denoted by a special diffserv code point.
221
+
222
+
223
+
224
+ Bellovin Expires October 3, 2003 [Page 4]
225
+
226
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
227
+
228
+
229
+ An application/evil MIME type is defined for Web- or email-carried
230
+ mischief. Other MIME types can be embedded inside of evil sections;
231
+ this permit easy encoding of word processing documents with macro
232
+ viruses, etc.
233
+
234
+ 6. IANA Considerations
235
+
236
+ This document defines the behavior of security elements for the 0x0
237
+ and 0x1 values of this bit. Behavior for other values of the bit may
238
+ be defined only by IETF consensus [RFC2434].
239
+
240
+ 7. Security Considerations
241
+
242
+ Correct functioning of security mechanisms depend critically on the
243
+ evil bit being set properly. If faulty components do not set the
244
+ evil bit to 1 when appropriate, firewalls will not be able to do
245
+ their jobs properly. Similarly, if the bit is set to 1 when it
246
+ shouldn't be, a denial of service condition may occur.
247
+
248
+ 8. Normative References
249
+
250
+ [CBR03] Cheswick, W., Bellovin, S., and A. Rubin, "Firewalls and
251
+ Internet Security: Repelling the Wily Hacker, Second
252
+ Edition", Addison-Wesley , 2003.
253
+
254
+ [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
255
+ DOI 10.17487/RFC0791, September 1981,
256
+ <https://www.rfc-editor.org/info/rfc791>.
257
+
258
+ [RFC1750] Eastlake 3rd, D., Crocker, S., and J. Schiller,
259
+ "Randomness Recommendations for Security", RFC 1750,
260
+ DOI 10.17487/RFC1750, December 1994,
261
+ <https://www.rfc-editor.org/info/rfc1750>.
262
+
263
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
264
+ Requirement Levels", BCP 14, RFC 2119,
265
+ DOI 10.17487/RFC2119, March 1997,
266
+ <https://www.rfc-editor.org/info/rfc2119>.
267
+
268
+ [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
269
+ IANA Considerations Section in RFCs", RFC 2434,
270
+ DOI 10.17487/RFC2434, October 1998,
271
+ <https://www.rfc-editor.org/info/rfc2434>.
272
+
273
+ [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
274
+ (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
275
+ December 1998, <https://www.rfc-editor.org/info/rfc2460>.
276
+
277
+
278
+
279
+
280
+ Bellovin Expires October 3, 2003 [Page 5]
281
+
282
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
283
+
284
+
285
+ [RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network
286
+ Address Translator (Traditional NAT)", RFC 3022,
287
+ DOI 10.17487/RFC3022, January 2001,
288
+ <https://www.rfc-editor.org/info/rfc3022>.
289
+
290
+ Author's Address
291
+
292
+ Steven M. Bellovin
293
+ AT&T Labs Research
294
+ 180 Park Avenue
295
+ Florham Park NJ 07932
296
+
297
+ Phone: +1 973-360-8656
298
+ Email: bellovin@acm.org
299
+
300
+
301
+
302
+
303
+
304
+
305
+
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+
319
+
320
+
321
+
322
+
323
+
324
+
325
+
326
+
327
+
328
+
329
+
330
+
331
+
332
+
333
+
334
+
335
+
336
+ Bellovin Expires October 3, 2003 [Page 6]