asciidoctor-rfc 0.9.0 → 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,168 @@
1
+
2
+
3
+
4
+
5
+ Network Working Group D. Waitzman
6
+ Internet-Draft BBN STC
7
+ Intended status: Informational April 1, 1990
8
+ Expires: October 3, 1990
9
+
10
+
11
+ A Standard for the Transmission of IP Datagrams on Avian Carriers
12
+ rfc-1149
13
+
14
+ Status of This Memo
15
+
16
+ This Internet-Draft is submitted in full conformance with the
17
+ provisions of BCP 78 and BCP 79.
18
+
19
+ Internet-Drafts are working documents of the Internet Engineering
20
+ Task Force (IETF). Note that other groups may also distribute
21
+ working documents as Internet-Drafts. The list of current Internet-
22
+ Drafts is at http://datatracker.ietf.org/drafts/current/.
23
+
24
+ Internet-Drafts are draft documents valid for a maximum of six months
25
+ and may be updated, replaced, or obsoleted by other documents at any
26
+ time. It is inappropriate to use Internet-Drafts as reference
27
+ material or to cite them other than as "work in progress."
28
+
29
+ This Internet-Draft will expire on October 3, 1990.
30
+
31
+ Copyright Notice
32
+
33
+ Copyright (c) 1990 IETF Trust and the persons identified as the
34
+ document authors. All rights reserved.
35
+
36
+ This document is subject to BCP 78 and the IETF Trust's Legal
37
+ Provisions Relating to IETF Documents
38
+ (http://trustee.ietf.org/license-info) in effect on the date of
39
+ publication of this document. Please review these documents
40
+ carefully, as they describe your rights and restrictions with respect
41
+ to this document. Code Components extracted from this document must
42
+ include Simplified BSD License text as described in Section 4.e of
43
+ the Trust Legal Provisions and are provided without warranty as
44
+ described in the Simplified BSD License.
45
+
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+
55
+
56
+ Waitzman Expires October 3, 1990 [Page 1]
57
+
58
+ Internet-Draft IP Datagrams on Avian Carriers April 1990
59
+
60
+
61
+ Table of Contents
62
+
63
+ 1. Overview and Rational . . . . . . . . . . . . . . . . . . . . 2
64
+ 2. Frame Format . . . . . . . . . . . . . . . . . . . . . . . . 2
65
+ 3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 2
66
+ 4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
67
+ Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 3
68
+
69
+ 1. Overview and Rational
70
+
71
+ Avian carriers can provide high delay, low throughput, and low
72
+ altitude service. The connection topology is limited to a single
73
+ point-to-point path for each carrier, used with standard carriers,
74
+ but many carriers can be used without significant interference with
75
+ each other, outside of early spring. This is because of the 3D ether
76
+ space available to the carriers, in contrast to the 1D ether used by
77
+ IEEE802.3. The carriers have an intrinsic collision avoidance
78
+ system, which increases availability. Unlike some network
79
+ technologies, such as packet radio, communication is not limited to
80
+ line-of-sight distance. Connection oriented service is available in
81
+ some cities, usually based upon a central hub topology.
82
+
83
+ 2. Frame Format
84
+
85
+ The IP datagram is printed, on a small scroll of paper, in
86
+ hexadecimal, with each octet separated by whitestuff and blackstuff.
87
+ The scroll of paper is wrapped around one leg of the avian carrier.
88
+ A band of duct tape is used to secure the datagram's edges. The
89
+ bandwidth is limited to the leg length. The MTU is variable, and
90
+ paradoxically, generally increases with increased carrier age. A
91
+ typical MTU is 256 milligrams. Some datagram padding may be needed.
92
+
93
+ Upon receipt, the duct tape is removed and the paper copy of the
94
+ datagram is optically scanned into a electronically transmittable
95
+ form.
96
+
97
+ 3. Discussion
98
+
99
+ Multiple types of service can be provided with a prioritized pecking
100
+ order. An additional property is built-in worm detection and
101
+ eradication. Because IP only guarantees best effort delivery, loss
102
+ of a carrier can be tolerated. With time, the carriers are self-
103
+ regenerating. While broadcasting is not specified, storms can cause
104
+ data loss. There is persistent delivery retry, until the carrier
105
+ drops. Audit trails are automatically generated, and can often be
106
+ found on logs and cable trays.
107
+
108
+
109
+
110
+
111
+
112
+ Waitzman Expires October 3, 1990 [Page 2]
113
+
114
+ Internet-Draft IP Datagrams on Avian Carriers April 1990
115
+
116
+
117
+ 4. Security Considerations
118
+
119
+ Security is not generally a problem in normal operation, but special
120
+ measures must be taken (such as data encryption) when avian carriers
121
+ are used in a tactical environment.
122
+
123
+ Author's Address
124
+
125
+ David Waitzman
126
+ BBN STC
127
+ 10 Moulton Street
128
+ Cambridge MA 02238
129
+
130
+ Phone: (617) 873-4323
131
+ Email: dwaitzman@BBN.COM
132
+
133
+
134
+
135
+
136
+
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+
145
+
146
+
147
+
148
+
149
+
150
+
151
+
152
+
153
+
154
+
155
+
156
+
157
+
158
+
159
+
160
+
161
+
162
+
163
+
164
+
165
+
166
+
167
+
168
+ Waitzman Expires October 3, 1990 [Page 3]
@@ -0,0 +1,168 @@
1
+
2
+
3
+
4
+
5
+ Network Working Group J. Ashworth
6
+ Internet-Draft Ashworth & Associates
7
+ Intended status: Informational April 1, 1997
8
+ Expires: October 3, 1997
9
+
10
+
11
+ The Naming of Hosts
12
+ rfc-2100
13
+
14
+ Status of This Memo
15
+
16
+ This Internet-Draft is submitted in full conformance with the
17
+ provisions of BCP 78 and BCP 79.
18
+
19
+ Internet-Drafts are working documents of the Internet Engineering
20
+ Task Force (IETF). Note that other groups may also distribute
21
+ working documents as Internet-Drafts. The list of current Internet-
22
+ Drafts is at http://datatracker.ietf.org/drafts/current/.
23
+
24
+ Internet-Drafts are draft documents valid for a maximum of six months
25
+ and may be updated, replaced, or obsoleted by other documents at any
26
+ time. It is inappropriate to use Internet-Drafts as reference
27
+ material or to cite them other than as "work in progress."
28
+
29
+ This Internet-Draft will expire on October 3, 1997.
30
+
31
+ Copyright Notice
32
+
33
+ Copyright (c) 1997 IETF Trust and the persons identified as the
34
+ document authors. All rights reserved.
35
+
36
+ This document is subject to BCP 78 and the IETF Trust's Legal
37
+ Provisions Relating to IETF Documents
38
+ (http://trustee.ietf.org/license-info) in effect on the date of
39
+ publication of this document. Please review these documents
40
+ carefully, as they describe your rights and restrictions with respect
41
+ to this document. Code Components extracted from this document must
42
+ include Simplified BSD License text as described in Section 4.e of
43
+ the Trust Legal Provisions and are provided without warranty as
44
+ described in the Simplified BSD License.
45
+
46
+ 1. Introduction
47
+
48
+ This RFC is a commentary on the difficulty of deciding upon an
49
+ acceptably distinctive hostname for one's computer, a problem which
50
+ grows in direct proportion to the logarithmically increasing size of
51
+ the Internet.
52
+
53
+
54
+
55
+
56
+ Ashworth Expires October 3, 1997 [Page 1]
57
+
58
+ Internet-Draft The Naming of Hosts April 1997
59
+
60
+
61
+ Distribution of this memo is unlimited.
62
+
63
+ Except to TS Eliot.
64
+
65
+ And, for that matter, to David Addison, who hates iambic pentameter.
66
+
67
+ 2. Poetry
68
+
69
+ The Naming of Hosts is a difficult matter,
70
+ It isn't just one of your holiday games;
71
+ You may think at first I'm as mad as a hatter
72
+ When I tell you, a host must have THREE DIFFERENT NAMES.
73
+
74
+ First of all, there's the name that the users use daily,
75
+ Such as venus, athena, and cisco, and ames,
76
+ Such as titan or sirius, hobbes or europa--
77
+ All of them sensible everyday names.
78
+
79
+ There are fancier names if you think they sound sweeter,
80
+ Some for the web pages, some for the flames:
81
+ Such as mercury, phoenix, orion, and charon--
82
+ But all of them sensible everyday names.
83
+
84
+ But I tell you, a host needs a name that's particular,
85
+ A name that's peculiar, and more dignified,
86
+ Else how can it keep its home page perpendicular,
87
+ And spread out its data, send pages world wide?
88
+
89
+ Of names of this kind, I can give you a quorum,
90
+ Like lothlorien, pothole, or kobyashi-maru,
91
+ Such as pearly-gates.vatican, or else diplomatic-
92
+ Names that never belong to more than one host.
93
+
94
+ But above and beyond there's still one name left over,
95
+ And that is the name that you never will guess;
96
+ The name that no human research can discover--
97
+ But THE NAMESERVER KNOWS, and will us'ually confess.
98
+
99
+ When you notice a client in rapt meditation,
100
+ The reason, I tell you, is always the same:
101
+ The code is engaged in a deep consultation
102
+ On the address, the address, the address of its name:
103
+
104
+
105
+
106
+
107
+
108
+
109
+
110
+
111
+
112
+ Ashworth Expires October 3, 1997 [Page 2]
113
+
114
+ Internet-Draft The Naming of Hosts April 1997
115
+
116
+
117
+ It's ineffable,
118
+ effable,
119
+ Effanineffable,
120
+ Deep and inscrutable,
121
+ singular
122
+ Name.
123
+
124
+ 3. Credits
125
+
126
+ Thanks to Don Libes, Mark Lottor, and a host of twisted
127
+ individuals^W^Wcreative sysadmins for providing source material for
128
+ this memo, to Andrew Lloyd-Webber, Cameron Mackintosh, and a cast of
129
+ thousands (particularly including Terrance Mann) who drew my
130
+ attention to the necessity, and of course, to Thomas Stearns Eliot,
131
+ for making this all necessary.
132
+
133
+ 4. Security Considerations
134
+
135
+ Security issues are not discussed in this memo.
136
+
137
+ Particularly the cardiac security of certain famous poets.
138
+
139
+ 5. Informative References
140
+
141
+ [1] Libes, D., "Choosing a Name for Your Computer",
142
+ Communications of the ACM Vol. 32, No. 11, Pg. 1289,
143
+ November 1989.
144
+
145
+ [2] Lottor, M., "Domain Name Survey", January 1997,
146
+ <namedroppers@internic.net>.
147
+
148
+ [3] Stearns, TS., "Old Possum's Book of Practical Cats".
149
+
150
+ [4] Wong, M., "Cool Hostnames",
151
+ <http://www.seas.upenn.edu/~mengwong/coolhosts.html>.
152
+
153
+ Author's Address
154
+
155
+ Jay R. Ashworth
156
+ Advanced Technology Consulting
157
+ St. Petersburg FL 33709-4819
158
+
159
+ Phone: +1 813 790 7592
160
+ Email: jra@scfn.thpl.lib.fl.us
161
+
162
+
163
+
164
+
165
+
166
+
167
+
168
+ Ashworth Expires October 3, 1997 [Page 3]
@@ -0,0 +1,336 @@
1
+
2
+
3
+
4
+
5
+ Network Working Group S. Bellovin
6
+ Internet-Draft AT&T Labs Research
7
+ Intended status: Informational April 1, 2003
8
+ Expires: October 3, 2003
9
+
10
+
11
+ The Security Flag in the IPv4 Header
12
+ rfc-3514
13
+
14
+ Abstract
15
+
16
+ Firewalls, packet filters, intrusion detection systems, and the like
17
+ often have difficulty distinguishing between packets that have
18
+ malicious intent and those that are merely unusual. We define a
19
+ security flag in the IPv4 header as a means of distinguishing the two
20
+ cases.
21
+
22
+ Status of This Memo
23
+
24
+ This Internet-Draft is submitted in full conformance with the
25
+ provisions of BCP 78 and BCP 79.
26
+
27
+ Internet-Drafts are working documents of the Internet Engineering
28
+ Task Force (IETF). Note that other groups may also distribute
29
+ working documents as Internet-Drafts. The list of current Internet-
30
+ Drafts is at http://datatracker.ietf.org/drafts/current/.
31
+
32
+ Internet-Drafts are draft documents valid for a maximum of six months
33
+ and may be updated, replaced, or obsoleted by other documents at any
34
+ time. It is inappropriate to use Internet-Drafts as reference
35
+ material or to cite them other than as "work in progress."
36
+
37
+ This Internet-Draft will expire on October 3, 2003.
38
+
39
+ Copyright Notice
40
+
41
+ Copyright (c) 2003 IETF Trust and the persons identified as the
42
+ document authors. All rights reserved.
43
+
44
+ This document is subject to BCP 78 and the IETF Trust's Legal
45
+ Provisions Relating to IETF Documents
46
+ (http://trustee.ietf.org/license-info) in effect on the date of
47
+ publication of this document. Please review these documents
48
+ carefully, as they describe your rights and restrictions with respect
49
+ to this document. Code Components extracted from this document must
50
+ include Simplified BSD License text as described in Section 4.e of
51
+ the Trust Legal Provisions and are provided without warranty as
52
+ described in the Simplified BSD License.
53
+
54
+
55
+
56
+ Bellovin Expires October 3, 2003 [Page 1]
57
+
58
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
59
+
60
+
61
+ Table of Contents
62
+
63
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
64
+ 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 2
65
+ 2. Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
66
+ 3. Setting the Evil Bit . . . . . . . . . . . . . . . . . . . . 3
67
+ 4. Processing of the Evil Bit . . . . . . . . . . . . . . . . . 4
68
+ 5. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 4
69
+ 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
70
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
71
+ 8. Normative References . . . . . . . . . . . . . . . . . . . . 5
72
+ Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 6
73
+
74
+ 1. Introduction
75
+
76
+ Firewalls [CBR03], packet filters, intrusion detection systems, and
77
+ the like often have difficulty distinguishing between packets that
78
+ have malicious intent and those that are merely unusual. The problem
79
+ is that making such determinations is hard. To solve this problem,
80
+ we define a security flag, known as the "evil" bit, in the IPv4
81
+ [RFC0791] header. Benign packets have this bit set to 0; those that
82
+ are used for an attack will have the bit set to 1.
83
+
84
+ 1.1. Terminology
85
+
86
+ The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
87
+ SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
88
+ document, are to be interpreted as described in [RFC2119].
89
+
90
+ 2. Syntax
91
+
92
+ The high-order bit of the IP fragment offset field is the only unused
93
+ bit in the IP header. Accordingly, the selection of the bit position
94
+ is not left to IANA.
95
+
96
+ The bit field is laid out as follows:
97
+
98
+ 0
99
+ +-+
100
+ |E|
101
+ +-+
102
+
103
+ Currently-assigned values are defined as follows:
104
+
105
+ 0x0:
106
+ If the bit is set to 0, the packet has no evil intent. Hosts,
107
+ network elements, etc., SHOULD assume that the packet is harmless,
108
+ and SHOULD NOT take any defensive measures. (We note that this
109
+
110
+
111
+
112
+ Bellovin Expires October 3, 2003 [Page 2]
113
+
114
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
115
+
116
+
117
+ part of the spec is already implemented by many common desktop
118
+ operating systems.)
119
+
120
+ 0x1:
121
+ If the bit is set to 1, the packet has evil intent. Secure
122
+ systems SHOULD try to defend themselves against such packets.
123
+ Insecure systems MAY chose to crash, be penetrated, etc.
124
+
125
+ 3. Setting the Evil Bit
126
+
127
+ There are a number of ways in which the evil bit may be set. Attack
128
+ applications may use a suitable API to request that it be set.
129
+ Systems that do not have other mechanisms MUST provide such an API;
130
+ attack programs MUST use it.
131
+
132
+ Multi-level insecure operating systems may have special levels for
133
+ attack programs; the evil bit MUST be set by default on packets
134
+ emanating from programs running at such levels. However, the system
135
+ _MAY_ provide an API to allow it to be cleared for non-malicious
136
+ activity by users who normally engage in attack behavior.
137
+
138
+ Fragments that by themselves are dangerous MUST have the evil bit
139
+ set. If a packet with the evil bit set is fragmented by an
140
+ intermediate router and the fragments themselves are not dangerous,
141
+ the evil bit MUST be cleared in the fragments, and MUST be turned
142
+ back on in the reassembled packet.
143
+
144
+ Intermediate systems are sometimes used to launder attack
145
+ connections. Packets to such systems that are intended to be relayed
146
+ to a target SHOULD have the evil bit set.
147
+
148
+ Some applications hand-craft their own packets. If these packets are
149
+ part of an attack, the application MUST set the evil bit by itself.
150
+
151
+ In networks protected by firewalls, it is axiomatic that all
152
+ attackers are on the outside of the firewall. Therefore, hosts
153
+ inside the firewall MUST NOT set the evil bit on any packets.
154
+
155
+ Because NAT [RFC3022] boxes modify packets, they SHOULD set the evil
156
+ bit on such packets. "Transparent" http and email proxies SHOULD set
157
+ the evil bit on their reply packets to the innocent client host.
158
+
159
+ Some hosts scan other hosts in a fashion that can alert intrusion
160
+ detection systems. If the scanning is part of a benign research
161
+ project, the evil bit MUST NOT be set. If the scanning per se is
162
+ innocent, but the ultimate intent is evil and the destination site
163
+ has such an intrusion detection system, the evil bit SHOULD be set.
164
+
165
+
166
+
167
+
168
+ Bellovin Expires October 3, 2003 [Page 3]
169
+
170
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
171
+
172
+
173
+ 4. Processing of the Evil Bit
174
+
175
+ Devices such as firewalls MUST drop all inbound packets that have the
176
+ evil bit set. Packets with the evil bit off MUST NOT be dropped.
177
+ Dropped packets SHOULD be noted in the appropriate MIB variable.
178
+
179
+ Intrusion detection systems (IDSs) have a harder problem. Because of
180
+ their known propensity for false negatives and false positives, IDSs
181
+ MUST apply a probabilistic correction factor when evaluating the evil
182
+ bit. If the evil bit is set, a suitable random number generator
183
+ [RFC1750] must be consulted to determine if the attempt should be
184
+ logged. Similarly, if the bit is off, another random number
185
+ generator must be consulted to determine if it should be logged
186
+ despite the setting.
187
+
188
+ The default probabilities for these tests depends on the type of IDS.
189
+ Thus, a signature-based IDS would have a low false positive value but
190
+ a high false negative value. A suitable administrative interface
191
+ MUST be provided to permit operators to reset these values.
192
+
193
+ Routers that are not intended as as security devices SHOULD NOT
194
+ examine this bit. This will allow them to pass packets at higher
195
+ speeds.
196
+
197
+ As outlined earlier, host processing of evil packets is operating-
198
+ system dependent; however, all hosts MUST react appropriately
199
+ according to their nature.
200
+
201
+ 5. Related Work
202
+
203
+ Although this document only defines the IPv4 evil bit, there are
204
+ complementary mechanisms for other forms of evil. We sketch some of
205
+ those here.
206
+
207
+ For IPv6 [RFC2460], evilness is conveyed by two options. The first,
208
+ a hop-by-hop option, is used for packets that damage the network,
209
+ such as DDoS packets. The second, an end-to-end option, is for
210
+ packets intended to damage destination hosts. In either case, the
211
+ option contains a 128-bit strength indicator, which says how evil the
212
+ packet is, and a 128-bit type code that describes the particular type
213
+ of attack intended.
214
+
215
+ Some link layers, notably those based on optical switching, may
216
+ bypass routers (and hence firewalls) entirely. Accordingly, some
217
+ link-layer scheme MUST be used to denote evil. This may involve evil
218
+ lambdas, evil polarizations, etc.
219
+
220
+ DDoS attack packets are denoted by a special diffserv code point.
221
+
222
+
223
+
224
+ Bellovin Expires October 3, 2003 [Page 4]
225
+
226
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
227
+
228
+
229
+ An application/evil MIME type is defined for Web- or email-carried
230
+ mischief. Other MIME types can be embedded inside of evil sections;
231
+ this permit easy encoding of word processing documents with macro
232
+ viruses, etc.
233
+
234
+ 6. IANA Considerations
235
+
236
+ This document defines the behavior of security elements for the 0x0
237
+ and 0x1 values of this bit. Behavior for other values of the bit may
238
+ be defined only by IETF consensus [RFC2434].
239
+
240
+ 7. Security Considerations
241
+
242
+ Correct functioning of security mechanisms depend critically on the
243
+ evil bit being set properly. If faulty components do not set the
244
+ evil bit to 1 when appropriate, firewalls will not be able to do
245
+ their jobs properly. Similarly, if the bit is set to 1 when it
246
+ shouldn't be, a denial of service condition may occur.
247
+
248
+ 8. Normative References
249
+
250
+ [CBR03] Cheswick, W., Bellovin, S., and A. Rubin, "Firewalls and
251
+ Internet Security: Repelling the Wily Hacker, Second
252
+ Edition", Addison-Wesley , 2003.
253
+
254
+ [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
255
+ DOI 10.17487/RFC0791, September 1981,
256
+ <https://www.rfc-editor.org/info/rfc791>.
257
+
258
+ [RFC1750] Eastlake 3rd, D., Crocker, S., and J. Schiller,
259
+ "Randomness Recommendations for Security", RFC 1750,
260
+ DOI 10.17487/RFC1750, December 1994,
261
+ <https://www.rfc-editor.org/info/rfc1750>.
262
+
263
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
264
+ Requirement Levels", BCP 14, RFC 2119,
265
+ DOI 10.17487/RFC2119, March 1997,
266
+ <https://www.rfc-editor.org/info/rfc2119>.
267
+
268
+ [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
269
+ IANA Considerations Section in RFCs", RFC 2434,
270
+ DOI 10.17487/RFC2434, October 1998,
271
+ <https://www.rfc-editor.org/info/rfc2434>.
272
+
273
+ [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
274
+ (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
275
+ December 1998, <https://www.rfc-editor.org/info/rfc2460>.
276
+
277
+
278
+
279
+
280
+ Bellovin Expires October 3, 2003 [Page 5]
281
+
282
+ Internet-Draft The Security Flag in the IPv4 Header April 2003
283
+
284
+
285
+ [RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network
286
+ Address Translator (Traditional NAT)", RFC 3022,
287
+ DOI 10.17487/RFC3022, January 2001,
288
+ <https://www.rfc-editor.org/info/rfc3022>.
289
+
290
+ Author's Address
291
+
292
+ Steven M. Bellovin
293
+ AT&T Labs Research
294
+ 180 Park Avenue
295
+ Florham Park NJ 07932
296
+
297
+ Phone: +1 973-360-8656
298
+ Email: bellovin@acm.org
299
+
300
+
301
+
302
+
303
+
304
+
305
+
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+
319
+
320
+
321
+
322
+
323
+
324
+
325
+
326
+
327
+
328
+
329
+
330
+
331
+
332
+
333
+
334
+
335
+
336
+ Bellovin Expires October 3, 2003 [Page 6]